Warning: Permanently added '10.128.0.107' (ECDSA) to the list of known hosts. 2020/02/04 21:04:19 fuzzer started 2020/02/04 21:04:19 dialing manager at 10.128.0.105:40829 2020/02/04 21:04:19 syscalls: 215 2020/02/04 21:04:19 code coverage: enabled 2020/02/04 21:04:19 comparison tracing: enabled 2020/02/04 21:04:19 extra coverage: support is not implemented in syzkaller 2020/02/04 21:04:19 setuid sandbox: support is not implemented in syzkaller 2020/02/04 21:04:19 namespace sandbox: support is not implemented in syzkaller 2020/02/04 21:04:19 Android sandbox: support is not implemented in syzkaller 2020/02/04 21:04:19 fault injection: support is not implemented in syzkaller 2020/02/04 21:04:19 leak checking: support is not implemented in syzkaller 2020/02/04 21:04:19 net packet injection: support is not implemented in syzkaller 2020/02/04 21:04:19 net device setup: support is not implemented in syzkaller 2020/02/04 21:04:19 concurrency sanitizer: support is not implemented in syzkaller 2020/02/04 21:04:19 devlink PCI setup: support is not implemented in syzkaller 21:04:21 executing program 0: semop(0x0, &(0x7f0000000080)=[{0x0, 0x3}, {}], 0x2) semctl$GETZCNT(0x0, 0x2, 0xf, 0x0) 21:04:21 executing program 1: semctl$IPC_SET(0x0, 0x0, 0xe, 0x0) 21:04:21 executing program 2: msgsnd(0x0, &(0x7f0000000040), 0x8, 0x0) 21:04:21 executing program 3: r0 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) getdents(r0, 0x0, 0x0) getdents(r0, 0x0, 0x0) 21:04:21 executing program 5: msgget(0x2, 0x0) msgrcv(0x0, 0x0, 0x0, 0x0, 0x800) 21:04:21 executing program 4: r0 = socket(0x11, 0x80a, 0x0) r1 = dup(r0) write(r1, 0x0, 0x0) 21:04:24 executing program 2: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="82022e2f66696c653000ff31a299ca042e37f7b1ad6b3e910c411d6c6aa98d8851fa8a0f45ca76011b873ce0fbd6a900000041cbc3cf740e8a70530000000000002452000000000000010000000098490d077aaf9544666aa81d54b9f85142108e909d7e1b3b3d84b99db7747eb2c045"], 0x10) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=[@rights={0x14, 0x7}, @cred={0xaa0014ac}], 0x18}, 0x0) 21:04:24 executing program 5: socket(0x1d, 0x0, 0xfe) 21:04:24 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x2c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0}, 0x1c) 21:04:24 executing program 4: fchmodat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) 21:04:24 executing program 2: unlinkat(0xffffffffffffffff, 0x0, 0x200) 21:04:24 executing program 4: r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f0000000000)=[{}, {0x1, 0x4}], 0x2) 21:04:24 executing program 0: poll(&(0x7f0000000000)=[{}], 0x1, 0x7fffffff) 21:04:24 executing program 1: r0 = socket(0xa, 0x1, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x7fffffff) 21:04:24 executing program 5: socketpair$unix(0x2, 0x2, 0x0, &(0x7f0000000200)) 21:04:25 executing program 3: semop(0x0, &(0x7f0000000000)=[{0x0, 0xffff}], 0x1) semctl$SETALL(0x0, 0x0, 0x11, &(0x7f0000000140)) 21:04:25 executing program 2: r0 = semget$private(0x0, 0x8, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000280)=[0x0]) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000140)) 21:04:25 executing program 4: mknod(&(0x7f0000000300)='./file0\x00', 0x8000, 0x0) 21:04:25 executing program 4: semop(0x0, &(0x7f0000000000)=[{}, {}, {}, {}, {}], 0x2aaaab65) 21:04:25 executing program 5: semop(0x0, &(0x7f0000000080)=[{0x0, 0x3}, {}], 0x2) semctl$IPC_SET(0x0, 0x0, 0xe, 0x0) 21:04:25 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x2c) sendto$inet6(r0, 0x0, 0x0, 0x80fe, &(0x7f00000000c0)={0xa, 0x0}, 0x1c) 21:04:25 executing program 4: socket(0x22, 0x0, 0xfe) 21:04:25 executing program 5: semop(0x0, &(0x7f0000000080)=[{}, {}], 0x2) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000040)={{0x3, 0xee00}}) 21:04:25 executing program 4: r0 = socket(0x40000000015, 0x5, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x1042, 0x0, 0x0) 21:04:25 executing program 0: r0 = socket$inet6(0xa, 0x100000003, 0x2c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0}, 0x1c) 21:04:25 