Warning: Permanently added '10.128.15.199' (ECDSA) to the list of known hosts. 2020/02/11 06:21:47 fuzzer started 2020/02/11 06:21:53 dialing manager at 10.128.15.235:5412 2020/02/11 06:21:53 syscalls: 337 2020/02/11 06:21:53 code coverage: enabled 2020/02/11 06:21:53 comparison tracing: enabled 2020/02/11 06:21:53 extra coverage: support is not implemented in syzkaller 2020/02/11 06:21:53 setuid sandbox: enabled 2020/02/11 06:21:53 namespace sandbox: support is not implemented in syzkaller 2020/02/11 06:21:53 Android sandbox: support is not implemented in syzkaller 2020/02/11 06:21:53 fault injection: support is not implemented in syzkaller 2020/02/11 06:21:53 leak checking: support is not implemented in syzkaller 2020/02/11 06:21:53 net packet injection: enabled 2020/02/11 06:21:53 net device setup: support is not implemented in syzkaller 2020/02/11 06:21:53 concurrency sanitizer: support is not implemented in syzkaller 2020/02/11 06:21:53 devlink PCI setup: support is not implemented in syzkaller 06:22:01 executing program 0: r0 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyCcfg\x00', 0x40, 0x0) pread(r0, &(0x7f0000000040)="448e062257aaaad256dbf13501b068af79f5370dd54cdc236321ac0eccbfdd3cdc53ebc636ebfde9d3cc5c725981b1f8ee4b722d845179eacc2363d5156052fe61919a287beeda456f8b86dbe43dd3fa0c09aa938de4310a24f074c89c0268860bcb3741beb7bb63113f7c92a9db0c3cacefa4c2", 0x74, 0x0, 0x6) readv(r0, &(0x7f0000002380)=[{&(0x7f00000000c0)=""/18, 0x12}, {&(0x7f0000000100)=""/4096, 0x1000}, {&(0x7f0000001100)=""/4096, 0x1000}, {&(0x7f0000002100)=""/133, 0x85}, {&(0x7f00000021c0)=""/14, 0xe}, {&(0x7f0000002200)=""/171, 0xab}, {&(0x7f00000022c0)=""/151, 0x97}], 0x7) pipe(&(0x7f0000002400)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDSETMODE(r1, 0x20004b0a, &(0x7f0000002440)) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000002480)={'tap', 0x0}) pipe(&(0x7f00000024c0)={0xffffffffffffffff}) r4 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000002500)='/dev/diskmap\x00', 0x10010, 0x0) r5 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000002540)='/dev/ttyCcfg\x00', 0x10000, 0x0) poll(&(0x7f0000002580)=[{r3, 0x8}, {r4, 0x4}, {r2, 0x40}, {0xffffffffffffffff, 0x40}, {r5, 0x4}], 0x5, 0x7) r6 = openat$null(0xffffffffffffff9c, &(0x7f00000025c0)='/dev/null\x00', 0x2, 0x0) ioctl$BIOCSDLT(r6, 0x8004427a, &(0x7f0000002600)=0xb6) ioctl$VT_OPENQRY(r2, 0x40047601, &(0x7f0000002640)) semget$private(0x0, 0x4, 0x6c0) r7 = accept$unix(0xffffffffffffff9c, &(0x7f00000026c0)=@file={0x0, ""/4096}, &(0x7f0000003700)=0x1002) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000003740)={&(0x7f0000002680)='./file0\x00', r7, 0x2}) r8 = semget$private(0x0, 0x59fe7ca05b85b675, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000003780)={0x0, 0x0}, 0xc) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f00000037c0)={0x0, 0x0, 0x0}, &(0x7f0000003800)=0xc) r11 = getuid() r12 = getegid() semctl$IPC_SET(r8, 0x0, 0x1, &(0x7f0000003840)={{0x8, r9, r10, r11, r12, 0x52, 0x3}, 0x3, 0x1ff, 0x8}) r13 = semget(0x3, 0x1, 0x48) semctl$GETZCNT(r13, 0x1, 0x7, &(0x7f00000038c0)=""/245) r14 = dup(0xffffffffffffff9c) ioctl$BIOCSETF(r14, 0x80104267, &(0x7f0000003a00)={0x3, &(0x7f00000039c0)=[{0x900, 0x4, 0x4, 0x401}, {0x598, 0x4, 0x8}, {0x9, 0x40, 0x92, 0xffffffff}]}) unlink(&(0x7f0000003a40)='./file0/file0\x00') setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000003a80)={0x2, 0x77a}, 0x10) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000003ac0)=""/66, &(0x7f0000003b40)=0x42) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000003b80)={0x0, 0x0}, &(0x7f0000003bc0)=0xc) setuid(r15) 06:22:01 executing program 1: r0 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f0000000040)=0xc) r1 = geteuid() getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0xc) fchown(r0, r1, r2) r3 = socket$unix(0x1, 0x0, 0x0) setsockopt(r3, 0x7fffffff, 0x1f453043, &(0x7f00000000c0)="34662dc6a231d5e9d752dc89688adfdaeab7f3968f440cab2c39531b0f850e708becd99037c1d40341e67b4240e93b9302bd63edc67e85fc4b3d337286ec2a08b9030ed37d187dd609752b29b7cdcaeaa4d39c2d2b4e9f5a", 0x58) r4 = fcntl$dupfd(r3, 0x0, r0) r5 = getpgid(0xffffffffffffffff) fcntl$setown(r4, 0x6, r5) ioctl$VMM_IOC_RESETCPU(r4, 0x82405605, &(0x7f0000000140)={0x0, 0x7, {[0x0, 0x0, 0x0, 0x0, 0x1f, 0x1000, 0x100, 0x0, 0x7ff, 0x6, 0x8000, 0x2, 0x175, 0x6, 0x1, 0x3ff, 0x2, 0x6], [0x2, 0x6, 0x401, 0x401, 0x2, 0x4a9d0000000, 0xfffffffffffffffd, 0x1ff, 0x80000001, 0x7], [0x0, 0x100000001, 0x4, 0x6, 0xffffffff, 0x8, 0x2bf5], [0x7f, 0x100000001, 0x9, 0x5, 0xfffffffffffffffa, 0x7], [{0xa69, 0x40da, 0x7fffffff, 0x7}, {0x8, 0x5, 0x1, 0x2000000000000000}, {0x350, 0x80000001, 0x0, 0xb930}, {0x7, 0x38d, 0x1e, 0x3ff}, {0xfdd2, 0x7fffffff, 0x6, 0x4}, {0x81, 0x59c, 0x6, 0x9}, {0x92bf, 0x8c, 0xfff, 0x1000}, {0xa6, 0x55, 0xb7, 0x7}], {0x2, 0x3, 0x80000000, 0x4}, {0x8, 0x9, 0x1, 0x7}}}) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000380)='/dev/bpf\x00', 