kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Dec 27 17:13:41 PST 2019 OpenBSD/amd64 (ci-openbsd-main-5.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.55' (ECDSA) to the list of known hosts. 2019/12/27 17:13:54 fuzzer started 2019/12/27 17:13:59 dialing manager at 10.128.15.235:29394 2019/12/27 17:13:59 syscalls: 337 2019/12/27 17:13:59 code coverage: enabled 2019/12/27 17:13:59 comparison tracing: enabled 2019/12/27 17:13:59 extra coverage: support is not implemented in syzkaller 2019/12/27 17:13:59 setuid sandbox: enabled 2019/12/27 17:13:59 namespace sandbox: support is not implemented in syzkaller 2019/12/27 17:13:59 Android sandbox: support is not implemented in syzkaller 2019/12/27 17:13:59 fault injection: support is not implemented in syzkaller 2019/12/27 17:13:59 leak checking: support is not implemented in syzkaller 2019/12/27 17:13:59 net packet injection: enabled 2019/12/27 17:13:59 net device setup: support is not implemented in syzkaller 2019/12/27 17:13:59 concurrency sanitizer: support is not implemented in syzkaller 2019/12/27 17:13:59 devlink PCI setup: support is not implemented in syzkaller 17:14:06 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0xa, 0xffffffffffffff9c) ioctl$TIOCSDTR(r0, 0x20007479) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x10040, 0x1) openat(r1, &(0x7f0000000040)='./file0\x00', 0x20, 0xa) r2 = fcntl$dupfd(0xffffffffffffffff, 0xf, 0xffffffffffffffff) ioctl$SPKRTUNE(r2, 0x20005302, &(0x7f0000000080)={0x9, 0x3}) ioctl$TIOCEXCL(r2, 0x2000740d) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000100)={0x0, 0x0}, 0xc) r4 = getgid() fchownat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', r3, r4, 0x5) ioctl$TIOCSTOP(r2, 0x2000746f) r5 = dup(0xffffffffffffffff) ioctl$WSDISPLAYIO_GETEMULTYPE(r5, 0xc014575e, &(0x7f0000000140)={0xfffffff7, './file0\x00'}) msgsnd(0xffffffffffffffff, &(0x7f0000000180)={0x7, "ce4aa72c05e981e27865991440452f7c2f354daf38b54597c7d291"}, 0x23, 0x1800) recvfrom$inet6(r0, &(0x7f00000001c0)=""/4096, 0x1000, 0x42, &(0x7f00000011c0)={0x18, 0x3, 0x1, 0x401}, 0xc) open(&(0x7f0000001200)='./file0\x00', 0x100, 0x25) r6 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000001240)='/dev/ttyCcfg\x00', 0x800, 0x0) ioctl$WSDISPLAYIO_DELSCREEN(r6, 0x80085754, &(0x7f0000001280)={0x7}) r7 = openat$zero(0xffffffffffffff9c, &(0x7f00000012c0)='/dev/zero\x00', 0x20, 0x0) r8 = accept$unix(0xffffffffffffffff, &(0x7f0000001540)=@abs, &(0x7f0000001580)=0x8) r9 = openat$wskbd(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/wskbd0\x00', 0x8, 0x0) sendmsg$unix(r7, &(0x7f0000001640)={&(0x7f0000001300)=@abs={0x1, 0x0, 0x1}, 0x8, &(0x7f0000001500)=[{&(0x7f0000001340)="e05fa17438832ae94a2b38e29e7248f835ccd9101a73c7b048afb06058a55270a88a0157ee7f6870f99e5cb2e07237fc2cbe16c9e00975ceababda249e56d921f2a93b7a883818fa32a54c4c49a7f7f4f09b953f50729074ea595c90499b01644058be0308ac6b031aa349384d5c45d6b71db103067ecd3e2f9e336c0b29e85ecf6cc0eca95520d8c68477bb6ef4556fc9ee01279ee353c8426f7620a2999cadf69d16a09089e0cee52b7f735b9637a0839689ec3acf09ed79be93a3d7f921cd120732f0a2d6bdb0397a2653c9ad4789d206059a10629a265ffb5de61618e6f1ce9ab7513d8e964bf626263a6c65f55ed7fa6f7a", 0xf4}, {&(0x7f0000001440)="f7b648efbc143fe58a6e885aeaa7440b997deec31ef32c052eb33405cc3a6b81faefcdf8ac7f2eaf0783980342740b9718aa687ac62963419a9048a24a7df4c54feadb6de8cbe6ea68a78a929ced2441844ab116579cad6df9173eec91af0d801c9c25724042f6631f104d9b7d29ff67590298ee7a16747a5bb660bb0a9c795588f9cca0120312f96848", 0x8a}], 0x2, &(0x7f0000001600)=[@rights={0x20, 