Dec 22 00:08:58 ci2-netbsd-kubsan-4 getty[431]: /dev/ttyE1: Device not configured NetBSD/amd64 (ci2-netbsd-kubsan-4.c.syzkaller.internal) (console) Warning: Permanently added '10.128.0.158' (ECDSA) to the list of known hosts. 2019/12/22 00:09:08 fuzzer started 2019/12/22 00:09:09 dialing manager at 10.128.0.105:43767 2019/12/22 00:09:09 syscalls: 215 2019/12/22 00:09:09 code coverage: enabled 2019/12/22 00:09:09 comparison tracing: enabled 2019/12/22 00:09:09 extra coverage: support is not implemented in syzkaller 2019/12/22 00:09:09 setuid sandbox: support is not implemented in syzkaller 2019/12/22 00:09:09 namespace sandbox: support is not implemented in syzkaller 2019/12/22 00:09:09 Android sandbox: support is not implemented in syzkaller 2019/12/22 00:09:09 fault injection: support is not implemented in syzkaller 2019/12/22 00:09:09 leak checking: support is not implemented in syzkaller 2019/12/22 00:09:09 net packet injection: support is not implemented in syzkaller 2019/12/22 00:09:09 net device setup: support is not implemented in syzkaller 2019/12/22 00:09:09 concurrency sanitizer: support is not implemented in syzkaller 2019/12/22 00:09:09 devlink PCI setup: support is not implemented in syzkaller 00:09:12 executing program 0: unlink(&(0x7f0000000000)='./file0\x00') stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) r0 = open(&(0x7f00000001c0)='./file0\x00', 0x200000, 0x38) r1 = msgget(0x3, 0xa2) msgctl$IPC_RMID(r1, 0x0) getrlimit(0xa, &(0x7f0000000200)) clock_gettime(0x0, &(0x7f0000000240)) r2 = paccept(r0, &(0x7f0000000280)=@un=@abs, &(0x7f00000002c0)=0x8, 0x40000000) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0xc) r6 = geteuid() getgroups(0x1, &(0x7f0000000340)=[0xffffffffffffffff]) setsockopt$sock_cred(r2, 0xffff, 0x11, &(0x7f0000000380)={r3, r6, r7}, 0xc) r8 = socket$inet6(0x18, 0x2, 0xe3) fchown(r8, r4, r5) getsockname$unix(r0, &(0x7f00000003c0)=@file={0x0, ""/72}, &(0x7f0000000440)=0x4a) getgid() mknod$loop(&(0x7f0000000480)='./file0\x00', 0x129, 0x0) chdir(&(0x7f00000004c0)='./file0/../file0\x00') setitimer(0x0, &(0x7f0000000500)={{0x77f, 0x8}, {0x1f, 0x7ff}}, &(0x7f0000000540)) __vfork14() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000580), 0xc) r9 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r9, &(0x7f0000000840)={&(0x7f00000005c0)=@file={0x0, './file0/../file0/file0\x00'}, 0x19, &(0x7f0000000800)=[{&(0x7f0000000600)="bb1c6e651ee8d98a3fecf953685b057eaafdc20795a0e40aa1e70600007a96f429ffc8f71a4cb35333dbc8d6de32647e98be1639309396ad6fd55b0d091973aa430d7e150ae75c11", 0x48}, {&(0x7f0000000680)="c34a75ea42619b8c65f4362a14f88fa12786b4e1fa1b122a379c752c21352a0a57f0bd1251572c1a3d13da4fd99bc6c3b226d457791823d1101d37d0fddaddaaa3f4a06f4e969ac660df81b5c494099b7e1fa239fc31ce01f99a41fc26b30fe536642e53ea9dd99f34fdf835122e2c7b064050254ceac17f84aa30c6ee7081c5ae59e0892d789dff9599903043bc8e0adc6486f5f233508c6b7a159d81953e4f170b0c767c7ea87756d7dcc28a8cd6037748fb93eafb2320be58c8545ca8f32722fc7dff6b32372e520621ea480e16ac80ace51bfb65d5e5f104ca55dec861", 