2019/04/30 18:22:13 fuzzer started 2019/04/30 18:22:13 dialing manager at 127.0.0.1:35507 2019/04/30 18:22:13 syscalls: 212 2019/04/30 18:22:13 code coverage: support is not implemented in syzkaller 2019/04/30 18:22:13 comparison tracing: support is not implemented in syzkaller 2019/04/30 18:22:13 extra coverage: support is not implemented in syzkaller 2019/04/30 18:22:13 setuid sandbox: support is not implemented in syzkaller 2019/04/30 18:22:13 namespace sandbox: support is not implemented in syzkaller 2019/04/30 18:22:13 Android sandbox: support is not implemented in syzkaller 2019/04/30 18:22:13 fault injection: support is not implemented in syzkaller 2019/04/30 18:22:13 leak checking: support is not implemented in syzkaller 2019/04/30 18:22:13 net packet injection: support is not implemented in syzkaller 2019/04/30 18:22:13 net device setup: support is not implemented in syzkaller 18:22:13 executing program 0: getvcoreid() r0 = openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) openat$dev_time(0xffffffffffffff9c, &(0x7f0000000040)='/dev/time\x00', 0xa, 0x3, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) r1 = openat$dev_sysstat(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sysstat\x00', 0xd, 0x3, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) fcntl$F_GETFD(r0, 0x1) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000140)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000180)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) r2 = proc_create(&(0x7f00000001c0)='./file0\x00', 0x8, &(0x7f0000000200)='\x00', 0x1, 0x0) proc_destroy(r2, 0x34d) waitpid(r2, &(0x7f0000000240), 0x2) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) waitpid(r2, &(0x7f00000002c0), 0x3) openat(r1, &(0x7f0000000300)='./file1\x00', 0x8, 0x3, 0x11) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000004) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/fd\x00', 0xe, 0x1, 0x0) r3 = openat$prof_kpdata(0xffffffffffffff9c, &(0x7f00000003c0)='/prof/kpdata\x00', 0xd, 0x3, 0x0) nmount(r3, &(0x7f0000000400)='./file1\x00', 0x8, 0x14) access(&(0x7f0000000440)='./file2\x00', 0x8, 0x2) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000480)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hostowner\x00', 0xf, 0x3, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000500)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$net_log(0xffffffffffffff9c, &(0x7f0000000540)='/net/log\x00', 0x9, 0x3, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000580)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000600)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) provision(r2, 0x0, 0x2) openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipselftab\x00', 0xf, 0x1, 0x0) 18:22:13 executing program 2: pop_ctx(&(0x7f0000000000)="e092dc3732c996a34323694fedb90869003faf196bc11af8518e8754665a15af424ec5507fb3b3b1c65b86b718db62963daa98343b30adaa71d58c4bec425d4bf1678e909770c0ed8eaa74d8f816d1bf9d2cc987343b4158bd5194c669e89bbbfe40d5098a9d813d7699a92f27c6561513eeacdee45e44b7bab28f1ec6a1d85a70d0fd519163d47b8e0eba8ddac9d56fc104586445d31549456e8cfad05923427367824b33da588ca0d6516af78e3e3f815e7e1af7d32ab605b557df99fdc9cb08e138ae79114bf1fe0f8608dc5ac8032b531d327537bf99") openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sysstat\x00', 0xd, 0x3, 0x0) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/killkid\x00', 0xd, 0x3, 0x0) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) r0 = openat$proc_self_proc(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/proc\x00', 0x10, 0x1, 0x0) fcntl$F_SETFL(r0, 0x4, 0x400) getpcoreid() openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) fcntl$F_GETFL(r0, 0x3) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000280)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f00000002c0)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000300)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$dev_time(0xffffffffffffff9c, &(0x7f0000000380)='/dev/time\x00', 0xa, 0x3, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000440)='/dev/random\x00', 0xc, 0x1, 0x0) r1 = openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000480)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000500)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) fd2path(r1, &(0x7f0000000540)=""/240, 