2018/07/16 20:58:28 fuzzer started 2018/07/16 20:58:29 dialing manager at 127.0.0.1:33665 2018/07/16 20:58:29 syscalls: 213 2018/07/16 20:58:29 code coverage: support is not implemented in syzkaller 2018/07/16 20:58:29 comparison tracing: support is not implemented in syzkaller 2018/07/16 20:58:29 setuid sandbox: support is not implemented in syzkaller 2018/07/16 20:58:29 namespace sandbox: support is not implemented in syzkaller 2018/07/16 20:58:29 fault injection: support is not implemented in syzkaller 2018/07/16 20:58:29 leak checking: support is not implemented in syzkaller 2018/07/16 20:58:29 net packed injection: support is not implemented in syzkaller 2018/07/16 20:58:29 net device setup: support is not implemented in syzkaller 20:58:29 executing program 2: openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0xffffffffffffff00) r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0x6) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) vmm_add_gpcs(0x1, &(0x7f00000005c0)={&(0x7f0000000300)="7c2e3e2966261261099b25a405a544e3eb8f169c5870d1e59826acd1387f560ef456f3050cc5ff0e4f7b6c5385ef1c95bbae12fe601a6b3a639d2155a16985abb7074a4a23c7fdee1cab3a3f8455a67d28bf2ed414b01021f91fd7d157329fded0959cbf3ff4aa77c74eaca8c278d8dae630a049ac69cc8603fb524c57e6ccc6cbf896c488ea4de0ca918efb6893bd16e2f7b855d98fc97ea0e64b874621cab893b6c79f6ff81a5dede88f5d3e4a5b2997cb6e28395c8bb3670fb8991e7458234eead63dd0b4618164381c47d10487fe9bf1f9f2f848f7", &(0x7f0000000400)="772ee4869736928cd6aa542d50d77d0096d6e393baae54ca8c69cbaf2f", &(0x7f0000000440)="77277cebb77b972c602e2dba9ec82b656d0a86e1369454cda11bfeb8b46417835eb4e37578faca84392918bce990d25461bcbbff008820e140519c6393cfa993c86257b3e95b58e8e4bc0cf236ddef230009f7859e288c39dee08bdf8442abaf8586b991c56935332da8", &(0x7f00000004c0)="a8f95709776cf3d7bf919ed13483e47ed40812ed4a793f5eb4c2a5e32b", &(0x7f0000000500)="02513e7585b3348d0e4d2c4877642d13c16b35c1d7888fb2b198ed6fe731e05c7dd11003ce86020fb98d5a9cd9e9d3e611438b741680ba5c0be8e79e8b31fc7332c5c710d8b2aa9bfdcc733871777344b742443a7a27ad94fbb290bd24f5555725321563bbb5cc8fb86351790d2313fa37c4ac2055bff2c7c607b7395e860d9998994e"}) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) populate_va(&(0x7f0000ffc000/0x1000)=nil, 0x7) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) poke_ksched(0x0, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f00000007c0)='/net/arp\x00', 0x9, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000840)='/dev/drivers\x00', 0xd, 0x1, 0x0) abort_sysc_fd(r1) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000880)='/net/.empty\x00', 0xc, 0x3, 0x0) 20:58:29 executing program 0: openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) r0 = openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000040)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) fcntl$F_GETFL(r0, 0x3) openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipselftab\x00', 0xf, 0x1, 0x0) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000140)='/net/ndb\x00', 0x9, 0x3, 0x0) r1 = openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f00000001c0)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) read(r1, &(0x7f0000000200)=""/111, 0x6f) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000300)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/maps\x00', 0x10, 0x1, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/mem\x00', 0xf, 0x1, 0x0) openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000440)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000480)='/dev/osversion\x00', 0xf, 0x1, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000540)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000580)='/dev/drivers\x00', 0xd, 0x1, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f00000005c0)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$dev_user(0xffffffffffffff9c, &(0x7f0000000640)='/dev/user\x00', 0xa, 0x3, 0x0) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000680)='/prof/mpstat\x00', 0xd, 0x3, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) 20:58:29 executing program 1: exec(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)="2b042a2400", 0x5) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000080)='/prof/kpctl\x00', 0xc, 0x3, 0x0) exec(&(0x7f00000000c0)='./file0\x00', 0x8, &(0x7f0000000100)='/prof/kpctl\x00', 0xc) r0 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) r1 = openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000180)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) r2 = openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) r3 = openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) r4 = openat(r0, &(0x7f0000000240)='./file0\x00', 0x8, 0x80, 0x100) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000280)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) tap_fds(&(0x7f0000000840)=[{r3, 0x1, 0x100, 0x6, &(0x7f0000000380)={&(0x7f0000000300)="14c6b11994e34eb34109ae6a441de5801621629f30eeaf6075bdde9f3e4a12563329b78c39805d692c7835ec34498504018074ae0b5bbab8003af1f435c0a3dc1a1b1bb754c15a35f0b4c9ae1bfef878", 0x3, 0x0, 0x15f, 0x1, 0x3}}, {r3, 0x3, 0x0, 