2018/07/27 01:20:11 fuzzer started 2018/07/27 01:20:11 dialing manager at 127.0.0.1:45199 2018/07/27 01:20:11 syscalls: 213 2018/07/27 01:20:11 code coverage: support is not implemented in syzkaller 2018/07/27 01:20:11 comparison tracing: support is not implemented in syzkaller 2018/07/27 01:20:11 setuid sandbox: support is not implemented in syzkaller 2018/07/27 01:20:11 namespace sandbox: support is not implemented in syzkaller 2018/07/27 01:20:11 fault injection: support is not implemented in syzkaller 2018/07/27 01:20:11 leak checking: support is not implemented in syzkaller 2018/07/27 01:20:11 net packed injection: support is not implemented in syzkaller 2018/07/27 01:20:11 net device setup: support is not implemented in syzkaller 01:20:11 executing program 0: r0 = openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) r1 = openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cputime\x00', 0xd, 0x1, 0x0) r2 = openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) r3 = openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) r4 = openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) r5 = openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) r6 = openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) r7 = openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) r8 = fcntl$F_DUPFD(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, 0x1) dup_fds_to(0x0, &(0x7f0000000200)=[{r0}, {r1}, {r2}, {r3}, {r4}, {r5}, {r6}, {r7}, {r8}], 0x9) openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ppid\x00', 0xa, 0x1, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/bintime\x00', 0xd, 0x3, 0x0) r9 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sysname\x00', 0xd, 0x3, 0x0) fstat(r9, &(0x7f0000000340)) fcntl$F_GETFD(r0, 0x1) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f00000003c0)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000400)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) r10 = openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000440)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000480)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) tap_fds(&(0x7f0000000640)=[{r3, 0x0, 0x1, 0x4, &(0x7f0000000540)={&(0x7f00000004c0)="d55c68269992788698f39af45b29acc78cffc5394647412244154c845437ac85b26cdc4e9d253c153b1cc5ee6e9307ac277912cab5d82be6d7dd4073c3e1b00749032f8e63a4aad21ea108a9fde4fcfb", 0x6, 0x0, 0x100000, 0x9, 0x5}}, {r10, 0x1, 0x22, 0x100000000000, &(0x7f0000000600)={&(0x7f0000000580)="c279b4fe520eeae92c52e2e153fcdfe248bd9001af845825167075e651d2b16e56453fa575be658d4ad2611d8300a74d7dc440bfc82f04d89c24a3dda70e0a2022f59ccef494ca3806166752c8fb2e74", 0x9, 0x0, 0x6, 0x100000000, 0x7}}], 0x2) openat$dev_time(0xffffffffffffff9c, &(0x7f0000000680)='/dev/time\x00', 0xa, 0x3, 0x0) fcntl$F_GETFL(r3, 0x3) fcntl$F_DUPFD(r10, 0x0, r6, 0x0) openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000700)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$dev_consctl(0xffffffffffffff9c, &(0x7f0000000780)='/dev/consctl\x00', 0xd, 0x3, 0x0) openat(r9, &(0x7f00000007c0)='./file0\x00', 0x8, 0x20000, 0x10) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000800)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000840)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) 01:20:11 executing program 1: change_vcore(0x101, 0x1) r0 = openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysstat\x00', 0xd, 0x3, 0x0) nmount(r0, &(0x7f0000000040)='./file0\x00', 0x8, 0x16) r1 = openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) getcwd(&(0x7f00000000c0)=""/116, 0x74) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) r2 = proc_create(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='\x00', 0x1, 0x0) fchdir(r2, r0) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000200)='/dev/random\x00', 0xc, 0x1, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000240)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000280)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) r3 = openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000340)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) tcgetattr(r1, &(0x7f00000003c0)) fcntl$F_GETFD(r3, 