kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Feb 27 02:04:18 PST 2020 OpenBSD/amd64 (ci-openbsd-main-8.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.53' (ECDSA) to the list of known hosts. 2020/02/27 02:04:30 fuzzer started 2020/02/27 02:04:35 dialing manager at 10.128.15.235:46715 2020/02/27 02:04:35 syscalls: 337 2020/02/27 02:04:35 code coverage: enabled 2020/02/27 02:04:35 comparison tracing: enabled 2020/02/27 02:04:35 extra coverage: support is not implemented in syzkaller 2020/02/27 02:04:35 setuid sandbox: enabled 2020/02/27 02:04:35 namespace sandbox: support is not implemented in syzkaller 2020/02/27 02:04:35 Android sandbox: support is not implemented in syzkaller 2020/02/27 02:04:35 fault injection: support is not implemented in syzkaller 2020/02/27 02:04:35 leak checking: support is not implemented in syzkaller 2020/02/27 02:04:35 net packet injection: enabled 2020/02/27 02:04:35 net device setup: support is not implemented in syzkaller 2020/02/27 02:04:35 concurrency sanitizer: support is not implemented in syzkaller 2020/02/27 02:04:35 devlink PCI setup: support is not implemented in syzkaller 02:04:39 executing program 0: mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FIOGETOWN(r0, 0x4004667b, &(0x7f0000000040)) r2 = dup(r1) ioctl$TIOCCBRK(r2, 0x2000747a) ioctl$TIOCGETA(0xffffffffffffff9c, 0x402c7413, &(0x7f0000000080)) socket(0x18, 0x8000, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x20, 0x0) ioctl$KDGKBMODE(r3, 0x40044b06) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)) r4 = openat$tty(0xffffffffffffff9c, &(0x7f0000000140)='/dev/tty\x00', 0x10, 0x0) fchdir(r4) r5 = openat$tty(0xffffffffffffff9c, &(0x7f0000000180)='/dev/tty\x00', 0x800, 0x0) ioctl$TIOCCBRK(r5, 0x2000747a) r6 = msgget$private(0x0, 0x602) r7 = geteuid() getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f00000001c0)={0x0, 0x0, 0x0}, &(0x7f0000000200)=0xc) r9 = geteuid() getgroups(0x5, &(0x7f0000000240)=[0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) r11 = getppid() r12 = getpgrp() msgctl$IPC_SET(r6, 0x1, &(0x7f0000000280)={{0x100000, r7, r8, r9, r10, 0x100, 0x40}, 0x5, 0x4, r11, r12, 0x0, 0x0, 0x85dd, 0x7}) r13 = getppid() ktrace(&(0x7f0000000300)='\x00', 0x4, 0x40000100, r13) r14 = getpid() getpgid(r14) r15 = openat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x40, 0x28) ioctl$WSMOUSEIO_SRES(r15, 0x80045721, &(0x7f0000000380)=0x3) r16 = socket$inet(0x2, 0x4, 0x1) setsockopt$sock_int(r16, 0xffff, 0x1004, &(0x7f00000003c0)=0x7, 0x4) 02:04:39 executing program 1: madvise(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x6) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f00000003c0)=[{&(0x7f0000000040)=""/120, 0x78}, {&(0x7f00000000c0)=""/99, 0x63}, {&(0x7f0000000140)=""/150, 0x96}, {&(0x7f0000000200)=""/191, 0xbf}, {&(0x7f00000002c0)=""/237, 0xed}], 0x5) ioctl$KDGETLED(r1, 0x40044b41, &(0x7f0000000440)=0x1) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000480)='/dev/zero\x00', 0x80, 0x0) fchflags(r2, 0x10000) ioctl$FIOGETOWN(r2, 0x4004667b, &(0x7f00000004c0)) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000500)='/dev/zero\x00', 0x800, 0x0) r4 = syz_open_pts() pread(r4, &(0x7f0000000540)="0debead431afe7af70e8c2bb2fad8a9cd5203b74c21baa02f8922583f04a8e7862bf8741f23763118d54b875651d8b6e078f3111c844fddaaf50ffd1cf0ea8f4b4a56326c3fa51f142222235f37062d1c85903bad64b5977d02cb1213db707fa5c0078377df5e2e235311c0cd17278a0fa1124228110c12afaf12ce2b886ff0c506a6e0681a594617be0b789df0ed0b65ce3d7d895d294428fb4138e94b4f889f5e1c3b8cc2035911a5ebffe6880461cda4ae49e5a7078acd9403c6f5f6eb818cb17b398df3a44adc934c738d5b46214ee7f20eaf07265615f7ed9f9", 0xdc, 0x0, 0x7fffffff) ioctl$KDGETLED(r3, 0x40044b41, &(0x7f0000000640)=0x1) r5 = accept(r3, 0x0, &(0x7f0000000a40)) socketpair(0x1, 0x2, 0x7, &(0x7f0000000a80)={0xffffffffffffffff}) r7 = openat$pci(0xffffffffffffff9c, &(0x7f0000000ac0)='/dev/pci\x00', 0x2, 0x0) r8 = accept(r2, 0x0, &(0x7f0000000b00)) r9 = openat$zero(0xffffffffffffff9c, &(0x7f0000000b40)='/dev/zero\x00', 0x20, 0x0) r10 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000b80)='/dev/speaker\x00', 0x10, 0x0) pipe(&(0x7f0000000bc0)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = socket(0x20, 0x1, 0x3f) pipe(&(0x7f0000000c00)={0xffffffffffffffff}) r14 = getpid() r15 = geteuid() getsockopt$SO_PEERCRED(r3, 0xffff, 0x1022, &(0x7f0000000c40)={0x0, 0x0, 0x0}, 0xc) sendmsg$unix(r0, &(0x7f0000000d40)={&(0x7f0000000680)=@abs={0x1, 0x0, 0x3}, 0x8, &(0x7f00000009c0)=[{&(0x7f00000006c0)="73e20f3b56ac0a4547e6dc4371bab7e5c7365eada3376a845b27bf44a51d8483681bf6d7e5b215f4", 0x28}, {&(0x7f0000000700)="ecd72604d6ae109b771a2758e72aae03cb99260cb3e4a81db2f7dc9c4e4a1ddbcc3a743d888ebb183d68c77be776698e5d8a54dbda074f62c856d4707a8e5fc112803f4bc681a47b4d3449600733b6e4e0e589bdff8143ee94c5f1d077e0b40b6eeb1f27a26349fbebbeb74656fec6e2864554b8a4eddb5faa36f0061d5a903958af147a6f95310944520ccd1009bb0eadd01b939624f1cc0e4c8b8114205dda652f6e15e25ee27ee2f2637912ee31f9d70c70cac80f1c5e1bedbc322e319095698e5eed04a169eab81cd2f144c30c540444c6efc2458fc93b2110b61320145bfb0830edeea13bf273cdae42e542", 0xee}, {&(0x7f0000000800)="31d88bb101f53ea6ff57ac9c53658f74cd8544c704", 0x15}, {&(0x7f0000000840)="51324fbef381cd72f55b003f31d8e94fb464a3d9919e164d06c92a7986935af5b8fece6e42272bc6b60fa5ed6f3d2c00ff23f628", 0x34}, {&(0x7f0000000880)="af98fe16f6850a47f4eed9c4ba0807c18199c232822a9231cf05a9ae7d93a2bd7412f75201fc5bf23f9496c1df1fd568b0d211e321f3548c1d0df4abb6b8d0", 0x3f}, {&(0x7f00000008c0)="002b04fe65ab8b5b582ebd2555ec39d1e692705278673b605fde3f88aab620d1f29da3574eecbd3b2f4308132cae44d335f0bb76c05d5e997b4387e3a58dddaee5069c5c51ac132f7b50e627bb86772c462a0e3a328448781b3b718ae0e69ee8e2215f3bf2690a77906f24cb39df72aea00f27334e05273b0584f64857f560351bc9fd166354bd80f8", 0x89}, {&(0x7f0000000980)="74b0a64775ee83c7b30c598e45132388ce5a", 0x12}], 0x7, &(0x7f0000000c80)=[@rights={0x28, 0xffff, 0x1, [r5, r6, 0xffffffffffffff9c, r3, r7, r8]}, @rights={0x28, 0xffff, 0x1, [r9, r10, r0, r11, r3, 0xffffffffffffffff]}, @rights={0x18, 0xffff, 0x1, [r12, r13]}, @cred={0x20, 0xffff, 0x0, r14, r15, r17}], 0x88, 0x408}, 0xb) r18 = openat(0xffffffffffffff9c, &(0x7f0000000d80)='./file0\x00', 0x400, 0x61) readv(r18, &(0x7f0000001240)=[{&(0x7f0000000dc0)=""/1, 0x1}, {&(0x7f0000000e00)=""/249, 0xf9}, {&(0x7f0000000f00)=""/130, 0x82}, {&(0x7f0000000fc0)=""/15, 0xf}, {&(0x7f0000001000)=""/131, 0x83}, {&(0x7f00000010c0)=""/177, 