2018/07/16 15:53:09 fuzzer started 2018/07/16 15:53:09 dialing manager at 127.0.0.1:37389 2018/07/16 15:53:09 syscalls: 69 2018/07/16 15:53:09 code coverage: support is not implemented in syzkaller 2018/07/16 15:53:09 comparison tracing: support is not implemented in syzkaller 2018/07/16 15:53:09 setuid sandbox: support is not implemented in syzkaller 2018/07/16 15:53:09 namespace sandbox: support is not implemented in syzkaller 2018/07/16 15:53:09 fault injection: support is not implemented in syzkaller 2018/07/16 15:53:09 leak checking: support is not implemented in syzkaller 2018/07/16 15:53:09 net packed injection: support is not implemented in syzkaller 2018/07/16 15:53:09 net device setup: support is not implemented in syzkaller 15:53:09 executing program 0: 15:53:09 executing program 1: 15:53:09 executing program 2: 15:53:09 executing program 3: 15:53:09 executing program 4: 15:53:09 executing program 5: 15:53:09 executing program 6: 15:53:09 executing program 7: 15:53:10 executing program 0: 15:53:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) mkdir(&(0x7f00000001c0)='./file0/file1\x00', 0x0, 0x0) rename(&(0x7f00000003c0)='./file0/file1\x00', 0x0, &(0x7f0000000000), 0x0) 15:53:10 executing program 0: mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0, 0x0) rmdir(&(0x7f0000000000)='./file0\x00', 0x0) 15:53:10 executing program 0: mprotect(&(0x7f0000013000/0x4000)=nil, 0x4000, 0x2) 15:53:10 executing program 0: mkdir(&(0x7f0000000100)='./file1\x00', 0x0, 0x0) 15:53:10 executing program 0: mkdir(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) 15:53:10 executing program 0: mmap(&(0x7f0000013000/0x2000)=nil, 0x2000, 0x2003, 0x32, 0xffffffffffffffff, 0x0) 15:53:10 executing program 0: 15:53:10 executing program 0: 15:53:11 executing program 1: openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2009c1, 0x84, 0x0) 15:53:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x40002009c8, 0x102, 0x0) 15:53:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x200000940, 0xffffffffffffffff, 0x0) 15:53:14 executing program 4: rmdir(&(0x7f0000000000)='./file0\x00', 0x0) 15:53:15 executing program 5: mkdir(&(0x7f0000000080)='./file0\x00', 0x81, 0x0) 15:53:16 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000140)="e91f7189591e9233614b00", 0x101340, 0x2, 0x0) 15:53:17 executing program 7: mkdir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0, 0x80100, 0x0) 15:53:17 executing program 6: mkdir(&(0x7f0000000000)='./control\x00', 0x0, 0x0) rmdir(&(0x7f00000000c0)='./control\x00', 0x0) 15:53:17 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0xfffffffffffffffd, 0x0) 15:53:17 executing program 3: readlink(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000000), 0x0) 15:53:17 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x71001, 0x110, 0x0) 15:53:17 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x2009c1, 0x81, 0x0) 15:53:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x200900, 0x102, 0x0) 15:53:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0, 0x0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x2009c5, 0x1, 0x0) 15:53:17 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000140)='.\x00', 0x200, 0x5, 0x0) 15:53:17 executing program 2: readlink(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000000), 0x0) 15:53:17 executing program 6: bash-4.3$ HW TRAP frame at 0xfffffff0000b2d30 on core 1 15:53:17 executing program 4: 15:53:17 executing program 7: 2018/07/16 15:53:17 executor failed 0 times: executor 0: failed: Warning: Permanently added '[localhost]:28127' (RSA) to the list of known hosts. bad input size 648, want 400 (errno 0) child failed (errno 0) rax 0x0000000000000000 rbx 0xffff800005ae6ca0 rcx 0xfffffff0000b2ea0 rdx 0xfffffff0000b2d6c rbp 0xfffffff0000b2e38 rsi 0x0000000000000000 rdi 0xfffffff0000b2ea0 r8 0x0000000000000000 r9 0x0000000000000000 r10 0x000010000000a4c0 r11 0x0000000000000206 r12 0xffff80000217edc0 r13 0x0000000020000000 r14 0x0000000000000073 r15 0x0000000000000000 trap 0x0000000e Page Fault gsbs 0xffffffffc8667c40 fsbs 0x0000000000000000 err 0x--------00000000 rip 0xffffffffc2058134 cs 0x------------0008 flag 0x0000000000010246 rsp 0xfffffff0000b2df8 ss 0x------------0010 Backtrace of kernel context on Core 1: 01 [<0xffffffffc2058134>] in sys_readlink #TRAP frame at 0xfffff0ff0000a3d30 on core 2 0 rax 0x0000000000000000 a rbx 0xffff80x 0xffff800013db2020 0 in sys_readlink 0#02 [<0xffffff2059ffc2059149>] in syscall 104>]# rcx 0xfffffff0000a3ea0 rcx 0xfffffff0000a3ea0 rdx in run_local_syscall 0ffffffffc20598#04 [<0xffffffffc2059839>] in prep_syscalls 3#05 [<0xffffffffc20aaf1a>] in sysenter_callwrapper akernel panic at kern/arch/x86/thrap/.c:311, from core 1: Proc-ful Page Fault irn the Kernel at 0x000000000000001b!oc-ful Page Fault in the Stack Backtrace on Core 1: t#01 [<0xffffffffc200a3b7>] in backtrace 1#02 [<0xffffffffc2009b7 c>] []_p rdi 0axfffffff0000a3neic a#03 [<0x>]f r8 0x0000000000000000 00 r9 0x0000000000000000 0 r10 0x0000010000000a100040000a4c0 c i0 n r11 0x0000000000000206 trap r12 0xffff800002182ac0 r13 0x0000000020000000 r14 0x0000000000000073 r15 0x0000000000000000 trap 0x0000000e Page Fault gsbs 0xffffffffc8667ec0 fsbs 0x00fsb00000000000000 s err 0x--------00000000 rip 0xffffffffc2058134 0x--- cs 0x-------------0008 - flag 0x0000000000010246 0 rsp 0xfffffff0000a3df8 f ss 0x------------0010 -nel context oBacktrace of kernel context on Core 2: nys_readlink #n's Dungeon on Core 10Ints off): (Ints off): fType 'help' forr a list of commands. adlink #02 [<0c2059149>] in syscalx 1)> fffc2ROS(Core 1)> 059149>] in syscall #03 [<0xffffffffc2059304>] in run_local_syscall