kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Feb 20 07:26:59 PST 2020 OpenBSD/amd64 (ci-openbsd-multicore-5.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.18' (ECDSA) to the list of known hosts. 2020/02/20 07:27:09 fuzzer started 2020/02/20 07:27:15 dialing manager at 10.128.15.235:9306 2020/02/20 07:27:15 syscalls: 337 2020/02/20 07:27:15 code coverage: enabled 2020/02/20 07:27:15 comparison tracing: enabled 2020/02/20 07:27:15 extra coverage: support is not implemented in syzkaller 2020/02/20 07:27:15 setuid sandbox: enabled 2020/02/20 07:27:15 namespace sandbox: support is not implemented in syzkaller 2020/02/20 07:27:15 Android sandbox: support is not implemented in syzkaller 2020/02/20 07:27:15 fault injection: support is not implemented in syzkaller 2020/02/20 07:27:15 leak checking: support is not implemented in syzkaller 2020/02/20 07:27:15 net packet injection: enabled 2020/02/20 07:27:15 net device setup: support is not implemented in syzkaller 2020/02/20 07:27:15 concurrency sanitizer: support is not implemented in syzkaller 2020/02/20 07:27:15 devlink PCI setup: support is not implemented in syzkaller 07:27:20 executing program 0: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) ioctl$WSDISPLAYIO_USEFONT(r0, 0x80585750, &(0x7f0000000000)={'./file0\x00', 0x8, 0x81, 0xc3f3, 0x0, 0x1000, 0x3, 0x7, 0x1, 0x0, 0xaaa, 0x40}) socket$inet(0x2, 0x3, 0xff) r1 = kqueue() dup2(r0, r1) r2 = kqueue() r3 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x80, 0x2) ioctl$VMM_IOC_WRITEREGS(r3, 0x82485608, &(0x7f00000000c0)={0x7, 0x8, 0x9, {[0x8, 0x8, 0x3ff, 0x66e, 0x1000000000000, 0x0, 0x1, 0xf39, 0x10000, 0xf735eb, 0x1, 0x0, 0x1, 0x3f, 0x1, 0x6, 0x7, 0xfe1], [0x4, 0x7ff, 0xb8, 0x9d, 0xffffffff, 0x5, 0x3, 0x5, 0xd689, 0x7], [0x6, 0x7fffffff, 0xd0, 0x401, 0x13, 0x7fff, 0xe8f], [0x3ac, 0x40000000, 0x0, 0x6, 0x3ff, 0x5], [{0xf2, 0x3, 0x7c, 0xfffffffffffff001}, {0x3, 0x6, 0x0, 0x1000}, {0x3, 0x0, 0x7f}, {0x100, 0x6, 0x97, 0xaab9}, {0x5, 0x1, 0x5, 0x1}, {0x4, 0x9, 0xdb, 0x1}, {0x1, 0x92a2, 0x1, 0x6b7}, {0x400, 0x200, 0x7fff, 0x36}], {0x8000, 0x6, 0x6, 0x5}, {0xef, 0xffff8001, 0xe44, 0x99}}}) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000340)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x20, 0x0) ioctl$KDSETRAD(r4, 0x20004b43) ioctl$BIOCSETIF(0xffffffffffffff9c, 0x8020426c, &(0x7f00000003c0)={'tap', 0x0}) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000400)='/dev/zero\x00', 0x400, 0x0) ioctl$WSDISPLAYIO_GMODE(r5, 0x4004574b, &(0x7f0000000440)) r6 = dup(0xffffffffffffff9c) ioctl$BIOCSETF(r6, 0x80104267, &(0x7f00000004c0)={0x4, &(0x7f0000000480)=[{0x0, 0x5, 0x4, 0x5}, {0x3fc0, 0x3f, 0x6, 0xfff}, {0x8, 0x3f, 0x2, 0x176a}, {0xff, 0xf8, 0x6, 0x21d7}]}) socket(0x10, 0x3, 0x7) r7 = dup2(0xffffffffffffffff, r2) readlinkat(r7, &(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=""/199, 0xc7) pipe2(&(0x7f0000000640)={0xffffffffffffffff}, 0x4) ioctl$TIOCGETA(r8, 0x402c7413, &(0x7f0000000680)) r9 = openat(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x400, 0x120) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1, 0x12, r9, 0x0, 0x9) pread(r2, &(0x7f0000000700), 0x0, 0x0, 0x9) pledge(&(0x7f0000000740)='*@\x00', &(0x7f0000000780)='.\x00') r10 = dup(r7) getdents(r10, &(0x7f00000007c0)=""/6, 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000800)={0xffffffffffffffff}) recvfrom$unix(r11, &(0x7f0000000840)=""/158, 0x9e, 0x40, &(0x7f0000000900)=@abs={0x1, 0x0, 0x1}, 0x8) r12 = fcntl$dupfd(0xffffffffffffffff, 0x0, r3) pipe2(&(0x7f0000000940)={0xffffffffffffffff}, 0x10000) socketpair(0x18, 0x4, 0x6, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) r15 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000a80)='/dev/bpf\x00', 0x20, 0x0) kevent(r12, &(0x7f00000009c0)=[{{r13}, 0xfffffffffffffffe, 0x39, 0xfffff, 0x6, 0xd7cd}, {{r0}, 0xfffffffffffffff8, 0x90, 0x2, 0x0, 0x6}, {{r14}, 0xffffffffffffffff, 0x28, 0x10, 0x9, 0x200}, {{r10}, 0xfffffffffffffff9, 0x80, 0x2, 0x80000001, 0x10000}, {{r7}, 0xfffffffffffffffa, 0xd9, 0x80, 