2018/07/18 23:15:59 fuzzer started 2018/07/18 23:15:59 dialing manager at 127.0.0.1:37169 2018/07/18 23:15:59 syscalls: 213 2018/07/18 23:15:59 code coverage: support is not implemented in syzkaller 2018/07/18 23:15:59 comparison tracing: support is not implemented in syzkaller 2018/07/18 23:15:59 setuid sandbox: support is not implemented in syzkaller 2018/07/18 23:15:59 namespace sandbox: support is not implemented in syzkaller 2018/07/18 23:15:59 fault injection: support is not implemented in syzkaller 2018/07/18 23:15:59 leak checking: support is not implemented in syzkaller 2018/07/18 23:15:59 net packed injection: support is not implemented in syzkaller 2018/07/18 23:15:59 net device setup: support is not implemented in syzkaller 23:15:59 executing program 0: openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000040)='/dev/drivers\x00', 0xd, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) r0 = openat$dev_kmesg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kmesg\x00', 0xb, 0x1, 0x0) r1 = openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000100)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000140)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000200)='/net/.empty\x00', 0xc, 0x3, 0x0) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000280)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) proc_destroy(0xffffffffffffffff, 0x2) openat$net_arp(0xffffffffffffff9c, &(0x7f00000002c0)='/net/arp\x00', 0x9, 0x3, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000300)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000380)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) r2 = proc_create(&(0x7f00000003c0)='./file0\x00', 0x8, &(0x7f0000000400)='\x00', 0x1, 0x1) proc_destroy(r2, 0x3ff) openat$net_arp(0xffffffffffffff9c, &(0x7f0000000440)='/net/arp\x00', 0x9, 0x3, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000480)='/prof/kpdata\x00', 0xd, 0x3, 0x0) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f00000004c0)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000500)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$dev_consctl(0xffffffffffffff9c, &(0x7f0000000540)='/dev/consctl\x00', 0xd, 0x3, 0x0) openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000580)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) fd2path(r1, &(0x7f00000005c0)=""/109, 0x6d) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000680)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) nmount(r0, &(0x7f0000000700)='./file0\x00', 0x8, 0x0) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000740)='/prof/mpstat\x00', 0xd, 0x3, 0x0) 23:15:59 executing program 2: r0 = openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000000)='/dev/stdin\x00', 0xb, 0x3, 0x0) llseek(r0, 0xbba3, 0x7, &(0x7f0000000040), 0x1) write(r0, &(0x7f0000000080)="a86562d3133569cbddc50c83e7cedac7badad9d122603ddd5662a3d258860b7937573496eaef496cc1577a823341", 0x2e) tap_fds(&(0x7f0000000300)=[{r0, 0x2, 0x104, 0x5, &(0x7f0000000140)={&(0x7f00000000c0)="1b6cd5f980a3e1ed613544e851cc458d9ade006e25386907df464cc800d7b1ed8ba9b99426cbaf2762a2b90f604ab4476b2b39e7c9508f508cb6cbd2fa0a599370430ca6b4742abc38bffa90abaee557", 0x400, 0x1, 0x100, 0x8, 0xa3a}}, {r0, 0x3, 0x0, 0x8, &(0x7f0000000200)={&(0x7f0000000180)="3c9e656e8338eedf57d3734baf34f8f156a06b1742fa0821bbc4f005af8fea1a516671cc23274224ee7ab07c66c4a7320aa5b338e709ceeef342ed015c6ff96c5da68264baed0a4e8e287f3b000171f7", 0x3, 0x0, 0x7, 0x0, 0x400}}, {r0, 0x3, 0x0, 0xff, &(0x7f00000002c0)={&(0x7f0000000240)="55f58b0fc080598661f25607171694b9c120a2e9590016673c45ea78d3459ac01ad9d98e972d0f072805ee7bb1a9368b01ce6057cdb8aecb954dd79867e5134baca7c0ea75d4a53a5431c2b459df8041", 0x3, 0x0, 0xc9, 0x8, 0x7f}}], 0x3) write(r0, &(0x7f0000000380)="248e2fabcc9b4e723998b3743405ec038104f7385fcace06ab0980678204245ee298d59cf3a48ed38a127ac9b19f59d968be2bae7b571c06d3914892", 