last executing test programs: 4.736448158s ago: executing program 5 (id=6): mknod(&(0x7f0000000000)='./bus\x00', 0x2000, 0x2e00) r0 = open(&(0x7f0000000080)='./bus\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = open(&(0x7f0000000140)='./file0\x00', 0x10686, 0x8) r3 = getpid() ktrace(&(0x7f0000000280)='./file0\x00', 0x0, 0x928, r3) setrlimit(0x1, &(0x7f0000000000)={0xfffffffffffffffb, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5, 0x10, r2, 0x0) utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={{0x0, 0xffffffffffffffff}, {0x0, 0xffffffffffffffff}}, 0x0) r4 = socket(0x2, 0x1, 0x0) getpeername(r4, 0x0, 0x0) ioctl$VNDIOCSET(r1, 0x80046309, &(0x7f0000000100)={0x0, 0x0, 0x0}) 4.67951876s ago: executing program 5 (id=12): r0 = syz_open_pts() ioctl$FIONREAD(r0, 0x4004667f, &(0x7f0000000040)) ioctl$TIOCSTAT(r0, 0x20007465, 0x0) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f00000008c0)=0x8) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000000)=0x8) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001700)={&(0x7f0000000080), 0x1c, 0x0, 0x0, 0x0, 0x2e}, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) sendmsg(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f00000000c0)=@in6={0x18, 0x1, 0x2f9, 0xe51}, 0xc, &(0x7f0000000380)=[{&(0x7f0000000100)="d76b5a30d9660b479e4385d12ceec4f3e85ba28ebf676e4d81d9ba9e67a19d09bff621cd46689e713546d8f9245ac7d8093bc408e3ef010a8a705236805fbae3c8459cbe9588d7310bcfaed84220496ecdecab8a7a57adae008bc6a8a1898a16e72f540cc94a450e6b53616039752ebbb8c56a076bc0bb47a9ffd4aa68405639ec248b38388480e597b6f49d9fc82c2d3d83853d74d85eab348fc13b094264a83f9a1c86dc22d87202fa01b536322711084878943447157393af2d3478c1430ff70d3e02c7126630435634f86b16b0902a79cdad5ef1b1902acccd01c249114d8ed27140ac49436e1d5da4594e", 0xed}, {&(0x7f0000000200)="75f0a377c64d30b6b8866be158a3f07721494801f5a504568cf0954a885830cfd37144a362f861a0eb5ef2841b4f22ac2306c047248cc3146dcf6524ab59ebbb40c32e34c3e1011dabdc7854446b4f", 0x4f}, {&(0x7f0000000280)="aa43887eeafa2f4e0caa4ab013c7b868468b12f68094ddcde6636c37d74517d52183d10d9c1afd8143b369c9c892f3fef2e893c1630433e4c205f8aea0179d9cf2f4231c7d5cabc1c533a1a9f330f644ca3389a7244ea4e7635c47bef1d22a59046c670cd9c77deaed15f5cca54e05353d56097980619c3f46af3a6666fa18e88a242ea340d87ac340a30c7e7f12a0be4caa0e5558dbdf30ec61c42911917d4d0ea90b41485ffcf4df2c9e8a83f9c62e375103e7f0a503961d619f", 0xbb}, {&(0x7f0000000340)="d3283e5e4567221887b007d3215f2f55f3fdbf94841d9318ff11a60fd91543940f84037094804ac26235c9c0cbe29b9c451a2b84b46f7b", 0x37}], 0x4, &(0x7f00000003c0)=[{0xb8, 0x1, 0x4, "9bc38d83dee90d935eb6f129a779952b63267121f59b2f256eb3949deb3213991ff11e3e1fd7639e1252302ac0a0b963e0ea405b1df4b71fab5407d3888915cc38513232984a0bdde660c086aa5362a4d5e3242607ccfdf846925b8dbc7592035fbc61d9301d52bfa57d912dbfbfd6e37ec414bbda5244938e9f7fe38d7d5a4206a04e87ebb5fda07f2569211fc082eff5e4e9ebe9d74e6da9e463b86c362cf7842f8f3af091"}], 0xb8}, 0x8) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0xff}}) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1) r1 = socket(0x18, 0x3, 0x0) r2 = socket(0x18, 0x3, 0x0) setsockopt(r2, 0x1000000000029, 0x9, &(0x7f0000000040)="03000000", 0x4) sendmsg$unix(r2, &(0x7f0000001700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x409}, 0x8) accept(r2, &(0x7f00000004c0)=@un=@file={0x0, ""/519}, &(0x7f0000000700)=0x209) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) sendmsg$unix(r1, &(0x7f0000001700)={0x0, 0xffffffb3, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0) unveil(0x0, &(0x7f0000004300)='W\x00') 4.191905112s ago: executing program 0 (id=39): r0 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) writev(r0, &(0x7f0000001480)=[{&(0x7f0000000100)="cc60d3d7", 0x4}], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r0, 0x0) r1 = kqueue() mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) kevent(r1, 0x0, 0x1, 0x0, 0x7ff, &(0x7f0000000240)={0x0, 0x4}) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ioctl$FIOASYNC(r2, 0x8004667d, &(0x7f0000002a40)=0xf4a9) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000400)=[&(0x7f0000000140)='&#\x00', &(0x7f0000000180)=':)@\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='\x00', &(0x7f0000000280)='\x00', &(0x7f00000002c0)=']\x00', &(0x7f0000000300)='\f\x00', &(0x7f0000000680)='\xf6\xfd\xcdJ\x81{\xad\xb28\xc7\f\x18`\xdb0\xfe\xaf7\x01Qr\x97vL\xce\x18-w\xe3i\xb3sxN-\xcc\xc8\xa6\xb8N\x9e`\x86\r\tJn#\xbf\f0xffffffffffffffff}) recvmmsg(r1, &(0x7f0000000080)={&(0x7f0000000100)={&(0x7f0000000240)=@un=@file={0x0, ""/529}, 0x213, 0x0, 0x0, 0x0}}, 0x3, 0x0, 0x0) read(r0, &(0x7f0000000040)=""/2, 0x2) 758.924006ms ago: executing program 7 (id=164): setrlimit(0x8, &(0x7f00000000c0)={0x45, 0x56}) r0 = syz_open_pts() close(r0) syz_open_pts() ioctl$FIOASYNC(r0, 0x80047466, &(0x7f0000000200)=0x5) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) getrlimit(0x6, 0x0) select(0x40, &(0x7f0000001280)={0x21, 0x3, 0x0, 0x0, 0xfffffffffffffffd, 0x9, 0x1, 0x5}, 0x0, &(0x7f0000001300)={0xffffffffffffffff, 0x6, 0x1ff, 0x10000, 0x2, 0x0, 0x80, 0x4}, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) getsockopt(r1, 0x0, 0x14, 0x0, 0x0) 668.839983ms ago: executing program 7 (id=165): ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000000)={0x2, &(0x7f00000000c0)=[{0x4, 0x0, 0x0, 0x1}, {0x2, 0x0, 0x0, 0xffffffff}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sysctl$net_inet_ip(&(0x7f00000000c0)={0x4, 0x2, 0x0, 0x3}, 0x4, 0x0, 0x0, 0x0, 0x0) setitimer(0x2, &(0x7f0000000000)={{0x0, 0xb00}, {0xffffffff}}, 0x0) nanosleep(0x0, 