2019/01/18 07:54:13 fuzzer started 2019/01/18 07:54:13 dialing manager at 127.0.0.1:42797 2019/01/18 07:54:13 syscalls: 1 2019/01/18 07:54:13 code coverage: support is not implemented in syzkaller 2019/01/18 07:54:13 comparison tracing: support is not implemented in syzkaller 2019/01/18 07:54:13 extra coverage: support is not implemented in syzkaller 2019/01/18 07:54:13 setuid sandbox: support is not implemented in syzkaller 2019/01/18 07:54:13 namespace sandbox: support is not implemented in syzkaller 2019/01/18 07:54:13 Android sandbox: support is not implemented in syzkaller 2019/01/18 07:54:13 fault injection: support is not implemented in syzkaller 2019/01/18 07:54:13 leak checking: support is not implemented in syzkaller 2019/01/18 07:54:13 net packet injection: support is not implemented in syzkaller 2019/01/18 07:54:13 net device setup: support is not implemented in syzkaller 07:54:13 executing program 0: pop_ctx(&(0x7f0000000000)="12a80912fe374c36f40899d2d070e4699c57704f82cc85c52c02af80625fdcee42db89546b73d0c42b399313ed1efe5fd7cba97ecd75de29412a28f203ff9d896e09d940681c1bca9859a03808cf8e7f2513a3d7938cd57566fb2cfcd4ae1fa9eb1752ea46e6c9cfc6571c8f3b455e2126d5657b89e8960e2129f2b062db7a5595e088992b0e96fc0952299b1768f755310ec276baf160e9f45ae0a9878aff991319f1f3a94e0e8829e030e6b5fddef9b4ccabbd598be51352f0e07b105d579665ea371f2c044c3bf00adaf28db7f6073084f374a655e9aa") openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) r0 = openat$net_arp(0xffffffffffffff9c, &(0x7f0000000140)='/net/arp\x00', 0x9, 0x3, 0x0) r1 = proc_create(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='/net/ipifc/1/local\x00', 0x13, 0x0) dup_fds_to(r1, &(0x7f0000000200)=[{r0}, {r0}], 0x2) openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000240)='/dev/stdout\x00', 0xc, 0x3, 0x0) r2 = openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000280)='/dev/stdin\x00', 0xb, 0x3, 0x0) openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) openat$dev_null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0xa, 0x1, 0x0) r3 = proc_create(&(0x7f0000000340)='./file0\x00', 0x8, &(0x7f0000000380)='].\x00', 0x3, 0x1) openat$net_tcp_2_local(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/2/local\x00', 0x11, 0x1, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000400)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) abort_sysc_fd(r2) openat$prof_kprintx(0xffffffffffffff9c, &(0x7f0000000440)='/prof/kprintx\x00', 0xe, 0x3, 0x0) nanosleep(&(0x7f0000000480)={0x2, 0x1000}, &(0x7f00000004c0)) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000500)='/prof/mpstat\x00', 0xd, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000540)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000580)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) proc_create(&(0x7f00000005c0)='./file0\x00', 0x8, &(0x7f0000000600)='/dev/stdout\x00', 0xc, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000640)='/proc/self/note\x00', 0x10, 0x1, 0x0) unlink(&(0x7f0000000680)='./file0/file0\x00', 0xe) openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/1/remote\x00', 0x14, 0x1, 0x0) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000700)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) provision(r3, 0x0, 0x2) openat$proc_self_fd(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self/fd\x00', 0xe, 0x1, 0x0) r4 = openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000780)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) fcntl$F_GETFD(r4, 0x1) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f00000007c0)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000800)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) mkdir(&(0x7f0000000840)='./file0/file1\x00', 0xe, 0x104) 07:54:13 executing program 1: unlink(&(0x7f0000000000)='./file0\x00', 0x8) unlink(&(0x7f0000000040)='./file0\x00', 0x8) r0 = openat$net_log(0xffffffffffffff9c, &(0x7f0000000080)='/net/log\x00', 