kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Sat Mar 16 11:16:35 PDT 2019 OpenBSD/amd64 (ci-openbsd-multicore-3.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.6' (ECDSA) to the list of known hosts. 2019/03/16 11:16:58 fuzzer started 2019/03/16 11:17:05 dialing manager at 10.128.15.235:16385 2019/03/16 11:17:05 syscalls: 1 2019/03/16 11:17:05 code coverage: enabled 2019/03/16 11:17:05 comparison tracing: enabled 2019/03/16 11:17:05 extra coverage: support is not implemented in syzkaller 2019/03/16 11:17:05 setuid sandbox: enabled 2019/03/16 11:17:05 namespace sandbox: support is not implemented in syzkaller 2019/03/16 11:17:05 Android sandbox: support is not implemented in syzkaller 2019/03/16 11:17:05 fault injection: support is not implemented in syzkaller 2019/03/16 11:17:05 leak checking: support is not implemented in syzkaller 2019/03/16 11:17:05 net packet injection: enabled 2019/03/16 11:17:05 net device setup: support is not implemented in syzkaller 11:17:12 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x301, 0x0) ftruncate(r0, 0x200) sendto$unix(r0, &(0x7f0000000040)="90832db8da29120896756923d43fed9e0bbf25216635b4a289a87876fa77048bdc442954aadc3c2f4043310b93a8edee489a92335512d17c4372acc15a1fcdece66cacb4f726bf4643ce66c50c4ddf4f", 0x50, 0x400, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa) poll(&(0x7f0000000100)=[{r0, 0x1}, {r0, 0x100}, {r0, 0x80}], 0x3, 0x1f) fcntl$getflags(r0, 0x3) ioctl$TIOCGTSTAMP(r0, 0x4010745b, &(0x7f0000000140)) r1 = semget$private(0x0, 0x1, 0x400) semop(r1, &(0x7f0000000180)=[{0x1, 0x10001, 0x1800}, {0x0, 0x2, 0x1800}, {0x0, 0x8001, 0x1800}], 0x3) fchmod(r0, 0x16e) semget$private(0x0, 0x6, 0x8) ioctl$WSDISPLAYIO_ADDSCREEN(r0, 0x80245753, &(0x7f00000001c0)={0x7, './file0\x00', './file0\x00'}) semop(r1, &(0x7f0000000200)=[{0x2, 0x9, 0x800}, {0x7, 0x4, 0x800}, {0x3, 0xb1, 0x1000}, {0x0, 0x3, 0x1800}, {0x3, 0x33a, 0x1000}, {0x4, 0x7, 0x1000}, {0x3, 0xffff, 0x800}, {0x3, 0x6, 0x800}, {0x4, 0x101}, {0x0, 0x0, 0x1000}], 0xa) ioctl$TIOCGTSTAMP(r0, 0x4010745b, &(0x7f0000000240)) ioctl$TIOCCHKVERAUTH(r0, 0x2000741e) ioctl$KDDISABIO(r0, 0x20004b3d) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f0000000280)={{0x18, 0x3, 0x0, 0x8000}, {0x18, 0x3, 0x2, 0x3}, 0x100000001, [0x0, 0x3f, 0x7, 0x17, 0x4, 0xffff, 0xf87, 0x7ff]}, 0x3c) ioctl$VT_RELDISP(r0, 0x20007604, &(0x7f00000002c0)=0x2) sendto$inet6(r0, &(0x7f0000000300)="6225c7e8abc4a6230f10452126ebd699efbd7e82e7e34e7e22563252d881", 0x1e, 0x8, &(0x7f0000000340)={0x18, 0x1, 0x6, 0x401}, 0xc) fchdir(r0) renameat(r0, &(0x7f0000000380)='./file0\x00', r0, &(0x7f00000003c0)='./file0\x00') ioctl$TIOCSFLAGS(r0, 0x8004745c, &(0x7f0000000400)=0x7) ioctl$VT_ACTIVATE(r0, 0x20007605, &(0x7f0000000440)=0x5) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x8000, 0x0) getpeername(r0, &(0x7f00000004c0)=@in6, &(0x7f0000000500)=0xc) getpeername$unix(r0, &(0x7f0000000540)=@abs, &(0x7f0000000580)=0x8) readv(r2, &(0x7f0000000680)=[{&(0x7f00000005c0)=""/116, 0x74}, {&(0x7f0000000640)=""/53, 0x35}], 0x2) openat$wskbd(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/wskbd0\x00', 0x80, 0x0) accept$inet(r2, 0x0, &(0x7f0000000700)) fchdir(r2) bind(r0, &(0x7f0000000740)=@in={0x2, 0x2}, 0xc) 11:17:12 executing program 1: getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0xc) r3 = getpgid(r0) r4 = shmget$private(0x0, 0x2000, 0x100, &(0x7f0000ffe000/0x2000)=nil) shmctl$SHM_LOCK(r4, 0x3) setreuid(r1, r1) r5 = accept$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f0000000080)=0x8) setsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000000c0)={r3, r1, r2}, 0xc) r6 = semget(0x2, 0x2, 0x400) semctl$GETPID(r6, 0x0, 0x4, &(0x7f0000000100)=""/24) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3) read(r5, &(0x7f0000000140)=""/62, 0x3e) r7 = semget$private(0x0, 0x2, 0x428) r8 = semget$private(0x0, 0x1, 0xa0) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000000180)='/dev/null\x00', 0x8000, 0x0) ioctl$VT_RELDISP(r9, 0x20007604, &(0x7f00000001c0)=0x2) truncate(&(0x7f0000000200)='./file0\x00', 