0x0) 666.129378ms ago: executing program 7 (id=166): socket$unix(0x1, 0x5, 0x0) (async) r0 = socket$unix(0x1, 0x5, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x2000, 0x0) r1 = msgget$private(0x0, 0x790) msgsnd(r1, &(0x7f0000000100)=ANY=[@ANYRES8], 0x401, 0x0) (async) msgsnd(r1, &(0x7f0000000100)=ANY=[@ANYRES8], 0x401, 0x0) msgsnd(r1, 0x0, 0x401, 0x0) msgsnd(r1, &(0x7f0000000040)={0x1, "84b5bf3506c87b1995e1f0f05d0bd9e48138e5412624dfa932e4edd4209c1149c85e958012b0e81b53b4e1066634ec52f5c20727fe158ca66142f83bab16872d952765552fa93b95"}, 0x50, 0x800) msgrcv(r1, 0x0, 0x0, 0x1, 0x0) kqueue() (async) r2 = kqueue() r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) kevent(r2, &(0x7f0000000000)=[{{r3}, 0xffffffffffffffff, 0xa1, 0x2, 0x7, 0x1}], 0x4, 0x0, 0x6, 0x0) close(r3) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) (async) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) writev(r4, &(0x7f0000001480)=[{&(0x7f00000001c0)="0e3c", 0x2}], 0x1) getsockopt$sock_linger(r0, 0xffff, 0x1021, 0x0, 0x0) (async) getsockopt$sock_linger(r0, 0xffff, 0x1021, 0x0, 0x0) kqueue() sysctl$vm_swapencrypt(&(0x7f0000000000)={0x6, 0xb, 0x3}, 0x3, 0x0, 0x0, 0x0, 0x0) (async) sysctl$vm_swapencrypt(&(0x7f0000000000)={0x6, 0xb, 0x3}, 0x3, 0x0, 0x0, 0x0, 0x0) sysctl$kern(&(0x7f0000000000)={0xa}, 0x7, &(0x7f00000000c0)="40cea6923e90b2c9ef2017082c42eb1ab6fd5a27f84fcc0a33bafccd623900d5cb958bd15460f872803363d8db4510989cad072ccb504bb68a32d145d6ed05b49315606e7bcac61238e3f2a864232f609c8f09c79a22b221b65b46a03a1400"/120, 0x0, 0x0, 0xffffffffffffff2f) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) r5 = socket(0x18, 0x1, 0x0) ioctl$FIONREAD(r5, 0x802069b5, &(0x7f00000001c0)) syz_emit_ethernet(0x76, &(0x7f0000000200)=ANY=[@ANYBLOB="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"]) setitimer(0x1, &(0x7f0000000140)={{0x8352, 0x75}, {0x6, 0x7fffffff}}, &(0x7f0000000180)) (async) setitimer(0x1, &(0x7f0000000140)={{0x8352, 0x75}, {0x6, 0x7fffffff}}, &(0x7f0000000180)) 399.023419ms ago: executing program 4 (id=185): symlink(&(0x7f0000000280)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001280)='./file0\x00') r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) sysctl$hw(&(0x7f0000000000)={0x6, 0x11}, 0x2, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sysctl$kern(&(0x7f0000000000)={0x1, 0x3}, 0x2, 0x0, 0x0, &(0x7f0000000180), 0x0) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x4, 0x3ff) symlink(&(0x7f0000000280)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001280)='./file0\x00') (async) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async) sysctl$hw(&(0x7f0000000000)={0x6, 0x11}, 0x2, 0x0, 0x0, 0x0, 0x0) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) (async) sysctl$kern(&(0x7f0000000000)={0x1, 0x3}, 0x2, 0x0, 0x0, &(0x7f0000000180), 0x0) (async) mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x4, 0x3ff) (async) 393.978986ms ago: executing program 4 (id=188): getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f0000000180)=0xc) (async) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000000)={0x0}, &(0x7f0000000180)=0xc) ktrace(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2, 0x20, r0) mknod(&(0x7f0000000280)='./file0\x00', 0x2000, 0x1e5f) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x8000, 0xa) ioctl$WSMOUSEIO_SCALIBCOORDS(0xffffffffffffffff, 0x81205724, &(0x7f0000000100)={0x7ff, 0x17, 0x2000007, 0x101, 0x80000001, 0x80000081, 0x5, 0x10, [{0x0, 0x101, 0x4, 0x71000}, {0x7, 0x88, 0x20008, 0x7}, {0x8, 0x6, 0x0, 0x9}, {0x3, 0x900, 0xe}, {0x401, 0x200326, 0x2800, 0x7}, {0x82, 0x27f6, 0x4, 0x99}, {0x5, 0x4, 0x4f8, 0x6d}, {0xc, 0x801, 0x8, 0x4}, {0x2, 0x82, 0x9, 0x9}, {0x7, 0x100, 0x5, 0x1088}, {0x1e6, 0x10005, 0xc, 0x6}, {0x7fe, 0x9, 0x8}, {0xb8e, 0x4, 0x8, 0x4}, {0x29a7171c, 0x3, 0x1, 0x5}, {0xfffffe00, 0x7, 0x4, 0xffffffff}, {0x0, 0x1, 0x1002, 0x1}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$VNDIOCSET(r1, 0x80184404, &(0x7f00000001c0)={0x0, 0x0, 0x0}) ioctl$VNDIOCSET(r1, 0x80044403, &(0x7f00000001c0)={0x0, 0x2, 0x0}) (async) ioctl$VNDIOCSET(r1, 0x80044403, &(0x7f00000001c0)={0x0, 0x2, 0x0}) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x3, 0x5012, 0xffffffffffffffff, 0x0) ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x0, 0x3, 0x0, 0x4}, {0x7, 0x0, 0x40, 0x20000}, {0x103, 0x0, 0x0, 0x10001}]}) sysctl$kern(&(0x7f00000000c0)={0x1, 0x42}, 0x6, &(0x7f0000000100)="71f91e3471ac0058bc5a91501d94a34b8e5f84cf71b59c7afec37082", &(0x7f0000000080)=0x1918, 0x0, 0x37) (async) sysctl$kern(&(0x7f00000000c0)={0x1, 0x42}, 0x6, &(0x7f0000000100)="71f91e3471ac0058bc5a91501d94a34b8e5f84cf71b59c7afec37082", &(0x7f0000000080)=0x1918, 0x0, 0x37) execve(0x0, &(0x7f00000002c0)=[&(0x7f0000000100)='tap'], 0x0) (async) execve(0x0, &(0x7f00000002c0)=[&(0x7f0000000100)='tap'], 0x0) r2 = socket(0x18, 0x3, 0x0) ioctl$FIONREAD(r2, 0xc028698a, &(0x7f0000000100)) mknod(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000, 0x0) chmod(&(0x7f0000000040)='.