0x200, &(0x7f0000000440)={&(0x7f00000003c0)="0915e73f59a26d5c70ee8631482ebed92e370e67e1cd28b903234aa3215a5e470fb38164f8ab26532d82bba05b351cfed2d31ccf6284a27a1718dc6f2e4074b60986c15a07393e80616c8e54912df004", 0x1000, 0x0, 0x1, 0x0, 0x1}}, {r2, 0x3, 0xa0, 0x1f, &(0x7f0000000500)={&(0x7f0000000480)="1a47627bc04fed23c10f0d2802f280886912fc46306fe0737877dab281c04a5bb566ea9e99b3a37345dd8cd910f156ead3f2deaaede65016ab9692233838f6fc6991cd52de04ff7d26220bf264942c91", 0x4, 0x0, 0x3ad, 0x200, 0x9}}, {r2, 0x3, 0x780, 0x1000, &(0x7f00000005c0)={&(0x7f0000000540)="174d4640b0a5aa860cb4e4c70e989ddf936ccec3ff059995901ae6f8c57056ac41e94c669738e16713370c8b4fccdec4f29468cb886b3615924990183bca034ad14235afc1b16045cdf73b3b0ad774d4", 0x7fffffff, 0x0, 0x221fa72a, 0x6, 0x3}}, {r0, 0x3, 0x100, 0x2, &(0x7f0000000680)={&(0x7f0000000600)="ce04a26ac23bb59cb8747412d0c0b8f408f3958bc6f56434b4e664f11d4a763e575428ba0f954a54556a572d989cb503b1adc3b6cfae03c95c3f38658aa6a673dd485d5dda88b9b47e19f109c376c60f", 0xc7, 0x1, 0xd7, 0x20, 0x30ef}}, {r3, 0x1, 0x104, 0x13, &(0x7f0000000740)={&(0x7f00000006c0)="4eafff3ebf5444074a0ea15346cf4d8131a4db6b29e8ce00e3c5ed5f39c95d838cad21988d08a7cf241f16d51fdaecff97bd2bb60f1c97be1dc5d87e1be5d9eb39b73709571f1609d8388cd2eac68f6e", 0x5, 0x0, 0x110, 0x40400000000000, 0x7ff}}, {r4, 0x2, 0x440, 0x6048189f, &(0x7f0000000800)={&(0x7f0000000780)="474725c392bea5bde51c7fd9f07b2a52c1fb356dd8f9f7756a6024e0572355381d1c6e48284f334023000ddaf2cdb526f5680a9831b8b51880b04d0c6f6fbf219539236279c33035d936c34279ee37a1", 0x6, 0x1, 0x9, 0x81, 0x38}}], 0x7) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000940)='/dev/urandom\x00', 0xd, 0x1, 0x0) abort_sysc_fd(r1) r5 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000980)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) r6 = openat$proc_self_args(0xffffffffffffff9c, &(0x7f00000009c0)='/proc/self/args\x00', 0x10, 0x3, 0x0) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000a00)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) llseek(r6, 0x867, 0x8, &(0x7f0000000a40), 0x1) openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000a80)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) r7 = openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000ac0)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) tcgetattr(r7, &(0x7f0000000b00)) abort_sysc_fd(r5) unlink(&(0x7f0000000b40)='./file1\x00', 0x8) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000b80)='/net/cs\x00', 0x8, 0x3, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000bc0)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000c00)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/null\x00', 0xa, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000c80)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000cc0)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000d00)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000d40)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) 20:58:29 executing program 3: r0 = openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sdctl\x00', 0xb, 0x3, 0x0) fcntl$F_SETFL(r0, 0x4, 0x8000) fcntl$F_SETFL(r0, 0x4, 0x100000) r1 = openat$net_log(0xffffffffffffff9c, &(0x7f0000000040)='/net/log\x00', 0x9, 0x3, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/udp/stats\x00', 0xf, 0x1, 0x0) r2 = proc_create(&(0x7f00000000c0)='./file0\x00', 0x8, &(0x7f0000000100)='/net/log\x00', 0x9, 0x1) waitpid(r2, &(0x7f0000000140), 0x1) r3 = proc_create(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='\x00', 0x1, 0x1) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000200)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) rmdir(&(0x7f0000000240)='./file0\x00', 0x8) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000280)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000300)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) poke_ksched(r3, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000380)='/dev/sysstat\x00', 0xd, 0x3, 0x0) exec(&(0x7f00000003c0)='./file0\x00', 0x8, &(0x7f0000000400)='[[[-$\x00', 0x6) nunmount(&(0x7f0000000440)='./file0\x00', 0x8, &(0x7f0000000480)='./file0/file0\x00', 0xe) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f00000004c0)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) nunmount(&(0x7f0000000500)='./file0/file0\x00', 0xe, &(0x7f0000000540)='./file0/file0\x00', 0xe) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2000002, 0x2010, r1, 0x100) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000580)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$dev_sysname(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f0000000640)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) proc_create(&(0x7f0000000680)='./file0/file1\x00', 0xe, &(0x7f00000006c0)='/\x00', 0x2, 0x1) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000740)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) openat$dev_cons(0xffffffffffffff9c, &(0x7f0000000780)='/dev/cons\x00', 0xa, 0x3, 0x0) 20:58:29 executing program 4: r0 = openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/fd\x00', 0xe, 0x1, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/fd\x00', 