0x80, 0x0) ioctl$BIOCSRSIG(r6, 0x80044272, &(0x7f00000003c0)=0x5) r7 = socket$unix(0x1, 0x4, 0x0) r8 = socket$unix(0x1, 0x5, 0x0) r9 = accept$inet(r4, &(0x7f0000000400), &(0x7f0000000440)=0xc) r10 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000480)='/dev/diskmap\x00', 0x1, 0x0) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/vmm\x00', 0x200, 0x0) r12 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000500)='/dev/wsmouse\x00', 0x10000, 0x0) poll(&(0x7f0000000540)=[{r6, 0x20}, {r3, 0x2}, {r7, 0x4}, {r3, 0x4}, {r8, 0x100}, {r0, 0x2}, {r9, 0x4}, {r10, 0x8}, {r11, 0x40}, {r12, 0x4}], 0xa, 0x80000001) connect(r7, &(0x7f00000005c0)=@in={0x2, 0x0}, 0xc) r13 = accept$inet(0xffffffffffffff9c, &(0x7f0000000600), &(0x7f0000000640)=0xc) connect(r13, &(0x7f0000000680)=@in6={0x18, 0x1, 0x101, 0x5}, 0xc) r14 = openat$klog(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/klog\x00', 0x300e8, 0x0) pwrite(r14, &(0x7f0000000700)="7c42c08f5f1b8d008e0d20b346283ee771622a194ec6629246f7676de46027fbd5ca3277628923eeb75441490c6b956c4e82a718b7d0ed50331f1b40693292166d858e2063e515a632ad9a3d44f3bab656c075e5f83d05341a2529ecf4cf53cefcdee6bfceb7ac55c756f05e31e2909a23009a673247d7c925aa28e41fb7039652b56738ebf0370a0b5b4d774c7c68ffda90d6218bdf14cf49512e2e5937a18ee29ce66cb914bc6b7c8aed09d3395790c44a610b2ee84f93c09edec21a024d4d519b17bfc07d8bf2684465f776f2dcc3b2ac81077f92ca15b1ee1bc2c8a44fef19ed8f29276b8c13dd93480f344664", 0xef, 0x0, 0x8) r15 = openat(0xffffffffffffffff, &(0x7f0000000800)='./file0\x00', 0x20, 0x108) recvfrom$unix(r15, &(0x7f0000000840)=""/118, 0x76, 0x20, &(0x7f00000008c0)=@file={0x1, './file0\x00'}, 0xa) dup2(r6, r15) msgget$private(0x0, 0x500) chflags(&(0x7f0000000900)='./file0\x00', 0x10000) getsockname$inet6(r4, &(0x7f0000000940), &(0x7f0000000980)=0xc) 06:22:02 executing program 0: ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x3, 0x0, 0x0, {[0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x7], [0x0, 0x0, 0x0, 0x697be04, 0x0, 0xfffffffffffffffe, 0x1fd, 0x35c3], [0x8, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x7fffffffffffffff], [0x9, 0x0, 0x411], [{0xffff, 0x7fffffff, 0x2}, {0x0, 0x0, 0x0, 0x2}, {}, {}, {0x0, 0x7, 0xffffffff}], {0x0, 0x3}}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x3, 0x0) socket(0x6, 0x4000, 0x40) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8080691a, &(0x7f0000000300)) ioctl$BIOCGRTIMEOUT(0xffffffffffffff9c, 0x4010426e, &(0x7f0000000000)) 06:22:02 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000000)={0x4, &(0x7f0000000040)=[{0x7c, 0x0, 0x7}, {0x16, 0xff}, {0x9, 0x7f, 0x4, 0xfffe}, {0x1, 0x0, 0x1f, 0x1ff}]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = getpid() ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x1104, r2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) seteuid(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xfffffffffffffd13) setregid(0xffffffffffffffff, r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xfffffffffffffd13) setregid(0xffffffffffffffff, r8) getgroups(0x8, &(0x7f0000000400)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r6, r8, 0x0, 0xffffffffffffffff, 0x0]) r10 = socket(0x18, 0x1, 0x0) setsockopt(r10, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r11 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000440)='/dev/diskmap\x00', 0x80, 0x0) r12 = socket(0x18, 0x1, 0x0) close(r12) connect$unix(r12, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) r13 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ttyCcfg\x00', 0x8000, 0x0) r14 = dup(0xffffffffffffff9c) r15 = socket(0x18, 0x2, 0x0) close(r15) setsockopt(r15, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r15, &(0x7f0000000040), 0xe7) r16 = socket(0x18, 0x1, 0x0) close(r16) connect$unix(r16, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) r17 = socket(0x18, 0x1, 0x0) close(r17) connect$unix(r17, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) sendmsg$unix(r1, &(0x7f0000000540)={&(0x7f0000000100)=@abs={0x1, 0x0, 0x3}, 0x8, &(0x7f00000003c0)=[{&(0x7f0000000200)="adf9553b6995e08ab3b6a47287c4b68aa966f4c112081d692de60b60c5514dcd4008e45a59b5d543832392c1915cb39ee2793bd0d07993f5ceda00752a65f459cde921f41de1bf9843623d59b4a7fa7ebf575bbc6086c52c8fae12de4f28fd89d78a7e6a65702cc36162210a88cb07bcf6cf40b65e9bde39665bb15f85c6ec115a7d1255bb5a380e22decd64c302ec063b2d10f69378d18b5fc916db1e914b7d6acb018ea4976e7b99733c0e8ecf595646883fe9c28f589386f38b43707cfd79069a8e5b45b17012be", 0xc9}, {&(0x7f0000000180)="6aa0f9ec90ae08a07589d242229033f1c608b8131db881d3953465d859a4e5787a9ec3a7306227bb387e80217c41b376496fc1ca", 0x34}, {&(0x7f0000000340)="54e97c64d0bd2c495ea894da04752e01d5ce34aa9278cf796d17d7b3cf7738901b2c9f1bfafc75f63fa62a346d5e0325d4881d8d2658fce82f87667da6dc577e0252561487", 0x45}], 