Warning: Permanently added '10.128.0.49' (ECDSA) to the list of known hosts. 2020/04/25 21:29:05 fuzzer started 2020/04/25 21:29:05 dialing manager at 10.128.0.248:17558 2020/04/25 21:29:05 syscalls: 522 2020/04/25 21:29:05 code coverage: enabled 2020/04/25 21:29:05 comparison tracing: enabled 2020/04/25 21:29:05 extra coverage: support is not implemented in syzkaller 2020/04/25 21:29:05 setuid sandbox: support is not implemented in syzkaller 2020/04/25 21:29:05 namespace sandbox: support is not implemented in syzkaller 2020/04/25 21:29:05 Android sandbox: support is not implemented in syzkaller 2020/04/25 21:29:05 fault injection: support is not implemented in syzkaller 2020/04/25 21:29:05 leak checking: support is not implemented in syzkaller 2020/04/25 21:29:05 net packet injection: enabled 2020/04/25 21:29:05 net device setup: support is not implemented in syzkaller 2020/04/25 21:29:05 concurrency sanitizer: support is not implemented in syzkaller 2020/04/25 21:29:05 devlink PCI setup: support is not implemented in syzkaller 2020/04/25 21:29:05 USB emulation: support is not implemented in syzkaller 21:29:06 executing program 0: freebsd11_stat(&(0x7f00000006c0)='./file0\x00', 0x0) freebsd11_stat(&(0x7f0000000840)='./file0\x00', 0x0) freebsd11_stat(&(0x7f00000006c0)='./file0\x00', 0x0) 21:29:06 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000000)={{0xffffffff284002cb}}) shutdown(r0, 0x0) 21:29:06 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="bbb13759346bf1bd3521369df1641067"}, 0x1c) 21:29:06 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) read(r0, &(0x7f0000000000)=""/28, 0x1c) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000000)={{0xffffffff284000cd}}) shutdown(r0, 0x0) 21:29:06 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="bbb13759346bf1bd3521369df1641067"}, 0x1c) 21:29:06 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="bbb13759346bf1bd3521369df1641067"}, 0x1c) 21:29:06 executing program 3: r0 = socket(0x2, 0x5, 0x0) connect$unix(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="8202cde91731cbb340ecd7630ed62e0100000001f3000073f85e3b2f51777b1087e9de6a09dec6896e1f47e9b2dee9650325"], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000b40)=ANY=[@ANYBLOB="01000000f8467d1508688c12a1054b297d3248cae49323a5f755cae914a5ca8e4e881dc75f2ea3329974366c40ca80346e4064ad0f44c1c8c4be4305b73c152d1b08c28f4213d186e6a342539164021396604c8b21101172829828a5290398fa40011670ad4d56506f3da2862ee77e44b93f0c9cb273d07961655dbe5744c6604e2f4fab68fb22fdcb85d1a8e4a5882931f59d3e98ed6dbb7465607df5db275a1e0beea08960ca55f42ce51482c8c43b29da2cf6225017cf5324479087366d5f00b0631eb24dd292b59d1c2e7546d0b4089a91cdc2ec0f04b548d63267ef503285ff59eef3e972ddfbb153", @ANYRES32=0x0], &(0x7f0000000200)=0x8) 21:29:06 executing program 2: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="bbb13759346bf1bd3521369df1641067"}, 0x1c) 21:29:06 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) recvfrom$inet6(r0, 0x0, 0x0, 0x0, 0x0, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000040)={{0xffffffff284002b8}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000040)={{0xffffffff284002a2}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000200)={{0xffffffff2840029c}}) 21:29:06 executing program 1: r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r0, 0x0) accept(r0, 0x0, 0x0) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000100)={{0x284003c7}}) 21:29:06 executing program 2: connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="bbb13759346bf1bd3521369df1641067"}, 0x1c) 21:29:06 executing program 3: r0 = socket(0x2, 0x5, 0x0) connect$unix(r0, &(0x7f0000000400)=ANY=[@ANYBLOB="8202cde91731cbb340ecd7630ed62e0100000001f3000073f85e3b2f51777b1087e9de6a09dec6896e1f47e9b2dee9650325"], 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000b40)=ANY=[@ANYBLOB="01000000f8467d1508688c12a1054b297d3248cae49323a5f755cae914a5ca8e4e881dc75f2ea3329974366c40ca80346e4064ad0f44c1c8c4be4305b73c152d1b08c28f4213d186e6a342539164021396604c8b21101172829828a5290398fa40011670ad4d56506f3da2862ee77e44b93f0c9cb273d07961655dbe5744c6604e2f4fab68fb22fdcb85d1a8e4a5882931f59d3e98ed6dbb7465607df5db275a1e0beea08960ca55f42ce51482c8c43b29da2cf6225017cf5324479087366d5f00b0631eb24dd292b59d1c2e7546d0b4089a91cdc2ec0f04b548d63267ef503285ff59eef3e972ddfbb153", @ANYRES32=0x0], &(0x7f0000000200)=0x8) login: Fatal trap 9: general protection fault while in kernel mode cpuid = 1; Fatal trap 9: general protection fault while in kernel mode cpuid = 0; apic id = 00 instruction pointer = 0x20:0xffffffff812d257b stack pointer = 0x28:0xfffffe002583b450 frame pointer = 0x28:0xfffffe002583b5a0 apic id = 01 instruction pointer = 0x20:0xffffffff812b4f7d stack pointer = 0x0:0xfffffe00258b8790 frame pointer = 0x0:0xfffffe00258b8810 code segment = base 0x0, limit 0xfffff, type 0x1b Fatal trap 9: general protection fault while in kernel mode cpuid = 0; apic id = 00 instruction pointer = 0x20:0xffffffff812d257b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 853 (syz-executor.3) trap number = 9 stack pointer = 0x28:0xfffffe001a133670 frame pointer = 0x28:0xfffffe001a1337c0 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 12 (swi4: clock (0)) trap number = 9