kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Sat Feb 15 17:36:41 PST 2020 OpenBSD/amd64 (ci-openbsd-main-4.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.9' (ECDSA) to the list of known hosts. 2020/02/15 17:36:53 fuzzer started 2020/02/15 17:36:58 dialing manager at 10.128.15.235:42300 2020/02/15 17:36:58 syscalls: 337 2020/02/15 17:36:58 code coverage: enabled 2020/02/15 17:36:58 comparison tracing: enabled 2020/02/15 17:36:58 extra coverage: support is not implemented in syzkaller 2020/02/15 17:36:58 setuid sandbox: enabled 2020/02/15 17:36:58 namespace sandbox: support is not implemented in syzkaller 2020/02/15 17:36:58 Android sandbox: support is not implemented in syzkaller 2020/02/15 17:36:58 fault injection: support is not implemented in syzkaller 2020/02/15 17:36:58 leak checking: support is not implemented in syzkaller 2020/02/15 17:36:58 net packet injection: enabled 2020/02/15 17:36:58 net device setup: support is not implemented in syzkaller 2020/02/15 17:36:58 concurrency sanitizer: support is not implemented in syzkaller 2020/02/15 17:36:58 devlink PCI setup: support is not implemented in syzkaller 17:37:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x2, 0x0) ioctl$BIOCPROMISC(r0, 0x20004269) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r3 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$SPKRTUNE(r3, 0x20005302, &(0x7f00000000c0)={0x2, 0x7ff}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x80, 0x0) ioctl$BIOCGDLTLIST(r4, 0xc010427b, &(0x7f0000000180)={0x1, &(0x7f0000000140)=[0x8000]}) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10004) ioctl$BIOCSETIF(r6, 0x8020426c, &(0x7f0000000200)={'tap', 0x0}) r7 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bpf\x00', 0xe00, 0x0) ioctl$BIOCSETWF(r7, 0x80104277, &(0x7f00000002c0)={0x2, &(0x7f0000000280)=[{0x6, 0x7, 0x6, 0xfffffff7}, {0x3, 0x6, 0x0, 0x7f}]}) r8 = fcntl$dupfd(r5, 0x0, r7) fcntl$setflags(r8, 0x2, 0x1) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000000300)='/dev/null\x00', 0x8, 0x0) getsockopt$sock_timeval(r9, 0xffff, 0x1006, &(0x7f0000000340), &(0x7f0000000380)=0x10) r10 = dup(r1) ioctl$TIOCMBIC(r10, 0x8004746b, &(0x7f00000003c0)=0x7) pipe2(&(0x7f0000000400)={0xffffffffffffffff}, 0x0) ioctl$KDSETMODE(r11, 0x20004b0a, &(0x7f0000000440)=0x1) r12 = openat$null(0xffffffffffffff9c, &(0x7f0000000480)='/dev/null\x00', 0x80, 0x0) pread(r12, &(0x7f00000004c0)="b089ee9cfb0c6564efcfbd31deee0f73d3e004ddc0597a62704ecdf10f1842157195afe09d605921898f0faaf28cf17e67e918d53cc145df9a2a6f0df99b7cec6d76ef13186add7920849f1813ef1cc6ab43c80b22c73a3a02baa424efa195ff7fcd4c4a73929449bef14feaf83825ad1ff70dd543c6c012577097cd0e4953d83288cc9f2a141e904bc5efdbdb43643eda739a3d3af7c6aebae4f0901f", 0x9d, 0x0, 0x400) r13 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x200, 0x0) ioctl$TIOCSFLAGS(r13, 0x8004745c, &(0x7f00000005c0)=0x101) r14 = dup(0xffffffffffffff9c) ioctl$BIOCSETIF(r14, 0x8020426c, &(0x7f0000000600)={'tap', 0x0}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000640)={'tap', 0x0}) pipe2(&(0x7f0000000680), 0x10000) pipe(&(0x7f00000006c0)={0xffffffffffffffff}) ioctl$BIOCSRSIG(r15, 0x80044272, &(0x7f0000000700)=0x2) 17:37:02 executing program 0: r0 = dup(0xffffffffffffff9c) ioctl$WSDISPLAYIO_GVIDEO(r0, 0x40045744, &(0x7f0000000000)) poll(&(0x7f0000000040), 0x0, 0x7) ioctl$VT_GETMODE(r0, 0x40087603, &(0x7f0000000080)) semget(0x1, 0x4, 0x60) r1 = dup(0xffffffffffffffff) ioctl$TIOCNXCL(r1, 0x2000740e) recvfrom$inet(r1, &(0x7f00000000c0)=""/162, 0xa2, 0x1, 0x0, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, &(0x7f0000000180)={0x0}, 0xc) fcntl$setown(r1, 0x6, r2) r3 = msgget$private(0x0, 0x41c) msgrcv(r3, &(0x7f00000001c0)={0x0, ""/118}, 0x7e, 0x1, 0x1000) open(&(0x7f0000000240)='./file0\x00', 0x800, 0x12) r4 = semget(0x0, 0x3, 0x155) semctl$IPC_RMID(r4, 0x0, 0x0) semctl$GETPID(r4, 0x3, 0x4, &(0x7f0000000280)) r5 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x2, 0x0) ioctl$VT_SETMODE(r5, 0x80087602, &(0x7f0000000300)={0x1, 0x0, 0x5, 0x7, 0xe092}) r6 = openat$tty(0xffffffffffffff9c, &(0x7f0000000340)='/dev/tty\x00', 0x8, 0x0) ioctl$TIOCGFLAGS(r6, 0x4004745d, &(0x7f0000000380)) ioctl$WSDISPLAYIO_GVIDEO(0xffffffffffffff9c, 0x40045744, &(0x7f00000003c0)) r7 = syz_open_pts() fcntl$getown(r7, 0x5) sync() r8 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x20, 0x0) ioctl$WSMUXIO_LIST_DEVICES(r8, 0xc1045763, &(0x7f0000000440)={0x1000, [{0x1, 0x3}, {0x1, 0x6}, {0x2, 0x3}, {0x3, 0x1}, {0x1, 0xf8000000}, {0x3, 0x2}, {0x2, 0x7}, {0x3, 0x4}, {0x3, 0x7a9}, {0x2, 0x1}, {0x1, 0x80000}, {0x0, 0x7}, {0x2, 0x200}, {0x1, 0x2}, {0x3, 0xffff0cd1}, {0x3, 0x5}, {0x3, 0x1ff}, {0x3, 0x8001}, {0x3, 0x2}, {0x3}, {0x2, 0x6914}, {0x3, 0x100}, {0x1, 0x1}, {0x1, 0xe3c}, {0x2, 0x91}, {0x3, 