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="2000000000000000ffff000000000000", @ANYRES32=r2, @ANYRES32=r4, @ANYRES32=r9, @ANYBLOB="00000000381c0000000001000000eef07de8ef155a09ba22a6730ad0fa5ff1775a1af2353228784697269cc5c865ce081151cfe240a0dea1b40218ad73989bf3d0a6ed5fa892c62971e4b1268a41", @ANYRES32=r10, @ANYRES32=r0, @ANYRES32=r11, @ANYRES32=r12, @ANYRES32=r0, @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000002000000000000000ffff000001000000", @ANYRES32=r15, @ANYRES32=r16, @ANYRES32=r17, @ANYBLOB='\x00\x00\x00\x00'], 0x78, 0x402}, 0x208) r18 = getpgrp() fcntl$lock(r0, 0x8, &(0x7f0000000080)={0x1, 0x2, 0x4, 0x3, r18}) syz_emit_ethernet(0xe, &(0x7f00000001c0)="174af205b6068bbc6be6634ecdd0") 06:22:02 executing program 1: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x5}}) r0 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r0, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x810, r0, 0x0, 0x0) pwritev(r0, &(0x7f0000002500)=[{&(0x7f0000000400)="fb", 0x1}], 0x1, 0x0, 0x42d7) ioctl$TIOCCONS(r0, 0x80047462, &(0x7f0000000100)=0x3ff) r1 = open$dir(&(0x7f0000000080)='./file1\x00', 0x8000, 0x64) write(r1, &(0x7f0000000200)="91ed4f29098e36e17f16152ceac37ff85cbf24a9a2622b51e585e5781b1c1337c3506f92e0540cf83d9c14afab17cf773cf1527aaf707c85cd25bb1cb69c48db15f5fa2cc1f21dcb010936e39f4ee61de4bef4f2c55a2f748241a3300baa67660b1760f76a9ff6fede69fe9a9dc85485cd47c74a366baeb7d0d2bd59c7b3ccc6c163c730899431e970130cc31b51e64a488e0c8787ca58c2c2293e736a35ad4374bb226affa65a3582283bd5a73f69c1f9fdceaed579eb8e7605085718d7001671ee10dffcd3848305270a8b1d40098c133c65c60a7299c6d8f7150e42e00112cc4f4b2d14d5ecaa0cd338158f0e427a72", 0xf1) ioctl$TIOCSETAW(r0, 0x802c7415, &(0x7f0000000040)={0x8, 0x200, 0x1, 0x415b, "c07b9ba11ae56e43fa215b4c281648c6e8170c18", 0x1}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) connect$unix(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="01000e98dc7e1bf4abd94cb572371f955f502f66696c653100"], 0xa) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x400000002, 0x0) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 06:22:02 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r1, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x810, r1, 0x0, 0x0) pwritev(r1, &(0x7f0000002500)=[{&(0x7f0000000400)="fb", 0x1}], 0x1, 0x0, 0x42d7) bind(r1, &(0x7f0000000000)=@in={0x2, 0x3}, 0xc) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000140)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000180)={0x3, &(0x7f0000000040)=[{0x20}, {0x5c}, {0xbe}]}) r2 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r2, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x810, r2, 0x0, 0x0) pwritev(r2, &(0x7f0000002500)=[{&(0x7f0000000400)="fb", 0x1}], 0x1, 0x0, 0x42d7) ioctl$TIOCCONS(r2, 0x80047462, &(0x7f0000000100)=0x3ff) ioctl$BIOCSETF(r2, 0x80104267, &(0x7f00000000c0)={0x3, &(0x7f0000000080)=[{0x6, 0x80, 0x6, 0x9}, {0x81, 0x3, 0xfc, 0x3}, {0x0, 0x3, 0x7, 0x10001}]}) syz_emit_ethernet(0x535, &(0x7f0000000340)="b6") 06:22:02 executing program 1: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffffff) ioctl$WSDISPLAYIO_GETSCREENTYPE(r0, 0xc028575d, &(0x7f0000000180)={0x5, 0x5, './file0\x00', 0x5, 0x10001, 0x6, 0xe12}) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$WSDISPLAYIO_SBURNER(r2, 0x800c5751, &(0x7f0000000140)={0x0, 0x200, 0x1}) pwrite(r1, &(0x7f0000000100)="b1e91bee8fad27050cdafd2413b0", 0xe, 0x0, 0x0) getpid() 06:22:02 executing program 0: mknod(&(0x7f0000000100)='./bus\x00', 0x80002009, 0x3200) open(&(0x7f00009b7000)='./bus\x00', 0x0, 0x0) unveil(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='c\x00') getpid() r0 = open$dir(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f00000004c0)=""/230, 0xfffffe9f}], 0x1) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000480)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(r1, 0xc5005601, &(0x7f0000000580)={0x1, 0x0, 0x1, {[0x0, 0x0, 0x0, 0x20000000, 0x1200000], [], [], [], [], {}, {0x9}}}) 06:22:02 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f00000002c0)={0x3, &(0x7f0000000040)=[{}, {}, {0x6, 0x0, 0x0, 0xfc}]}) ioctl$BIOCSRTIMEOUT(0xffffffffffffffff, 0x8010426d, &(0x7f0000000040)={0x3}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) r2 = socket(0x18, 0x2, 0x0) close(r2) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r2, &(0x7f0000000040), 0xe7) r3 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bpf\x00', 0x400, 0x0) r4 = socket(0x18, 0x2, 0x0) close(r4) setsockopt(r4, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r4, &(0x7f0000000040), 0xe7) r5 = socket$inet6(0x18, 0x8000, 0x1) r6 = socket(0x18, 0x1, 0x0) setsockopt(r6, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r7 = accept(0xffffffffffffff9c, 0x0, &(0x7f0000000080)) poll(&(0x7f00000000c0)=[{r2, 0x20}, {r0, 0x80}, {r3, 0x1}, {r4, 0x100}, {r5, 0x100}, {0xffffffffffffff9c, 0x8}, {r6, 0x4}, {r1, 0x1}, {r7, 0xc8}, {r1, 0x74}], 0xa, 0x3366) ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f00000002c0)={0x0, 0x0}) pwrite(r1, &(0x7f0000000400)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0, 