2020/03/24 10:52:37 parsed 1 programs 2020/03/24 10:52:37 executed programs: 0 2020/03/24 10:52:39 result: hanged=false err=executor 6: EOF ssh_exchange_identification: Connection closed by remote host 2020/03/24 10:52:42 executed programs: 17 2020/03/24 10:52:48 executed programs: 33 2020/03/24 10:52:53 executed programs: 81 2020/03/24 10:52:58 executed programs: 129 2020/03/24 10:53:03 executed programs: 177 2020/03/24 10:53:08 executed programs: 225 2020/03/24 10:53:13 executed programs: 273 2020/03/24 10:53:18 executed programs: 321 2020/03/24 10:53:23 executed programs: 369 2020/03/24 10:53:28 executed programs: 417 2020/03/24 10:53:33 executed programs: 466 2020/03/24 10:53:38 executed programs: 513 2020/03/24 10:53:43 executed programs: 563 2020/03/24 10:53:49 executed programs: 613 2020/03/24 10:53:54 executed programs: 663 2020/03/24 10:53:59 executed programs: 713 2020/03/24 10:54:04 executed programs: 763 2020/03/24 10:54:09 executed programs: 812 2020/03/24 10:54:14 executed programs: 861 2020/03/24 10:54:19 executed programs: 911 2020/03/24 10:54:24 executed programs: 960 2020/03/24 10:54:30 executed programs: 1009 2020/03/24 10:54:35 executed programs: 1057 2020/03/24 10:54:40 executed programs: 1105 2020/03/24 10:54:45 executed programs: 1153 2020/03/24 10:54:50 executed programs: 1201 2020/03/24 10:54:55 executed programs: 1249 2020/03/24 10:55:00 executed programs: 1297 2020/03/24 10:55:05 executed programs: 1346 bash-4.3$ Unhandled user trap from early SCP HW TRAP frame (partial) at 0xffffffffc8f42b60 on core 0 rax 0x0000000000000000 rbx 0x0000000000000558 rcx 0x0000000000000006 rdx 0x00000000000000f8 rbp 0x00007f7fff9fed80 rsi 0x00000000006b63e0 rdi 0x0000100000003f50 r8 0x0000000000000000 r9 0x0000000000000001 r10 0x0000000000000000 r11 0x0000000000000200 r12 0x00000000000000f8 r13 0x0000000000ae0628 r14 0x0000000000000000 r15 0x0000000000000001 trap 0x0000000e Page Fault gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000006 rip 0x00000000004354f1 cs 0x------------0023 flag 0x0000000000010207 rsp 0x00007f7fff9fed28 ss 0x------------001b err 0x6 (for PFs: User 4, Wr 2, Rd 1), aux 0x0000100000003f50 Addr 0x00000000004354f1 is in syz-executor at offset 0x00000000000354f1 VM Regions for proc 1452 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b6000): 0x00000005, 0x00000001, 0xffff80007e883220, 0x0000000000000000 01: (0x00000000004b6000 - 0x00000000004b7000): 0x00000005, 0x00000002, 0xffff80007e883220, 0x00000000000b6000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff80007e883220, 0x00000000000b6000 03: (0x00000000006b9000 - 0x0000000000ae5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff80007e883220, 0x0000000000000000 06: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 07: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 0: Offsets only matter for shared libraries #01 Addr 0x00000000004354f1 is in syz-executor at offset 0x00000000000354f1 #02 Addr 0x000000000041838b is in syz-executor at offset 0x000000000001838b #03 Addr 0x0000000000404022 is in syz-executor at offset 0x0000000000004022 #04 Addr 0x000000000040430a is in syz-executor at offset 0x000000000000430a #05 Addr 0x0000000000416da0 is in syz-executor at offset 0x0000000000016da0 #06 Addr 0x000000000041698c is in syz-executor at offset 0x000000000001698c #07 Addr 0x0000000000401a37 is in syz-executor at offset 0x0000000000001a37 kernel panic at kern/src/kmalloc.c:67, from core 0: Kmalloc failed! Handle me! Stack Backtrace on Core 0: #01 [<0xffffffffc200a7fc>] in backtrace #02 [<0xffffffffc2009f95>] in _panic #03 [<0xffffffffc200ad9e>] in kmalloc #04 [<0xffffffffc2030e98>] in block_alloc #05 [<0xffffffffc206364b>] in igbereplenish #06 [<0xffffffffc2064e09>] in igberproc #07 [<0xffffffffc200b724>] in __ktask_wrapper #08 [<0xffffffffc205bced>] in process_routine_kmsg #09 [<0xffffffffc205567e>] in __smp_idle Entering Nanwan's Dungeon on Core 0 (Ints on): Type 'help' for a list of commands.