[ 139.7345872] panic: kernel diagnostic assertion "mp->mnt_refcnt > 0 || mutex_owned(&mountlist_lock)" failed: file "/syzkaller/managers/ci2-netbsd-kmsan/kernel/sys/kern/vfs_mount.c", line 274 [ 139.7545713] cpu1: Begin traceback... [ 139.7845756] vpanic() at netbsd:vpanic+0xc9d [ 139.8345732] kern_assert() at netbsd:kern_assert+0x228 [ 139.8845760] mount_domount() at netbsd:mount_domount+0x22de sys/kern/vfs_mount.c:838 [ 139.9345743] do_sys_mount() at netbsd:do_sys_mount+0xc07 sys/kern/vfs_syscalls.c:616 [ 139.9845720] sys___mount50() at netbsd:sys___mount50+0x1bf sys/kern/vfs_syscalls.c:534 [ 140.0345754] sys___syscall() at netbsd:sys___syscall+0x2c6 sys/kern/sys_syscall.c:90 [ 140.0945723] syscall() at netbsd:syscall+0x60c sy_invoke sys/sys/syscallvar.h:94 [inline] [ 140.0945723] syscall() at netbsd:syscall+0x60c sys/arch/x86/x86/syscall.c:138 [ 140.1145744] --- syscall (number 410 via SYS_syscall) --- [ 140.1245738] netbsd:syscall+0x60c: [ 140.1345720] cpu1: End traceback... [ 140.1345720] fatal breakpoint trap in supervisor mode [ 140.1445678] trap type 1 code 0 rip 0xffffffff802228ad cs 0x8 rflags 0x282 cr2 0x7d23a9513578 ilevel 0 rsp 0xffffa3808973f7d0 [ 140.1545688] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973f1c0 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973ebb0 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973e5a0 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973df90 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973d980 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973d370 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973cd60 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973c750 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973c140 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973bb30 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973b520 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0 [ 140.1645681] uvm_fault(0xffffa3801357b858, 0x0, 1) -> e [ 140.1645681] fatal page fault in supervisor mode [ 140.1645681] trap type 6 code 0 rip 0xffffffff848ae8f7 cs 0x8 rflags 0x10246 cr2 0x1e8 ilevel 0x8 rsp 0xffffa3808973af10 [ 140.1645681] curlwp 0xffffa38013a4f300 pid 6230.10546 lowest kstack 0xffffa380897382c0 kernel: page fault trap, code=0