0x3ff) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x100) semctl$GETVAL(r8, 0x3, 0x5, &(0x7f0000000280)=""/127) semctl$IPC_SET(r8, 0x0, 0x1, &(0x7f0000000300)={{0x9, r1, r2, r1, r2, 0x2, 0x80000001}, 0xfffffffffffffff7, 0x6, 0xf39}) setsockopt$sock_int(r9, 0xffff, 0x80, &(0x7f0000000380)=0x6, 0x4) ioctl$TIOCSPGRP(r9, 0x40047477, &(0x7f00000003c0)) setgid(r2) pledge(&(0x7f0000000400)='\x00', &(0x7f0000000440)='/dev/null\x00') flock(r9, 0x4) mkdirat(r9, &(0x7f0000000480)='./file0\x00', 0x10) mkdirat(r9, &(0x7f00000004c0)='./file0\x00', 0x40) semctl$GETNCNT(r7, 0x2, 0x3, &(0x7f0000000500)) r10 = semget$private(0x0, 0x4, 0x0) semop(r10, &(0x7f0000000540)=[{0x4, 0x3, 0x800}, {0x4, 0x100000000, 0x800}, {0x3, 0x6, 0x800}, {0x3, 0x7b3, 0x800}, {0x0, 0x80, 0x1800}, {0x3, 0x80000000, 0x1000}], 0x6) setsockopt$inet6_MRT6_ADD_MFC(r9, 0x29, 0x68, &(0x7f0000000580)={{0x18, 0x1, 0x800, 0x2e}, {0x18, 0x2, 0x800, 0x1f}, 0xb3a, [0x0, 0x35b, 0x21b378d, 0xfffffffffffffffc, 0x4, 0x80000001, 0x4, 0x9]}, 0x3c) 11:17:13 executing program 0: minherit(&(0x7f0000eb5000/0x4000)=nil, 0x4000, 0x0) munmap(&(0x7f0000e7a000/0x2000)=nil, 0x2000) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x0) getsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000080)=""/211, &(0x7f0000000180)=0xd3) ioctl$TIOCMSET(0xffffffffffffffff, 0x8004746d, &(0x7f0000000000)) munmap(&(0x7f0000e00000/0x200000)=nil, 0x200000) 11:17:13 executing program 1: r0 = socket(0x2, 0x3, 0x0) syz_execute_func(&(0x7f00000000c0)="8fc87096d113362e66450f38412a2e45dbdfc461797e31c4013f51a803000000c4010c584f15470f38cb9600000000428a1af0400fbabc3e0700000032410fea7602") r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x30, 0x0) connect$unix(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="717e4261a527759d86d0ac5720f649da5ea7b4a1579a7f4cd805d4f2c357c87b23e7c70be4140ce07b84e9bebb70fb633761a8186f2e0604659e11d6ecab407089e45b1f225d56543574c6e40ef1323e1e09855a4a30c407b430dd4de8ea0cf6c41c1b68ce3bf336a91db1563e8aad1c1b76c44c3f4b4a4cd4561d4dcdd6a2a4b35e65db5456c1d2d70f5fbc4e5235369df8641ffe09dbded02dfa6646bb1140fb"], 0x1) kevent(r1, &(0x7f00000002c0)=[{{r1}, 0xfffffffffffffffd, 0x48, 0x41, 0x10000, 0xffffffffffffff2d}, {{r0}, 0xfffffffffffffffe, 0x48, 0xf0000026, 0x20, 0x9}, {{r0}, 0xffffffffffffffff, 0xc, 0x20, 0xb538, 0x9}], 0x800, &(0x7f0000000340)=[{{r1}, 0xfffffffffffffffa, 0x10, 0x3, 0x2, 0x2}, {{r0}, 0xffffffffffffffff, 0x1, 0x20000000, 0xff0, 0x9}, {{r0}, 0xfffffffffffffff9, 0x10, 0x1, 0x889f, 0x6}, {{r1}, 0xfffffffffffffffd, 0x80, 0x80000000, 0x2, 0x8}, {{r1}, 0xfffffffffffffffa, 0x8, 0x60000001, 0x3, 0x101}, {{r0}, 0xffffffffffffffff, 0x1, 0x20000009, 0xffffffffffff444c, 0x6}], 0xd, &(0x7f0000000000)={0x2, 0x6}) accept(r0, &(0x7f0000000040)=@in6, &(0x7f0000000140)=0xc) socket(0x23, 0x384dc6a780f7bc03, 0x4) write(r0, &(0x7f0000000080)="3228d1ae4d0c91328d75dba3efc27c2b903e5395", 0x14) r2 = semget(0x3, 0x6, 0xc) munlockall() faccessat(r1, &(0x7f0000000400)='./file0\x00', 0x91, 0x0) semctl$GETPID(r2, 0x6, 0x4, &(0x7f00000001c0)=""/64) 11:17:13 executing program 0: mknod(&(0x7f0000000100)='./bus\x00', 0x3a0914c44f7b202c, 0xd02) mprotect(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x1, 0x0) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xfffffe91}], 0x1, 0x0) mprotect(&(0x7f0000002000/0x4000)=nil, 0x4000, 0x7) r1 = shmat(0xffffffffffffffff, &(0x7f0000005000/0x3000)=nil, 0x2000) shmdt(r1) 11:17:13 executing program 1: r0 = socket$inet(0x2, 0x8, 0xb9) setsockopt$inet_opts(r0, 0x0, 0x14, &(0x7f0000000080), 0x159) 11:17:13 executing program 0: open$dir(&(0x7f00000000c0)='./bus\x00', 0x80, 0x83) mknod(&(0x7f0000000000)='./bus\x00', 0x2825, 0x5200) r0 = open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x0) select(0x5, &(0x7f0000000040)={0xa}, 0x0, 0x0, &(0x7f0000000100)) faccessat(r0, &(0x7f0000000080)='./bus\x00', 0x2, 0x3) 11:17:13 executing program 1: r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wsmouse0\x00', 0x20000001, 0x0) r1 = dup2(r0, r0) ioctl$TIOCSETAW(r1, 0x802c7415, &(0x7f0000000000)={0x7ba, 0x4, 0xfffffffffffffffa, 0x20081, "25aad9588b9022fbb2d804184053450968a43b66", 