0x9, 0x3, 0x0) proc_create(&(0x7f00000000c0)='./file0\x00', 0x8, &(0x7f0000000100)='/net/log\x00', 0x9, 0x0) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000140)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) symlink(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='./file0\x00', 0x8) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) symlink(&(0x7f0000000240)='./file0\x00', 0x8, &(0x7f0000000280)='./file0\x00', 0x8) nbind(&(0x7f00000002c0)='./file0\x00', 0x8, &(0x7f0000000300)='./file0\x00', 0x8, 0x5) symlink(&(0x7f0000000340)='./file0\x00', 0x8, &(0x7f0000000380)='./file0/file0\x00', 0xe) fcntl$F_SETFL(r0, 0x4, 0x8800) nunmount(&(0x7f00000003c0)='./file0\x00', 0x8, &(0x7f0000000400)='./file0/file0\x00', 0xe) openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/text\x00', 0x10, 0x1, 0x0) vmm_poke_guest(0x7) rename(&(0x7f0000000480)='./file0\x00', 0x8, &(0x7f00000004c0)='./file0\x00', 0x8) r1 = proc_create(&(0x7f0000000500)='./file0\x00', 0x8, &(0x7f0000000540)='^\x00', 0x2, 0x0) unlink(&(0x7f0000000580)='./file0\x00', 0x8) readlink(&(0x7f00000005c0)='./file0/file0\x00', 0xe, &(0x7f0000000600)=""/155, 0x9b) lstat(&(0x7f00000006c0)='./file0/file0\x00', 0xe, &(0x7f0000000700)) openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000780)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_listen(0xffffffffffffff9c, &(0x7f00000007c0)='/net/ipifc/0/listen\x00', 0x14, 0x3, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000800)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000840)='/proc/self/user\x00', 0x10, 0x1, 0x0) symlink(&(0x7f0000000880)='./file0/file0\x00', 0xe, &(0x7f00000008c0)='./file0/file0\x00', 0xe) proc_create(&(0x7f0000000900)='./file0/file0\x00', 0xe, &(0x7f0000000940)='}\\\x00', 0x3, 0x0) symlink(&(0x7f0000000980)='./file0\x00', 0x8, &(0x7f00000009c0)='./file0\x00', 0x8) send_event(&(0x7f0000000a80)={&(0x7f0000000a00)="3c19c902d8c99e50c1db2afbc97879765f0920400266b03df7961248b0dd88cf0b4ae93240af009484bbcc50d0fe28a3c1c29fbbb24d1a61dc4f56a8d9c95657e59d37312731362abef88d4551a98b98", 0x40, 0x0, 0x81, 0x81, 0x4}, &(0x7f0000000bc0)={0x2, 0x7, 0x80, &(0x7f0000000ac0)="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", 0x8}, 0x6d18) chdir(r1, &(0x7f0000000c00)='./file0/file0/file0\x00', 0x14) unlink(&(0x7f0000000c40)='./file0/file0/file0\x00', 0x14) unlink(&(0x7f0000000c80)='./file0/file1\x00', 0xe) 07:54:13 executing program 2: openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000000)='/net/ndb\x00', 0x9, 0x3, 0x0) openat$net_arp(0xffffffffffffff9c, &(0x7f0000000040)='/net/arp\x00', 0x9, 0x3, 0x0) r0 = openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000080)='/net/ndb\x00', 0x9, 0x3, 0x0) r1 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/tcp/1/data\x00', 0x10, 0x3, 0x0) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) abort_sysc_fd(r1) openat$net_ether0_addr(0xffffffffffffff9c, &(0x7f0000000140)='/net/ether0/addr\x00', 0x11, 0x3, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000180)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) fwstat(r0, &(0x7f0000000200)=""/224, 0xe0, 0x0) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/status\x00', 0x12, 0x1, 0x0) r2 = openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/args\x00', 0x10, 0x3, 0x0) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f00000003c0)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f0000000400)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000440)='/net/ipifc/1/snoop\x00', 0x13, 0x1, 0x0) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000480)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) abort_sysc_fd(r2) openat$dev_cputime(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000500)='/net/udp/0/status\x00', 0x12, 0x1, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000000540)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) r3 = openat$net_iproute(0xffffffffffffff9c, &(0x7f0000000580)='/net/iproute\x00', 