0x7fffffff}, {0x3, 0x81}, {0x1, 0xcb}, {0x2, 0x6f}, {0x1, 0x6}, {0x2, 0x400}, {0x1, 0x8eda}]}) ioctl$WSDISPLAYIO_SVIDEO(r1, 0x80045745, &(0x7f0000000580)=0x1) openat$wsmouse(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/wsmouse0\x00', 0x2, 0x0) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000600)='/dev/zero\x00', 0x10, 0x0) recvfrom$inet6(r9, &(0x7f0000000640)=""/155, 0x9b, 0x1802, &(0x7f0000000700)={0x18, 0x2, 0x6}, 0xc) 17:37:02 executing program 1: r0 = socket(0x2, 0xc003, 0x0) setsockopt(r0, 0x0, 0x21, 0x0, 0x0) r1 = socket(0x2, 0xc003, 0x0) setsockopt(r1, 0x0, 0x21, 0x0, 0x0) r2 = dup2(r0, r1) ioctl$VMM_IOC_WRITEREGS(r2, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x1, {[0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe], [0x0, 0x0, 0x0, 0x200000009, 0xdfefffff], [0x0, 0x0, 0x403], [{0x0, 0x0, 0x1}, {}, {}, {0x0, 0x7, 0x0, 0x2}, {}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x5, 0x20}, {0x0, 0x0, 0x0, 0x4}], {0x0, 0x9}}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r3 = socket(0x18, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$TIOCFLUSH(r4, 0x8080691a, &(0x7f0000000300)) 17:37:02 executing program 1: semop(0x0, &(0x7f0000000000)=[{}, {}, {}, {}, {0x0, 0x3}, {0x0, 0x0, 0x1000}, {}, {0x0, 0x0, 0x1800}, {}, {0x0, 0x7}], 0xa) syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffe5ffffaaaaaaaaaa0486dd60a4f00808183c00fe80000000fffa0000000000000000aaff020000000000000000000000000001"]) r0 = semget(0x3, 0x3, 0x281) semctl$GETZCNT(r0, 0x2, 0x7, &(0x7f0000000040)=""/4096) syz_emit_ethernet(0x400e, &(0x7f0000000000)="c7a895006f53dd000005ffff86dd") 17:37:02 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0xab33673602b13e1e) setregid(r1, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x40000400000002c1, 0x0) ftruncate(r2, 0x0, 0x7fffffffff3) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0) setregid(0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0) r3 = socket(0x2, 0xc003, 0x0) connect$unix(r3, &(0x7f0000000140)=ANY=[@ANYBLOB="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"/278], 0x1) write(r3, &(0x7f0000000080)="9e", 0x1) 17:37:03 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x20000000000002a2, &(0x7f0000000180)=[{0x44}, {0x2}, {0x7ffffffe}]}) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x0) r1 = syz_open_pts() ioctl$TIOCCONS(r1, 0x80047462, &(0x7f0000000140)=0x9) syz_open_pts() openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000100), 0x6, 0x0, 0x40000009d1, &(0x7f0000000140)={0x3, 0x7fffffff}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000200)={'tap', 0x0}) syz_emit_ethernet(0x3ba, &(0x7f00000000c0)="b6") openat$bpf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bpf\x00', 0x400, 0x0) 17:37:03 executing program 1: setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x0, &(0x7f0000000000), 0x4) madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) r0 = socket$inet6(0x18, 0x3, 0x0) getsockname(r0, &(0x7f0000002880)=@un=@file={0x0, ""/108}, &(0x7f00000010c0)=0x6e) pledge(&(0x7f0000000040)='&\x00', &(0x7f0000000080)='!(\xf4\"+!:\x00') 17:37:03 executing program 1: shmget$private(0x0, 0x4000, 0x8, &(0x7f0000ffc000/0x4000)=nil) geteuid() getgid() getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000001640), 0xc) getpgid(0x0) getuid() chmod(&(0x7f0000000180)='./file0\x00', 0x40) r0 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) close(r0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0}, 0x4d78218886102b18) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0xc) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000540)={0x0, 0x0}, &(0x7f0000000580)=0xc) r4 = semget$private(0x0, 0x7, 0x286) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000740)={{0xffffffffeffffff7, r3, 0x0, r1, r2, 0x1, 0x9}, 0xfffffffffffb8f49, 0xa8a, 0x3}) r5 = socket(0x18, 0x1, 0x0) close(r5) shutdown(r5, 0x0) chroot(&(0x7f00000001c0)='./file0\x00') r6 = socket(0x11, 0x4003, 0x0) r7 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getsockopt$sock_int(r7, 0xffff, 0x1004, &(0x7f0000000000), &(0x7f0000000040)=0x4) connect(0xffffffffffffff9c, &(0x7f0000000140)=@un=@file={0x1, './file1\x00'}, 0xa) sendto$unix(r6, &(0x7f0000000300)="b1000513b100030000003d000000000000000000ce24fea7fef96eefc73fd3357ae26caa0416fa76d06336acf00b7804be781e4991f7c8df5f882b2b7be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27ecb5d602000d7d026ba8af63ff37282921e4fd89720fd3872babfbb770c1abda71601a8bfee8aca491ffaef5a872c881ff7cc53c894303b22f310b404f36a00fdf9000fcfff0ffe608a371a3f800040000000000000001000000000000000000", 0xb1, 0x40b, 0x0, 0x0) 17:37:03 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x10202, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) ioctl$FIONBIO(r1, 