\x00', 0x35e) setuid(0xee01) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2000, 0x801) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x402, 0x0) r4 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000380), 0x80, 0x0) ioctl$VNDIOCSET(r4, 0xc0384600, &(0x7f00000000c0)={&(0x7f0000000100)='./file0\x00', 0x94f, 0x0}) writev(r3, &(0x7f0000000040), 0x27) ioctl$WSMOUSEIO_SCALIBCOORDS(0xffffffffffffffff, 0x81205724, &(0x7f0000000100)={0x7ff, 0x8018, 0x2000007, 0x101, 0x80000001, 0x81b0, 0x10001, 0x10, [{0x0, 0x2890, 0x4, 0x71002}, {0x6, 0x9, 0x8, 0xfffffff9}, {0x104, 0xf88, 0x0, 0x9}, {0x4, 0x800, 0x8007, 0x7}, {0x401, 0x3, 0x2800, 0x7}, {0x1, 0x650, 0x3, 0x99}, {0xce1, 0xffffffff, 0x4f8, 0x6d}, {0x6, 0x803, 0x14, 0x8}, {0x2, 0x82, 0x5, 0x5}, {0x6a75, 0x8001, 0x1000, 0x4}, {0x1cc, 0x10001, 0xc, 0x3}, {0x8, 0x9, 0x8, 0x2}, {0xb94, 0x7, 0x4, 0x1}, {0x29a71717, 0xfffffffa, 0x1, 0x6}, {0x1000c, 0x5, 0x5, 0x10000000}, {0x0, 0x1, 0xfff, 0x30004}]}) (async) ioctl$WSMOUSEIO_SCALIBCOORDS(0xffffffffffffffff, 0x81205724, &(0x7f0000000100)={0x7ff, 0x8018, 0x2000007, 0x101, 0x80000001, 0x81b0, 0x10001, 0x10, [{0x0, 0x2890, 0x4, 0x71002}, {0x6, 0x9, 0x8, 0xfffffff9}, {0x104, 0xf88, 0x0, 0x9}, {0x4, 0x800, 0x8007, 0x7}, {0x401, 0x3, 0x2800, 0x7}, {0x1, 0x650, 0x3, 0x99}, {0xce1, 0xffffffff, 0x4f8, 0x6d}, {0x6, 0x803, 0x14, 0x8}, {0x2, 0x82, 0x5, 0x5}, {0x6a75, 0x8001, 0x1000, 0x4}, {0x1cc, 0x10001, 0xc, 0x3}, {0x8, 0x9, 0x8, 0x2}, {0xb94, 0x7, 0x4, 0x1}, {0x29a71717, 0xfffffffa, 0x1, 0x6}, {0x1000c, 0x5, 0x5, 0x10000000}, {0x0, 0x1, 0xfff, 0x30004}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) socket$unix(0x1, 0x1, 0x0) (async) r5 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_int(r5, 0xffff, 0x10, &(0x7f0000000040), &(0x7f0000000140)=0x4) (async) getsockopt$sock_int(r5, 0xffff, 0x10, &(0x7f0000000040), &(0x7f0000000140)=0x4) readv(r3, &(0x7f0000000000)=[{0x0}], 0x1) (async) readv(r3, &(0x7f0000000000)=[{0x0}], 0x1) execve(0x0, 0x0, 0x0) kqueue() ioctl$VNDIOCSET(0xffffffffffffffff, 0x80044403, &(0x7f00000001c0)={0x0, 0xfffffffffffffffd, 0x0}) (async) ioctl$VNDIOCSET(0xffffffffffffffff, 0x80044403, &(0x7f00000001c0)={0x0, 0xfffffffffffffffd, 0x0}) 297.04901ms ago: executing program 4 (id=194): r0 = socket$inet6(0x18, 0x1, 0x2c) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0x69, &(0x7f0000000100)={{0x18, 0x3, 0x80000000, 0x96d}, {0x18, 0x3, 0xfffffff9, 0xffffffff}, 0x26, [0xffff8001, 0x9, 0x6, 0x1, 0x6996b9f5, 0x1ff, 0x11aa, 0x200]}, 0x3c) r1 = socket(0x2, 0x1, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0xaeba6f3797329c4c, 0x0) ioctl$BIOCSETF(r2, 0x80104267, &(0x7f0000000200)={0x1, &(0x7f0000000180)=[{0x8, 0x6, 0x0, 0xfba}]}) getsockopt(r1, 0x2, 0xff, &(0x7f0000000000)=""/97, &(0x7f0000000080)=0x61) ioctl$WSMOUSEIO_SETPARAMS(0xffffffffffffffff, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101, 0xf}], 0x1}) sysctl$kern(&(0x7f0000000040)={0x1, 0x45}, 0x2, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) sysctl$vm_swapencrypt(&(0x7f0000000040)={0x7, 0x2, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x78e, 0x20) setrlimit(0x1, &(0x7f0000000000)={0xfffffffffffffffd, 0xffffffffffffffff}) truncate(&(0x7f00000000c0)='./file0\x00', 0x6001000004) truncate(&(0x7f0000000080)='./file0\x00', 0x40002ffff) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x510, 0x0) ioctl$FIONREAD(r1, 0xc0286988, &(0x7f00000001c0)) setegid(0x0) ioctl$FIONREAD(r1, 0x8020699f, &(0x7f00000000c0)) 233.492042ms ago: executing program 3 (id=195): mkdir(&(0x7f0000000000)='./file1\x00', 0x6) (async) mkdir(&(0x7f0000000000)='./file1\x00', 0x6) unlink(&(0x7f0000000040)='./file1\x00') r0 = open(&(0x7f0000000080)='./file0\x00', 0x18289, 0x190) ftruncate(r0, 0x10000) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x200, 0x3587e5de9183e706) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x10, r1, 0x0) syz_emit_ethernet(0x1000e, &(0x7f0000000000)=ANY=[]) openat$bpf(0xffffffffffffff9c, &(0x7f0000000440), 0x200, 0x0) (async) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000440), 0x200, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000240)={'tap', 0x0}) (async) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000240)={'tap', 0x0}) ioctl$BIOCSETF(r2, 0x80104267, &(0x7f00000000c0)={0x6, &(0x7f0000000000)=[{0x7, 0x3, 0xf0, 0x5}, {0xc0, 0xf, 0x3, 0x5}, {0x1ae, 0x8, 0x7, 0x9}, {0x6, 0x3, 0x1, 0x4b}, {0x6, 0xfb, 0xac, 0x7}, {0x3, 0xe, 0x7, 0x800}]}) syz_emit_ethernet(0x1000e, &(0x7f0000000280)=ANY=[]) 233.25497ms ago: executing program 4 (id=196): select(0x40, &(0x7f0000000000)={0x2, 0x8, 0xf10b, 0x2d, 0x3ff, 0x1, 0x2, 0x1}, &(0x7f0000000040)={0x800000003, 0x8, 0x4, 0xdcb, 0x8, 0x3383, 0x400, 0x3}, &(0x7f0000000080)={0x100000001, 0x8, 0x3, 0x80000001, 0x10001, 0x9, 0x7}, &(0x7f00000000c0)={0x0, 0xfffffffffffff851}) (async) sysctl$net_inet6_ip6(&(0x7f0000000140)={0x4, 0x18, 0x29, 0x32}, 0x4, 0x0, 0x0, &(0x7f0000000240), 0x0) (async) sysctl$net_inet6_ip6(&(0x7f0000000100)={0x4, 0x18, 0x29, 0x29}, 0x4, &(0x7f0000000180)="ec4ed0c300bdcf05a9d3ea2d45f12df0d378e9e72a9818a4bfe9a50a6f6a60863d43bc5c8d276356c738fde8533ee11fdf4fa50fb4d2342657b05aa46e11a9cc04335df7e48ab17aa74a7b70d1be474b0db97eccf33e031d135a7ab87cec2938c37d8bf2a479fe18896f11dad24732b00accaf20e442661b0c3cdfe488b20982dfdf8e8a1241ed62e93f88f9937054e75af665ece35572ae114e2cfbe6a7df51a3d200dbc148bc1ce3cc54b338fb53d95477c8e438ef4253d3f216d987a5313404c9dc34397aa7305e5dc2cc051d13f1c4e4e8cbaa53d2", &(0x7f0000000280)=0xd7, &(0x7f00000002c0)="e69b54551f4b07088c0c5c431df8c60d0280db5de431bbd4c4162c6df33bef9a1279a3716fe88b56fa73cc360fecf1a18889f6440c265c99e9d5b965df2ba4150398d9f3dcbe7edd7f358e90a1ea34e8aa1d6b958ea66ec39c95062542a89da327e3358d95a1e7c951be5442addb56209e8fef0d01bee1c8b5b446e99cc8e31728af378fe2277684aaff9e03b195c797c23e838e4456d92897b44647a47ad484", 0xa0) 232.365091ms ago: executing program 3 (id=197): r0 = openat$tty(0xffffffffffffff9c, &(0x7f0000000080), 0x200, 0x0) ioctl$TIOCNXCL(r0, 0x2000740e) mknod(&(0x7f0000000000)='./file0\x00', 0x2000, 0x6381) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=""/100, 