Warning: Permanently added '10.128.0.45' (ECDSA) to the list of known hosts. 2020/05/07 19:43:49 fuzzer started 2020/05/07 19:43:55 dialing manager at 10.128.15.235:26027 2020/05/07 19:43:55 syscalls: 338 2020/05/07 19:43:55 code coverage: enabled 2020/05/07 19:43:55 comparison tracing: enabled 2020/05/07 19:43:55 extra coverage: support is not implemented in syzkaller 2020/05/07 19:43:55 setuid sandbox: enabled 2020/05/07 19:43:55 namespace sandbox: support is not implemented in syzkaller 2020/05/07 19:43:55 Android sandbox: support is not implemented in syzkaller 2020/05/07 19:43:55 fault injection: support is not implemented in syzkaller 2020/05/07 19:43:55 leak checking: support is not implemented in syzkaller 2020/05/07 19:43:55 net packet injection: enabled 2020/05/07 19:43:55 net device setup: support is not implemented in syzkaller 2020/05/07 19:43:55 concurrency sanitizer: support is not implemented in syzkaller 2020/05/07 19:43:55 devlink PCI setup: support is not implemented in syzkaller 2020/05/07 19:43:55 USB emulation: support is not implemented in syzkaller 19:43:59 executing program 0: r0 = openat$wsmuxkbd(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wskbd\x00', 0x400, 0x0) fsync(r0) r1 = syz_open_pts() ioctl$FIOSETOWN(r1, 0x8004667c, &(0x7f0000000040)=0x401) r2 = syz_open_pts() ioctl$TIOCCHKVERAUTH(r2, 0x2000741e) ioctl$TIOCSDTR(r1, 0x20007479) getsockname$unix(0xffffffffffffff9c, &(0x7f0000000080)=@file={0x0, ""/94}, &(0x7f0000000100)=0x60) r3 = accept$inet6(0xffffffffffffff9c, 0x0, &(0x7f0000000140)) recvfrom$inet6(r3, &(0x7f0000000180)=""/170, 0xaa, 0x1000, &(0x7f0000000240)={0x18, 0x1, 0x80000001, 0x7ff}, 0xc) shmat(0xffffffffffffffff, &(0x7f0000ffb000/0x4000)=nil, 0x63e29a7aa9107037) r4 = socket$unix(0x1, 0x5, 0x0) connect$unix(r4, &(0x7f0000000280)=@file={0x1, './file0\x00'}, 0xa) r5 = fcntl$dupfd(0xffffffffffffff9c, 0xa, r4) ioctl$BIOCSDIRFILT(r5, 0x8004427d, &(0x7f00000002c0)=0x4) recvfrom$inet6(r5, &(0x7f0000000300)=""/250, 0xfa, 0x2, &(0x7f0000000400)={0x18, 0x0, 0x3ff, 0x7}, 0xc) setsockopt(r4, 0x8a, 0x1f, &(0x7f0000000440)="b7848a80ebc795c582f884fee1d94f5c63380aa2a4f8dfca7a9e7ab7b22b7daf342f94104b6b34e458e94280b9e7d6ae2956506d0c9071605a0e7ea3818e4a9e0700c9fc037d7a48f9a33bd59209ec8e866ab9194a815d8f41787397c09cf5f5eb0926d3e6679883e4f3e44ae6040b3e10353711f84c830f5223500370146024c5dfc5eb9b9419473bd3e4a8cb2335544fb4270a5b4327952c068b94e2", 0x9d) pipe(&(0x7f0000000500)={0xffffffffffffffff}) ioctl$TIOCSETAF(r6, 0x802c7416, &(0x7f0000000540)={0x3, 0x10000, 0xa100, 0x8000, "be868498eaea7cf2b39e372259eb821ad18533e3", 0xef, 0x1aa0}) pwritev(r1, &(0x7f0000000600)=[{&(0x7f0000000580)="bbd9256cb6eb28f32b263d25968d79af5143c3b6921fd4751af1bec77ccf516e485f4288085b4e39760cac51bc966dee67b11b036cb75bb938482c26f41c235b173eb0b09fd0bab373c8cb79787c4aeca7c35965116e9e015a94e797a6488be8449cb0143122702c46a6da14911689012f2f8298f9d592ab9e973f030667", 0x7e}], 0x1, 0x0, 0xbf) 19:43:59 executing program 1: socket(0x1, 0x3, 0x3f) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x8, 0x0) ioctl$WSDISPLAYIO_LDFONT(r0, 0x8058574d, &(0x7f0000000040)={'./file0\x00', 0x8000, 0x401, 0xffff, 0x1, 0x0, 0x200, 0x80000001, 0x0, 0x0, 0x8000, 0x6}) r1 = socket$inet6(0x18, 0x4000, 0x4e) r2 = dup2(r1, r0) r3 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x200, 0x0) setsockopt(r3, 0xbc6f, 0x6, &(0x7f0000000100)="ad63102393467fe034a037a04eed26aace4c05f9366d71dba47537ce3f1f8c9e763424e8ac03cd938b669c7a0e97c2bacaad1aca5183155c0e64658792e7375548d62f3d2832be54a6e9c0fc039ea4a15f01aaa4bac3c3e4b9e924840dc6b94aff40ae19255dc177074abf6b3d891d23cd409a1f1d2932c97665ff04b2c390b7", 0x80) ioctl$VT_GETACTIVE(r2, 0x40047607, &(0x7f0000000180)) r4 = shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x1000) shmdt(r4) r5 = semget(0x2, 0x2, 0x80) semop(r5, &(0x7f00000001c0)=[{0x2, 0x5, 0x1000}, {0x4, 0x5, 0x1800}, {0x0, 0x0, 0x800}, {0x0, 0x7f, 0x1800}, {0x1, 0x5}, {0x4, 0x7, 0x1800}, {0x1, 