0xffff, 0x9}) fcntl$getown(r0, 0x5) kevent(r1, &(0x7f0000000040)=[{{r0}, 0xfffffffffffffffe, 0x2, 0x10, 0x8, 0xfffffffffffffff9}, {{r0}, 0xffffffffffffffff, 0x28, 0xd, 0x40, 0x6}, {{r0}, 0xffffffffffffffff, 0x10, 0x51, 0x7, 0x7dce}, {{r0}, 0xfffffffffffffffb, 0x2, 0x12, 0x400, 0x7}, {{r1}, 0xffffffffffffffff, 0x2, 0x0, 0x4, 0x20}, {{r1}, 0xfffffffffffffff9, 0x40, 0x80000000, 0x7, 0x3ff}, {{r0}, 0xfffffffffffffffb, 0x80, 0x9, 0x40}, {{r0}, 0xffffffffffffffff, 0x0, 0x10, 0x0, 0xffff}], 0x0, &(0x7f0000000140)=[{{r0}, 0xfffffffffffffffd, 0x1c, 0x40000049, 0x7fffffff, 0x9c}, {{r0}, 0xfffffffffffffffa, 0x1, 0x20000000, 0x8, 0x6b2f}], 0x3, &(0x7f00000001c0)={0x4, 0x4}) ioctl$TIOCEXCL(r1, 0x2000740d) 11:17:13 executing program 0: setrlimit(0x8, &(0x7f0000000040)={0x7, 0x95}) r0 = syz_open_pts() close(r0) r1 = syz_open_pts() r2 = dup2(r0, r1) ioctl$TIOCSETA(r0, 0x80047466, &(0x7f00000004c0)={0x5, 0x0, 0x0, 0x0, "61aa0db11ce9bae3c6514e6ae973739ea78b7ec0"}) r3 = kqueue() ioctl$TIOCSETD(r2, 0x8004741b, &(0x7f0000000080)=0x5) kevent(r3, &(0x7f0000000140)=[{{r0}, 0xffffffffffffffff, 0x83}], 0x1000, 0x0, 0xc600, 0x0) 11:17:13 executing program 1: r0 = syz_open_pts() ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f0000000080)={0x0, 0x0, 0x90d2, 0x0, "d730c1e7bb6fc6e23c5b00000000000000e74de4"}) write(r0, &(0x7f0000000200)="582720efabd16ebae63225259560f8e5815f73f2a044fd33055552fbd5e41789632dfc94ff334a5619515a4c8ab06198824b3da025bbd45d3bf579456fc7d4096e8c8b6b87cb2d72b8bcdb9ad8a4f5f728193ef16a960387a64d5f16b136a5d00d1628b53a", 0x65) write(r0, &(0x7f0000000180)="39a499fc6fe779c345dfac2011c037b9879f80db92e519d3b0a3871e16b8fe3cf2d66878b77d52466620d014c5d77f17f23e3ce158071103948e416ff4ec24cccdc00c2c89539090511fd05826c80c73a2", 0x51) r1 = syz_open_pts() close(r0) dup(r1) r2 = syz_open_pts() ioctl$TIOCSETA(r2, 0x802c7414, &(0x7f0000000140)={0x0, 0x0, 0x3, 0x0, "85495500020000000000001167f5afa680400900"}) ioctl$TIOCSETA(r2, 0x802c7414, &(0x7f0000000000)={0xd4f8, 0xfffffffffffffffd, 0x400, 0x4000000000da2, "b08d16c6662247ea5f2b2c215faf8a210524d8e5"}) open$dir(&(0x7f0000000040)='./file0\x00', 0x20000, 0x0) readv(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)=""/45, 0x2d}], 0x1) syz_open_pts() 11:17:13 executing program 0: r0 = syz_open_pts() ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f0000000080)={0x0, 0x0, 0x90d2, 0x0, "d730c1e7bb6fc6e23c5b00000000000000e74de4"}) write(r0, &(0x7f0000000200)="582720efabd16ebae63225259560f8e5815f73f2a044fd33055552fbd5e41789632dfc94ff334a5619515a4c8ab06198824b3da025bbd45d3bf579456fc7d4096e8c8b6b87cb2d72b8bcdb9ad8a4f5f728193ef16a960387a64d5f16b136a5d00d1628b53a", 0x65) write(r0, &(0x7f0000000280)="bdfa4d2582c321a8cf98848e4a8051bd24313dea8d0343d605e2d3280d33ee6185c6a19e1a3fbed9d7c7f5ecd505370f55d9bb05dc03e23aa168a0017f559b7cb5e32d0ff2d4e7199679daa987423cab21c6b2748aaa78947da61d75bc9028a2b887f01309bbe061a751731e5c2091f3e9bdd11c4518138f7d1d6a2e60e1f34322c0cdf8648b48935d14a79a15cecdd79cd66c31400b4dc386972d2eae1f50146ed5ead47dfc43c6c3b018be5455ba5fe808f9840f9e13da075ee54c0682247a3e405d535caab085c9a7dee598ca84b10ba7651238225996d2250f6ea821e153a6212dc30a", 0xe5) r1 = syz_open_pts() close(r0) dup(r1) syz_open_pts() r2 = syz_open_pts() ioctl$TIOCSETA(r2, 0x802c7414, &(0x7f0000000140)={0x0, 0x0, 0x3, 0x0, "85495500020000000000001167f5afa680400900"}) ioctl$TIOCSETA(r2, 0x802c7414, &(0x7f0000000000)={0xffffffffffffffff, 0x10001, 0x3, 0xfdba, "0108000000080000bd8a0c3bab7a9a210526d8e5"}) readv(r0, &(0x7f0000000040), 0xb1) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x20, 0x0) ioctl$TIOCSTART(r2, 0x2000746e) 11:17:13 executing program 1: r0 = socket$inet6(0x18, 0x2, 0x0) ioctl$VT_RELDISP(r0, 0x20007604, &(0x7f00000000c0)=0x43b37f2bee08f5ce) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f0000000040)=0xc) getsockopt(r0, 0x29, 0x31, 0x0, 0x0) fcntl$setstatus(r0, 0x4, 0x40) 11:17:13 executing program 1: r0 = socket(0x2, 0x3, 