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f00000001c0)=ANY=[@ANYRESHEX=0x0], 0x1, 0x0) msgrcv(r0, 0x0, 0x0, 0x3, 0x0) msgsnd(r0, &(0x7f0000000080)={0x3}, 0x8, 0x0) 21:04:25 executing program 3: r0 = socket(0x11, 0x3, 0x3) sendto$unix(r0, &(0x7f0000000200)="9b03050400000000000008000101000000000000cea1fea7fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882a297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282902e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea800000002000000000000020208a371a3f800040000000000000001000000000000000000", 0x39b, 0x0, 0x0, 0x0) 21:04:25 executing program 2: r0 = socket$inet6(0xa, 0x100000003, 0x2c) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0}, 0x1c) 21:04:25 executing program 5: socket(0x1e, 0x0, 0xfe) 21:04:25 executing program 4: socket(0x2b, 0x1, 0x3) [ 44.5668903] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/net/rtsock_shared.c:631:41, member access within misaligned address 0xffff988142e2008c for type 'struct rt_msghdr50' which requires 8 byte alignment [ 44.5768911] cpu1: Begin traceback... [ 44.5969291] vpanic() at netbsd:vpanic+0x2aa [ 44.6570518] isAlreadyReported() at netbsd:isAlreadyReported [ 44.7171680] HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc [ 44.7672728] HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b [ 44.8273916] compat_50_route_output() at netbsd:compat_50_route_output+0x1a4a [ 44.8774901] raw_send() at netbsd:raw_send+0x20b [ 44.9275914] compat_50_route_send_wrapper() at netbsd:compat_50_route_send_wrapper+0x9f [ 44.9776882] sosend() at netbsd:sosend+0x15ac [ 45.0277896] do_sys_sendmsg_so() at netbsd:do_sys_sendmsg_so+0x53d [ 45.0778860] do_sys_sendmsg() at netbsd:do_sys_sendmsg+0xcd [ 45.1279873] sys_sendto() at netbsd:sys_sendto+0xc9 [ 45.1780818] sys___syscall() at netbsd:sys___syscall+0x1c8 [ 45.2281842] syscall() at netbsd:syscall+0x29a [ 45.2482261] --- syscall (number 198) --- [ 45.2482261] Skipping crash dump on recursive panic [ 45.2582401] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:153:24, member access within misaligned address 0x6 for type 'struct x86_64_frame' which requires 8 byte alignment [ 45.2782814] Faulted in mid-traceback; aborting... [ 45.2782814] fatal breakpoint trap in supervisor mode [ 45.2882988] trap type 1 code 0 rip 0xffffffff8021e7cd cs 0x8 rflags 0x282 cr2 0x20000200 ilevel 0x4 rsp 0xffffa600b2c145f0 [ 45.2983213] curlwp 0xffff9881539ef0c0 pid 683.3 lowest kstack 0xffffa600b2c122c0 Stopped in pid 683.3 (syz-executor.3) at netbsd:breakpoint+0x5: leave ? breakpoint() at netbsd:breakpoint+0x5 db_panic() at netbsd:db_panic+0xd1 vpanic() at netbsd:vpanic+0x2aa isAlreadyReported() at netbsd:isAlreadyReported HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b db_nextframe() at netbsd:db_nextframe+0x6f6 db_stack_trace_print() at netbsd:db_stack_trace_print+0x2c4 db_panic() at netbsd:db_panic+0x8b vpanic() at netbsd:vpanic+0x2aa isAlreadyReported() at netbsd:isAlreadyReported HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b compat_50_route_output() at netbsd:compat_50_route_output+0x1a4a raw_send() at netbsd:raw_send+0x20b compat_50_route_send_wrapper() at netbsd:compat_50_route_send_wrapper+0x9f sosend() at netbsd:sosend+0x15ac do_sys_sendmsg_so() at netbsd:do_sys_sendmsg_so+0x53d do_sys_sendmsg() at netbsd:do_sys_sendmsg+0xcd sys_sendto() at netbsd:sys_sendto+0xc9 sys___syscall() at netbsd:sys___syscall+0x1c8 syscall() at netbsd:syscall+0x29a --- syscall (number 198) --- [ 45.3083445] Skipping crash dump on recursive panic [ 45.3083445] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:154:14, member access within misaligned address 0x6 for type 'struct x86_64_frame' which requires 8 byte alignment [ 45.3083445] Faulted in mid-traceback; aborting... [ 45.3083445] fatal breakpoint trap in supervisor mode [ 45.3083445] trap type 1 code 0 rip 0xffffffff8021e7cd cs 0x8 rflags 0x282 cr2 0x20000200 ilevel 0x8 rsp 0xffffa600b2c132f0 [ 45.3083445] curlwp 0xffff9881539ef0c0 pid 683.3 lowest kstack 0xffffa600b2c122c0 Stopped in pid 683.3 (syz-executor.3) at netbsd:breakpoint+0x5: leave