0x64}, 0x80003f8d}, 0x10, 0x0, 0x0) r2 = openat$pf(0xffffffffffffff9c, &(0x7f0000000700), 0x82, 0x0) ioctl$TIOCSETA(r2, 0xc0104419, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, "97a2224ff1c14649ebb178926cc9795a6b47c1d1"}) ioctl$KDGETLED(r2, 0x40044b41, &(0x7f00000000c0)) sendmmsg(r1, &(0x7f0000000080)={0x0}, 0x10, 0x0) ioctl$VMM_IOC_RESETCPU(0xffffffffffffff9c, 0x82405605, &(0x7f0000000100)={0x0, 0xb3f, {[0xfffffbfffffffffb, 0x0, 0x2, 0x100200000, 0x6, 0x17, 0xdf60, 0xfffffffffffffffe, 0x80, 0x2f01, 0x93, 0x3, 0xffffffffffffffff, 0x200000000002, 0x200d, 0x4, 0xfffffffffffffffe, 0x6], [0xfffffffffffffffe, 0x80000001, 0x2, 0x20000001, 0x5e, 0x7, 0x80000000000001fe, 0x0, 0x0, 0x1], [0x100000003, 0x8000, 0x40000000, 0x0, 0xb, 0x11000, 0xffffffff00000000], [0x104, 0x1fffffffffb, 0x7ffffffffffffffc, 0x100000000, 0xd, 0x8], [{0x0, 0x0, 0x0, 0x8000000000007d06}, {0xfffc, 0x22, 0x5}, {0x4, 0x0, 0xfffffffe, 0x8}, {0x3, 0x4, 0x9, 0xffffffffffffffff}, {0x0, 0x2, 0x7f, 0x8}, {0x0, 0x9, 0x9, 0x2000000000000000}, {0x0, 0x0, 0xfffffff9}, {0x0, 0x100, 0x1, 0x4}], {0x1, 0x5, 0x6, 0x3}, {0xfffe, 0x3, 0x6d5, 0x1}}}) unveil(0x0, &(0x7f0000000600)='x\x00') unveil(&(0x7f0000000280)='.\x00', &(0x7f00000002c0)='r\x00') open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 226.204014ms ago: executing program 4 (id=198): r0 = socket(0x11, 0x3, 0x0) (async) execve(0x0, &(0x7f0000000000)=[&(0x7f0000000100)='//\x00'], 0x0) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2) (async) lchown(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sendto$unix(r0, &(0x7f0000000500)="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", 0x194, 0x0, 0x0, 0x0) 226.014607ms ago: executing program 4 (id=199): mknod(&(0x7f0000000280)='./file0\x00', 0x2000, 0x1e5f) (async) ioctl$WSMOUSEIO_SCALIBCOORDS(0xffffffffffffffff, 0x81205724, &(0x7f0000000100)={0x7ff, 0x8018, 0x2000027, 0x101, 0x80000001, 0x81ac, 0x10001, 0x10, [{0x4, 0x7, 0x4, 0x71002}, {0x6, 0x9, 0x8, 0xfffffff9}, {0x8, 0xf88, 0x0, 0x9}, {0x1, 0x800, 0xdcc}, {0x402, 0x200727, 0x8, 0x7}, {0x5, 0x650, 0x3, 0x99}, {0x1ff, 0xffffffff, 0x4f8, 0x6a}, {0x6, 0x803, 0x14, 0x8}, {0x2, 0x82, 0x5, 0x5}, {0x6a75, 0x8001, 0xd1b, 0x4}, {0x1d1, 0x10001, 0xc, 0x3}, {0x8, 0x9, 0x40008, 0x2}, {0xb8c, 0x2, 0x3ff, 0x5}, {0x29a71717, 0x10001, 0x81, 0x6}, {0xc, 0x3, 0x5, 0x3}, {0x0, 0x1, 0x20000fff, 0x30005}]}) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0x80, 0x2a) r1 = open(&(0x7f0000000080)='./file0\x00', 0x8000, 0xa) ioctl$VNDIOCSET(r1, 0x80184404, &(0x7f00000001c0)={0x0, 0x0, 0x0}) (async) ioctl$VNDIOCSET(r1, 0x80044403, &(0x7f00000001c0)={0x0, 0xfffffffffffffffd, 0x0}) (async) readv(r1, &(0x7f00000007c0)=[{&(0x7f00000002c0)=""/221, 0xdd}, {&(0x7f0000000000)=""/85, 0x55}, {&(0x7f00000003c0)=""/173, 0xad}, {&(0x7f0000000480)=""/131, 0x83}, {&(0x7f0000000540)=""/82, 0x52}, {&(0x7f00000005c0)=""/224, 0xe0}, {&(0x7f00000006c0)=""/211, 0xd3}, {&(0x7f00000000c0)=""/31, 0x1f}], 0x8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ioctl$VNDIOCSET(r0, 0x80184404, &(0x7f00000001c0)={0x0, 0x0, 0x0}) ioctl$VNDIOCSET(r0, 0x80044403, &(0x7f00000001c0)={0x0, 0xfffffffffffffffd, 0x0}) (async) sync() 78.558606ms ago: executing program 3 (id=200): mknod(&(0x7f00000000c0)='./file0\x00', 0x2000, 0x9) (async) r0 = open(&(0x7f0000000080)='./file0\x00', 0x8000, 0xa) r1 = socket(0x18, 0x2, 0x0) setsockopt(r1, 0x1000000000029, 0xa, &(0x7f0000000340)='\x00\x00\x00\x00', 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) setsockopt(r1, 0x29, 0x9, &(0x7f0000000240)="06008900", 0x4) (async) ioctl$WSMOUSEIO_SCALIBCOORDS(0xffffffffffffffff, 0x81205724, &(0x7f0000000100)={0x7ff, 0x6b881aef, 0x2000007, 0xfe, 0x80000001, 0xc, 0x8, 0x10, [{0x0, 0x7, 0x4, 0x71000}, {0x7, 0x88, 0x8, 0x7}, {0x8, 0x6, 0x0, 0x9}, {0x9, 0x900, 0xe}, {0x6, 0x200326, 0x2800, 0x7}, {0x1, 0x27f3, 0x3, 0x99}, {0xce1, 0x4, 0x4f8, 0x6d}, {0x6, 0x801, 0xc, 0x7}, {0x2, 0x82, 0x5, 0x9}, {0x7, 0x100, 0xd1a, 0x1088}, {0x10001, 0x10001, 0xc, 0x6}, {0x800, 0x9, 0x8, 0x9}, {0xb8e, 0x4, 0x8, 0x2}, {0x29a7171a, 0x8, 0x1, 0x4}, {0xc, 0x7, 0x3, 0xfffffffe}, {0x0, 0x1, 0x1002, 0x30004}]}) (async) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{{}, 0xfffffffffffffff9, 0x6b, 0x4, 0x3}], 0x203, 0x0, 0x80000001, 0x0) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0xffffffff, 0xb, {0x0, 0x1}}) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) r2 = socket(0x18, 0x1, 0x0) setsockopt(r2, 0x1000000029, 0xc, &(0x7f0000000040)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) (async) setsockopt(r2, 0x1000000029, 0xd, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$VNDIOCSET(r0, 0x80184404, &(0x7f00000001c0)={0x0, 0x0, 0x0}) (async) ioctl$VNDIOCSET(r0, 0x80044403, &(0x7f00000001c0)={0x0, 0xfffffffffffffffd, 0x0}) (async) r3 = socket(0x24, 0x2, 0x0) getsockname(r3, 0x0, &(0x7f0000000040)) 78.082295ms ago: executing program 3 (id=201): mknod(&(0x7f0000000280)='./file0\x00', 0x2000, 0x1e5f) r0 = open(&(0x7f0000000080)='./file0\x00', 0x80, 0x29) ioctl$WSMOUSEIO_SCALIBCOORDS(r0, 0x81205724, &(0x7f0000000100)={0x7ff, 0x8018, 0x2000007, 0x101, 0x80000001, 0x81b0, 0x10001, 0x10, [{0x0, 0x2890, 0x4, 0x71002}, {0x6, 0x9, 0x8, 0xfffffff9}, {0x104, 0xf88, 0x0, 0x9}, {0x4, 0x800, 0x8007, 0x7}, {0x401, 0x3, 0x2800, 0x7}, {0x1, 0x650, 0x3, 0x99}, {0xce1, 0xffffffff, 0x4f8, 0x6d}, {0x6, 0x803, 0x14, 0x8}, {0x2, 0x82, 0x5, 0x5}, {0x6a75, 0x8001, 0x1000, 0x4}, {0x1cc, 0x10001, 0xc, 0x3}, {0x8, 0x9, 0x8, 0x2}, {0xb94, 0x7, 0x4, 0x1}, {0x29a71717, 0xfffffffa, 0x1, 0x6}, {0x1000c, 0x5, 0x5, 