0xe, 0x1, 0x0) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) fcntl$F_SYNC(r0, 0x65) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/user\x00', 0x10, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f00000001c0)='/net/arp\x00', 0x9, 0x3, 0x0) openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000200)='/dev/stdout\x00', 0xc, 0x3, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000000280)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000340)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$net_ndb(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ndb\x00', 0x9, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/mem\x00', 0xf, 0x1, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000480)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f00000004c0)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000500)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000540)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/args\x00', 0x10, 0x3, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000600)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000640)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$dev_user(0xffffffffffffff9c, &(0x7f0000000700)='/dev/user\x00', 0xa, 0x3, 0x0) 20:58:29 executing program 6: nbind(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='./file0\x00', 0x8, 0x12) mkdir(&(0x7f0000000080)='./file1\x00', 0x8, 0x1) r0 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f00000000c0)='/net/udp/clone\x00', 0xf, 0x3, 0x0) fcntl$F_SETFL(r0, 0x4, 0x2456fda0ed4684fc) r1 = openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000140)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) r2 = proc_create(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='/net/icmpv6/clone\x00', 0x12, 0x1) poke_ksched(r2, 0x0) abort_sysc(0x10000) mkdir(&(0x7f0000000200)='./file0\x00', 0x8, 0x1b) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/wait\x00', 0x10, 0x1, 0x0) getcwd(&(0x7f0000000280)=""/116, 0x74) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) fcntl$F_GETFD(r1, 0x1) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000340)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/profile\x00', 0x13, 0x1, 0x0) r3 = openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000440)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000480)='/dev/.empty\x00', 0xc, 0x3, 0x0) r4 = openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) fcntl$F_SETFD(r4, 0x2, 0x1) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000540)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000580)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000600)='/dev/random\x00', 0xc, 0x1, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000640)='/dev/null\x00', 0xa, 0x1, 0x0) fcntl$F_GETFL(r3, 0x3) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000680)='/net/iproute\x00', 0xd, 0x3, 0x0) 20:58:29 executing program 5: r0 = openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000040)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) r2 = openat$proc_self_mem(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/mem\x00', 0xf, 0x1, 0x0) r3 = openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) tap_fds(&(0x7f0000000400)=[{r1, 0x2, 0x8, 0x100000000, &(0x7f0000000180)={&(0x7f0000000100)="a4929d2cfe78a4263f79fd0cbf1fdb2d6850051ddc20df57073df9d8411c4540f2346e90f9133362d6deed31ebb142530d864152dc20a5d1168822df47e4109fc361ae520a6f3626daf82fa00fb97778", 0x25a8, 0x1, 0x8000, 0xffff, 0x3}}, {r3, 0x1, 0x4, 0xfffffffffffffff9, &(0x7f0000000240)={&(0x7f00000001c0)="ab57b1403239a335b8695c86a3e887374b400dcc1e03db9a920573e63fbdab579263f3b426b2438f5b1f5b349bd4b9d1da33f8bb20465ceb3751788966b86628df7648517508d4fb6002264b849937c6", 0x0, 0x1, 0x4, 0xf5b, 0x8}}, {r2, 0x3, 0x80, 0x81, &(0x7f0000000300)={&(0x7f0000000280)="2ccb58a3e955cc0508d8e0e486695ccf939888f615e2bb148b8dce4bc2db9b2b3ae9fcac35ecb07e2917cbfad995e2005d519a8c5248d37bc3d11b1951913814f9548175e2e8a23c146cc315cd0becd8", 0x80, 0x1, 0x200, 0x7fffffff, 0x1}}, {r1, 0x3, 0x20, 0x401, &(0x7f00000003c0)={&(0x7f0000000340)="1bf34669e6c6d6bc19095824a4c5a451c1b8d1e51313a64e871dd745053d1abf9bdd82cd53df572201889134ac746485a367163f28a8d0876de0c6f93857b77a33ede0ab9e4153063a0f2ff073bd646c", 0x8, 0x0, 0x4, 0x7ff, 0x7}}], 0x4) vmm_ctl$VMM_CTL_GET_EXITS(0x1) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000480)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000540)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000580)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$dev_zero(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/zero\x00', 0xa, 0x1, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000600)='/dev/osversion\x00', 0xf, 0x1, 0x0) write(r0, &(0x7f0000000640), 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r4 = proc_create(&(0x7f00000006c0)='./file0\x00', 0x8, &(0x7f0000000700)='/proc/self/mem\x00', 0xf, 0x0) notify(r4, 0x6, &(0x7f00000007c0)={0x4, 0x8, 0x4, &(0x7f0000000740)="8646df8271e51d79d89a70c3d1b0b6b145f039112e17a24f33c2ba075d40aae4f4d6cc03fe6e4d4dbda7d878b6b97fb0178c4e50100108aa9ef42b2ffeb1372027", 