0xdf}, {&(0x7f0000000780)="e7b0f7430365a334345cd76a46411947bdb5e32392ee3a1d46c7c5e1eec1dd663d72cc8c4592f29b716e30d1b4691ae5a79fca1c73b8410a7c38ed2bdd393ed2a1959e3a32e29dffdbc44bc28048ae0d0a36ec7cfb8faa49cbfff3014714ef74933bab37d9f8b2c86e53ecc3d733e8f80d8979fe491943f15a", 0x79}], 0x3}, 0x404) r10 = accept$unix(0xffffffffffffffff, &(0x7f0000000880)=@abs, &(0x7f00000008c0)=0x8) getsockopt$sock_cred(r10, 0xffff, 0x11, &(0x7f0000000900), &(0x7f0000000940)=0xc) r11 = semget(0x2, 0x2, 0x100) semctl$SETVAL(r11, 0x0, 0x8, &(0x7f0000000980)=0x100) rename(&(0x7f00000009c0)='./file0/../file0/file0\x00', &(0x7f0000000a00)='./file0/../file0\x00') 00:09:12 executing program 1: r0 = socket$inet6(0x18, 0x4, 0x1) r1 = semget(0x1, 0x4, 0x1) semop(r1, &(0x7f0000000000)=[{0x5, 0x4615, 0x1000}, {0x0, 0x3, 0x1000}], 0x2) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000040)=""/4096) r2 = semget$private(0x0, 0x0, 0x523) semop(r2, &(0x7f0000001040)=[{0x0, 0x2, 0x800}, {0x1, 0x7, 0x3800}, {0x3, 0x7f, 0x800}, {0x0, 0x40, 0x1000}, {0xe4974ee4e4418853, 0x6c4, 0x800}], 0x5) r3 = geteuid() getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000001080)={0x0, 0x0, 0x0}, 0xc) r5 = getgid() semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f00000010c0)={{0x10001, r3, r4, 0x0, r5, 0x3}, 0x3f, 0x8, 0x7}) r6 = semget$private(0x0, 0x3, 0x7) semctl$GETPID(r6, 0x3, 0x4, &(0x7f0000001140)=""/246) getsockopt$sock_cred(r0, 0xffff, 0x11, &(0x7f0000001240), &(0x7f0000001280)=0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff}) getsockopt$sock_int(r7, 0xffff, 0x1, &(0x7f0000001300), &(0x7f0000001340)=0x4) r8 = geteuid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, &(0x7f00000013c0)={0x0, 0x0, 0x0}, 0xc) lchown(&(0x7f0000001380)='./file0\x00', r8, r9) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000001400)={0x0}, 0xc) wait4(r10, &(0x7f0000001440), 0x10, &(0x7f0000001480)) socketpair(0x10, 0x40000000, 0x0, &(0x7f0000001540)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r11, 0x5) r13 = socket$unix(0x1, 0x2, 0x0) getsockopt$sock_cred(r13, 0xffff, 0x11, &(0x7f0000001580), &(0x7f00000015c0)=0xc) getegid() r14 = getegid() setegid(r14) getsockname$inet6(r12, &(0x7f0000001600), &(0x7f0000001640)=0xc) mlockall(0x3) r15 = paccept(0xffffffffffffff9c, &(0x7f0000001680)=@in, &(0x7f00000016c0)=0xc, 0x10000000) getpeername$unix(r15, &(0x7f0000001700)=@file={0x0, ""/55}, &(0x7f0000001740)=0x39) 00:09:12 executing program 2: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x100) r1 = dup(r0) mknod(&(0x7f0000000040)='./file0\x00', 0x4, 0x2) r2 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) recvmsg(r2, &(0x7f0000002400)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000002300)=[{&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/81, 0x51}, {&(0x7f0000001180)=""/202, 0xca}, {&(0x7f0000001280)=""/71, 0x47}, {&(0x7f0000001300)=""/4096, 0x1000}], 0x5, &(0x7f0000002380)=""/93, 0x5d}, 0x841) readv(r0, &(0x7f0000002840)=[{&(0x7f0000002440)=""/97, 0x61}, {&(0x7f00000024c0)=""/103, 0x67}, {&(0x7f0000002540)=""/225, 0xe1}, {&(0x7f0000002640)=""/237, 