Warning: Permanently added '10.128.0.204' (ECDSA) to the list of known hosts. 2020/02/06 12:53:48 fuzzer started 2020/02/06 12:53:48 dialing manager at 10.128.0.105:34115 2020/02/06 12:53:49 syscalls: 215 2020/02/06 12:53:49 code coverage: enabled 2020/02/06 12:53:49 comparison tracing: enabled 2020/02/06 12:53:49 extra coverage: support is not implemented in syzkaller 2020/02/06 12:53:49 setuid sandbox: support is not implemented in syzkaller 2020/02/06 12:53:49 namespace sandbox: support is not implemented in syzkaller 2020/02/06 12:53:49 Android sandbox: support is not implemented in syzkaller 2020/02/06 12:53:49 fault injection: support is not implemented in syzkaller 2020/02/06 12:53:49 leak checking: support is not implemented in syzkaller 2020/02/06 12:53:49 net packet injection: support is not implemented in syzkaller 2020/02/06 12:53:49 net device setup: support is not implemented in syzkaller 2020/02/06 12:53:49 concurrency sanitizer: support is not implemented in syzkaller 2020/02/06 12:53:49 devlink PCI setup: support is not implemented in syzkaller 12:53:51 executing program 0: setuid(0xee01) msgget(0x1, 0x254) 12:53:51 executing program 1: pipe(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) 12:53:51 executing program 2: mknod(&(0x7f0000000040)='./bus\x00', 0x8000, 0x86128) accept$unix(0xffffffffffffff9c, &(0x7f0000000180)=ANY=[@ANYBLOB="070182f9f3570800000b00000000ac61000800000000000020000004"], 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x6, 0x0) write(r0, &(0x7f0000000140)="220e228901001c067ebc74a7ea11cf801bf1fa48f4445ed5", 0x18) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff07}], 0x100000000000005e, 0x0) 12:53:51 executing program 3: r0 = socket(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x9, 0x0, 0x0) 12:53:52 executing program 4: r0 = socket(0x11, 0x3, 0x0) read(r0, &(0x7f0000000000)=""/12, 0xc) sendto$unix(r0, &(0x7f0000000200)="9b03050400000000000008000101000000000000cea1fea7fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882a297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282902e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea800000002000000000000020208a371a3f800040000000000000001000000000000000000", 0x39b, 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) write(r1, &(0x7f0000000040)="510fc3", 0x3) pwritev(r1, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff88}], 0x1, 0x0) r2 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) write(r2, &(0x7f0000000040)="510fc3", 0x3) pwritev(r2, &(0x7f00000015c0)=[{&(0x7f0000001600)="81f8e0d51806000000", 0x9}, {&(0x7f0000001580)="121fd0891986b6788897d3158a3f1565a9fe5cab872ce2c6163c7a0bd1b238fd96a00574f423cef1276ab7cd79dee20af4236a6195", 0x35}], 0x2, 0x0) r3 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) write(r3, &(0x7f0000000040)="510fc3", 0x3) pwritev(r3, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff88}], 0x1, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000001400), 0xc) r4 = semget$private(0x0, 0x5, 0x204) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x6a, 0x0, 0x0) r6 = semget$private(0x0, 0x4, 0x220) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) r9 = getgid() getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0xc) semctl$GETVAL(r6, 0x3, 0x5, &(0x7f00000003c0)=""/85) chown(&(0x7f0000000300)='./file0\x00', r10, r8) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000140)={{0x20040000, r7, r9, r10, r11, 0x2, 0x9}, 0x5, 0x5, 0x2}) semctl$GETALL(r6, 0x0, 0x6, &(0x7f0000000140)=""/85) semop(r6, &(0x7f0000001640)=[{0x0, 0x9, 0x1000}, {0x1, 0x10001, 0x800}], 0x2) semctl$GETVAL(r4, 0x0, 0x5, &(0x7f0000000340)=""/211) semctl$SETALL(r4, 0x0, 0x9, &(0x7f0000000100)=[0x0]) r12 = msgget$private(0x0, 0x124) r13 = getpgid(0x0) msgctl$IPC_SET(r12, 0x1, &(0x7f0000003f80)={{}, 0x0, 0x0, r13, 0x0, 0x0, 0x0, 0x80a6}) r14 = getuid() setreuid(0xee00, r14) r15 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r16 = socket(0x2, 0x2, 0x0) setsockopt$sock_linger(r16, 0xffff, 0x1023, &(0x7f0000000040)={0xc600}, 0x7) accept$inet6(r0, &(0x7f0000000300), &(0x7f0000000440)=0xc) r17 = socket(0x2, 0x2, 0x0) setsockopt$sock_linger(r17, 0xffff, 0x1023, &(0x7f0000000040)={0xc600}, 0x7) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) fchown(r15, 0xffffffffffffffff, r18) msgctl$IPC_SET(r12, 0x1, &(0x7f00000000c0)={{0x1f, r14, r18, 0x0, 0x0, 0x1, 0x6}, 0x10000, 0x9, 0x0, 0x0, 0x8, 0x5, 0x6, 0x2}) r19 = msgget$private(0x0, 0x0) r20 = getpgid(0x0) msgctl$IPC_SET(r19, 0x1, &(0x7f0000003f80)={{}, 0x0, 0x0, r20, 0x0, 0x0, 0x0, 0x80a6}) r21 = getuid() setreuid(0xee00, r21) r22 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r23, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffff80) fchown(r22, 0xffffffffffffffff, r24) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r25, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xfffffffffffffd13) setregid(0xffffffffffffffff, r26) r27 = getegid() msgctl$IPC_SET(r19, 0x1, &(0x7f0000000480)={{0xfffff000, r21, r27, 0x0, 0x0, 0x4c, 0x808}, 0xffff, 0x9, 0x0, 0xffffffffffffffff, 0x8, 0x5, 0x6, 0xfffffffffffffffe}) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000080)={{0xfffffffc, 0xffffffffffffffff, r18, r21, 0x0, 0x8, 0x7}, 0x3ff, 0x5, 0x3}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) setegid(r28) r29 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) write(r29, &(0x7f0000000040)="510fc3", 0x3) pwritev(r29, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff88}], 0x1, 0x0) r30 = open(&(0x7f0000000000)='./bus\x00', 0x2, 0x0) write(r30, &(0x7f0000000040)="510fc3", 0x3) pwritev(r30, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff88}], 0x1, 0x0) getpid() 12:53:52 executing program 5: r0 = socket(0x2, 0x3, 0x0) connect$unix(r0, &(0x7f0000000840)=ANY=[@ANYBLOB="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"/1596], 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 12:53:53 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="380000000097143492"], 0x9}, 0x0) r0 = socket(0x800000018, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) 12:53:53 executing program 2: mknod(&(0x7f0000000040)='./bus\x00', 0x8000, 0x86128) accept$unix(0xffffffffffffff9c, &(0x7f0000000180)=ANY=[@ANYBLOB="070182f9f3570800000b00000000ac61000800000000000020000004"], 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x6, 0x0) write(r0, &(0x7f0000000140)="220e228901001c067ebc74a7ea11cf801bf1fa48f4445ed5", 0x18) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff07}], 0x100000000000005e, 0x0) 12:53:53 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="380000000097143492"], 0x9}, 0x0) r0 = socket(0x800000018, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) 12:53:53 executing program 1: r0 = socket(0x2, 0x3, 0x0) r1 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x20, &(0x7f0000000000)=0x7fff, 0x4) connect$unix(r1, &(0x7f0000001200)=ANY=[@ANYBLOB="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"], 0x10) dup2(r1, r0) write(r0, 0x0, 0x0) 12:53:53 executing program 2: mknod(&(0x7f0000000040)='./bus\x00', 0x8000, 0x86128) accept$unix(0xffffffffffffff9c, &(0x7f0000000180)=ANY=[@ANYBLOB="070182f9f3570800000b00000000ac61000800000000000020000004"], 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x6, 0x0) write(r0, &(0x7f0000000140)="220e228901001c067ebc74a7ea11cf801bf1fa48f4445ed5", 0x18) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff07}], 0x100000000000005e, 0x0) 12:53:54 executing program 1: setuid(0xee01) r0 = semget(0x1, 0x0, 0x0) semctl$SETVAL(r0, 0x0, 0x8, &(0x7f0000000080)) 12:53:54 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="380000000097143492"], 0x9}, 0x0) r0 = socket(0x800000018, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) 