0xffff, 0x1, [r8, r9, r0, r6]}], 0x20, 0x403}, 0x7) r10 = syz_open_pts() fcntl$getflags(r10, 0x3) r11 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000001680)='/dev/wsmouse0\x00', 0x100, 0x0) fcntl$setflags(r11, 0x2, 0x2) pipe(&(0x7f00000016c0)={0xffffffffffffffff}) ioctl$TIOCGFLAGS(r12, 0x4004745d, &(0x7f0000001700)) r13 = openat$null(0xffffffffffffff9c, &(0x7f0000001740)='/dev/null\x00', 0x800, 0x0) ioctl$TIOCDRAIN(r13, 0x2000745e) 17:14:06 executing program 1: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x8, 0x7) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x4) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x8) chdir(&(0x7f0000000100)='./file0/../file0\x00') open$dir(&(0x7f0000000140)='./file0\x00', 0x400, 0x52) connect(0xffffffffffffff9c, &(0x7f0000000180)=@in6={0x18, 0x0, 0x7, 0x6}, 0xc) r2 = socket$inet6(0x18, 0x1, 0x96) r3 = accept(r2, &(0x7f00000001c0)=@un=@file={0x0, ""/4096}, &(0x7f0000001200)=0x1002) r4 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) r5 = fcntl$dupfd(0xffffffffffffff9c, 0xa, 0xffffffffffffff9c) renameat(r4, &(0x7f0000001240)='./file0\x00', r5, &(0x7f0000001280)='./file0\x00') pipe2(&(0x7f00000012c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8f5457c67ddfa69d) ioctl$WSMOUSEIO_SETPARAMS(r7, 0x80105728, &(0x7f0000001340)={&(0x7f0000001300)=[{0x26, 0xfffffeff}], 0x1}) r8 = dup(0xffffffffffffffff) ioctl$WSDISPLAYIO_GETSCREENTYPE(r8, 0xc028575d, &(0x7f0000001380)={0x9, 0x7f, './file0\x00', 0x101, 0x4, 0x6435de4f, 0x8}) open(&(0x7f00000013c0)='./file0/../file0\x00', 0x1, 0x10) r9 = syz_open_pts() r10 = openat$bpf(0xffffffffffffff9c, &(0x7f0000001500)='/dev/bpf\x00', 0x80, 0x0) r11 = socket$unix(0x1, 0x5, 0x0) r12 = accept$unix(r6, &(0x7f0000001540)=@abs, &(0x7f0000001580)=0x8) r13 = openat$bpf(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/bpf\x00', 0x20000, 0x0) r14 = kqueue() sendmsg$unix(r3, &(0x7f0000001640)={&(0x7f0000001400)=@abs={0x0, 0x0, 0x0}, 0x8, &(0x7f00000014c0)=[{&(0x7f0000001440)="b4813442ab9aba6ef11b4abd762744e79eaeeb7400982ed673de9f05e3362d5dcd77f276ed87c6f9faf8935ad3d5ffe1a750dc30dfdb483a3c319ca5fd0944e38e2562450d81623495f94f38605da669ab67981e065aabc2a7f61b5a190d8a108d81bee9428a884e4cc969", 0x6b}], 0x1, &(0x7f0000001600)=[@rights={0x20, 0xffff, 0x1, [r9, r10, r11, r4]}, @rights={0x20, 0xffff, 0x1, [r12, r13, r14]}], 0x40, 0x410}, 0x0) ioctl$VT_GETSTATE(0xffffffffffffffff, 0x40067664, &(0x7f0000001680)) mlockall(0x0) r15 = openat$null(0xffffffffffffff9c, &(0x7f00000016c0)='/dev/null\x00', 0xa3, 0x0) ioctl$BIOCGDLTLIST(r15, 0xc010427b, &(0x7f0000001740)={0x4, &(0x7f0000001700)=[0x101, 0x8, 0x10, 0x7]}) open$dir(&(0x7f0000001780)='./file0\x00', 0x40, 0x0) ioctl$BIOCSETIF(r4, 0x8020426c, &(0x7f00000017c0)={'tap', 0x0}) ioctl$WSDISPLAYIO_GETSCREENTYPE(r5, 0xc028575d, &(0x7f0000001800)={0x4, 0x101, './file0/../file0', 0x8, 0x5, 0x4507, 0x6}) login: pckbd_enable: command error 17:14:07 executing program 1: r0 = kqueue() r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) readv(r1, &(0x7f0000000080), 0xa) setuid(0xee01) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt(r3, 0x29, 0x80000000000000d, &(0x7f0000000340)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r4 = socket(0x18, 0x1, 0x0) r5 = socket(0x6, 0x4, 0x0) setsockopt(r5, 0x800000000029, 0x40, &(0x7f0000000080)="d5ff9668", 0x4) fcntl$dupfd(r5, 0xf, r4) msgget(0x2, 0x121) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000200), 0xc) r6 = open(&(0x7f0000000180)='./bus\x00', 0x2, 