0xb1}, {&(0x7f0000001180)=""/138, 0x8a}], 0x7) r19 = openat(r18, &(0x7f00000012c0)='./file0\x00', 0x100, 0x80) ioctl$VT_ACTIVATE(r19, 0x20007605, &(0x7f0000001300)=0x1) r20 = shmget(0x0, 0x1000, 0x467, &(0x7f0000ffe000/0x1000)=nil) getsockopt$sock_cred(r18, 0xffff, 0x1022, &(0x7f0000001340)={0x0, 0x0, 0x0}, &(0x7f0000001380)=0xc) getgroups(0x1, &(0x7f00000013c0)=[r17]) r23 = getpgrp() getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000001400)={0x0}, 0xc) shmctl$IPC_SET(r20, 0x1, &(0x7f0000001440)={{0x8, r16, r21, r16, r22, 0x15b, 0x2}, 0x7, 0x3, r23, r24, 0x6, 0x90f9, 0xfffffffffffffffd}) 02:04:39 executing program 0: open$dir(&(0x7f0000000040)='./file0\x00', 0x10000, 0x10) r0 = getpid() r1 = socket(0x18, 0x1, 0x0) close(r1) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) setsockopt(r1, 0x8, 0x6, &(0x7f0000000080)="6628c79c1bc49c45b65330260703db5f55bac8564610114d1b3dc6d943b8a6", 0x1f) ktrace(&(0x7f0000000000)='./file0\x00', 0x0, 0x1116, r0) r2 = socket(0x18, 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000700)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, 0x0, 0x0, &(0x7f0000000640)=[@cred={0x20}], 0x20}, 0x0) 02:04:40 executing program 0: bind(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[@ANYBLOB="8307"], 0x1) r0 = semget$private(0x0, 0x4, 0xa5) semctl$SETALL(r0, 0x0, 0x9, &(0x7f00000000c0)=[0x83, 0x10001, 0xd]) semop(r0, &(0x7f0000000240)=[{0x1, 0x6, 0x800}, {0x0, 0x44, 0x1800}, {0x0, 0x3, 0x7fc}, {0x3, 0x7, 0x1000}, {0x3, 0x68, 0x1000}, {0x3, 0xffffffffffffffff, 0x1000}, {0x1, 0xfffffffffffffff8, 0x1000}, {0x2, 0xad, 0x1000}], 0x8) semop(r0, &(0x7f0000000240), 0x6) semop(r0, &(0x7f0000000180)=[{0x0, 0x6, 0x400}, {0x531bcef4eb67362f, 0x9}, {0x58d70e956d7aaab8, 0x6, 0x1000}, {0x4, 0x7}, {0x0, 0x9, 0x800}, {0x3, 0x2, 0x1000}, {0x2, 0x8, 0x1800}], 0x7) r1 = socket(0x18, 0x1, 0x0) close(r1) close(r1) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300)='/dev/bpf\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r4, r3) r5 = socket(0x18, 0x1, 0x0) close(r5) connect$unix(r5, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) connect$unix(0xffffffffffffffff, &(0x7f00000003c0)=@abs={0x1, 0x0, 0x0}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup2(r7, r6) connect$unix(r8, &(0x7f0000000040)=ANY=[@ANYBLOB], 0xa) ioctl$BIOCSETF(r8, 0x80104267, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{0x81, 0x0, 0x1, 0x100000}, {0x35}, {0x6, 0x0, 0x10}]}) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) r9 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETF(r9, 0x80104267, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{0x81}, {0x35}, {0x6}]}) ioctl$BIOCSETIF(r9, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) r10 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETF(r10, 0x80104267, &(0x7f0000000100)={0x3, &(0x7f0000000280)=[{0x81}, {0x35}, {0x6}]}) ioctl$BIOCSETIF(r10, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) connect$unix(r1, &(0x7f0000000140)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[]], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r11 = socket(0x2, 0x4, 0x0) connect$unix(r11, &(0x7f00000002c0)=ANY=[@ANYBLOB="965699b72a98fa95bf1222b458137008daa9e2aecb"], 