2018/07/17 01:30:52 fuzzer started 2018/07/17 01:30:52 dialing manager at 127.0.0.1:33665 2018/07/17 01:30:52 syscalls: 213 2018/07/17 01:30:52 code coverage: support is not implemented in syzkaller 2018/07/17 01:30:52 comparison tracing: support is not implemented in syzkaller 2018/07/17 01:30:52 setuid sandbox: support is not implemented in syzkaller 2018/07/17 01:30:52 namespace sandbox: support is not implemented in syzkaller 2018/07/17 01:30:52 fault injection: support is not implemented in syzkaller 2018/07/17 01:30:52 leak checking: support is not implemented in syzkaller 2018/07/17 01:30:52 net packed injection: support is not implemented in syzkaller 2018/07/17 01:30:52 net device setup: support is not implemented in syzkaller 01:30:52 executing program 1: r0 = openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) tcgetattr(r0, &(0x7f0000000040)) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capuse\x00', 0xc, 0x3, 0x0) r1 = openat$proc_self_maps(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/maps\x00', 0x10, 0x1, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f00000001c0)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000280)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) r2 = openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0xa, 0x1, 0x0) r3 = openat$dev_null(0xffffffffffffff9c, &(0x7f0000000340)='/dev/null\x00', 0xa, 0x1, 0x0) r4 = proc_create(&(0x7f0000000380)='./file0\x00', 0x8, &(0x7f00000003c0)='\x00', 0x1, 0x0) dup_fds_to(r4, &(0x7f0000000400)=[{r1}], 0x1) r5 = openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000540)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/core\x00', 0x10, 0x1, 0x0) r6 = openat$dev_capuse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/status\x00', 0x12, 0x1, 0x0) symlink(&(0x7f0000000640)='./file0\x00', 0x8, &(0x7f0000000680)='./file0\x00', 0x8) openat$prof_empty(0xffffffffffffff9c, &(0x7f00000006c0)='/prof/.empty\x00', 0xd, 0x3, 0x0) fcntl$F_GETFL(r5, 0x3) fcntl$F_DUPFD(r3, 0x0, r6, 0x1) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) openat(r2, &(0x7f0000000740)='./file0\x00', 0x8, 0x120000, 0x42) 01:30:52 executing program 0: send_event(&(0x7f0000000080)={&(0x7f0000000000)="8181af6483da64f19edf1ed6a3bf7b5fb54f5fe41182e1aa26f345a47493a407041911af2722186e84e71a7996810eb6f6219a7e387b9cc0c6d4eac497ed5ab2a7b69aa089b12aaa6b19ad976b63a7d8", 0x6, 0x1, 0x6, 0x2, 0x9}, &(0x7f00000001c0)={0xf, 0x6, 0x9, &(0x7f00000000c0)="71bdfd425977cab0030bff6e53f206332a17f02d8a5e0b2cf2c79174bff5eed7b1a597a94c8baec8295823e1908bd4ffea388c290d00179baf4a0228bcaab0a77092b63e1ec11cec46837eef94422bae3f3a54d98b968433ec19ce44143d4caadc6b56fd3a353197a59f495c476c1374b41d2c450a43d3bef63a8eea164f6a80c78ce07fcc45c24e8d0609870654af0e3e537f36c92046c8a515578440f5d4956ee4814cb1b54838a611d23d753aeab729f5e539cef5d6058e7ef6af673a56528d89e9b2f02338c215581804b3a0", 0x3}, 0xffffffffffff0001) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) send_event(&(0x7f00000002c0)={&(0x7f0000000240)="73d5b99b8f7f1cc2f2693418b3eb53c19a0df05ba34fbf20d7c326eb118f88ed4e83fb14f35bd763f0cd7280da508eef508b9b3011bd31c39620f9e2e6e0326735140d4bd1625be24ba6e0e0d13923fa", 0x80000001, 0x0, 0xfffffffffffffffe, 0x40, 0x8}, &(0x7f0000000380)={0x1, 0x0, 0xfffffffffffffffe, &(0x7f0000000300)="11282f247faa31c43b729fd7a730f8f4072bce72cb9e8a27d4b285e66f985dab533cc0be8cbdbabe60beb30c420167025959e020b21427790e701e0c10c40abbbba1d92fe5e9c367804f3795fa1611eab0f58500c63a9faa7fce2fc77872de346fcafcd73991", 0x81}, 0x0) r0 = openat$dev_pid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$dev_time(0xffffffffffffff9c, &(0x7f0000000400)='/dev/time\x00', 0xa, 0x3, 0x0) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000440)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) r1 = openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sysstat\x00', 0xd, 0x3, 0x0) r2 = openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) r3 = openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000540)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) fcntl$F_SETFL(r0, 0x4, 0x0) r4 = openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000580)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) r5 = openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000600)='/dev/pid\x00', 0x9, 0x1, 0x0) r6 = openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$dev_user(0xffffffffffffff9c, &(0x7f0000000680)='/dev/user\x00', 0xa, 0x3, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000740)='/dev/bintime\x00', 0xd, 0x3, 0x0) read(r6, &(0x7f0000000780), 0x0) tap_fds(&(0x7f0000000b80)=[{r1, 0x3, 0x8, 0x0, &(0x7f0000000840)={&(0x7f00000007c0)="12cb2baf166086f5a9aa8c753ed794836f925d11a12ebae33dc602bbdedc2e08cefaba0678b55f61402adfda1d2e0307a61843b9fee8f48d1b0b371558ca5a99225f967e06860215a943ece6d5651a36", 