0x10000000}, {0x0, 0x1, 0xfff, 0x30004}]}) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x3, 0x5012, 0xffffffffffffffff, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000b40)="820000ec3d1e6ed7eda0f59047bf65b18d7c51f78b06ccffb405e0a9f5c9a92f13942840fafd3493857d02000000093d34", 0x31}], 0x1, 0x0, 0x0, 0x40b}, 0x4) r1 = openat$pf(0xffffffffffffff9c, &(0x7f0000000700), 0x82, 0x0) ioctl$TIOCSETA(r1, 0xc4504445, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, "97a2224ff1c14649ebb178926cc9795a6b47c1d1"}) r2 = syz_open_pts() ioctl$FIOASYNC(r2, 0x8004667d, &(0x7f0000000000)=0x5bc) sysctl$kern(&(0x7f0000000040)={0x1, 0xa}, 0x2, &(0x7f0000000200)="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"/274, &(0x7f0000000080)=0x112, 0x0, 0x0) syz_open_pts() sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) syz_open_pts() 77.818942ms ago: executing program 3 (id=202): mknod(&(0x7f0000000280)='./file0\x00', 0x2000, 0x1e5f) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x8000, 0xa) ioctl$WSMOUSEIO_SCALIBCOORDS(0xffffffffffffffff, 0x81205724, &(0x7f0000000100)={0x800007ff, 0x17, 0x2000007, 0x101, 0x80000001, 0x80000081, 0x5, 0x10, [{0x0, 0x101, 0x4, 0x71000}, {0x7, 0x85, 0x20008, 0x7}, {0x8, 0x6, 0x0, 0x9}, {0x3, 0x900, 0xe}, {0x401, 0x200326, 0x2800, 0x7}, {0x82, 0x27f6, 0x4, 0x99}, {0x5, 0x4, 0x4f8, 0x6d}, {0xc, 0x801, 0x8, 0x4}, {0xffffffff, 0x82, 0x9, 0x9}, {0x7, 0x100, 0x5, 0x1088}, {0x1e6, 0x10005, 0xc, 0x6}, {0x7fe, 0x9, 0x8}, {0xb8e, 0x4, 0x8, 0x4}, {0x29a7171c, 0x3, 0x1, 0x5}, {0xfffffe00, 0x7, 0x4, 0xffffffff}, {0x0, 0x1, 0x1002, 0x1}]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$VNDIOCSET(r0, 0x80184404, &(0x7f00000001c0)={0x0, 0x0, 0x0}) ioctl$VNDIOCSET(r0, 0x80044403, &(0x7f00000001c0)={0x0, 0x2, 0x0}) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x3, 0x5012, 0xffffffffffffffff, 0x0) ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f00000000c0)=[{0x0, 0x3, 0x0, 0x4}, {0x7, 0x0, 0x40, 0x20000}, {0x103, 0x0, 0x0, 0x10001}]}) sysctl$kern(&(0x7f00000000c0)={0x1, 0x3d}, 0x2, &(0x7f0000000100)="71f91e3471ac0058bc5a91501d94a34b8e5f84cf71b59c7afec37082", &(0x7f0000000080)=0x1c, 0x0, 0x0) execve(0x0, &(0x7f00000002c0)=[&(0x7f0000000100)='tap'], 0x0) r1 = socket(0x18, 0x3, 0x0) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0xffffffff, 0xb, {0x0, 0x1}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x1, 0x0) setsockopt(r2, 0x1000000029, 0xc, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x10000, 0x1) ioctl$VNDIOCCLR(r0, 0x80384601, &(0x7f0000000380)={&(0x7f0000000300)='./file0\x00', 0x1, &(0x7f0000000340)='./file0\x00', 0x8}) openat(r3, &(0x7f0000000240)='./file0\x00', 0x1, 0x0) setsockopt(r2, 0x1000000029, 0xd, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) ioctl$FIONREAD(r1, 0xc028698a, &(0x7f0000000100)) 76.442286ms ago: executing program 2 (id=203): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f00000001c0)=@abs={0x0, 0x0, 0x0}, 0x8) (async) syz_emit_ethernet(0x17a, &(0x7f0000000000)=ANY=[@ANYBLOB="f3a2a8908a78aaaaaaaaaabb86dd601ab5b6000000009fa70000000000000000000000000000ff020000000000000000000000000001"]) (async) r2 = getpid() (async) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) (async) setgroups(0x0, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x0, 0x510, r2) (async) setrlimit(0x1, &(0x7f0000000180)={0x200, 0x961}) (async) setgid(0xffffffffffffffff) (async) r4 = socket(0x11, 0x3, 0x0) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001780)={0x0, 0x0, 0x0}, 0x0) sendto$unix(r4, &(0x7f0000000300)="b1000504000004000000000001000000331c13fecea10500fef96ec0c72fd3357ae30200124e3003000000acf20b7804be38164991f7c8cf5f882b297be1aa0500000051e2f0ad3ebbc257699a1f139b672f4d335c223e7d0c032bfa896443a4210200000072ea6e2ec5890400000000008000011b4cc702fac500002021fbfa0c0b9a590f00008abfba221554f4e0f668f86c0900000008e371a3f8343712051eea040000000000000000000000000000000000d59c76ea9aa88fcc9fc7776ed87d87aee8d4e3a0fefa7ad89a575326c4406084c861f637b4c2f28aa8f6a9a099b2ad217401b6eecae7788cf1270569ced50c66436befe6139c2da03ae983eb06dc6119692151d648a35a", 0xb1, 0x2, 0x0, 0x15) (async) recvmmsg(r4, &(0x7f0000000100)={&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}}, 0x10, 0x2, 0x0) readv(r1, &(0x7f0000000040)=[{0x0}], 0x1000000000000205) r5 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) (async) pwrite(r3, &(0x7f0000000240)="4c1f5fb9499c5afda01cc6624cabfc4e7fd3ff78126318542c277b245fdc3b921dd21d88545cac49be6a94b000d64d7aa8db1ada8faf51b55b0317a20434fb03ff11658060fe6d0c46300176db6903193675be4c3df7367a5d204d3795db964619a6332d16eb0753485d136f811f094789883f440f6a8fa26308c8b173dc5bc073b72b372880a545880218fa42c032385566b08598cdcca5ea3054ba1f813c814dadfdafa2c78f454b93fe6421518cb18766d2a714ff38ef9e14298d9b71", 0xbe, 0x10001) ioctl$TIOCSETA(r5, 0xc0205603, &(0x7f0000000040)={0x4, 0x3, 0x3, 0x8, "97a66256da4500000008000000000000e1ffff03", 0x0, 0x5}) (async) sendto$inet(r5, &(0x7f0000000080)="f0470bf9c19df1e93327e7ee395de46d1d71c5e322faf3ecdd114b20ad303155aeca1252d85a47c7d4ffca757bebf542b0fca7f4619363eabb4a7985b01825e8eee8aef6dcd236ed9456f4df184bd3d718b99e5331baea36d1651325cf0c1b593ab2be5378ca057fad5ccb2150accbe6e9768652ae0d6dec7cc8c7d0baba277d98da7f0af4d737958d5cc29051d43a613a41c93944e332e023f55e8038c7ef1d675bd5ccb87e0692be4edf6282ecc9cac29bb0d1fd1c61242d4b8e287cdea6ee71ea2f56e3cb400d45320156c58acdf5ef72e9a92a0d36db002dad1cdb84aceee367b0c8045f1e2fbdf03956b89ee534f1e4b9785123", 0xf6, 0x1, &(0x7f0000000180)={0x2, 0x1}, 0xc) chmod(&(0x7f0000000000)='./file0\x00', 0x42) 7.789059ms