0x10) setsockopt$inet_opts(r11, 0x0, 0x1, &(0x7f00000000c0)="0714000000000025ff149b33ff0f000000000000", 0x14) r12 = dup2(r2, r11) ioctl$VT_OPENQRY(r12, 0x40047601, &(0x7f0000000080)) write(r11, 0x0, 0x0) 02:04:40 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000240)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000100)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x25}, {0x6c}, {0x6}]}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0xd731, 0x1f, 0x20, 0x1}, {0x8001, 0x5, 0x7, 0xe837}, {0x20, 0xfd, 0x6, 0x5}]}) syz_emit_ethernet(0x133, &(0x7f0000000540)) r1 = socket(0x18, 0x1, 0x0) setsockopt(r1, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) ioctl$FIONREAD(r1, 0x4004667f, &(0x7f0000000140)) 02:04:40 executing program 1: mknod(&(0x7f0000000180)='./bus\x00', 0x80002005, 0x514) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x10005, 0x0) ioctl$WSMUXIO_ADD_DEVICE(r0, 0x80085761, &(0x7f0000000000)={0x1, 0x1}) socketpair(0x10, 0x151ff7384b40af8c, 0x7f, &(0x7f0000000040)) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000240)=0x9) open(&(0x7f0000000080)='./bus\x00', 0x8000, 0x0) 02:04:40 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) pread(r0, &(0x7f00000000c0)="a6", 0x1, 0x0, 0x0) ioctl$WSDISPLAYIO_ADDSCREEN(r0, 0x80245753, &(0x7f0000000000)={0xffffff81, './file0\x00', './file0\x00'}) ioctl$KDMKTONE(r0, 0x20004b08, &(0x7f0000000040)=0x751af240) ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6418214c], [0x0, 0x0, 0x0, 0x9, 0x7fffffff], [0x0, 0xfffffffffffffffb, 0x5]}}) fchflags(0xffffffffffffffff, 0x10001) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x2, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000580)='/dev/zero\x00', 0x0, 0x0) pread(r2, &(0x7f00000000c0)="a6", 0x1, 0x0, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r3, 0x8080691a, &(0x7f0000000300)) mprotect(&(0x7f000010a000/0x3000)=nil, 0x3000, 0x0) 02:04:40 executing program 0: setrlimit(0x8, &(0x7f0000000000)={0x9, 0x93}) r0 = syz_open_pts() close(r0) r1 = syz_open_pts() fcntl$setstatus(r1, 0x4, 0x4) kevent(0xffffffffffffffff, &(0x7f0000000100)=[{}], 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r2 = socket(0x18, 0x2, 0x0) close(r2) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r2, &(0x7f0000000040)="100a2956b9223776", 0x21d) mknod(&(0x7f0000000000)='./file0\x00', 0x80002005, 0x2d94) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r4 = kqueue() kevent(r4, &(0x7f00000004c0)=[{{r3}, 0xffffffffffffffff, 0x3}], 0x7, 0x0, 0x0, 0x0) kevent(r4, 0x0, 0x0, &(0x7f00000002c0), 0x9, 0x0) getsockname$unix(r2, &(0x7f0000000080)=@abs, &(0x7f00000000c0)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup2(r6, r5) connect$unix(r7, &(0x7f0000000040)=@file={0x1bcfa69870ae01e4, './file0\x00'}, 0xa) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x10000) linkat(r7, &(0x7f0000000180)='./file1\x00', r8, &(0x7f0000000200)='./file0\x00', 0x4) ioctl$TIOCSETAW(r0, 0x80047469, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, "1ffbdfa6163cb90277925f1be62c36ae61c4a648"}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup2(r10, r9) connect$unix(r11, &(0x7f0000000040)=ANY=[@ANYBLOB="e4012e2f6669f8ffffff"], 0xa) ioctl$TIOCMBIS(r11, 