0xf0) openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000700)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000740)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f00000007c0)='/proc/self/fd\x00', 0xe, 0x1, 0x0) 18:22:13 executing program 4: openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bintime\x00', 0xd, 0x3, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000040)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) abort_sysc(0x2) vmm_ctl$VMM_CTL_GET_EXITS(0x1) openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) fork() openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) r0 = proc_create(&(0x7f0000000240)='./file0\x00', 0x8, &(0x7f0000000280)='\'\x00', 0x2, 0x1) proc_destroy(r0, 0x9) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/fd\x00', 0xe, 0x1, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000340)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000400)='/prof/mpstat\x00', 0xd, 0x3, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/sdctl\x00', 0xb, 0x3, 0x0) r1 = openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000004c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000500)='/dev/stderr\x00', 0xc, 0x3, 0x0) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000540)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) stat(&(0x7f0000000580)='./file0\x00', 0x8, &(0x7f00000005c0)) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000640)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/note\x00', 0x10, 0x1, 0x0) abort_sysc_fd(r1) 18:22:13 executing program 1: r0 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/clone\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) read(r0, &(0x7f0000000080)=""/235, 0xeb) openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) r1 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000000200)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) r2 = openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) fcntl$F_GETFD(r2, 0x1) r3 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) fwstat(r2, &(0x7f00000002c0)=""/103, 0x67, 0x0) fd2path(r0, &(0x7f0000000340)=""/248, 0xf8) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) tap_fds(&(0x7f0000000680)=[{r1, 0x3, 0x130, 0x7, &(0x7f0000000580)={&(0x7f0000000500)="3d176d6fa2bc79fc7d66dd8ca0f80350208bc4d66592a8788bb6f62b1ac62ee533c7eee8d8cfa4860db2cb038e7b819eb5ea461a0238eb2b7d7e7ec289e79776ef9070a2d7d4401cbaa9d3d308e8642b", 0x80, 0x0, 0x1, 0x1, 0x8}}, {r0, 0x3, 0x42, 0x8001, &(0x7f0000000640)={&(0x7f00000005c0)="f402162e235fae1a91426e6ab7310587cf0cd912b7a4a5abdfebd4adf1dd952023d38bf93e9271820a25043c18ea48673d024dd9c2e92e0c53e1db29f12915df4472bcd24b334562b9bd910021bf3ed7", 0x8, 0x0, 0xfffffffffffffff8, 0x9, 0x1}}], 0x2) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000700)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) r4 = openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) r5 = openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000780)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000800)='/dev/bintime\x00', 0xd, 0x3, 0x0) nmount(r5, &(0x7f0000000840)='./file0\x00', 0x8, 0x2) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000880)='/dev/urandom\x00', 0xd, 0x1, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x6030, 0xffffffffffffff9c, 0x7) tap_fds(&(0x7f0000000a40)=[{r4, 0x3, 0x0, 0x100000001, &(0x7f0000000940)={&(0x7f00000008c0)="868813ca08c34c2abf139c42fd14557ad93a03bb0ed45e6744f2604459db0f77b62e886e419b8365ae904190ecb41a02882a0c70e6a73ac19b937108aeaf82f9b2c9bd2e883a7fdfb1b477fef8b798db", 0xb76c, 0x1, 0x2, 0xad, 0x8}}, {r3, 0x3, 0x30, 0x8001, &(0x7f0000000a00)={&(0x7f0000000980)="f25fd5423f027070a6217f217add569a8d6a283c77df00d9877a5e6ac1d74b48455b700dbb250ff4c24248b8fc303afbcbe6bc99c04aed3278662b73f818a170fe9383ce486c88966b95269039206f80", 0x1f, 0x0, 0x9, 0x401, 0x6}}], 0x2) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000a80)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f0000000ac0)='/proc/self/proc\x00', 0x10, 0x1, 0x0) openat$dev_time(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/time\x00', 0xa, 