kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Tue Mar 19 20:19:50 PDT 2019 OpenBSD/amd64 (ci-openbsd-multicore-6.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.21' (ECDSA) to the list of known hosts. 2019/03/19 20:20:09 fuzzer started 2019/03/19 20:20:13 dialing manager at 10.128.15.235:20268 2019/03/19 20:20:13 syscalls: 1 2019/03/19 20:20:13 code coverage: enabled 2019/03/19 20:20:13 comparison tracing: enabled 2019/03/19 20:20:13 extra coverage: support is not implemented in syzkaller 2019/03/19 20:20:13 setuid sandbox: enabled 2019/03/19 20:20:13 namespace sandbox: support is not implemented in syzkaller 2019/03/19 20:20:13 Android sandbox: support is not implemented in syzkaller 2019/03/19 20:20:13 fault injection: support is not implemented in syzkaller 2019/03/19 20:20:13 leak checking: support is not implemented in syzkaller 2019/03/19 20:20:13 net packet injection: enabled 2019/03/19 20:20:13 net device setup: support is not implemented in syzkaller 20:20:20 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8211, 0x167) ioctl$KDGETLED(r0, 0x40044b41, &(0x7f0000000040)=0x1) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)={{0x101, 0x20}, {0x0, 0x10001}}) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x2) fcntl$getown(r1, 0x5) ioctl$KDGETLED(r0, 0x40044b41, &(0x7f0000000140)) ioctl$WSDISPLAYIO_GBURNER(r0, 0x400c5752, &(0x7f0000000180)) r2 = getgid() setgid(r2) chmod(&(0x7f00000001c0)='./file0\x00', 0x91) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2, 0x10, r1, 0x0, 0x30) setgroups(0x8, &(0x7f0000000200)=[r2, r2, r2, r2, r2, r2, r2, r2]) r3 = getgid() r4 = getuid() fchownat(r0, &(0x7f0000000240)='./file0\x00', r4, r3, 0x4) r5 = semget$private(0x0, 0x3, 0x8) semctl$SETVAL(r5, 0x6, 0x8, &(0x7f0000000280)=0x8) truncate(&(0x7f00000002c0)='./file0\x00', 0x8) r6 = open(&(0x7f0000000300)='./file0\x00', 0x40, 0x28) getsockopt$SO_PEERCRED(r6, 0xffff, 0x1022, &(0x7f0000000340), 0xc) ioctl$WSDISPLAYIO_DELSCREEN(r0, 0x80085754, &(0x7f0000000380)={0x2, 0x3}) ioctl$WSDISPLAYIO_USEFONT(r0, 0x80585750, &(0x7f00000003c0)={'./file0\x00', 0xffffffffffffff80, 0x8, 0x3, 0x0, 0x3, 0xffff, 0xfffffffffffffff7, 0x2, 0x2, 0x1, 0x7ff}) ioctl$TIOCSFLAGS(r6, 0x8004745c, &(0x7f0000000440)=0x742) getpeername$inet6(r0, &(0x7f0000000480), &(0x7f00000004c0)=0xc) symlink(&(0x7f0000000500)='./file0/../file0\x00', &(0x7f0000000540)='./file0\x00') socket(0x21, 0x4000, 0xffffffffffffff5b) bind$unix(r0, &(0x7f0000000580)=@abs={0x1, 0x0, 0x2}, 0x8) semctl$SETVAL(r5, 0x6, 0x8, &(0x7f00000005c0)=0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000600)) rename(&(0x7f0000000640)='./file0/../file0\x00', &(0x7f0000000680)='./file0\x00') 