Warning: Permanently added '10.128.0.244' (ECDSA) to the list of known hosts. [ 40.2354500] dk1 at sd0 (2a5f9479-33b7-499d-8cc4-f8d9ae0937b7) deleted [ 40.2454460] dk0 at sd0 (49b813d1-8009-4c4f-b3e1-2cc288366ecc) deleted [ 40.2654479] panic: ASan: Unauthorized Access In 0xffffffff81b8e155: Addr 0xffffdb8012859b88 [4 bytes, read, PoolUseAfterFree] [ 40.2754555] cpu1: Begin traceback... [ 40.2854701] vpanic() at netbsd:vpanic+0x282 [ 40.3054568] panic() at netbsd:panic+0x9e [ 40.3254666] kasan_report() at netbsd:kasan_report+0x8f [ 40.3554411] __asan_load4() at netbsd:__asan_load4+0x9d [ 40.3854369] config_detach() at netbsd:config_detach+0x1aa [ 40.4154397] dkwedge_delall1() at netbsd:dkwedge_delall1+0x1f7 [ 40.4454381] disk_ioctl() at netbsd:disk_ioctl+0x2d2 [ 40.4654370] dk_ioctl() at netbsd:dk_ioctl+0x1b2 [ 40.4954371] sdioctl() at netbsd:sdioctl+0xa12 [ 40.5254384] cdev_ioctl() at netbsd:cdev_ioctl+0x177 [ 40.5554417] spec_ioctl() at netbsd:spec_ioctl+0x148 [ 40.5854383] VOP_IOCTL() at netbsd:VOP_IOCTL+0x132 [ 40.6154358] vn_ioctl() at netbsd:vn_ioctl+0x1ba [ 40.6354371] sys_ioctl() at netbsd:sys_ioctl+0x8f6 [ 40.6654367] sys_syscall() at netbsd:sys_syscall+0x10e [ 40.6954355] syscall() at netbsd:syscall+0x25a [ 40.7054357] --- syscall (number 54 via SYS_syscall) --- [ 40.7154341] netbsd:syscall+0x25a: [ 40.7154341] cpu1: End traceback... [ 40.7254396] fatal breakpoint trap in supervisor mode [ 40.7254396] trap type 1 code 0 rip 0xffffffff80220a4d cs 0x8 rflags 0x282 cr2 0x7e73da9e92a0 ilevel 0 rsp 0xffffdb819d95c210 [ 40.7354319] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d95bd30 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d95b850 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d95b370 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d95ae90 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d95a9b0 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d95a4d0 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d959ff0 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d959b10 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d959630 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d959150 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d958c70 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d958790 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d9582b0 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d957dd0 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb819d9578f0 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 [ 40.7454322] fatal double fault in supervisor mode [ 40.7454322] trap type 13 code 0 rip 0xffffffff81bc7727 cs 0x8 rflags 0x10282 cr2 0xffffdb819d956f18 ilevel 0x8 rsp 0xffffdb819d956f20 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: double fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10083 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb8184debc40 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb8184deb760 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb8184deb280 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb8184deada0 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb8184dea8c0 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb8184dea3e0 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb8184de9f00 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb8184de9a20 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb8184de9540 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb8184de9060 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 [ 40.7454322] uvm_fault(0xffffdb801347aa40, 0xffff900000000000, 1) -> e [ 40.7454322] fatal page fault in supervisor mode [ 40.7454322] trap type 6 code 0 rip 0xffffffff81b883bb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffdb8184de8b80 [ 40.7454322] curlwp 0xffffdb8013cb95c0 pid 1223.1223 lowest kstack 0xffffdb819d9552c0 kernel: page fault trap, code=0 SeaBIOS (version 1.8.2-google) Total RAM Size = 0x0000000200000000 = 8192 MiB CPUs found: 2 Max CPUs supported: 2 SeaBIOS (version 1.8.2-google) Machine UUID 4c05c429-9a8a-6fd4-5ca1-d65f7eaf5bf3 found virtio-scsi at 0:3 virtio-scsi vendor='Google' product='PersistentDisk' rev='1' type=0 removable=0 virtio-scsi blksize=512 sectors=4194304 = 2048 MiB drive 0x000f2700: PCHS=0/0/0 translation=lba LCHS=520/128/63 s=4194304 Sending Seabios boot VM event. Booting from Hard Disk 0... >> NetBSD/x86 BIOS Boot, Revision 5.11 (Thu Jun 11 19:20:47 UTC 2020) (from NetBSD 9.99.65) >> Memory: 639/3144640 k 1. Boot normally 2. Boot single user 3. Drop to boot prompt Choose an option; RETURN for default; SPACE to stop countdown. Option 1 will be chosen in 5 seconds. 4 seconds. 3 seconds. 2 seconds. 1 seconds. 0 seconds. 0 seconds. command(s): rndseed /var/db/entropy-file;boot default boot twice, skipping...