0x1) halt_core(0x3) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000440)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) r4 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000480)='/net/udp/clone\x00', 0xf, 0x3, 0x0) llseek(r4, 0xff, 0x7f, &(0x7f00000004c0), 0x3) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000500)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/core\x00', 0x10, 0x1, 0x0) halt_core(0x2000000000) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000600)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000640)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) symlink(&(0x7f0000000680)='./file0\x00', 0x8, &(0x7f00000006c0)='./file0/file0\x00', 0xe) 01:20:11 executing program 2: nunmount(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='./file0\x00', 0x8) pop_ctx(&(0x7f0000000080)="f5414cd437f8cac54277afde749e58eda7826b5285f22b020b3698922518b137c5e33045cfa09038fea603293329acf830fb8360b81239a6c2936a18c79428b5e6443a822b7928f1a19fbbe3d2a8339ec9f9c245fbac2bf349edefa01b3ea0c6ae80a89c57597b9ea53916c8faa29a7bf0768d3f97696cdc81264be47dec0a4d858221652eafebe980fd12b606d30e1e131e67c2ddab6650141df6bef8944a6fa6431f5963a4d6ac0cd6e3b77e5064a231b294dcacbb89db49b58b6908a7f0030f191b24a1f5b37e4e1c133e7881ef5e0e8dec1a5c9253d5") r0 = openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) fcntl$F_SETFL(r0, 0x4, 0x0) openat$dev_consctl(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/consctl\x00', 0xd, 0x3, 0x0) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) populate_va(&(0x7f0000ffb000/0x3000)=nil, 0x0) openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/net/udp/stats\x00', 0xf, 0x1, 0x0) readlink(&(0x7f0000000300)='./file0\x00', 0x8, &(0x7f0000000340)=""/120, 0x78) r1 = openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/segment\x00', 0x13, 0x1, 0x0) rename(&(0x7f0000000440)='./file1\x00', 0x8, &(0x7f0000000480)='./file0\x00', 0x8) exec(&(0x7f00000004c0)='./file1\x00', 0x8, &(0x7f0000000500)='/net/tcp/2/remote\x00', 0x12) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f0000000540)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000580)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) nunmount(&(0x7f00000005c0)='./file1\x00', 0x8, &(0x7f0000000600)='./file1\x00', 0x8) fcntl$F_SETFL(r1, 0x4, 0x800) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f0000000640)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000680)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) openat$dev_cputime(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000700)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000740)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000780)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) exec(&(0x7f00000007c0)='./file1\x00', 0x8, &(0x7f0000000800)='\x00', 0x1) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000840)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000880)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f00000008c0)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) fcntl$F_SETFL(r1, 0x4, 0x0) 01:20:11 executing program 3: r0 = openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000000)='/dev/swap\x00', 0xa, 0x3, 0x0) r1 = openat$dev_null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0xa, 0x1, 0x0) r2 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0xa, 0x1, 0x0) openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f0000000140)='/prof/kptrace\x00', 0xe, 0x3, 0x0) r3 = openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) tap_fds(&(0x7f00000005c0)=[{r2, 0x1, 0x121, 0x2, &(0x7f0000000280)={&(0x7f0000000200)="bfd9d3a2ef2e641c0604741bbcaed0a9a5ecb47599190b1410cf090b56f9d4555f222542b7d94e57dc6cacf45bd2a77ab8ba887cc75c77010eae83d41b821c21bd2846525dd690cd6c6685e14b3b342f", 0x7fff, 0x1, 0x49, 0x9, 0x7fffffff}}, {r0, 0x2, 0x2, 0xfe0000000000, &(0x7f0000000340)={&(0x7f00000002c0)="770793611fc3a149c914effd36c2c8bbb489bf91fafe7941d22bf5fe448ad4d2714a7ef42db08c425d24fc3f09eb8a3bf61859c9a6706ebb1df170942ebad25ed14e683393695482f85c6db5c99452a3", 0xffff, 0x0, 0x3, 0x5, 0x4}}, {r1, 0x2, 0x16c, 0x9, &(0x7f0000000400)={&(0x7f0000000380)="b86ef2e3d39c28f87fcb23a125fad86f5e46ef6a3e89d589573cd8e5e45b43cbacca30714123a617423758986e1c2d3c616c98eec58441a5a793824377012e9f0ed8b5842f4b1379ca9ea454ddf91f44", 