0x6) ioctl$BIOCSHDRCMPLT(0xffffffffffffff9c, 0x80044275, &(0x7f0000000000)=0x80000001) getsockopt$SO_PEERCRED(r6, 0xffff, 0x1022, &(0x7f0000000400), 0xfffffffffffffdc2) getuid() getegid() fcntl$getown(r5, 0x5) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000001000)='/dev/vmm\x00', 0x80, 0x0) r8 = getpid() fcntl$lock(r7, 0x7, &(0x7f0000001040)={0x1, 0x2, 0x7fff, 0x100000000, r8}) r9 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) semctl$IPC_RMID(r9, 0x0, 0x0) r10 = socket$inet(0x2, 0x2, 0x0) r11 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x80, 0x0) setsockopt$inet_opts(r11, 0x0, 0x200000000000c, &(0x7f0000000240)="4f52f0bbbaf97cf1c9c29dca8413e83b0e767897cd9a7c304f4d387658cf2803899ea0cf16d49c5a801dc9a092526097d54d2aa7cb35913df8217ab4ee76f1a7712c030fafb9b4023aa6407d2d5a9c6ba4d82372c0da9c2766b80f4084357db9ee4ee04ede877793e4242a8fef2d020d6b9facb8c4b7f3c9db4925e0a9a4dc6a03dfbe217cdec3e0460aba325976006c64", 0x91) r12 = socket$inet(0x2, 0x4, 0x0) dup2(r10, r12) setsockopt$inet_opts(r12, 0x0, 0x208000000000c, 0x0, 0x0) ioctl$FIONBIO(r12, 0x8004667e, &(0x7f0000000140)=0x1000) shmctl$IPC_SET(r9, 0x1, 0xffffffffffffffff) shmctl$IPC_STAT(r9, 0x2, &(0x7f0000000040)=""/210) shmctl$IPC_SET(r9, 0x1, &(0x7f0000000080)={{0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x1e4, 0x8}, 0x5, 0x5, 0x0, 0x0, 0xfffffffffffffe41, 0x9, 0x7fe}) pckbd_enable: command error 17:14:08 executing program 0: write(0xffffffffffffffff, &(0x7f00000000c0)="5e90fcad16c835ba7e", 0x9) mknod(&(0x7f0000000180)='./file0\x00', 0x1ffb, 0x0) getgid() r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x50) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x400000002c5, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCFLUSH(r2, 0xc0106978, &(0x7f00000000c0)) 17:14:08 executing program 1: ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200], [0x0, 0x0, 0x0, 0x9, 0xffeffbffffffffff], [0x0, 0x0, 0x3fd]}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) listen(r0, 0x2) ioctl$TIOCFLUSH(r1, 0x8080691a, &(0x7f0000000300)) 17:14:08 executing program 0: r0 = kqueue() kevent(r0, 0x0, 0x0, &(0x7f0000000140), 0x80, &(0x7f00000000c0)={0x2000000000004}) kevent(r0, &(0x7f0000000040)=[{{}, 0xfffffffffffffff9, 0x87}], 0x5, 0x0, 0x0, 0x0) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r2, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r2, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r3 = fcntl$dupfd(r2, 0x0, r0) ioctl$BIOCSBLEN(r3, 0xc0044266, &(0x7f0000000180)=0x5) kqueue() ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r1, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x20, 0x80) poll(&(0x7f0000000000)=[{r1, 0x28}], 0x1, 0x7) 17:14:08 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300)='/dev/bpf\x00', 0x0, 0x0) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r2, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) r3 = accept(0xffffffffffffffff, &(0x7f0000000240)=@in6, &(0x7f0000000280)=0xc) fcntl$setflags(r3, 0x2, 0xa68e5e773151bda) pwrite(r2, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) ioctl$BIOCSBLEN(r2, 0xc0044266, &(0x7f00000001c0)=0x8) ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r1, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) poll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x2}, {r1, 0x10}], 0x200000000000022b, 0x5) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000100), &(0x7f0000000180)=0xc) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) syz_emit_ethernet(0xe, &(0x7f00000002c0)="2351ce9c802bd9a55b03144e7b14") r4 = socket(0x18, 0x1, 0x0) close(r4) getsockopt(r4, 0x200000029, 0x2c, 0x0, 0x0) r5 = msgget$private(0x0, 0x24) msgsnd(r5, &(0x7f0000000340)={0x0, "1528a3088611608357631450a1af7bb3a99d4603ada7d7a86e442585f7d7aae6c961c7d88493254572765e628bb54503632b7544cf72e7b437a14ed575f404b4dbb1483bc6bbf8834fa0b5bcae47598576b5969283058e4309a80a847f2bc7d8f857c2002953b6f4312fb43c62122fe293d5e28a9886b000124f7c0d05abde05963adf4c0b1e2384ccd436f14859c772d56b056ee3616fd581610c30424f"}, 0xa6, 0x800) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f00000000c0), 0xc) ioctl$BIOCSFILDROP(r0, 0x80044279, &(0x7f0000000000)=0x1) 17:14:08 executing program 0: ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BIOCPROMISC(r0, 0x20004269) r1 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0x66, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}, 0xc) r2 = dup(r1) setsockopt$inet6_MRT6_ADD_MIF(r2, 0x29, 0x66, &(0x7f0000000200)={0x3f, 0x1, 0x0, 0x3}, 0xc) r3 = socket$inet6(0x18, 0x3, 0x0) r4 = dup2(r3, r3) r5 = socket(0x18, 0x2, 0x0) r6 = fcntl$dupfd(r5, 0x0, r5) ioctl$TIOCFLUSH(r6, 0x8080691a, &(0x7f0000000300)) r7 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r7, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r7, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r7, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) fcntl$setflags(r7, 0x2, 0x0) chflagsat(r6, &(0x7f00000000c0)='./file0\x00', 0x1, 0x5) ioctl$VMM_IOC_RUN(r4, 0xc028756b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) 17:14:08 executing program 1: socket(0x2, 0x400000000002, 0x0) r0 = semget(0x3, 0x1, 0x720) semop(r0, &(0x7f0000000140)=[{0x0, 0x9, 0x1000}, {0x3, 0x9}, {0x2, 0xf9}], 0x3) r1 = socket(0x1, 0x4, 0x2) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffff9c) ioctl$VT_SETMODE(r2, 0x80087602, &(0x7f0000000200)={0x3, 0x4, 0xfc6d, 0x800, 0x1}) r3 = socket(0x18, 0x400000002, 0x0) r4 = syz_open_pts() ioctl$TIOCSTOP(r4, 0x2000746f) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000000c0), &(0x7f0000000100)=0x470c324c163a3843) r5 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000180)='/dev/bpf\x00', 0x80, 0x0) ioctl$BIOCGSTATS(r5, 0x4008426f, &(0x7f00000001c0)) r6 = accept$inet(r1, &(0x7f0000000000), &(0x7f0000000080)=0xc) setsockopt(r6, 0x0, 0x14, &(0x7f0000000040)="0700000f", 0x4) 17:14:09 executing program 0: socket$inet(0x2, 0x8000, 0x85) r0 = socket(0x18, 0x400000002, 0x0) setsockopt(r0, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) setsockopt$inet_opts(r0, 0x0, 0x21, 0x0, 0x0) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r2, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r2, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) pwrite(r2, &(0x7f00000000c0)="afc4c25b62bf9e66ec31c6b612252874c037f9f9755f107967a95afc6fc0c1f0b33df8fed1", 0x25, 0x0, 0x2) pwrite(r1, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) ioctl$FIONBIO(r1, 0x8004667e, &(0x7f0000000040)=0x20) 17:14:09 executing program 1: r0 = socket(0x2, 0x4003, 0x0) socketpair(0x0, 0xa55b52e364e2625f, 0x3, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000001580)=ANY=[], 0x0) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) writev(r0, &(0x7f0000000340)=[{0x0}], 0x1) 17:14:09 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000100)=[{{r1}, 0x0, 0x0, 0xf0000000}], 0x0, 0x0, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="3c4345600d904f159929dd01cd270e9d20e3d92df4c6bb9d207938cc60f9adcaefd287963745776151e293ef915c2af45607b73461bb281336beea14bd30e224c317aeebf7dff8f9c9647e6cb1448605"], 0x1) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x3}}) r2 = socket(0x6, 0x2, 0xff) r3 = socket(0x0, 0x7, 0x7c) r4 = openat(r0, &(0x7f0000000280)='.