0x8004667e, &(0x7f0000000140)) ioctl$VMM_IOC_READREGS(0xffffffffffffffff, 0xc2485607, &(0x7f0000000240)) openat(r1, &(0x7f0000000080)='./file0\x00', 0x1, 0x41) mmap(&(0x7f0000002000/0x3000)=nil, 0x3000, 0x1, 0x10, r0, 0x0, 0x0) pwritev(r0, &(0x7f0000000200)=[{&(0x7f0000000140)="04", 0x1}], 0x1, 0x0, 0x0) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) r2 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x10, r2, 0x0, 0x0) 17:37:03 executing program 1: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) kevent(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x0) msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r1 = socket(0x18, 0x1, 0x0) close(r1) r2 = socket(0x18, 0x2, 0x0) close(r2) r3 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r2, &(0x7f0000000040)="100a2956b9223776", 0x14a) setsockopt$sock_int(r3, 0xffff, 0x1004, &(0x7f0000000080)=0x81, 0x4) 17:37:03 executing program 0: r0 = syz_open_pts() select(0x40, &(0x7f0000000000)={0x20}, 0x0, 0x0, 0x0) ioctl$TIOCSETAW(r0, 0x802c7415, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "1b12e4b5cc1b9a1b2c40b00bc954c51f5c2a88ef"}) ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x101, "2f5d235fa443d235e33eaf74cdca4700"}) syz_open_pts() r1 = socket(0x2, 0xc003, 0x0) setsockopt(r1, 0x0, 0x21, 0x0, 0x0) ftruncate(r1, 0x0, 0x0) 17:37:03 executing program 1: setrlimit(0x8, &(0x7f0000000080)={0x7, 0x20}) r0 = syz_open_pts() close(r0) syz_open_pts() r1 = socket(0x2, 0xc003, 0x0) setsockopt(r1, 0x0, 0x21, 0x0, 0x0) r2 = dup(r1) ioctl$BIOCGRSIG(r2, 0x40044273, &(0x7f0000000000)) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f00000000c0)=0x8) writev(r0, &(0x7f0000002a00)=[{&(0x7f0000000440), 0xff52}], 0x1) r3 = msgget$private(0x0, 0x1) r4 = geteuid() getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0xc) r6 = getuid() setreuid(0x0, r6) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r7, 0xffff, 0x1022, &(0x7f0000000400)={0x0, 0x0}, 0xffffffffffffff96) r9 = semget$private(0x0, 0x4, 0xa5) semop(r9, &(0x7f00000003c0)=[{0x8, 0x8, 0x1000000}, {0x2, 0xfffffffffffffffd, 0x1000}, {0x2000000003, 0x100, 0x7fc}], 0x3) semop(r9, &(0x7f0000001180), 0x1e316d81a01eac7d) semctl$SETALL(r9, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semctl$SETALL(r9, 0x0, 0x9, &(0x7f0000000180)=[0xfffffffffffffff8, 0x81, 0x7fffffff, 0x6b12, 0x8000000000000008, 0x1f, 0x8]) semop(r9, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r9, &(0x7f0000000240), 0x6) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) r11 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0}, 0xff4b) r13 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETVERAUTH(r13, 0xc0107002, &(0x7f0000000000)=0x280000) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) semctl$IPC_SET(r9, 0x0, 0x1, &(0x7f0000000100)={{0x3, r10, r11, r12, r14, 0x4}, 0x200, 0x401, 0x2}) chown(&(0x7f0000000000)='./file0\x00', r8, r11) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r15, 0xffff, 0x1022, &(0x7f0000000400)={0x0, 0x0}, 0xffffffffffffff96) r17 = semget$private(0x0, 0x4, 0xa5) semop(r17, &(0x7f00000003c0)=[{0x8, 0x8, 0x1000000}, {0x2, 0xfffffffffffffffd, 0x1000}, {0x2000000003, 0x100, 0x7fc}], 0x3) semop(r17, &(0x7f0000001180), 0x1e316d81a01eac7d) semctl$SETALL(r17, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semctl$SETALL(r17, 0x0, 0x9, &(0x7f0000000180)=[0xfffffffffffffff8, 0x81, 0x7fffffff, 0x6b12, 0x8000000000000008, 0x1f, 0x8]) semop(r17, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r17, &(0x7f0000000240), 0x6) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) r19 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0}, 0xff4b) r21 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETVERAUTH(r21, 0xc0107002, &(0x7f0000000000)=0x280000) getsockopt$sock_cred(r21, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) semctl$IPC_SET(r17, 0x0, 0x1, &(0x7f0000000100)={{0x3, r18, r19, r20, r22, 0x4}, 0x200, 0x401, 0x2}) chown(&(0x7f0000000000)='./file0\x00', r16, r19) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x10000) r25 = getpgrp() fcntl$lock(r23, 0xf, &(0x7f0000000340)={0x1, 0x0, 0xffffffffecd81e2d, 0x100, r25}) ioctl$VT_ACTIVATE(r24, 0x20007605, &(0x7f0000000380)=0x101) r26 = getuid() r27 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=[{{r27}, 0xffffffffffffffff, 0x1}], 0x0, 0x0) getsockopt$SO_PEERCRED(r27, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0xc) setsockopt$sock_cred(r24, 0xffff, 0x1022, &(0x7f00000004c0)={r25, r26, r28}, 0xc) r29 = semget$private(0x0, 0x0, 0xa5) semop(r29, &(0x7f00000003c0)=[{0x8, 0x8, 0x1000000}, {0x2, 0xfffffffffffffffd, 0x1000}, {0x2000000003, 0x100, 0x7fc}], 0x3) semop(r29, &(0x7f0000001180), 0x1e316d81a01eac7d) semctl$SETALL(r29, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semctl$SETALL(r29, 