Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts. 2020/01/29 16:59:48 fuzzer started 2020/01/29 16:59:48 dialing manager at 10.128.0.105:46023 2020/01/29 16:59:48 syscalls: 215 2020/01/29 16:59:48 code coverage: enabled 2020/01/29 16:59:48 comparison tracing: enabled 2020/01/29 16:59:48 extra coverage: support is not implemented in syzkaller 2020/01/29 16:59:48 setuid sandbox: support is not implemented in syzkaller 2020/01/29 16:59:48 namespace sandbox: support is not implemented in syzkaller 2020/01/29 16:59:48 Android sandbox: support is not implemented in syzkaller 2020/01/29 16:59:48 fault injection: support is not implemented in syzkaller 2020/01/29 16:59:48 leak checking: support is not implemented in syzkaller 2020/01/29 16:59:48 net packet injection: support is not implemented in syzkaller 2020/01/29 16:59:48 net device setup: support is not implemented in syzkaller 2020/01/29 16:59:48 concurrency sanitizer: support is not implemented in syzkaller 2020/01/29 16:59:48 devlink PCI setup: support is not implemented in syzkaller 16:59:51 executing program 0: r0 = shmget$private(0x0, 0x4000, 0x112, &(0x7f0000ff9000/0x4000)=nil) shmat(r0, &(0x7f0000ffc000/0x2000)=nil, 0x3000) 16:59:51 executing program 1: syz_emit_ethernet(0x3e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa0180c200000086dd60e6387400081100cbf09f71c139e3ff0200000000000000000000000000010000000000089078000000000000e40000"]) 16:59:52 executing program 2: syz_emit_ethernet(0x69fa, &(0x7f00000005c0)) 16:59:52 executing program 3: semop(0x0, &(0x7f0000000c00)=[{0x0, 0x6}], 0x1) 16:59:52 executing program 4: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000a00)={{0x0, 0x0, 0x0, 0x0, 0xee01}}) 16:59:52 executing program 5: r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f00000002c0)='./file0\x00', 0x0) mkdirat(r0, &(0x7f00000001c0)='./file1\x00', 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x80000}], 0x7) open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) renameat(r0, &(0x7f0000000200)='./file1\x00', r0, &(0x7f0000000140)='./file0/file0\x00') 16:59:52 executing program 0: r0 = shmget$private(0x0, 0x13000, 0x0, &(0x7f0000feb000/0x13000)=nil) shmctl$SHM_LOCK(r0, 0xb) 16:59:53 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) 16:59:54 executing program 1: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000003a40)={0xa, 0x0}, 0x1e) 16:59:54 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaa0160c200000086dd6026f52600080400fe80000000000000000000000000003bff02000000000000000000000000000100004e220008009574bc0758b0f6fafc2e1d9800b7a1230504adc408f1d8308c369301aef654bda8862d437136e1611c3265c5d5629803376e73e6717a55249d81255c8b896b14276c653eb74316dbc7593ab339db2734af37e46f7f39f1651cf9c97f59acc1e23b00860000000000000038000000000000004a0978772bd4e06c3f35117778f44024911935b2a2bd8ebc318fdd8a4df1dd3132739664f7e0fd9d207770cdd82887e03f7ba638db000000003fc6a7bb851d1dfa1e274646e08a9948e618c91488d01d050000003425b860bdc01f80fcee4fad5b3230e146f46b7d31b89cdb7c5504d87aea535f319c6e104c74020000000000000040008682c589103c890a41f64a047ba47c930dbeddb71bf37ae0aee26479b24ba841b68edddd2e3759a5df69a78862c7b32344ca510e0a8a6cb9abd9313781c4034529c7a8ec70a467f61eafe7c0dd357d1d19e67e4bb72fd8ea6c4b9ac654ecac286d51fac41e5125b61394f8a6147588f6aebad0f1c7e71f18a41b589335bcfa9fb389f26ce98182342f96599693"]) 16:59:54 executing program 0: r0 = socket(0x15, 0x5, 0x0) getsockopt(r0, 0x114, 0x0, 0x0, 0x0) 16:59:54 executing program 2: r0 = socket$inet(0x10, 0x3, 0x0) sendmsg(r0, &(0x7f0000000000)={0x0, 0xffffffffffffff14, &(0x7f0000000080)=[{&(0x7f0000000140)="24000000200003041dfffd946f6105000a00000a1f000003141008000800040012000000140000001a00ffffba16a0aa1c09000000000000", 0x38}], 0x1}, 0x0) 16:59:54 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000), 0x4) 16:59:54 executing program 4: syz_emit_ethernet(0x56, &(0x7f0000000900)) 16:59:54 executing program 2: r0 = socket(0x10, 0x2, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setgroups(0x4, &(0x7f0000000800)=[0x0, 0x0, 0x0, r1]) 16:59:54 executing program 3: r0 = socket(0x11, 0x3, 