0x0) pwrite(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$bpf(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, 0x0) ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, 0x0) pwrite(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 06:22:02 executing program 1: r0 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000000)=0x4) openat$wsmuxkbd(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/wskbd\x00', 0x0, 0x0) r1 = socket(0x18, 0x1, 0x0) setsockopt(r1, 0x29, 0xb, &(0x7f0000000000)="d5ff9668", 0x4) setsockopt(r1, 0x29, 0x80000000000000a, &(0x7f0000000340)="9018d4d817008545ed2186ca26627990db0597558ec291ecee146f8a857f1809117b7cb0ad2ba780ce202ddeb045622f699990d3a5452763856b5befffd46b5ab79c92bfb25c0c4dccaaf76bb1bb331f44280204e6a5631f9f9472674112fe5a71dbed1b45dfea3507ed0a7774078f221f2868e3d7428b252ff450e497f283d63ccf6f15", 0x84) writev(r1, &(0x7f00000001c0)=[{&(0x7f0000000080)="5aa4ce31e9f3a110b440c077b53c5f789915cd5ff3ed1583855530", 0x1b}], 0x1) r2 = socket(0x800000018, 0x1, 0x0) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000100)="ebffcbff13f9fd812eaa4e713040e69931929648", 0x14) r3 = msgget$private(0x0, 0xfffffffffffffffd) msgsnd(r3, &(0x7f0000000440)=ANY=[], 0x0, 0x0) msgsnd(r3, &(0x7f0000000040)=ANY=[], 0x0, 0x1000) r4 = msgget(0x3, 0x80) msgsnd(r4, &(0x7f0000000200)={0x1, "a68a95d22a67289701a0069b200164bcc60ee3064b0eeb001504d36837cc6d9a8942b2c6504bd8cbab808ef7d532f9920a159c5acde93c6c79103b14b3e330a15c0c50409c7d01fbc9177c671f5c871cad0106601941d56aea925117c44fd0c053a2d5dfb11c8346f1b9aa99ca658610e1c4c463e108d48f67b2e5546154a9e8696515c6a6e466159738ac37cd471cb57d3f76ba83"}, 0x9d, 0x0) msgsnd(r3, &(0x7f0000001640)=ANY=[@ANYPTR64=&(0x7f0000000a40)=ANY=[]], 0x1, 0x800) msgrcv(r3, &(0x7f0000000600)=ANY=[@ANYBLOB="000000000000000078aaa66ef64e355c687bb448cdae53db3fa374414a837184dcaa50d4f9afff68a7b8fd2d2c79fcf5e14f9285d1891dba59a2a1be4fea77cafce6aa8e4503189be3f9b3744cbf298b3ee067d28cfcd7fe7c23d5a3c37791f364a1cb51afabbe9c9a0ee248507473a5ddaac00c408db37c1841b45d81727f56c9ff577dfb2389a10faef83f3c2a6355b36ebada3680aa21370f031c18aa7cdad6c5f9c4a2cecfe3d85629d75586581a2bd8229d6c9816d572f0bf54f8d3b3c62b9ac04da0ddbc628c8957bed28e619e769aa523e8a56d5a8b01ecfdb13703f7"], 0xffffff64, 0x1, 0x0) msgrcv(r3, &(0x7f00000002c0)={0x0, ""/60}, 0x44, 0x3515da46e6caa84d, 0x0) msgsnd(r3, &(0x7f0000000100)={0x1, "0e933ac68da9588e6d84aa0b84e0a76736eac30eb53842903bbee7cd2998675701804c7af3868812ad90724a22f34dc12fd1ee37b82fbd6d2ee12c1ce131d7008cf6b9e499c8ad30a464b4aab31b699ec82abf31cb04e3a4cb203d5dcae71e77bc27b6c6285da1c712f6decc8122e295e697a3356391e2d4ee8807cf2f1945c983a9ce20225b8ca40b6bdbf3a39b374856f1b177a728855e6812d29d450e69997eee341786de22582325173207212cdf9c"}, 0xb9, 0x0) fcntl$setown(0xffffffffffffffff, 0x6, 0xffffffffffffffff) r5 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r5) ktrace(&(0x7f0000000540)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r5) fcntl$setown(0xffffffffffffff9c, 0x6, r5) r6 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r6, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) r7 = socket(0x18, 0x2, 0x0) close(r7) setsockopt(r7, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r7, &(0x7f0000000040), 0xe7) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x810, r7, 0x0, 0x0) pckbd_enable: command error 06:22:03 executing program 1: r0 = open(&(0x7f0000000180)='./file0\x00', 0x10, 0x1a0) ioctl$TIOCSFLAGS(r0, 0x8004745c, &(0x7f00000001c0)=0xfffff5dc) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x200000000000c, &(0x7f0000000040)="eaff125d00000000", 0x8) r2 = socket(0x18, 0x1, 0x0) setsockopt(r2, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) sendto$inet(r2, &(0x7f0000000080)="a04152a510eab46e7ea43d5240080fdbb79cab58b8d2ece3cf4ed87defba0a46dbbd182f609e7fab825c310c64349ac80ce3aa7db476c723cd5a235143d64412c9cccb76ede8967df590f889146b48a87f92c3db75b7743ad54248e257ea74e028805a3aa957e358117f9fc69a6632c3f44cb6e1c4e92fc1f4fa4ffa2f65a5c46ebb29406a98de0a01e70a3ff3caee3042f27c814bee2a25e9503a7687a53d9e81b943dc10ac0f4f7f7cc40e040d468a01e9ec9d4608c7a64153abb14b2b66a5a53a68", 0xc3, 0x1, &(0x7f0000000000)={0x2, 0x1}, 0xc) setsockopt$inet_opts(r1, 0x0, 0x200100000000b, 0x0, 0x18f) 06:22:03 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000240)=@un=@file={0xd80f49edce43012d, './file0\x00'}, 0xa) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) getgroups(0x7, &(0x7f0000000080)=[0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff]) r2 = socket(0x18, 0x2, 0x0) close(r2) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r2, &(0x7f0000000040), 0xe7) connect$unix(r2, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0xa) setgroups(0x0, 0x0) chown(&(0x7f00000000c0)='./file0\x00', 0x0, r1) setuid(0xee01) r3 