Nov 29 00:01:46 ci2-netbsd-kubsan-3 getty[533]: /dev/ttyE3: Device not configured NetBSD/amd64 (ci2-netbsd-kubsan-3.c.syzkaller.internal) (console) Warning: Permanently added '10.128.1.14' (ECDSA) to the list of known hosts. 2019/11/29 00:01:53 fuzzer started 2019/11/29 00:01:53 dialing manager at 10.128.0.105:33729 2019/11/29 00:01:53 syscalls: 211 2019/11/29 00:01:53 code coverage: enabled 2019/11/29 00:01:53 comparison tracing: enabled 2019/11/29 00:01:53 extra coverage: support is not implemented in syzkaller 2019/11/29 00:01:53 setuid sandbox: support is not implemented in syzkaller 2019/11/29 00:01:53 namespace sandbox: support is not implemented in syzkaller 2019/11/29 00:01:53 Android sandbox: support is not implemented in syzkaller 2019/11/29 00:01:53 fault injection: support is not implemented in syzkaller 2019/11/29 00:01:53 leak checking: support is not implemented in syzkaller 2019/11/29 00:01:53 net packet injection: support is not implemented in syzkaller 2019/11/29 00:01:53 net device setup: support is not implemented in syzkaller 2019/11/29 00:01:53 concurrency sanitizer: support is not implemented in syzkaller 2019/11/29 00:01:53 devlink PCI setup: support is not implemented in syzkaller 00:01:59 executing program 0: mknod(&(0x7f0000000000)='./bus\x00', 0x100000000804f, 0x5900) r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) poll(&(0x7f0000000080)=[{r0, 0x7f}], 0x1, 0x0) 00:01:59 executing program 1: syz_emit_ethernet(0x36, &(0x7f00000001c0)) 00:01:59 executing program 2: syz_emit_ethernet(0x12, &(0x7f0000000080)) 00:01:59 executing program 3: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0}, 0x1c) 00:01:59 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0) writev(r1, &(0x7f0000000300)=[{&(0x7f0000004180)='%', 0x1}], 0x1) mmap(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x4, 0xa10, r1, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x10, r0, 0x0, 0x0) r2 = socket$inet6(0x18, 0x3, 0x0) setsockopt(r2, 0x29, 0x9, &(0x7f0000000240)="00000bdd", 0x4) 00:01:59 executing program 5: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x200007ff, &(0x7f0000deaff0)={0x2, 0x0}, 0x10) 00:02:02 executing program 0: 00:02:02 executing program 0: 00:02:02 executing program 2: 00:02:02 executing program 0: 00:02:02 executing program 2: 00:02:02 executing program 1: 00:02:02 executing program 3: 00:02:02 executing program 5: 00:02:02 executing program 0: 00:02:02 executing program 2: 00:02:02 executing program 1: 00:02:02 executing program 4: 00:02:02 executing program 5: 00:02:02 executing program 2: 00:02:02 executing program 0: msgsnd(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="01"], 0x1, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/84}, 0x5c, 0x1, 0x0) 00:02:02 executing program 3: login: [ 46.3633045] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 556 command syz-executor.4) [ 46.3733191] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 556 command syz-executor.4) [ 46.3733191] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 556 command syz-executor.4) [ 46.3833294] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 