0x3) sendto$unix(r0, &(0x7f0000000200)="9b03050400000000000008000101000000000000cea1fea7fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882a297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282902e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea800000002000000000000020208a371a3f800040000000000000001000000000000000000", 0x39b, 0x0, 0x0, 0x0) 16:59:54 executing program 2: syz_emit_ethernet(0x46, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd6000000000102105001600040000400000060000000600aafe8000000000000000000000000000aa0000003292a2103e0a50f900040190780400da230014000000003a0d6ed90eaddb9f520000c45100000001dacc6f44c7b84c2cfd0452d6c9fc945c38bf4449b632a11c8dc6effdff08501367a69ba8c0aa25e8d0ef34107ed19d4a4ef8e349d48e283bcf03ef7773f9e99bf180af3bc37b5350ee71739d8b66d39e9b2b2ab3d7b9f2f243ae261f1589da18fec8cb23b4d7ba33479e162cabffc2dcf644026373f347208e751b2653"]) [ 45.6086661] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/net/rtsock_shared.c:631:41, member access within misaligned address 0xffff8dfb2058824c for type 'struct rt_msghdr50' which requires 8 byte alignment [ 45.6198708] cpu0: Begin traceback... [ 45.6387155] vpanic() at netbsd:vpanic+0x2aa [ 45.6988558] isAlreadyReported() at netbsd:isAlreadyReported [ 45.7589973] HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc [ 45.8191333] HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b [ 45.8892947] compat_50_route_output() at netbsd:compat_50_route_output+0x1a4a [ 45.9494337] raw_send() at netbsd:raw_send+0x20b [ 45.9995474] compat_50_route_send_wrapper() at netbsd:compat_50_route_send_wrapper+0x9f [ 46.0697113] sosend() at netbsd:sosend+0x15ac [ 46.1198265] do_sys_sendmsg_so() at netbsd:do_sys_sendmsg_so+0x53d [ 46.1800177] do_sys_sendmsg() at netbsd:do_sys_sendmsg+0xcd [ 46.2401025] sys_sendto() at netbsd:sys_sendto+0xc9 [ 46.3002432] sys___syscall() at netbsd:sys___syscall+0x1c8 [ 46.3603857] syscall() at netbsd:syscall+0x29a [ 46.3804304] --- syscall (number 198) --- [ 46.3804304] Skipping crash dump on recursive panic [ 46.3927189] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:153:24, member access within misaligned address 0x6 for type 'struct x86_64_frame' which requires 8 byte alignment [ 46.4139406] Faulted in mid-traceback; aborting... [ 46.4139406] fatal breakpoint trap in supervisor mode [ 46.4220348] trap type 1 code 0 rip 0xffffffff8021e7cd cs 0x8 rflags 0x282 cr2 0x720c991faf10 ilevel 0x4 rsp 0xffffd080a5c655f0 [ 46.4352283] curlwp 0xffff8dfb20a46740 pid 634.3 lowest kstack 0xffffd080a5c632c0 Stopped in pid 634.3 (syz-executor.3) at netbsd:breakpoint+0x5: leave ? breakpoint() at netbsd:breakpoint+0x5 db_panic() at netbsd:db_panic+0xd1 vpanic() at netbsd:vpanic+0x2aa isAlreadyReported() at netbsd:isAlreadyReported HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b db_nextframe() at netbsd:db_nextframe+0x6f6 db_stack_trace_print() at netbsd:db_stack_trace_print+0x2c4 db_panic() at netbsd:db_panic+0x8b vpanic() at netbsd:vpanic+0x2aa isAlreadyReported() at netbsd:isAlreadyReported HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b compat_50_route_output() at netbsd:compat_50_route_output+0x1a4a raw_send() at netbsd:raw_send+0x20b compat_50_route_send_wrapper() at netbsd:compat_50_route_send_wrapper+0x9f sosend() at netbsd:sosend+0x15ac do_sys_sendmsg_so() at netbsd:do_sys_sendmsg_so+0x53d do_sys_sendmsg() at netbsd:do_sys_sendmsg+0xcd sys_sendto() at netbsd:sys_sendto+0xc9 sys___syscall() at netbsd:sys___syscall+0x1c8 syscall() at netbsd:syscall+0x29a --- syscall (number 198) --- [ 46.4427517] Skipping crash dump on recursive panic [ 46.4427517] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:154:14, member access within misaligned address 0x6 for type 'struct x86_64_frame' which requires 8 byte alignment [ 46.4427517] Faulted in mid-traceback; aborting... [ 46.4427517] fatal breakpoint trap in supervisor mode [ 46.4427517] trap type 1 code 0 rip 0xffffffff8021e7cd cs 0x8 rflags 0x282 cr2 0x720c991faf10 ilevel 0x8 rsp 0xffffd080a5c642f0 [ 46.4427517] curlwp 0xffff8dfb20a46740 pid 634.3 lowest kstack 0xffffd080a5c632c0 Stopped in pid 634.3 (syz-executor.3) at netbsd:breakpoint+0x5: leave