20:20:21 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) ioctl$KDGKBMODE(r0, 0x40044b06) ioctl$VT_GETSTATE(r0, 0x40067664, &(0x7f0000000000)) fchmodat(r0, &(0x7f0000000040)='./file0\x00', 0xc0, 0x4) close(r0) ioctl$KDGETLED(r0, 0x40044b41, &(0x7f0000000080)) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x0}, 0xc) getpeername$inet6(r0, &(0x7f0000000100), &(0x7f0000000140)=0xc) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)) r1 = getuid() close(r0) ioctl$VT_OPENQRY(r0, 0x40047601, &(0x7f0000000240)) r2 = msgget$private(0x0, 0x100) r3 = getegid() getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000280)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) r6 = getppid() r7 = getpgid(0xffffffffffffffff) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000300)={{0x3, r1, r3, r1, r5, 0x4, 0x130e19f8}, 0x7765292a, 0x80, r6, r7, 0x800, 0x10000, 0xfffffffc00000000, 0xcd}) mknod(&(0x7f0000000380)='./file0\x00', 0x1, 0x7) pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10000) ioctl$TIOCNXCL(r9, 0x2000740e) ioctl$KDGKBMODE(r0, 0x40044b06) ioctl$KDGKBMODE(r9, 0x40044b06) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000000400), 0xc) chmod(&(0x7f0000000440)='./file0\x00', 0x46) sendto$unix(r0, &(0x7f0000000480)="dabb812de28d5c5adbacfbaaf388f5c8541edf37a8db8174b3e8188a142b6555d2d8381c7c049b9069e1bb45f1d7903540396cfafca509c258a1399debad4d5db2b9199742b93d97cf3259bdc22275265de21a2976ba21a3c202caf74a9e3457d045392b485de653680f616507e43b3359dfc034c0cda38c56d34ef7699f83e9fb146d5b00d85df0c96a1426bb0f7bc9cea145f433298cd52048437ad95fead9be64a28c92fac8b43aa4cc2b2808d85792daa437b5cd373b4f2cad5aa76eb8324a1a210d00d10802875369e42a245d936eb8a99d52293d11d42fd10872c70f44bd65164a258ea0f9dd5d7fb0", 0xec, 0x9, &(0x7f0000000580)=@abs={0x0, 0x0, 0x0}, 0x8) r10 = open(&(0x7f00000005c0)='./file0/file0\x00', 0x10000, 0x20) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000600)={{0x5, r4, r3, r1, r3, 0x58}, 0x0, 0x5, r6, r7, 0x5, 0x3, 0x5, 0x5dc}) shutdown(r10, 0x1) mkdir(&(0x7f0000000680)='./file0/file0\x00', 0x1f9) 20:20:21 executing program 0: syz_emit_ethernet(0x6a, &(0x7f0000000100)) 20:20:21 executing program 1: mknod(&(0x7f0000000340)='./bus\x00', 0x3a4914c44f7b202c, 0x1b00) r0 = open(&(0x7f0000000040)='./bus\x00', 0x3fd, 0x0) write(0xffffffffffffffff, 0x0, 0x0) pwritev(r0, &(0x7f0000000680)=[{&(0x7f0000000080)="2ea15cd87cd8564ce2f7161d263bc11f2c0ec2b47a27b1272199be82e71c5b6c4af8b89116466b", 0x27}], 0x1, 0x0) 20:20:21 executing program 0: chdir(0x0) symlink(&(0x7f0000000140)='..', &(0x7f0000000300)='./file0\x00') open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 