0x8004746c, &(0x7f0000000040)=0x2) r12 = socket(0x18, 0x1, 0x0) setsockopt(r12, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) read(r12, &(0x7f0000000240)=""/244, 0xffffffffffffffe4) 02:04:41 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x1d}, {0x40}, {0x407ffffffe}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup2(r2, r1) connect$unix(r3, &(0x7f0000000040)=ANY=[@ANYBLOB="e4012e2f66696cead900"], 0xa) r4 = socket(0x18, 0x2, 0x0) close(r4) setsockopt(r4, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r4, &(0x7f0000000040)="100a2956b9223776", 0x21d) fcntl$getflags(0xffffffffffffff9c, 0x1) connect$unix(r4, &(0x7f00000000c0)=@abs={0x1, 0x0, 0x3}, 0x8) ioctl$TIOCSTOP(r3, 0x2000746f) syz_emit_ethernet(0xe, &(0x7f0000000a80)="b6bc1fc92479ff2b783f6e8a9c81") 02:04:41 executing program 0: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) r0 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x8) r1 = socket(0x18, 0x1, 0x0) r2 = socket(0x18, 0x2, 0x0) close(r2) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r2, &(0x7f0000000040)="100a2956b9223776", 0x21d) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup2(r4, r3) r6 = socket(0x18, 0x1, 0x0) close(r6) connect$unix(r6, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) getsockopt$sock_int(r6, 0xffff, 0x100, &(0x7f00000002c0), &(0x7f0000000300)=0x4) connect$unix(r5, &(0x7f0000000040)=@file={0x1bcfa69870ae01e4, './file0\x00'}, 0xa) fchmodat(r5, &(0x7f0000000280)='\x00', 0x98, 0x4) ioctl$FIOSETOWN(r2, 0x8004667c, &(0x7f0000000200)=0x80000000) getsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000180), &(0x7f00000001c0)=0x8) setsockopt(r1, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) ioctl$DIOCMAP(r0, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0\x00', r1, 0x1}) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup2(r8, r7) connect$unix(r9, &(0x7f0000000040)=@file={0x1bcfa69870ae01e4, './file0\x00'}, 0xa) ioctl$PCIOCREAD(r9, 0xc0107002, &(0x7f0000000240)) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) 02:04:41 executing program 1: ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe], [0x0, 0x0, 0x0, 0x9, 0xffffffffffffffff, 0xfffffffeffffffff], [0x0, 0x0, 0x401, 0x0, 0x0, 0xfffffffffffffffd], [{}, {0x1}], {}, {0x0, 0x5}}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x80, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8080691a, &(0x7f0000000300)) 02:04:41 executing program 0: mknod(&(0x7f0000000180)='./bus\x00', 0x2000, 0x86128) writev(0xffffffffffffffff, &(0x7f0000002a00)=[{&(0x7f0000000440), 0xff52}], 0x1) r0 = open(&(0x7f0000000100)='./bus\x00', 0x100, 0x0) r1 = socket(0x18, 0x1, 0x0) setsockopt(r1, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r2 = socket(0x18, 0x2, 0x0) close(r2) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) write(r2, &(0x7f0000000040)="100a2956b9223776", 0x21d) r3 = socket(0x18, 0x1, 0x0) close(r3) connect$unix(r1, &(0x7f0000000600)=ANY=[@ANYBLOB="01006275f3cb47bbb17300"], 0x8) sendto$inet6(r2, &(0x7f0000000500)="2e3b42d664359879acedfcd36be4e0eb001ab33ba2884a04f3b97f2635118dfe84bcfc14f0ea0fce3df268d34da7d1b56ebfb0585131a5eab59f1eaa4e01db67affd023040c01f77b56698299babf96309f7404f8279fc8c5af820ce6fb70858c8084aa9993715c3ab413dcffe07a00440a4bbf52e17a6ccb0a3d3b760f88755366454cafa71dda7a0e275f9f89cfda4c8e6a87f9535e8147edf815ac065db60beb515db6ec3be5a42df13eb231c0d18aea7963c9bba8843595b1db8831a7aa57937c0287c", 