0xffff, 0x3}], 0x3de, &(0x7f0000000ac0)=[{{r15}, 0xfffffffffffffff8, 0x10, 0x4, 0x1, 0x8}, {{r10}, 0xfffffffffffffffe, 0x1, 0x80000000, 0x3, 0x1}], 0x7fff, &(0x7f0000000b00)={0x8e1, 0xd6}) 07:27:20 executing program 1: r0 = socket$inet6(0x18, 0x4, 0x7) socket$inet6(0x18, 0x2, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x24) ioctl$WSDISPLAYIO_GBURNER(r1, 0x400c5752, &(0x7f0000000040)) mlockall(0x0) recvfrom(r1, &(0x7f0000000080)=""/182, 0xb6, 0x2, &(0x7f0000000140)=@in6={0x18, 0x3, 0x5, 0x9}, 0xc) ioctl$BIOCGETIF(r1, 0x4020426b, &(0x7f0000000180)={""/16, @ifru_dstaddr=@un=@file={0x0, ""/108}}) msgget$private(0x0, 0x40) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) pwritev(r2, &(0x7f0000000540)=[{&(0x7f0000000200)="46dafb4a7a5363e4841ebe458c7962067f92920829b9c7ca890c2854d66f6fbbfd9af71b59e53d1673d454b64a1b0c9a895e3ac0b0837ab26bc951c4b831adbb859439e4bb972376de6203e61b10238373526b5c3f3ee9", 0x57}, {&(0x7f0000000280)="a3e4fe3f80f2e37b5db9663de27fcbc2fd7d503cf49e55c01ca0b331d337f78e0a0e092a5816f020b61363022f1944654de19f7b42ffb8dc464f279bf04335617413ffd2c898f0264ba51d0eef2785c522514e0afe637ca22b803a27220e6d6f0a184354c6bd9354f4a7c278b6cc3614e053ff2a3fb7949d3c15a1403a07c93b32f1133c7665fee5600f80fe34c12b988aa96f34c72dbc628d53be97d9f6", 0x9e}, {&(0x7f0000000340)="fc3b5b289f404e47e64a9359423259b2f8c0510e99e3abf95bd094687f2cda25d9832ffebc3346e1a17752fcdb4578fa92efe8e651df050007ce624e8a545bf3deb8d4e2af52ed17079576df9a98115963eace0ff7180a677baefb9a42950d4a40d33160e865158f0d1190cc7e0ca570ed513b9f726a7d2174c99ce2f3e6689459465f54612507c35a45810224605edc18f133350c51c06e8faacd7b2f0c0ddad394e4b1e800c6806d9a47db32ff9d83a390317ffe843f150f12752a00a87e018712ceaa3f3f5ae10a0ecca179709e4162fb8001d28085bd694f5c34f82b3a515c67b76d0a7aac05b5", 0xe9}, {&(0x7f0000000440)="fe5388522bc2a490d01d39dad3f6137d376ae09693d32f816923a8530a31556b5ab71e10b993ec1e8c3b689492029e28cadb65bf22ae6bf573553c81a22e5bd565ab89314f47ccb15209b1adc03a387adf8fa97cb1fffb80fa550c8099bb2f2d9817f0c485505708d2cbe89fbf1e5e4bb334741ae282b12656d21455e1cf11df1f605452d6b93638df7bf81db9c7d85b568b35f9465dc1f79c0c61997b5a06b256c73b1fdf7553f9debf5fc773ddbf346dedb222954a9fefbaa08ba42927ce435a920ff4f6e4b868253a6c23c0ab8473cbd1a38281e310246279e1f87c4cf5f4f6c2a5fb51c4076dff005bfa943ce204", 0xf0}], 0x4, 0x0, 0x9) r3 = accept$inet(0xffffffffffffffff, &(0x7f0000000580), &(0x7f00000005c0)=0xc) getsockopt$sock_int(r3, 0xffff, 0x8, &(0x7f0000000600), &(0x7f0000000640)=0x4) r4 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000680)='/dev/wskbd0\x00', 0x2, 0x0) fsync(r4) fchmod(r0, 0x4) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000006c0)='/dev/null\x00', 0x8000, 0x0) ioctl$WSDISPLAYIO_SBURNER(r5, 0x800c5751, &(0x7f0000000700)={0x4, 0x400000, 0x8}) r6 = dup(0xffffffffffffffff) getsockname$inet6(r6, &(0x7f0000000740), &(0x7f0000000780)=0xc) r7 = open(&(0x7f00000007c0)='./file0\x00', 0x800, 0x20) ioctl$KDENABIO(r7, 0x20004b3c) ioctl$WSDISPLAYIO_GETEMULTYPE(r5, 0xc014575e, &(0x7f0000000800)={0x59, './file0\x00'}) r8 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000840)='/dev/ttyCcfg\x00', 0x1080, 0x0) ioctl$KDMKTONE(r8, 0x20004b08, &(0x7f0000000880)=0xfffffffd) pipe2(&(0x7f00000008c0)={0xffffffffffffffff}, 0x30004) ioctl$TIOCDRAIN(r9, 0x2000745e) ioctl$WSDISPLAYIO_GETEMULTYPE(r2, 0xc014575e, &(0x7f0000000900)={0x9, './file0\x00'}) r10 = syz_open_pts() preadv(r10, &(0x7f0000000c00)=[{&(0x7f0000000940)=""/204, 0xcc}, {&(0x7f0000000a40)=""/22, 0x16}, {&(0x7f0000000a80)=""/89, 0x59}, {&(0x7f0000000b00)=""/197, 0xc5}], 0x4, 0x0, 0x9) r11 = openat$zero(0xffffffffffffff9c, &(0x7f0000000c40)='/dev/zero\x00', 0x80, 0x0) utimensat(r11, &(0x7f0000000c80)='./file1\x00', &(0x7f0000000cc0)={{0x7, 0x80000001}, {0xffffffffffffffff, 0x9}}, 0x0) 07:27:21 executing program 0: ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) r0 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r0, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f0000000000)={{0x18, 0x2}, {0x18, 0x0}}, 0x552) r1 = socket(0x18, 0x3, 