0x1) connect$unix(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="00000000000000000800000000a0bdfa18723b3bb31c73087c31e95de5b6ff9e1c3b9c397f7fba63ac89ea9084ceaa523dfec1d188f9f962ac48603d67d7124f39b36e9eb2fdb68e96d492e071c3f37243ca5f9afdf7a70680a5f103fe00aa4b786c21c0889cea96b88186c14790720ec3ade0651bf5acd77a2ef9fe5d3393b96c1a5719ba331d6aee394b698c50eb0b772dececc62fed999990fb5e480147e2d81d01d3b1fec7e03f8201a8af39ea1c77727e1091cd88105e3c000000000000000000"], 0x10) writev(r0, &(0x7f0000001300)=[{&(0x7f0000000280)="225dae3070ca9f05", 0x8}], 0x1) 11:17:13 executing program 0: mknod(&(0x7f00000000c0)='./bus\x00', 0x80, 0x4) r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "04713de0af28a2813d8209b8d9f39321849e3c99"}) r1 = semget$private(0x0, 0x2, 0x1) semctl$IPC_RMID(r1, 0x0, 0x0) 11:17:13 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x3a0914c44f7b202c, 0xd02) r0 = open(&(0x7f0000000000)='./bus\x00', 0x409, 0x0) lseek(r0, 0x0, 0x1) fchdir(r0) writev(r0, &(0x7f0000002300)=[{0x0}], 0x1) 11:17:13 executing program 0: r0 = socket(0x18, 0x2, 0x0) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) sendmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)=ANY=[@ANYBLOB="2000000000000000ffff000000000000f87c8a5b671b1b542a538706000000a7c800000029000000310000000300000035ce17351d70577f250ff8242b5c3df13566ee0243a92461bbe095db80455331cb8d1454d24587e3313d6065724ce375e1846fbf8fe2ed16bf38f082bb0785ce8ce3e221341803569b810374ab12108a4ad74775d69d77ee72af5b5a14e9e7dd4279a02ab8520dd93a626ed574cd60f3650ef5f96e9d7ba872c96fbce4f096335dc9f6169369d81542b3abe7749e7879ed6411f43d9f40740f7bd8da0cd261174da61bc460eeb1da7f56c00a8387640ce61cf1b7c8014357"], 0xe8}, 0x0) 11:17:13 executing program 1: r0 = socket(0x400000000018, 0x3, 0x3a) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) setsockopt(r0, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000140)={0x3f, 0xfffffffffffffffc, 0x0, 0x1, 0x9}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x3}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f00000000c0), 0x5c) 11:17:13 executing program 0: mknod(&(0x7f0000000100)='./bus\x00', 0x2000, 0x86138) r0 = open(&(0x7f0000000040)='./bus\x00', 0x2, 0x0) write(r0, &(0x7f0000000140)="220e22", 0x3) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x4000080c1, 0x8001}) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0) ioctl$TIOCSETAW(r0, 0x802c7415, &(0x7f0000000000)={0xffffffffffffffff, 0x7ff, 0x0, 0x4, "f11c369195d2b1ee4517e8af8c106f890eb940b1", 0xc5, 0x6b7}) 11:17:14 executing program 1: mknod(&(0x7f0000000040)='./bus\x00', 0x80002005, 0x0) r0 = socket(0x12, 0x0, 0xfffffffffffffffa) r1 = msgget$private(0x0, 0x8) msgsnd(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="010000000000000066ac4de0b015e3b3802831fcc61febe06352a928c688235034cf1df91b7d59f361691612846c37b581dcfb19384a4e8efbb14358bccbe9a8ebfcc8d7dac93a2813a2126de0c3367178797d022c938d5c6a03ad935e8eea7936c73f236d8b879b8b16e45dbd2378073a2bbe73c5e889574d1f72893705df79934d4bf2ee0f91f34c35b32f72ae396d7c1f43a40f9cede0868d00a5541e7248d7e24c5780cab37b4e427e64565959df45ee83cf5cc03efd41d516613dfa574a6344b72ebe6c64f366a7176146866e578a73501d2896da0ed71c6acb378b2f687a47c2882b9d3017ecd3edced953900f"], 0xf0, 0x800) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) dup2(r0, r2) r3 = open$dir(&(0x7f0000000280)='./bus\x00', 0x10, 0x0) syz_extract_tcp_res$synack(&(0x7f00000012c0), 0x1, 0x0) r4 = dup(r3) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffffffd9, "855c000267a7230004001a000000000000004000"}) ioctl$WSDISPLAYIO_GETEMULTYPE(r2, 0xc014575e, &(0x7f00000000c0)={0x8000, './bus\x00'}) r5 = getuid() setuid(r5) r6 = msgget$private(0x0, 0x510) msgctl$IPC_STAT(r6, 0x2, &(0x7f00000002c0)=""/4096) utimensat(r2, &(0x7f0000000200)='./bus\x00', &(0x7f0000000240)={{0x56, 0x6}, {0x2cf, 0x800}}, 0x2) ioctl$WSKBDIO_SETMODE(r4, 0x8010570e, &(0x7f0000000000)) syz_open_pts() 11:17:14 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) truncate(&(0x7f0000000440)='./file0\x00', 0x5) lstat(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)) shmget$private(0x0, 0x4000, 0x1, &(0x7f0000ffc000/0x4000)=nil) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x800, 0x4) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)) ioctl$WSDISPLAYIO_USEFONT(r0, 