0x3c) write(r0, &(0x7f00000003c0)="c298eb277fecd4a39042c9fe9e7a0cf68c14e0eb4a6cf931e5d18f225beab14c84f6d05ef1771ae7612a977b6bdaa400b07ee809d15578c94043bc6b78037552f039d7ec6e8e26723a4bf8140ae7df7f0ade4e44b9eb16434096531fea33929e5084e9872ec654291a4d805f97872c26d027dadd2117", 0x76) openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) r1 = openat$proc_self_strace(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000500)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000540)='/dev/hostowner\x00', 0xf, 0x3, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$dev_empty(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) r2 = openat$net_cs(0xffffffffffffff9c, &(0x7f0000000680)='/net/cs\x00', 0x8, 0x3, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000700)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000740)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000780)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f00000007c0)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000800)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000840)='/net/ipselftab\x00', 0xf, 0x1, 0x0) read(r2, &(0x7f0000000880)=""/26, 0x1a) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f00000008c0)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000900)='/dev/sysstat\x00', 0xd, 0x3, 0x0) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000940)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000980)='/prof/kpctl\x00', 0xc, 0x3, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f00000009c0)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) llseek(r1, 0xa1c, 0x8, &(0x7f0000000a00), 0x0) 23:15:59 executing program 1: send_event(&(0x7f0000000080)={&(0x7f0000000000)="a9c82057a446f4ac9f3866f9dbedb9c459fa5d8a8251c4a01468d8d2416c76e94d600edc4bfa58e86f20c504853a41e4728db405ff95cbec8373dc5348a0cc6888bd1116b472d44aba671ec6c6085dd6", 0x10001, 0x1, 0x3f, 0x4, 0x4}, &(0x7f0000000140)={0x2, 0x8, 0xffffffff, &(0x7f00000000c0)="f1e6c4ed1f6b4709da5d75a52b28d30d42ddc4822022104fe782fdbf9b07c1322068006e47f097868deb1862a0b3b650fbfa5cf5358ef504d437bf7ebd120b6d528357524ea5dbc06df53881d5c9466cfab487d02f3b622cdd9f98e542a8e705061ed51692", 0x7}, 0x3) send_event(&(0x7f0000000200)={&(0x7f0000000180)="665e09391e03a8b167ec09394e715adc92c8676fac928b7087223a12f1f3c90ca3d5da65814de04ccdcc6e97e399bf7a827d4fe6dbe269280d69552a9d332f6a69d707d46930e6349cef88d5ea3e93c9", 0x56cdc75f, 0x1, 0x1, 0x0, 0x401}, &(0x7f0000000340)={0x1d, 0xa8, 0x7fff, &(0x7f0000000240)="280942583d23e757b844bdf97451539b32591553f7238387751b1a5b4afe3ec8fb46402c6a732afc3981d16a9d8a0dcefa4b2e94d3d0f7c86f1031640a434a068971ed53433fadc4d115bf205da9b1b2fd6895100ed347504e70798a8ce60ca4385112e8c61c911f631df19af17ef090c0242f77520beedb31e9c1e59b4be86f8186e14aeec6a75acdf2f8367c2878849ec3bf0784802a72a364e2b3d3390ad0207301bc551a8710a6dd90cbdfce74f576e0ad52b000b7fff7fbebb02f153e9ef97bcda8eeb40a754f320a335347be0a47c7b6a8e07d03be661d130eee", 0x8000}, 0x3) send_event(&(0x7f0000000400)={&(0x7f0000000380)="b32d8215953a8cc6842278323787683e94f03e75c69eb0fd9ea199bf8f61a413e36eeb2ab06976b8418b83f534033e15e1e472189fb893573769b0388d74b1e647cd721b1b44e70c94f3313c12edf3a6", 0x101, 0x0, 0x7fff, 0x9}, &(0x7f0000000480)={0xc, 0xff, 0xff, &(0x7f0000000440), 0x8}, 0x9) r0 = openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f00000004c0)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) getcwd(&(0x7f0000000500)=""/208, 0xd0) r1 = proc_create(&(0x7f0000000600)='./file0\x00', 0x8, &(0x7f0000000640)='/net/icmp/clone\x00', 0x10, 0x0) fchdir(r1, r0) r2 = openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000680)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) proc_create(&(0x7f00000006c0)='./file0\x00', 0x8, &(0x7f0000000700)='/net/icmp/clone\x00', 0x10, 0x0) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f0000000740)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) change_vcore(0x1, 0x1) send_event(&(0x7f0000000800)={&(0x7f0000000780)="2872c2a79816887c4827b25a124bc9287d470fe8b4dcdd5697dc3d9498351b5c740f0efd6f4c0411dedf9ad372c4c75b71a5d1efc7e425b42552274c5d5f26a312c2aef361984f541d23703c23a6f68e", 