0xd, 0x3, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) close(r3) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000600)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000640)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000700)='/net/tcp/2/ctl\x00', 0xf, 0x3, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000740)='/dev/killkid\x00', 0xd, 0x3, 0x0) 07:54:13 executing program 3: openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/local\x00', 0x11, 0x1, 0x0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/0/err\x00', 0xf, 0x3, 0x0) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) openat$dev_zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0xa, 0x1, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/note\x00', 0x10, 0x1, 0x0) r0 = proc_create(&(0x7f0000000140)='./file0\x00', 0x8, &(0x7f0000000180)='/proc/self/note\x00', 0x10, 0x1) notify(r0, 0x1, &(0x7f0000000240)={0xa, 0x1, 0x607, &(0x7f00000001c0)="dd6063154b2e7dcad8ecd9b85b651185fae7728ec3afd700dcbd7810555afa46d075773dbc5a7099ac5039a8ded35d92125672ab41a8d7bff062bc687d24f847e9c5482e4f9281d199f5a9c733cb4b4e82f3308c90bd815449", 0xfffffffffffffbff}) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000280)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/urandom\x00', 0xd, 0x1, 0x0) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000300)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/0/data\x00', 0x10, 0x3, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/urandom\x00', 0xd, 0x1, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000440)='/net/ether0/2/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000500)='/dev/kmesg\x00', 0xb, 0x1, 0x0) openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000540)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000580)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) getvcoreid() openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) openat$dev_config(0xffffffffffffff9c, &(0x7f0000000600)='/dev/config\x00', 0xc, 0x1, 0x0) proc_create(&(0x7f0000000640)='./file0\x00', 0x8, &(0x7f0000000680)='*+(\x03\'\x00', 0x6, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000740)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000780)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) notify(0xffffffffffffffff, 0x0, &(0x7f0000000880)={0x2, 0x5, 0x10001, &(0x7f00000007c0)="166b4ed54a08261f99b0837410db82388f8b7bd66cc7b6d132115d8246963988485379d2bd9a7096d3ac5c09c9108992c8d6cbfa5a0f30eae2c59bc41552e34d2a5805d2cdf72abd269bda4320b8d78cee82a2eb84a4aa2f28253ef20fbb8b6ce7478534cec2bc3ca54451f632d48595fb04ecd03a0afb2d5b1935c7d6eba9d3f160c0b8ae7234ab2a9e90a27309e4b4904061d3369704b2b66756312df82e199b4fa5b19a38fd9b48b52e93f10e56a49f4b08f6eb2a", 0x8000}) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f00000008c0)='/prof/mpstat\x00', 0xd, 0x3, 0x0) 07:54:13 executing program 4: r0 = openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000000000)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) llseek(r0, 0xfff, 0x616, &(0x7f0000000040), 0xf8665e329c585dac) r1 = openat$dev_hostdomain(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hostdomain\x00', 0x10, 0x3, 0x0) llseek(r0, 0x1, 0x80000001, &(0x7f00000000c0), 0x1) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) r2 = fcntl$F_DUPFD(r1, 0x0, r0, 0x1) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000140)='/net/cs\x00', 0x8, 0x3, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/maps\x00', 0x10, 0x1, 0x0) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) r3 = openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000000240)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/status\x00', 0x12, 0x1, 0x0) r4 = openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000000300)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000340)='/dev/sdctl\x00', 0xb, 0x3, 