0x80000001}) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000800)='/dev/random\x00', 0xc, 0x1, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000840)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f0000000880)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f00000008c0)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000900)='/dev/drivers\x00', 0xd, 0x1, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000940)='/dev/hostowner\x00', 0xf, 0x3, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000980)='/net/cs\x00', 0x8, 0x3, 0x0) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f00000009c0)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000a00)='/net/ipselftab\x00', 0xf, 0x1, 0x0) openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000a40)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000ac0)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000b00)='/dev/zero\x00', 0xa, 0x1, 0x0) 20:58:29 executing program 7: openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000000)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000040)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$dev_consctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/consctl\x00', 0xd, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000100)='/dev/swap\x00', 0xa, 0x3, 0x0) r0 = openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000180)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000200)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000280)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000004, 0x9130, r0, 0x7) r1 = openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000300)='/dev/hostowner\x00', 0xf, 0x3, 0x0) nmount(r1, &(0x7f0000000340)='./file0\x00', 0x8, 0x1) openat$net_ipifc_1_err(0xffffffffffffff9c, &(0x7f0000000380)='/net/ipifc/1/err\x00', 0x11, 0x3, 0x0) fcntl$F_GETFL(r0, 0x3) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000400)='/dev/stderr\x00', 0xc, 0x3, 0x0) r2 = proc_create(&(0x7f0000000440)='./file0\x00', 0x8, &(0x7f0000000480)='/dev/consctl\x00', 0xd, 0x0) fchdir(r2, r0) openat$net_cs(0xffffffffffffff9c, &(0x7f00000004c0)='/net/cs\x00', 0x8, 0x3, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3, 0x30, r1, 0x40) r3 = openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000500)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000540)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000580)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000600)='/dev/kprint\x00', 0xc, 0x1, 0x0) halt_core(0xffff) read(r3, &(0x7f0000000640)=""/116, 0x74) 20:58:30 executing program 2: openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0xffffffffffffff00) r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0x6) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) vmm_add_gpcs(0x1, &(0x7f00000005c0)={&(0x7f0000000300)="7c2e3e2966261261099b25a405a544e3eb8f169c5870d1e59826acd1387f560ef456f3050cc5ff0e4f7b6c5385ef1c95bbae12fe601a6b3a639d2155a16985abb7074a4a23c7fdee1cab3a3f8455a67d28bf2ed414b01021f91fd7d157329fded0959cbf3ff4aa77c74eaca8c278d8dae630a049ac69cc8603fb524c57e6ccc6cbf896c488ea4de0ca918efb6893bd16e2f7b855d98fc97ea0e64b874621cab893b6c79f6ff81a5dede88f5d3e4a5b2997cb6e28395c8bb3670fb8991e7458234eead63dd0b4618164381c47d10487fe9bf1f9f2f848f7", &(0x7f0000000400)="772ee4869736928cd6aa542d50d77d0096d6e393baae54ca8c69cbaf2f", &(0x7f0000000440)="77277cebb77b972c602e2dba9ec82b656d0a86e1369454cda11bfeb8b46417835eb4e37578faca84392918bce990d25461bcbbff008820e140519c6393cfa993c86257b3e95b58e8e4bc0cf236ddef230009f7859e288c39dee08bdf8442abaf8586b991c56935332da8", &(0x7f00000004c0)="a8f95709776cf3d7bf919ed13483e47ed40812ed4a793f5eb4c2a5e32b", &(0x7f0000000500)="02513e7585b3348d0e4d2c4877642d13c16b35c1d7888fb2b198ed6fe731e05c7dd11003ce86020fb98d5a9cd9e9d3e611438b741680ba5c0be8e79e8b31fc7332c5c710d8b2aa9bfdcc733871777344b742443a7a27ad94fbb290bd24f5555725321563bbb5cc8fb86351790d2313fa37c4ac2055bff2c7c607b7395e860d9998994e"}) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) populate_va(&(0x7f0000ffc000/0x1000)=nil, 0x7) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) poke_ksched(0x0, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f00000007c0)='/net/arp\x00', 0x9, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000840)='/dev/drivers\x00', 0xd, 0x1, 0x0) abort_sysc_fd(r1) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000880)='/net/.empty\x00', 0xc, 0x3, 0x0) 20:58:30 executing program 2: openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0xffffffffffffff00) r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0x6) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) vmm_add_gpcs(0x1, &(0x7f00000005c0)={&(0x7f0000000300)="7c2e3e2966261261099b25a405a544e3eb8f169c5870d1e59826acd1387f560ef456f3050cc5ff0e4f7b6c5385ef1c95bbae12fe601a6b3a639d2155a16985abb7074a4a23c7fdee1cab3a3f8455a67d28bf2ed414b01021f91fd7d157329fded0959cbf3ff4aa77c74eaca8c278d8dae630a049ac69cc8603fb524c57e6ccc6cbf896c488ea4de0ca918efb6893bd16e2f7b855d98fc97ea0e64b874621cab893b6c79f6ff81a5dede88f5d3e4a5b2997cb6e28395c8bb3670fb8991e7458234eead63dd0b4618164381c47d10487fe9bf1f9f2f848f7", &(0x7f0000000400)="772ee4869736928cd6aa542d50d77d0096d6e393baae54ca8c69cbaf2f", &(0x7f0000000440)="77277cebb77b972c602e2dba9ec82b656d0a86e1369454cda11bfeb8b46417835eb4e37578faca84392918bce990d25461bcbbff008820e140519c6393cfa993c86257b3e95b58e8e4bc0cf236ddef230009f7859e288c39dee08bdf8442abaf8586b991c56935332da8", &(0x7f00000004c0)="a8f95709776cf3d7bf919ed13483e47ed40812ed4a793f5eb4c2a5e32b", &(0x7f0000000500)="02513e7585b3348d0e4d2c4877642d13c16b35c1d7888fb2b198ed6fe731e05c7dd11003ce86020fb98d5a9cd9e9d3e611438b741680ba5c0be8e79e8b31fc7332c5c710d8b2aa9bfdcc733871777344b742443a7a27ad94fbb290bd24f5555725321563bbb5cc8fb86351790d2313fa37c4ac2055bff2c7c607b7395e860d9998994e"}) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) populate_va(&(0x7f0000ffc000/0x1000)=nil, 0x7) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) poke_ksched(0x0, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f00000007c0)='/net/arp\x00', 0x9, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000840)='/dev/drivers\x00', 0xd, 0x1, 0x0) abort_sysc_fd(r1) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000880)='/net/.empty\x00', 0xc, 0x3, 0x0) 20:58:30 executing program 2: openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0xffffffffffffff00) r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0x6) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) vmm_add_gpcs(0x1, &(0x7f00000005c0)={&(0x7f0000000300)="7c2e3e2966261261099b25a405a544e3eb8f169c5870d1e59826acd1387f560ef456f3050cc5ff0e4f7b6c5385ef1c95bbae12fe601a6b3a639d2155a16985abb7074a4a23c7fdee1cab3a3f8455a67d28bf2ed414b01021f91fd7d157329fded0959cbf3ff4aa77c74eaca8c278d8dae630a049ac69cc8603fb524c57e6ccc6cbf896c488ea4de0ca918efb6893bd16e2f7b855d98fc97ea0e64b874621cab893b6c79f6ff81a5dede88f5d3e4a5b2997cb6e28395c8bb3670fb8991e7458234eead63dd0b4618164381c47d10487fe9bf1f9f2f848f7", &(0x7f0000000400)="772ee4869736928cd6aa542d50d77d0096d6e393baae54ca8c69cbaf2f", &(0x7f0000000440)="77277cebb77b972c602e2dba9ec82b656d0a86e1369454cda11bfeb8b46417835eb4e37578faca84392918bce990d25461bcbbff008820e140519c6393cfa993c86257b3e95b58e8e4bc0cf236ddef230009f7859e288c39dee08bdf8442abaf8586b991c56935332da8", &(0x7f00000004c0)="a8f95709776cf3d7bf919ed13483e47ed40812ed4a793f5eb4c2a5e32b", &(0x7f0000000500)="02513e7585b3348d0e4d2c4877642d13c16b35c1d7888fb2b198ed6fe731e05c7dd11003ce86020fb98d5a9cd9e9d3e611438b741680ba5c0be8e79e8b31fc7332c5c710d8b2aa9bfdcc733871777344b742443a7a27ad94fbb290bd24f5555725321563bbb5cc8fb86351790d2313fa37c4ac2055bff2c7c607b7395e860d9998994e"}) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) populate_va(&(0x7f0000ffc000/0x1000)=nil, 0x7) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) poke_ksched(0x0, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f00000007c0)='/net/arp\x00', 0x9, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000840)='/dev/drivers\x00', 0xd, 0x1, 0x0) abort_sysc_fd(r1) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000880)='/net/.empty\x00', 0xc, 0x3, 0x0) 20:58:30 executing program 2: openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0xffffffffffffff00) r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0x6) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) vmm_add_gpcs(0x1, &(0x7f00000005c0)={&(0x7f0000000300)="7c2e3e2966261261099b25a405a544e3eb8f169c5870d1e59826acd1387f560ef456f3050cc5ff0e4f7b6c5385ef1c95bbae12fe601a6b3a639d2155a16985abb7074a4a23c7fdee1cab3a3f8455a67d28bf2ed414b01021f91fd7d157329fded0959cbf3ff4aa77c74eaca8c278d8dae630a049ac69cc8603fb524c57e6ccc6cbf896c488ea4de0ca918efb6893bd16e2f7b855d98fc97ea0e64b874621cab893b6c79f6ff81a5dede88f5d3e4a5b2997cb6e28395c8bb3670fb8991e7458234eead63dd0b4618164381c47d10487fe9bf1f9f2f848f7", &(0x7f0000000400)="772ee4869736928cd6aa542d50d77d0096d6e393baae54ca8c69cbaf2f", &(0x7f0000000440)="77277cebb77b972c602e2dba9ec82b656d0a86e1369454cda11bfeb8b46417835eb4e37578faca84392918bce990d25461bcbbff008820e140519c6393cfa993c86257b3e95b58e8e4bc0cf236ddef230009f7859e288c39dee08bdf8442abaf8586b991c56935332da8", &(0x7f00000004c0)="a8f95709776cf3d7bf919ed13483e47ed40812ed4a793f5eb4c2a5e32b", &(0x7f0000000500)="02513e7585b3348d0e4d2c4877642d13c16b35c1d7888fb2b198ed6fe731e05c7dd11003ce86020fb98d5a9cd9e9d3e611438b741680ba5c0be8e79e8b31fc7332c5c710d8b2aa9bfdcc733871777344b742443a7a27ad94fbb290bd24f5555725321563bbb5cc8fb86351790d2313fa37c4ac2055bff2c7c607b7395e860d9998994e"}) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) populate_va(&(0x7f0000ffc000/0x1000)=nil, 0x7) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) poke_ksched(0x0, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f00000007c0)='/net/arp\x00', 0x9, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000840)='/dev/drivers\x00', 0xd, 0x1, 0x0) abort_sysc_fd(r1) 20:58:30 executing program 2: openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0xffffffffffffff00) r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0x6) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) vmm_add_gpcs(0x1, &(0x7f00000005c0)={&(0x7f0000000300)="7c2e3e2966261261099b25a405a544e3eb8f169c5870d1e59826acd1387f560ef456f3050cc5ff0e4f7b6c5385ef1c95bbae12fe601a6b3a639d2155a16985abb7074a4a23c7fdee1cab3a3f8455a67d28bf2ed414b01021f91fd7d157329fded0959cbf3ff4aa77c74eaca8c278d8dae630a049ac69cc8603fb524c57e6ccc6cbf896c488ea4de0ca918efb6893bd16e2f7b855d98fc97ea0e64b874621cab893b6c79f6ff81a5dede88f5d3e4a5b2997cb6e28395c8bb3670fb8991e7458234eead63dd0b4618164381c47d10487fe9bf1f9f2f848f7", &(0x7f0000000400)="772ee4869736928cd6aa542d50d77d0096d6e393baae54ca8c69cbaf2f", &(0x7f0000000440)="77277cebb77b972c602e2dba9ec82b656d0a86e1369454cda11bfeb8b46417835eb4e37578faca84392918bce990d25461bcbbff008820e140519c6393cfa993c86257b3e95b58e8e4bc0cf236ddef230009f7859e288c39dee08bdf8442abaf8586b991c56935332da8", &(0x7f00000004c0)="a8f95709776cf3d7bf919ed13483e47ed40812ed4a793f5eb4c2a5e32b", &(0x7f0000000500)="02513e7585b3348d0e4d2c4877642d13c16b35c1d7888fb2b198ed6fe731e05c7dd11003ce86020fb98d5a9cd9e9d3e611438b741680ba5c0be8e79e8b31fc7332c5c710d8b2aa9bfdcc733871777344b742443a7a27ad94fbb290bd24f5555725321563bbb5cc8fb86351790d2313fa37c4ac2055bff2c7c607b7395e860d9998994e"}) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) populate_va(&(0x7f0000ffc000/0x1000)=nil, 0x7) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) poke_ksched(0x0, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f00000007c0)='/net/arp\x00', 0x9, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000800)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) abort_sysc_fd(r1) 20:58:30 executing program 2: openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0xffffffffffffff00) r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0x6) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) vmm_add_gpcs(0x1, &(0x7f00000005c0)={&(0x7f0000000300)="7c2e3e2966261261099b25a405a544e3eb8f169c5870d1e59826acd1387f560ef456f3050cc5ff0e4f7b6c5385ef1c95bbae12fe601a6b3a639d2155a16985abb7074a4a23c7fdee1cab3a3f8455a67d28bf2ed414b01021f91fd7d157329fded0959cbf3ff4aa77c74eaca8c278d8dae630a049ac69cc8603fb524c57e6ccc6cbf896c488ea4de0ca918efb6893bd16e2f7b855d98fc97ea0e64b874621cab893b6c79f6ff81a5dede88f5d3e4a5b2997cb6e28395c8bb3670fb8991e7458234eead63dd0b4618164381c47d10487fe9bf1f9f2f848f7", &(0x7f0000000400)="772ee4869736928cd6aa542d50d77d0096d6e393baae54ca8c69cbaf2f", &(0x7f0000000440)="77277cebb77b972c602e2dba9ec82b656d0a86e1369454cda11bfeb8b46417835eb4e37578faca84392918bce990d25461bcbbff008820e140519c6393cfa993c86257b3e95b58e8e4bc0cf236ddef230009f7859e288c39dee08bdf8442abaf8586b991c56935332da8", &(0x7f00000004c0)="a8f95709776cf3d7bf919ed13483e47ed40812ed4a793f5eb4c2a5e32b", &(0x7f0000000500)="02513e7585b3348d0e4d2c4877642d13c16b35c1d7888fb2b198ed6fe731e05c7dd11003ce86020fb98d5a9cd9e9d3e611438b741680ba5c0be8e79e8b31fc7332c5c710d8b2aa9bfdcc733871777344b742443a7a27ad94fbb290bd24f5555725321563bbb5cc8fb86351790d2313fa37c4ac2055bff2c7c607b7395e860d9998994e"}) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) populate_va(&(0x7f0000ffc000/0x1000)=nil, 0x7) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) poke_ksched(0x0, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f00000007c0)='/net/arp\x00', 0x9, 0x3, 0x0) abort_sysc_fd(r1) 20:58:30 executing program 2: openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0xffffffffffffff00) r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0x6) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) vmm_add_gpcs(0x1, &(0x7f00000005c0)={&(0x7f0000000300)="7c2e3e2966261261099b25a405a544e3eb8f169c5870d1e59826acd1387f560ef456f3050cc5ff0e4f7b6c5385ef1c95bbae12fe601a6b3a639d2155a16985abb7074a4a23c7fdee1cab3a3f8455a67d28bf2ed414b01021f91fd7d157329fded0959cbf3ff4aa77c74eaca8c278d8dae630a049ac69cc8603fb524c57e6ccc6cbf896c488ea4de0ca918efb6893bd16e2f7b855d98fc97ea0e64b874621cab893b6c79f6ff81a5dede88f5d3e4a5b2997cb6e28395c8bb3670fb8991e7458234eead63dd0b4618164381c47d10487fe9bf1f9f2f848f7", &(0x7f0000000400)="772ee4869736928cd6aa542d50d77d0096d6e393baae54ca8c69cbaf2f", &(0x7f0000000440)="77277cebb77b972c602e2dba9ec82b656d0a86e1369454cda11bfeb8b46417835eb4e37578faca84392918bce990d25461bcbbff008820e140519c6393cfa993c86257b3e95b58e8e4bc0cf236ddef230009f7859e288c39dee08bdf8442abaf8586b991c56935332da8", &(0x7f00000004c0)="a8f95709776cf3d7bf919ed13483e47ed40812ed4a793f5eb4c2a5e32b", &(0x7f0000000500)="02513e7585b3348d0e4d2c4877642d13c16b35c1d7888fb2b198ed6fe731e05c7dd11003ce86020fb98d5a9cd9e9d3e611438b741680ba5c0be8e79e8b31fc7332c5c710d8b2aa9bfdcc733871777344b742443a7a27ad94fbb290bd24f5555725321563bbb5cc8fb86351790d2313fa37c4ac2055bff2c7c607b7395e860d9998994e"}) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) populate_va(&(0x7f0000ffc000/0x1000)=nil, 0x7) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) poke_ksched(0x0, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000780)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) abort_sysc_fd(r1) 20:58:30 executing program 2: openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0xffffffffffffff00) r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0x6) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) vmm_add_gpcs(0x1, &(0x7f00000005c0)={&(0x7f0000000300)="7c2e3e2966261261099b25a405a544e3eb8f169c5870d1e59826acd1387f560ef456f3050cc5ff0e4f7b6c5385ef1c95bbae12fe601a6b3a639d2155a16985abb7074a4a23c7fdee1cab3a3f8455a67d28bf2ed414b01021f91fd7d157329fded0959cbf3ff4aa77c74eaca8c278d8dae630a049ac69cc8603fb524c57e6ccc6cbf896c488ea4de0ca918efb6893bd16e2f7b855d98fc97ea0e64b874621cab893b6c79f6ff81a5dede88f5d3e4a5b2997cb6e28395c8bb3670fb8991e7458234eead63dd0b4618164381c47d10487fe9bf1f9f2f848f7", &(0x7f0000000400)="772ee4869736928cd6aa542d50d77d0096d6e393baae54ca8c69cbaf2f", &(0x7f0000000440)="77277cebb77b972c602e2dba9ec82b656d0a86e1369454cda11bfeb8b46417835eb4e37578faca84392918bce990d25461bcbbff008820e140519c6393cfa993c86257b3e95b58e8e4bc0cf236ddef230009f7859e288c39dee08bdf8442abaf8586b991c56935332da8", &(0x7f00000004c0)="a8f95709776cf3d7bf919ed13483e47ed40812ed4a793f5eb4c2a5e32b", &(0x7f0000000500)="02513e7585b3348d0e4d2c4877642d13c16b35c1d7888fb2b198ed6fe731e05c7dd11003ce86020fb98d5a9cd9e9d3e611438b741680ba5c0be8e79e8b31fc7332c5c710d8b2aa9bfdcc733871777344b742443a7a27ad94fbb290bd24f5555725321563bbb5cc8fb86351790d2313fa37c4ac2055bff2c7c607b7395e860d9998994e"}) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) populate_va(&(0x7f0000ffc000/0x1000)=nil, 0x7) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) poke_ksched(0x0, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) abort_sysc_fd(r1) 20:58:32 executing program 0: openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000040)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) r0 = openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) fcntl$F_GETFD(r0, 0x1) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) getvcoreid() openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) 20:58:32 executing program 2: openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0xffffffffffffff00) r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0x6) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) vmm_add_gpcs(0x1, &(0x7f00000005c0)={&(0x7f0000000300)="7c2e3e2966261261099b25a405a544e3eb8f169c5870d1e59826acd1387f560ef456f3050cc5ff0e4f7b6c5385ef1c95bbae12fe601a6b3a639d2155a16985abb7074a4a23c7fdee1cab3a3f8455a67d28bf2ed414b01021f91fd7d157329fded0959cbf3ff4aa77c74eaca8c278d8dae630a049ac69cc8603fb524c57e6ccc6cbf896c488ea4de0ca918efb6893bd16e2f7b855d98fc97ea0e64b874621cab893b6c79f6ff81a5dede88f5d3e4a5b2997cb6e28395c8bb3670fb8991e7458234eead63dd0b4618164381c47d10487fe9bf1f9f2f848f7", &(0x7f0000000400)="772ee4869736928cd6aa542d50d77d0096d6e393baae54ca8c69cbaf2f", &(0x7f0000000440)="77277cebb77b972c602e2dba9ec82b656d0a86e1369454cda11bfeb8b46417835eb4e37578faca84392918bce990d25461bcbbff008820e140519c6393cfa993c86257b3e95b58e8e4bc0cf236ddef230009f7859e288c39dee08bdf8442abaf8586b991c56935332da8", &(0x7f00000004c0)="a8f95709776cf3d7bf919ed13483e47ed40812ed4a793f5eb4c2a5e32b", &(0x7f0000000500)="02513e7585b3348d0e4d2c4877642d13c16b35c1d7888fb2b198ed6fe731e05c7dd11003ce86020fb98d5a9cd9e9d3e611438b741680ba5c0be8e79e8b31fc7332c5c710d8b2aa9bfdcc733871777344b742443a7a27ad94fbb290bd24f5555725321563bbb5cc8fb86351790d2313fa37c4ac2055bff2c7c607b7395e860d9998994e"}) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) populate_va(&(0x7f0000ffc000/0x1000)=nil, 0x7) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) poke_ksched(0x0, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) abort_sysc_fd(r1) 20:58:32 executing program 0: notify(0x0, 0x1, &(0x7f0000000100)={0xa, 0x3, 0x5, &(0x7f0000000000)="a1155e84fa966dcdf3493fa374ed5884268fff6d4bfeb6f7df2a4bd0b82a78a0ca1ca758dd3a466fa9504c14c6dc21e5d38012307a86f247f0239839e52aec31ed1142ee20f1b8a36e1d4ddcdc820ab1cfb5581ee43125d00f448b878274155cef53ea55ce866658e443131b175b836452271fe66d303e7cc82dc7d0bb408de98881ecea8a2ac91c29e2932ce5338e17ddada9feda5db262df", 0x7}) notify(0xffffffffffffffff, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000080)}) r0 = openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000180)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) r1 = proc_create(&(0x7f0000000200)='./file0\x00', 0x8, &(0x7f0000000240)=':\x00', 0x2, 0x1) notify(r1, 0xa, &(0x7f0000001280)={0x8, 0x703, 0x1000000000000000, &(0x7f0000000280)="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", 0x8}) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/user\x00', 0x10, 0x1, 0x0) r2 = openat$net_arp(0xffffffffffffff9c, &(0x7f00000001c0)='/net/arp\x00', 0x9, 0x3, 0x0) fcntl$F_DUPFD(r0, 0x0, r2, 0x1) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f00000012c0)='/net/tcp/0/listen\x00', 0x8, 0x3, 0x0) 20:58:33 executing program 2: openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000040)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0xffffffffffffff00) r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000200)='/net/iprouter\x00', 0xe, 0x3, 0x0) vmm_poke_guest(0x6) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000240)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/notepg\x00', 