12:53:54 executing program 3: socket(0xa, 0x5, 0x0) 12:53:54 executing program 2: mknod(&(0x7f0000000040)='./bus\x00', 0x8000, 0x86128) accept$unix(0xffffffffffffff9c, &(0x7f0000000180)=ANY=[@ANYBLOB="070182f9f3570800000b00000000ac61000800000000000020000004"], 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x6, 0x0) write(r0, &(0x7f0000000140)="220e228901001c067ebc74a7ea11cf801bf1fa48f4445ed5", 0x18) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff07}], 0x100000000000005e, 0x0) 12:53:54 executing program 3: semget(0x1, 0x2, 0x711) [ 43.4002557] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/net/rtsock_shared.c:631:41, member access within misaligned address 0xfffff1de4d35938c for type 'struct rt_msghdr50' which requires 8 byte alignment [ 43.4002557] cpu1: Begin traceback... [ 43.4202848] vpanic() at netbsd:vpanic+0x2aa [ 43.4703765] isAlreadyReported() at netbsd:isAlreadyReported [ 43.5204663] HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc [ 43.5705606] HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b [ 43.6206498] compat_50_route_output() at netbsd:compat_50_route_output+0x1a4a [ 43.6707416] raw_send() at netbsd:raw_send+0x20b [ 43.7208316] compat_50_route_send_wrapper() at netbsd:compat_50_route_send_wrapper+0x9f [ 43.7709355] sosend() at netbsd:sosend+0x15ac [ 43.8210139] do_sys_sendmsg_so() at netbsd:do_sys_sendmsg_so+0x53d [ 43.8610878] do_sys_sendmsg() at netbsd:do_sys_sendmsg+0xcd [ 43.9111807] sys_sendto() at netbsd:sys_sendto+0xc9 [ 43.9612712] sys___syscall() at netbsd:sys___syscall+0x1c8 [ 44.0113644] syscall() at netbsd:syscall+0x29a [ 44.0213806] --- syscall (number 198) --- [ 44.0313988] Skipping crash dump on recursive panic [ 44.0313988] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:153:24, member access within misaligned address 0x6 for type 'struct x86_64_frame' which requires 8 byte alignment [ 44.0514335] Faulted in mid-traceback; aborting... [ 44.0614509] fatal breakpoint trap in supervisor mode [ 44.0614509] trap type 1 code 0 rip 0xffffffff8021e7cd cs 0x8 rflags 0x282 cr2 0x73ef5b400000 ilevel 0x4 rsp 0xffffb900b12075f0 [ 44.0714713] curlwp 0xfffff1de5df894c0 pid 591.4 lowest kstack 0xffffb900b12052c0 Stopped in pid 591.4 (syz-executor.4) at netbsd:breakpoint+0x5: leave ? breakpoint() at netbsd:breakpoint+0x5 db_panic() at netbsd:db_panic+0xd1 vpanic() at netbsd:vpanic+0x2aa isAlreadyReported() at netbsd:isAlreadyReported HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b db_nextframe() at netbsd:db_nextframe+0x6f6 db_stack_trace_print() at netbsd:db_stack_trace_print+0x2c4 db_panic() at netbsd:db_panic+0x8b vpanic() at netbsd:vpanic+0x2aa isAlreadyReported() at netbsd:isAlreadyReported HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b compat_50_route_output() at netbsd:compat_50_route_output+0x1a4a raw_send() at netbsd:raw_send+0x20b compat_50_route_send_wrapper() at netbsd:compat_50_route_send_wrapper+0x9f sosend() at netbsd:sosend+0x15ac do_sys_sendmsg_so() at netbsd:do_sys_sendmsg_so+0x53d do_sys_sendmsg() at netbsd:do_sys_sendmsg+0xcd sys_sendto() at netbsd:sys_sendto+0xc9 sys___syscall() at netbsd:sys___syscall+0x1c8 syscall() at netbsd:syscall+0x29a --- syscall (number 198) --- [ 44.0814869] Skipping crash dump on recursive panic [ 44.0814869] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:154:14, member access within misaligned address 0x6 for type 'struct x86_64_frame' which requires 8 byte alignment [ 44.0814869] Faulted in mid-traceback; aborting... [ 44.0814869] fatal breakpoint trap in supervisor mode [ 44.0814869] trap type 1 code 0 rip 0xffffffff8021e7cd cs 0x8 rflags 0x282 cr2 0x73ef5b400000 ilevel 0x8 rsp 0xffffb900b12062f0 [ 44.0814869] curlwp 0xfffff1de5df894c0 pid 591.4 lowest kstack 0xffffb900b12052c0 Stopped in pid 591.4 (syz-executor.4) at netbsd:breakpoint+0x5: leave