0x0) openat$net_tcp_2_err(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/2/err\x00', 0xf, 0x3, 0x0) openat$net_tcp_stats(0xffffffffffffff9c, &(0x7f00000003c0)='/net/tcp/stats\x00', 0xf, 0x1, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000400)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) r5 = proc_create(&(0x7f00000004c0)='./file0\x00', 0x8, &(0x7f0000000500)='\x00', 0x1, 0x1) dup_fds_to(r5, &(0x7f0000000540)=[{r2}, {r3}, {r4}, {r2}, {r1}], 0x5) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000580)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f00000005c0)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000600)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000640)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$net_log(0xffffffffffffff9c, &(0x7f0000000680)='/net/log\x00', 0x9, 0x3, 0x0) openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f00000006c0)='/net/tcp/1/listen\x00', 0x12, 0x3, 0x0) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/ns\x00', 0xe, 0x1, 0x0) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000740)='/dev/kmesg\x00', 0xb, 0x1, 0x0) 07:54:13 executing program 5: openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000000)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) rmdir(&(0x7f0000000080)='./file0\x00', 0x8) mkdir(&(0x7f00000000c0)='./file0\x00', 0x8, 0x20) openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/ns\x00', 0xe, 0x1, 0x0) rmdir(&(0x7f0000000140)='./file0\x00', 0x8) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) r0 = openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pgrpid\x00', 0xc, 0x1, 0x0) openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000200)='/dev/sysname\x00', 0xd, 0x3, 0x0) openat$net_icmpv6_clone(0xffffffffffffff9c, &(0x7f0000000240)='/net/icmpv6/clone\x00', 0x12, 0x3, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000280)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000300)='/net/ether0/2/type\x00', 0x13, 0x1, 0x0) openat$net_ether0_0_ifstats(0xffffffffffffff9c, &(0x7f0000000340)='/net/ether0/0/ifstats\x00', 0x16, 0x1, 0x0) openat$proc_self_args(0xffffffffffffff9c, &(0x7f0000000380)='/proc/self/args\x00', 0x10, 0x3, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f00000003c0)='/net/udp/clone\x00', 0xf, 0x3, 0x0) lstat(&(0x7f0000000400)='./file0\x00', 0x8, &(0x7f0000000440)) openat$dev_hostowner(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/hostowner\x00', 0xf, 0x3, 0x0) fcntl$F_SETFL(r0, 0x4, 0x8000) r1 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f0000000540)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000580)='/dev/sysctl\x00', 0xc, 0x3, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f00000005c0)='/prof/kpdata\x00', 0xd, 0x3, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000600)='/prof/kpdata\x00', 0xd, 0x3, 0x0) close(r1) rmdir(&(0x7f0000000640)='./file0\x00', 0x8) openat$dev_capuse(0xffffffffffffff9c, &(0x7f0000000680)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$dev_capuse(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/capuse\x00', 0xc, 0x3, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) openat$dev_stdin(0xffffffffffffff9c, &(0x7f0000000740)='/dev/stdin\x00', 0xb, 0x3, 0x0) 07:54:13 executing program 6: r0 = openat$net_tcp_clone(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/clone\x00', 0xf, 0x3, 0x0) fstat(r0, &(0x7f0000000040)) r1 = openat$net_ipifc_0_err(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/err\x00', 0x11, 0x3, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) r2 = openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) r3 = openat$dev_time(0xffffffffffffff9c, &(0x7f0000000180)='/dev/time\x00', 0xa, 0x3, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/pid\x00', 0x9, 0x1, 0x0) r4 = openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000200)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) openat$net_empty(0xffffffffffffff9c, &(0x7f0000000240)='/net/.empty\x00', 