0x44, 0x0, 0x9, 0xfffffffffffffff9, 0x3}, &(0x7f0000000900)={0xb, 0x9, 0xffffffffffffffff, &(0x7f0000000840)="238c140020773b2553004702f01cd01d411d3b2fdb0723d89c015fbca6d3135d5dd544acc324b5eed99c9b2acc25e1b71d17d28a90ce237a23d6617aae48ff804d94f02b717f288ffe1e207cb6f5f647a1395f9ca1b9d339a852dbf15acc2f6f6573e6a47bcdbc1982d718217f6962810a55900cf1d4f5c25d4311118f3825a83250f0549d7f21db76a3072144d9a4d2abab", 0x80}, 0x0) r3 = openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000940)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000980)='/dev/stderr\x00', 0xc, 0x3, 0x0) openat$dev_consctl(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/consctl\x00', 0xd, 0x3, 0x0) send_event(&(0x7f0000000a80)={&(0x7f0000000a00)="a3b80f4059c2d9e080a49de3555afdc417a6d204d61516fcea48651e31ad5570f156c8180806fb8667304617137e040ee9a9f631adee4f0b979c6d6e67bdc5f2fed1f9bfebb5251660cca834c4ecdd4b", 0x8, 0x0, 0x8, 0x89, 0x1}, &(0x7f0000000b80)={0xb, 0x4, 0x8, &(0x7f0000000ac0)="f19c5e6563858134d90b9ac69b6934ea39ea549ed73b3dc38cb5435c30fb4076ba7f8df1db18ecfea37c02be6376d49d891fe02356568a2def836bf987812d0fbcd51720b5e7ce2297df1c630b283d96a6627d6c0e423824e43837f91294810862b573e6b50a0258cbc9c0240b6ed54ad469ed04cfd675a3706082e8490e9fb4bf4cea50b78b59b918c9f5e35430a399d030cc92fe4703e6149200c62269a64cd1148eb2273c7217aa1902968202e3205d29", 0x4}, 0x47b2) send_event(&(0x7f0000000c40)={&(0x7f0000000bc0)="d9bb171a9666f11de407019bd4c01ab57e5072a2d05569d6fd804d5a31bc40b843c25c294ff5d53a8eab9fcfddcb938bee39f736edd9562afdf290da076bb333309d6a9f5b3aa340768496775f40ab08", 0x8, 0x0, 0x3, 0x7f, 0x6}, &(0x7f0000000cc0)={0x2, 0x40, 0x4, &(0x7f0000000c80)="a08fd264964cd9af72e06a5947a6fd0cc48834b75d34329572197f718da235f43cf2a7b7eb624c943c1908380e5d069b564fcb9d244f", 0x8}, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000d00)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000d40)='/proc/self/maps\x00', 0x10, 0x1, 0x0) send_event(&(0x7f0000000e00)={&(0x7f0000000d80)="0c254c8c6a99b701bb48e5af5987f8f53c2ca9e525e8872f68caf8ab7155eab3a4aa20c76d49969c56562f5a7b419372d1c439cbab3c524b5287d7a06342399f9c1fa1eeb769273496e8d89120d6d492", 0x7f, 0x0, 0x10000, 0x200, 0x8}, &(0x7f0000000f00)={0x5, 0x7, 0x7, &(0x7f0000000e40)="1842eac43844a9e98cb6f25e30f878f70a4e83c7b235ab5348516c512fc68f2d14ccaf13c6394aa9297db8c4c5b5dc1e648dd7f61b1f8095b3a27831dc05415133c4ea9737510422bb378bdcd20ab32c37be5c597ae7763fcec3045437599d694ed191fad69e01a566add0bad85bdca2254da033135445fc9b1349f8874a0c14dfceb9ceb363352e5cc7", 0x100000001}, 0x8) fwstat(r3, &(0x7f0000000f40)=""/4, 0x4, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000f80)='/net/.empty\x00', 0xc, 0x3, 0x0) send_event(&(0x7f0000001040)={&(0x7f0000000fc0)="18aa23facb7c0405eb3b91088f52d3d356c2e6e244aba6808fafead737bd30b57a28dbc6919774fd7657c05c2274cc2f3d6f7394445f17eb107ea4888c506dc0244a9ebb37581978e480102c7ad4a82a", 0x401, 0x1, 0xd52, 0x8000, 0x100000000}, &(0x7f0000001100)={0x8, 0xfffffffffffff418, 0x0, &(0x7f0000001080)="42ba396f5059306163ee2e812e6338dc1aff9253b64513100edaa5461ab97849d08b89dc07dd7cd51f1dc750d8d12f88f2fb126188ce63e4ba98eaf28cf7e586d17a72037ad9cdd0fcaafad9045181", 0x7}, 0x4) fcntl$F_SETFL(r2, 0x4, 0x188000) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000001140)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000001180)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f00000011c0)='/prof/kpctl\x00', 0xc, 0x3, 0x0) block(0x3ff) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000001200)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000001240)='/proc/self/args\x00', 0x10, 0x3, 0x0) 23:15:59 executing program 3: openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000000)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) r0 = openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f00000000c0)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) r1 = openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/wait\x00', 