0xc5, 0x409, 0x0, 0x0) connect$unix(r3, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) connect(r0, &(0x7f0000000480)=ANY=[@ANYRES16=r0, @ANYPTR64=&(0x7f0000000440)=ANY=[@ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRES32, @ANYRESHEX=r1, @ANYRES32=r0, @ANYRES16=r0, @ANYRESDEC=r2, @ANYPTR64, @ANYRESDEC=r3, @ANYRES64=r0, @ANYPTR64]], @ANYRESDEC, @ANYRESHEX=0x0], 0x4) execve(&(0x7f0000000000)='./bus\x00', &(0x7f00000002c0)=[&(0x7f0000000040)=',-.{\x00', &(0x7f0000000200)='+\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='}#%\x00'], &(0x7f0000000380)=[&(0x7f0000000300)='\x00', &(0x7f0000000340)='+[\x00']) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)="fa1204a49155ce1e00", 0x9}], 0x1, 0x0, 0x0) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f0000000140), 0x8}], 0x28d, 0x0, 0x0) 02:04:41 executing program 1: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x0, 0x8006}, 0x0, 0x0) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0xa) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{}]}) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r1 = socket(0x18, 0x1, 0x0) close(r1) r2 = socket(0x18, 0x2, 0x0) close(r2) socket(0x400000000018, 0x3, 0x3a) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r2, &(0x7f0000000040)="100a2956b9223776", 0x21d) login: panic: receive 3: so 0xfffffd805e55e320, so_type 3, m 0xfffffd8056a47200, m_type 0 Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND *468137 97032 0 0 0 0 dhclient db_enter() at db_enter+0x18 panic(ffffffff821ad93b) at panic+0x15c soreceive(fffffd805e55e320,0,ffff80001d372188,0,0,ffff80001d372094) at soreceive+0x16e7 soo_read(fffffd8065da1708,ffff80001d372188,0) at soo_read+0x53 dofilereadv(ffff80001d339758,6,ffff80001d372188,0,ffff80001d372270) at dofilereadv+0x1a1 sys_read(ffff80001d339758,ffff80001d372220,ffff80001d372270) at sys_read+0x83 syscall(ffff80001d3722f0) at syscall+0x507 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x7f7ffffda910, count: 7 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs. ddb> ddb> set $lines = 0 ddb> set $maxwidth = 0 ddb> show panic receive 3: so 0xfffffd805e55e320, so_type 3, m 0xfffffd8056a47200, m_type 0 ddb> trace db_enter() at db_enter+0x18 panic(ffffffff821ad93b) at panic+0x15c soreceive(fffffd805e55e320,0,ffff80001d372188,0,0,ffff80001d372094) at soreceive+0x16e7 soo_read(fffffd8065da1708,ffff80001d372188,0) at soo_read+0x53 dofilereadv(ffff80001d339758,6,ffff80001d372188,0,ffff80001d372270) at dofilereadv+0x1a1 sys_read(ffff80001d339758,ffff80001d372220,ffff80001d372270) at sys_read+0x83 syscall(ffff80001d3722f0) at syscall+0x507 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x7f7ffffda910, count: -8 ddb> show registers rdi 0 rsi 0x1 rbp 0xffff80001d371ed0 rbx 0xffff80001d371f80 rdx 0x2 rcx 0 rax 0 r8 0xffff80001d371e90 r9 0x1 r10 0 r11 0xc863fedbca7b0f13 r12 0x3000000008 r13 0xffff80001d371ee0 r14 0x100 r15 0x1 rip 0xffffffff81bf3908 db_enter+0x18 cs 0x8 rflags 0x246 rsp 0xffff80001d371ec0 ss 0x10 