0x401, 0x1, 0x9, 0x8, 0x7ff000000}}, {r2, 0x3, 0x10, 0xafeb, &(0x7f0000000900)={&(0x7f0000000880)="ddb72c313af8564789aa50e305de252318400be6bbc8e62fdf2ec433d2aaa3a5f5a7ba04605f1e112791b637104cedaef00473a9b59b615d29d91d08536379108571061ed431be98e15f11ea4a61f5bd", 0x800, 0x1, 0x200, 0x10000, 0x9}}, {r1, 0x0, 0x4, 0x4, &(0x7f00000009c0)={&(0x7f0000000940)="eec63a8a0ec38e4d509f34ff1e9a8f8997035eb1fa4021f95b3875aefac6b8c155870532cb3cbd3aff00b86ceff6901a5c9094c7f6d458af216102a201083f928f9366c7b412db50657efc0488d9a5aa", 0x7fd7, 0x0, 0x709, 0xff, 0x79}}, {r3, 0x1, 0x400, 0x9, &(0x7f0000000a80)={&(0x7f0000000a00)="babaa5b986d8f1e4192d6af26a49e7d4680325711cdfbd59b1da7463b00fe95f8ae0e38debc1da370bfd37fe7035ca7aa82da173f9bcc965635175c3ce06ac0fafb780ebb70364b683ba3ebb688af31f", 0x8, 0x0, 0x3, 0x4, 0x4}}, {r4, 0x3, 0x608, 0x4, &(0x7f0000000b40)={&(0x7f0000000ac0)="cd80866b612ea0966714c026c91294b8746220a6bfe028774095b9ed47f25915bf22d410899b1250c2532eb41dc98b9117e6a3afef7a9722602583f3558892fb55c82bd470928689de7f39a4784330ef", 0x0, 0x0, 0x3f, 0x8, 0x9}}], 0x5) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000c40)='/net/.empty\x00', 0xc, 0x3, 0x0) getpcoreid() openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000c80)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x10, r5, 0x800) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f0000000cc0)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000d00)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000d40)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000d80)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f0000000dc0)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) 01:30:52 executing program 2: r0 = openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) r1 = openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000080)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) r2 = openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) r3 = openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) r4 = openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/wait\x00', 0x10, 0x1, 0x0) fcntl$F_GETFD(r4, 0x1) r5 = openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000180)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) access(&(0x7f00000001c0)='./file0\x00', 0x8, 0x3) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/2/stats\x00', 0x14, 0x1, 0x0) dup_fds_to(0x0, &(0x7f0000000280)=[{r5}, {r2}, {r0}, {r1}, {r3}, {r2}, {r3}], 0x7) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000300)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000340)='/net/tcp/1/ctl\x00', 0xf, 0x3, 0x0) openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000380)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000440)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000480)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f00000004c0)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000500)='/dev/ppid\x00', 0xa, 0x1, 0x0) openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000540)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/strace\x00', 0x12, 0x1, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/wait\x00', 0x10, 0x1, 0x0) r6 = openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000000600)='/proc/self/fd\x00', 0xe, 0x1, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000640)='/prof/.empty\x00', 0xd, 0x3, 0x0) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000680)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) abort_sysc_fd(r6) 01:30:52 executing program 3: r0 = openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) r1 = openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000040)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/stderr\x00', 0xc, 0x3, 0x0) r2 = openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/clone\x00', 0xf, 0x3, 0x0) r3 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppid\x00', 0xa, 0x1, 0x0) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) read(r0, &(0x7f0000000200)=""/249, 0xf9) openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000300)='/dev/zero\x00', 0xa, 0x1, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000340)='/dev/urandom\x00', 0xd, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/segment\x00', 0x13, 0x1, 0x0) send_event(&(0x7f0000000480)={&(0x7f0000000400)="60bd935138bd2dbdf2705db5a2745501c4f3d901d06e9db040d8cfa7e91ba7f4c0c594a5fdea2c7961d02cbfede2b619ae6af7caa59d5ca1683c61add197c45c32230d390c8cb8ddaf00a4b5b60311dc", 0xfffffffffffffffd, 0x1, 0x3, 0x72, 0x2}, &(0x7f00000005c0)={0x7, 0x9, 