ago: executing program 2 (id=204): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) socket$inet(0x2, 0x1, 0x0) r0 = socket(0x11, 0x3, 0x7) sendto$unix(r0, &(0x7f0000000480)="b10005136000009f05003e0800000000331c13fecea10500fef96ecfc72fd3357a068d02bc31a3a5673039d2d236acf20b7804be38164991f7cccf5f882b297be1aa5b23edeb51e2f0ac3ebbc257699a1f139b672f4d335c223e7d026ba8faff0037282112000000720fd38bfbb770c1f5a872c881e2772ec5a10400000000000000361b1257aea8c5d0002012000000000000880d6633c556ae9b287948a62310db415f779642cdcd71a3f8343712051e", 0xb1, 0x9000000000000000, 0x0, 0x0) r1 = accept$inet(r0, &(0x7f0000000080), &(0x7f0000000100)=0xfffffffffffffd51) getpeername$inet(r1, &(0x7f00000002c0), &(0x7f0000000040)=0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mknod(&(0x7f0000000000)='./file0\x00', 0x2000, 0x637e) select(0x40, &(0x7f00000000c0)={0xd5d3, 0xf9, 0x3, 0x7fffffff, 0x4, 0x0, 0x3, 0x3}, 0x0, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f00000000c0), 0x8, &(0x7f0000000380)=[{{}, 0x0, 0x93, 0x8, 0x869f, 0x2}, {{}, 0xfffffffffffffffa, 0x20, 0x1, 0x1, 0x3}, {{}, 0xfffffffffffffffc, 0x28, 0x80000012, 0x9, 0x2}, {{r1}, 0xfffffffffffffffa, 0x84, 0x8, 0x0, 0x2}, {{}, 0xfffffffffffffffb, 0x10, 0x4, 0xfffffffffffffffb, 0x98}], 0x15, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x100) ioctl$WSMOUSEIO_SCALIBCOORDS(0xffffffffffffffff, 0x81205724, &(0x7f0000000100)={0x4, 0x1, 0x7, 0x6, 0x3, 0x80002001, 0x8, 0x10, [{0x0, 0x7, 0x4, 0x3}, {0x7, 0x4, 0x8, 0x7}, {0x6, 0xda, 0x100}, {0x5, 0x8, 0x7, 0x3}, {0xa, 0xfffffffa, 0xe, 0x7}, {0x5, 0x7, 0xffffffff, 0x9c}, {0x80000cdf, 0x1, 0x5, 0x6d}, {0x20006, 0x803, 0x14, 0x8}, {0x2, 0x81, 0x1, 0x9}, {0x3ff, 0x8001, 0xc7, 0x87}, {0x8000, 0xfffb, 0x9, 0xaeb}, {0x803, 0x40, 0x8, 0x5}, {0xe0, 0x4, 0x5, 0x3ff}, {0x29a71717, 0xfffffffa, 0x5, 0x100006}, {0x4, 0x7, 0x7}, {0x0, 0x5, 0x4, 0x7}]}) select(0x40, &(0x7f0000000180)={0xfffffffffffffff9, 0x44809e9c, 0xffffffffffffffff, 0xfffffffffffffffd, 0x56db, 0x181c, 0x8, 0x2000000000000004}, 0x0, 0x0, 0x0) ioctl$FIONBIO(r3, 0x82907003, &(0x7f0000000240)=0x1f71) mknod(0x0, 0x2000, 0x1e5f) open(0x0, 0x8000, 0xa) r4 = socket$inet(0x2, 0x2, 0x0) close(r4) r5 = socket(0x2, 0x3, 0x0) ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f00000001c0)={0x2000000000000243, &(0x7f0000000100)}) r6 = socket(0x1, 0x2, 0x0) ioctl$FIONREAD(r6, 0xc0106924, &(0x7f00000001c0)) r7 = kqueue() kevent(r7, &(0x7f00000000c0), 0x101, &(0x7f0000000180), 0x6, 0x0) ioctl$FIONREAD(r5, 0xc0206921, &(0x7f00000001c0)) r8 = socket(0x2, 0x2, 0x0) ioctl$FIONREAD(r8, 0x80206919, &(0x7f00000001c0)) r9 = socket(0x2, 0x2, 0x0) ioctl$FIONREAD(r9, 0x8020690c, &(0x7f00000001c0)) 6.939984ms ago: executing program 3 (id=205): chroot(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x2) setgid(0xffffffffffffffff) setgroups(0x0, 0x0) fchmod(r0, 0x1b7) setuid(0xffffffffffffffff) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0x0) 0s ago: executing program 2 (id=206): r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x100, 0x14) openat(r0, &(0x7f0000000040)='./file0\x00', 0x80, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x4, 0xd27d43220c7df9f, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x80000000000206, 0x7) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x0, 0x20) preadv(r2, &(0x7f00000012c0)=[{0x0}], 0x1, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x10, r1, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) syz_emit_ethernet(0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="a1"]) mknod(&(0x7f0000000280)='./file0\x00', 0x2000, 0x1e5f) r3 = open(&(0x7f0000000080)='./file0\x00', 0x8000, 0xa) pledge(0x0, &(0x7f0000000000)='tty \x04 \x00\x02\x00!\a\x9bp^|#\xcbhl\x97\xa3_\xbc\x04\x9d!\xd9\x9f\x9f\xb4\x96\x13\x12\xe0\r\xe7\xb9E\b\x00\x00\x00l\xaaY\xe1Q<\x19\xc0\xf6Yf\x9au^\xa0\xc9j\xdd-I\x01\x04\x00w\xf7\x15\x04\xa6\x82aY\x1d\xd7\f>Y\x06\"\xad\xb6\x88_\xeb\at\x91\xd3\xbf\xea\xddt\xe0\bt\x03\x00\x00\x00H\xa7-\xaaw\xcet\x044\xc5\xa9e\xa9\xf6\x1b\x8e\x05\x86\x91IsC\xb9ul\xaeu\x94\x9b\xaf\x04\xc4\x03\"F\x8f\xd5\xe8\r\x8d\xa1\x00\xcc\xd7\xa0\xe1\xeb\xc1>\xbd\t\xc8\x15+\xb0, \xee\xa4\xa6\xb9a\x01&\xadrj\xd5\xc26p\xa14\xe0\xbf\xa0\x1es\x01=\xdbd\xf0?=\x8afcJ\x8eYEn\xd4<\x00\xec\xe4^\x00\x00\x00\xca\x90\xfa\x98\xc9gty\xce\xab\xd2\xa1\x85E\xe4\xa9\xd5\xab\x83\xda?w\x83\xbc\xcf\xd20(L&b\xed\x8c\x1d\x1a\x9fd\x99H\x9e\x82\x10\xea\x05\xf8\xff\xff\xff\xff\xff\xff\xff\x00\x00\x00\x00\xa6\x8c\x05n\x83\x83\x12+\x16\xc1\x00\x04\x00\x00\x13:o\x0f\x1fB\xa4\x00wB\x92h\xde\xfal3\x88e\x04J\\\x1bD\xae`\x8e\xadd\xa8;\xee\xc4K\xe8]\x84\x90\xb8d\xfb\x95\xb3\xe9(x_\x80]\xadW\xd5\xa9\xaa\x03\x9c6\xa9\xc4\x01\x03\xea\xe5\x90\x85\x16\xb0DV\x13\x01\xab\x01\xf0\x8f\x02\xc2\xc8\x9b\x03\x1f\xd7\xdbN\\\xc0\xcd?Pg\xd5q\x13\xbd \xfa\xab\xccJK\x11\\\x16~#P.\xc9K\x15r\x04\xd9Z;\xc0/\x80vI\x94\x0f6>]\x84a\xf7\x8dOze\x96\xe9\xc3\x93\xed\x94.\xc2\xa0\x1fU#\x96\xe6\xb6C\xfa\x03/\x8b\x0e2\xec\x96v\x9b/.\v\x9e\x80\x18s\xae.\xf4\x14KS`\x87\x8b4\t\x00\x87{\xa8@e\xbfe\xeb\xee\xa2\xe72\xb8Q:\x9f\xc2b\x897\xbe\r\x04\xdf\xe2\xc0\xf0FV\'m\xcbm\x80%\xfc\x9e\x9f\x87\x80A\xbe\xc2\x00\x00\x00\x00\x00\x006\x96\xbb\x9f\x85\x98\xc4\xcd\xb0\b9G\xcag\fY\xe6\r\xcdT\xd3\x1c(\xef\xc0\x038\xbd\xdd\xd9\xc9\x93a]q\xd2\x9b\a\x1e\xf8\xc3\"\xc8:\xb8\t\x9f\'P\x17\xfa\xf3Xa\trB-\xf2g\xe6Z\xd5\xd2\x80\xe0\x99\"\xc12\xe8\b\xc58\x00\xe5\xab10{\x9c\xa7\xf4(\xd3\xdf\xea\xf5nM<\xda@o\x13\xf3\x98\xaa\xdb5J\xe3~5GBwu\xa7N@m9\xfc\x88Kmb\x85\x12\xe7^4%\x8c\x17\x161\xdd\xf7H\xf3\x10\xee\xd4\'n\xa6\\\xe8\xac\xd5m,\xd0\xd0!