0xed}, {&(0x7f0000002740)=""/247, 0xf7}], 0x5) r3 = dup(0xffffffffffffff9c) readlinkat(r3, &(0x7f00000028c0)='./file0\x00', &(0x7f0000002900)=""/229, 0xe5) r4 = open(&(0x7f0000002a00)='\x00', 0x40, 0x91) utimensat(r4, &(0x7f0000002a40)='./file0\x00', &(0x7f0000002a80)={{0x6, 0x589e}, {0x20, 0x3}}, 0x200) msgget$private(0x0, 0x0) r5 = accept$inet6(r1, &(0x7f0000002ac0), &(0x7f0000002b00)=0xc) sendto$inet6(r5, &(0x7f0000002b40)="f26dd8d163e5e4d1f622f1f6594712a3ef2ca4fd94a87fed3cc3052f8e54e103d3970688152a5f853e4e36932923daac215d95d816939a366946e2414b0693538dd258cec64cd1832344886d3f3883c854baa1a82a2f3f0a5bb081057a9e5ef64d3d12599dff582f4c9654f47cbbc0852cb3db6673ec7719d87d5e4515e799177679c2299f61d3d808402b5c651b9b2118e72e12764095312f5db6b33e826516fe3999858a5a25e2577306e186ef45ee7b890b359e7409dcf257d2e01e7cc07b38d76e93e8fe9264f35df32ebcc3", 0xce, 0x401, &(0x7f0000002c40)={0x18, 0x2, 0xffff4e17, 0x1000}, 0xc) r6 = socket$inet(0x2, 0x20000000, 0x1f) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002c80)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000002cc0)=[{r4, 0xb06aca605d75e6f1}, {r2, 0x1}, {r0, 0x4}, {0xffffffffffffffff, 0x40}, {0xffffffffffffffff, 0x942a338ed81307d0}, {r4, 0x2}, {r3, 0x20}, {r6, 0x1}, {r7, 0x2}], 0x9, 0xfffffff7) vfork() shmget$private(0x0, 0x1000, 0x4, &(0x7f0000fff000/0x1000)=nil) wait4(0x0, &(0x7f0000002d40), 0x62, 0x0) getuid() open$dir(&(0x7f0000002d80)='./file0\x00', 0x200, 0x19bb677fc2ac2f28) r8 = semget$private(0x0, 0x1, 0x100) r9 = geteuid() getsockopt$SO_PEERCRED(r2, 0xffff, 0x11, &(0x7f0000002dc0)={0x0, 0x0, 0x0}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000002e00)={0x0, 0x0}, &(0x7f0000002e40)=0xc) getgroups(0x4, &(0x7f0000002e80)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]) semctl$IPC_SET(r8, 0x0, 0x1, &(0x7f0000002ec0)={{0x5, r9, r10, r11, r12, 0x3e441833b9a597aa, 0x6}, 0xca46, 0x5, 0xffffffffffffffff}) r13 = dup(0xffffffffffffff9c) getsockopt$SO_PEERCRED(r13, 0xffff, 0x11, &(0x7f0000002f40), 0xc) getsockopt$SO_PEERCRED(r1, 0xffff, 0x11, &(0x7f0000002f80), 0xc) 00:09:12 executing program 3: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) shmget(0x3, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x40000, 0x80) r2 = accept(0xffffffffffffff9c, &(0x7f00000005c0)=@in6, &(0x7f0000000600)=0xc) r3 = getpgid(0x0) getgroups(0x2, &(0x7f0000000640)=[0xffffffffffffffff, 0x0]) sendmsg$unix(r1, &(0x7f00000006c0)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x2}, 0x8, &(0x7f0000000540)=[{&(0x7f00000000c0)="e2f136f29e2cadf626d8063573554b18af9b742f2c3e2c7eb54e3125968dc11a93b6e6149ad43888934686bd2b42d11d0bd19760fb391cb9aec0ffd9c01a55cc46883e182c5a49337e61404f754036ce96ecee0487669ab418e2a29b82eac2028abbba1460843c1f796108cd1b98f0bdeb535e5dd02eaab1495f505c78833c18a6e6548a039d8570e25794", 0x8b}, {&(0x7f0000000180)="631dacfe58d66f5bf9f86bd971b2241146c724467506472b58cd5b0a4863c41f4102518bc3203e1e8be456c73d5e206539ee72891e28c7491a068d056181d1c3a41ce8e3c8f26a8f26a003dec511f9a207743ba35a989d5eefcd957661eb8e17fbf317304311a5c3da955320192e6c11cdb941050301d1deed37d408d3828f7f8f4d6de8a4ae28417df43af50c7d35352fa7c278172c390e6f819181a6e525cf13136a128cc47521f40513f8dbca44999b5e6ef56a70e43f15065cd61c7ada", 