0x10, 0x1, 0x0) close(r0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000140)='/dev/drivers\x00', 0xd, 0x1, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0xa, 0x1, 0x0) openat$proc_self_core(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/core\x00', 0x10, 0x1, 0x0) r2 = openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000200)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) close(r1) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000240)='/dev/null\x00', 0xa, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f0000000280)='/net/arp\x00', 0x9, 0x3, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) r3 = openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000340)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) r4 = proc_create(&(0x7f0000000380)='./file0\x00', 0x8, &(0x7f00000003c0)='/proc/self/wait\x00', 0x10, 0x0) dup_fds_to(r4, &(0x7f0000000400)=[{r2}], 0x1) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000440)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000480)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000500)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$dev_user(0xffffffffffffff9c, &(0x7f0000000540)='/dev/user\x00', 0xa, 0x3, 0x0) openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000580)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) fcntl$F_SETFL(r3, 0x4, 0x180000) link(&(0x7f0000000600)='./file0\x00', 0x8, &(0x7f0000000640)='./file0\x00', 0x8) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000700)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) 23:15:59 executing program 5: r0 = openat$dev_consctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/consctl\x00', 0xd, 0x3, 0x0) r1 = openat$dev_consctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/consctl\x00', 0xd, 0x3, 0x0) tap_fds(&(0x7f0000000200)=[{r0, 0x2, 0x200, 0x3, &(0x7f00000000c0)={&(0x7f0000000040)="53a97bea3cbe71a592c6c8aba25025112f952ba8b3b6a4293e3571b4d9c549569bb57a56ec4edc71a2046f7a788830707671fe63ff9a8721e4c9524008e8fdc962401e3c92c88f45d008796aacd88f40", 0x8, 0x0, 0x78, 0x9, 0x186}}, {r1, 0x3, 0x50, 0x4, &(0x7f00000001c0)={&(0x7f0000000140)="62df211255a7050f524cfa265c0740c04f2773ca8e5ddd11e28430dd6b2ed65edac3bfd19763f432bd609c00620fb74961e30e022772e6ee6aacea41ae5517b19fb7f51c33902a89a0ff894b3c92b283", 0xffffffffffffffff, 0x0, 0x80000000, 0x9, 0xc5bf}}], 0x2) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000280)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sysctl\x00', 0xc, 0x3, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f00000003c0)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000400)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) r2 = openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000440)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000480)='/dev/drivers\x00', 0xd, 0x1, 0x0) write(r2, &(0x7f00000004c0)="ee3ab93aba2753210ac4848efc48a18dee07d1b77918339f2b83c0f53a3855162d6554c67b48860daa2cacb85eb561d71d9c6d921f24343bad61918e8459a46c007c74eea3ca662273c314fdda9843494f3a8698aae1b328fcaa3c20b58b057ac4c82bd5ad38da04f0688f60a5d8797052804b4fb9dac7ef", 0x78) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000580)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) r3 = openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000640)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000680)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$dev_consctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/consctl\x00', 0xd, 0x3, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000780)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f00000007c0)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000800)='/dev/random\x00', 0xc, 0x1, 0x0) tcgetattr(r3, &(0x7f0000000840)) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000880)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f00000008c0)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000900)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) 