\t#U\xb9\xd7\xb8\x8b\x97l\x17\x1b\xc6\xcc6\x13\xb6R\xad\xa6\x94\xc9%\xf1/') ioctl$WSMOUSEIO_SCALIBCOORDS(r3, 0x81205724, &(0x7f0000000100)={0x8, 0x17, 0x2000004, 0x101, 0x80000001, 0xb, 0x5, 0x10, [{0x0, 0x7, 0x4, 0x71001}, {0x7, 0x88, 0x8, 0x7}, {0x8, 0x6, 0x0, 0x9}, {0x1, 0x900, 0x4}, {0x401, 0x200326, 0x2800, 0x7}, {0x2, 0x27f3, 0x3, 0x99}, {0xce1, 0x4, 0x4f8, 0x6}, {0x5, 0x801, 0x8, 0x7}, {0x2, 0x82, 0x20005, 0x9}, {0x7, 0x100, 0x1, 0x1088}, {0x1e6, 0x1, 0xc, 0x6}, {0x800, 0x5840, 0x8, 0x9}, {0xb8e, 0x4, 0x8, 0x4}, {0x29a7171a, 0x8, 0x0, 0x4}, {0xc, 0x7, 0x100001, 0xfffffffe}, {0x0, 0x1, 0x1002, 0x30005}]}) r4 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$WSKBDIO_SETENCODING(r4, 0x4004667b, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$VNDIOCSET(r3, 0x80184404, &(0x7f00000001c0)={0x0, 0x0, 0x0}) ioctl$VNDIOCSET(r3, 0x80044403, &(0x7f00000001c0)={0x0, 0xfffffffffffffffd, 0x0}) r5 = socket(0x1e, 0x3, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x3, 0x5012, 0xffffffffffffffff, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$FIONREAD(r5, 0x801169ab, &(0x7f00000001c0)) r6 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r6, 0x80105727, &(0x7f0000000040)={&(0x7f0000000000)=[{0x87, 0x101}, {0x100, 0x5}, {0x6, 0x1}], 0x3}) r7 = kqueue() kevent(r7, &(0x7f0000000140), 0xe4a, 0x0, 0x4000a9fa, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.77' (ED25519) to the list of known hosts. pckbd_enable: command error  e kernel: page fault trap, code=2 Stopped at copyout+0x57: repe movsq (%rsi),%es:(%rdi) TID PID UID PRFLAGS PFLAGS CPU COMMAND *492727 59152 0 0 0x4000000 0 syz-executor copyout() at copyout+0x57 syscall(ffff80003c9912a0) at syscall+0x962 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x847252d0ff0, count: 12 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs. ddb> ddb> set $lines = 0 ddb> set $maxwidth = 0 ddb> show panic *cpu0: uvm_fault(0xfffffd806ba328b0, 0x4920, 0, 2) -> e ddb> trace copyout() at copyout+0x57 syscall(ffff80003c9912a0) at syscall+0x962 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x847252d0ff0, count: -3 ddb> show registers rdi 0x4920 __ALIGN_SIZE+0x3920 rsi 0xffff80003c990f50 rbp 0xffff80003c9911d0 rbx 0x4000a7b1 rdx 0xffff80003c98c000 rcx 0x4 rax 0x20 r8 0x7f7fffffc000 r9 0xffff80003c990c68 r10 0xe31ef439f9de6f42 r11 0xffffffff82efca20 copy_fault r12 0x6 r13 0x16 r14 0xffff80003c990f50 r15 0xffff80003c9912a0 rip 0xffffffff82efc947 copyout+0x57 cs 0x8 rflags 0x50202 acpi_pdirpa+0x3c073 rsp 0xffff80003c990f20 ss 0x10 copyout+0x57: repe movsq (%rsi),%es:(%rdi) ddb> show proc PROC (syz-executor) tid=492727 pid=59152 tcnt=2 stat=onproc flags process=0 proc=4000000 runpri=32, usrpri=86, slppri=32, nice=20 wchan=0x0, wmesg=, ps_single=0x0 scnt=0 ecnt=0 forw=0xffffffffffffffff, list=0xffff80003c99f780,0xffff80003c99f260 process=0xffff80003c97ed20 user=0xffff80003c98c000, vmspace=0xfffffd806ba328b0 estcpu=36, cpticks=1, pctcpu=0.0, user=0, sys=1, intr=0 ddb> ps PID TID PPID UID S FLAGS WAIT COMMAND 71030 397355 26376 0 2 0 syz-executor 71030 117974 26376 0 3 0x4000080 fsleep syz-executor 59152 80187 14519 0 2 0 syz-executor *59152 492727 14519 0 7 0x4000000 syz-executor 72360 256880 68233 0 3 0x80 nanoslp syz-executor 72360 363874 68233 0 3 0x4000080 dtread syz-executor 72360 416300 68233 0 3 0x4000080 fsleep syz-executor 72360 349874 68233 0 3 0x4000080 fsleep syz-executor 12986 249455 25410 0 3 0x80 nanoslp syz-executor 12986 459624 25410 0 3 0x4000080 msgwait syz-executor 12986 82825 25410 0 3 0x4000080 msgwait syz-executor 12986 228069 25410 0 3 0x4000080 fsleep syz-executor 13175 475415 1 0 3 0x82 nanoslp getty 80186 158658 0 0 3 0x14200 acct acct 96098 161769 0 0 3 0x14200 bored sosplice 25410 367700 42724 0 3 0x82 nanoslp syz-executor 32 285004 42724 0 3 0x82 nanoslp syz-executor 4434 59883 42724 0 3 0x82 wait syz-executor 68233 1300 42724 0 3 0x82 nanoslp syz-executor 26376 131471 42724 0 2 0xc82 syz-executor 14519 327780 42724 0 3 0x82 nanoslp syz-executor 12322 233970 42724 0 2 0x2 syz-executor 5172 515247 42724 0 3 0x82 wait syz-executor 42724 316461 3524 0 3 0x82 kqread syz-executor 3524 296680 11727 0 3 0x10008a sigsusp ksh 11727 493646 19105 0 3 0x98 kqread sshd-session 19105 144699 86074 0 3 0x92 kqread sshd-session 86074 293954 1 0 3 0x88 kqread sshd 45061 474670 43733 73 3 0x1100090 kqread syslogd 43733 392599 1 0 3 0x100082 sbwait syslogd 40425 265309 1 0 3 0x100080 kqread resolvd 93541 425819 99970 77 3 0x100092 kqread dhcpleased 10589 93874 99970 77 3 0x100092 kqread dhcpleased 99970 101669 1 0 3 0x80 kqread dhcpleased 78223 221533 0 0 3 0x14200 bored smr 60131 140430 0 0 2 0x14200 zerothread 33754 53744 0 0 3 0x14200 aiodoned aiodoned 70959 382247 0 0 3 0x14200 syncer update 33390 304181 0 0 3 0x14200 cleaner cleaner 99723 100367 0 0 3 0x14200 reaper reaper 68824 263570 0 0 3 0x14200 pgdaemon pagedaemon 60236 194644 0 0 3 0x14200 bored viomb 13790 308423 0 0 3 0x40014200 acpi0 acpi0 92340 206870 0 0 3 0x14200 bored softnet7 65812 358941 0 0 3 0x14200 bored softnet6 12429 247326 0 0 3 0x14200 bored softnet5 29592 503216 0 0 3 0x14200 bored softnet4 50387 396751 0 0 3 0x14200 bored softnet3 35433 174442 0 0 3 0x14200 bored softnet2 6266 1023 0 0 3 0x14200 bored softnet1 38909 204610 0 0 3 0x14200 bored softnet0 6717 399816 0 0 3 0x14200 smrbar systqmp 44376 490174 0 0 3 0x14200 bored systq 64643 363611 0 0 2 0x40014200 softclock 92292 174808 0 0 3 0x40014200 idle0 1 188899 0 0 3 0x82 wait init 0 0 -1 0 3 0x10010200 scheduler swapper ddb> show all locks No such command