0x2, 0x0, 0xb0, 0xfffffffffffff77f, 0x5}}, {r1, 0x3, 0x10, 0x100, &(0x7f00000004c0)={&(0x7f0000000440)="c923037ddf218551f5da82adf024dc5355c024ff63826199b66d2631356d8c362eb92e6dbeffc31288e30dbed373f3870ade2a68cece3040cba03e723d1c0360f802ab90b044ba4213e731d727ed0da6", 0x6, 0x0, 0x8, 0x8, 0x4f}}, {r3, 0x3, 0x81, 0x4, &(0x7f0000000580)={&(0x7f0000000500)="d36b01183d284c2f77f3d8779fdd281c2a4218d924dcbc56fcf6f0063c0ce5ddd7fd241f5fd0ef35fa560026150eb0a038bb95b388acb6d4d39a8214d47066eceb75ee4a0e7b34fc11d47431377f1f66", 0xfffffffffffffff7, 0x1, 0x3f, 0x4b059a10, 0x7687}}], 0x5) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/mem\x00', 0xf, 0x1, 0x0) r4 = openat$dev_swap(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) vmm_ctl$VMM_CTL_SET_EXITS(0x2, 0x1) r5 = proc_create(&(0x7f0000000740)='./file0\x00', 0x8, &(0x7f0000000780)='/dev/sysname\x00', 0xd, 0x1) dup_fds_to(r5, &(0x7f00000007c0)=[{r1}, {r3}, {r1}, {r4}], 0x4) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000800)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000840)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000880)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f00000008c0)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000900)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000940)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000980)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f00000009c0)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) r6 = openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000a00)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) read(r6, &(0x7f0000000a40)=""/28, 0x1c) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000a80)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/sysstat\x00', 0xd, 0x3, 0x0) read(r2, &(0x7f0000000b00)=""/105, 0x69) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/self/status\x00', 0x12, 0x1, 0x0) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000bc0)='/proc/self/user\x00', 0x10, 0x1, 0x0) 01:20:11 executing program 4: r0 = openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) llseek(r0, 0x1, 0x4, &(0x7f0000000040), 0x0) r1 = openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000080)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) r2 = openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sysctl\x00', 0xc, 0x3, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$dev_sysname(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) read(r1, &(0x7f0000000240)=""/174, 0xae) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000300)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000340)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000380)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) r3 = openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000440)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000480)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f0000000540)='/net/arp\x00', 0x9, 0x3, 0x0) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000580)='/prof/mpstat\x00', 0xd, 0x3, 0x0) nmount(r2, &(0x7f00000005c0)='./file0\x00', 0x8, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) write(r3, &(0x7f0000000640)="1cda5d1ce490d1db935189ed75bc1bd562ec3183444b861004262f8630b10a2dd33688f13cfd4b2f83e034d7fa96b67fb6d3ff29748d250cc82366", 0x3b) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000680)='/net/.empty\x00', 0xc, 0x3, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000700)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000740)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) 01:20:11 executing program 7: exec(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='[\x00', 0x2) exec(&(0x7f0000000080)='./file0\x00', 0x8, &(0x7f00000000c0)='[\x00', 0x2) exec(&(0x7f0000000100)='./file0\x00', 0x8, &(0x7f0000000140)='\x00', 0x1) lstat(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)) exec(&(0x7f0000000240)='./file0\x00', 0x8, &(0x7f0000000280)='[\x00', 0x2) lstat(&(0x7f00000002c0)='./file0\x00', 0x8, &(0x7f0000000300)) lstat(&(0x7f0000000380)='./file0\x00', 0x8, &(0x7f00000003c0)) r0 = openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000440)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) symlink(&(0x7f0000000480)='./file1\x00', 