556 command syz-executor.4) 00:02:02 executing program 2: 00:02:02 executing program 5: 00:02:02 executing program 2: 00:02:02 executing program 1: 00:02:03 executing program 0: 00:02:03 executing program 5: 00:02:03 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket(0x2, 0xc003, 0x0) connect$unix(r1, &(0x7f0000000200)=ANY=[@ANYBLOB="8202adfdffffffffffff3f7b238bf46854d78a2a197a386207000000008295955984c87910bf093f68c11700287ead4bcb777fa69dfceac2a84e6abca64896819f507d0000000000002951b15801360bcd4c0a162b58fd4237b8fa4d012ae447473c220495aaee48c02f6ac41e6bf3bf554799000000ed52beb85a85f8b2fd57d60f13ad30505e8f5300a4aeef9d612f871f4385f04157795ea4a5c5fe659fa202361cd8cac7dfbc5b65c6593d2870b41200003500000000d28418ac1b00000000029cc4ac3908ddba44fb4bc922136e000000000000000000df28d208000000000000006b47b8d7da4333ac0f994166518bed2e1977bd035f5ea1b1009e5a319d54401cb92f77420eea4173d5b6913eef9e8b0fb636710000d2df0ac87e0d7b65b7240cf97d03126da536ef612e9e3b8098424082bec304ee9a498252abb7cc5bac417e2ab04fd8a9c98e958ff55d090000000000000036d11b2434c929b34b0587cf25dd9e1e49f931a4193897b0a30000cbf637786819bf7e26863a111574bd1b6d85eac8a829bf8aa02ae50c88910a9f37f502de8d7ff9f49d884ee2cf3725b1a0581adf2ea95d000000000000f145c4e68bfa8bfccf6a2c9ce08a146ee556cff99645d300682b4e970f01b899f51da0ff8237ed6b5a9c5d5f156378a27e42cfc93123b8284e6b47e3f7dc2a8bcc719fe6682881ea2fd58ed735230fb7146a26ab3d3f3708e2029d36d56bf5f227030446137813494ae280cccf91369550920561600ca47307e5d5337eab3e8cee8104fbdb87443107"], 0x10) dup2(r1, r0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r2 = dup(r0) sendto$inet6(r2, &(0x7f0000000040), 0xfcec, 0x0, 0x0, 0x0) 00:02:03 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(r0, 0x0, &(0x7f0000000100)) 00:02:03 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000200)='/', 0x0, 0x0) getdents(r0, 0x0, 0x0) 00:02:03 executing program 0: socket(0x800000018, 0x0, 0x0) 00:02:03 executing program 4: open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x18, 0x3, 0x0) r1 = socket(0x18, 0x1, 0x0) connect$unix(r1, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) dup2(r1, r0) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) pwrite(r0, &(0x7f0000000040)="32e0989f27814c574e9d7b7c44c928c348146d45584ecedbb08524d86d2dff7e7c087602009de262aab0c051a5919e92c7cb9253487e8ed3f06946f1369c992a8fcc5e793394f49074ee34b3c6651ee6be30d642fce198c90421fe73ee259afa3c491f1a5b3df10799c527f058aad5a7c5ee6a7e8881a56e072be972e282abd1eaf47ed3b8f66a64295c995beac9a6890b0e969605830ba3525f27f4b9f0f1fadfccddca", 0xa4, 0x41e) _lwp_exit() 00:02:03 executing program 5: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x80000000000000c, &(0x7f0000000180), 0x14) r1 = socket(0x18, 0x3, 0x0) r2 = socket(0x18, 0x1, 0x0) connect$unix(r2, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) dup2(r2, r1) r3 = socket$unix(0x1, 0xf, 0x0) getsockopt$SO_PEERCRED(r3, 0xffff, 0x11, &(0x7f0000000040), 0xc) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f0000000100)=@file={0x0, './file0\x00'}, 0xff2e) bind$unix(r1, &(0x7f0000000000)=@abs={0x1, 0x0, 0x0}, 0x8) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0xa, 