ddb> show malloc Type InUse MemUse HighUse Limit Requests Type Lim devbuf 10206 11094K 11239K 166960K 11559 0 pcb 17 16K 18K 166960K 238 0 rtable 215 8K 8K 166960K 341 0 pf 32 13K 15K 166960K 54 0 ifaddr 42 7K 7K 166960K 59 0 ifgroup 54 2K 2K 166960K 71 0 sysctl 3 1K 9K 166960K 8 0 counters 33 17K 18K 166960K 46 0 ioctlops 0 0K 4K 166960K 63 0 iov 0 0K 16K 166960K 17 0 mount 1 1K 1K 166960K 1 0 log 0 0K 0K 166960K 4 0 vnodes 1441 91K 91K 166960K 1614 0 UFS quota 1 32K 32K 166960K 1 0 UFS mount 5 36K 36K 166960K 5 0 shm 2 1K 5K 166960K 4 0 VM map 2 1K 1K 166960K 2 0 sem 8 0K 0K 166960K 10 0 dirhash 12 2K 2K 166960K 18 0 ACPI 1692 195K 286K 166960K 12470 0 file desc 17 61K 93K 166960K 338 0 sigio 0 0K 0K 166960K 5 0 proc 61 67K 75K 166960K 510 0 subproc 72 4K 4K 166960K 73 0 NFS srvsock 1 0K 0K 166960K 1 0 NFS daemon 1 16K 16K 166960K 1 0 ip_moptions 0 0K 0K 166960K 28 0 in_multi 95 7K 7K 166960K 122 0 ether_multi 1 0K 0K 166960K 3 0 mrt 1 0K 0K 166960K 5 0 ISOFS mount 1 32K 32K 166960K 1 0 MSDOSFS mount 1 16K 16K 166960K 1 0 ttys 79 360K 360K 166960K 79 0 exec 0 0K 1K 166960K 369 0 fusefs mount 1 32K 32K 166960K 1 0 pfkey data 0 0K 0K 166960K 1 0 tdb 3 0K 0K 166960K 3 0 VM swap 8 62K 64K 166960K 10 0 UVM amap 234 159K 167K 166960K 4487 0 UVM aobj 7 4K 4K 166960K 7 0 pinsyscall 38 76K 92K 166960K 1374 0 memdesc 1 4K 4K 166960K 1 0 crypto data 1 1K 1K 166960K 1 0 ip6_options 0 0K 0K 166960K 18 0 NDP 12 0K 2K 166960K 37 0 temp 46 8640K 8704K 166960K 17830 0 kqueue 13 20K 26K 166960K 63 0 SYN cache 2 16K 16K 166960K 2 0 ddb> show all pools Name Size Requests Fail Releases Pgreq Pgrel Npage Hiwat Minpg Maxpg Idle rtpcb 120 58 0 55 1 0 1 1 0 8 0 rtentry 136 112 0 22 4 0 4 4 0 8 0 unpcb 144 134 0 117 1 0 1 1 0 8 0 syncache 336 3 0 3 1 0 1 1 0 8 1 tcpcb 736 71 0 66 1 0 1 1 0 8 0 arp 88 13 0 2 1 0 1 1 0 8 0 ipq 40 1 0 0 1 0 1 1 0 8 0 ipqe 40 1 0 0 1 0 1 1 0 8 0 inpcb 328 462 0 454 12 3 9 12 0 8 8 nd6 104 19 0 4 1 0 1 1 0 8 0 pkpcb 40 3 0 2 1 0 1 1 0 8 0 kcovpl 48 8 0 0 1 0 1 1 0 8 0 mppekey 1024 1 0 1 1 0 1 1 0 8 1 ppxss 1072 12 0 12 1 0 1 1 0 8 1 pppxif 1384 1 0 1 1 0 1 1 0 8 1 pftag 88 1 0 0 1 0 1 1 0 8 0 pfrule 1344 3 0 3 1 0 1 1 0 8 1 rttmr 136 1 0 1 1 0 1 1 0 8 1 art_heap8 4096 2 0 0 2 0 2 2 0 8 0 art_heap4 256 551 0 108 30 0 30 30 0 8 1 art_table 40 553 0 108 5 0 5 5 0 8 0 art_node 32 112 0 29 1 0 1 1 0 8 0 sysvmsgpl 40 8 0 4 1 0 1 1 0 8 0 semupl 112 1 0 1 1 0 1 1 0 8 1 semapl 112 7 0 1 1 0 1 1 0 8 0 shmpl 112 4 0 0 1 0 1 1 0 8 0 dirhash 1024 21 0 4 3 0 3 3 0 8 0 dino2pl 256 1986 0 479 95 0 95 95 0 8 0 ffsino 256 1986 0 479 95 0 95 95 0 8 0 nchpl 144 2482 0 797 63 0 63 63 0 8 0 rtmask 32 4 0 4 1 0 1 1 0 8 1 uvmvnodes 80 2236 0 0 46 0 46 46 0 8 0 vnodes 216 2236 0 0 125 0 125 125 0 8 0 namei 1024 7878 0 7877 2 0 2 2 0 8 1 kstatmem 264 38 0 14 2 0 2 2 0 8 0 scsiplug 72 2 0 2 1 0 1 1 0 8 1 scxspl 216 9079 0 9079 8 0 8 8 1 8 8 plimitpl 152 54 0 38 1 0 1 1 0 8 0 sigapl 424 626 0 575 7 0 7 7 0 8 1 knotepl 120 9726 0 9678 9 0 9 9 0 8 7 kqueuepl 184 85 0 72 1 0 1 1 0 8 0 pipepl 304 115 0 88 3 0 3 3 0 8 0 fdescpl 448 603 0 574 5 0 5 5 0 8 1 filepl 120 3087 0 2857 11 0 11 11 0 8 2 lockfpl 104 146 0 142 1 0 1 1 0 8 0 lockfspl 48 37 0 34 1 0 1 1 0 8 0 sessionpl 144 21 0 14 1 0 1 1 0 8 0 pgrppl 48 30 0 15 1 0 1 1 0 8 0 ucredpl 104 286 0 274 1 0 1 1 0 8 0 zombiepl 144 578 0 575 1 0 1 1 0 8 0 processpl 1152 626 0 575 5 0 5 5 0 8 1 procpl 664 944 0 885 6 0 6 6 0 8 0 sockpl 552 664 0 635 12 1 11 12 0 8 8 mcl64k 65536 20 0 20 1 0 1 1 0 8 1 mcl16k 16384 1 0 1 1 0 1 1 0 8 1 mcl8k 8192 6 0 6 1 0 1 1 0 8 1 mcl4k 4096 2694 0 2643 14 0 14 14 0 8 7 mcl2k 2048 464 0 457 3 0 3 3 0 8 2 mtagpl 96 5 0 4 1 0 1 1 0 8 0 mbufpl 256 7231 0 7040 75 54 21 75 0 8 8 bufpl 280 3443 0 118 238 0 238 238 0 8 0 anonpl 24 109533 0 106324 23 0 23 23 0 187 2 amapchunkpl 152 13649 0 13151 22 0 22 22 0 158 1 amappl16 200 1939 0 1909 5 0 5 5 0 8 2 amappl15 192 3 0 3 1 0 1 1 0 8 1 amappl14 184 126 0 115 1 0 1 1 0 8 0 amappl13 176 22 0 22 1 0 1 1 0 8 1 amappl12 168 1217 0 1188 3 0 3 3 0 8 1 amappl11 160 45 0 35 1 0 1 1 0 8 0 amappl10 152 17 0 17 1 0 1 1 0 8 1 amappl9 144 269 0 269 1 0 1 1 0 8 1 amappl8 136 22 0 21 1 0 1 1 0 8 0 amappl7 128 98 0 87 1 0 1 1 0 8 0 amappl6 120 175 0 171 1 0 1 1 0 8 0 amappl5 112 120 0 114 1 0 1 1 0 8 0 amappl4 104 273 0 256 1 0 1 1 0 8 0 amappl3 96 2263 0 2165 3 0 3 3 0 8 0 amappl2 88 827 0 757 2 0 2 2 0 8 0 amappl1 80 8867 0 8311 13 0 13 13 0 8 0 amappl 88 3806 0 3638 5 0 5 5 0 92 1 dma4096 4096 1 0 1 1 0 1 1 0 8 1 dma1024 1024 1 0 0 1 0 1 1 0 8 0 dma256 256 6 0 6 1 0 1 1 0 8 1 dma128 128 254 0 254 1 0 1 1 0 8 1 dma64 64 6 0 6 1 0 1 1 0 8 1 dma32 32 7 0 7 1 0 1 1 0 8 1 dma16 16 20 0 19 1 0 1 1 0 8 0 aobjpl 72 6 0 0 1 0 1 1 0 8 0 uaddrrnd 24 603 0 574 1 0 1 1 0 8 0 uaddrbest 32 2 0 0 1 0 1 1 0 8 0 uaddr 24 603 0 574 1 0 1 1 0 8 0 vmmpekpl 168 6187 0 6161 2 0 2 2 0 8 0 vmmpepl 168 44050 0 42179 85 0 85 85 0 357 0 vmsppl 368 602 0 574 4 0 4 4 0 8 1 rwobjpl 40 16256 0 13148 32 0 32 32 0 8 0 pdppl 4096 1212 0 1148 94 28 66 80 0 8 2 pvpl 32 270210 0 261645 82 0 82 82 0 265 7 pmappl 216 602 0 574 3 0 3 3 0 8 0 extentpl 40 45 0 27 1 0 1 1 0 8 0 phpool 112 431 0 82 12 0 12 12 0 8 1 ddb> machine ddbcpu 0 No such command ddb> trace copyout() at copyout+0x57 syscall(ffff80003c9912a0) at syscall+0x962 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x847252d0ff0, count: -3 ddb> machine ddbcpu 1 No such command ddb> trace copyout() at copyout+0x57 syscall(ffff80003c9912a0) at syscall+0x962 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x847252d0ff0, count: -3