20:20:21 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000100)) 20:20:21 executing program 0: 20:20:21 executing program 1: 20:20:21 executing program 0: 20:20:21 executing program 0: 20:20:21 executing program 1: 20:20:21 executing program 0: r0 = socket(0x10, 0x803, 0x0) sendto(r0, &(0x7f0000000000)="120000001a00e5ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) readv(r0, &(0x7f0000000200)=[{&(0x7f0000000240)=""/4096, 0x1000}], 0x1) 20:20:21 executing program 1: chmod(&(0x7f0000000040)='./file0\x00', 0x20) recvmsg(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000800)=[{&(0x7f0000000140)=""/169, 0xa9}, {&(0x7f0000000200)=""/114, 0x72}, {0x0}, {&(0x7f0000000440)=""/237, 0xed}, {&(0x7f0000000540)=""/229, 0xe5}, {&(0x7f0000000640)=""/202, 0xca}, {0x0}, {0x0}, {&(0x7f0000000740)=""/146, 0x92}, {0x0}], 0xa, &(0x7f00000008c0)=""/87, 0x57}, 0x0) mknod(&(0x7f0000000080)='./file0\x00', 0x20, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280), 0x0, 0x0}, 0x3) r0 = open(&(0x7f0000000000)='./file0\x00', 0x400000002, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1, 0x0) 20:20:21 executing program 0: r0 = msgget$private(0x0, 0x108) msgrcv(r0, &(0x7f0000002b80)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f5ffffffffffffff00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000367c5aed98dc24ace8434b6a90493bac574d216309ddccabd688df9ad6a4503055b0b19994bdde2405a48ddf2c40560e12c766b7c27a691f99d96cf3e7e915763e64f3ce73a3b4811686dcaaec74a7f61f629a546658b8b4ebf4bf52a2e6a359e0993227d131b03bec883b12b85247472dee1a1ca4aa33bc852a95fb8d5b7ecc05189c3ba200500b88b90ccc9729fc33f629ce"], 0x1008, 0x3, 0x0) r1 = socket(0x0, 0x8007, 0x74751f74) msgrcv(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="008d3f9bd9698ed58268d80000000000000000000000000000000000000000000000000000000000d803d22ac197086bcf24c56e2e684b6b705686c425787403000000000000000000"], 0x1, 0x2, 0x1005) shmget(0x1, 0x2000, 0x0, &(0x7f0000dfa000/0x2000)=nil) pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r4 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0) r5 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r5, 0x4, 0x80) pwritev(r5, &(0x7f00000003c0), 0x1000000000000297, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x5, 0x10, r4, 0x0, 0x8000000000000000) write(r3, &(0x7f0000000100)="84", 0x1) write(r3, &(0x7f0000000000)="1d", 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x10, r4, 0x0, 0x0) close(r2) lseek(r1, 0x1000000000000, 0x100000) r6 = getuid() r7 = semget(0x2, 0x4, 0x61) semctl$IPC_STAT(r7, 0x0, 