23:15:59 executing program 4: r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/core\x00', 0x10, 0x1, 0x0) close(r0) r1 = openat$dev_user(0xffffffffffffff9c, &(0x7f0000000040)='/dev/user\x00', 0xa, 0x3, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000080)='/net/.empty\x00', 0xc, 0x3, 0x0) r2 = openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000140)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) r3 = openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000180)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) r4 = openat$dev_user(0xffffffffffffff9c, &(0x7f0000000200)='/dev/user\x00', 0xa, 0x3, 0x0) openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000280)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/maps\x00', 0x10, 0x1, 0x0) llseek(r3, 0x9, 0x7e, &(0x7f0000000340), 0x1) openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000380)='/dev/bintime\x00', 0xd, 0x3, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/hostowner\x00', 0xf, 0x3, 0x0) tap_fds(&(0x7f0000000880)=[{r1, 0x1, 0x10, 0xba, &(0x7f0000000480)={&(0x7f0000000400)="f80ac9f183467f278c0a2724f8cd60e7210b66d5d1b4e21999ca76b3cdfcfda9dd6386b44866f565e58998d28ff921a8dfb14b57da0bf32c4db2c89101d709b28322d270284a7c2fd8a55bf82b0c5883", 0x1, 0x0, 0x6, 0x1ff, 0x3}}, {r2, 0x3, 0x20, 0x10001, &(0x7f0000000540)={&(0x7f00000004c0)="fd0b52750cb4a74444ef57f537dabe03ed105762c58f628b49eaa597000953ecea4a708c48e46e0d5927a9f57b9108bf41c0e0e29e1f694fb4eaad8f0e85a1880983e8c829624da6fbff76f571fab27c", 0x100000000, 0x0, 0x7fff, 0x7, 0x8}}, {r4, 0x1, 0x2, 0x8, &(0x7f0000000600)={&(0x7f0000000580)="bb28a9d1ee1d13e7c32e80a9f0636714186834edb54f8c6b868797b6f75bfc89c6f69b461b717224faad4374554b4e9bdbc7e9f923dabc6eb795b0855ab1c20eacf03fe61129b55bef856f0df6982c8f", 0x8, 0x0, 0x0, 0x81, 0x80000001}}, {r0, 0x3, 0x240, 0x6, &(0x7f00000006c0)={&(0x7f0000000640)="7fcff41f4f8ede7d5eeec22d1c0285732a3e066ca0c15f55f3bc6322c8f5d0693b0673bb81b7d22e02713c34291571fe58e56320375ca690c13f78950d7d072e400ff9d6dbc0de96196b207a23b727d5", 0x0, 0x0, 0x10001, 0x5c15, 0x5}}, {r3, 0x2, 0x20, 0x0, &(0x7f0000000780)={&(0x7f0000000700)="361c26218cc2add8829673a76997672f9dc1d6263aa44d5445a9dfa29ac2c7eb93c85701309232669dae2823979b47619ad42614e33daa2ccad142692707c8df76eb8c838fa002ff48f932bbda9e800d", 0x9, 0x1, 0xec2, 0x4, 0x8}}, {r0, 0x3, 0x18, 0x401, &(0x7f0000000840)={&(0x7f00000007c0)="345f4f9517774ca77b77368b601a5681e76b67e62acd5a515fee40f86d8fc8b5c9cd204850383cbc40dd755345812864e5ad9ef8cd76c434317f13046bcf44615c46f29d8e8dbfad7e530518e0766a3d", 0x100000000, 0x0, 0x4, 0x3ff, 0x32a6}}], 0x6) openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000940)='/dev/stdout\x00', 0xc, 0x3, 0x0) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000980)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f00000009c0)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000a00)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000a40)='/proc/self/user\x00', 0x10, 0x1, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000a80)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5, 0x10812, 0xffffffffffffff9c, 0x9) openat$net_ipifc_1_err(0xffffffffffffff9c, &(0x7f0000000ac0)='/net/ipifc/1/err\x00', 0x11, 0x3, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000b00)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000b40)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) fcntl$F_SETFL(r0, 0x4, 0x108000) nmount(r2, &(0x7f0000000b80)='./file0\x00', 0x8, 0x10) 23:15:59 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x8, 0x8) mkdir(&(0x7f0000000040)='./file0\x00', 0x8, 0x2) access(&(0x7f0000000080)='./file0\x00', 0x8, 0x42) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r0 = openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x8, 0xc4) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) r1 = proc_create(&(0x7f00000001c0)='./file0\x00', 0x8, &(0x7f0000000200)='/net/ether0/2/data\x00', 0x13, 