\x00', 0x80, 0x40) r5 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r5, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r5, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r5, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r6, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r6, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r6, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r7 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r7, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r7, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r7, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) kevent(r1, &(0x7f00000002c0)=[{{r3}, 0xfffffffffffffffa, 0x2, 0x4, 0x4, 0xffffffffffffffa1}, {{r4}, 0x7, 0x40, 0x40000000, 0x100, 0x8}, {{r2}, 0xfffffffffffffffc, 0x10, 0x8, 0xff, 0xff}, {{r5}, 0xfffffffffffffffc, 0x80, 0x0, 0x9, 0x5}, {{r0}, 0xfffffffffffffffa, 0x0, 0x4, 0xfffffffffffffff7, 0x7}], 0x8, &(0x7f0000000380)=[{{r1}, 0xfffffffffffffffb, 0xe9, 0x20000000, 0x6, 0xaa}, {{r2}, 0xfffffffffffffffc, 0x80, 0x80, 0xb4dd, 0x6}, {{r6}, 0xfffffffffffffff9, 0x44, 0x14, 0x9, 0x2}, {{r7}, 0x7, 0xc86e45498f5db27b, 0x20000000, 0x6ae0, 0xfffffffffffffbff}, {{r0}, 0xfffffffffffffffd, 0xe1dac7e5fa1b733d, 0x2, 0x7fff, 0xb45}, {{r1}, 0xfffffffffffffff8, 0x22, 0x80000010, 0x1, 0x8}], 0x2, &(0x7f0000000440)={0x800}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x1ff, 0x56, "00000000000000010000200000000000fffffffe", 0x2}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) close(r2) r8 = socket(0x18, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) setsockopt(r8, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)) accept$inet(0xffffffffffffff9c, &(0x7f0000000140), &(0x7f0000000180)=0xc) write(r2, &(0x7f0000000100)="8c65", 0x26d) 17:14:09 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000200)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x3, &(0x7f0000000180)=[{}, {0x7c}, {0x6}]}) syz_emit_ethernet(0x3a6, &(0x7f0000000000)="b6") r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x8006, 0x0, 0x0, 0x8000000000102}]}) pwrite(r1, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) ioctl$BIOCVERSION(r1, 0x40044271, &(0x7f00000000c0)) ioctl$BIOCIMMEDIATE(r0, 0x80044270, &(0x7f0000000040)=0x1f) 17:14:09 executing program 0: ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x5d738258, 0x0, 0x0, 0x0, 0x0, 0x800000000006], [], [0x0, 0xffffffffffffffff], [{}, {}, {}, {0x0, 0x0, 0x8000}]}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x8020691f, &(0x7f0000000300)) 17:14:09 executing program 0: msgsnd(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0000000000000000749c8961ff954c4571e5097be4629bf1003dc7c23e3c6b679d9169a5a4e56f8128e3736d6797feb85b48a7d2c8f0c5d05c5d69473fc5b69c440d0552a10e782adb6e3b3225ec15c292"], 0x51, 0x0) r0 = msgget$private(0x0, 0x2) msgsnd(r0, &(0x7f0000000000)={0x1, "d7a4e5c49d"}, 0xd, 0x400) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) r1 = socket(0x2, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r2, 0x8020699f, &(0x7f0000000300)) 17:14:09 executing program 1: r0 = socket(0x2, 0x8001, 0x0) fcntl$setstatus(r0, 0x4, 0x84) setsockopt$sock_int(r0, 0xffff, 0x1, &(0x7f0000000040)=0x2, 0x4) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) close(r0) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r1, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) fcntl$setstatus(r1, 