0x3, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000b40)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000b80)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) 18:22:13 executing program 6: openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) r0 = openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000040)='/prof/kpdata\x00', 0xd, 0x3, 0x0) openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0xa, 0x1, 0x0) r1 = openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) llseek(r1, 0x1, 0x7a3, &(0x7f0000000100), 0x1) r2 = openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bintime\x00', 0xd, 0x3, 0x0) r3 = openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000180)='/dev/caphash\x00', 0xd, 0x3, 0x0) fcntl$F_GETFL(r1, 0x3) r4 = proc_create(&(0x7f00000001c0)='./file0\x00', 0x8, &(0x7f0000000200)='-\\\x00', 0x3, 0x1) dup_fds_to(r4, &(0x7f0000000240)=[{r2}, {r1}, {r0}, {r2}, {r3}, {r3}, {r2}], 0x7) abort_sysc(0x5) umask(0x312e7e46) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) r5 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000300)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2, 0x10810, r5, 0x9) proc_create(&(0x7f0000000340)='./file1\x00', 0x8, &(0x7f0000000380)='*-\x00', 0x3, 0x0) r6 = openat$dev_sysstat(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sysstat\x00', 0xd, 0x3, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000440)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$proc_self_args(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/args\x00', 0x10, 0x3, 0x0) openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000500)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000540)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) close(r6) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000580)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$dev_cputime(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000600)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000640)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000680)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/proc\x00', 0x10, 0x1, 0x0) 18:22:13 executing program 5: send_event(&(0x7f0000000080)={&(0x7f0000000000)="3f0e4e1719590b5dff9b5107becbd345beb8001a471be8e4f0816b879e073448cce3af834ffd9dc53431b44de3320932b540103005c198c0e17c44fa5e32369d346084e2e7f6c603e781b81e5114aca5", 0x3, 0x0, 0x40, 0xfffffffffffffffc, 0x5}, &(0x7f0000000100)={0xc, 0x400, 0x2670, &(0x7f00000000c0)="e9ad8d7cc10d1ed93dcc26856169b1aed2b859d7d9bdafdcfc2c4e07d5a0077bb30e134d0265d6", 0x401}, 0xfff) r0 = openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) fcntl$F_SETFL(r0, 0x4, 0x80000) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000180)='/dev/osversion\x00', 0xf, 0x1, 0x0) send_event(&(0x7f0000000240)={&(0x7f00000001c0)="c3912e2e449dffc1857f4475be1a315931887182be6c00b8081bd394b8e8c6519e11351ea04f95895931f2b876a8437b7c39cd2498fec11c8119065a984c9e21c38a08395abea6d05d235450cd7e20f8", 0x0, 0x0, 0x18000000000, 0x0, 0x40b954a6}, &(0x7f0000000380)={0xb, 0x9, 0x4, &(0x7f0000000280)="d541dccc14fac01486674c6a28cb1e77f647007018ad11a910197639c715d112cdc66142b6c1c5efb9693140db10ecd91d841fab10008afb4c67af32886bba312576ad1a13226bd514e6caa1dc9412b53ef9a85a8b2667911cbd16e94917681ed3ae3ea44199adbbb2e3e2c9459d0c78e8ecc68cffbee8181a1de1143850486945c85192471e4b4405ad352892de5051512c00a12226a6c04749a1cbe83020b5de9e78767100e2ab07afdcd0fabb0f9bf8429d06c22d8c041d29955690365ebe02a1f0b196d9293c60fe40c01806c510afe0f1b0b049b0f4", 0x5}, 0xffffffffffffff80) send_event(&(0x7f0000000440)={&(0x7f00000003c0)="73026c29f642e9719bc4cbfe157260ef1551e96fe0cd2986e4684c19212152807cb8353290ce4f394ab28603a55def42fb8b7977e337d001a5000b69b4d075e45e34f2c730192eb6aa52c3214963f7ee", 0x9, 0x0, 0x100000001, 0x1, 0x9}, &(0x7f0000000580)={0xf, 0x9, 0x7, &(0x7f0000000480)="4344b9a5c862e7174acfa11b7e02b9a7379013801e4f3293c6e376daacabcef840319f1d0889734d5dc3fe0d401b04a767b30b09d4d41fd6205a115e6f053d6e48ab072af9f873844108fa738e7a75a3c008b84c0e2b8fde0e081200cf3557ca826b088d1e298c88935414da1e4f22de272d06635adf15f0bd8d2255c35fc3744277de39af9188713b85334ec45cdfac7607079ffc5b2c0a87fc8bfbd238ec62dc343412b0849eab1b629843d2ca5fe485e746b9504298394f39ea679cd86c76110bdeb8ade9cce99ccc34044f229e9a6812c83a431d101c4f2025", 0xf78c}, 