0xffffffffffffffff) 00:02:03 executing program 2: mlock(&(0x7f0000fff000/0x1000)=nil, 0x1000) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000180)={{}, {0xffffffffffffffff}}, 0x0) open$dir(&(0x7f0000000080)='./file0/../file0\x00', 0x8, 0x40) 00:02:03 executing program 5: mknod$loop(&(0x7f00000000c0)='./file0\x00', 0x1000, 0xffffffffffffffff) unlinkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x409, 0x182) pwritev(r0, &(0x7f00000003c0)=[{&(0x7f0000000400)="58190ed060ffd62f3d53db06a93e47a7d8b3b61bdea9ba019b01e2ef77ad763f5756bef74e396b243b5db56ec95cbeef26dca1586b15c1a74a67468b955a2a958159a4b22b40fbb7ef3174dc3d970df6b66e447aa23f3175c257fb86a8769ece6ae69be7fc01928108997a46f7c14d675d9a30f920f945b3645b946cdbc9bff82f4890801739f4dca8db1c0e7903c0025e0019b151e02d828d035c09c96baeec60f28853f9010757428c71be1fbb4540d88eb0c4c6d0fffe52101efa7f", 0xbd}, {&(0x7f00000004c0)="8c0e2b2256f4be1ebfc833d2cfa99d9901985eb8465a038492e8f49eaba53fc6eb17dfad9f759769529d57f6e37fc731065c488b331ef7e0b7b74e561c906bee1898cd264f47fd8514d362b2b69e8383c325c97c6ddb5f792f4193fc526ae60f16f34194a7ea661544a84bdcd4e1f5b67ce6fee026ab852a", 0x78}, {&(0x7f00000002c0)="03e279aeaf064dc27c800c87a0d12e977ad1750cbe6f27d7006fc6126ee1a517ec090eb89aad4ea3debac5d91971783f43c623de4806da15a989b40a6df44438b054d2e07bba9e6b1724145ae5b5ac8d0ef8cc78477089c7981d73316ac366ee20abf625d1b80a99b9d26eeaedc08c792408e38d9b3507ae91f4a98d54c2d5a7f245dbd167d10aed4ee476b70cd4f4d4a2808cb34e5169e12dd472c95b444a2410814f9844a8255cf81187e44c4b7c0de1673fb1fa3ba6ddf8a5746b081ed2d67a238ae2496d7ee01fa16e6228a5bab2d04016c27626086c17cbaf11f31e8905bda65af1071a6abef003", 0xea}], 0x3, 0x4) 00:02:03 executing program 0: setuid(0x0) r0 = __clone(0x0, 0x0) ptrace(0x9, r0, 0x0, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000, 0x2) r2 = fcntl$dupfd(r1, 0x6, 0xffffffffffffffff) getpeername$inet6(r2, &(0x7f0000000040), &(0x7f0000000080)=0xc) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x600000) fcntl$getown(r3, 0x5) wait4(0x0, 0x0, 0x0, 0x0) ptrace(0x23, r0, 0x0, 0x0) 00:02:03 executing program 3: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x10) write(r0, 0x0, 0xffffffffffffffb5) r1 = socket(0x18, 0x3, 0x0) r2 = socket(0x18, 0x1, 0x0) connect$unix(r2, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) dup2(r2, r1) connect$unix(r1, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) setsockopt$sock_int(r1, 0xffff, 0x1003, &(0x7f0000000000)=0xff, 0x4) 00:02:03 executing program 1: munlockall() open$dir(&(0x7f0000000040)='./file0\x00', 0x2050631, 0x0) 00:02:03 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) write(r0, &(0x7f00000000c0)="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", 0x801) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, 0x0, 0x0) lchown(0x0, 0x0, 0x0) lchown(0x0, 0x0, 0x0) r1 = shmget$private(0x0, 0x2000, 0x10, &(0x7f0000ffc000/0x2000)=nil) shmctl$SHM_UNLOCK(r1, 0x4) chown(0x0, 0x0, 0x0) 00:02:03 executing program 3: r0 = socket(0x18, 0x1, 0x0) getsockopt(r0, 0x29, 0xd, 0x0, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_int(r1, 0xffff, 0x4, &(0x7f0000000100), &(0x7f0000000140)=0x4) r2 = socket(0x18, 