0x8, &(0x7f00000004c0)='./file0\x00', 0x8) mkdir(&(0x7f0000000500)='./file0/file0\x00', 0xe, 0x8) cache_invalidate() readlink(&(0x7f0000000540)='./file2\x00', 0x8, &(0x7f0000000580)=""/199, 0xc7) openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000680)='/dev/sysname\x00', 0xd, 0x3, 0x0) symlink(&(0x7f00000006c0)='./file2\x00', 0x8, &(0x7f0000000700)='./file0\x00', 0x8) mkdir(&(0x7f0000000740)='./file0/file0\x00', 0xe, 0x100) r1 = openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000780)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) r2 = openat$dev_stdin(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/stdin\x00', 0xb, 0x3, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2000004, 0x10010, r2, 0xa8a) abort_sysc(0x0) rename(&(0x7f0000000800)='./file0/file0\x00', 0xe, &(0x7f0000000840)='./file0/file0\x00', 0xe) abort_sysc(0x7) symlink(&(0x7f0000000880)='./file0\x00', 0x8, &(0x7f00000008c0)='./file1\x00', 0x8) change_vcore(0x10001, 0x1) fcntl$F_DUPFD(r0, 0x0, r1, 0x1) rename(&(0x7f0000000900)='./file2\x00', 0x8, &(0x7f0000000940)='./file2\x00', 0x8) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000980)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f00000009c0)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000a00)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000a40)='/net/ndb\x00', 0x9, 0x3, 0x0) rename(&(0x7f0000000a80)='./file0\x00', 0x8, &(0x7f0000000ac0)='./file1\x00', 0x8) 01:20:11 executing program 5: send_event(&(0x7f0000000080)={&(0x7f0000000000)="026d36aeb5efe9bb370e833df92999407def079a08a10840cc1a2dc6e65f5d7bae887be45dca784415bcd854e7d261c0fa1eba988f4a2861cd0b237f468f293cb3747addc15746571127a2c3f6a6988a", 0x3, 0x1, 0xffffffff, 0xb5b, 0xd03}, &(0x7f00000001c0)={0x5, 0x8000, 0x0, &(0x7f00000000c0)="2e9f797e4ff6adb4f8d5c0170be1b4525b2d8c7bc756dffcfa07260df61a52af66f5c3b799f682237bf721c9144c2d801861447a03a0b3a025f82d267856b86a9cbaf0bfd3b292e7a64c92d82d431933cee0b54b265cc938108fc8245de609515165a8fca814f9d5483b85c8abd45ea4c94680f8601b1de55fa3bc257e3718dd95c197d0bb0e566343d521795fe0469d23746e7e3c0a575770ea3f3409d23533bc041fc6a5bbe6acc3b69a68b18ae638cd293fd2b860f68fb6b7e2de7746754bf3a246c36343d8af67fa29492c2bb54cb62a", 0x1f}, 0x75) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000200)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) r0 = openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f00000002c0)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) r1 = openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) send_event(&(0x7f0000000400)={&(0x7f0000000380)="5c67e7249486606b7948f2bc88a8e3043c184c908ad2a6fdad9677a51e06503e8750fb72286c5bb951c91f9997777d72e2d32f455853fd3e435bd43a26b5d7a50a3ca0ae4af198e8fcabac96deeaa3ee", 0x9, 0x1, 0x400, 0x101, 0x6}, &(0x7f0000000480)={0x6, 0x81, 0x0, &(0x7f0000000440)="6ca1999fb152db54c80a65dde4b3e7578fd31bdfe8cc4b111891079f5ea62e80e411fca07c9b4ac49e51ae03d12ea91bc479e2f947628d53", 0x6}, 0x3ff) openat$dev_stdout(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/stdout\x00', 0xc, 0x3, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000500)='/dev/stderr\x00', 0xc, 0x3, 0x0) send_event(&(0x7f00000005c0)={&(0x7f0000000540)="b1e9007a9dec00c7bf4fcfa226bec6ea2bbe26c577e0ab9e30902e0a983d6cab59955920fc4e24600cc0fa2095b1c5aefb812a04ac7c893ff2bb4064cf02c6a3c23969836753b91c370642d4acfde16d", 0x3, 0x1, 0x4, 0x6, 0xd83}, &(0x7f0000000640)={0x7, 0xffffffff, 0xfffffffffffffffc, &(0x7f0000000600)="85cf56fcaad4cf45c703afeee691b52c4e87e39d43f938069ae46c42301c", 0x2}, 0x5) fcntl$F_GETFD(r0, 0x1) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000680)='/dev/hostowner\x00', 0xf, 0x3, 0x0) send_event(&(0x7f0000000740)={&(0x7f00000006c0)="75440943b5359e318484181d0a3215508cdee8d3975d564a485e78440186a6f90015d8a7355f59eb6cfeb13d8a35c5d6fce7eb80cbed604f4dddac449e41dbfe71c24f925a97456dbe568be3b86fc9e0", 0x6, 0x1, 0x6, 0x101, 0x2}, &(0x7f0000000800)={0x3, 0x3, 0x3, &(0x7f0000000780)="5a3fe6924d6d5ee60b3adcf74370bda29d1618519180f1f9b7ceb65dc0b09c4fe5ada2ec28859c2e544c20a25190928bd597fdd28b63dfbfe420bd89ceab339ea6844bfecc7543e5db7ea2d98dfc8824a31beb0f83d3cc21cb9abe5e848c13d1a30ac14c4f0e52708ff543a1db7522ee3f6017d60a263b8dba012c8f", 