0x2, &(0x7f0000000600)=""/187) semget$private(0x0, 0x3, 0x1a) seteuid(r6) getsockopt$sock_linger(r1, 0xffff, 0x80, &(0x7f0000000c80), &(0x7f0000000cc0)=0x8) msgrcv(r0, &(0x7f0000000140)={0x0, ""/190}, 0xc6, 0x3, 0x1000) msgsnd(r0, &(0x7f0000000500)=ANY=[@ANYBLOB="02000000000000004b3dda51bbc5db62b9838964c6fd137a25cb438d7a7e2e7355f11fa87452eee5dabf93bbabeaa30eac91fea5d1eac57b658f4830c1fce8f2d114a2e70520c3ee333886371c0692ebf05a373707a68bd24f84bcde4ca8fa645f6b515c8ece8e1bd79a7c9e8dca66f9b58141fa10d14e40e7141175b330155b5734b0f35626c24a1b3b02a808fb0264f9ceaa4e0bb8503b67484920adfbd29b4b9129b9effe6371319735c04859626f77b0ff8ad65124bd994104e59ea9d5eabbc048b0a9b09ee4974e2e03f0a5b08da2c77bea1195a90ab98a0369b129b79558709c3a737777c58eadc8"], 0x4e, 0x0) dup(r1) msgget$private(0x0, 0x60) mlock(&(0x7f0000000000/0x3000)=nil, 0x3000) openat$zero(0xffffffffffffff9c, &(0x7f0000000440)='/dev/zero\x00', 0x0, 0x0) 20:20:21 executing program 1: r0 = socket(0x11, 0x3, 0x0) connect$unix(r0, &(0x7f0000000040)=@file={0x0, './bus\x00'}, 0x5) getsockname$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000180)=0x8) mknod(&(0x7f0000000100)='./bus\x00', 0x80002007, 0x5dc2) open$dir(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) bind(r0, &(0x7f0000000080)=@in={0x2, 0x2}, 0xc) r1 = kqueue() kevent(r1, &(0x7f0000000100), 0x6, 0x0, 0x9d1, &(0x7f0000000140)={0x3, 0x7fffffff}) truncate(&(0x7f00000001c0)='./bus\x00', 0x40042) 20:20:22 executing program 1: chflags(&(0x7f0000000140)='./control/file0\x00', 0x60001) r0 = shmget(0x3, 0x3000, 0x12, &(0x7f0000ffb000/0x3000)=nil) mkdir(&(0x7f0000000040)='./control\x00', 0x1a) mkdir(&(0x7f0000000000)='./control/file0\x00', 0x0) rmdir(&(0x7f0000000080)='./control\x00') shmctl$SHM_UNLOCK(r0, 0x4) mkdir(&(0x7f0000000100)='./control/file0\x00', 0x1) 20:20:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x40) ioctl$TIOCGETD(r0, 0x4004741a, &(0x7f0000000040)) socketpair(0x11, 0x3, 0x0, 0x0) getpeername(r0, &(0x7f0000000080)=@in6, &(0x7f00000000c0)=0xc) 20:20:22 executing program 0: mknod(&(0x7f0000000000)='./bus\x00', 0x2000, 0x86128) r0 = open(&(0x7f0000000080)='./bus\x00', 0x6, 0x0) open(&(0x7f0000000040)='./bus\x00', 0x6771efb384e9b9c2, 0x8) preadv(r0, &(0x7f0000000a00)=[{&(0x7f0000000640)=""/241, 0xf1}], 0x1, 0x0) 20:20:22 executing program 1: getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) setegid(r0) setgroups(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000340)='./file0\x00', 0x107) mkdir(&(0x7f0000000140)='./file0/file1\x00', 0x0) chmod(&(0x7f0000000080)='./file0/file1\x00', 