0x4f8e) openat$dev_capuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/capuse\x00', 0xc, 0x3, 0x0) vmm_ctl$VMM_CTL_GET_EXITS(0x1) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000640)='/dev/random\x00', 0xc, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f00000006c0)='/prof/mpstat\x00', 0xd, 0x3, 0x0) send_event(&(0x7f0000000780)={&(0x7f0000000700)="20d76c41ac75163ceded54d21c022afde95c9d677cc0b87b6c264a7cb15f2a437f9f01fafa58bbce823c7e06cc3b12df078fe875ba5a2f26123cc7f1d376b0b3e8d5990b07c99063d5d9c8c440e2418b", 0x7f, 0x1, 0x3ff, 0x0, 0x7}, &(0x7f0000000840)={0x1b, 0x81, 0x6, &(0x7f00000007c0)="6581e91a02bf27da7b79b991f064d1c63acde08f210eb77bcc56e71a23f5cd98d8fb19eee0525ea70615d409d9643a348460380ec24744f9115b9eff5fe8cb594c88b626051d707f99a40da72c755e8aca0f331f49", 0xfffffffffffffc01}, 0x9) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000880)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) r1 = openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f00000008c0)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) r2 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000900)='/dev/sysname\x00', 0xd, 0x3, 0x0) r3 = proc_create(&(0x7f0000000940)='./file0\x00', 0x8, &(0x7f0000000980)='\x00', 0x1, 0x1) notify(r3, 0x5, &(0x7f0000000a40)={0x32, 0x3, 0x9, &(0x7f00000009c0)="f4f12d028b5312cf84dac4d01d382eaf83b5d8bc76bb444e36801df06ad3a031adab7ac782a6ac4af18743dc441174d278112ae2819e0996a5d4a78e7f902728fa8c5b8d7b5aab6bd9f39f64fcd9eb62", 0x6}) r4 = openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000a80)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) send_event(&(0x7f0000000b40)={&(0x7f0000000ac0)="e180bfa0cf0adaf83058fdf434750888b859934e536d4e5493d4ca95212cb8204effbbc18b64f24c3bdd8de8476e1ce20bab65f02c24c403f0a27d85f66e7087348ea9291db48389566287661525a224", 0xf1, 0x0, 0x6, 0x4, 0x8}, &(0x7f0000000bc0)={0x1b, 0xb3a9, 0x1, &(0x7f0000000b80)="961403273308edc5abe195ee2e7ee8fa537519dd7c64d72a965d83b9", 0xff}, 0x5) proc_destroy(r3, 0x100000001) r5 = openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000c00)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) nmount(r0, &(0x7f0000000c40)='./file0\x00', 0x8, 0x11) r6 = openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000c80)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000cc0)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000d00)='/dev/capuse\x00', 0xc, 0x3, 0x0) r7 = openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000d40)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000d80)='/dev/kprint\x00', 0xc, 0x1, 0x0) dup_fds_to(0xffffffffffffffff, &(0x7f0000000dc0)=[{r4}, {r5}, {r5}, {r7}, {r6}, {r1}, {r2}, {r6}, {r6}], 0x9) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000e40)='/dev/capuse\x00', 0xc, 0x3, 0x0) 18:22:13 executing program 3: openat$dev_config(0xffffffffffffff9c, &(0x7f0000000000)='/dev/config\x00', 0xc, 0x1, 0x0) r0 = proc_create(&(0x7f0000000040)='./file0\x00', 0x8, &(0x7f0000000080)='/dev/config\x00', 0xc, 0x0) poke_ksched(r0, 0x0) r1 = openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) r2 = openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000100)='/net/ether0/0/stats\x00', 0x14, 0x1, 0x0) tap_fds(&(0x7f0000000200)=[{r1, 0x2, 0x20, 0xcf3d, &(0x7f00000001c0)={&(0x7f0000000140)="8ac346c6d17d651c3d421a2443dc612d9241a4fa42b1703210a000999a81675b71eb20a1f2b721ffddd5ba9e23bea5ec719bbb71125195e5a63ebfb28434c93933304adaf40762ba04ac0e7ddfd3166a", 0x6, 0x1, 0x7, 0x0, 0xffffffff}}], 0x1) openat$dev_time(0xffffffffffffff9c, &(0x7f0000000240)='/dev/time\x00', 0xa, 0x3, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000280)='/prof/kptrace\x00', 0xe, 0x3, 0x0) r3 = openat$net_iprouter(0xffffffffffffff9c, &(0x7f00000002c0)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_add_gpcs(0x5, &(0x7f0000001540)={&(0x7f0000000300)="21664b108827e074b08008e35bfeee7bf9a5e6140bef04a06dc06172928e6f119540f64c8f6efb2f5ecd253df2b500fb2a8e2d147ca5098311968b8af36551", &(0x7f0000000340)="41a8e25d804a97cd02402edae3792a2d8204d40c34dc5cbb199ed382d26f881fe3418b9b8b480668b955fccca0899f1628aae26527ecd35bc8a8e63b1cce467272e673bee5977b9df9782b87bf0770bfb76f3bf0ee8450bd6ba6873589ea84365a05c4794f671fe8ce96ad704be2058789a0ad50c58e", &(0x7f00000003c0)="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", &(0x7f00000013c0)="072b1ee9171f8ed0fcc845226439508c8230a274635b0ed195077566b4ba1a9069587fe331f108d020bfe827fb84a074ed11e1ea6391d3942d0c4604e52269926d11db1c93288c1b1f5e31eba192225063b86933abd65d3c79b0a58cd3c33c49a6f4260195a1", &(0x7f0000001440)="ba02d4c5773e8581d37a8349d18be49f56999c2364512e6e32bc5c1859ede222273bd995f199ab78e1ee81a31fa809851365b193caba2639a44dc665c2295895bb06252a481c7f9182d8e8848c8e6fbe29ad80b5222a73595e50b81aba8f327dd5155741dc54eca87d07df49fed30f4a70e640f11dffc2f4369b415b0b9a9f3d91c1167f6d879a65a71599d4cb5033c340c429f627dffb22b2aeeddb76d1b43441679a93e23eeddbc535e8ae93f03252c2811b652e65ccfd303a515611d2f01b45652c5d230f74bf77e5f026261c"}) provision(r0, 0x0, 0x8a) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1000000, 0x9812, r2, 0x3) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000001580)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) write(r3, &(0x7f00000015c0)="31e34aaae8975c29461bf16ea7a3f9341ab87e", 0x13) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000001600)='/net/iprouter\x00', 0xe, 0x3, 0x0) fchdir(r0, r2) r4 = openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000001640)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000001680)='/dev/capuse\x00', 0xc, 0x3, 0x0) r5 = openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f00000016c0)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) r6 = fcntl$F_DUPFD(r4, 0x0, r5, 0x1) poke_ksched(r0, 0x0) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000001700)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) close(r6) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000001740)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000001780)='/dev/drivers\x00', 0xd, 0x1, 0x0) fcntl$F_GETFL(r5, 0x3) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000017c0)='/dev/pid\x00', 0x9, 0x1, 0x0) llseek(r6, 0x5, 0x10001, &(0x7f0000001800), 0x2) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000001840)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000001880)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) 18:22:13 executing program 7: r0 = openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) poke_ksched(0xffffffffffffffff, 0x0) r1 = openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) r2 = proc_create(&(0x7f0000000080)='./file0\x00', 0x8, &(0x7f00000000c0)='\\\x00', 0x2, 0x0) poke_ksched(r2, 0x0) poke_ksched(r2, 0x0) openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipselftab\x00', 0xf, 0x1, 0x0) r3 = openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) abort_sysc_fd(r1) openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) proc_run(r2) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) r4 = openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) abort_sysc_fd(r4) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) readlink(&(0x7f0000000300)='./file0\x00', 0x8, &(0x7f0000000340)=""/222, 0xde) fcntl$F_GETFD(r0, 0x1) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) mkdir(&(0x7f0000000480)='./file0\x00', 0x8, 0x1) proc_create(&(0x7f00000004c0)='./file0\x00', 0x8, &(0x7f0000000500)='(\xc8)\xee\x00', 0x5, 0x1) getvcoreid() read(r4, &(0x7f0000000540)=""/183, 0xb7) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/random\x00', 0xc, 0x1, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) read(r1, &(0x7f00000006c0)=""/4096, 0x1000) tcgetattr(r3, &(0x7f00000016c0)) readlink(&(0x7f0000001700)='./file0\x00', 0x8, &(0x7f0000001740)=""/14, 0xe) bash-4.3$ Which cores are provisioned to which procs: -------------- Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 02, prov: 0(0x0000000000000000) alloc: 35(0xffff80000218b900) Core 03, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Which cores are provisioned to which procs: -------------- Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 02, prov: 0(0x0000000000000000) alloc: 35(0xffff80000218b900) Core 03, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) 18:22:15 executing program 0: mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kprint\x00', 0xe40f84dd, 0x1, 0x0) r0 = openat$proc_self_status(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/status\x00', 0xfffffffffffffdcc, 0x1, 0x0) fd2path(r0, &(0x7f00000000c0)=""/214, 