0x0, 0x9, &(0x7f0000000180)=[0xfffffffffffffff8, 0x81, 0x7fffffff, 0x6b12, 0x8000000000000008, 0x1f, 0x8]) semop(r29, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r29, &(0x7f0000000240), 0x6) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) r31 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0}, 0xff4b) r33 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETVERAUTH(r33, 0xc0107002, &(0x7f0000000000)=0x280000) getsockopt$sock_cred(r33, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) semctl$IPC_SET(r29, 0x0, 0x1, &(0x7f0000000100)={{0x3, r30, r31, r32, r34, 0x4}, 0x200, 0x401, 0x2}) getgroups(0x8, &(0x7f0000000200)=[0x0, 0xffffffffffffffff, r11, 0xffffffffffffffff, 0xffffffffffffffff, r19, r28, r34]) r36 = getpgid(0x0) r37 = fcntl$getown(0xffffffffffffffff, 0x5) msgctl$IPC_SET(r3, 0x1, &(0x7f0000000240)={{0x101, r4, r5, r6, r35, 0x18, 0x39}, 0x4, 0x530c, r36, r37, 0x6, 0x7, 0x7f, 0x20}) r38 = socket(0x2, 0xc003, 0x0) setsockopt(r38, 0x0, 0x21, 0x0, 0x0) getsockopt$SO_PEERCRED(r38, 0xffff, 0x1022, &(0x7f0000000040)={0x0, 0x0}, 0xc) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r40, 0xffff, 0x1022, &(0x7f0000000400)={0x0, 0x0}, 0xffffffffffffff96) r42 = semget$private(0x0, 0x4, 0xa5) semop(r42, &(0x7f00000003c0)=[{0x8, 0x8, 0x1000000}, {0x2, 0xfffffffffffffffd, 0x1000}, {0x2000000003, 0x100, 0x7fc}], 0x3) semop(r42, &(0x7f0000001180), 0x1e316d81a01eac7d) semctl$SETALL(r42, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semctl$SETALL(r42, 0x0, 0x9, &(0x7f0000000180)=[0xfffffffffffffff8, 0x81, 0x7fffffff, 0x6b12, 0x8000000000000008, 0x1f, 0x8]) semop(r42, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r42, &(0x7f0000000240), 0x6) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) r44 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0}, 0xff4b) r46 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETVERAUTH(r46, 0xc0107002, &(0x7f0000000000)=0x280000) getsockopt$sock_cred(r46, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) semctl$IPC_SET(r42, 0x0, 0x1, &(0x7f0000000100)={{0x3, r43, r44, r45, r47, 0x4}, 0x200, 0x401, 0x2}) chown(&(0x7f0000000000)='./file0\x00', r41, r44) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r48, 0xffff, 0x1022, &(0x7f0000000400)={0x0, 0x0}, 0xffffffffffffff96) r50 = semget$private(0x0, 0x4, 0xa5) semop(r50, &(0x7f00000003c0)=[{0x8, 0x8, 0x1000000}, {0x2, 0xfffffffffffffffd, 0x1000}, {0x2000000003, 0x100, 0x7fc}], 0x3) semop(r50, &(0x7f0000001180), 0x1e316d81a01eac7d) semctl$SETALL(r50, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semctl$SETALL(r50, 0x0, 0x9, &(0x7f0000000180)=[0xfffffffffffffff8, 0x81, 0x7fffffff, 0x6b12, 0x8000000000000008, 0x1f, 0x8]) semop(r50, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r50, &(0x7f0000000240), 0x6) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) r52 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0}, 0xff4b) r54 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETVERAUTH(r54, 0xc0107002, &(0x7f0000000000)=0x280000) getsockopt$sock_cred(r54, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) semctl$IPC_SET(r50, 0x0, 0x1, &(0x7f0000000100)={{0x3, r51, r52, r53, r55, 0x4}, 0x200, 0x401, 0x2}) chown(&(0x7f0000000000)='./file0\x00', r49, r52) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x10000) r58 = getpgrp() fcntl$lock(r56, 0xf, &(0x7f0000000340)={0x1, 0x0, 0xffffffffecd81e2d, 0x100, r58}) ioctl$VT_ACTIVATE(r57, 0x20007605, &(0x7f0000000380)=0x101) r59 = getuid() r60 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=[{{r60}, 0xffffffffffffffff, 0x1}], 0x0, 0x0) getsockopt$SO_PEERCRED(r60, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0xc) setsockopt$sock_cred(r57, 0xffff, 0x1022, &(0x7f00000004c0)={r58, r59, r61}, 0xc) r62 = semget$private(0x0, 0x0, 0xa5) semop(r62, &(0x7f00000003c0)=[{0x8, 0x8, 0x1000000}, {0x2, 0xfffffffffffffffd, 0x1000}, {0x2000000003, 0x100, 0x7fc}], 0x3) semop(r62, &(0x7f0000001180), 0x1e316d81a01eac7d) semctl$SETALL(r62, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semctl$SETALL(r62, 0x0, 0x9, &(0x7f0000000180)=[0xfffffffffffffff8, 0x81, 0x7fffffff, 0x6b12, 0x8000000000000008, 0x1f, 0x8]) semop(r62, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r62, &(0x7f0000000240), 0x6) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) r64 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0}, 0xff4b) r66 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETVERAUTH(r66, 0xc0107002, &(0x7f0000000000)=0x280000) getsockopt$sock_cred(r66, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) semctl$IPC_SET(r62, 0x0, 0x1, &(0x7f0000000100)={{0x3, r63, r64, r65, r67, 0x4}, 0x200, 0x401, 0x2}) getgroups(0x8, &(0x7f0000000200)=[0x0, 0xffffffffffffffff, r44, 0xffffffffffffffff, 