0x30, &(0x7f00000004c0)="3403f1d7ec2ca4f8856efa862b5983eb79b5d82947fd8d82f21958948552d8b6b7f5f36e851066eb3bdc6a25ebaabfa1a7442da416395e17835aa3640c8c7d055934059327f39aba611c08a1b350ea912692371cb500768a25df408f5ccba0d3ba2c5cd862520e3863ba49b5df0555ea72936c26abace95392900636f39ac11c14f5880f7d4b0ea141c3d540400a26fe360555a16e6058c29170e0113d57d4c69c8a755e3653c65fa558db40eb182e89a0d162a926443512148fdba7486a32758f5c8d1155444037d553"}, 0x1226) openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000600)='/dev/klog\x00', 0xa, 0x1, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000000640)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000680)='/proc/self/status\x00', 0x12, 0x1, 0x0) openat$net_ndb(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ndb\x00', 0x9, 0x3, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000700)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000740)='/dev/hostowner\x00', 0xf, 0x3, 0x0) fork() openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000780)='/net/ndb\x00', 0x9, 0x3, 0x0) fcntl$F_GETFL(r1, 0x3) abort_sysc_fd(r3) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f00000007c0)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000000800)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f0000000840)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000880)='/net/ipselftab\x00', 0xf, 0x1, 0x0) llseek(r2, 0x1000, 0x9, &(0x7f00000008c0), 0x1) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000900)='/proc/self/user\x00', 0x10, 0x1, 0x0) 01:30:52 executing program 4: r0 = openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) r1 = openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000040)='/net/udp/stats\x00', 0xf, 0x1, 0x0) r2 = openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) r3 = openat$dev_empty(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/.empty\x00', 0xc, 0x3, 0x0) abort_sysc_fd(r2) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/user\x00', 0x10, 0x1, 0x0) r4 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000140)='/dev/sysname\x00', 0xd, 0x3, 0x0) r5 = proc_create(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='/net/ether0/clone\x00', 0x12, 0x0) dup_fds_to(r5, &(0x7f0000000200)=[{r0}, {r1}, {r3}, {r3}, {r4}], 0x5) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000280)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$net_ndb(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ndb\x00', 0x9, 0x3, 0x0) openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000340)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f00000003c0)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000400)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000440)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/self/fd\x00', 0xe, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) r6 = openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000540)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000580)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/hostowner\x00', 0xf, 0x3, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000600)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) close(r6) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/segment\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) 01:30:52 executing program 5: openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000000000)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) r0 = openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000080)='/dev/stderr\x00', 0xc, 0x3, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) fcntl$F_GETFD(r0, 0x1) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) r1 = openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000140)='/dev/stderr\x00', 0xc, 0x3, 0x0) fcntl$F_GETFL(r1, 0x3) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$dev_stderr(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/stderr\x00', 0xc, 0x3, 0x0) openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000240)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000280)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) stat(&(0x7f00000002c0)='./file0\x00', 0x8, &(0x7f0000000300)) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000380)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$dev_sysstat(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/sysstat\x00', 0xd, 0x3, 0x0) fcntl$F_GETFL(r1, 0x3) r2 = openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sysstat\x00', 0xd, 0x3, 0x0) openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000440)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000480)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000540)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000580)='/net/ether0/ifstats\x00', 0x14, 0x1, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat(r2, &(0x7f0000000600)='./file0\x00', 0x8, 0x40, 0x32) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) r3 = openat$proc_self_maps(0xffffffffffffff9c, &(0x7f00000006c0)='/proc/self/maps\x00', 0x10, 0x1, 0x0) close(r3) 01:30:52 executing program 6: r0 = openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000000)='/dev/drivers\x00', 0xd, 0x1, 0x0) nmount(r0, &(0x7f0000000040)='./file0\x00', 0x8, 0x0) openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sysctl\x00', 0xc, 0x3, 0x0) openat$net_ether0_1_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/1/ctl\x00', 0x12, 0x3, 0x0) openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/clone\x00', 0xf, 0x3, 0x0) r1 = openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000180)='/net/ipifc/1/data\x00', 0x12, 0x3, 0x0) r2 = openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) nmount(r1, &(0x7f0000000200)='./file0\x00', 0x8, 0x3) nmount(r2, &(0x7f0000000240)='./file0\x00', 0x8, 0x1) openat$prof_kprintx(0xffffffffffffff9c, &(0x7f0000000280)='/prof/kprintx\x00', 0xe, 0x3, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000340)='/dev/.empty\x00', 0xc, 0x3, 0x0) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000380)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) r3 = openat$dev_config(0xffffffffffffff9c, &(0x7f0000000400)='/dev/config\x00', 0xc, 0x1, 0x0) openat$dev_consctl(0xffffffffffffff9c, &(0x7f0000000440)='/dev/consctl\x00', 0xd, 0x3, 0x0) openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000480)='/dev/stdin\x00', 0xb, 0x3, 0x0) openat$dev_sysctl(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/sysctl\x00', 0xc, 0x3, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f0000000500)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) fd2path(r3, &(0x7f0000000540)=""/149, 0x95) lstat(&(0x7f0000000600)='./file0\x00', 0x8, &(0x7f0000000640)) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$dev_cons(0xffffffffffffff9c, &(0x7f0000000700)='/dev/cons\x00', 0xa, 0x3, 0x0) openat$dev_consctl(0xffffffffffffff9c, &(0x7f0000000740)='/dev/consctl\x00', 0xd, 0x3, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000780)='/net/.empty\x00', 0xc, 0x3, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f00000007c0)='/prof/kpdata\x00', 0xd, 0x3, 0x0) r4 = proc_create(&(0x7f0000000800)='./file0\x00', 0x8, &(0x7f0000000840)='-,[\'\'(', 0x6, 0x0) provision(r4, 0x0, 0x8) 01:30:52 executing program 7: openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000040)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) r0 = openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000140)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) r1 = openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000180)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000240)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000340)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) openat(r0, &(0x7f0000000380)='./file0\x00', 0x8, 0x503, 0x100) openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) fwstat(r1, &(0x7f0000000400)=""/72, 0x48, 0x0) openat$proc_self_noteid(0xffffffffffffff9c, &(0x7f0000000480)='/proc/self/noteid\x00', 0x12, 0x3, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f00000004c0)='/net/udp/clone\x00', 0xf, 0x3, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000500)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000540)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) r2 = openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000580)='/net/iprouter\x00', 0xe, 0x3, 0x0) llseek(r2, 0x2, 0x2, &(0x7f00000005c0), 0x1) access(&(0x7f0000000600)='./file0\x00', 0x8, 0x8) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000640)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000680)='/net/iprouter\x00', 0xe, 0x3, 0x0) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000700)='/dev/drivers\x00', 0xd, 0x1, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000740)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000780)='/dev/zero\x00', 0xa, 0x1, 0x0) 01:30:54 executing program 1: r0 = openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/vmstatus\x00', 0xfffffffffffffdc6, 0x1, 0x0) read(r0, &(0x7f00000004c0)=""/65, 0x41) 01:30:54 executing program 1: r0 = openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000040)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000100)='/prof/.empty\x00', 0xab, 0x3, 0x0) abort_sysc_fd(r0) 01:30:54 executing program 1: r0 = openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000040)='/dev/drivers\x00', 0xd, 0x1, 0x0) close(r0) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) 01:30:54 executing program 1: r0 = openat$net_udp_0_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/ctl\x00', 0xf, 0x3, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$dev_user(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/user\x00', 0xa, 0x3, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000080)='/net/udp/clone\x00', 