0x9}, 0x0) r2 = openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000840)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000880)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) r3 = proc_create(&(0x7f00000008c0)='./file0\x00', 0x8, &(0x7f0000000900)='}\x00', 0x2, 0x1) notify(r3, 0x3b, &(0x7f00000009c0)={0x0, 0x1, 0xc8, &(0x7f0000000940)="e380cc1f999d06501791043f4a17f5f49d60f68555e4d56ab6594af8b5c4c5ea89e15a98eb12e15518a9708bd5596fc22f41082bf86b32f889151bc123cb394439f3febda128211a"}) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000a40)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_status(0xffffffffffffff9c, &(0x7f0000000a80)='/net/tcp/0/status\x00', 0x12, 0x1, 0x0) fcntl$F_DUPFD(r1, 0x0, r1, 0x1) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000ac0)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) fcntl$F_GETFD(r2, 0x1) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000b00)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) r4 = openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000b40)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000b80)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000bc0)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000c00)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) fd2path(r4, &(0x7f0000000c40)=""/164, 0xa4) 01:20:11 executing program 6: r0 = openat$dev_cons(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cons\x00', 0xa, 0x3, 0x0) r1 = openat$dev_user(0xffffffffffffff9c, &(0x7f0000000040)='/dev/user\x00', 0xa, 0x3, 0x0) llseek(r1, 0x3, 0x17, &(0x7f0000000080), 0x2) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) write(r0, &(0x7f0000000100)="2b2b4ba3453c092770146baf24ef2c32922c1148629aee12616c00f0a869332a926a1f1cf9912e479090e3a8aa5b0add12b5af3fe5f5c075d53035a815176bc7d7002f92b496075e986562c41278f7ab978da3d72a64e4eb0ca504628485ed96e8154133248e4996c7428d7e2ff88a225e3830fe23", 0x75) r2 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$dev_sysname(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000280)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000300)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000340)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000440)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000480)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/null\x00', 0xa, 0x1, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000540)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) fchdir(0x0, r2) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000600)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/text\x00', 0x10, 0x1, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000680)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000700)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$dev_consctl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/consctl\x00', 0xd, 0x3, 0x0) 01:20:12 executing program 0: openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000140)='/net/ipifc/1/data\x00', 0xffffffffffffff69, 0x3, 0x0) openat$dev_time(0xffffffffffffff9c, &(0x7f0000000000)='/dev/time\x00', 0xa, 0x3, 0x0) 01:20:12 executing program 0: r0 = openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/notepg\x00', 0xfffffffffffffc56, 0x1, 0x0) fcntl$F_GETFL(r0, 0x3) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) 01:20:12 executing program 0: r0 = openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000300)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) fcntl$F_GETFD(r0, 0x1) 01:20:12 executing program 0: openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bintime\x00', 0xd, 0x3, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) r0 = openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000040)='/dev/klog\x00', 0xa0a93d84, 0x1, 0x0) abort_sysc_fd(r0) 01:20:12 executing program 0: r0 = openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/fd\x00', 0xe, 0x1, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000080)='/dev/swap\x00', 0xa, 0x3, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x3a, r0, 0x0) 01:20:12 executing program 0: r0 = openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) fcntl$F_SETFD(r0, 0x2, 0x1) r1 = openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) fcntl$F_GETFL(r1, 0x3) 01:20:12 executing program 0: r0 = openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/1/data\x00', 0xfd9b, 0x3, 0x0) fcntl$F_SETFL(r0, 0x4, 0x0) 01:20:12 executing program 0: r0 = openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000180)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3000001, 0x1036, r0, 0x0) openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipselftab\x00', 0xf, 0x1, 0x0) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000140)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000100)='/dev/drivers\x00', 0xd, 0x1, 0x0) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f00000000c0)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bintime\x00', 0xd, 0x3, 0x0) 01:20:12 executing program 0: r0 = openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) mmap(&(0x7f0000002000/0x2000)=nil, 0x2000, 0x1000004, 0x2813, r0, 0x0) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/user\x00', 0x10, 0x1, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) 01:20:13 executing program 0: change_to_m() r0 = openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000040)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) r1 = openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000080)='/prof/kpdata\x00', 0xd, 0x3, 0x0) r2 = openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f00000000c0)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) r3 = openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/status\x00', 0x12, 0x1, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000140)='/prof/kpdata\x00', 0xd, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1000000, 0x10010, r2, 0xffff) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000180)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f00000001c0)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) nmount(r3, &(0x7f0000000200)='./file0\x00', 0x8, 0x1) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/proc\x00', 0x10, 0x1, 0x0) read(r0, &(0x7f00000002c0)=""/163, 0xa3) r4 = openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000380)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) read(r1, &(0x7f0000000400)=""/76, 0x4c) tap_fds(&(0x7f0000000600)=[{r4, 0x3, 0x18c, 0x101, &(0x7f0000000500)={&(0x7f0000000480)="86b060a51e08230205e51da404276f50acd9176d84fd5e85bc7bc72719290784a67e1590e9245b7ff6b1e518a567c6701ca61212b08c350f1dde1d94b64b316c23a3b24799294303cc8ef24f3a5537da", 0x3, 0x0, 0x8, 0x6, 0x401}}, {r2, 0x3, 0x0, 0x4de0, &(0x7f00000005c0)={&(0x7f0000000540)="37e0baf34aaef7e824a116966fd741ebc07a2cb79cccb291128efd62539a07df69e8fad3df7a60ca189bbfcf6dbf90da217d363e0d1452d0b6c217bd9c1ebe719f50ebef1b09f40d4f6b2f3ceb8123c6", 0xffff, 0x1, 0x9, 0x8}}], 0x2) fstat(r1, &(0x7f0000000640)) openat$dev_cons(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/cons\x00', 0xa, 0x3, 0x0) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000740)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000780)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000800)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000840)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f0000000880)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f00000008c0)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000900)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000940)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) bash-4.3$ Unhandled user trap in vcore context from VC 0 HW TRAP frame (partial) at 0xffffffffc8667f20 on core 2 rax 0x000000005a5a4e80 rbx 0x0000300000006e90 rcx 0x0000000000000150 rdx 0x000010000000a4c0 rbp 0x0000300000006e80 rsi 0x000010000000a5c0 rdi 0x000000005a5a4f80 r8 0x000000005a5a5a5a r9 0x000000005a5a4e80 r10 0x0000000000000000 r11 0x0000000000000200 r12 0x000000000040fe20 r13 0x000010000000a4c0 r14 0x0000000000000004 r15 0x00007f7fffa01200 trap 0x0000000e Page Fault gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000006 rip 0x000000000040fc06 cs 0x------------0023 flag 0x0000000000010202 rsp 0x0000300000006d80 ss 0x------------001b err 0x6 (for PFs: User 4, Wr 2, Rd 1), aux 0x000000005a5a4f80 Addr 0x000000000040fc06 is in syz-executor at offset 0x000000000000fc06 VM Regions