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r3, &(0x7f0000001480)={&(0x7f0000000280)=ANY=[@ANYBLOB="70012e3f5459e6c32908000000000000009e9abc0080ffff00400000400017e84ab7319c422d38eb245600048f733edf6245811594ef468c7c612f65186541eb27dd4539d13ea243a4df4eba13980588df628fb2febc6a2bb369fafdf49cc3000000000000000000ad4f4287f99ba324e8ccf87d5a7ed4dc9a285f29"], 0xa, 0x0}, 0x0) 06:22:03 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x3a0914c44f7b202c, 0xd02) r0 = open(&(0x7f0000000000)='./bus\x00', 0x1, 0x0) fcntl$setstatus(0xffffffffffffff9c, 0x4, 0x8) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xfffffe91}], 0x1, 0x0, 0x40000000) 06:22:03 executing program 0: openat$wskbd(0xffffffffffffff9c, &(0x7f0000000080)='/dev/wskbd0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000140)='./file0\x00', 0x800, 0x0) semctl$SETVAL(0x0, 0x4, 0x8, &(0x7f0000000100)=0xff) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x80) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) pwritev(r3, &(0x7f00000003c0), 0x273, 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x0, 0x0) msgsnd(0x0, &(0x7f0000001640)=ANY=[], 0x0, 0x0) fcntl$dupfd(r1, 0xa, r2) r4 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x1, 0x0) dup2(r4, r0) 06:22:03 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040)='/dev/bpf\x00', 0x0, 0x0) r1 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r1, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x810, r1, 0x0, 0x0) pwritev(r1, &(0x7f0000002500)=[{&(0x7f0000000400)="fb", 0x1}], 0x1, 0x0, 0x42d7) bind(r1, &(0x7f0000000000)=@in={0x2, 0x3}, 0xc) ioctl$BIOCSETF(0xffffffffffffff9c, 0x80104267, &(0x7f00000001c0)={0x1ffffffffffffeb4}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) syz_emit_ethernet(0xe, &(0x7f0000000100)="1ae03b4ccf1a083499d023b7334b") pckbd_enable: command error 06:22:05 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) r1 = socket(0x2, 0x2, 0x0) connect$unix(r1, &(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x10) dup2(r1, r0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r2 = socket(0x2000000000000002, 0x3, 0x102) sendmsg$unix(r2, &(0x7f0000000540)={&(0x7f0000000040)=@abs={0xacf25922147002da}, 0x10, 0x0}, 0x0) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000000380), 0xc) r3 = dup(r0) sendto$inet6(r3, &(0x7f0000000040), 0xfcec, 0x0, 0x0, 0xffffffffffffffda) socket(0x2, 0x1, 0x0) r4 = socket(0x2, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$TIOCFLUSH(r5, 0x80206931, &(0x7f0000000300)) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10000) ioctl$BIOCSETIF(r7, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETWF(r6, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x61}, {0x80}, {0x6, 0x0, 0x0, 0xfff}]}) pwrite(r6, &(0x7f0000000240)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0, 0x0) r8 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r9, &(0x7f00000000c0), 0x832f1f7d, 0x0, &(0x7f0000000000)=@abs, 0x20000000) r11 = dup2(r10, r9) write(r11, 0x0, 0x0) ioctl$BIOCSETIF(r3, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r8, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x0, 0x0, 0x0, 0xfffffffc}, {0x80, 0x2}, {0x1ad, 0x0, 0x0, 0xfff}]}) pwrite(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x80, 0x0) r12 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x20, 0x0) ioctl$BIOCSETIF(r12, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r12, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x80}, {0x80}, {0x6, 0x0, 0x0, 0xfff}]}) pwrite(r12, &(0x7f0000000240)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0, 0x0) r13 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r13, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r13, 0x80104277, &(0x7f0000000040)={0x0, 0x0}) pwrite(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) socket$unix(0x1, 0x0, 0x0) syz_open_pts() openat$bpf(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, 0x0) pckbd_enable: command error 06:22:05 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bpf\x00', 0x4000000019, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x28}, {0x87}, {0x6, 0x0, 0x0, 0x8000000000100}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSDLT(0xffffffffffffffff, 0x8004427a, &(0x7f00000000c0)=0x7) write(r0, &(0x7f0000000080)="7cd23fc0aa17dddf7830faa1aaab", 0xe) 06:22:05 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x4}, {0x1c}, {0x8fe}]}) syz_emit_ethernet(0x17d, &(0x7f0000000340)="b6") openat$bpf(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bpf\x00', 0x80, 0x0) 06:22:05 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000280)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSBLEN(r0, 0xc0044266, &(0x7f0000000040)=0x8) r1 = socket(0x18, 0x1, 0x0) setsockopt(r1, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r2 = dup2(r1, 0xffffffffffffff9c) ioctl$BIOCPROMISC(r2, 0x20004269) r3 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r3, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x810, r3, 0x0, 0x0) pwritev(r3, &(0x7f0000002500), 0x0, 0x0, 