0xbf}, {&(0x7f0000000240)="89d97a60671557d2", 0x8}, {&(0x7f0000000280)="bba8abf371af1683f90c831bd2c31adc3a5ba8b4af6ce946e484bde9a48fb0b68245ec8581c7a61f8db7974ddc369ac2913c2b9ccfaf8e08396007d1afb630e7fbc8a047f71acc339c764f071eb378e3f235b857550b9cdf656f7fe9e5256261bed0bae21ef951f8a2eb160005c4a8dd59984290eba4ceaa3107ccfd13b046213d4e696e622714fd0f21404901766c70272436597bf49104a3b3b307a30bd28cc6b29b91a5ba20d6bc60", 0xaa}, {&(0x7f0000000340)="d6e6844eac78b2dee7ca7b3008b60b6c0ccbd334989acfdf9462764a06118e00fa896dc8ccb0dc14939ee2a9c48ad356d63519e9228d1a322044fc25be1665826c768eac7e70b17043f84752dbde8577b44f3b75d71d9beffac0cc188c150b7dabdfc61e11f3c3a30c2346b0373801d020f43f72c81dc3476652fde0b8bc467ceb166de1c4160991525f071bc7d450fb9d367382ab92f7e358eda73593a93b5010f67f5d3bff6fdee409d0ba0311031f01551365ddf8bae110c5b03feaab9f63462d307c56c077ce7257afc9d196c84a64150455dcd55b37d2f958adcf8c3cdf6b45ef43fcb2871a", 0xe8}, {&(0x7f0000000440)="6c6b1b38b4dbe71f95396bfe7dc26a974bcf0c8062ad543651e6f49ee3317d4114daebf633b01445a5b3e566246706f3437a23bd99716e4da5f73cb7b8c25c55e1da2cb291dec09a676bd42417b7ee367f07b35769cc3820a7011d8032636455a1e898abb8a286a5fabd4c29f27647f91831c916597f88d1caf4676b09d89e6ff55a0a0a4573b75dfb53419b861c23507fbea6ba9351c6da6442db302d5af2177302adc15975c6e1b17b60757886bdcfeb5bdddaadd2bab14e93b89a81bcd24d0e4aea7c14e2bbb227082f701ef46702dd3e1ee3c63add8f6f0e92a827cb56a935fcd4502f13fcb07569dc", 0xeb}], 0x6, &(0x7f0000000680)=[@rights={0x18, 0xffff, 0x1, [r2]}, @cred={0x20, 0xffff, 0x2, r3, 0x0, r4}], 0x38, 0x4}, 0x8) r5 = socket$unix(0x1, 0x2, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x13, r5, 0x0, 0x100) r6 = semget(0x3, 0x3, 0x2) semctl$IPC_STAT(r6, 0x0, 0x2, &(0x7f0000000700)=""/158) r7 = open(&(0x7f00000007c0)='./file1\x00', 0x88008, 0x20) setsockopt$inet_opts(r7, 0x0, 0x0, &(0x7f0000000800)="ff6c4fe97507e80b05cfe08029ac30562f24fecc140992fc90c86bb0fcf25c0e51715718d58967302ed004725f212cd1b870ce10abcae0548ffc0d2f896c2fa8954189ebd924", 0x46) __clone(0x100, &(0x7f0000000880)="d37c423a173a163fee04bb7950578cd2da0e7ac93762f242513b4581de748b736e949e7cadad3bb11a0f3559a952d3785cfdf86c0fc562f0f14be98faf7cb753228eabb74e2073bf933b414025b84d0871d0cecae0bab36b1c37d3f58c69c6829785efe4f4f1c2f22555d0e0e24ab3437aa3034bbf07864b57a2b3ced6a74e967fff5eb92cd8935ad80a101ee5212a9c421283410761f6b47104b772aae5c7e177f4b8944dfba1a9f83097e5cd8837d9949317b035f2258cd6a79173f9b3a61c7d095cc230c4a2b979eac5") r8 = fcntl$dupfd(0xffffffffffffffff, 0x18, r1) connect$unix(r8, &(0x7f0000000980)=@abs={0x0, 0x0, 0x0}, 0x8) r9 = accept$unix(r1, &(0x7f00000009c0)=@abs, &(0x7f0000000a00)=0x8) poll(&(0x7f0000000a40)=[{r7, 0x10}, {r1, 0x4}, {r9}], 0x3, 0xd5b) r10 = msgget(0x3, 0x96) msgrcv(r10, &(0x7f0000000a80)={0x0, ""/208}, 0xd8, 0x7, 0x1800) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f0000000b80)=""/143) mkdir(&(0x7f0000000c40)='./file0\x00', 0x14) open(&(0x7f0000000c80)='./file1\x00', 0x0, 