0x0) connect$unix(r1, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) r3 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000080)='/dev/speaker\x00', 0x42, 0x0) openat$speaker(0xffffffffffffff9c, &(0x7f0000000080)='/dev/speaker\x00', 0x42, 0x0) open(&(0x7f0000000340)='./file0\x00', 0x80, 0x1bd) pwrite(0xffffffffffffffff, &(0x7f00000000c0)='N', 0x1, 0x0, 0x0) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000140)=""/104, 0x68, 0x40, &(0x7f0000000240)=@abs={0x0, 0x0, 0x3}, 0x8) r4 = dup(r3) pwrite(r4, &(0x7f00000001c0)='T5', 0x2, 0x0, 0x0) ioctl$BIOCGETIF(r4, 0x4020426b, &(0x7f0000000100)={""/16, @ifru_metric}) ioctl$BIOCSETF(r2, 0x80104267, &(0x7f00000000c0)={0x20000000000000bf, &(0x7f0000000000)=[{0x44, 0x0, 0xfd}, {0x2d}, {0x6}]}) getsockname(r3, &(0x7f0000000280)=ANY=[@ANYBLOB='\x00'/110], &(0x7f0000000300)=0x6e) login: pckbd_enable: command error 07:27:22 executing program 1: setrlimit(0x8, &(0x7f0000000000)={0x9, 0x93}) utimensat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={{0xffffffff, 0x1}, {0x20, 0x800}}, 0x2) r0 = syz_open_pts() r1 = socket(0x18, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r2, 0x8080691a, &(0x7f0000000300)) r3 = socket(0x18, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$TIOCFLUSH(r4, 0x8080691a, &(0x7f0000000300)) ioctl$TIOCGFLAGS(r4, 0x4004745d, &(0x7f0000000100)) r5 = accept$inet6(r2, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$sock_timeval(r5, 0xffff, 0x1006, &(0x7f00000000c0)={0x0, 0xec88}, 0x10) syz_open_pts() ioctl$TIOCSETAW(r0, 0x80047469, &(0x7f0000001780)={0x34, 0x0, 0x0, 0x0, "1ffbffa6163cb90277925f1be62c36ae61dba648"}) writev(r0, &(0x7f0000000640)=[{0x0, 0xfffffda8}], 0x1) 07:27:22 executing program 0: fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x4, 0x0, 0xffffffffffffffff}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) socket(0x18, 0x2, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x8, 0x0) r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000240)={0x3, &(0x7f00000000c0)=[{0x80}, {0x54}, {0x6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETF(r1, 0x80104267, &(0x7f0000000240)={0x3, &(0x7f00000000c0)=[{0x80}, {0x54}, {0x6}]}) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) r2 = fcntl$dupfd(r1, 0xa, r0) ioctl$TIOCFLUSH(r2, 0x8080691a, &(0x7f0000000300)) 07:27:22 executing program 0: syz_emit_ethernet(0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffe5ffffaaaaaaaaaa0086dd60a4f00800f83a00fe8000000000000000000000000000aaff02"]) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000b, &(0x7f0000000680)='\x00', 0x1) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, 0x0, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0xc) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r2, 0x0, 0x200000000000b, &(0x7f0000000680)='\x00', 0x1) setsockopt$inet_opts(r2, 0x0, 0x200000000000c, 0x0, 0x0) setsockopt$inet_opts(r2, 0x0, 0x0, &(0x7f0000000080)="bd4764be8befa4c75e82025a57de3f6d2608f069b96683fb09d3c25b06fe0982178b7678feadf71935623bf628f5478e47543646da9c3ef2bccbfad7218f4570975c857e4dffdabea19f08843054dea96f519ef98f3929", 0x57) setgid(r1) syz_emit_ethernet(0x400e, &(0x7f0000000000)="c7a895006f53dd000005ffff86dd") 07:27:22 executing program 1: openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x10281, 0x0) r0 = socket(0x18, 0x2, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x10000, 0x80) r2 = geteuid() setreuid(r2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4) setsockopt$inet_opts(r3, 0x0, 0x1, &(0x7f0000000100)="e7a9b662c47cde256243ba63d1f6715385ee0ecefd116ee6cf24ccbd2436545b86ae5834e227f71816bc300500ed788d8d939be65c2917b3bfa5585817431b0a565d75bacfc0636378a85ab24bdef7ec13d2741d6bf1c8f195facbd165ae2556499acea450d673071636e3241a91e6fb2021b5ac15fa8e60a57b0994f35d5c5b37521e857bf7b2c10854c3d8ba3f14e7e439d5f6dcd4cbc36ae4cc0fb1a1afc816ebb9d565712e6544ed32623d83aa7e01b9e123ce9ca7e982", 0xb9) r4 = semget$private(0x0, 0x5, 0x624) semop(r4, &(0x7f0000001640)=[{0x0, 0x5022, 0x1000}, {0x1, 0x10001, 0x7351d18524d2e3a2}], 0x2) semctl$SETVAL(r4, 0x3, 