0x4, 0x4) 17:14:09 executing program 0: setrlimit(0x8, &(0x7f0000000040)={0x7, 0x95}) r0 = syz_open_pts() close(r0) getrlimit(0x3, &(0x7f00000001c0)) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) r2 = socket(0x18, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x8080691a, &(0x7f0000000300)) r4 = openat(r3, &(0x7f00000000c0)='./file0\x00', 0x0, 0x60) r5 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r5, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r5, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r5, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) dup2(r4, r5) pwrite(r3, &(0x7f0000000100)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) ioctl$BIOCSRSIG(r1, 0x80044272, &(0x7f0000000180)=0x80000000) r6 = syz_open_pts() ioctl$TIOCSETA(r6, 0x802c7414, &(0x7f0000000000)={0xfffffffffffefffd, 0x0, 0x3ff, 0x7fffffff, "735160527b0100e534840700fffffff800"}) r7 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000240)='/dev/wskbd0\x00', 0x8, 0x0) writev(r7, &(0x7f00000001c0), 0x100000000000020a) 17:14:09 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) r1 = dup(r0) getsockopt$sock_int(r1, 0xffff, 0x1003, 0x0, 0x0) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r2, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r2, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r3 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r3, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r3, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r3, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r4 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r4, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r4, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r4, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r5 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x10, 0x0) ioctl$BIOCSETIF(r5, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r5, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r5, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8202"], 0x1) r7 = socket(0x2, 0x3, 0x0) connect$unix(r7, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x10) setsockopt$inet_opts(r7, 0x0, 0x1, &(0x7f0000000080)="891400b00000f300080020000025c6149b37ff0f", 0x14) write(r7, &(0x7f0000000100)="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", 0x171) ioctl$BIOCSETIF(r6, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r6, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x2}]}) pwrite(r6, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r8 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r8, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) 17:14:09 executing program 1: mknod(&(0x7f0000000040)='./file0\x00', 0x1000000000002020, 0x800000006d2) r0 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x800, 0x80) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r1, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r2, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r2, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r3 = openat$wsmuxkbd(0xffffffffffffff9c, &(0x7f0000000240)='/dev/wskbd\x00', 0x400, 0x0) r4 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r4, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r4, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r4, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000300)='/dev/wsmouse\x00', 