0x8) rmdir(&(0x7f0000000cc0)='./file0\x00') pwrite(r2, &(0x7f0000000d00)="4bcd4505c9ea7332b2eba65cb35348d31ae7593714ca79b5aeda79ac1ed9c078d69263d3bd05c3b5cc08e387a54faa456a5cfbb53a3d0f091945fb4bc9c83952e7d1e27839ae29e6af4eeaf1c9af44b1e31fc43822c8bd5645dcaee1abd57cacc6eeb8c0fa89c772a0d75cdb39786db67fab046028d4373ee936d6a5cf1d26852def336bbc5f7b515c5be675ee6da7c469dd619cac7b92d1ef410e718b1967c6a140e26ccb74865586a6b95cc3611a31e9dfa55bfaf970136bb3033ba2bb1fa0b01806fa7ddf60d2837fa4b4520de8abcc2d5c414769283d052504aa055edbf220e13fe0b111f8f6", 0xe8, 0xdf) r11 = shmget$private(0x0, 0x3000, 0x28c, &(0x7f0000ffd000/0x3000)=nil) shmat(r11, &(0x7f0000ffb000/0x4000)=nil, 0x1000) r12 = socket$unix(0x1, 0x7, 0x0) preadv(r12, &(0x7f0000000e40)=[{&(0x7f0000000e00)=""/56, 0x38}], 0x1, 0x4) 00:09:12 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x20, 0x8) r1 = getpid() fcntl$setown(r0, 0x6, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) fdatasync(r2) socketpair(0x980e05d5543113b0, 0x20000002, 0x1, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)) r6 = getpgid(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000200)={0x0, 0x0}, &(0x7f0000000240)=0xc) getsockopt$sock_cred(r4, 0xffff, 0x11, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setsockopt$sock_cred(r4, 0xffff, 0x11, &(0x7f0000000300)={r6, r7, r8}, 0xc) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000340), 0xc) readlink(&(0x7f0000000380)='./file0/file0\x00', &(0x7f00000003c0)=""/4096, 0x1000) setsockopt(r2, 0x9, 0x401, &(0x7f00000013c0)="cf92ea352e9e727c67d5cbfcf90effc1f237fa80b674dd9770438bd5c51e918ea057aeddc588352f014e2f072664c99b25c32d04100b829380c12fbd90cc10c5fd6c51df344342c27a7147e5613a7c10f1eb88f6f0b8d897bed536c8f46309bfe14f8d0a", 0x64) r9 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) getsockname(r9, &(0x7f0000001440)=@in6, &(0x7f0000001480)=0xc) r10 = dup(r4) r11 = accept(0xffffffffffffffff, 0x0, &(0x7f00000014c0)) sendmsg$unix(r11, &(0x7f0000001700)={&(0x7f0000001500)=@file={0x0, './file0/file0\x00'}, 0x10, &(0x7f00000016c0)=[{&(0x7f0000001540)="da75e26959280eb65b86811362e6903eaf8be498a0d5bb425830a18882238cd207302bcf29801e7097459dfa833d9b0bc9d9674b3fe597fd68960180e5", 0x3d}, {&(0x7f0000001580)="ce3edf1852026022c4db8fe6e09f14a3f618b2817b26ae2101bb9415991893ad36efbd08c9a125d4dc6fef5b69b527c1543ab7e754d66fcbcd6acf827ff34d2111f066c1d340a7d0e92590ebd0732838d006cc516885f36531f0ad6e89a5b57633e3e7c57d7f03f919e64c6a18c2b39a647138758c9210f02a7c5541587698261b04024096848c093a27c3a7bd52ed842cdbc1582137bc816909dd51f4ae0b9bf8cdc5a72c4fba4404c8abe115d6444f2582223ace3d93a753390f37a666be15f13805a0c49b502a28fd74a3b66e93e039dfbaa44aaf39b3d20ca5c203c88c7462a2740d94559e853a58561e2eec0d6c5947", 0xf2}, {&(0x7f0000001680)="83bde3f39e5130758156e941a1dbfa42889768662fbd55564b497df71cbeae8af1b7d29a32", 0x25}], 0x3, 0x0, 0x0, 0x9}, 0x0) sendto$unix(r5, &(0x7f0000001740)="c57a6437289d25b5da47bb4821475ca76fb1927fcff73ce82491d14d82e74cd786f59a6f6a5029300929594b78f58dac183427c94729ef3dcbd7cb6dff45af714b5517056d4c78794e1e8dae186af75c6ea32b048d570048523b67765a1952ff82f60a6123797eb2996cdbe47c2583899f1daa6dec83b838e4785978a6c1bcfbcab838d14ec4c6f86972e2e7094c92d4016e127f5521c480f598e1e3cf07dcc1fb917c73e7", 