0x8, &(0x7f0000000480)=0x7) semop(r4, &(0x7f0000000140)=[{0x1, 0x7fffffff, 0x1000}, {0x0, 0x800, 0x1000}, {0x0, 0xd78d, 0x3400}, {0x4, 0x401, 0x800}, {0x3}, {0x6, 0x7f, 0x1c00}, {0x2, 0x42c, 0x1800}, {0x3, 0x5}, {0xb06d969951e2aad8, 0xffffffffffffff80, 0x1400}], 0x9) semctl$SETALL(r4, 0x0, 0x9, &(0x7f0000000480)=[0x1]) getgroups(0x3ffffffffffffec1, &(0x7f0000000100)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r7, 0x4, 0xcc) r8 = getpid() fcntl$setown(r7, 0x6, r8) r9 = socket(0x2, 0xc003, 0x6) connect$unix(r9, &(0x7f00000001c0)=ANY=[@ANYBLOB="8202adfdffffffffffffff653000463f7b238bf46854d78a2a197a386207000000008295955984c87910bf453f60c11700287ead4bcb777fa69dfceac2a84e6abc749d1daa45af61eb30b5d8ea0a8df1a64896bc5e57c6388bbd2ad88b2951b15801360bc94c0a162b58fd4237b8fa4d012ae447473c238495aaee48c02f6ac41e6bf3bf554799b9b813ad30505e8f5300a49fef9d612f871f4385f04157795ea4a5c5fe659fa202361cd8cac7dbbc5b65c6593d2870b4122cd2350000"], 0x10) write(r9, &(0x7f00000009c0)="9ed5e8950000000000c7c19aab4230e843fcd58ff2d26500b9a46ac13fe38562d0d6cabd6ce69646", 0x28) sendto(r9, &(0x7f0000000180)="6861fe261e6f64378b5e05cdf304b826010000000000000000000000e2597291bd508928c1fcdf82fa627475b78f00"/60, 0x3c, 0x0, 0x0, 0x0) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000440)=0xc) setsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f00000004c0)={r8, r10, r5}, 0xc) r11 = getgid() getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000280)={{0xfffffff9, r10, r11, 0x0, r12, 0x1, 0x401}, 0x5, 0x9, 0x4}) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0xc) chown(&(0x7f0000000500)='./file0\x00', r10, r13) fchownat(r1, &(0x7f0000000080)='./file0\x00', r2, r13, 0x4) r14 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r14, 0x8080691a, &(0x7f0000000300)) r15 = socket(0x2, 0x2, 0x0) r16 = fcntl$dupfd(r15, 0x0, r15) ioctl$TIOCFLUSH(r16, 0x8080691a, &(0x7f0000000300)) ioctl$WSMOUSEIO_SETPARAMS(r16, 0x80105727, &(0x7f00000001c0)={&(0x7f0000000040)}) 07:27:22 executing program 0: r0 = accept$inet6(0xffffffffffffffff, 0x0, &(0x7f0000000200)) getsockopt$sock_int(r0, 0xffff, 0x1, &(0x7f0000000240), &(0x7f0000000280)=0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="2000000000ebfffffeff0000000000000000005b9d071b542a538706000000b8180000002900000031000000000000020000007638b47503de5be58db03a4b939ac3f96c8d8fca29cab9cfcca3efa07cdd2d8d02664b71007a31c501ccb6165a81f5b07e9a471045c16a313011a497ddd8df57401277294da6f0ea1589700b1b6426838b56b1b1"], 0x38}, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff}, 0x4) ioctl$WSDISPLAYIO_USEFONT(r1, 0x80585750, &(0x7f0000000180)={'./file0\x00', 0x80000000, 0x4, 0x1d7fa2ef, 0x1, 0x1, 0x40, 0x0, 0x2, 0x2, 0x1, 0x7}) r2 = socket(0x18, 0x4003, 0x0) connect$unix(r2, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 07:27:22 executing program 0: preadv(0xffffffffffffffff, &(0x7f00000005c0)=[{&(0x7f0000001640)=""/247, 0xf7}], 0x1, 0x0, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x611, 0x0) pwritev(r0, &(0x7f00000003c0), 0x273, 0x0, 0x0) mmap(&(0x7f0000000000/0x10000)=nil, 0x10000, 0x2, 0x10, r0, 0x0, 0x0) msgget$private(0x0, 0x44) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) pread(r1, &(0x7f00000000c0)="a60e9be3716b5826c0d31b5da18f2fd9e2b778c6f85877b93f09000000ce644f6a097c0a638eee579b6d7510cc87f6a7693520cd0e33fdb01a873a3cbca5ab9253927bc34e195237c6a53aa40cd440fa88dbf73b34dab7205dbf0c9f9cfcfd38b444514557", 0xff56, 0x0, 0xfffffff7fffffffc) 07:27:22 executing program 0: ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fe], [0x0, 0x0, 0x0, 0x9, 0x80], [0x0, 0x0, 0x401]}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8080691a, &(0x7f0000000300)) 07:27:23 executing program 1: r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/wsmouse0\x00', 0x10, 0x0) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bpf\x00', 0x0, 0x0) openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse\x00', 0x80, 0x0) getgroups(0x1, &(0x7f0000000140)=[0x0]) ioctl$BIOCSETF(r1, 0x80104267, &(0x7f0000000240)={0x3, &(0x7f00000000c0)=[{0x80}, {0x54}, {0x6}]}) r2 = getegid() getegid() setegid(r2) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) lseek(r1, 0x0, 0x101, 0x2) ioctl$WSMOUSEIO_SETPARAMS(r0, 0x80105728, &(0x7f0000000280)={&(0x7f0000000080)=[{0x40}, {0x101}], 0x2}) 07:27:23 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20, 0x0) ioctl$WSDISPLAYIO_GETSCREEN(r0, 0xc0245755, &(0x7f0000000040)={0x3, './file0\x00', './file0\x00'}) ioctl$WSDISPLAYIO_DELSCREEN(0xffffffffffffff9c, 0x80085754, &(0x7f0000000080)={0x5, 0x6}) msgget(0x0, 0xc2) 07:27:23 executing program 1: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = socket(0x2, 0x1, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r1, 0x0, 0x200000000000b, &(0x7f0000000680)='\x00', 0x1) setsockopt$inet_opts(r1, 0x0, 0x200000000000c, 0x0, 0x0) shutdown(r1, 0x0) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB=']\x00\x00\x00\x00\x00\x00\x000\x00'], 0xa) 07:27:23 executing program 1: ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "0000ffff0002005617ed0e177a897900", 0x20000000, 0x8004}) r0 = socket(0x800000018, 0x4000, 0x102) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 07:27:23 executing program 0: setsockopt(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000200)="01003f8a3f84249a25b6551a3741af0135014e1a6f244d510384758f0e1032c8655166cc2ddb409052b4347d4542467a6a87c1f71c3ff0f6e1aeedc9998c5171b75ecc06d4eb72112d8314c9a7db69103dabd6a236d779705ae079a4ce28b0bdff4fbc1cf464d9c938a34951717ea6f5ce9a5672830c0d9f4e08bcb94ab64f99e92c089a4b83ffd5fe5a4cad0ba358d3fc40372c4cc200"/161, 0xfed0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket(0x2, 0xc003, 0x0) connect$unix(r1, &(0x7f0000000540)=ANY=[@ANYRESOCT], 0x1) dup2(r1, r0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000)=0x43cbc, 0x4) r2 = dup(r0) r3 = shmget(0x3, 0x4000, 0x8, &(0x7f0000ffa000/0x4000)=nil) r4 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r4, 0x0, 0x200000000000b, &(0x7f0000000680)='\x00', 0x1) setsockopt$inet_opts(r4, 0x0, 0x200000000000c, 0x0, 0x0) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000000100)={0x0, 0x0}, 0xc) r6 = getgid() r7 = geteuid() setreuid(r7, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vmm\x00', 0x1, 0x0) r8 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x9f58ef96a6119bce, r8) r9 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x9f58ef96a6119bce, r9) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x4) setsockopt$inet_opts(r10, 0x0, 0x1, &(0x7f0000000100)="e7a9b662c47cde256243ba63d1f6715385ee0ecefd116ee6cf24ccbd2436545b86ae5834e227f71816bc300500ed788d8d939be65c2917b3bfa5585817431b0a565d75bacfc0636378a85ab24bdef7ec13d2741d6bf1c8f195facbd165ae2556499acea450d673071636e3241a91e6fb2021b5ac15fa8e60a57b0994f35d5c5b37521e857bf7b2c10854c3d8ba3f14e7e439d5f6dcd4cbc36ae4cc0fb1a1afc816ebb9d565712e6544ed32623d83aa7e01b9e123ce9ca7e982", 0xb9) r11 = semget$private(0x0, 0x5, 0x624) semop(r11, &(0x7f0000001640)=[{0x0, 0x5022, 0x1000}, {0x4, 0x10001, 0x7351d18524d2e3a2}], 0x2) semctl$SETVAL(r11, 0x3, 0x8, &(0x7f0000000480)=0x7) semop(r11, &(0x7f0000000140)=[{0x1, 0x7fffffff, 0x1000}, {0x0, 0x800, 0x1000}, {0x0, 0xd78d, 0x3400}, {0x4, 0x401, 0x800}, {0x3}, {0x6, 0x7f, 0x1c00}, {0x2, 0x42c, 0x1800}, {0x3, 0x5}, {0xb06d969951e2aad8, 0xffffffffffffff80, 0x1400}], 0x9) semctl$SETALL(r11, 0x0, 0x9, &(0x7f0000000480)=[0x1]) getgroups(0x3ffffffffffffec1, &(0x7f0000000100)=[0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r14, 0x4, 0xcc) r15 = getpid() fcntl$setown(r14, 0x6, r15) r16 = socket(0x2, 0xc003, 0x6) connect$unix(r16, &(0x7f00000001c0)=ANY=[@ANYBLOB="8202adfdffffffffffffff653000463f7b238bf46854d78a2a197a386207000000008295955984c87910bf453f60c11700287ead4bcb777fa69dfceac2a84e6abc749d1daa45af61eb30b5d8ea0a8df1a64896bc5e57c6388bbd2ad88b2951b15801360bc94c0a162b58fd4237b8fa4d012ae447473c238495aaee48c02f6ac41e6bf3bf554799b9b813ad30505e8f5300a49fef9d612f871f4385f04157795ea4a5c5fe659fa202361cd8cac7dbbc5b65c6593d2870b4122cd2350000"], 0x10) write(r16, &(0x7f00000009c0)="9ed5e8950000000000c7c19aab4230e843fcd58ff2d26500b9a46ac13fe38562d0d6cabd6ce69646", 