db_enter+0x18: addq $0x8,%rsp ddb> show proc PROC (dhclient) pid=468137 stat=onproc flags process=0 proc=0 pri=24, usrpri=51, nice=20 forw=0xffffffffffffffff, list=0xffff80001d33a5f8,0xffff80001d3399d8 process=0xffff8000ffffa010 user=0xffff80001d36d000, vmspace=0xfffffd806bc09000 estcpu=1, cpticks=1, pctcpu=0.0 user=0, sys=1, intr=0 ddb> ps PID TID PPID UID S FLAGS WAIT COMMAND 56073 448915 11896 0 2 0 syz-executor.0 56073 119073 11896 0 2 0x4000000 syz-executor.0 37498 110828 67619 0 2 0 syz-executor.1 37498 481516 67619 0 3 0x4000080 select syz-executor.1 67619 297823 25610 0 3 0x82 nanosleep syz-executor.1 11896 327655 25610 0 3 0x82 nanosleep syz-executor.0 25610 411181 69221 0 3 0x82 thrsleep syz-fuzzer 25610 211395 69221 0 3 0x4000082 thrsleep syz-fuzzer 25610 437462 69221 0 3 0x4000082 thrsleep syz-fuzzer 25610 517723 69221 0 3 0x4000082 thrsleep syz-fuzzer 25610 258160 69221 0 3 0x4000082 thrsleep syz-fuzzer 25610 261650 69221 0 3 0x4000082 thrsleep syz-fuzzer 25610 78904 69221 0 3 0x4000082 thrsleep syz-fuzzer 25610 109732 69221 0 3 0x4000082 kqread syz-fuzzer 69221 377189 47324 0 3 0x10008a pause ksh 47324 265339 86135 0 3 0x92 select sshd 68400 209313 1 0 3 0x100083 ttyin getty 86135 21265 1 0 3 0x80 select sshd 53619 223755 2574 73 3 0x100090 kqread syslogd 2574 386836 1 0 3 0x100082 netio syslogd 33202 115293 1 77 2 0x100010 dhclient *97032 468137 1 0 7 0 dhclient 51217 304038 0 0 3 0x14200 bored smr 13477 49197 0 0 2 0x14200 zerothread 74453 298801 0 0 3 0x14200 aiodoned aiodoned 63720 231661 0 0 3 0x14200 syncer update 50723 21066 0 0 3 0x14200 cleaner cleaner 17739 387387 0 0 3 0x14200 reaper reaper 20215 54348 0 0 3 0x14200 pgdaemon pagedaemon 14538 60007 0 0 3 0x14200 bored crynlk 43528 153486 0 0 3 0x14200 bored crypto 13824 89819 0 0 3 0x40014200 acpi0 acpi0 88544 376601 0 0 3 0x14200 bored softnet 79163 150466 0 0 3 0x14200 bored systqmp 11825 450462 0 0 3 0x14200 bored systq 85601 384711 0 0 3 0x40014200 bored softclock 62407 420268 0 0 3 0x40014200 idle0 1 133355 0 0 3 0x82 wait init 0 0 -1 0 3 0x10200 scheduler swapper ddb> show all locks No such command ddb> show malloc Type InUse MemUse HighUse Limit Requests Type Lim devbuf 9458 6327K 6840K 78643K 10607 0 pcb 13 8K 8K 78643K 13 0 rtable 107 3K 3K 78643K 193 0 ifaddr 46 11K 11K 78643K 48 0 counters 21 16K 16K 78643K 21 0 ioctlops 0 0K 2K 78643K 15 0 mount 1 1K 1K 78643K 1 0 vnodes 1222 77K 77K 78643K 1234 0 UFS quota 1 32K 32K 78643K 1 0 UFS mount 5 36K 36K 78643K 5 0 shm 2 1K 1K 78643K 2 0 VM map 2 0K 0K 78643K 2 0 sem 4 0K 0K 78643K 4 0 dirhash 12 2K 2K 78643K 12 0 ACPI 1794 195K 288K 78643K 12646 0 file desc 6 17K 25K 78643K 47 0 sigio 0 0K 0K 78643K 2 0 proc 47 38K 63K 78643K 358 0 subproc 32 2K 2K 78643K 34 0 NFS srvsock 1 0K 0K 78643K 1 0 NFS daemon 1 16K 16K 78643K 1 0 ip_moptions 0 0K 0K 78643K 5 0 in_multi 40 2K 2K 78643K 42 0 ether_multi 1 0K 0K 78643K 1 0 ISOFS mount 1 32K 32K 78643K 1 0 MSDOSFS mount 1 16K 16K 78643K 1 0 ttys 37 175K 175K 78643K 37 0 exec 0 0K 1K 78643K 181 0 pagedep 1 8K 8K 78643K 1 0 inodedep 1 32K 32K 78643K 1 0 newblk 1 0K 0K 78643K 1 0 VM swap 7 26K 26K 78643K 7 0 UVM amap 107 22K 22K 78643K 956 0 UVM aobj 2 2K 2K 78643K 2 0 memdesc 1 4K 4K 78643K 