0xa5, 0x404, &(0x7f0000001800)=@file={0x1, './file0\x00'}, 0xa) accept$unix(r3, &(0x7f0000001840)=@abs, &(0x7f0000001880)=0x8) r12 = vfork() ptrace(0x29, r12, &(0x7f00000018c0), 0x1000) r13 = accept$inet6(0xffffffffffffff9c, &(0x7f0000001900), &(0x7f0000001940)=0xc) dup(r13) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1) r14 = fcntl$dupfd(r4, 0xc, r10) getsockopt$SO_PEERCRED(r14, 0xffff, 0x11, &(0x7f0000001980), 0xc) stat(&(0x7f00000019c0)='./file0/file0\x00', &(0x7f0000001a00)) 00:09:12 executing program 4: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3) r0 = _lwp_self() _lwp_setname(r0, &(0x7f0000000000)=')\x00') r1 = _lwp_self() _lwp_wakeup(r1) mlock(&(0x7f0000ff7000/0x9000)=nil, 0x9000) mlock(&(0x7f0000ff7000/0x4000)=nil, 0x4000) r2 = _lwp_self() _lwp_wait(0xffffffffffffffff, &(0x7f0000000040)=r2) _lwp_create(&(0x7f0000000180)={0x400f0028, &(0x7f0000000100)={0x0, &(0x7f0000000080)={0x0, 0x0, {[0x7, 0x6, 0x2, 0x80000001]}, {0x10001, 0xfff, 0x1}, {0x0, 0x3, '\x00'}}, {[0x6, 0x3]}, {0x9, 0x3, 0x2}, {0x9, 0x0, '/\\#\x00'}}, {[0x3ef9, 0xfffffffc, 0x442f, 0xfff]}, {0x7, 0x200}, {0x80, 0x4, ')\x00'}}, 0x40, &(0x7f0000000200)=0x0) _lwp_detach(r3) _lwp_unpark(r2, 0x0) _lwp_continue(r2) _lwp_wakeup(0x0) socket$inet6(0x18, 0x1, 0x49) r4 = _lwp_self() _lwp_create(&(0x7f0000000340)={0x400f0020, &(0x7f00000002c0)={0x400f0024, &(0x7f0000000240)={0x400f0025, 0x0, {[0xffffffc0, 0x7ff, 0x909, 0x1ff]}, {0x200, 0x3, 0x5}, {0x7f, 0xfff, ')\x00'}}, {[0x6, 0x401, 0x4, 0x7ff]}, {0x6, 0x5, 0x4}, {0x2, 0x7, ')\x8b\x00'}}, {[0xfff, 0x0, 0x4, 0x3f]}, {0x354000000000, 0x2, 0x4}, {0x9f3, 0x1, '\x00'}}, 0x80, &(0x7f00000003c0)=0x0) _lwp_unpark_all(&(0x7f0000000400)=[r4, r5, 0xffffffffffffffff, 0xffffffffffffffff, r1, r1], 0x6, &(0x7f0000000440)=0x6) _lwp_create(&(0x7f0000000580)={0x1, &(0x7f0000000500)={0x3, &(0x7f0000000480)={0x4, 0x0, {[0x1, 0x10001, 0x0, 0xfffffffd]}, {0x7f, 0x2}, {0xdc, 0x8, '(:b/,\x00'}}, {[0x1, 0xfffffffd, 0xfffffffe, 0x9]}, {0x8001, 0x7, 0x56ace2ee69b45d67}, {0x1, 0x180a, '/\\#\x00'}}, {[0x8, 0x8000, 0x8, 0x7fffffff]}, {0x897, 0x1, 0x1}, {0x1f, 0x7fff, ')\xd2\x00'}}, 0x80, &(0x7f0000000600)=0x0) _lwp_getname(r6, &(0x7f0000000640)=""/2, 0x2) _lwp_setname(0xffffffffffffffff, &(0x7f0000000680)='\x00') _lwp_wakeup(r4) _lwp_wakeup(0xffffffffffffffff) r7 = socket(0x573c974884192542, 0x20000000, 0x80) fcntl$setstatus(r7, 0x4, 0x10a0000) r8 = msgget(0x0, 0x212) msgsnd(r8, &(0x7f00000006c0)={0x2, "9be0bfd7bb47df985c5d20f10a044ca1f4d7528e77779d4e30e36043e77ecf108dc704421e80f1b42f1edff7f3b74535e656134bbc58ea8ed54cee8f4f359288de765e9324bc8ea0456e22ecda0416903748fa7e64a1502f815cd449d3c183f3c63dcf83d3219d374e4ae15383629a88c7cf85f0f38d47ce5127022a564ed261b7af1af16b52883cb559a5ce3e3468ea4922e5a307d6310e47b18f3c32bb0af705846b15123cbe8d390e4f315fde450afe34eea303"}, 0xbd, 0x800) r9 = _lwp_self() _lwp_wakeup(r9) socket$unix(0x1, 0x2, 0x0) 00:09:15 executing program 1: bind$unix(0xffffffffffffffff, &(0x7f0000003000)=@file={0x0, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0, 0x0) open(&(0x7f0000000000)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x8021, 0x18) 00:09:15 executing program 1: r0 = socket(0x18, 0x2, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x2, 0x1}, 0x320) fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x20000000000}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) setsockopt(r0, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r0, &(0x7f0000000040)=@abs={0x1, 0x0, 0x1}, 0x8) shmget$private(0x0, 0x2000, 0x40, &(0x7f0000147000/0x2000)=nil) getsockname$unix(r0, &(0x7f0000000100)=@abs, &(0x7f0000000140)=0x8) socket(0x64a7702960da9acb, 0x6, 0x8) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) login: [ 46.0056230] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 73 command syz-executor.1) 00:09:15 executing program 1: r0 = open(&(0x7f0000000080)='.\x00', 0x0, 0x0) fchroot(r0) r1 = __clone(0x500, 0x0) fcntl$setstatus(r0, 0x4, 0x90000) getuid() ptrace(0x9, r1, 0x0, 0x0) 00:09:15 executing program 4: open(&(0x7f0000000040)='./file0\x00', 0x2070e, 0x0) munmap(&(0x7f0000109000/0x3000)=nil, 0x3000) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0xb0041, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000380)="ef17008e6d769584bd1613ccd8c4db241430ac1580e18f913c32a2bc19cbba77753fd1dffb63e455b5bc5c1ee1fa68496d5f1dfdc9d8e87d749053ebb3000e03483040ce45ed6dceb67ed93c43b3e8365ebe3bb5f7702b2d375da584d17372de44d1470bd99926b3a18cd1321e3620eaa2a3ea11db7478831814ebaf62b46cd83a6cd0ffb01fa14dd78605783671c2299e4038cf77a800f99fe2b69a766c01f1e956415d0dc55e96aec535de25c45dfc4a5914682c26fbf09a693ad4f297dfb12195c1ffeff5", 0xfe92}], 0x1) 00:09:15 executing program 4: socket(0x1f, 0x5, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)) select(0x40, &(0x7f0000000000)={0x7f}, 0x0, 0x0, 0x0) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) r1 = socket$inet6(0x18, 0x3, 0x0) setsockopt(r1, 0x29, 0x19, &(0x7f0000000000)="19", 0x20d) r2 = socket$inet6(0x18, 0x3, 0x0) setsockopt(r2, 0x29, 0x19, &(0x7f0000000000)="19", 0x20d) r3 = socket$inet6(0x18, 0x3, 0x0) setsockopt(r3, 0x29, 0x19, &(0x7f0000000000)="19", 0x20d) r4 = socket$inet6(0x18, 0x3, 0x0) setsockopt(r4, 0x29, 0x19, &(0x7f0000000000)="19", 0x20d) r5 = socket$inet6(0x18, 0x3, 0x0) setsockopt(r5, 0x29, 0x19, &(0x7f0000000000)="19", 0x20d) r6 = semget(0x3, 0x4, 0x80) r7 = geteuid() r8 = getgid() getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000001240)={0x0, 0x0}, &(0x7f0000001280)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f00000012c0)={0x0, 0x0, 0x0}, &(0x7f0000001300)=0xc) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000001340)={{0x1f, r7, r8, r9, r10, 0x0, 0xfffe}, 0x800, 0x2aa, 0x996}) r11 = accept(0xffffffffffffffff, 0x0, &(0x7f00000013c0)) r12 = geteuid() setsockopt$sock_cred(r11, 0xffff, 0x11, &(0x7f0000001400)={0xffffffffffffffff, r12, r8}, 0xc) r13 = msgget$private(0x0, 0x200) getsockopt$SO_PEERCRED(r11, 0xffff, 0x11, &(0x7f0000001440)={0x0, 0x0, 0x0}, 0xc) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000001480)={0x0, 