0x80585750, &(0x7f0000000040)={'./file0\x00', 0x2, 0xb0d, 0x7353fbe0, 0x1, 0x3ff, 0x2, 0xffffffffffff4f04, 0x2, 0x2, 0x2, 0xfffffffffffffff7}) setuid(0xee01) r1 = msgget$private(0x0, 0x8) r2 = geteuid() getgroups(0x9, &(0x7f00000001c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0]) r4 = getuid() ioctl$WSDISPLAYIO_USEFONT(r0, 0x80585750, &(0x7f0000000480)={'./file0\x00', 0x100, 0x6, 0x100, 0x1, 0x3, 0xffffffff, 0x0, 0x1, 0x3, 0x2, 0xffffffffffffffff}) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0xc) r6 = getppid() getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000340)={0x0}, &(0x7f0000000380)=0xc) msgctl$IPC_SET(r1, 0x1, &(0x7f00000003c0)={{0x400, r2, r3, r4, r5, 0x1, 0x9}, 0x411, 0x50a1, r6, r7, 0x8, 0x9, 0x6, 0x7a2b4d8a}) lstat(&(0x7f0000000200)='./file0\x00', 0xfffffffffffffffe) 11:17:14 executing program 0: write(0xffffffffffffffff, &(0x7f0000000040)="582720efabd16ebae63225259560f8e5c15f73f2a044fd33055552fbd5e41789632dfc94ff334a5619515a4c8ab06198824b3da025bbd47b3bf579456fc7d4096e8c583e4d54a38b", 0x48) r0 = syz_open_pts() fcntl$lock(r0, 0x8, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x300000000}) close(r0) 11:17:14 executing program 1: r0 = socket(0x2000000000000002, 0x1, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0) pwritev(r1, &(0x7f0000000640)=[{&(0x7f0000000300)="dcc9d769701377932e99ef3716573f1d0740bab5da324f26ee65ee0c7cdc7871a4956844ee06222e1208741d9ac7dc3587e81250425359fb6caeb9e4690614c7a820e02e242739a3f171497ff25fe5572fb9e18f2587ead020317760a00a20991b01fe1d29cab3e2d3529a3ad71bb1a419fe4432390a1ea4db853a8c0d38143b7be23d90b58f3ea927fc7bfec5b1eead963f131f50e4010f1967", 0x9a}, {&(0x7f00000003c0)="c1fb9e1230bb203fb27675039d22cbe46d9b59a8f685465da32093155a2db768a27e60ee3735840127a2f0802941510da74a73f89a148aa4f1b5cf67dcacfdf5cec3452dac2b5a699156338c590210f934a7af10dddf86fbecc62eaf506dd9a28c9368979a41a6dd84ba18b81e9e57720fe5eabd54d011942e873d7cb7f03c5688e07623e7b94e0326243d3680583b4130", 0x91}, {&(0x7f00000006c0)="de02e46332ab32caffe9faab9b6c3153f930e9328eaadac51f290726e86a6b20", 0x20}, {&(0x7f00000004c0)="1da7f796642f6e8a5408c12251870445d3dcb6a83d8525de07b86b661f8a58899179e8dc78ad", 0x26}, {&(0x7f0000000500)="41e7e8304967bf79fc9249420c9c265ffb06ee8e0cf27b2b217248607d54d3d6c86ad673e5c24d25f1b734f5b4befd7eb5379b374fe9c7511e117fb6374b26a69936aef31bbff0c624f158f66ec58dd51ef9311206df54", 0x57}, {&(0x7f0000000580)="9aced00b2facd96aa557a239a11fd026827643dd38ae34a8f095d9079739d89df86ef19022cba3c8ba82d71251a9c9e2367b0365652f3df3a74de8cc4b4fb2878b65a8c12e8f609c4948c71bc6ad2b59155a7efb7ba8dfeaa3fa915383cd5ce9441832d77a75107d9b592d6071a9654e6e43399fc8fab4a41bf8c30f7581ddbb42dd", 0x82}], 0x6, 0x1) setsockopt$sock_int(r1, 0xffff, 0x1, &(0x7f0000000080)=0x9619, 0x319) pwritev(r1, &(0x7f0000000140)=[{&(0x7f00000000c0)="4402", 0x2}], 0x1, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r1, 0x0, 0x0) getpeername$unix(r0, &(0x7f0000000200)=@file={0x0, ""/108}, &(0x7f0000000100)=0x6e) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0x4}, 0x10) 11:17:14 executing program 0: pipe(&(0x7f0000001280)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) openat(r3, &(0x7f0000000000)='./file0/file0\x00', 0x40, 0xc) fcntl$setstatus(r3, 0x4, 0x80) r4 = getppid() ioctl$TIOCSETAF(r1, 0x802c7416, &(0x7f0000000100)={0x7fffffff, 0x8, 0x4, 0x80000001, "8a4e82c067ec35c53de23b25642df5b578c50001", 0x6, 0x7}) fcntl$setown(r0, 0x6, r4) mknod(&(0x7f0000000080)='./file0\x00', 0xc000, 0x1ff) pwritev(r3, &(0x7f00000003c0), 0x1000000000000297, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x5, 0x10, r2, 0x0, 0x0) write(r1, &(0x7f00000000c0)="1d", 0x1) close(r0) 11:17:14 executing program 1: mknod(&(0x7f0000000040)='./bus\x00', 0x2000, 0x86128) r0 = open(&(0x7f0000000080)='./bus\x00', 0x6, 0x2000000003) pwritev(r0, &(0x7f00000002c0), 0x1000000000000278, 0x0) open(&(0x7f0000000000)='./bus\x00', 0x180, 0x80) shmget$private(0x0, 0x4000, 0x2, &(0x7f0000ffc000/0x4000)=nil) 11:17:14 executing program 1: r0 = syz_open_pts() r1 = syz_open_pts() r2 = kqueue() kevent(r2, &(0x7f0000000080)=[{{r0}, 0xffffffffffffffff, 