0x42d7) bind(r3, &(0x7f0000000000)=@in={0x2, 0x3}, 0xc) ioctl$WSMOUSEIO_SRES(r3, 0x80045721, &(0x7f0000000240)=0x1ff) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000001c0)={0x2, &(0x7f00000000c0)=[{0xb1, 0x0, 0x7, 0x7ff}, {0x2b, 0x0, 0x11, 0x7}]}) r4 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r4, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x810, r4, 0x0, 0x0) pwritev(r4, &(0x7f0000002500)=[{&(0x7f0000000400)="fb", 0x1}], 0x1, 0x0, 0x42d7) bind(r4, &(0x7f0000000000)=@in={0x2, 0x3}, 0xc) ioctl$VMM_IOC_TERM(r4, 0x80045604, &(0x7f0000000100)={0xba000000}) ioctl$KDGETLED(r2, 0x40044b41, &(0x7f0000000080)) r5 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r5, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x810, r5, 0x0, 0x0) pwritev(r2, &(0x7f0000000700)=[{&(0x7f00000002c0)="54b39211d086d129eec4e1c7a0cd0dac3d4a8b207e8c4fabb3dcd7b69b45115e0a1b321479ea8b29053e42c050a0a8f76f59edc9f3f95dbe975df7b63a2d076f0a91cfbc0e7b32f101666b04cf2648bc34023ecbbda09019fb7f26e9dd9f52ee8ab9ee", 0x63}, {&(0x7f0000000340)="72bd98d35063d351dfa1db4a2f9f13558ed341833699b8d40e51847bff753cfb8dc1c7b03da5fbe9d4edc44320f2e7ca8377ea32930cf514e0268c408aed5fd4b5010c7dd2ccb289e74459b90ceabcee58ea7139b4553c2e07a7679a6387b74ead89c6d722c7c9b2b96102c654d7081ecfd418b36f17f356597e02b81cb4523acf07a5c5bcf0af90", 0x88}, {&(0x7f0000000440)="c73eaea5cbb9cb82c4316447217f319cc46c8859f970fbe9aedec408436362fb8fd4d2b85a3b49ccbc617dc4d64fed893c10e8cbe21392b36b35ee82c99173b0062294848c4c9481685535376827ddca70b4d0ebb614b1371184124eca4b5de456d321224e73841235d270be6084d51d431a5e17680080bf08", 0x79}, {&(0x7f00000004c0)="cb788f9f359dd4bb5b8d0eb69fc693a8ae1e6db06f58cb53b3e8e047d67dab16724401e155201338fc9eb83e1db30aff70f13f9aaa13a88500a68deae38ea83ff519d36b681e0ef31d249467d97733592c870f8782097c5ea31f36261917bd091b33a4371394a9d008b96e18c3187202732bb8ab84295c15d8e6bf39da4d86b5a62b29ca0fdf824c8405fe6a9897b6a18415bed4c0c9e3481f6e1fa944d149ec67858d0d63f3fd4a7d60eaa773172db1d3c3e4e15a9f3b6f2de24d903fd031ceb068f5d9f73b2a6475c19db7cb9231307a8601ebad895ee0ecddb137b24d95ee98650c59286871ed169736cd5c83", 0xee}, {&(0x7f00000005c0)="2da0107668a3a8f3786148f4fd733ecc0cc120a96499ea6714b45d97bff2e0ff2983abd14a17bf4785934cf85f163351a58ec69e384bc5b072803e3f8cb8d81ee24e93b0112e8f6aeda01eaa228230482c2541d875d149151aa20c11cd6b4792e4a48d", 0x63}, {&(0x7f0000000680)="9766dbbc67b83c4a8439cd635ab6211dd2ed7661b95db2d092176cb7203788d0a55eca801f5568135bd760effccb771026984fd0f2cce6429b96ccb86a54fd3f570186117c3c64493f88c96e78e0aa85d2a10adf585e9a0e77f30fed2770ebaa4bf70626c2c93be1df6b35c5ab", 0x6d}], 0x6, 0x0, 0x9) pwritev(r5, &(0x7f0000002500)=[{&(0x7f0000000400)="fb", 0x1}], 0x1, 0x0, 0x42d7) ioctl$TIOCCONS(r5, 0x80047462, &(0x7f0000000100)=0x3ff) ioctl$BIOCSFILDROP(r5, 0x80044279, &(0x7f0000000200)=0x8) r6 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r6, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) r7 = socket(0x18, 0x2, 0x0) close(r7) setsockopt(r7, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r7, &(0x7f0000000040), 0xe7) open(&(0x7f0000000780)='./file0\x00', 0x1, 0x102) r8 = openat$null(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/null\x00', 0x8, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x12, r8, 0x0, 0x800020000000) pwritev(r6, &(0x7f0000002500)=[{&(0x7f0000000400)="fb", 0x1}], 0x1, 0x0, 0x42d7) bind(r6, &(0x7f0000000000)=@in={0x2, 0x3}, 0xc) ioctl$TIOCCHKVERAUTH(r6, 0x2000741e) syz_emit_ethernet(0xe, &(0x7f0000000640)="7e020002002200dda68c0e000000") 06:22:05 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) unveil(&(0x7f00000000c0)='./file0\x00', &(0x7f00000001c0)='c\x00') truncate(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r0, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x810, r0, 0x0, 0x0) pwritev(r0, &(0x7f0000002500)=[{&(0x7f0000000400)="fb", 0x1}], 0x1, 0x0, 0x42d7) bind(r0, &(0x7f0000000000)=@in={0x2, 0x3}, 0xc) ioctl$VT_RELDISP(r0, 0x20007604, &(0x7f0000000040)) 06:22:05 executing program 0: r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) read(r0, &(0x7f00000006c0)=""/138, 0x8a) semctl$GETNCNT(0x0, 0x0, 0x3, &(0x7f00000002c0)=""/118) r1 = open$dir(&(0x7f0000000400)='./file0\x00', 0x400000002c5, 0x0) kqueue() r2 = syz_open_pts() ioctl$TIOCSETAF(r2, 0x802c7416, &(0x7f00000000c0)={0x0, 0x0, 0x90d6, 0x0, "d730c1e7bb6fc6e23c5b00000000000000e74de4"}) write(r2, &(0x7f0000000180)="582720efabd16ebae63225259560f8e5815f73f2a044fd33055552fbd5e41789632dfc94ff334a5619515a4c8ab06198824b3da025bbd47b3bf579456fc7d4096e8c8b6b87cb2d72b8bcdb9ad8a4f5f728193ef16ab93f12fc4d5f16b136a5d00d1628b53a", 0x65) write(r2, &(0x7f0000000040), 0xfffffec2) close(r2) dup2(r1, r0) open$dir(&(0x7f0000000400)='./file0\x00', 0x400000002c5, 0x0) kqueue() open$dir(&(0x7f0000000400)='./file0\x00', 0x400000002c5, 0x0) execve(0x0, 0x0, 0x0) 06:22:05 executing program 1: munmap(&(0x7f0000001000/0x2000)=nil, 