0x0) chdir(r1, &(0x7f0000000240)='./file0\x00', 0x8) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000280)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) link(&(0x7f00000002c0)='./file0\x00', 0x8, &(0x7f0000000300)='./file0\x00', 0x8) mkdir(&(0x7f0000000340)='./file0\x00', 0x8, 0x10) r2 = openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f00000003c0)='/net/iprouter\x00', 0xe, 0x3, 0x0) r3 = openat(r0, &(0x7f0000000400)='./file0\x00', 0x8, 0x10000, 0x80) write(r3, &(0x7f0000000440)="678fdaa59de6be2763c6c1c948f441df70f557edcba2391c21e2fcdd9a3bf14dacdddd443da4b9893e89818664edeaeb23a1ed0d0e73cae90ea982a4013bf5960cb9a1c6105d65141ffa344480782416ce39be628883", 0x56) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) symlink(&(0x7f0000000500)='./file0\x00', 0x8, &(0x7f0000000540)='./file0\x00', 0x8) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000580)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) link(&(0x7f0000000600)='./file0/file0\x00', 0xe, &(0x7f0000000640)='./file0\x00', 0x8) fstat(r2, &(0x7f0000000680)) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000700)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) r4 = openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000780)='/proc/self/text\x00', 0x10, 0x1, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f00000007c0)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$prof_kprintx(0xffffffffffffff9c, &(0x7f0000000800)='/prof/kprintx\x00', 0xe, 0x3, 0x0) link(&(0x7f0000000840)='./file0\x00', 0x8, &(0x7f0000000880)='./file1\x00', 0x8) self_notify(0x44, 0x0, &(0x7f00000009c0)={0x19, 0x4, 0x1000, &(0x7f00000008c0)="0b2701a671b32e75da6ffb8d039a78ce26c7c992032964a96d928d0508094e3b4155beebd7af8a754455f9bb616318bd134a97c76ee46a08548607173755bca5760717a11eb81b0b779880938b8617f0cad6773c6fad7d8a4b81f286e815e242795fdc5ea105424eb8d68557b5e3d9a1ec2e435fb9413baf62708808c1ed8392ace269ae5a5bef8ccde54e1546e6d50a619a61730a6e154146e21c30c12c8d2b74e1ab3f8db3a51e26a6a1afaa2b5a4167b0d85a9a61afe9316a04e41f990890fa2cfae30e5bcc9d36da6727914ebe6d503360640d85246670285919e6d118fb62bfb003fe5b19558e3e", 0xc1}, 0x1) fcntl$F_GETFL(r4, 0x3) 23:15:59 executing program 7: r0 = openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000000)='/prof/kpctl\x00', 0xc, 0x3, 0x0) dup_fds_to(0xffffffffffffffff, &(0x7f0000000040)=[{r0}, {r0}, {r0}, {r0}, {r0}], 0x5) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) r1 = openat$proc_self_wait(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000140)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/hostowner\x00', 0xf, 0x3, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/maps\x00', 0x10, 0x1, 0x0) openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/text\x00', 0x10, 0x1, 0x0) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/mem\x00', 0xf, 0x1, 0x0) r2 = openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000300)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000340)='/prof/kpdata\x00', 0xd, 0x3, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000380)='/net/udp/stats\x00', 0xf, 0x1, 0x0) r3 = openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000400)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000480)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) r4 = openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000500)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000540)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) r5 = proc_create(&(0x7f0000000580)='./file0\x00', 0x8, &(0x7f00000005c0)='$\x00', 0x2, 0x1) fchdir(r5, r1) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000680)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) tap_fds(&(0x7f0000000a00)=[{r4, 0x3, 0x110, 0x87, &(0x7f0000000780)={&(0x7f0000000700)="18efeeeb4642e342d6836df8a1130a579486afed22eb3beecc3806f9fdd9d21cf9ebd76a16695be2c2fa52b9177a77719d7fc4153d6f9d679d5cbf3ec6811308bda14baf678bb04ae1bb3d796f7dc14f", 0x885, 0x0, 0x2, 0x7, 0xffff}}, {r1, 0x3, 0x0, 