0x102) rename(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000100)='./file0/file0\x00') setuid(0xee01) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x81) rename(&(0x7f0000000400)='./file0/file1\x00', &(0x7f00000003c0)='./file0/file0\x00') 20:20:22 executing program 0: mknod(&(0x7f00000000c0)='./bus\x00', 0x2000, 0x80004501) open$dir(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) r0 = open(&(0x7f0000000040)='./bus\x00', 0x0, 0x4) ioctl$KDENABIO(r0, 0x20004b3c) 20:20:22 executing program 0: pwritev(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000100)="e0097aaf950d2fedf5c2f581e4e32fcdce7352ead0f2b8a18ee8f6633c4a83b57352d7fe63e15e44b034d7821fed05fd367050f06f9e", 0x36}, {&(0x7f0000000240)="28fc87f43a891138f8e14426a9d89caf8eaec3c29bb62e08de52669f2d139d68ffdafd164b76b0c82b24157c4727c9af06cdcdab8721322adcedcbfb6c79cd4037dd2e27935a88439060979ee6aeb81142d2", 0x52}, {&(0x7f0000000180)="40e824b3852fe60dc3819fa403db452354157dde1c08679e7a22ba5d7fad9b1815869a96fb1a89d5b01dcc0785af0029a86e1b657bf2f1dac5194a67a9e01f64d1e631b308710e61df0d08c6013e2b63b188afcbb4e7a35ba156113e4708e988", 0x60}], 0x3, 0x54) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "000000000000000100002000"}) r0 = socket(0x18, 0x3, 0x0) shutdown(r0, 0x2) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000080)='/dev/null\x00', 0x80, 0x0) connect$unix(r1, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x8) write(r0, &(0x7f0000000000)="3c004d4bc16f435b2b14", 0xa) 20:20:22 executing program 0: setitimer(0x1, &(0x7f0000000180)={{0x7, 0x7}, {0xd4f6}}, &(0x7f0000000080)) setitimer(0x0, &(0x7f0000000040)={{0x0, 0x7}, {0x0, 0xfffd}}, 0x0) r0 = socket(0x1a, 0x8005, 0x80) recvfrom(r0, &(0x7f00000000c0)=""/117, 0x75, 0x41, &(0x7f0000000140)=@un=@file={0x1, './file0\x00'}, 0xa) login: panic: malloc: out of space in kmem_map Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND *426095 43843 0 0x2 0 0K syz-executor.1 db_enter() at db_enter+0x18 panic() at panic+0x174 malloc(200000,2a,9) at malloc+0xad5 kcovioctl(1b1300,80084b01,ffff800020c213b0,3,ffff800020b05520) at kcovioctl+0xe6 VOP_IOCTL(fffffd8062991810,80084b01,ffff800020c213b0,3,fffffd807f7c68a0,ffff800020b05520) at VOP_IOCTL+0x9a vn_ioctl(fffffd806716b1e0,80084b01,ffff800020c213b0,ffff800020b05520) at vn_ioctl+0xc9 sys_ioctl(ffff800020b05520,ffff800020c214f0,ffff800020c214e0) at sys_ioctl+0x651 syscall(ffff800020c21590) at syscall+0x5b8 Xsyscall(6,36,7f7ffffd2418,36,3,7be84e81890) at Xsyscall+0x128 end of kernel end trace frame: 0x7f7ffffd1f30, count: 6 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs. ddb{0}> ddb{0}> set $lines = 0 ddb{0}> set $maxwidth = 0 ddb{0}> show panic malloc: out of space in kmem_map