0x2000) madvise(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x6) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="01002e2f66696c653001"], 0xa) 06:22:05 executing program 1: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) getpeername$inet(r0, &(0x7f0000000100), &(0x7f0000000140)=0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x2, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r3, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x810, r3, 0x0, 0x0) pwritev(r3, &(0x7f0000002500)=[{&(0x7f0000000400)="fb", 0x1}], 0x1, 0x0, 0x42d7) bind(r3, &(0x7f00000000c0)=@in={0x2, 0x3}, 0xc) r4 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x800, 0x281) r5 = socket(0x18, 0x2, 0x0) close(r5) setsockopt(r5, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r5, &(0x7f0000000040), 0xe7) r6 = socket(0x18, 0x2, 0x0) close(r6) setsockopt(r6, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r6, &(0x7f0000000040), 0xe7) r7 = openat$klog(0xffffffffffffff9c, &(0x7f0000000040)='/dev/klog\x00', 0x80, 0x0) poll(&(0x7f0000000080)=[{0xffffffffffffff9c, 0x2}, {r4, 0x100}, {r5, 0x10}, {r6, 0x2}, {r7, 0x20}, {r2, 0x4}], 0x6, 0x0) ioctl$TIOCFLUSH(r2, 0x80206979, &(0x7f0000000300)) r8 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r8, &(0x7f0000001440)=[{&(0x7f00000001c0)=']', 0x1}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x810, r8, 0x0, 0x0) pwritev(r8, &(0x7f0000002500)=[{&(0x7f0000000400)="fb", 0x1}], 0x1, 0x0, 0x42d7) ioctl$TIOCCONS(r8, 0x80047462, &(0x7f0000000100)=0x3ff) ioctl$VT_OPENQRY(r8, 0x40047601, &(0x7f0000000200)) panic: receive 1a: so 0xfffffd805e554000, so_type 3, m 0xfffffd8068d8be00, m_type 0 Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND * 56967 83397 0 0 0 0 dhclient db_enter() at db_enter+0x18 panic(ffffffff821a0883) at panic+0x15c soreceive(fffffd805e554000,0,ffff80001d3825f8,0,0,ffff80001d382504) at soreceive+0x170a soo_read(fffffd80687fb618,ffff80001d3825f8,0) at soo_read+0x53 dofilereadv(ffff80001d349278,6,ffff80001d3825f8,0,ffff80001d3826e0) at dofilereadv+0x1a1 sys_read(ffff80001d349278,ffff80001d382690,ffff80001d3826e0) at sys_read+0x83 syscall(ffff80001d382760) at syscall+0x507 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x7f7fffff2410, count: 7 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs. ddb> ddb> set $lines = 0 ddb> set $maxwidth = 0 ddb> show panic receive 1a: so 0xfffffd805e554000, so_type 3, m 0xfffffd8068d8be00, m_type 0 ddb> trace db_enter() at db_enter+0x18 panic(ffffffff821a0883) at panic+0x15c soreceive(fffffd805e554000,0,ffff80001d3825f8,0,0,ffff80001d382504) at soreceive+0x170a soo_read(fffffd80687fb618,ffff80001d3825f8,0) at soo_read+0x53 dofilereadv(ffff80001d349278,6,ffff80001d3825f8,0,ffff80001d3826e0) at dofilereadv+0x1a1 sys_read(ffff80001d349278,ffff80001d382690,ffff80001d3826e0) at sys_read+0x83 syscall(ffff80001d382760) at syscall+0x507 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x7f7fffff2410, count: -8 ddb> show registers rdi 0 rsi 0x1 rbp 0xffff80001d382340 rbx 0xffff80001d3823f0 rdx 0x2 rcx 0 rax 0 r8 0xffff80001d382300 r9 0x1 r10 0 r11 0xdc689c4f61964ca2 r12 0x3000000008 r13 0xffff80001d382350 r14 0x100 r15 0x1 rip 0xffffffff81651a88 db_enter+0x18 cs 0x8 rflags 0x246 rsp 0xffff80001d382330 ss 0x10 db_enter+0x18: addq $0x8,%rsp ddb> show proc PROC (dhclient) pid=56967 stat=onproc flags process=0 proc=0 pri=24, usrpri=50, nice=20 forw=0xffffffffffffffff, list=0xffff80001d34a868,0xffff80001d349768 process=0xffff8000ffffae10 user=0xffff80001d37d000, vmspace=0xfffffd806bc09220 estcpu=0, cpticks=1, pctcpu=0.0 user=0, sys=1, intr=0 ddb> ps PID TID PPID UID S FLAGS WAIT COMMAND 50348 127537 90441 0 2 0 syz-executor.1 50348 462424 90441 0 3 0x4000000 smrbar syz-executor.1 38922 60464 72616 0 2 0x480 syz-executor.0 38922 58171 72616 0 3 0x4000080 fsleep syz-executor.0 38922 489937 72616 0 2 0x4000000 syz-executor.0 38922 29986 72616 0 3 0x4000080 fsleep syz-executor.0 90441 485141 14190 0 3 0x82 nanosleep syz-executor.1 72616 410482 14190 0 2 0x482 syz-executor.0 14190 431754 23189 0 3 0x82 thrsleep syz-fuzzer 14190 354558 23189 0 2 0x4000482 syz-fuzzer 14190 376460 23189 0 3 0x4000082 kqread syz-fuzzer 14190 343589 23189 0 3 0x4000082 thrsleep syz-fuzzer 14190 389729 23189 0 3 0x4000082 thrsleep syz-fuzzer 14190 259139 23189 0 3 0x4000082 thrsleep syz-fuzzer 14190 354610 23189 0 3 0x4000082 thrsleep syz-fuzzer 14190 6729 23189 0 3 0x4000082 thrsleep syz-fuzzer 23189 499346 65412 0 3 0x10008a pause ksh 65412 94721 30060 0 3 0x92 select sshd 56896 69060 1 0 3 0x100083 ttyin getty 30060 356902 1 0 3 0x80 select sshd 77413 3386 5683 73 3 0x100090 kqread syslogd 5683 356312 1 0 3 0x100082 netio syslogd 68060 379208 1 77 2 0x100010 dhclient *83397 56967 1 0 7 0 dhclient 94835 16107 0 0 2 0x14200 zerothread 62602 156088 0 0 3 0x14200 aiodoned aiodoned 45173 12898 0 0 3 0x14200 syncer update 55475 71410 0 0 3 0x14200 cleaner cleaner 86675 394351 0 0 3 0x14200 reaper reaper 30069 