0xc, 0x3, 0x0) openat$net_tcp_0_ctl(0xffffffffffffff9c, &(0x7f0000000280)='/net/tcp/0/ctl\x00', 0xf, 0x3, 0x0) openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f00000002c0)='/net/tcp/1/local\x00', 0x11, 0x1, 0x0) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000300)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/profile\x00', 0x13, 0x1, 0x0) fcntl$F_SYNC(r4, 0x65) openat$net_tcp_0_local(0xffffffffffffff9c, &(0x7f0000000380)='/net/tcp/0/local\x00', 0x11, 0x1, 0x0) r5 = proc_create(&(0x7f00000003c0)='./file0\x00', 0x8, &(0x7f0000000400)='\x00', 0x1, 0x0) dup_fds_to(r5, &(0x7f0000000440)=[{r3}], 0x1) openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000480)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) r6 = openat$dev_pid(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000500)='/dev/cputime\x00', 0xd, 0x1, 0x0) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000540)='/net/udp/0/listen\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000580)='/net/ipifc/0/status\x00', 0x14, 0x1, 0x0) openat$dev_bintime(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/bintime\x00', 0xd, 0x3, 0x0) openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000600)='/dev/pid\x00', 0x9, 0x1, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) fcntl$F_DUPFD(r2, 0x0, r6, 0x1) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000680)='/net/ether0/0/type\x00', 0x13, 0x1, 0x0) write(r1, &(0x7f00000006c0)="def0d25732eb85543e7942db473cbeeb402d90", 0x13) openat$proc_self_user(0xffffffffffffff9c, &(0x7f0000000700)='/proc/self/user\x00', 0x10, 0x1, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000740)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) 07:54:13 executing program 7: unlink(&(0x7f0000000000)='./file0\x00', 0x8) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) r0 = openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/ns\x00', 0xe, 0x1, 0x0) r1 = openat$proc_self_profile(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/profile\x00', 0x13, 0x1, 0x0) openat$net_tcp_2_remote(0xffffffffffffff9c, &(0x7f0000000100)='/net/tcp/2/remote\x00', 0x12, 0x1, 0x0) openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000140)='/net/tcp/0/listen\x00', 0x12, 0x3, 0x0) stat(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000240)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f0000000280)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) openat$proc_self_fpregs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/self/fpregs\x00', 0x12, 0x1, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000300)='/prof/kpctl\x00', 0xc, 0x3, 0x0) unlink(&(0x7f0000000340)='./file0\x00', 0x8) fcntl$F_GETFD(r0, 0x1) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000380)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) tcgetattr(r1, &(0x7f00000003c0)) openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000400)='/net/ipifc/clone\x00', 0x11, 0x3, 0x0) openat$proc_self_note(0xffffffffffffff9c, &(0x7f0000000440)='/proc/self/note\x00', 0x10, 0x1, 0x0) openat$net_tcp_0_remote(0xffffffffffffff9c, &(0x7f0000000480)='/net/tcp/0/remote\x00', 0x12, 0x1, 0x0) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f00000004c0)='/prof/kpdata\x00', 0xd, 0x3, 0x0) openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000500)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000540)='/net/ether0/1/ifstats\x00', 0x16, 0x1, 0x0) openat$net_udp_0_err(0xffffffffffffff9c, &(0x7f0000000580)='/net/udp/0/err\x00', 0xf, 0x3, 0x0) openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f00000005c0)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000600)='/dev/caphash\x00', 0xd, 0x3, 0x0) openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000640)='/net/ipifc/1/local\x00', 0x13, 0x1, 0x0) openat$net_tcp_1_err(0xffffffffffffff9c, &(0x7f0000000680)='/net/tcp/1/err\x00', 0xf, 