0x0}, 0xc) r16 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, &(0x7f00000014c0)={0x0}, 0xc) msgctl$IPC_SET(r13, 0x1, &(0x7f0000001500)={{0x7, r9, r14, r15, r16, 0x10, 0x9}, 0x1, 0x1, r17, 0xffffffffffffffff, 0x123c7400, 0x7, 0xfa, 0x6de}) 00:09:15 executing program 3: r0 = semget$private(0x0, 0x4, 0x10) semop(r0, &(0x7f0000000000)=[{0x0, 0x200, 0x800}, {0x5, 0xa16, 0x800}, {0x4, 0x7, 0x3ff5eed92bf72577}, {0x3, 0x2, 0x800}, {0x3, 0x9, 0x5304a0edd7a8217e}, {0x0, 0x6, 0x800}], 0x6) socketpair(0x12, 0x40000000, 0x0, 0x0) [ 47.0170428] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/machdep.c:625:5, pointer expression with base 0x29 overflowed to 0xfffffffffffffc91 [ 47.0370600] cpu1: Begin traceback... [ 47.0570858] vpanic() at netbsd:vpanic+0x2aa [ 47.0971423] isAlreadyReported() at netbsd:isAlreadyReported [ 47.1371994] HandlePointerOverflow() at netbsd:HandlePointerOverflow+0xf7 [ 47.1772551] sendsig_siginfo() at netbsd:sendsig_siginfo+0x872 [ 47.2173195] sendsig() at netbsd:sendsig+0x116 [ 47.2573652] trapsignal() at netbsd:trapsignal+0xb11 [ 47.2974232] trap() at netbsd:trap+0x156e [ 47.3074348] --- trap (number 6) --- [ 47.3074348] Skipping crash dump on recursive panic [ 47.3174458] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:153:24, member access within misaligned address 0x4 for type 'struct x86_64_frame' which requires 8 byte alignment [ 47.3374752] Faulted in mid-traceback; aborting... [ 47.3374752] fatal breakpoint trap in supervisor mode [ 47.3474901] trap type 1 code 0 rip 0xffffffff8021dd9d cs 0x8 rflags 0x282 cr2 0xa9 ilevel 0 rsp 0xffffdc00b2c67690 [ 47.3575085] curlwp 0xffffc127920155a0 pid 650.5 lowest kstack 0xffffdc00b2c652c0 Stopped in pid 650.5 (syz-executor.1) at netbsd:breakpoint+0x5: leave ? breakpoint() at netbsd:breakpoint+0x5 db_panic() at netbsd:db_panic+0xd1 vpanic() at netbsd:vpanic+0x2aa isAlreadyReported() at netbsd:isAlreadyReported HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b db_nextframe() at netbsd:db_nextframe+0x6f6 db_stack_trace_print() at netbsd:db_stack_trace_print+0x2c4 db_panic() at netbsd:db_panic+0x8b vpanic() at netbsd:vpanic+0x2aa isAlreadyReported() at netbsd:isAlreadyReported HandlePointerOverflow() at netbsd:HandlePointerOverflow+0xf7 sendsig_siginfo() at netbsd:sendsig_siginfo+0x872 sendsig() at netbsd:sendsig+0x116 trapsignal() at netbsd:trapsignal+0xb11 trap() at netbsd:trap+0x156e --- trap (number 6) --- [ 47.3675155] Skipping crash dump on recursive panic [ 47.3675155] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:154:14, member access within misaligned address 0x4 for type 'struct x86_64_frame' which requires 8 byte alignment [ 47.3675155] Faulted in mid-traceback; aborting... [ 47.3675155] fatal breakpoint trap in supervisor mode [ 47.3675155] trap type 1 code 0 rip 0xffffffff8021dd9d cs 0x8 rflags 0x282 cr2 0xa9 ilevel 0x8 rsp 0xffffdc00b2c66390 [ 47.3675155] curlwp 0xffffc127920155a0 pid 650.5 lowest kstack 0xffffdc00b2c652c0 Stopped in pid 650.5 (syz-executor.1) at netbsd:breakpoint+0x5: leave