0x28) sendto(r16, &(0x7f0000000180)="6861fe261e6f64378b5e05cdf304b826010000000000000000000000e2597291bd508928c1fcdf82fa627475b78f00"/60, 0x3c, 0x0, 0x0, 0x0) getsockopt$sock_cred(r16, 0xffff, 0x1022, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000440)=0xc) setsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f00000004c0)={r15, r17, r12}, 0xc) r18 = getgid() getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000200)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) semctl$IPC_SET(r11, 0x0, 0x1, &(0x7f0000000280)={{0xfffffff9, r17, r18, 0x0, r19, 0x1, 0x401}, 0x5, 0x9, 0x4}) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000180)={{0x4, r5, r6, r7, r18, 0xf0, 0x8}, 0x101, 0x4, r8, r9, 0x9, 0x5, 0x1}) socket(0x2, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000040), 0xfcec, 0x0, 0x0, 0x0) getsockname(r4, &(0x7f0000000040)=@un=@abs, &(0x7f00000002c0)=0x8) 07:27:23 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bpf\x00', 0x80, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/bpf\x00', 0x248, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x3f, 0x0, 0x0, 0x5d4}, {0xa8}, {0xe5b6, 0xba}]}) 07:27:23 executing program 1: r0 = socket(0x2, 0xc003, 0x6) connect$unix(r0, &(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYPTR=&(0x7f00000006c0)=ANY=[@ANYRESHEX=0x0, @ANYPTR64, @ANYRESDEC, @ANYBLOB="e75b923bd7ec3b479495863940b6d8effbe133b20d2cd218a794527023ecf07a1d3563bce96ee09756448abfd54c464c698566bad995d96872d6f2432685b04ee0dd59dd73d37832c1ead2f1283b8a672890dd2f59bc212c06479d2c9944efa084db6ea6304ebd0f1cf339b80bf0f7de51c0f47f6c356d119646abb9566c13", @ANYRES16=r0, @ANYBLOB="2fbdf94d07e63d96f828e61a092e9d", @ANYRESDEC=r0, @ANYRESDEC=0x0, @ANYRES64, @ANYRES16=r0], @ANYBLOB="1da60307d51e841bd62ad2842225ef36a5a187621c4349e5fd0f688620969085858fce094a69094e72ae7a0dd0987476d14a08dee2c9"], 0x3) write(r0, &(0x7f0000000000)="9e3ea2560000000004f9fb777d020becff00ab3a00000000000000e67c19665fc116195da39c959745a78ec3009bf8d4424895c852f4", 0x14f) 07:27:23 executing program 1: unveil(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='x\x00') socket$inet6(0x18, 0x1, 0xf8) unveil(&(0x7f0000000080)='./bus\x00', &(0x7f00000000c0)='c\x00') 07:27:24 executing program 0: mknod(&(0x7f0000000000)='./bus\x00', 0x2001, 0x4086334) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0) mlockall(0x1) ioctl$FIONBIO(r0, 0x8004667e, &(0x7f0000000100)) readlink(&(0x7f0000000040)='./bus\x00', &(0x7f0000000140)=""/255, 0xff) r1 = socket(0x18, 0x2, 0x0) fcntl$dupfd(r1, 0x0, r1) connect$unix(r1, &(0x7f0000000240)=@abs={0x1, 0x0, 0x3}, 0xfffffffffffffdd4) 07:27:24 executing program 1: r0 = socket(0x18, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8080691a, &(0x7f0000000300)) ioctl$TIOCGTSTAMP(r1, 0x4010745b, &(0x7f0000000000)) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x3, &(0x7f0000000300)=[{}, {}, {0x40}]}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket$unix(0x1, 0x5, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = kqueue() dup(r4) ioctl$TIOCFLUSH(r3, 0x8020699f, &(0x7f0000000300)) panic: receive 3: so 0xfffffd806f6f2190, so_type 3, m 0xfffffd807a23ab00, m_type 0 Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND 299804 66656 0 0 0 0 syz-executor.1 *415734 82104 0 0 0 1K dhclient db_enter() at db_enter+0x18 panic(ffffffff821ce05d) at panic+0x15c soreceive(fffffd806f6f2190,0,ffff800020abd9f8,0,0,ffff800020abd904) at soreceive+0x1727 soo_read(fffffd80723f2390,ffff800020abd9f8,0) at soo_read+0x53 dofilereadv(ffff800020a7c4e8,6,ffff800020abd9f8,0,ffff800020abdae0) at dofilereadv+0x1a1 sys_read(ffff800020a7c4e8,ffff800020abda90,ffff800020abdae0) at sys_read+0x83 syscall(ffff800020abdb60) at syscall+0x4a4 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x7f7ffffc19a0, count: 7 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs. ddb{1}> ddb{1}> set $lines = 0 ddb{1}> set $maxwidth = 0 ddb{1}> show panic receive 3: so 0xfffffd806f6f2190, so_type 3, m 0xfffffd807a23ab00, m_type 0 ddb{1}> trace db_enter() at