ddb{0}> trace db_enter() at db_enter+0x18 panic() at panic+0x174 malloc(200000,2a,9) at malloc+0xad5 kcovioctl(1b1300,80084b01,ffff800020c213b0,3,ffff800020b05520) at kcovioctl+0xe6 VOP_IOCTL(fffffd8062991810,80084b01,ffff800020c213b0,3,fffffd807f7c68a0,ffff800020b05520) at VOP_IOCTL+0x9a vn_ioctl(fffffd806716b1e0,80084b01,ffff800020c213b0,ffff800020b05520) at vn_ioctl+0xc9 sys_ioctl(ffff800020b05520,ffff800020c214f0,ffff800020c214e0) at sys_ioctl+0x651 syscall(ffff800020c21590) at syscall+0x5b8 Xsyscall(6,36,7f7ffffd2418,36,3,7be84e81890) at Xsyscall+0x128 end of kernel end trace frame: 0x7f7ffffd1f30, count: -9 ddb{0}> show registers rdi 0 rsi 0x1 rbp 0xffff800020c20fe0 rbx 0xffff800020c21090 rdx 0xffffffff81f8be0b cy_pio_rec+0xbc9 rcx 0 rax 0 r8 0xffffffff81cff133 kprintf+0x183 r9 0x1 r10 0x25 r11 0x8799148963e9a815 r12 0x3000000008 r13 0xffff800020c20ff0 r14 0x100 r15 0x1 rip 0xffffffff81896608 db_enter+0x18 cs 0x8 rflags 0x246 rsp 0xffff800020c20fd0 ss 0x10 db_enter+0x18: addq $0x8,%rsp ddb{0}> show proc PROC (syz-executor.1) pid=426095 stat=onproc flags process=2 proc=0 pri=50, usrpri=50, nice=20 forw=0xffffffffffffffff, list=0xffff800020b04260,0xffffffff823613a0 process=0xffff800020b7c9f0 user=0xffff800020c1c000, vmspace=0xfffffd807f00b5a0 estcpu=0, cpticks=2, pctcpu=0.0 user=0, sys=2, intr=0 ddb{0}> ps PID TID PPID UID S FLAGS WAIT COMMAND *43843 426095 30514 0 7 0x2 syz-executor.1 98756 90514 30514 0 3 0x82 piperd syz-executor.0 30514 306025 77797 0 3 0x82 thrsleep syz-fuzzer 30514 73772 77797 0 3 0x4000082 thrsleep syz-fuzzer 30514 366031 77797 0 3 0x4000082 thrsleep syz-fuzzer 30514 41009 77797 0 3 0x4000082 thrsleep syz-fuzzer 30514 405521 77797 0 3 0x4000082 thrsleep syz-fuzzer 30514 60578 77797 0 3 0x4000082 kqread syz-fuzzer 30514 101675 77797 0 3 0x4000082 thrsleep syz-fuzzer 30514 286526 77797 0 3 0x4000082 thrsleep syz-fuzzer 30514 492063 77797 0 3 0x4000082 thrsleep syz-fuzzer 30514 464197 77797 0 3 0x4000082 thrsleep syz-fuzzer 77797 363610 40694 0 3 0x10008a pause ksh 40694 455264 44617 0 3 0x92 select sshd 22735 211010 1 0 3 0x100083 ttyin getty 44617 239772 1 0 3 0x80 select sshd 99589 233236 86950 74 3 0x100092 bpf pflogd 86950 218722 1 0 3 0x80 netio pflogd 17541 279453 77821 73 3 0x100090 kqread syslogd 77821 12465 1 0 3 0x100082 netio syslogd 95003 256595 1 77 3 0x100090 poll dhclient 2137 36431 1 0 3 0x80 poll dhclient 87145 123589 0 0 3 0x14200 pgzero zerothread 38752 182986 0 0 3 0x14200 aiodoned aiodoned 77105 299806 0 0 3 0x14200 syncer update 24526 357332 0 0 3 0x14200 cleaner cleaner 53542 493540 0 0 3 0x14200 reaper reaper 78965 93547 0 0 3 0x14200 