0xd6) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) 18:22:15 executing program 0: r0 = openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0xd, 0x1, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0xd, 0x1, 0x0) r1 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ppid\x00', 0xa, 0x1, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000100)='/net/cs\x00', 0x8, 0x3, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000140)='/dev/drivers\x00', 0xd, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) fcntl$F_GETFL(r1, 0x3) r2 = openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000280)='/dev/random\x00', 0xc, 0x1, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f00000002c0)='/net/iproute\x00', 0xd, 0x3, 0x0) llseek(r2, 0x1, 0x2, &(0x7f0000000300), 0x2) r3 = openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/wait\x00', 0x10, 0x1, 0x0) llseek(r0, 0x7, 0x8000, &(0x7f0000000380), 0x2) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/proc\x00', 0x10, 0x1, 0x0) fcntl$F_GETFD(r3, 0x1) r4 = proc_create(&(0x7f0000000580)='./file0\x00', 0x8, &(0x7f00000005c0)='/net/cs\x00', 0x8, 0x1) dup_fds_to(r4, &(0x7f0000000600)=[{r1}], 0x1) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000640)='/prof/mpstat\x00', 0xd, 0x3, 0x0) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000680)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f00000006c0)='/net/cs\x00', 0x8, 0x3, 0x0) tcgetattr(r3, &(0x7f0000000700)) 18:22:15 executing program 0: openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000080)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/maps\x00', 0x344, 0x1, 0x0) r0 = openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000000)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000180)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) fcntl$F_GETFD(r0, 0x1) 18:22:15 executing program 0: openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000040)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) r0 = openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) r1 = openat$proc_self_wait(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bintime\x00', 0xd, 0x3, 0x0) r2 = openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) vc_entry() openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000200)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$net_ipifc_1_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/ipifc/1/err\x00', 0x11, 0x3, 0x0) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) r3 = openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000300)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000340)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/maps\x00', 0x10, 0x1, 0x0) r4 = openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000540)='/prof/kpdata\x00', 0xd, 0x3, 0x0) tap_fds(&(0x7f0000000700)=[{r3, 0x2, 0x2, 0x0, &(0x7f0000000440)={&(0x7f00000003c0)="a4a328814747b1f7f478e183695af5108471f00a60ccb526fef4868531b36a29303717e2e277de0bf7e7d6109f12bc81dc081fa246e2b101b012db8eb46c15731291f40df87cbf40ec29f10dd4428ce1", 0x1ff, 0x0, 0xffc0000000000000, 0xf3e, 0x7}}, {r1, 0x2, 0x428, 0x3, &(0x7f0000000500)={&(0x7f0000000480)="21b2a7b85f79323aec323b0161b92b14b79e4a6610a1e56b07065167f1e007a893ec0a6d2dc43114cb01f26f9ddd315f491426a8847c497db0e0a8ed08a7691d11004c360c8bd36478e3477ba5286445", 0x5e0, 0x0, 0x80000001, 0x1ff, 0x794e}}, {r4, 0x1, 0x2, 0x8a1, &(0x7f0000000600)={&(0x7f0000000580)="9c982d36d640b5d1ef39edf0952742990b18bfa44f5aeb3a135e6ac80f4768d9a86c1b9732a863994600fccdcf3368a1a4f89a334077643013c90a6f3f65dc90e5fea9a345ca1cc5bac89386f3e67ca2", 0x5, 0x0, 0x5, 0x1, 0x7}}, {r2, 0x3, 0x2, 0x7, &(0x7f00000006c0)={&(0x7f0000000640)="76964729afd55e5dadf155f59fae2c64591c3d180b80389d1b8eba4ddddc836ca5af298330ed90e1689523eaa8c21fe3867526b0d3cbe99f5e0410aef7f9f9feca0e0bef14a58eb04c5b4435aee1fb10", 0x100, 0x0, 0x6, 0x8, 0x1000}}], 0x4) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000780)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f00000007c0)='/net/iproute\x00', 0xd, 0x3, 0x0) write(r0, &(0x7f0000000800)="7b6a37b4921ff8265eaaa67cfe6fb8935000027ab1d27d9483f0ca031c6201d2e7f8bfc2de1145af4df7ad5bd698448afba61514f4aa635aa27d7935f7493bca3ad686e55183b9deb496ed41abba2a4603a033a8e873bbfb43a13189a1d1258c12cebcaf4174095d4072b35d524c915700de0cd6f89e", 