db_enter+0x18 panic(ffffffff821ce05d) at panic+0x15c soreceive(fffffd806f6f2190,0,ffff800020abd9f8,0,0,ffff800020abd904) at soreceive+0x1727 soo_read(fffffd80723f2390,ffff800020abd9f8,0) at soo_read+0x53 dofilereadv(ffff800020a7c4e8,6,ffff800020abd9f8,0,ffff800020abdae0) at dofilereadv+0x1a1 sys_read(ffff800020a7c4e8,ffff800020abda90,ffff800020abdae0) at sys_read+0x83 syscall(ffff800020abdb60) at syscall+0x4a4 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x7f7ffffc19a0, count: -8 ddb{1}> show registers rdi 0 rsi 0x1 rbp 0xffff800020abd740 rbx 0xffff800020abd7f0 rdx 0xffff800020a7c4e8 rcx 0 rax 0 r8 0xffffffff821a0dcf kprintf+0x16f r9 0x1 r10 0x25 r11 0xfd6e7a0289c5af41 r12 0x3000000008 r13 0xffff800020abd750 r14 0x100 r15 0x1 rip 0xffffffff819c9588 db_enter+0x18 cs 0x8 rflags 0x246 rsp 0xffff800020abd730 ss 0x10 db_enter+0x18: addq $0x8,%rsp ddb{1}> show proc PROC (dhclient) pid=415734 stat=onproc flags process=0 proc=0 pri=24, usrpri=50, nice=20 forw=0xffffffffffffffff, list=0xffff800020a7cea8,0xffff800020a7c9d8 process=0xffff800020a903d0 user=0xffff800020ab8000, vmspace=0xfffffd807efff730 estcpu=0, cpticks=1, pctcpu=0.0 user=0, sys=1, intr=0 ddb{1}> ps PID TID PPID UID S FLAGS WAIT COMMAND 39518 402679 34493 0 2 0 syz-executor.0 66656 299804 22197 0 7 0 syz-executor.1 66656 144898 22197 0 3 0x4000080 fsleep syz-executor.1 22197 22662 74409 0 3 0x82 nanosleep syz-executor.1 34493 80523 74409 0 3 0x82 nanosleep syz-executor.0 74409 223683 93454 0 3 0x82 kqread syz-fuzzer 74409 401773 93454 0 3 0x4000082 nanosleep syz-fuzzer 74409 308375 93454 0 3 0x4000082 thrsleep syz-fuzzer 74409 320931 93454 0 3 0x4000082 thrsleep syz-fuzzer 74409 292629 93454 0 3 0x4000082 thrsleep syz-fuzzer 74409 10274 93454 0 3 0x4000082 thrsleep syz-fuzzer 74409 163741 93454 0 3 0x4000082 thrsleep syz-fuzzer 74409 355259 93454 0 3 0x4000082 nanosleep syz-fuzzer 74409 116641 93454 0 3 0x4000082 thrsleep syz-fuzzer 74409 62751 93454 0 3 0x4000082 thrsleep syz-fuzzer 93454 254039 29321 0 3 0x10008a pause ksh 29321 261962 12089 0 3 0x92 select sshd 77089 281012 1 0 3 0x100083 ttyin getty 12089 167290 1 0 3 0x80 select sshd 47489 487889 99105 74 3 0x100092 bpf pflogd 99105 268591 1 0 3 0x80 netio pflogd 19317 141181 5280 73 3 0x100090 kqread syslogd 5280 378794 1 0 3 0x100082 netio syslogd 70876 104729 1 77 3 0x100090 poll dhclient *82104 415734 1 0 7 0 dhclient 81322 280479 0 0 3 0x14200 pgzero zerothread 86974 319435 0 0 3 0x14200 aiodoned aiodoned 16553 407364 0 0 3 0x14200 syncer update 4079 109710 0 0 3 0x14200 cleaner cleaner 34684 446629 0 0 3 0x14200 reaper reaper 84691 311482 0 0 3 0x14200 pgdaemon pagedaemon 68888 399287 0 0 3 0x14200 bored crynlk 57931 393537 0 0 3 0x14200 bored crypto 63169 273423 0 0 3 0x40014200 acpi0 acpi0 81319 366641 0 0 3 0x40014200 idle1 68320 486712 0 0 3 0x14200 bored softnet 59699 234309 0 0 3 0x14200 bored systqmp 94499 393633 0 0 3 0x14200 bored systq 5195 410147 0 0 3 0x40014200 bored softclock 5040 219390 0 0 3 0x40014200 idle0 23448 164560 0 0 3 0x14200 bored smr 1 401526 0 0 3 0x82 wait init 0 0 -1 0 3 0x10200 scheduler swapper ddb{1}> show all locks Process 82104 (dhclient) thread 0xffff800020a7c4e8 (415734) exclusive kernel_lock &kernel_lock r = 0 (0xffffffff826463f0) #0 witness_lock+0x52e #1 solock+0x66 #2 soreceive+0x114 #3 soo_read+0x53 #4 dofilereadv+0x1a1 #5 sys_read+0x83 #6 syscall+0x4a4 #7 Xsyscall+0x128 ddb{1}> show malloc Type InUse MemUse HighUse Limit Requests Type Lim devbuf 9476 6400K 6543K 78643K 10600 0 pcb 13 8K 8K 78643K 29 0 rtable 86 7K 7K 78643K 215 0 ifaddr 45 10K 11K 78643K 50 0 counters 43 33K 33K 78643K 43 0 ioctlops 0 0K 4K 78643K 1469 0 iov 0 0K 12K 78643K 2 0 mount 1 1K 1K 78643K 1 0 vnodes 1221 77K 77K 78643K 1232 0 UFS quota 1 32K 32K 78643K 1 0 UFS mount 5 36K 36K 78643K 5 0 shm 2 1K 1K 78643K 2 0 VM map 2 1K 1K 78643K 2 0 sem 6 0K 0K 78643K 10 0 dirhash 12 2K 2K 78643K 12 0 ACPI 1809 196K 290K 78643K 12766 0 file desc 6 17K 25K 78643K 54 0 sigio 0 0K 0K 78643K 4 0 proc 59 63K 83K 78643K 445 0 subproc 32 