0x3, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f00000006c0)='/prof/kpctl\x00', 0xc, 0x3, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000700)='/net/udp/clone\x00', 0xf, 0x3, 0x0) openat$net_icmp_clone(0xffffffffffffff9c, &(0x7f0000000740)='/net/icmp/clone\x00', 0x10, 0x3, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000780)='/prof/.empty\x00', 0xd, 0x3, 0x0) bash-4.3$ Unhandled user trap in vcore context from VC 0 HW TRAP frame (partial) at 0xffffffffc8995e20 on core 1 rax 0x000000005a5a4e80 rbx 0x0000300000006e90 rcx 0x0000000000000150 rdx 0x000010000000a4c0 rbp 0x0000300000006e80 rsi 0x000010000000a5c0 rdi 0x000000005a5a4f80 r8 0x000000005a5a5a5a r9 0x000000005a5a4e80 r10 0x0000000000000000 r11 0x0000000000000200 r12 0x000000000040ff70 r13 0x000010000000a4c0 r14 0x0000000000000004 r15 0x00007f7fffa01200 trap 0x0000000e Page Fault gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000006 rip 0x000000000040fd56 cs 0x------------0023 flag 0x0000000000010202 rsp 0x0000300000006d80 ss 0x------------001b err 0x6 (for PFs: User 4, Wr 2, Rd 1), aux 0x000000005a5a4f80 Addr 0x000000000040fd56 is in syz-executor at offset 0x000000000000fd56 VM Regions for proc 38 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b5000): 0x00000005, 0x00000001, 0xffff800004187c20, 0x0000000000000000 01: (0x00000000004b5000 - 0x00000000004b6000): 0x00000005, 0x00000002, 0xffff800004187c20, 0x00000000000b5000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff800004187c20, 0x00000000000b6000 03: (0x00000000006b9000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff800004187c20, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000003d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 1: Offsets only matter for shared libraries #01 Addr 0x000000000040fd56 is in syz-executor at offset 0x000000000000fd56 #02 Addr 0x000000000041017e is in syz-executor at offset 0x000000000001017e #03 Addr 0x000000000041572d is in syz-executor at offset 0x000000000001572d #04 Addr 0x000000000040801b is in syz-executor at offset 0x000000000000801b #05 Addr 0x0000000000414b80 is in syz-executor at offset 0x0000000000014b80 #06 Addr 0x000000000040854a is in syz-executor at offset 0x000000000000854a #07 Addr 0x0000000000403f39 is in syz-executor at offset 0x0000000000003f39 #08 Addr 0x00000000004148ac is in syz-executor at offset 0x00000000000148ac #09 Addr 0x00000000004148b1 is in syz-executor at offset 0x00000000000148b1 07:54:18 executing program 0: openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/0/remote\x00', 0x14, 0x1, 0x0) r0 = openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000040)='/prof/mpstat\x00', 0xd, 0x3, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r0, 0x0) 07:54:18 executing program 0: openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) r0 = openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) r1 = openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) close(r0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000140)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000180)='/net/udp/stats\x00', 0xf, 0x1, 0x0) openat$proc_self_text(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/text\x00', 0x10, 0x1, 0x0) r2 = openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000200)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000240)='/net/ipifc/0/data\x00', 0x12, 0x3, 0x0) openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000280)='/dev/urandom\x00', 0xd, 0x1, 0x0) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f00000002c0)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f0000000300)='/net/ipifc/stats\x00', 0x11, 0x1, 0x0) openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/maps\x00', 0x10, 0x1, 0x0) r3 = openat$net_icmpv6_stats(0xffffffffffffff9c, &(0x7f0000000380)='/net/icmpv6/stats\x00', 0x12, 0x1, 0x0) tap_fds(&(0x7f0000000480)=[{r3, 0x2, 0x40, 