0x76) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000880)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f00000008c0)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000900)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000940)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000980)='/dev/sysstat\x00', 0xd, 0x3, 0x0) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f00000009c0)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f0000000a00)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000a40)='/prof/mpstat\x00', 0xd, 0x3, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000a80)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) 18:22:15 executing program 0: r0 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000040)='/dev/urandom\x00', 0xd, 0x1, 0x0) write(r0, &(0x7f00000000c0), 0x0) llseek(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000100)='/net/cs\x00', 0x8, 0x3, 0x0) fcntl$F_GETFD(0xffffffffffffffff, 0x1) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/drivers\x00', 0xd, 0x1, 0x0) Unhandled user trap in vcore context from VC 1 HW TRAP frame (partial) at 0xffffffffc8e380e0 on core 2 rax 0x000000005a5a4e80 rbx 0x000030000001ae90 rcx 0x0000000000000150 rdx 0x000010000000a4c0 rbp 0x000030000001ae80 rsi 0x000010000000a5c0 rdi 0x000000005a5a4f80 r8 0x000000005a5a5a5a r9 0x000000005a5a4e80 r10 0x0000000000000000 r11 0x0000000000000200 r12 0x0000000000410050 r13 0x000010000000a4c0 r14 0x0000000000000004 r15 0x00007f7fffa01f40 trap 0x0000000e Page Fault gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000006 rip 0x000000000040fe36 cs 0x------------0023 flag 0x0000000000010202 rsp 0x000030000001ad80 ss 0x------------001b err 0x6 (for PFs: User 4, Wr 2, Rd 1), aux 0x000000005a5a4f80 Addr 0x000000000040fe36 is in syz-executor at offset 0x000000000000fe36 VM Regions for proc 43 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b6000): 0x00000005, 0x00000001, 0xffff8000050e1220, 0x0000000000000000 01: (0x00000000004b6000 - 0x00000000004b7000): 0x00000005, 0x00000002, 0xffff8000050e1220, 0x00000000000b6000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff8000050e1220, 0x00000000000b6000 03: (0x00000000006b9000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff8000050e1220, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000003d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 2: Offsets only matter for shared libraries #01 Addr 0x000000000040fe36 is in syz-executor at offset 0x000000000000fe36 18:22:20 executing program 2: r0 = openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) tcgetattr(r0, &(0x7f00000000c0)) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/profile\x00', 0x13, 0x1, 0x0) llseek(r0, 0x8, 0x1ff, &(0x7f0000000100), 0x4) 18:22:20 executing program 0: openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000000)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) r0 = openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000040)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000140)='/prof/kptrace\x00', 0xe, 0x3, 0x0) r1 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) r2 = openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000240)='/dev/kprint\x00', 0xc, 0x1, 0x0) r3 = openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000280)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) r4 = proc_create(&(0x7f0000000300)='./file0\x00', 0x8, &(0x7f0000000340)='\x00', 0x1, 0x1) waitpid(r4, &(0x7f0000000380), 0x2) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) fcntl$F_DUPFD(r3, 0x0, r1, 0x1) waitpid(r4, &(0x7f0000000400), 0x2) fcntl$F_SETFD(r1, 0x2, 0x1) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000440)='/net/cs\x00', 0x8, 0x3, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000480)='/dev/stderr\x00', 0xc, 0x3, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000500)='/net/udp/clone\x00', 0xf, 0x3, 0x0) fd2path(r2, &(0x7f0000000540)=""/151, 0x97) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) proc_destroy(r4, 0x1) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) tcgetattr(r0, &(0x7f0000000680)) openat$dev_stderr(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/stderr\x00', 0xc, 0x3, 