0x81, 0x80, 0x5, 0x1}, {{r0}, 0xfffffffffffffffb, 0x4, 0x2, 0x1, 0x3b74}, {{r2}, 0xfffffffffffffffe, 0x10, 0x0, 0x1, 0x39}, {{r1}, 0x0, 0x40, 0xfffff, 0x2, 0x3}], 0x80, &(0x7f0000000100)=[{{r1}, 0xfffffffffffffffb, 0x42, 0xf0000001, 0x0, 0x1}, {{r2}, 0xffffffffffffffff, 0x9, 0x2, 0x79, 0x5}, {{r1}, 0xfffffffffffffffe, 0x2, 0x8, 0x400, 0x10000}, {{r1}, 0xfffffffffffffffe, 0x8, 0x2, 0x8}], 0x2, &(0x7f0000000180)={0x10000, 0xa7c}) kevent(r2, &(0x7f0000000000)=[{{r0}, 0xffffffffffffffff, 0x11}], 0xfff, 0x0, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) r3 = syz_open_pts() r4 = syz_open_pts() ioctl$TIOCSETAF(r4, 0x802c7416, &(0x7f0000000000)={0x0, 0x0, 0x90d2, 0x0, "d730c1ff070000e23c5b00000000000000e74de4"}) write(r4, &(0x7f0000000040)="582720efabd16ebae63225259560f8e5c15f73f2a044fd33055552fbd5e41789632dfc94ff334a5619515a4c8ab06198824b3da025bbd47b3bf579456fc7d4096e8c583e4d54a38b6b87cb2d72b8bcdb9ad8a4f5f728193ef16ab93f12fc037916b136a54c", 0x65) write(r4, &(0x7f0000000100)="a624a77e320087044dce2643b8599aa9bb0047b438edfebe5d682cc67c85d8ea67eb91a3df689ae5c355f7dcb602", 0x2e) r5 = syz_open_pts() ioctl$TIOCGETA(r5, 0x402c7413, &(0x7f00000001c0)) close(r4) dup(r5) r6 = syz_open_pts() ioctl$TIOCSETA(r6, 0x802c7414, &(0x7f0000000200)={0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, "85495500020000000000df1067f5bfa6ee00"}) r7 = syz_open_pts() poll(&(0x7f00000000c0)=[{r6, 0x21}], 0x1, 0x0) dup(r0) ioctl$TIOCSETAF(r7, 0x802c7416, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x20, "8cb8fe5d8b4a1d1773046eddf5befe8b7ae17992", 0x7ff}) kevent(r2, &(0x7f0000000040)=[{{r3}, 0xffffffffffffffff, 0x1}], 0x8001, 0x0, 0x0, 0x0) syz_open_pts() ioctl$TIOCGETD(r0, 0x4004741a, &(0x7f0000000280)) 11:17:14 executing program 1: r0 = syz_open_pts() ioctl$TIOCSTAT(r0, 0x40047463, 0x0) 11:17:14 executing program 0: r0 = socket(0x21, 0x7, 0x1a) socket$inet6(0x18, 0x4, 0x2) r1 = socket$inet6(0x18, 0x2, 0x0) getsockopt$sock_timeval(r0, 0xffff, 0x0, &(0x7f0000000000), &(0x7f0000000040)=0x10) getsockopt(r1, 0x200000029, 0x40, 0x0, 0x0) 11:17:14 executing program 1: r0 = socket(0x11, 0x3, 0x0) sendto$unix(r0, &(0x7f0000000000)="b100050309000000000021b1ffff00bd49451ae3d3051020741038f53e8551f30ce390500e08fecea11ea8fef96e4f9679d5c4c2a73764aebdbe781e4d8f6aef9187a869a4d3722c91f75073a1ebe2a4cbba982fd825582fe2aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89040fd3872babfbb770c1f5a872c881ff7cc53c894303b298a85ff3faa8d9211830e0f2f0c9f69ec7ab3a34c29000000000", 0xb1, 0x0, 0x0, 0x299) login: uvm_fault(0xffffffff82287918, 0xffff80000198c002, 0, 1) -> e kernel: page fault trap, code=0 Stopped at rtable_satoplen+0x150: movzbl 0xffffffffffffffff(%r13),%r12d ddb{1}> ddb{1}> set $lines = 0 ddb{1}> set $maxwidth = 0 ddb{1}> show panic kernel page fault uvm_fault(0xffffffff82287918, 0xffff80000198c002, 0, 1) -> e rtable_satoplen(21,ffff80000198bf59) at rtable_satoplen+0x150 end trace frame: 0xffff800020c37810, count: 0 ddb{1}> trace rtable_satoplen(21,ffff80000198bf59) at rtable_satoplen+0x150 rtable_lookup(0,ffff80000198bf09,ffff80000198bf59,ffff80000198bf11,21) at rtable_lookup+0xfd rtm_output(ffff80000198bf00,ffff800020c37900,ffff800020c37908,21,0) at rtm_output+0x1a7 route_output(fffffd806f32ea00,fffffd806caf3610,0,0) at route_output+0x79b route_usrreq(fffffd806caf3610,9,fffffd806f32ea00,0,0,ffff800020b7d080) at route_usrreq+0x35d sosend(fffffd806caf3610,0,ffff800020c37bc8,0,0,0) at sosend+0x6eb sendit(ffff800020b7d080,4,ffff800020c37c88,0,ffff800020c37d50) at sendit+0x590 sys_sendto(ffff800020b7d080,ffff800020c37d68,ffff800020c37d50) at sys_sendto+0x92 syscall(ffff800020c37e00) at syscall+0x5b8 Xsyscall(6,0,ffffffffffffffd8,0,6,5f761aa3010) at Xsyscall+0x128 end of kernel end trace frame: 0x5fa60f60e50, count: -10 ddb{1}> show registers rdi 0 rsi 0xaa rbp 0xffff800020c37770 rbx 0xffffffffffffff5a rdx 0xffff80000198bf5d rcx 0xffff80000198c003 rax 0xffff80000198c003 r8 0x21 r9 0x1 r10 0x4 r11 0x2817d9b818ca9ace r12 0 r13 0xffff80000198c003 r14 0xffffffff821bf7b0 mplsdomain r15 0x4 rip 0xffffffff819822f0 rtable_satoplen+0x150 cs 0x8 rflags 