0x5, 0x1800}, {0x1, 0x80, 0x800}, {0x2, 0x4}, {0x4, 0x8, 0x3800}], 0xa) ioctl$WSDISPLAYIO_ADDSCREEN(r3, 0x80245753, &(0x7f0000000200)={0x5, './file0\x00', './file0\x00'}) r6 = fcntl$dupfd(r1, 0xa, 0xffffffffffffff9c) getsockname$unix(r6, &(0x7f0000000240)=@file={0x0, ""/99}, &(0x7f00000002c0)=0x65) r7 = openat(r0, &(0x7f0000000300)='./file0\x00', 0x100, 0x1e1) ioctl$WSMOUSEIO_SETMODE(r7, 0x80045726, &(0x7f0000000340)={0x3}) r8 = socket$unix(0x1, 0x1, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000380)={0x0}, 0xc) fcntl$setown(r8, 0x6, r9) 19:44:00 executing program 0: r0 = syz_open_pts() writev(r0, &(0x7f0000000100)=[{&(0x7f0000000480)="bc", 0x1}], 0x1) ioctl$TIOCSTOP(r0, 0x2000746f) r1 = open(&(0x7f0000000140)='./file0\x00', 0x70e, 0x0) pwritev(r1, &(0x7f0000002440)=[{&(0x7f0000000080)='l', 0x1}], 0x1, 0x0, 0x5fcb) pwritev(r1, &(0x7f0000000580)=[{&(0x7f0000000000)="d6", 0x1}], 0x1, 0x0, 0x0) fsync(r1) r2 = shmget$private(0x0, 0x5000, 0x24c, &(0x7f0000ff9000/0x5000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000180)=""/156) ioctl$KDSETRAD(r1, 0x20004b43) ioctl$TIOCGTSTAMP(r1, 0x4010745b, &(0x7f0000000040)) ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f00000000c0)={0x0, 0x0, 0x90d6, 0x0, "d700060000000000005b00000000000000e74de4"}) write(r0, &(0x7f0000000040), 0xfffffec2) clock_getres(0x4, &(0x7f0000000000)) syz_open_pts() syz_open_pts() 19:44:00 executing program 1: ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "73ccb37b2efe222c245e1a23e6b5c9c06d00"}) r0 = socket(0x10000000002, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1023, &(0x7f0000000000), 0x12b) r1 = semget$private(0x0, 0x4, 0x220) r2 = getgid() semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000480)={{0x0, 0x0, 0x0, 0x0, r2}}) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000140)={{0x20040004, 0x0, 0x0, 0x0, r2, 0x190, 0x100}, 0x5, 0x5, 0x2}) r3 = semget$private(0x0, 0x4, 0x220) r4 = getgid() semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000480)={{0x0, 0x0, 0x0, 0x0, r4}}) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000140)={{0x20040004, 0x0, 0x0, 0x0, r4, 0x190, 0x100}, 0x5, 0x5, 0x2}) r5 = semget$private(0x0, 0x4, 0x220) r6 = getgid() semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000480)={{0x0, 0x0, 0x0, 0x0, r6}}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000140)={{0x20040004, 0x0, 0x0, 0x0, r6, 0x190, 0x100}, 0x5, 0x5, 0x2}) r7 = semget$private(0x0, 0x4, 0x220) r8 = getgid() semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000480)={{0x0, 0x0, 0x0, 0x0, r8}}) semctl$IPC_SET(r7, 0x0, 0x1, &(0x7f0000000080)={{0x20040004, 0x0, 0x0, 0x0, 0x0, 0x190, 0x100}, 0x5, 0x5, 0x2}) getgroups(0x5, &(0x7f0000000040)=[0x0, r2, r4, r6, r8]) 19:44:00 executing program 1: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) poll(&(0x7f0000000000)=[{r0, 0x160}], 0x1, 0x606dca73) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x10000221, 0x0, 0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x3fd, 0x0) pwritev(r2, &(0x7f00000003c0), 0x273, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r2, 0x0, 0x0) r3 = dup2(r1, r0) r4 = kqueue() r5 = fcntl$dupfd(r4, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x10, r5, 0x0, 0x0) ioctl$TIOCSTART(r3, 0x2000746e) 19:44:00 executing program 1: openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/wsmouse0\x00', 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="83020801"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x2, 0x0) mprotect(&(0x7f0000022000/0x4000)=nil, 0x4000, 0x4) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) login: OpenBSD/amd64 (ci-openbsd-setuid-6.c.syzkaller.internal) (tty00) login: set $lines = 0 Password: Login incorrect login: show panic Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect show malloc login: Password: Login incorrect machine ddbcpu 0 login: Password: Login incorrect machine ddbcpu 1 login: Password: Login incorrect