0x12, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) vmm_add_gpcs(0x1, &(0x7f00000005c0)={&(0x7f0000000300)="7c2e3e2966261261099b25a405a544e3eb8f169c5870d1e59826acd1387f560ef456f3050cc5ff0e4f7b6c5385ef1c95bbae12fe601a6b3a639d2155a16985abb7074a4a23c7fdee1cab3a3f8455a67d28bf2ed414b01021f91fd7d157329fded0959cbf3ff4aa77c74eaca8c278d8dae630a049ac69cc8603fb524c57e6ccc6cbf896c488ea4de0ca918efb6893bd16e2f7b855d98fc97ea0e64b874621cab893b6c79f6ff81a5dede88f5d3e4a5b2997cb6e28395c8bb3670fb8991e7458234eead63dd0b4618164381c47d10487fe9bf1f9f2f848f7", &(0x7f0000000400)="772ee4869736928cd6aa542d50d77d0096d6e393baae54ca8c69cbaf2f", &(0x7f0000000440)="77277cebb77b972c602e2dba9ec82b656d0a86e1369454cda11bfeb8b46417835eb4e37578faca84392918bce990d25461bcbbff008820e140519c6393cfa993c86257b3e95b58e8e4bc0cf236ddef230009f7859e288c39dee08bdf8442abaf8586b991c56935332da8", &(0x7f00000004c0)="a8f95709776cf3d7bf919ed13483e47ed40812ed4a793f5eb4c2a5e32b", &(0x7f0000000500)="02513e7585b3348d0e4d2c4877642d13c16b35c1d7888fb2b198ed6fe731e05c7dd11003ce86020fb98d5a9cd9e9d3e611438b741680ba5c0be8e79e8b31fc7332c5c710d8b2aa9bfdcc733871777344b742443a7a27ad94fbb290bd24f5555725321563bbb5cc8fb86351790d2313fa37c4ac2055bff2c7c607b7395e860d9998994e"}) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/segment\x00', 0x13, 0x1, 0x0) r1 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) populate_va(&(0x7f0000ffc000/0x1000)=nil, 0x7) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) poke_ksched(0x0, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) abort_sysc_fd(r1) 20:58:34 executing program 3: r0 = openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/args\x00', 0x10, 0x3, 0x0) close(r0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/note\x00', 0x10, 0x1, 0x0) 20:58:36 executing program 4: openat$net_empty(0xffffffffffffff9c, &(0x7f0000000080)='/net/.empty\x00', 0xfd9e, 0x3, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) 20:58:36 executing program 1: r0 = openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) r1 = openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sysstat\x00', 0xd, 0x3, 0x0) tap_fds(&(0x7f0000000240)=[{r0, 0x2, 0x20, 0x0, &(0x7f0000000100)={&(0x7f0000000080)="1f30073f133583b64233a9ec13328bd83c140d092748c1ed096b643433da3ed2a0ba0435a2a6ae1ea63bab4fde9666929a05fdf842147f0975d860608e960876001bcc408a51c1f749fd373f444cce53", 0x3, 0x0, 0x76, 0x1f, 0x4}}, {r1, 0x3, 0x110, 0x3, &(0x7f0000000200)={&(0x7f0000000180)="f8fef715a6ac166c03f925343e0992e2eeec5200ad1a1a5c927d182fe6abc78e4917b2b394a44a4af89e9bba29db81a7bd1e559baf1bcafdd14b32e5f3a8145432ebc6ba0401e744ec5cd96a5c7888b0", 0x8, 0x8, 0x3ff, 0x9f8, 0xffffffff}}], 0x2) r2 = openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/1/local\x00', 0x67, 0x1, 0x0) fcntl$F_GETFL(r2, 0x3) bash-4.3$ HW TRAP frame at 0xfffffff00010cd00 on core 2 rax 0x0000000000000001 rbx 0x00000002deadbabe rcx 0x0000000000000040 rdx 0x00000002deadbac6 rbp 0xfffffff00010cdc8 rsi 0x0000000000000002 rdi 0x00000002deadbac6 r8 0x0000000000000000 r9 0x0000000000000000 r10 0x000010000000a4c0 r11 0x0000000000000206 r12 0xffff800002181f20 r13 0x00000000ffffffff r14 0x0000000000000002 r15 0xffff800002181b80 trap 0x0000000e Page Fault gsbs 0xffffffffc8667ec0 fsbs 0x0000000000000000 err 0x--------00000000 rip 0xffffffffc2007ab7 cs 0x------------0008 flag 0x0000000000010206 rsp 0xfffffff00010cdc8 ss 0x------------0010 Backtrace of kernel context on Core 2: #01 [<0xffffffffc2007ab7>] in kref_put #02 [<0xffffffffc2007e36>#0] in remove_fd_tap 2_km [<_tag bad canary: 000000000@00@0xffff8000068ed018, buf 0xffff8000068ed020,x expected deadbabe fffff8000068ed000:d 000 200 000 00:00068 00ed 000 001 008 01, 00b 00u 00f 00 0 x00ff 00f 00f8 00.0 0.#03 [<.0x.ff.fff.f.f.f.c205.8.4.8.c.>.] in sffff8000068ed010:y 10s_ a7ta 00p c2_ ff fff ffd ffs 00 #040 000 00 0[0< 000 00xf 00ff f.ff.f.f.c.2.059.1.49.>.]. .i.n. syscal.l .#05 [ffff8000068ed020:0 000 000 000 006 008 00ed 00 000 002 000:20 005 00930 004 00 00>] in run_ 00local _sys.c.a.ll .#06 [.<.0xff.ffffffc20598.3.9>] .in p.r.ep_syscalls .#07 [<0.x.fff.fff ff... c2ffff8000068ed070:0aaf1a 01>] i 00n s 00yse 00nt 00er_c 00allwra 00p 00per erk0 000n 00e 00l 00 00pa 00nic at 00 ke.r.n/ar.ch./.x.86./t.ra.p..c:3..1.1, from core 2: .Pro.c-.fu lffff8000068ed080:0 0068 00ed0 0080:lt 00 in th 00e 00Kernel a 00t 0x0000 0000 010 00 002deadb 00ac 006 00! 00 taS ack Backtrace on Core 2: 0#01 [<0xff.ffffffc2.00a3b7>] .in backtrace .#.02 [<0xffffffffc2.009b7c>] in _panic .#03 [<0xffffffffc20aa649>] in trap . ........ ffff8000068ed090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ... kernel panic at kern/src/kmalloc.c:138, from core 0: Bad canary Stack Backtrace on Core 0: #01 [<0xffffffffc200a3b7>] in backtrace #02 [<0xffffffffc2009b7c>] in _panic #03 [<0xffffffffc200a7e4>] in __get_km_tag #04 [<0xffffffffc200abcb>] in kfree #05 [<0xffffffffc20419ac>] in close_fdt #06 [<0xffffffffc204cdef>] in proc_destroy #07 [<0xffffffffc2056a46>] in sys_proc_destroy #08 [<0xffffffffc2059149>] in syscall #09 [<0xffffffffc2059304>] in run_local_syscall #10 [<0xffffffffc2059839>] in prep_syscalls #11 [<0xffffffffc20aaf1a>] in sysenter_callwrapper Entering Nanwan's Dungeon on Core 2 (Ints off): Type 'help' for a list of commands. TROS(Core 2)> OS(Core 2)> or a list of commands. Entering Nanwan's Dungeon on Core 0 (Ints on): Type 'help' for a list of commands.