0xffffffffffffffff, r52, r61, r67]) r68 = semget$private(0x0, 0x4, 0xa5) semop(r68, &(0x7f00000003c0)=[{0x8, 0x8, 0x1000000}, {0x2, 0xfffffffffffffffd, 0x1000}, {0x2000000003, 0x100, 0x7fc}], 0x3) semop(r68, &(0x7f0000001180), 0x1e316d81a01eac7d) semctl$SETALL(r68, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semctl$SETALL(r68, 0x0, 0x9, &(0x7f0000000180)=[0xfffffffffffffff8, 0x81, 0x7fffffff, 0x6b12, 0x8000000000000008, 0x1f, 0x8]) semop(r68, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r68, &(0x7f0000000240), 0x6) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) r70 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0}, 0xff4b) r72 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETVERAUTH(r72, 0xc0107002, &(0x7f0000000000)=0x280000) getsockopt$sock_cred(r72, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) semctl$IPC_SET(r68, 0x0, 0x1, &(0x7f0000000100)={{0x3, r69, r70, r71, r73, 0x4}, 0x200, 0x401, 0x2}) r74 = getgid() r75 = msgget$private(0x0, 0x1) r76 = geteuid() getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0xc) r78 = getuid() setreuid(0x0, r78) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r79, 0xffff, 0x1022, &(0x7f0000000400)={0x0, 0x0}, 0xffffffffffffff96) r81 = semget$private(0x0, 0x4, 0xa5) semop(r81, &(0x7f00000003c0)=[{0x8, 0x8, 0x1000000}, {0x2, 0xfffffffffffffffd, 0x1000}, {0x2000000003, 0x100, 0x7fc}], 0x3) semop(r81, &(0x7f0000001180), 0x1e316d81a01eac7d) semctl$SETALL(r81, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semctl$SETALL(r81, 0x0, 0x9, &(0x7f0000000180)=[0xfffffffffffffff8, 0x81, 0x7fffffff, 0x6b12, 0x8000000000000008, 0x1f, 0x8]) semop(r81, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r81, &(0x7f0000000240), 0x6) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) r83 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0}, 0xff4b) r85 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETVERAUTH(r85, 0xc0107002, &(0x7f0000000000)=0x280000) getsockopt$sock_cred(r85, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) semctl$IPC_SET(r81, 0x0, 0x1, &(0x7f0000000100)={{0x3, r82, r83, r84, r86, 0x4}, 0x200, 0x401, 0x2}) chown(&(0x7f0000000000)='./file0\x00', r80, r83) pipe(&(0x7f0000000100)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r87, 0xffff, 0x1022, &(0x7f0000000400)={0x0, 0x0}, 0xffffffffffffff96) r89 = semget$private(0x0, 0x4, 0xa5) semop(r89, &(0x7f00000003c0)=[{0x8, 0x8, 0x1000000}, {0x2, 0xfffffffffffffffd, 0x1000}, {0x2000000003, 0x100, 0x7fc}], 0x3) semop(r89, &(0x7f0000001180), 0x1e316d81a01eac7d) semctl$SETALL(r89, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semctl$SETALL(r89, 0x0, 0x9, &(0x7f0000000180)=[0xfffffffffffffff8, 0x81, 0x7fffffff, 0x6b12, 0x8000000000000008, 0x1f, 0x8]) semop(r89, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r89, &(0x7f0000000240), 0x6) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) r91 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0}, 0xff4b) r93 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETVERAUTH(r93, 0xc0107002, &(0x7f0000000000)=0x280000) getsockopt$sock_cred(r93, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) semctl$IPC_SET(r89, 0x0, 0x1, &(0x7f0000000100)={{0x3, r90, r91, r92, r94, 0x4}, 0x200, 0x401, 0x2}) chown(&(0x7f0000000000)='./file0\x00', r88, r91) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000300)={0xffffffffffffffff}, 0x10000) r97 = getpgrp() fcntl$lock(r95, 0xf, &(0x7f0000000340)={0x1, 0x0, 0xffffffffecd81e2d, 0x100, r97}) ioctl$VT_ACTIVATE(r96, 0x20007605, &(0x7f0000000380)=0x101) r98 = getuid() r99 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000280)=[{{r99}, 0xffffffffffffffff, 0x1}], 0x0, 0x0) getsockopt$SO_PEERCRED(r99, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0xc) setsockopt$sock_cred(r96, 0xffff, 0x1022, &(0x7f00000004c0)={r97, r98, r100}, 0xc) r101 = semget$private(0x0, 0x0, 0xa5) semop(r101, &(0x7f00000003c0)=[{0x8, 0x8, 0x1000000}, {0x2, 0xfffffffffffffffd, 0x1000}, {0x2000000003, 0x100, 0x7fc}], 0x3) semop(r101, &(0x7f0000001180), 0x1e316d81a01eac7d) semctl$SETALL(r101, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semctl$SETALL(r101, 0x0, 0x9, &(0x7f0000000180)=[0xfffffffffffffff8, 0x81, 0x7fffffff, 0x6b12, 0x8000000000000008, 0x1f, 0x8]) semop(r101, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r101, &(0x7f0000000240), 0x6) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) r103 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0}, 0xff4b) r105 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETVERAUTH(r105, 0xc0107002, &(0x7f0000000000)=0x280000) getsockopt$sock_cred(r105, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) semctl$IPC_SET(r101, 0x0, 0x1, &(0x7f0000000100)={{0x3, r102, r103, r104, r106, 0x4}, 0x200, 0x401, 