0x400, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000000340), &(0x7f0000000380)=0xc) kevent(r0, &(0x7f0000000280)=[{{r1}, 0xfffffffffffffffd, 0xb8, 0x2, 0x4000008, 0x8}, {{r2}, 0xffffffffffffffff, 0x4, 0x1, 0x10000007f, 0x10001}, {{r3}, 0xfffffffffffffff5, 0x8, 0x480e743f47cd5cd, 0x38aa, 0x8}, {{r4}, 0xfffffffffffffffb, 0x20, 0x20000011, 0x3, 0x24}], 0x3, &(0x7f00000003c0), 0x1, &(0x7f0000000400)={0x9, 0x9}) open(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r5 = kqueue() r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x200, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r8, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$BIOCSETWF(r9, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r8, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r10 = syz_open_pts() kevent(r5, &(0x7f0000000180)=[{{r6}, 0xfffffffffffffffa, 0x1, 0x80, 0x7fff, 0x3ff}, {{r7}, 0xfffffffffffffffc, 0xa, 0x10, 0x8, 0x800}, {{r8}, 0xfffffffffffffffb, 0x10, 0x40000000, 0x3, 0x5}, {{r10}, 0xfffffffffffffffa, 0x6d71242e732002d, 0x2, 0x7}], 0x6, 0x0, 0x0, 0x0) r11 = kqueue() kevent(r11, &(0x7f0000000000), 0x66, 0x0, 0x81, 0x0) close(r5) 17:14:09 executing program 0: stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)) r0 = socket(0x1, 0x1, 0x0) getsockopt$sock_int(r0, 0xffff, 0x1025, 0x0, 0x0) r1 = socket(0x2, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f00000000c0)={0x8000, 0x5}, 0x10) r3 = socket$inet6(0x18, 0x5, 0x6) sendmsg(r3, &(0x7f0000000440)={&(0x7f0000000100)=@in={0x2, 0x0}, 0xc, &(0x7f0000000300)=[{&(0x7f0000000140)="2da078f156490c45d4972d1571d98df0b8fc1046f57b06336c66ae36ae79f529bee5f64db5d2ce6e", 0x28}, {&(0x7f0000000180)="76242e06301a7d6608d4c36c6383106af3ab829df577cdcdb3f7773729264609e4db3e7803cb48284c43b0bd6cfdc96da58a43cbff5dff9872417f337bf40f21b2bcb77ad548409c35183e5ed61980d9ad346a945b22350fc71ed1481fda13f1ade20ae9611d22da91f551b116", 0x6d}, {&(0x7f0000000200)="3e71a0efecd0b2c715607aaf29229f99bfb94ebd67fadc143d365e5fb3aecbad92efdefd3cb3bc828862b387085d2cd63bafa5bce537a3f9c4fafb3e837e5c2c741cd41cf7e7743c549ea3dbcaff66c86e301889eab5b0b2374ba095d05bb04370e1a6067c87500dc47db350593f6f149cc7deb408b230b6fb41eef28ed4d050ab0dc8777fe5f373c6eaf4241782124540410e5ef915c10793a485fc029d0b1a9706f53e72f811a3768a5ba8bcfcd4c068d0913b2c3878aa1ffe2c2566b7931dfa9629", 0xc3}], 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0xf8}, 0x40b) setsockopt(r2, 0x6, 0x1a51e796, &(0x7f0000000380)="4d6791f891a318fcf2fdbbbd6be142245da9cdacb043eac6d9a275cd1bf18efdf000f8a30b2032ecf77998a65d34d51497e1520ac53f25b67a78ec", 0x3b) open(&(0x7f0000000340)='./file0\x00', 0x800, 0x10) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000000)='./file0\x00', 0x0) renameat(r4, &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000200)='//file0\x02') 17:14:09 executing program 1: ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [], [0x0, 0x0, 0x0, 0x9, 0xffffffffffffffff, 0xffffffff], [0x0, 0x0, 0x401], [{}, {}, {}, {}, {}, {0x0, 0xdbe1}], {0x0, 0x20}}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) r0 = socket$inet6(0x18, 0x5, 0x20) ioctl$FIONBIO(r0, 0x8004667e, &(0x7f0000000000)=0xb049) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket(0x18, 0x2, 0x0) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$TIOCFLUSH(r4, 0x8080691a, &(0x7f0000000300)) ioctl$WSDISPLAYIO_GETSCREENTYPE(r4, 0xc028575d, &(0x7f0000000040)={0xfffffff0, 0x9, './file0\x00', 0x36c8, 0x8001, 0x7}) ioctl$TIOCFLUSH(r2, 0x8080691a, &(0x7f0000000300)) 17:14:09 executing program 1: r0 = socket(0x2, 0x8000, 