pgdaemon pagedaemon 688 238348 0 0 3 0x14200 bored crynlk 95013 34643 0 0 3 0x14200 bored crypto 51136 449694 0 0 3 0x40014200 acpi0 acpi0 62233 362397 0 0 7 0x40014200 idle1 65571 357635 0 0 3 0x14200 bored softnet 94471 149424 0 0 3 0x14200 bored systqmp 56165 368306 0 0 3 0x14200 bored systq 20418 287770 0 0 3 0x40014200 bored softclock 81677 208396 0 0 3 0x40014200 idle0 77811 247268 0 0 3 0x14200 bored smr 1 436645 0 0 3 0x82 wait init 0 0 -1 0 3 0x10200 scheduler swapper ddb{0}> show all locks Process 43843 (syz-executor.1) thread 0xffff800020b05520 (426095) exclusive kernel_lock &kernel_lock r = 0 (0xffffffff82373b28) locked @ /syzkaller/managers/multicore/kernel/sys/sys/syscall_mi.h:90 #0 witness_lock+0x594 #1 syscall+0x48b #2 Xsyscall+0x128 ddb{0}> show malloc Type InUse MemUse HighUse Limit Requests Type Lim Kern Lim devbuf 9464 71927K 71935K 78643K 10565 0 0 pcb 25 9K 10K 78643K 60 0 0 rtable 79 2K 3K 78643K 191 0 0 ifaddr 36 9K 10K 78643K 47 0 0 counters 39 33K 33K 78643K 39 0 0 ioctlops 0 0K 4K 78643K 1469 0 0 iov 0 0K 12K 78643K 3 0 0 mount 1 1K 1K 78643K 1 0 0 vnodes 1199 75K 75K 78643K 1221 0 0 UFS quota 1 32K 32K 78643K 1 0 0 UFS mount 5 36K 36K 78643K 5 0 0 shm 2 1K 1K 78643K 2 0 0 VM map 2 1K 1K 78643K 2 0 0 sem 5 0K 0K 78643K 5 0 0 dirhash 12 2K 2K 78643K 12 0 0 ACPI 1808 196K 290K 78643K 12628 0 0 file desc 4 9K 21K 78643K 42 0 0 proc 52 50K 71K 78643K 319 0 0 subproc 53 55297K 67586K 78643K 89 0 0 NFS srvsock 1 0K 0K 78643K 1 0 0 NFS daemon 1 16K 16K 78643K 1 0 0 in_multi 22 1K 2K 78643K 33 0 0 ether_multi 1 0K 0K 78643K 1 0 0 ISOFS mount 1 32K 32K 78643K 1 0 0 MSDOSFS mount 1 16K 16K 78643K 1 0 0 ttys 18 79K 79K 78643K 18 0 0 exec 0 0K 1K 78643K 190 0 0 pagedep 1 8K 8K 78643K 1 0 0 inodedep 1 32K 32K 78643K 1 0 0 newblk 1 0K 0K 78643K 1 0 0 VM swap 7 26K 26K 78643K 7 0 0 UVM amap 80 12K 21K 78643K 933 0 0 UVM aobj 2 2K 2K 78643K 2 0 0 memdesc 1 4K 4K 78643K 1 0 0 crypto data 1 1K 1K 78643K 1 0 0 NDP 6 0K 0K 78643K 12 0 0 temp 85 2364K 2429K 78643K 3157 0 0 SYN cache 2 16K 16K 78643K 2 0 0 ddb{0}> show all pools Name Size Requests Fail Releases Pgreq Pgrel Npage Hiwat Minpg Maxpg Idle arp 64 4 0 1 1 0 1 1 0 8 0 inpcbpl 280 36 0 29 1 0 1 1 0 8 0 plimitpl 152 16 0 8 1 0 1 1 0 8 0 plcache 128 20 0 0 1 0 1 1 0 8 0 rtentry 112 41 0 10 2 0 2 2 0 8 1 syncache 264 4 0 4 1 1 0 1 0 8 0 tcpqe 32 18 0 18 1 0 1 1 0 8 1 tcpcb 544 10 0 6 1 0 1 1 0 8 0 nd6 48 4 0 2 1 0 1 1 0 8 0 pfosfp 40 846 0 423 5 0 5 5 0 8 0 pfosfpen 112 1428 0 714 21 0 21 21 0 8 0 pfstitem 24 12 0 1 1 0 1 1 0 8 0 pfstkey 112 12 0 1 1 0 1 1 0 8 0 pfstate 328 12 0 1 1 0 1 1 0 8 0 pfrule 1360 21 0 16 2 1 