0xf, 0x3, 0x0) fcntl$F_GETFL(r0, 0x3) 01:30:54 executing program 1: openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) r0 = openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000300)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) fstat(r0, &(0x7f0000000500)) 01:30:54 executing program 1: mkdir(&(0x7f0000001400)='./file0\x00', 0x8, 0x0) nbind(&(0x7f00000016c0)='./file0\x00', 0x8, &(0x7f0000000080)='./file0/file0\x00', 0xe, 0x2) nbind(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='./file0/file0\x00', 0xe, 0x1) 01:30:54 executing program 1: openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) r0 = openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysctl\x00', 0xc, 0x3, 0x0) llseek(r0, 0xfffffffffffffffe, 0xfffffffffffffffd, &(0x7f0000000040), 0x0) bash-4.3$ [kernel] Vcoreid -2 unsafe! (too big?) [kernel] Vcoreid -2 unsafe! (too big?) 01:30:55 executing program 0: r0 = openat$dev_zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0xa, 0x1, 0x0) close(r0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000100)='/net/udp/clone\x00', 0xf, 0x3, 0x0) r1 = openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000080)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bintime\x00', 0xd, 0x3, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000140)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) abort_sysc_fd(r1) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000040)='/dev/random\x00', 0xffffffffffffff00, 0x1, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/wait\x00', 0x10, 0x1, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysctl\x00', 0xc, 0x3, 0x0) 01:30:56 executing program 0: r0 = openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sdctl\x00', 0xb, 0x3, 0x0) close(r0) fd2path(r0, &(0x7f00000011c0)=""/4096, 0x1000) r1 = openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) close(r1) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000100)='/dev/stderr\x00', 0xc, 0x3, 0x0) 01:30:56 executing program 0: r0 = openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) close(r0) pop_ctx(&(0x7f0000000100)="b643e7da50c45ac8ca02827e1901a744ecada1e3bf38d916f3e15f2296c7923f7ebafdfdc117f105614ab67d831e6fbbd405bb07a4998979e083ddde9d36904393f89cbdc22421d5b27692b90ab3aff7e9624074285696c3c8978b6b946cf0722c7beaafbaffac3fc1c37723541eef9e0323e125f32a5f3c8e16a74a0ac87a8bed4a5f1abd8e92cf0b80b48d98859ac4a3ce9eadbd8177ff501114b080da57aed9ba084f22280801cee888bd387ab450c6e4d1ae7198e6eb423a77ff18caf02fdeb6c77e2c0327494c9e95226535656dce63c053c8fde0a7") kernel panic at kern/src/rcu.c:325, from core 3: HW TRAP frame at 0xfffffff00001af40 on core 2 assertion failed: rpi->gp_acked + 1 == READ_ONCE(rsp->gpnum) rax 0x0000000008462a00 rbx 0xffffffffc8667b08 Stack Backtrace on Core 3: rcx 0x0000000000000000 #01 [<0xffffffffc200a3b7>] in backtrace rdx 0x0000000000000046 #02 [<0xffffffffc2009b7c>] in _panic rbp 0xfffffff0000c1cae #03 [<0xffffffffc20502f9>] in rcu_report_qs_rpi rsi 0xffff800005291848 #04 [<0xffffffffc2050c4c>] in rcu_report_qs rdi 0xffffffffc8667b08 #05 [<0xffffffffc2054363>] in __smp_idle r8 0x00000011c5f48912 r9 0x00000011c5f48912 r10 0x0000000000000000 r11 0x0000000000000000 r12 0xffff800005291848 r13 0x0000000000000246 r14 0xffff800005291848 r15 0xffff800005291820 trap 0x00000008 Double Fault Entering Nanwan's Dungeon on Core 3 (Ints off): gsbs 0xffffffffc8667ec0 Type 'help' for a list of commands. fsbs 0x0000000000000000 ROS(Core 3)> err 0x--------00000000 rip 0xffffffffc8667b60 cs 0x------------0008 flag 0x0000000000010006 rsp 0x0000000000000000 ss 0x------------0010 HW TRAP frame at 0xfffffff00001af40 on core 2 rax 0x0000000000000002 rbx 0x0000000000000002 rcx 0x0000000000000014 rdx 0xfffffff00001ae40 rbp 0xfffffff00001aef0 rsi 0xffffc20001151cb8 rdi 0xfff0000c1cc8ffff r8 0xffffc20001151cb8 r9 0xffffffffc20ac1ce r10 0xffff7fffffffffff r11 0xffff8000000b8ec0 r12 0xffff800005291848 r13 0x0000000000000246 r14 0xffff800005291848 r15 0xffff800005291820 trap 0x00000008 Double Fault gsbs 0xffffffffc8667ec0 fsbs 0x0000000000000000 err 0x--------00000000 rip 0xffffffffc20a0ed0 cs 0x------------0008 flag 0x0000000000010012 rsp 0xfffffff00001ae38 ss 0x------------0010 Backtrace of kernel context on Core 2: #01 [<0xffffffffc20a0ed0>] in backtrace_list #02 [<0xffffffffc200a535>] in backtrace_hwtf #03 [<0xffffffffc20aa239>] in handle_double_fault kernel panic at kern/arch/x86/trap.c:541, from core 2: Double fault! Check the kernel stack pointer; you likely ran off the end of the stack. Stack Backtrace on Core 2: #01 [<0xffffffffc200a3b7>] in backtrace #02 [<0xffffffffc2009b7c>] in _panic #03 [<0xffffffffc20aa253>] in handle_double_fault Entering Nanwan's Dungeon on Core 2 (Ints off): Type 'help' for a list of commands.