0x2}) getgroups(0x8, &(0x7f0000000200)=[0x0, 0xffffffffffffffff, r83, 0xffffffffffffffff, 0xffffffffffffffff, r91, r100, r106]) r108 = getpgid(0x0) r109 = fcntl$getown(0xffffffffffffffff, 0x5) msgctl$IPC_SET(r75, 0x1, &(0x7f0000000240)={{0x101, r76, r77, r78, r107, 0x18, 0x39}, 0x4, 0x530c, r108, r109, 0x6, 0x7, 0x7f, 0x20}) r110 = getppid() msgctl$IPC_SET(r3, 0x1, &(0x7f0000000100)={{0x2, r39, r52, r71, r74, 0x10e, 0x9}, 0x8000, 0x1f, r109, r110, 0x860, 0x8, 0x1c27000, 0x3f}) writev(r0, &(0x7f0000000400)=[{&(0x7f0000000200)='7', 0x1}], 0x1) 17:37:03 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) writev(r1, &(0x7f0000001d00)=[{&(0x7f0000000400)="9d2a6d5576392568e6601bed4c360b46692b6139cf3928abcd6ab6fb35d5146afc5e03f520abc3e5963b17ae5df419e4d1e7e24fb23063020c925206463c760ff8f31913b148999989389553e82be803cff0160a90", 0x55}, {&(0x7f0000000940)="6aa463ad952610b5531fcbb641f6a489b47973a60b77e5d0af41e89558d68579d2556dc99929ab0d5c692a43cef2d4537d6905e61918dae987053666a88c12bdf4d6bc478d0316d857fdb83905923a6c8bf5a1e394b16c0381249edcc20631f64d665052582da075abe2ca3c0c0742f743cc4d53e83d1957358181dcab7431c59b1bf9e150cf2ed79a7aa1ae8d8ac0c31db61583effaf5ec11d87fa790a1a2c9e885e06d5250cb826007562ad68c5457a23b9453febb99efb0ec8c35e66112407b5184131957442fead169a5799ce62aad7aaec67547311f570c8f29988730122274536649992f29d3dba5e0a2a1694dc7c4da318acc6f5e7e4f8d124e2bf9a5ed00e3def31249651fa19338ffaf6f4a1e2319f9133d06fb94a6f7c6cd32838784d5ca953449a333a4bd7d90454db0e27b1513db0b12c93422633869f7b63b96198cfe057bfa2a3fd3f91ed037015fe7bbcfb918f25f6efc30605195a22cf777367caacb014c0051dfdaea9ccef0f1d7fa3c1175c220a0fda88bbb2816962ad427c047e9ef41d032e2ad62f035d225b04495ccfc10d66db7137b8d3c69413771e9a3876d1b88f6b3ea7971", 0x1ab}], 0x2) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x810, r1, 0x0, 0x0) ftruncate(r1, 0x0, 0x1ff) r2 = socket(0x20, 0xc003, 0x0) setsockopt(r2, 0x0, 0x21, 0x0, 0x0) r3 = socket(0x2, 0xc003, 0x0) setsockopt(r3, 0x0, 0x21, 0x0, 0x0) r4 = openat$tty(0xffffffffffffff9c, &(0x7f0000000000)='/dev/tty\x00', 0x20000, 0x0) r5 = socket(0x2, 0x4, 0x8) r6 = openat$wsmuxkbd(0xffffffffffffff9c, &(0x7f0000000140)='/dev/wskbd\x00', 0x400, 0x0) r7 = socket(0x2, 0xc003, 0x0) setsockopt(r7, 0x0, 0x21, 0x0, 0x0) poll(&(0x7f0000000180)=[{r2, 0x20}, {r1, 0x2}, {r3, 0x1}, {r4, 0x40}, {0xffffffffffffff9c, 0x4}, {r5}, {r6, 0x100}, {r7, 0x1}, {r1, 0x80}], 0x9, 0xcf) write(r0, &(0x7f00000000c0)="a7edf995d7472ed1293c56c39767101056ac737c5f52ea26aa5bdac6f48c3f6d9dc7c3aa91e1e428c786109ba3ea34cf5f0f5ccb2852ea8dfbe8ef6ae5dc48bf5ba90127cfa38244f25bf6", 0x4b) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000080)="4020814ee0e77b98a8971c642af00154bd87ce247dddde03ff07000000000000e28adb95", 0x24) 17:37:04 executing program 0: r0 = open$dir(&(0x7f0000000900)='./file0\x00', 0x40000400000002c2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f00000004c0)=[{{r1}, 0xfffffffffffffffe, 0x63}], 0x7, 0x0, 0x0, 0x0) r3 = semget$private(0x0, 0x9, 0x42) semop(r3, &(0x7f0000000440)=[{0x0, 0x0, 0x1000}, {0x4, 0x7, 0x1800}, {0x0, 0x8003}, {0x2, 0x0, 0x1000}], 0x4) semop(r3, &(0x7f0000000080)=[{0x2, 0x1, 0x1c00}, {0x0, 0x2, 0x1800}, {0x3, 0x3f, 0x1000}, {0x2, 0x2, 0x800}, {0x1, 0x200, 0x1800}, {0x1, 0x7, 0x1800}, {0x4, 0x1ff, 0x800}, {0x4, 0x7d54}, {0x4, 0x3, 0x1800}, {0x0, 0x3, 0x800}], 0xa) kqueue() r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x0, 0x0) fcntl$lock(r4, 0x8, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x10002ffffffff}) ioctl$TIOCSETAW(r4, 0x802c7415, &(0x7f0000000100)={0x6, 0x6, 0x300000, 0x5, "0f47af925aeddb558f4dd7e667eb942a2fccd331", 0x79, 0x6}) kevent(r2, 0x0, 0x0, 0x0, 0x9, 0x0) bind$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x0}, 0x8) open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) 17:37:04 executing program 0: connect$unix(0xffffffffffffffff, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"/1997], 0x10) writev(0xffffffffffffffff, &(0x7f0000001680)=[{0x0}], 0x1) lseek(0xffffffffffffffff, 0x0, 0x7, 0x0) 17:37:04 executing program 1: r0 = socket(0x800000018, 0x1, 0x0) r1 = kqueue() kevent(0xffffffffffffff9c, &(0x7f0000000100), 0x8, 0x0, 0x40000009d1, &(0x7f0000000140)={0x3, 0x7ffffffe}) r2 = kqueue() kevent(r2, &(0x7f0000000100), 0x6, 0x0, 0x40000009d1, 0x0) r3 = kqueue() r4 = kqueue() kevent(r4, &(0x7f0000000100), 0x6, 0x0, 0x40000009d1, 0x0) kevent(r3, &(0x7f0000000100), 0x6, 0x0, 0x40000009d1, 0x0) kevent(r1, 0x0, 0x0, &(0x7f0000000200), 0x3, 0x0) shutdown(r0, 0x2) 17:37:04 executing program 0: ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xfffffffe, "000000000000000100002000"}) r0 = socket(0x1, 0x2, 0x20) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) writev(r0, &(0x7f0000002ec0)=[{&(0x7f0000000b80)="ad", 0x1}, {&(0x7f0000003f40)="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", 