0x0) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000700)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000740)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) #02 Addr 0x000000000041025e is in syz-executor at offset 0x000000000001025e #03 Addr 0x000000000041580d is in syz-executor at offset 0x000000000001580d #04 Addr 0x00000000004080fb is in syz-executor at offset 0x00000000000080fb #05 Addr 0x0000000000414c60 is in syz-executor at offset 0x0000000000014c60 #06 Addr 0x000000000040862a is in syz-executor at offset 0x000000000000862a #07 Addr 0x0000000000404019 is in syz-executor at offset 0x0000000000004019 #08 Addr 0x000000000041498c is in syz-executor at offset 0x000000000001498c #09 Addr 0x0000000000414991 is in syz-executor at offset 0x0000000000014991 18:22:21 executing program 2: r0 = openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) fchdir(0x0, r0) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000080)='/dev/stderr\x00', 0xc, 0x3, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000100)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) r1 = openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000200)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000380)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000400)='/dev/null\x00', 0xa, 0x1, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000440)='/dev/kmesg\x00', 0xb, 0x1, 0x0) fcntl$F_GETFD(r1, 0x1) openat$net_arp(0xffffffffffffff9c, &(0x7f0000000480)='/net/arp\x00', 0x9, 0x3, 0x0) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f00000004c0)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000540)='/dev/swap\x00', 0xa, 0x3, 0x0) cache_invalidate() openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000580)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/wait\x00', 0x10, 0x1, 0x0) 18:22:21 executing program 2: openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000000)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) 18:22:21 executing program 4: r0 = openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) fcntl$F_SETFL(r0, 0x4, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/note\x00', 0x10, 0x1, 0x0) 18:22:21 executing program 1: openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) r0 = openat$dev_osversion(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat(r0, &(0x7f0000000440)='./file0\x00', 0x8, 0x840, 0x0) Which cores are provisioned to which procs: 18:22:22 executing program 6: openat$dev_random(0xffffffffffffff9c, &(0x7f0000000000)='/dev/random\x00', 0xc, 0x1, 0x0) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/2/err\x00', 0x8, 0x3, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) -------------- Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 02, prov: 0(0x0000000000000000) alloc: 73(0xffff8000160eba00) Core 03, prov: 0(0x0000000000000000) alloc: 70(0xffff800002175f00) kernel panic at kern/arch/x86/trap.c:318, from core 2: Proc-ful Page Fault in the Kernel at 0x000000000000001b! HW TRAP frame at 0xfffffff0000acd30 on core 2 rax 0x0000000000000000 rbx 0xffff800003f024e0 rcx 0xfffffff0000acea0 rdx 0x000000000000000a rbp 0xfffffff0000ace38 rsi 0x0000000000000000 rdi 0xfffffff0000acea0 r8 0x0000000000000001 r9 0xffffffffc8f655c0 r10 0x0000000000000030 r11 0xffff8000061b0c20 r12 0xffff8000160eba00 r13 0x0000000020000300 r14 0x0000000000000073 r15 0x00000000000000de trap 0x0000000e Page Fault gsbs 0xffffffffc8e38080 fsbs 0x0000000000000000 err 0x--------00000000 rip 0xffffffffc20587f4 cs 0x------------0008 flag 0x0000000000010246 rsp 0xfffffff0000acdf8 ss 0x------------0010 Backtrace of kernel context on Core 2: #01 [<0xffffffffc20587f4>] in sys_readlink #02 [<0xffffffffc2059ea9>] in syscall #03 [<0xffffffffc205aa58>] in run_local_syscall #04 [<0xffffffffc205af99>] in prep_syscalls #05 [<0xffffffffc20ac882>] in sysenter_callwrapper Which cores are provisioned to which procs: -------------- Core 00, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 01, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 02, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Core 03, prov: 0(0x0000000000000000) alloc: 0(0x0000000000000000) Entering Nanwan's Dungeon on Core 2 (Ints off): Type 'help' for a list of commands.