0x0, &(0x7f0000000840)={&(0x7f00000007c0)="01d934fefd06b69777a491e489eceda0c2b94bbd4b5cfa23e1a0b6e89009883be346879468db7fe6afcc90cafc90198d61b2d27a1eba2a76ebe44b5a5e015c201f96689f24ce1c36dbe27f4a4dc90387", 0x3, 0x1, 0x3, 0x8, 0xffff}}, {r2, 0x3, 0x208, 0xfffffffffffffff8, &(0x7f0000000900)={&(0x7f0000000880)="96325422c229c43dfba01a044ef9a7761f5f5fcfec58db0918b2bbdc84a1b530f746afc8a22340ba2ced07690911747f0e99472d1b5cdfdff351adc14786a7f6bd5040f6bf3fa7f1011b360fb209dd06", 0x89fe, 0x1, 0xffffffffffffffff, 0x5, 0x100}}, {r3, 0x3, 0x1, 0x4085, &(0x7f00000009c0)={&(0x7f0000000940)="5929a27ebac9a3b5515d0d8d1d037199e8b36371e15f715aeb345878292e1a7e292c67f67f681e1df23f764eadca5cb43daa4e6edc09f2ffe1c466aa49b764601a94a6ea3a589b9cd24c8d4f2e61707c", 0x0, 0x0, 0x6, 0x5, 0x94}}], 0x4) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000a80)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) 23:16:00 executing program 0: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) rename(&(0x7f0000000080)='./file0\x00', 0x8, &(0x7f00000000c0)='./file0\x00', 0x8) exec(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='&\x00', 0x2) 23:16:00 executing program 0: openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) r0 = openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000040)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) fcntl$F_SETFL(r0, 0x4, 0xfffffffffffffffd) 23:16:00 executing program 0: openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/0/data\x00', 0x8, 0x3, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8, 0x809c1, 0x10) 23:16:00 executing program 0: openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) r0 = openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000000)='/net/iprouter\x00', 0x5, 0x3, 0x0) abort_sysc_fd(r0) 23:16:00 executing program 0: r0 = openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000080)='/prof/mpstat\x00', 0xffffffffffffff9a, 0x3, 0x0) openat$dev_time(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/time\x00', 0xa, 0x3, 0x0) fcntl$F_GETFL(r0, 0x3) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000000)='/prof/mpstat\x00', 0xd, 0x3, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/ns\x00', 0xe, 0x1, 0x0) 23:16:01 executing program 0: openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) r0 = openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) close(r0) 23:16:01 executing program 0: openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f00000003c0)='/net/icmp/clone\x00', 0x6, 0x3, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000040)='/dev/caphash\x00', 0xd, 0x3, 0x0) 23:16:01 executing program 0: r0 = openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000040)='/net/ether0/0/stats\x00', 0xffffffffffffff8e, 0x1, 0x0) fd2path(r0, &(0x7f0000000300)=""/100, 0x64) 23:16:01 executing program 0: openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/note\x00', 0x90d95964fd104caf, 0x1, 0x0) r0 = openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kprint\x00', 0xfffffffffffffece, 0x1, 0x0) fcntl$F_GETFD(r0, 0x1) bash-4.3$ [kernel] Unknown mbox type 1461766313! [kernel] Unknown mbox type 360852915! [kernel] Unknown mbox type -1480429016! [kernel] Unknown mbox type 0! [kernel] Unknown mbox type 1074772131! [kernel] Unknown mbox type 437763033! [kernel] Vcoreid 65536 unsafe! (too big?) nbuf 4, STAT_FIX_LEN_9P 49 BIT16SZ 2, GBIT16(buf) 0 This is bad! [kernel] Vcoreid 3410 unsafe! (too big?) [kernel] Unknown mbox type 1461766313! [kernel] Unknown mbox type 360852915! [kernel] Unknown mbox type -1480429016! [kernel] Unknown mbox type 0! [kernel] Unknown mbox[ kerneltyp]e 10747 U7n213k1! n[kernel] Unknown mbox type 437763033! own mbox [ke unsarnel] Vcorefe! (too id 65536 unbsafe! (too big?) ig?) nel panic at kern/anrchb86/tr/ap.c:309, from core xBIT16SZ 2, GBIT16(buf) 0 Ts iTs bad! hITis i1s bad! 23:16:05 executing program 1: openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/2/data\x00', 0x2d, 