0x1bb}], 0x2) 17:37:04 executing program 0: mknod(&(0x7f0000000100)='./bus\x00', 0x2000, 0x5dd9) r0 = socket(0x11, 0x4003, 0x0) open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x2) openat$zero(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = semget$private(0x0, 0x0, 0xa5) semop(r1, &(0x7f00000003c0)=[{0x8, 0x8, 0x1000000}, {0x2, 0xfffffffffffffffd, 0x1000}, {0x2000000003, 0x100, 0x7fc}], 0x3) semop(r1, &(0x7f0000001180), 0x1e316d81a01eac7d) semctl$SETALL(r1, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semctl$SETALL(r1, 0x0, 0x9, &(0x7f0000000180)=[0xfffffffffffffff8, 0x81, 0x7fffffff, 0x6b12, 0x8000000000000008, 0x1f, 0x8]) semop(r1, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r1, &(0x7f0000000240), 0x6) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) r3 = getegid() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0}, 0xff4b) r5 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETVERAUTH(r5, 0xc0107002, &(0x7f0000000000)=0x280000) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000100)={{0x3, r2, r3, r4, r6, 0x4}, 0x200, 0x401, 0x2}) semctl$SETALL(r1, 0x0, 0x9, &(0x7f0000000040)=[0x7fff, 0x8000, 0x9]) preadv(0xffffffffffffffff, &(0x7f0000000680)=[{&(0x7f0000000c80)=""/262, 0x106}], 0x1, 0x0, 0x0) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040), 0x0, 0x0}, 0x0) login: panic: receive 3: so 0xfffffd805e56c000, so_type 3, m 0xfffffd8057d1d800, m_type 0 Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND *501507 81268 0 0 0 0 dhclient db_enter() at db_enter+0x18 panic(ffffffff821b07de) at panic+0x15c soreceive(fffffd805e56c000,0,ffff80001d372bc8,0,0,ffff80001d372ad4) at soreceive+0x16e7 soo_read(fffffd805eb102d0,ffff80001d372bc8,0) at soo_read+0x53 dofilereadv(ffff80001d339008,6,ffff80001d372bc8,0,ffff80001d372cb0) at dofilereadv+0x1a1 sys_read(ffff80001d339008,ffff80001d372c60,ffff80001d372cb0) at sys_read+0x83 syscall(ffff80001d372d30) at syscall+0x507 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x7f7ffffeb320, count: 7 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs. ddb> ddb> set $lines = 0 ddb> set $maxwidth = 0 ddb> show panic receive 3: so 0xfffffd805e56c000, so_type 3, m 0xfffffd8057d1d800, m_type 0 ddb> trace db_enter() at db_enter+0x18 panic(ffffffff821b07de) at panic+0x15c soreceive(fffffd805e56c000,0,ffff80001d372bc8,0,0,ffff80001d372ad4) at soreceive+0x16e7 soo_read(fffffd805eb102d0,ffff80001d372bc8,0) at soo_read+0x53 dofilereadv(ffff80001d339008,6,ffff80001d372bc8,0,ffff80001d372cb0) at dofilereadv+0x1a1 sys_read(ffff80001d339008,ffff80001d372c60,ffff80001d372cb0) at sys_read+0x83 syscall(ffff80001d372d30) at syscall+0x507 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x7f7ffffeb320, count: -8 ddb> show registers rdi 0 rsi 0x1 rbp 0xffff80001d372910 rbx 0xffff80001d3729c0 rdx 0x2 rcx 0 rax 0 r8 0xffff80001d3728d0 r9 0x1 r10 0 r11 0x9176a1f81366fe8f r12 0x3000000008 r13 0xffff80001d372920 r14 0x100 r15 0x1 rip 0xffffffff819bd578 db_enter+0x18 cs 0x8 rflags 0x246 rsp 0xffff80001d372900 ss 0x10 db_enter+0x18: addq $0x8,%rsp ddb> show proc PROC (dhclient) pid=501507 stat=onproc flags process=0 proc=0 pri=24, usrpri=50, nice=20 forw=0xffffffffffffffff, list=0xffff80001d33a5f8,0xffff80001d339768 process=0xffff8000ffffa010 user=0xffff80001d36d000, vmspace=0xfffffd806bc09770 estcpu=0, cpticks=1, pctcpu=0.0 user=0, sys=1, intr=0 ddb> ps PID TID PPID UID S FLAGS WAIT COMMAND 80815 52853 43895 0 2 0 syz-executor.0 80815 391178 43895 0 2 0x4000000 syz-executor.0 53256 266060 58149 0 2 0 syz-executor.1 53256 2515 58149 0 3 0x4000080 kqread syz-executor.1 43895 296532 6882 0 2 0x482 syz-executor.0 58149 373580 6882 0 2 0x482 syz-executor.1 6882 435962 26300 0 3 0x82 thrsleep syz-fuzzer 6882 369086 26300 0 3 0x4000082 thrsleep syz-fuzzer 6882 80203 26300 0 3 0x4000082 thrsleep syz-fuzzer 6882 467126 26300 0 3 0x4000082 thrsleep syz-fuzzer 6882 428031 26300 0 3 0x4000082 thrsleep syz-fuzzer 6882 219398 26300 0 3 0x4000082 kqread syz-fuzzer 6882 483380 26300 0 3 0x4000082 thrsleep syz-fuzzer 6882 59948 26300 0 3 0x4000082 thrsleep syz-fuzzer 26300 253824 62310 0 3 0x10008a pause ksh 62310 148779 93337 0 3 0x92 select sshd 25346 458812 1 0 3 0x100083 ttyin getty 93337 141723 1 0 3 0x80 select sshd 1223 336438 46915 73 3 0x100090 kqread syslogd 46915 448343 1 0 3 0x100082 netio syslogd 80182 324812 1 77 2 0x100010 dhclient *81268 501507 1 0 7 0 dhclient 1001 220102 0 0 2 0x14200 zerothread 40666 447761 0 0 3 0x14200 aiodoned aiodoned 26766 125555 0 0 3 0x14200 syncer update 74364 160121 0 0 3 0x14200 cleaner cleaner 15133 254628 0 0 3 0x14200 reaper reaper 26643 339829 0 0 3 0x14200 pgdaemon pagedaemon 71334 506098 0 0 3 0x14200 bored crynlk 4111 75726 0 0 3 0x14200 bored