2K 2K 78643K 34 0 NFS srvsock 1 0K 0K 78643K 1 0 NFS daemon 1 16K 16K 78643K 1 0 ip_moptions 0 0K 0K 78643K 18 0 in_multi 22 1K 2K 78643K 33 0 ether_multi 1 0K 0K 78643K 1 0 mrt 0 0K 0K 78643K 2 0 ISOFS mount 1 32K 32K 78643K 1 0 MSDOSFS mount 1 16K 16K 78643K 1 0 ttys 31 148K 148K 78643K 31 0 exec 0 0K 1K 78643K 207 0 pagedep 1 8K 8K 78643K 1 0 inodedep 1 32K 32K 78643K 1 0 newblk 1 0K 0K 78643K 1 0 VM swap 7 26K 26K 78643K 7 0 UVM amap 103 21K 22K 78643K 1081 0 UVM aobj 2 2K 2K 78643K 2 0 memdesc 1 4K 4K 78643K 1 0 crypto data 1 1K 1K 78643K 1 0 ip6_options 0 0K 0K 78643K 2 0 NDP 7 0K 0K 78643K 11 0 temp 76 3016K 3080K 78643K 2119 0 kqueue 3 4K 4K 78643K 3 0 SYN cache 2 16K 16K 78643K 2 0 ddb{1}> show all pools Name Size Requests Fail Releases Pgreq Pgrel Npage Hiwat Minpg Maxpg Idle arp 64 6 0 2 1 0 1 1 0 8 0 plcache 128 20 0 0 1 0 1 1 0 8 0 rtpcb 80 19 0 17 1 0 1 1 0 8 0 rtentry 112 46 0 13 2 0 2 2 0 8 0 unpcb 120 42 0 31 1 0 1 1 0 8 0 syncache 264 4 0 4 1 1 0 1 0 8 0 tcpcb 544 12 0 8 1 0 1 1 0 8 0 inpcb 280 81 0 73 2 0 2 2 0 8 0 rttmr 72 1 0 1 1 0 1 1 0 8 1 nd6 48 6 0 3 1 0 1 1 0 8 0 pfosfp 40 846 0 423 5 0 5 5 0 8 0 pfosfpen 112 1428 0 714 21 0 21 21 0 8 0 pfstitem 24 15 0 1 1 0 1 1 0 8 0 pfstkey 112 15 0 1 1 0 1 1 0 8 0 pfstate 328 15 0 0 2 0 2 2 0 8 0 pfrule 1360 21 0 16 2 1 1 2 0 8 0 art_heap8 4096 1 0 0 1 0 1 1 0 8 0 art_heap4 256 189 0 44 12 0 12 12 0 8 2 art_table 32 190 0 44 2 0 2 2 0 8 0 art_node 16 45 0 15 1 0 1 1 0 8 0 semupl 112 2 0 2 1 0 1 1 0 8 1 semapl 112 4 0 0 1 0 1 1 0 8 0 dirhash 1024 17 0 0 3 0 3 3 0 8 0 dino1pl 128 1448 0 41 46 0 46 46 0 8 0 ffsino 272 1448 0 41 94 0 94 94 0 8 0 nchpl 144 1705 0 90 61 0 61 61 0 8 1 uvmvnodes 72 1502 0 0 28 0 28 28 0 8 0 vnodes 208 1502 0 0 80 0 80 80 0 8 0 namei 1024 4366 0 4366 1 0 1 1 0 8 1 percpumem 16 32 0 0 1 0 1 1 0 8 0 scxspl 192 4944 0 4944 2 1 1 2 0 8 1 plimitpl 152 17 0 9 1 0 1 1 0 8 0 sigapl 432 253 0 237 3 0 3 3 0 8 1 futexpl 56 400 0 399 1 0 1 1 0 8 0 knotepl 112 53 0 34 1 0 1 1 0 8 0 kqueuepl 144 7 0 4 1 0 1 1 0 8 0 pipelkpl 48 86 0 76 1 0 1 1 0 8 0 pipepl 120 172 0 153 1 0 1 1 0 8 0 fdescpl 496 254 0 237 3 0 3 3 0 8 0 filepl 152 1301 0 1198 5 0 5 5 0 8 1 lockfpl 104 21 0 20 1 0 1 1 0 8 0 lockfspl 48 9 0 8 1 0 1 1 0 8 0 sessionpl 112 18 0 7 1 0 1 1 0 8 0 pgrppl 48 18 0 7 1 0 1 1 0 8 0 ucredpl 96 57 0 48 1 0 1 1 0 8 0 zombiepl 144 237 0 237 1 0 1 1 0 8 1 processpl 960 269 0 237 5 0 5 5 0 8 1 procpl 624 330 0 288 4 0 4 4 0 8 0 srpgc 64 2 0 2 1 0 1 1 0 8 1 sockpl 400 142 0 121 4 0 4 4 0 8 1 mcl64k 65536 2 0 0 1 0 1 1 0 8 0 mcl4k 4096 6 0 0 1 0 1 1 0 8 0 mcl2k 2048 153 0 0 19 0 19 19 0 8 0 mtagpl 80 1 0 0 1 0 1 1 0 8 0 mbufpl 256 182 0 0 11 0 11 11 0 8 0 bufpl 280 4079 0 174 279 0 279 279 0 8 0 anonpl 16 38920 0 23522 64 1 63 63 0 124 1 amapchunkpl 152 1262 0 1124 8 0 8 8 0 158 1 amappl16 192 1033 0 195 43 0 43 43 0 8 0 amappl15 184 1 0 0 1 0 1 1 0 8 0 amappl14 176 15 0 12 2 1 1 1 0 8 0 amappl13 168 26 0 24 1 0 1 1 0 8 0 amappl12 160 8 0 7 1 0 1 1 0 8 0 amappl11 152 85 0 65 1 0 1 1 0 8 0 amappl10 144 17 0 12 1 0 1 1 0 8 0 amappl9 136 400 0 396 1 0 1 1 0 8 0 amappl8 128 321 0 302 1 0 1 1 0 8 0 amappl7 120 117 0 106 1 0 1 1 0 8 0 amappl6 112 31 0 28 1 0 1 1 0 8 0 amappl5 104 151 0 135 1 0 1 1 0 8 0 amappl4 96 508 0 471 2 1 1 2 0 8 0 amappl3 88 106 0 100 1 0 1 1 0 8 0 amappl2 80 1072 0 1003 3 1 2 3 0 8 0 amappl1 72 15533 0 15093 25 9 16 20 0 8 6 amappl 80 581 0 537 1 0 1 1 0 84 0 dma4096 4096 1 0 1 1 1 0 1 0 8 0 dma256 256 6 0 6 1 1 0 1 0 8 0 dma128 128 253 0 253 1 1 0 1 0 8 0 dma64 64 6 0 6 1 1 0 1 0 8 0 dma32 32 7 0 7 1 1 0 1 0 8 0 dma16 16 18 0 17 1 0 1 1 0 8 0 aobjpl 64 1 0 0 1 0 1 1 0 8 0 uaddrrnd 24 254 0 237 1 0 1 1 0 8 0 uaddrbest 32 2 0 0 1 0 1 1 0 8 0 uaddr 24 254 0 237 1 0 1 1 0 8 0 vmmpekpl 168 6004 0 5969 2 0 2 2 0 8 0 vmmpepl 168 38262 0 36212 117 4 113 113 0 357 23 vmsppl 368 253 0 237 2 0 2 2 0 8 0 pdppl 4096 515 0 474 6 0 6 6 0 8 0 pvpl 32 133746 0 115209 151 0 151 151 0 265 1 pmappl 232 253 0 237 2 0 2 2 0 8 1 extentpl 40 46 0 29 1 0 1 1 0 8 0 phpool 112 164 0 3 5 0 5 5 0 8 0