0x10287 __ALIGN_SIZE+0xf287 rsp 0xffff800020c37720 ss 0x10 rtable_satoplen+0x150: movzbl 0xffffffffffffffff(%r13),%r12d ddb{1}> show proc PROC (syz-executor.1) pid=369871 stat=onproc flags process=1000 proc=4080000 pri=52, usrpri=52, nice=20 forw=0xffffffffffffffff, list=0xffff800020b7c720,0xffffffff82377ca8 process=0xffff800020b8cd38 user=0xffff800020c32000, vmspace=0xfffffd807f00c438 estcpu=22, cpticks=1, pctcpu=0.0 user=0, sys=1, intr=0 ddb{1}> ps PID TID PPID UID S FLAGS WAIT COMMAND 2964 39499 7670 0 3 0x3000 suspend syz-executor.1 * 2964 369871 7670 0 7 0x4081000 syz-executor.1 7670 307135 19787 0 3 0x82 nanosleep syz-executor.1 92030 72537 19787 0 3 0x2 biowait syz-executor.0 19787 409593 22153 0 3 0x82 nanosleep syz-fuzzer 19787 147491 22153 0 3 0x4000082 nanosleep syz-fuzzer 19787 111556 22153 0 3 0x4000082 thrsleep syz-fuzzer 19787 491349 22153 0 3 0x4000082 kqread syz-fuzzer 19787 119777 22153 0 3 0x4000082 thrsleep syz-fuzzer 19787 129911 22153 0 3 0x4000082 thrsleep syz-fuzzer 19787 320085 22153 0 3 0x4000082 thrsleep syz-fuzzer 19787 435552 22153 0 3 0x4000082 thrsleep syz-fuzzer 19787 444156 22153 0 3 0x4000082 thrsleep syz-fuzzer 19787 404577 22153 0 3 0x4000082 thrsleep syz-fuzzer 22153 35275 41328 0 3 0x10008a pause ksh 41328 204643 20534 0 3 0x92 select sshd 62516 12649 1 0 3 0x100083 ttyin getty 20534 433393 1 0 3 0x80 select sshd 52740 71121 711 74 3 0x100092 bpf pflogd 711 361359 1 0 3 0x80 netio pflogd 45014 299464 19161 73 2 0x100090 syslogd 19161 81884 1 0 3 0x100082 netio syslogd 25874 219420 1 77 3 0x100090 poll dhclient 33028 77057 1 0 3 0x80 poll dhclient 70541 516550 0 0 3 0x14200 pgzero zerothread 10436 39624 0 0 3 0x14200 aiodoned aiodoned 71006 435919 0 0 3 0x14200 syncer update 21841 5744 0 0 3 0x14200 cleaner cleaner 67951 86986 0 0 3 0x14200 reaper reaper 72981 432701 0 0 3 0x14200 pgdaemon pagedaemon 54287 181618 0 0 3 0x14200 bored crynlk 44308 422117 0 0 3 0x14200 bored crypto 11395 222246 0 0 3 0x40014200 acpi0 acpi0 89141 167453 0 0 3 0x40014200 idle1 80683 92281 0 0 3 0x14200 bored softnet 2193 446506 0 0 3 0x14200 bored systqmp 2930 345568 0 0 3 0x14200 bored systq 13759 19850 0 0 3 0x40014200 bored softclock 40962 126921 0 0 7 0x40014200 idle0 22048 311308 0 0 3 0x14200 bored smr 1 423542 0 0 3 0x82 wait init 0 0 -1 0 3 0x10200 scheduler swapper ddb{1}> show all locks Process 2964 (syz-executor.1) thread 0xffff800020b7d080 (369871) exclusive kernel_lock &kernel_lock r = 1 (0xffffffff82362af8) locked @ /syzkaller/managers/multicore/kernel/sys/arch/amd64/amd64/trap.c:161 #0 witness_lock+0x594 #1 solock+0x7e #2 sosend+0x586 #3 sendit+0x590 #4 sys_sendto+0x92 #5 syscall+0x5b8 #6 Xsyscall+0x128 Process 92030 (syz-executor.0) thread 0xffff800020b14260 (72537) exclusive rrwlock inode r = 0 (0xfffffd8068c8f3d0) locked @ /syzkaller/managers/multicore/kernel/sys/ufs/ufs/ufs_vnops.c:1547 #0 witness_lock+0x594 #1 _rw_enter+0x45d #2 _rrw_enter+0x60 #3 VOP_LOCK+0x57 #4 vn_lock+0x6e #5 vget+0x1c3 #6 ufs_ihashget+0x151 #7 ffs_vget+0x84 #8 ufs_lookup+0x15d3 #9 VOP_LOOKUP+0x67 #10 vfs_lookup+0x556 #11 namei+0x4b2 #12 dounlinkat+0xa5 #13 syscall+0x5b8 #14 Xsyscall+0x128 exclusive rrwlock inode r = 0 (0xfffffd8068c8f920) locked @ /syzkaller/managers/multicore/kernel/sys/ufs/ufs/ufs_vnops.c:1547 #0 witness_lock+0x594 #1 _rw_enter+0x45d #2 _rrw_enter+0x60 #3 VOP_LOCK+0x57 #4 vn_lock+0x6e #5 vget+0x1c3 #6 cache_lookup+0x300 #7 ufs_lookup+0x1d7 #8 VOP_LOOKUP+0x67 #9 vfs_lookup+0x556 #10 namei+0x4b2 #11 dounlinkat+0xa5 #12 syscall+0x5b8 #13 Xsyscall+0x128 ddb{1}> show malloc Type InUse MemUse HighUse Limit Requests Type Lim Kern Lim devbuf 9484 6393K 6395K 78643K 10574 0 0 pcb 27 9K 9K 78643K 65 0 0 rtable 98 3K 3K 78643K 186 0 0 ifaddr 45 11K 11K 78643K 47 0 0 counters 39 33K 33K 78643K 39 0 0 ioctlops 0 0K 4K 78643K 1469 0 0 iov 0 0K 24K 78643K 8 0 0 mount 1 1K 1K 78643K 1 0 0 vnodes 1199 75K 75K 78643K 1226 0 0 UFS quota 1 32K 32K 78643K 1 0 0 UFS mount 5 36K 36K 78643K 5 0 0 shm 2 1K 5K 78643K 3 0 0 VM map 2 1K 1K 78643K 2 0 0 sem 11 0K 0K 78643K 14 0 0 dirhash 12 2K 2K 78643K 12 0 0 ACPI 