0x3, 0x0) r3 = socket(0x18, 0x1, 0x0) connect$unix(r3, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) r4 = socket(0x18, 0x3, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f000052fff8)='./file0\x00', 0x0, 0x0) symlinkat(&(0x7f00000002c0)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000700)='./file0\x00') link(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='./file0/file0\x00') r5 = socket(0x18, 0x1, 0x0) connect$unix(r5, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) dup2(r5, r4) getpeername(r5, &(0x7f0000000040)=@in, &(0x7f0000000080)=0xc) dup2(r3, r2) connect$unix(r2, &(0x7f0000000240)=ANY=[@ANYBLOB='W\x00,/file0\x00'], 0x354) setsockopt$sock_int(r2, 0xffff, 0x1, &(0x7f0000000000)=0x1, 0x4) r6 = socket(0x18, 0x3, 0x0) r7 = socket(0x18, 0x1, 0x0) connect$unix(r7, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) dup2(r7, r6) r8 = accept$inet6(r7, &(0x7f0000000180), &(0x7f00000001c0)=0xc) setsockopt$sock_int(r8, 0xffff, 0x200, &(0x7f0000000200)=0x3, 0x4) 00:02:04 executing program 5: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x4b3f07d7b606ff45) r1 = open$dir(&(0x7f0000001240)='./file0\x00', 0x42000400000002c1, 0x0) writev(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000000)="8fe02ea73d48d1123a8e826abd95e3836d05e78b323fd1cd", 0x18}, {&(0x7f00000000c0)="032a440c58faa309ede6c6c205a2b4a70e946ca0fdf2eb27cf64b33fb2", 0x1d}, {&(0x7f0000000100)="1291fdfff758964a0a03c1c82b5904449e014aac5bb16478b0d04d3d8e9aa0d7339756fa05a07928cc139325bc5ae369f06793d89478576bb19d70a8355ff5b49460a495fd8aa5cc18aad7a9169172465a253ee46f0243c5ec6213767c6f82811536e776eca60ea90e276a607f49eadc619088808f344d317c92619f4a08fe2294b1", 0x82}, {&(0x7f00000001c0)="cafdfe14bce8a7fbae300366635745efd89e9b15c6d10b84ad59fee378d227146b5546577296915f7485bde3cbcb55bcaecc57049e8ab9c2675f0fd98e8d800ccfb124451cf4b9b5102eea2bf12c8de12de9c5e453cb57c9deb3d6f3f3842e01f79f6fabf2215f7dc4adf0d50dc4fddfc6e491c97a5febcae83050dc1543fd94a7803feaa40ca6858d154a531c7f4ce36e10a21ffed86448b70c539607e37780ce7abfbcfaf45ebedd33e58059f44f0c8d85c6734820748cfc0bdda596448c7e08e4608a8474eacbbf423e211340c3376beccd72d25ca7e9e2a26664e42afb8ac9f34bdf", 0xe4}, {&(0x7f00000002c0)="79baa0", 0x3}, {&(0x7f0000000300)="f52ded8fe0394896382004234e3a908b858c4191934d4a2de442cdcd96017f9e7b752bd12bf08768b6eaae53f1bd742483138b2fb12d4bd98ca10b82ff6a1cdef79dd5444a3b1ebb9f75952dbe2304cfb3153cd7e5b66ec7", 0x58}, {&(0x7f0000000380)="2e7e2b1b764cadf9df08e222e935293b0970677ff460f9a5dc7081ff750603a5095304d11a982971d96d6cee5148872d9ffb2a184b0fadf01d5a0bdd3f76a36c91bbe4c8b4755da54bf858fbf20549f3f4fd690acad997dcc49cb8df68cfea9ed73a76102bea67e585b506f2fbccc2e5defa370fc4654d49af9672ac3a0b251641a31a721236427f6930b3c43ec3262fae4154d01f13381ccdb6f6d1339b8801ee274068ae9086acee41a31c2d94b09e1a92d419d053facd67b7ac4cdbbbf47be88d", 0xc2}, {&(0x7f0000000480)="64190599fd44eabad519a1c2812b61243378ffd19e439b5e12cd7c21994ce2b309f215cf", 0x24}], 0x8) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = __clone(0x0, 0x0) lchown(0x0, 0x0, 0x0) r3 = socket(0x18, 0x3, 0x0) r4 = socket(0x18, 0x1, 