0x3, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sdctl\x00', 0xb, 0x3, 0x0) 23:16:05 executing program 0: openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000040)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0xa, 0x1, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000100)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000140)='/net/cs\x00', 0x8, 0x3, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) mprotect(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000240)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000280)='/net/.empty\x00', 0xc, 0x3, 0x0) getpcoreid() openat$net_empty(0xffffffffffffff9c, &(0x7f00000002c0)='/net/.empty\x00', 0xc, 0x3, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hostowner\x00', 0xf, 0x3, 0x0) abort_sysc(0x7ff) r0 = openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000340)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) change_vcore(0x100000000, 0x1) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/wait\x00', 0x10, 0x1, 0x0) read(r0, &(0x7f0000000400), 0x0) openat$dev_consctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/consctl\x00', 0xd, 0x3, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000480)='/prof/kpctl\x00', 0xc, 0x3, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f00000004c0)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000500)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000540)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f0000000580)='/net/arp\x00', 0x9, 0x3, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000640)='/dev/stdin\x00', 0xb, 0x3, 0x0) 6(b1[kerne0l] Vcorei unsafe!d 3 4 in the Kernel at 0x00Proc-ful Page Fault in the Kernel at 0x00000002deadbac6! HW TRAP frame at 0xfffffff0000dfd00 on core 1 rax 0x0000000000000001 rbx 0x00000002deadbabe rcx 0x0000000000000001 rdx 0x00000002deadbac6 rbp 0xfffffff0000dfdc8 rsi 0x00000000ffffffff rdi 0x00000002deadbac6 r8 0x0000000000000000 r9 0x0000000000000000 r10 0x000010000000a4c0 r11 0x0000000000000206 r12 0xffff80000217f160 r13 0x00000000ffffffff r14 0x0000000000000002 r15 0xffff80000217edc0 trap 0x0000000e Page Fault gsbs 0xffffffffc8667c40 fsbs 0x0000000000000000 err 0x--------00000000 rip 0xffffffffc2007b17 cs 0x------------0008 flag 0x0000000000010206 rsp 0xfffffff0000dfdc8 ss 0x------------0010 Backtrace of kernel context on Core 1: #01 [<0xffffffffc2007b17>] in kref_put #02 [<0xffffffffc2007e96>] in remove_fd_tap #03 [<0xffffffffc205870c>] in sys_tap_fds #04 [<0xffffffffc20593c9>] in syscall #05 [<0xffffffffc2059584>] in run_local_syscall #06 [<0xffffffffc2059ab9>] in prep_syscalls #07 [<0xffffffffc20ab29a>] in sysenter_callwrapper Entering Nanwan's Dungeon on Core 1 (Ints off): Type 'help' for a list of commands. ROS(Core 1)> __get_km_tag bad canary: 00000000@0xffff800007057018, buf 0xffff800007057020, expected deadbabe ffff800007057000: 00 20 00 00 00 00 00 00 01 00 00 00 00 00 00 00 . .............. ffff800007057010: 40 a7 00 c2 ff ff ff ff 00 00 00 00 00 00 00 00 @............... ffff800007057020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ... ffff800007057070: 01 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ffff800007057080: 00 00 00 00 00 00 00 00 01 00 00 00 00 00 00 00 ................ ffff800007057090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ... kernel panic at kern/src/kmalloc.c:138, from core 0: Bad canary Stack Backtrace on Core 0: #01 [<0xffffffffc200a3e7>] in backtrace #02 [<0xffffffffc2009bb2>] in _panic #03 [<0xffffffffc200a816>] in __get_km_tag #04 [<0xffffffffc200ac0b>] in kfree #05 [<0xffffffffc2041b1c>] in close_fdt #06 [<0xffffffffc204cfdf>] in proc_destroy #07 [<0xffffffffc2056cc6>] in sys_proc_destroy #08 [<0xffffffffc20593c9>] in syscall #09 [<0xffffffffc2059584>] in run_local_syscall #10 [<0xffffffffc2059ab9>] in prep_syscalls #11 [<0xffffffffc20ab29a>] in sysenter_callwrapper Entering Nanwan's Dungeon on Core 0 (Ints on): Type 'help' for a list of commands.