0x4, &(0x7f0000000440)={&(0x7f00000003c0)="67ad168ae4e6d57d25f2fb4f5e9e08b2761f2071c4aee052658eca501b3c0e3cc3bc5f7774fb340f3c67f6b5d9dd8b933941c52ac5f81e386bfa48bb334e506e453301b09408d68fdff152b61b45d13a", 0xc866, 0x1, 0xfffffffffffffff8, 0x5, 0x5}}], 0x1) openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ether0/2/data\x00', 0x13, 0x3, 0x0) r4 = openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000500)='/dev/killkid\x00', 0xd, 0x3, 0x0) write(r4, &(0x7f0000000540)="6a6029be4578f9b98865c422a788f2acfc8dd2725679e9157c2856231251633b7b909d1ab1f9604c6d591917da13e50ec73c42cf7ebf16ac2473b23f5983f2e4f06264c0aed21213283e631afb165f14985f9ebe1fde3224c67319bd1e3bcabd9ded0ec3ca8f597abb368de4ea4fcea8ff27d075abde83fe96a79ae7c551fee190805cb9db6807067aab5a425611d8", 0x8f) fstat(r1, &(0x7f0000000600)) openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000680)='/prof/mpstat\x00', 0xd, 0x3, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ether0/1/type\x00', 0x13, 0x1, 0x0) openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000700)='/net/udp/clone\x00', 0xf, 0x3, 0x0) openat$proc_self_proc(0xffffffffffffff9c, &(0x7f0000000740)='/proc/self/proc\x00', 0x10, 0x1, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000780)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) openat$prof_kprintx(0xffffffffffffff9c, &(0x7f00000007c0)='/prof/kprintx\x00', 0xe, 0x3, 0x0) openat$net_tcp_2_listen(0xffffffffffffff9c, &(0x7f0000000800)='/net/tcp/2/listen\x00', 0x12, 0x3, 0x0) fd2path(r1, &(0x7f0000000840)=""/253, 0xfd) nmount(r2, &(0x7f0000000940)='./file0\x00', 0x8, 0x10) 07:54:19 executing program 0: r0 = openat$dev_urandom(0xffffffffffffff9c, &(0x7f0000000180)='/dev/urandom\x00', 0xd, 0x1, 0x0) pop_ctx(&(0x7f0000000000)="8d9ecb1be42d14eaae4c2ea1de46bfa98ac4bd1e3a8ffbc0dc13eadb8a28a502dab2db6ca63d207a6e2169d7b3d1a5bff2d5aaf80b06b3ed86a468094ec2a8388145622e36e9789b0e9c4b51cb816c69988bd39b00a44f3e52a36924ed5ecc8e576b93541037699bb01ace1886d02bc565b26638f2b6be996b3a7467b12cd95656045c7f40a1ff6323a63d237553b7b203f1b0d56e20ab5ac266d09477770ca8d231d76e216f191db8df0766e3706e31f799dec6147bfaab604bebc9fdada5f5265546553c3e379b3e3910b3fbfb15bf8d39e12e56f20c35") tcgetattr(r0, &(0x7f0000000600)) kernel panic at /syzkaller/managers/main/kernel/kern/include/kref.h:68, from core 1: assertion failed: kref_refcnt(kref) > 0 Stack Backtrace on Core 1: #01 [<0xffffffffc200a38c>] in backtrace #02 [<0xffffffffc2009b25>] in _panic #03 [<0xffffffffc203115b>] in kref_put #04 [<0xffffffffc2031828>] in cclose #05 [<0xffffffffc20321ba>] in cunique.part.9 #06 [<0xffffffffc2032dd6>] in walk #07 [<0xffffffffc2033429>] in __namec_from #08 [<0xffffffffc2034013>] in namec #09 [<0xffffffffc20413e6>] in sysopenat #10 [<0xffffffffc205940f>] in sys_openat #11 [<0xffffffffc205a019>] in syscall #12 [<0xffffffffc205a1f8>] in run_local_syscall #13 [<0xffffffffc205a739>] in prep_syscalls #14 [<0xffffffffc20abee2>] in sysenter_callwrapper kernel panic at kern/src/ns/chan.c:332, from core 2: cclose 0x0000000000000000 Stack Backtrace on Core 2: #01 [<0xffffffffc200a38c>] in backtrace #02 [<0xffffffffc2009b25>] in _panic #03 [<0xffffffffc203184a>] in cclose #04 [<0xffffffffc2033251>] in walk_symlink #05 [<0xffffffffc203323c>] in walk_symlink #06 [<0xffffffffc203323c>] in walk_symlink #07 [<0xffffffffc203323c>] in walk_symlink #08 [<0xffffffffc203323c>] in walk_symlink #09 [<0xffffffffc203323c>] in walk_symlink #10 [<0xffffffffc2032d52>] in walk #11 [<0xffffffffc2033429>] in __namec_from #12 [<0xffffffffc2034013>] in namec #13 [<0xffffffffc203d92d>] in sysunmount #14 [<0xffffffffc20565dd>] in sys_nunmount #15 [<0xffffffffc205a019>] in syscall #16 [<0xffffffffc205a1f8>] in run_local_syscall #17 [<0xffffffffc205a739>] in prep_syscalls #18 [<0xffffffffc20abee2>] in sysenter_callwrapper Entering Nanwan's Dungeon on Core 1 (Ints on): Type 'help' for a list of commands. Entering Nanwan's Dungeon on Core 2 (Ints on): ROS(Core 1)> Type 'help' for a list of commands.