crypto 83094 48601 0 0 3 0x40014200 acpi0 acpi0 59796 415662 0 0 2 0x14200 softnet 27889 40255 0 0 3 0x14200 bored systqmp 25888 350601 0 0 3 0x14200 bored systq 27387 20800 0 0 3 0x40014200 bored softclock 44354 23690 0 0 3 0x40014200 idle0 38188 347246 0 0 3 0x14200 bored smr 1 358543 0 0 3 0x82 wait init 0 0 -1 0 3 0x10200 scheduler swapper ddb> show all locks No such command ddb> show malloc Type InUse MemUse HighUse Limit Requests Type Lim devbuf 9455 6326K 6453K 78643K 10560 0 pcb 13 8K 8K 78643K 25 0 rtable 105 3K 3K 78643K 191 0 ifaddr 43 10K 10K 78643K 45 0 counters 22 16K 16K 78643K 22 0 ioctlops 0 0K 2K 78643K 19 0 mount 1 1K 1K 78643K 1 0 vnodes 1219 77K 77K 78643K 1229 0 UFS quota 1 32K 32K 78643K 1 0 UFS mount 5 36K 36K 78643K 5 0 shm 2 1K 1K 78643K 2 0 VM map 2 0K 0K 78643K 2 0 sem 12 0K 1K 78643K 21 0 dirhash 12 2K 2K 78643K 12 0 ACPI 1794 195K 288K 78643K 12646 0 file desc 6 17K 25K 78643K 52 0 proc 47 38K 54K 78643K 358 0 subproc 32 2K 2K 78643K 34 0 NFS srvsock 1 0K 0K 78643K 1 0 NFS daemon 1 16K 16K 78643K 1 0 ip_moptions 0 0K 0K 78643K 1 0 in_multi 33 2K 2K 78643K 35 0 ether_multi 1 0K 0K 78643K 2 0 ISOFS mount 1 32K 32K 78643K 1 0 MSDOSFS mount 1 16K 16K 78643K 1 0 ttys 49 228K 228K 78643K 49 0 exec 0 0K 1K 78643K 181 0 pagedep 1 8K 8K 78643K 1 0 inodedep 1 32K 32K 78643K 1 0 newblk 1 0K 0K 78643K 1 0 VM swap 7 26K 26K 78643K 7 0 UVM amap 100 21K 21K 78643K 964 0 UVM aobj 4 2K 2K 78643K 4 0 memdesc 1 4K 4K 78643K 1 0 crypto data 1 1K 1K 78643K 1 0 ip6_options 0 0K 0K 78643K 4 0 NDP 6 0K 0K 78643K 10 0 temp 70 3017K 3080K 78643K 1879 0 kqueue 6 10K 10K 78643K 9 0 SYN cache 2 16K 16K 78643K 2 0 ddb> show all pools Name Size Requests Fail Releases Pgreq Pgrel Npage Hiwat Minpg Maxpg Idle arp 64 6 0 0 1 0 1 1 0 8 0 rtpcb 80 22 0 19 1 0 1 1 0 8 0 rtentry 112 45 0 1 2 0 2 2 0 8 0 unpcb 120 41 0 33 1 0 1 1 0 8 0 syncache 264 4 0 4 1 1 0 1 0 8 0 tcpqe 32 7 0 7 1 0 1 1 0 8 1 tcpcb 544 17 0 12 1 0 1 1 0 8 0 inpcb 280 65 0 57 2 0 2 2 0 8 1 nd6 48 6 0 0 1 0 1 1 0 8 0 art_heap8 4096 1 0 0 1 0 1 1 0 8 0 art_heap4 256 187 0 0 12 0 12 12 0 8 0 art_table 32 188 0 0 2 0 2 2 0 8 0 art_node 16 44 0 4 1 0 1 1 0 8 0 semupl 112 1 0 1 1 0 1 1 0 8 1 semapl 112 19 0 9 1 0 1 1 0 8 0 shmpl 112 2 0 0 1 0 1 1 0 8 0 dirhash 1024 17 0 0 3 0 3 3 0 8 0 dino1pl 128 1445 0 44 46 0 46 46 0 8 0 ffsino 240 1445 0 44 83 0 83 83 0 8 0 nchpl 144 1698 0 87 60 0 60 60 0 8 0 uvmvnodes 72 1491 0 0 28 0 28 28 0 8 0 vnodes 208 1491 0 0 79 0 79 79 0 8 0 namei 1024 4097 0 4097 1 0 1 1 0 8 1 scxspl 192 4990 0 4990 1 0 1 1 0 8 1 plimitpl 152 16 0 9 1 0 1 1 0 8 0 sigapl 432 223 0 209 2 0 2 2 0 8 0 futexpl 56 821 0 821 1 0 1 1 0 8 1 knotepl 112 60 0 38 1 0 1 1 0 8 0 kqueuepl 144 12 0 6 1 0 1 1 0 8 0 pipelkpl 16 91 0 81 1 0 1 1 0 8 0 pipepl 120 182 0 163 2 0 2 2 0 8 1 fdescpl 432 224 0 209 2 0 2 2 0 8 0 filepl 120 1160 0 1058 4 0 4 4 0 8 0 lockfpl 104 14 0 13 1 0 1 1 0 8 0 lockfspl 48 5 0 4 1 0 1 1 0 8 0 sessionpl 112 17 0 7 1 0 1 1 0 8 0 pgrppl 48 17 0 7 1 0 1 1 0 8 0 ucredpl 96 80 0 72 1 0 1 1 0 8 0 zombiepl 144 209 0 209 1 0 1 1 0 8 1 processpl 896 238 0 209 4 0 4 4 0 8 0 procpl 624 278 0 240 4 0 4 4 0 8 1 sockpl 400 128 0 109 3 0 3 3 0 8 1 mcl64k 65536 3 0 3 1 0 1 1 0 8 1 mcl8k 8192 1 0 1 1 0 1 1 0 8 1 mcl4k 4096 10 0 10 2 1 1 1 0 8 1 mcl2k2 2112 1 0 1 1 0 1 1 0 8 1 mcl2k 2048 62941 0 62893 17 3 14 14 0 8 7 mtagpl 80 2 0 2 1 1 0 1 0 8 0 mbufpl 256 99713 0 99608 11 2 9 9 0 8 0 bufpl 280 3991 0 161 274 0 274 274 0 8 0 anonpl 16 37684 0 22660 62 1 61 61 0 107 0 amapchunkpl 152 1065 0 928 7 0 7 7 0 158 1 amappl16 192 989 0 172 41 0 41 41 0 8 0 amappl15 184 9 0 7 1 0 1 1 0 8 0 amappl14 176 2 0 1 2 1 1 1 0 8 0 amappl13 168 24 0 22 1 0 1 1 0 8 0 amappl12 160 17 0 14 1 0 1 1 0 8 0 amappl11 152 61 0 48 1 0 1 1 0 8 0 amappl10 144 21 0 16 1 0 1 1 0 8 0 amappl9 136 363 0 360 1 0 1 1 0 8 0 amappl8 128 266 0 249 1 0 1 1 0 8 0 amappl7 120 118 0 105 1 0 1 1 0 8 0 amappl6 112 21 0 19 1 0 1 1 0 8 0 amappl5 104 184 0 172 1 0 1 1 0 8 0 amappl4 96 444 0 411 2 0 2 2 0 8 1 amappl3 88 115 0 108 1 0 1 1 0 8 0 amappl2 80 956 0 885 3 0 3 3 0 8 1 amappl1 72 13956 0 13530 27 12 15 20 0 8 6 amappl 80 516 0 472 2 0 2 2 0 84 1 dma4096 4096 1 0 1 1 1 0 1 0 8 0 dma256 256 6 0 6 1 1 0 1 0 8 0 dma128 128 253 0 253 1 1 0 1 0 8 0 dma64 64 6 0 6 1 1 0 1 0 8 0 dma32 32 7 0 7 1 1 0 1 0 8 0 dma16 16 18 0 17 1 0 1 1 0 8 0 aobjpl 64 3 0 0 1 0 1 1 0 8 0 uaddrrnd 24 224 0 209 1 0 1 1 0 8 0 uaddrbest 32 2 0 0 1 0 1 1 0 8 0 uaddr 24 224 0 209 1 0 1 1 0 8 0 vmmpekpl 168 5790 0 5764 2 0 2 2 0 8 0 vmmpepl 168 34314 0 32338 115 6 109 109 0 357 23 vmsppl 272 223 0 209 2 0 2 2 0 8 1 pdppl 4096 454 0 418 6 0 6 6 0 8 1 pvpl 32 127365 0 109322 151 0 151 151 0 265 4 pmappl 200 223 0 209 1 0 1 1 0 8 0 extentpl 40 46 0 29 1 0 1 1 0 8 0 phpool 112 150 0 8 5 0 5 5 0 8 0