Warning: Permanently added '10.128.0.135' (ECDSA) to the list of known hosts. 2022/07/25 02:22:18 parsed 1 programs [ 416.2986080] kqueue_register: syz-execprog[1185]: event type 0 not supported for file type 5/(null) (error 45) [ 416.4685025] kqueue_register: syz-execprog[1185]: event type 0 not supported for file type 5/(null) (error 45) 2022/07/25 02:22:21 executed programs: 0 [ 421.1784874] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1206 command syz-executor.0) [ 421.8284546] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1360 command syz-executor.0) [ 422.5084037] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1372 command syz-executor.0) [ 423.1385146] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1201 command syz-executor.0) [ 423.7684670] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1510 command syz-executor.0) [ 424.4183582] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1362 command syz-executor.0) 2022/07/25 02:22:27 executed programs: 7 [ 425.0583425] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1356 command syz-executor.0) [ 425.6882902] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 330 command syz-executor.0) [ 426.2883782] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 323 command syz-executor.0) [ 426.8983546] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1072 command syz-executor.0) [ 427.5282975] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1330 command syz-executor.0) [ 428.1382942] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1317 command syz-executor.0) [ 428.7481642] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1485 command syz-executor.0) [ 429.3782284] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1480 command syz-executor.0) [ 430.0181507] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1497 command syz-executor.0) 2022/07/25 02:22:32 executed programs: 16 [ 430.6482698] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1479 command syz-executor.0) [ 431.2482207] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1449 command syz-executor.0) [ 431.8683172] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1494 command syz-executor.0) [ 432.4682049] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 1335 command syz-executor.0) [ 432.5981238] panic: kernel diagnostic assertion "ks->ks_pshared_proc == NULL" failed: file "/syzkaller/managers/ci2-netbsd/kernel/sys/kern/uipc_sem.c", line 501 [ 432.7848457] cpu0: Begin traceback... [ 432.8979882] vpanic() at netbsd:vpanic+0x282 [ 433.3779644] _sub_D_65535_0() at netbsd:_sub_D_65535_0+-0x34c4 [ 433.7679451] ksem_free() at netbsd:ksem_free+0x25b [ 434.1479312] do_ksem_init() at netbsd:do_ksem_init+0x30b [ 434.5179194] sys___syscall() at netbsd:sys___syscall+0x10e [ 434.9179071] syscall() at netbsd:syscall+0x25a [ 435.0400513] --- syscall (number 247 via SYS_syscall) --- [ 435.1979227] netbsd:syscall+0x25a: [ 435.2402735] cpu0: End traceback... [ 435.2870826] fatal breakpoint trap in supervisor mode [ 435.3516601] trap type 1 code 0 rip 0xffffffff80220a4d cs 0x8 rflags 0x286 cr2 0x20000040 ilevel 0 rsp 0xffffd1819db5bb60 [ 435.4909182] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db5b680 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db5b1a0 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db5acc0 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db5a7e0 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db5a300 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db59e20 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db59940 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db59460 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db58f80 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db58aa0 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db585c0 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db580e0 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db57c00 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db57720 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db57240 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e [ 435.5921123] fatal page fault in supervisor mode [ 435.5921123] trap type 6 code 0 rip 0xffffffff81b840cb cs 0x8 rflags 0x10283 cr2 0xffff90000000003d ilevel 0x8 rsp 0xffffd1819db56d60 [ 435.5921123] curlwp 0xffffd180133e1480 pid 1335.1490 lowest kstack 0xffffd1819db542c0 kernel: page fault trap, code=0 [ 435.5921123] uvm_fault(0xffffd18012cfb5f0, 0xffff900000000000, 1) -> e