2020/04/25 18:34:40 parsed 1 programs 2020/04/25 18:34:40 executed programs: 0 bash-4.3$ Backtrace of user context on Core 2: Offsets only matter for shared libraries #01 Addr 0x000000000040a28d is in syz-executor at offset 0x000000000000a28d #02 Addr 0x0000000000416f84 is in syz-executor at offset 0x0000000000016f84 #03 Addr 0x000000000040cfa4 is in syz-executor at offset 0x000000000000cfa4 #04 Addr 0x000000000040cfd6 is in syz-executor at offset 0x000000000000cfd6 #05 Addr 0x000000000040d122 is in syz-executor at offset 0x000000000000d122 #06 Addr 0x0000000000408758 is in syz-executor at offset 0x0000000000008758 #07 Addr 0x0000000000400708 is in syz-executor at offset 0x0000000000000708 #08 Addr 0x0000000000408a75 is in syz-executor at offset 0x0000000000008a75 #09 Addr 0x0000000000438fd9 is in syz-executor at offset 0x0000000000038fd9 #10 Addr 0x0000000000438d30 is in syz-executor at offset 0x0000000000038d30 #11 Addr 0x00000000004037b0 is in syz-executor at offset 0x00000000000037b0 #12 Addr 0x0000000000000000 has no VMR kernel panic at kern/arch/x86/trap.c:640, from core 0: Damn Damn! Unhandled trap in the kernel! HW TRAP frame at 0xfffffff0010547b0 on core 0 rax 0x0000000000000008 rbx 0xffff80000219aac0 rcx 0xffff800003b15000 rdx 0x0000000000000000 rbp 0xfffffff0010548c8 rsi 0x0000000020000200 rdi 0xffff80000219aac0 r8 0x0000000000000000 r9 0x0000000000000000 r10 0x00000000000005b8 r11 0xffff8000050ca6dc r12 0x0000000020000200 r13 0x0000000000000000 r14 0xfffffff001054910 r15 0xffff800002199b81 trap 0x00000000 Divide error gsbs 0xffffffffc8f70b00 fsbs 0x0000000000000000 err 0x--------00000000 rip 0xffffffffc2007c8e cs 0x------------0008 flag 0x0000000000010202 rsp 0xfffffff001054878 ss 0x------------0000 Backtrace of kernel context on Core 0: #01 [<0xffffffffc2007c8e>] in send_event #02 [<0xffffffffc20086f4>] in fire_tap #03 [<0xffffffffc201686b>] in fire_data_taps #04 [<0xffffffffc20168ba>] in ip_wake_cb #05 [<0xffffffffc203bf07>] in __qbwrite #06 [<0xffffffffc203cc0b>] in qpassnolim #07 [<0xffffffffc202f621>] in tcpiput #08 [<0xffffffffc201e902>] in ipiput4 #09 [<0xffffffffc201acc1>] in etherread4 #10 [<0xffffffffc200b994>] in __ktask_wrapper #11 [<0xffffffffc205bfed>] in process_routine_kmsg #12 [<0xffffffffc205597e>] in __smp_idle Entering Nanwan's Dungeon on Core 0 (Ints off): Type 'help' for a list of commands.