1808 196K 290K 78643K 12628 0 0 file desc 5 13K 21K 78643K 45 0 0 sigio 0 0K 0K 78643K 2 0 0 proc 53 50K 71K 78643K 320 0 0 subproc 64 65538K 67586K 78643K 68 0 0 NFS srvsock 1 0K 0K 78643K 1 0 0 NFS daemon 1 16K 16K 78643K 1 0 0 in_multi 33 2K 2K 78643K 33 0 0 ether_multi 1 0K 0K 78643K 2 0 0 mrt 0 0K 0K 78643K 3 0 0 ISOFS mount 1 32K 32K 78643K 1 0 0 MSDOSFS mount 1 16K 16K 78643K 1 0 0 ttys 66 291K 291K 78643K 66 0 0 exec 0 0K 1K 78643K 189 0 0 pagedep 1 8K 8K 78643K 1 0 0 inodedep 1 32K 32K 78643K 1 0 0 newblk 1 0K 0K 78643K 1 0 0 VM swap 7 26K 26K 78643K 7 0 0 UVM amap 83 20K 20K 78643K 960 0 0 UVM aobj 8 2K 2K 78643K 8 0 0 memdesc 1 4K 4K 78643K 1 0 0 crypto data 1 1K 1K 78643K 1 0 0 NDP 8 0K 0K 78643K 12 0 0 temp 110 2366K 2430K 78643K 3140 0 0 SYN cache 2 16K 16K 78643K 2 0 0 ddb{1}> show all pools Name Size Requests Fail Releases Pgreq Pgrel Npage Hiwat Minpg Maxpg Idle arp 64 4 0 0 1 0 1 1 0 8 0 inpcbpl 280 46 0 39 1 0 1 1 0 8 0 plimitpl 152 16 0 8 1 0 1 1 0 8 0 plcache 128 20 0 0 1 0 1 1 0 8 0 rtentry 112 42 0 2 2 0 2 2 0 8 0 syncache 264 4 0 4 1 1 0 1 0 8 0 tcpqe 32 8 0 8 1 0 1 1 0 8 1 tcpcb 544 12 0 8 1 0 1 1 0 8 0 rttmr 72 1 0 1 1 0 1 1 0 8 1 nd6 48 4 0 0 1 0 1 1 0 8 0 pfosfp 40 846 0 423 5 0 5 5 0 8 0 pfosfpen 112 1428 0 714 21 0 21 21 0 8 0 pfstitem 24 12 0 2 1 0 1 1 0 8 0 pfstkey 112 12 0 2 1 0 1 1 0 8 0 pfstate 328 12 0 2 1 0 1 1 0 8 0 pfrule 1360 21 0 16 2 1 1 2 0 8 0 art_heap8 4096 1 0 0 1 0 1 1 0 8 0 art_heap4 256 184 0 0 12 0 12 12 0 8 0 art_table 32 185 0 0 2 0 2 2 0 8 0 art_node 16 41 0 7 1 0 1 1 0 8 0 sysvmsgpl 40 2 0 0 1 0 1 1 0 8 0 semapl 112 10 0 1 1 0 1 1 0 8 0 shmpl 112 6 0 0 1 0 1 1 0 8 0 dirhash 1024 17 0 0 3 0 3 3 0 8 0 dino1pl 128 1490 0 75 46 0 46 46 0 8 0 ffsino 272 1490 0 75 95 0 95 95 0 8 0 nchpl 144 1753 0 125 61 0 61 61 0 8 0 uvmvnodes 72 1535 0 0 28 0 28 28 0 8 0 vnodes 200 1535 0 0 81 0 81 81 0 8 0 namei 1024 4502 0 4502 2 1 1 1 0 8 1 percpumem 16 30 0 0 1 0 1 1 0 8 0 scxspl 192 4291 0 4290 7 5 2 6 0 8 1 sigapl 432 241 0 226 2 0 2 2 0 8 0 futexpl 56 398 0 398 1 0 1 1 0 8 1 knotepl 112 67 0 40 2 0 2 2 0 8 1 kqueuepl 104 6 0 4 1 0 1 1 0 8 0 pipepl 112 152 0 133 2 1 1 1 0 8 0 fdescpl 488 242 0 226 3 0 3 3 0 8 0 filepl 152 1278 0 1176 6 0 6 6 0 8 2 lockfpl 104 15 0 15 2 1 1 1 0 8 1 lockfspl 32 29 0 29 2 1 1 1 0 8 1 sessionpl 112 18 0 7 1 0 1 1 0 8 0 pgrppl 48 18 0 7 1 0 1 1 0 8 0 ucredpl 96 166 0 157 1 0 1 1 0 8 0 zombiepl 144 226 0 226 2 1 1 1 0 8 1 processpl 840 257 0 226 4 0 4 4 0 8 0 procpl 600 317 0 276 4 0 4 4 0 8 0 srpgc 64 1 0 1 1 0 1 1 0 8 1 sockpl 384 90 0 69 3 0 3 3 0 8 0 mcl64k 65536 2 0 0 1 0 1 1 0 8 0 mcl9k 9216 1 0 0 1 0 1 1 0 8 0 mcl4k 4096 3 0 0 1 0 1 1 0 8 0 mcl2k 2048 113 0 0 14 0 14 14 0 8 0 mtagpl 80 1 0 0 1 0 1 1 0 8 0 mbufpl 256 123 0 0 8 0 8 8 0 8 0 bufpl 256 5471 0 1046 277 0 277 277 0 8 0 anonpl 16 30845 0 22701 36 2 34 34 0 125 0 amapchunkpl 152 907 0 817 6 1 5 5 0 158 1 amappl16 192 644 0 223 22 0 22 22 0 8 0 amappl15 184 1 0 0 1 0 1 1 0 8 0 amappl14 176 26 0 22 1 0 1 1 0 8 0 amappl13 168 42 0 37 1 0 1 1 0 8 0 amappl12 160 25 0 22 1 0 1 1 0 8 0 amappl11 152 214 0 200 1 0 1 1 0 8 0 amappl10 144 72 0 67 1 0 1 1 0 8 0 amappl9 136 365 0 361 1 0 1 1 0 8 0 amappl8 128 144 0 128 1 0 1 1 0 8 0 amappl7 120 44 0 39 1 0 1 1 0 8 0 amappl6 112 59 0 51 1 0 1 1 0 8 0 amappl5 104 118 0 105 1 0 1 1 0 8 0 amappl4 96 308 0 287 2 1 1 2 0 8 0 amappl3 88 123 0 116 1 0 1 1 0 8 0 amappl2 80 973 0 919 2 0 2 2 0 8 0 amappl1 72 14642 0 14197 24 9 15 19 0 8 5 amappl 72 557 0 521 1 0 1 1 0 75 0 dma4096 4096 1 0 1 1 1 0 1 0 8 0 dma256 256 6 0 6 1 1 0 1 0 8 0 dma64 64 259 0 259 1 1 0 1 0 8 0 dma32 32 7 0 7 1 1 0 1 0 8 0 dma16 16 17 0 17 1 1 0 1 0 8 0 aobjpl 64 7 0 0 1 0 1 1 0 8 0 uaddrrnd 24 242 0 226 1 0 1 1 0 8 0 uaddrbest 32 2 0 0 1 0 1 1 0 8 0 uaddr 24 242 0 226 1 0 1 1 0 8 0 vmmpekpl 168 5937 0 5914 2 0 2 2 0 8 0 vmmpepl 168 33171 0 31750 84 10 74 74 0 357 12 vmsppl 360 241 0 226 2 0 2 2 0 8 0 pdppl 4096 492 0 452 6 0 6 6 0 8 0 pvpl 32 118834 0 107576 104 6 98 99 0 265 5 pmappl 224 241 0 226 2 0 2 2 0 8 1 extentpl 40 39 0 25 1 0 1 1 0 8 0 phpool 112 425 0 4 13 0 13 13 0 8 0