0x0) connect$unix(r4, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) dup2(r4, r3) fcntl$setown(r4, 0x6, r2) mmap(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0, 0x0) [ 47.6646164] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/process_machdep.c:159:2, member access within misaligned address 0xffffb300b3a128c8 for type 'struct fpreg' which requires 16 byte alignment [ 47.6846279] cpu1: Begin traceback... [ 47.7146475] vpanic() at netbsd:vpanic+0x2aa [ 47.7647011] isAlreadyReported() at netbsd:isAlreadyReported [ 47.8247600] HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc [ 47.8748109] HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b [ 47.9248623] process_read_fpregs() at netbsd:process_read_fpregs+0x3d [ 47.9849180] proc_regio() at netbsd:proc_regio+0x164 [ 48.0349703] process_dofpregs() at netbsd:process_dofpregs+0xa7 [ 48.0850178] do_ptrace() at netbsd:do_ptrace+0x12d6 [ 48.1350679] sys_ptrace() at netbsd:sys_ptrace+0x4f [ 48.1851234] sys___syscall() at netbsd:sys___syscall+0x1c8 [ 48.2451823] syscall() at netbsd:syscall+0x29a [ 48.2551905] --- syscall (number 198) --- [ 48.2651979] Skipping crash dump on recursive panic [ 48.2651979] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:153:24, member access within misaligned address 0x4 for type 'struct x86_64_frame' which requires 8 byte alignment [ 48.2852139] Faulted in mid-traceback; aborting... [ 48.2952289] fatal breakpoint trap in supervisor mode [ 48.2952289] trap type 1 code 0 rip 0xffffffff8021ddbd cs 0x8 rflags 0x286 cr2 0x625bb4 ilevel 0 rsp 0xffffb300b3a114b0 [ 48.3052366] curlwp 0xffffa0333a7c1920 pid 607.3 lowest kstack 0xffffb300b3a0f2c0 Stopped in pid 607.3 (syz-executor.0) at netbsd:breakpoint+0x5: leave ? breakpoint() at netbsd:breakpoint+0x5 db_panic() at netbsd:db_panic+0x109 vpanic() at netbsd:vpanic+0x2aa isAlreadyReported() at netbsd:isAlreadyReported HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b db_nextframe() at netbsd:db_nextframe+0x6f6 db_stack_trace_print() at netbsd:db_stack_trace_print+0x2c4 db_panic() at netbsd:db_panic+0xa3 vpanic() at netbsd:vpanic+0x2aa isAlreadyReported() at netbsd:isAlreadyReported HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b process_read_fpregs() at netbsd:process_read_fpregs+0x3d proc_regio() at netbsd:proc_regio+0x164 process_dofpregs() at netbsd:process_dofpregs+0xa7 do_ptrace() at netbsd:do_ptrace+0x12d6 sys_ptrace() at netbsd:sys_ptrace+0x4f sys___syscall() at netbsd:sys___syscall+0x1c8 syscall() at netbsd:syscall+0x29a --- syscall (number 198) --- [ 48.3152438] Skipping crash dump on recursive panic [ 48.3152438] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:154:14, member access within misaligned address 0x4 for type 'struct x86_64_frame' which requires 8 byte alignment [ 48.3152438] Faulted in mid-traceback; aborting... [ 48.3152438] fatal breakpoint trap in supervisor mode [ 48.3152438] trap type 1 code 0 rip 0xffffffff8021ddbd cs 0x8 rflags 0x286 cr2 0x625bb4 ilevel 0x8 rsp 0xffffb300b3a101b0 [ 48.3152438] curlwp 0xffffa0333a7c1920 pid 607.3 lowest kstack 0xffffb300b3a0f2c0 Stopped in pid 607.3 (syz-executor.0) at netbsd:breakpoint+0x5: leave