334256 0 0 3 0x14200 pgdaemon pagedaemon 69271 129198 0 0 3 0x14200 bored crynlk 7912 114970 0 0 3 0x14200 bored crypto 73544 232295 0 0 3 0x40014200 acpi0 acpi0 51099 138428 0 0 3 0x14200 bored softnet 9528 304958 0 0 3 0x14200 bored systqmp 26053 16078 0 0 3 0x14200 bored systq 4978 283257 0 0 3 0x40014200 bored softclock 80479 161594 0 0 3 0x40014200 idle0 1287 109919 0 0 3 0x14200 bored smr 1 433697 0 0 3 0x82 wait init 0 0 -1 0 3 0x10200 scheduler swapper ddb> show all locks No such command ddb> show malloc Type InUse MemUse HighUse Limit Requests Type Lim devbuf 9448 6323K 6980K 78643K 10645 0 pcb 13 8K 8K 78643K 17 0 rtable 105 3K 3K 78643K 191 0 ifaddr 39 10K 10K 78643K 41 0 counters 21 16K 16K 78643K 21 0 ioctlops 0 0K 2K 78643K 15 0 iov 0 0K 12K 78643K 2 0 mount 1 1K 1K 78643K 1 0 vnodes 1218 77K 77K 78643K 1250 0 UFS quota 1 32K 32K 78643K 1 0 UFS mount 5 36K 36K 78643K 5 0 shm 2 1K 1K 78643K 2 0 VM map 2 0K 0K 78643K 2 0 sem 4 0K 0K 78643K 4 0 dirhash 12 2K 2K 78643K 12 0 ACPI 1794 195K 288K 78643K 12646 0 file desc 6 17K 25K 78643K 57 0 proc 48 38K 54K 78643K 369 0 subproc 32 2K 2K 78643K 34 0 NFS srvsock 1 0K 0K 78643K 1 0 NFS daemon 1 16K 16K 78643K 1 0 ip_moptions 0 0K 0K 78643K 17 0 in_multi 33 2K 2K 78643K 34 0 ether_multi 1 0K 0K 78643K 1 0 ISOFS mount 1 32K 32K 78643K 1 0 MSDOSFS mount 1 16K 16K 78643K 1 0 ttys 31 148K 148K 78643K 31 0 exec 0 0K 1K 78643K 182 0 pagedep 1 8K 8K 78643K 1 0 inodedep 1 32K 32K 78643K 1 0 newblk 1 0K 0K 78643K 1 0 VM swap 7 26K 26K 78643K 7 0 UVM amap 104 21K 21K 78643K 966 0 UVM aobj 2 2K 2K 78643K 2 0 memdesc 1 4K 4K 78643K 1 0 crypto data 1 1K 1K 78643K 1 0 ip6_options 0 0K 0K 78643K 8 0 NDP 5 0K 0K 78643K 9 0 temp 64 3004K 3068K 78643K 1971 0 kqueue 3 4K 4K 78643K 3 0 SYN cache 2 16K 16K 78643K 2 0 ddb> show all pools Name Size Requests Fail Releases Pgreq Pgrel Npage Hiwat Minpg Maxpg Idle arp 64 6 0 0 1 0 1 1 0 8 0 rtpcb 80 19 0 17 1 0 1 1 0 8 0 rtentry 112 45 0 1 2 0 2 2 0 8 0 unpcb 120 55 0 47 1 0 1 1 0 8 0 syncache 264 4 0 4 1 1 0 1 0 8 0 tcpqe 32 291 0 291 1 0 1 1 0 8 1 tcpcb 544 36 0 30 1 0 1 1 0 8 0 ipq 40 1 0 1 1 0 1 1 0 8 1 ipqe 40 45 0 45 1 0 1 1 0 8 1 inpcb 280 82 0 73 2 0 2 2 0 8 1 nd6 48 4 0 0 1 0 1 1 0 8 0 art_heap8 4096 1 0 0 1 0 1 1 0 8 0 art_heap4 256 213 0 0 14 0 14 14 0 8 0 art_table 32 214 0 0 2 0 2 2 0 8 0 art_node 16 44 0 4 1 0 1 1 0 8 0 sysvmsgpl 40 8 0 8 1 0 1 1 0 8 1 semapl 112 2 0 0 1 0 1 1 0 8 0 dirhash 1024 17 0 0 3 0 3 3 0 8 0 dino1pl 128 1453 0 55 46 0 46 46 0 8 0 ffsino 240 1453 0 55 83 0 83 83 0 8 0 nchpl 144 1722 0 110 60 0 60 60 0 8 0 uvmvnodes 72 1525 0 0 28 0 28 28 0 8 0 vnodes 208 1525 0 0 81 0 81 81 0 8 0 namei 1024 4197 0 4197 2 1 1 1 0 8 1 scxspl 192 5202 0 5202 1 0 1 1 0 8 1 plimitpl 152 14 0 7 1 0 1 1 0 8 0 sigapl 432 228 0 214 2 0 2 2 0 8 0 futexpl 56 795 0 793 1 0 1 1 0 8 0 knotepl 112 53 0 34 1 0 1 1 0 8 0 kqueuepl 104 4 0 0 1 0 1 1 0 8 0 pipelkpl 16 73 0 63 1 0 1 1 0 8 0 pipepl 120 146 0 127 1 0 1 1 0 8 0 fdescpl 432 229 0 214 2 0 2 2 0 8 0 filepl 120 1260 0 1157 4 0 4 4 0 8 0 lockfpl 104 21 0 20 1 0 1 1 0 8 0 lockfspl 48 9 0 8 1 0 1 1 0 8 0 sessionpl 112 17 0 7 1 0 1 1 0 8 0 pgrppl 48 17 0 7 1 0 1 1 0 8 0 ucredpl 96 52 0 45 1 0 1 1 0 8 0 zombiepl 144 214 0 214 2 1 1 1 0 8 1 processpl 896 243 0 214 4 0 4 4 0 8 0 procpl 624 287 0 247 4 0 4 4 0 8 0 sockpl 400 156 0 137 4 0 4 4 0 8 1 mcl64k 65536 1 0 1 1 0 1 1 0 8 1 mcl8k 8192 2 0 2 1 0 1 1 0 8 1 mcl4k 4096 12 0 12 2 1 1 1 0 8 1 mcl2k 2048 63566 0 63500 24 7 17 19 0 8 7 mtagpl 80 7 0 4 2 1 1 1 0 8 0 mbufpl 256 100585 0 100473 21 1 20 20 0 8 10 bufpl 280 4244 0 182 291 0 291 291 0 8 0 anonpl 16 37568 0 22160 63 1 62 62 0 107 0 amapchunkpl 152 979 0 840 8 0 8 8 0 158 1 amappl16 192 1010 0 170 42 0 42 42 0 8 0 amappl15 184 50 0 46 1 0 1 1 0 8 0 amappl14 176 40 0 34 1 0 1 1 0 8 0 amappl13 168 11 0 9 1 0 1 1 0 8 0 amappl12 160 6 0 6 1 1 0 1 0 8 0 amappl11 152 47 0 36 1 0 1 1 0 8 0 amappl10 144 20 0 16 1 0 1 1 0 8 0 amappl9 136 573 0 568 1 0 1 1 0 8 0 amappl8 128 109 0 88 1 0 1 1 0 8 0 amappl7 120 89 0 78 1 0 1 1 0 8 0 amappl6 112 54 0 50 1 0 1 1 0 8 0 amappl5 104 138 0 128 1 0 1 1 0 8 0 amappl4 96 433 0 406 1 0 1 1 0 8 0 amappl3 88 144 0 133 1 0 1 1 0 8 0 amappl2 80 1049 0 971 3 1 2 3 0 8 0 amappl1 72 14041 0 13601 27 17 10 20 0 8 1 amappl 80 504 0 459 1 0 1 1 0 84 0 dma4096 4096 1 0 1 1 1 0 1 0 8 0 dma256 256 6 0 6 1 1 0 1 0 8 0 dma128 128 253 0 253 1 1 0 1 0 8 0 dma64 64 6 0 6 1 1 0 1 0 8 0 dma32 32 7 0 7 1 1 0 1 0 8 0 dma16 16 18 0 17 1 0 1 1 0 8 0 aobjpl 64 1 0 0 1 0 1 1 0 8 0 uaddrrnd 24 229 0 214 1 0 1 1 0 8 0 uaddrbest 32 2 0 0 1 0 1 1 0 8 0 uaddr 24 229 0 214 1 0 1 1 0 8 0 vmmpekpl 168 5717 0 5692 2 0 2 2 0 8 0 vmmpepl 168 35139 0 33094 114 9 105 105 0 357 16 vmsppl 272 228 0 214 2 0 2 2 0 8 1 pdppl 4096 464 0 428 6 0 6 6 0 8 1 pvpl 32 128400 0 109942 158 2 156 156 0 265 7 pmappl 200 228 0 214 1 0 1 1 0 8 0 extentpl 40 46 0 29 1 0 1 1 0 8 0 phpool 112 171 0 12 5 0 5 5 0 8 0