1 2 0 8 0 art_heap8 4096 1 0 0 1 0 1 1 0 8 0 art_heap4 256 185 0 41 12 0 12 12 0 8 3 art_table 32 186 0 41 2 0 2 2 0 8 0 art_node 16 40 0 12 1 0 1 1 0 8 0 semapl 112 3 0 0 1 0 1 1 0 8 0 dirhash 1024 17 0 0 3 0 3 3 0 8 0 dino1pl 128 1471 0 52 46 0 46 46 0 8 0 ffsino 272 1471 0 52 95 0 95 95 0 8 0 nchpl 144 1740 0 111 61 0 61 61 0 8 0 uvmvnodes 72 1526 0 0 28 0 28 28 0 8 0 vnodes 200 1526 0 0 81 0 81 81 0 8 0 namei 1024 4583 0 4583 1 0 1 1 0 8 1 percpumem 16 30 0 0 1 0 1 1 0 8 0 scxspl 192 4258 0 4258 7 1 6 6 0 8 6 sigapl 432 235 0 221 2 0 2 2 0 8 0 futexpl 56 177 0 177 1 0 1 1 0 8 1 knotepl 112 87 0 58 2 0 2 2 0 8 1 kqueuepl 104 4 0 2 1 0 1 1 0 8 0 pipepl 112 154 0 135 2 1 1 1 0 8 0 fdescpl 488 236 0 221 3 0 3 3 0 8 0 filepl 152 1143 0 1050 5 0 5 5 0 8 1 lockfpl 104 10 0 10 2 1 1 1 0 8 1 lockfspl 32 5 0 5 2 1 1 1 0 8 1 sessionpl 112 18 0 8 1 0 1 1 0 8 0 pgrppl 48 18 0 8 1 0 1 1 0 8 0 ucredpl 96 47 0 38 1 0 1 1 0 8 0 zombiepl 144 221 0 221 2 1 1 1 0 8 1 processpl 840 251 0 221 4 0 4 4 0 8 0 procpl 600 292 0 253 4 0 4 4 0 8 1 srpgc 64 6 0 6 1 0 1 1 0 8 1 sockpl 384 82 0 63 3 0 3 3 0 8 1 mcl12k 12288 1 0 0 1 0 1 1 0 8 0 mcl4k 4096 3 0 0 1 0 1 1 0 8 0 mcl2k2 2112 1 0 0 1 0 1 1 0 8 0 mcl2k 2048 133 0 0 16 0 16 16 0 8 0 mtagpl 80 1 0 0 1 0 1 1 0 8 0 mbufpl 256 146 0 0 9 0 9 9 0 8 0 bufpl 256 5465 0 1043 277 0 277 277 0 8 0 anonpl 16 29592 0 22723 36 2 34 34 0 125 0 amapchunkpl 152 818 0 715 6 0 6 6 0 158 0 amappl16 192 583 0 183 21 0 21 21 0 8 0 amappl15 184 21 0 19 1 0 1 1 0 8 0 amappl14 176 29 0 25 1 0 1 1 0 8 0 amappl13 168 25 0 22 1 0 1 1 0 8 0 amappl12 160 15 0 13 1 0 1 1 0 8 0 amappl11 152 220 0 207 1 0 1 1 0 8 0 amappl10 144 64 0 61 1 0 1 1 0 8 0 amappl9 136 377 0 373 1 0 1 1 0 8 0 amappl8 128 137 0 121 1 0 1 1 0 8 0 amappl7 120 29 0 24 1 0 1 1 0 8 0 amappl6 112 60 0 52 1 0 1 1 0 8 0 amappl5 104 121 0 108 1 0 1 1 0 8 0 amappl4 96 313 0 290 2 1 1 2 0 8 0 amappl3 88 125 0 117 1 0 1 1 0 8 0 amappl2 80 861 0 815 2 0 2 2 0 8 0 amappl1 72 14224 0 13801 24 9 15 19 0 8 5 amappl 72 528 0 492 1 0 1 1 0 75 0 dma4096 4096 1 0 1 1 1 0 1 0 8 0 dma256 256 6 0 6 1 1 0 1 0 8 0 dma64 64 259 0 259 1 1 0 1 0 8 0 dma32 32 7 0 7 1 1 0 1 0 8 0 dma16 16 17 0 17 1 1 0 1 0 8 0 aobjpl 64 1 0 0 1 0 1 1 0 8 0 uaddrrnd 24 236 0 221 1 0 1 1 0 8 0 uaddrbest 32 2 0 0 1 0 1 1 0 8 0 uaddr 24 236 0 221 1 0 1 1 0 8 0 vmmpekpl 168 5879 0 5858 2 0 2 2 0 8 0 vmmpepl 168 32408 0 31115 86 9 77 77 0 357 16 vmsppl 360 235 0 221 2 0 2 2 0 8 0 pdppl 4096 480 0 442 6 0 6 6 0 8 0 pvpl 32 116291 0 106372 101 5 96 99 0 265 4 pmappl 224 235 0 221 2 0 2 2 0 8 1 extentpl 40 39 0 25 1 0 1 1 0 8 0 phpool 112 426 0 3 13 0 13 13 0 8 0