Fatal trap 12: page fault while in kernel mode interface if_tuntap.1 already present in the KLD 'kernel'! cpuid = 0; apic id = 00 09:55:47 executing program 0: r0 = socket(0x2, 0x10000001, 0x84) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="82052e2f66696c653000"], 0x10) sendto(r0, &(0x7f0000000140)='%', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6}, 0xb) setsockopt$inet6_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x80000001}, 0x10) recvfrom$unix(r0, &(0x7f00000006c0)=""/159, 0x9f, 0x0, 0x0, 0x0) execve(0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) shutdown(r0, 0x1) 09:55:47 executing program 1: r0 = socket(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x339) setsockopt$inet6_tcp_int(r0, 0x6, 0x100, &(0x7f0000000040), 0x4) fault virtual address = 0x0 linker_load_file: /boot/kernel/if_tap.ko - unsupported file type fault code = supervisor read data, page not present instruction pointer = 0x20:0xffffffff818a8ffd stack pointer = 0x28:0xfffffe001fab80f0 frame pointer = 0x28:0xfffffe001fab8150 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 804 (syz-executor.2) trap number = 12 panic: page fault cpuid = 0 time = 1558605347 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe001fab7d50 vpanic() at vpanic+0x1e0/frame 0xfffffe001fab7db0 panic() at panic+0x43/frame 0xfffffe001fab7e10 trap_fatal() at trap_fatal+0x4c6/frame 0xfffffe001fab7e90 trap_pfault() at trap_pfault+0x9f/frame 0xfffffe001fab7f00 trap() at trap+0x44d/frame 0xfffffe001fab8020 calltrap() at calltrap+0x8/frame 0xfffffe001fab8020 --- trap 0xc, rip = 0xffffffff818a8ffd, rsp = 0xfffffe001fab80f0, rbp = 0xfffffe001fab8150 --- link_elf_search_symbol() at link_elf_search_symbol+0x7d/frame 0xfffffe001fab8150 linker_ddb_search_symbol() at linker_ddb_search_symbol+0xa7/frame 0xfffffe001fab81b0 stack_sbuf_print_ddb() at stack_sbuf_print_ddb+0x6a/frame 0xfffffe001fab8210 witness_debugger() at witness_debugger+0xa7/frame 0xfffffe001fab8340 witness_checkorder() at witness_checkorder+0xf72/frame 0xfffffe001fab83f0 lockmgr_xlock_hard() at lockmgr_xlock_hard+0xb5/frame 0xfffffe001fab8480 __lockmgr_args() at __lockmgr_args+0x488/frame 0xfffffe001fab8530 ffs_lock() at ffs_lock+0xea/frame 0xfffffe001fab8590 VOP_LOCK1_APV() at VOP_LOCK1_APV+0xc5/frame 0xfffffe001fab85c0 _vn_lock() at _vn_lock+0xaf/frame 0xfffffe001fab8630 vget() at vget+0xb1/frame 0xfffffe001fab8680 vfs_hash_get() at vfs_hash_get+0x148/frame 0xfffffe001fab86d0 ffs_vgetf() at ffs_vgetf+0x51/frame 0xfffffe001fab8760 softdep_sync_buf() at softdep_sync_buf+0x444/frame 0xfffffe001fab8850 ffs_syncvnode() at ffs_syncvnode+0x394/frame 0xfffffe001fab88e0 VOP_FDATASYNC_APV() at VOP_FDATASYNC_APV+0xc5/frame 0xfffffe001fab8910 kern_fsync() at kern_fsync+0x290/frame 0xfffffe001fab8980 amd64_syscall() at amd64_syscall+0x436/frame 0xfffffe001fab8ab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe001fab8ab0 --- syscall (198, FreeBSD ELF64, nosys), rip = 0x41309a, rsp = 0x7fffdfffdf38, rbp = 0x1 --- KDB: enter: panic [ thread pid 804 tid 100120 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why