1 0 crypto data 1 1K 1K 78643K 1 0 ip6_options 0 0K 0K 78643K 2 0 NDP 6 0K 0K 78643K 10 0 temp 69 3012K 3076K 78643K 1844 0 kqueue 3 4K 4K 78643K 3 0 SYN cache 2 16K 16K 78643K 2 0 ddb> show all pools Name Size Requests Fail Releases Pgreq Pgrel Npage Hiwat Minpg Maxpg Idle arp 64 6 0 0 1 0 1 1 0 8 0 rtpcb 80 19 0 17 1 0 1 1 0 8 0 rtentry 112 46 0 1 2 0 2 2 0 8 0 unpcb 120 55 0 47 1 0 1 1 0 8 0 syncache 264 4 0 4 1 1 0 1 0 8 0 tcpqe 32 70 0 70 1 0 1 1 0 8 1 tcpcb 544 24 0 20 1 0 1 1 0 8 0 inpcb 280 58 0 51 1 0 1 1 0 8 0 nd6 48 6 0 0 1 0 1 1 0 8 0 art_heap8 4096 2 0 0 2 0 2 2 0 8 0 art_heap4 256 194 0 0 13 0 13 13 0 8 0 art_table 32 196 0 0 2 0 2 2 0 8 0 art_node 16 45 0 4 1 0 1 1 0 8 0 semupl 112 1 0 1 1 0 1 1 0 8 1 semapl 112 2 0 0 1 0 1 1 0 8 0 dirhash 1024 17 0 0 3 0 3 3 0 8 0 dino1pl 128 1437 0 37 46 0 46 46 0 8 0 ffsino 240 1437 0 37 83 0 83 83 0 8 0 nchpl 144 1682 0 82 60 0 60 60 0 8 0 uvmvnodes 72 1490 0 0 28 0 28 28 0 8 0 vnodes 208 1490 0 0 79 0 79 79 0 8 0 namei 1024 4037 0 4037 1 0 1 1 0 8 1 scxspl 192 4763 0 4763 1 0 1 1 0 8 1 plimitpl 152 16 0 9 1 0 1 1 0 8 0 sigapl 424 233 0 204 4 0 4 4 0 8 0 futexpl 56 432 0 432 1 0 1 1 0 8 1 knotepl 112 53 0 34 1 0 1 1 0 8 0 kqueuepl 144 4 0 2 1 0 1 1 0 8 0 pipelkpl 16 75 0 65 1 0 1 1 0 8 0 pipepl 120 150 0 131 1 0 1 1 0 8 0 fdescpl 432 219 0 204 2 0 2 2 0 8 0 filepl 120 1132 0 1036 4 0 4 4 0 8 1 lockfpl 104 10 0 9 1 0 1 1 0 8 0 lockfspl 48 5 0 4 1 0 1 1 0 8 0 sessionpl 112 17 0 7 1 0 1 1 0 8 0 pgrppl 48 17 0 7 1 0 1 1 0 8 0 ucredpl 96 52 0 45 1 0 1 1 0 8 0 zombiepl 144 204 0 204 1 0 1 1 0 8 1 processpl 896 233 0 204 4 0 4 4 0 8 0 procpl 624 259 0 221 4 0 4 4 0 8 1 sockpl 400 132 0 115 3 0 3 3 0 8 1 mcl8k 8192 1 0 1 1 0 1 1 0 8 1 mcl4k 4096 9 0 9 2 1 1 1 0 8 1 mcl2k 2048 63804 0 63756 17 3 14 14 0 8 7 mtagpl 80 2 0 2 1 1 0 1 0 8 0 mbufpl 256 100914 0 100832 12 2 10 10 0 8 0 bufpl 280 3973 0 156 273 0 273 273 0 8 0 anonpl 16 37850 0 22513 63 1 62 62 0 107 0 amapchunkpl 152 1063 0 926 8 0 8 8 0 158 2 amappl16 192 981 0 144 42 0 42 42 0 8 0 amappl15 184 9 0 7 1 0 1 1 0 8 0 amappl14 176 11 0 9 2 1 1 1 0 8 0 amappl13 168 23 0 22 1 0 1 1 0 8 0 amappl12 160 10 0 9 1 0 1 1 0 8 0 amappl11 152 63 0 51 1 0 1 1 0 8 0 amappl10 144 15 0 9 1 0 1 1 0 8 0 amappl9 136 391 0 384 1 0 1 1 0 8 0 amappl8 128 295 0 266 1 0 1 1 0 8 0 amappl7 120 107 0 96 1 0 1 1 0 8 0 amappl6 112 20 0 18 1 0 1 1 0 8 0 amappl5 104 150 0 139 1 0 1 1 0 8 0 amappl4 96 433 0 404 1 0 1 1 0 8 0 amappl3 88 104 0 99 1 0 1 1 0 8 0 amappl2 80 949 0 873 3 0 3 3 0 8 1 amappl1 72 13699 0 13284 26 9 17 20 0 8 8 amappl 80 500 0 457 1 0 1 1 0 84 0 dma4096 4096 1 0 1 1 1 0 1 0 8 0 dma256 256 6 0 6 1 1 0 1 0 8 0 dma128 128 253 0 253 1 1 0 1 0 8 0 dma64 64 6 0 6 1 1 0 1 0 8 0 dma32 32 7 0 7 1 1 0 1 0 8 0 dma16 16 18 0 17 1 0 1 1 0 8 0 aobjpl 64 1 0 0 1 0 1 1 0 8 0 uaddrrnd 24 219 0 204 1 0 1 1 0 8 0 uaddrbest 32 2 0 0 1 0 1 1 0 8 0 uaddr 24 219 0 204 1 0 1 1 0 8 0 vmmpekpl 168 5685 0 5662 2 0 2 2 0 8 0 vmmpepl 168 34049 0 32055 114 5 109 109 0 357 22 vmsppl 272 218 0 204 2 0 2 2 0 8 1 pdppl 4096 444 0 408 6 0 6 6 0 8 1 pvpl 32 124525 0 106181 148 0 148 148 0 265 0 pmappl 200 218 0 204 1 0 1 1 0 8 0 extentpl 40 46 0 29 1 0 1 1 0 8 0 phpool 112 152 0 8 5 0 5 5 0 8 0