for proc 53 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b5000): 0x00000005, 0x00000001, 0xffff80000595ac20, 0x0000000000000000 01: (0x00000000004b5000 - 0x00000000004b6000): 0x00000005, 0x00000002, 0xffff80000595ac20, 0x00000000000b5000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff80000595ac20, 0x00000000000b6000 01:20:19 executing program 1: r0 = openat$dev_kmesg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kmesg\x00', 0xb, 0x1, 0x0) r1 = openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000140)='/net/.empty\x00', 0xc, 0x3, 0x0) openat(r0, &(0x7f00000001c0)='./file0\x00', 0x8, 0x80000000000055, 0x10) r2 = fcntl$F_DUPFD(r0, 0x0, r1, 0x4) llseek(r2, 0x0, 0x0, &(0x7f0000000000), 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000100)='/dev/stdin\x00', 0xb, 0x3, 0x0) 03: (0x00000000006b9000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff80000595ac20, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000003d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 2: Offsets only matter for shared libraries #01 Addr 0x000000000040fc06 is in syz-executor at offset 0x000000000000fc06 #02 Addr 0x000000000041002e is in syz-executor at offset 0x000000000001002e #03 Addr 0x00000000004155dd is in syz-executor at offset 0x00000000000155dd #04 Addr 0x0000000000407ecb is in syz-executor at offset 0x0000000000007ecb #05 Addr 0x0000000000414a30 is in syz-executor at offset 0x0000000000014a30 #06 Addr 0x00000000004083fa is in syz-executor at offset 0x00000000000083fa #07 Addr 0x0000000000403de9 is in syz-executor at offset 0x0000000000003de9 #08 Addr 0x000000000041475c is in syz-executor at offset 0x000000000001475c #09 Addr 0x0000000000414761 is in syz-executor at offset 0x0000000000014761 01:20:24 executing program 0: r0 = openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) read(r0, &(0x7f0000000040)=""/122, 0x7a) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000600)='/dev/sysname\x00', 0xfffffffffffffef8, 0x3, 0x0) openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000500)='/dev/sysctl\x00', 0xc, 0x3, 0x0) r1 = openat$prof_kpdata(0xffffffffffffff9c, &(0x7f00000001c0)='/prof/kpdata\x00', 0xd, 0x3, 0x0) r2 = openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000200)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) r3 = openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000280)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000300)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) halt_core(0x3) abort_sysc_fd(r2) close(r3) nmount(r1, &(0x7f0000000340)='./file0\x00', 0x8, 0x1) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$dev_zero(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/zero\x00', 0xa, 0x1, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) fcntl$F_GETFD(r2, 0x1) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000440)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000480)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f00000004c0)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) kernel panic at kern/arch/x86/trap.c:312, from core 1: Proc-ful Page Fault in th+e+ Kernel at 0x000K£0E< 'pk¯$ï,2’,Hbšîalð¨i3*’jù‘00000000001b!.G㨪[ ÝHW TRAP frame at 0xfffffff0000a3d30 on core 1  rax 0x0000000000000000 µ¯?åõÀuÕ rbx 0x05¨kÇ×/ff’´–^˜ebÄx÷«—£×*ff8000069b4820 d rcx ä0xfffë ffff0000a3ea0 ¥ rdx 0xfffffff0000a3d6c  b „r…bp 0xfffffff0000ía3–e38 è rA3$ŽI–Çsi 0x000000B00000~00000 /øŠ"^ rdi 0xfffffff800þ#000a3ea0 r8 0x0000000000000001 r9 0xffffffffc8790880 r10 0x0000000000000030 r11 0xffff800015799ea0 r12 0xffff800015b18b80 r13 0x0000000020000540 r14 0x0000000000000073 r15 0x00000000000000c7 trap 0x0000000e Page Fault gsbs 0xffffffffc8667c40 fsbs 0x0000000000000000 err 0x--------00000000 rip 0xffffffffc20583f4 cs 0x------------0008 flag 0x0000000000010246 rsp 0xfffffff0000a3df8 ss 0x------------0010 Backtrace of kernel context on Core 1: #01 [<0xffffffffc20583f4>] in sys_readlink #02 [<0xffffffffc2059409>] in syscall #03 [<0xffffffffc20595d4>] in run_local_syscall #04 [<0xffffffffc2059b09>] in prep_syscalls #05 [<0xffffffffc20ab36a>] in sysenter_callwrapper [kernel] Vcoreid -1 unsafe! (too big?) Entering Nanwan's Dungeon on Core 1 (Ints off): Type 'help' for a list of commands.