0x0) setsockopt(r0, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0}, 0xc) mknod(&(0x7f0000000140)='./bus\x00', 0x2080002006, 0x40004000000028a9) r1 = open(&(0x7f0000000400)='./bus\x00', 0x1, 0x0) writev(r1, &(0x7f0000000080)=[{&(0x7f00000000c0)="00000018600400e71700008000000000000000000000000000000001000000000000000000000000a2151246", 0x2c}], 0x1) r2 = socket(0x18, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x8080691a, &(0x7f0000000300)) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) ioctl$LIOCSFD(r3, 0x80046c7f, &(0x7f0000000040)=r4) 17:14:09 executing program 0: execve(0x0, &(0x7f0000000040)=[&(0x7f0000000100)='r//'], 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) msgget(0x3, 0xaf38ab8b375b361) geteuid() r0 = semget$private(0x0, 0x1, 0x80000200) semop(r0, &(0x7f0000000300)=[{0x0, 0x7, 0x1400}, {0x4, 0x80, 0x1800}, {0xfe52dc4792d94f09, 0x8000}, {0x4, 0xff, 0x800}, {0x4, 0x100, 0x800}, {0x2, 0x100000000, 0xf2e4cf5442ae16e3}], 0x2aaaaaaaaaaaae86) semop(r0, &(0x7f0000000400)=[{0x0, 0xfffe, 0x1800}, {0x4, 0x200, 0xc00}, {0x1, 0x5, 0xcab2bfc5c2d47ec2}], 0x3) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000380)=0xb) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f00000000c0)={{0x400, r1, r2, r1, r2, 0x82, 0xfffffffffffff7f5}, 0x8, 0x1ff}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000440), &(0x7f0000000480)=0xc) getpgrp() r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78658e, r3) accept$unix(0xffffffffffffff9c, &(0x7f0000000500)=@abs, &(0x7f0000000680)=0x8) socket$inet6(0x18, 0x5, 0x1) open$dir(&(0x7f0000000940)='./file/file0\x00', 0x80, 0x2) socket(0x18, 0x5, 0x2) acct(&(0x7f0000000000)='./file/file0\x00') mkdir(&(0x7f0000000100)='./file1\x00', 0x0) 17:14:09 executing program 1: connect$unix(0xffffffffffffffff, &(0x7f0000000100)=ANY=[@ANYBLOB="07000000c2"], 0x1) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x3}}) r0 = socket(0x18, 0x1, 0x0) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x1ff, 0x0, "000000000000000100002000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) close(r0) r1 = socket(0x18, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r2 = socket(0x18, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x8080691a, &(0x7f0000000300)) ioctl$TIOCCLRVERAUTH(r3, 0x2000741d) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r1, &(0x7f0000000100)="8c65", 0x3b9) 17:14:09 executing program 0: r0 = socket$unix(0x1, 0x5, 0x0) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) r2 = socket(0x18, 0x1, 0x0) close(r2) getsockopt(r2, 0x200000029, 0x2c, 0x0, 0x0) accept$unix(r2, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) pwrite(r1, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) setsockopt$sock_int(r0, 0xffff, 0x1023, 0x0, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000640)=0xc) r4 = geteuid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r5, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[{0xe0, 0xffff, 0x80, "7c916b60848a9dadb1517769f4b5b2c849a47107836de37b3e1f48a368be8c6464ed53a98b69f38017cf1b04755d408c03834b7689b7b130bcc4607fbf11497a54080e56ed044d2868622a679a8a08a886916c5f9bb1e8350854e944fb1455deb7a586fb8222d6b728264b5a28d6b0f5a45dceab7eba4033e90a0bd323e33a25ec2e7e5a53b8a11d9c8b861a25f0dfcbeb61b2e4eb1458dd33a576d813878459e55186f6c90c657388af2f3854826f536d8235b4bd7b270f291a4ffde25e1ce547e943b3d257d4f28f487eec53896c33"}, {0x90, 0xffff, 0x8, "6c2838e9fe7f51442f07396d7910fffe388ff614567198fa9e12922b6c68516290e722245f1bb2de62c8893d78524e237199d15856896291085e5301673fb50357bcf1c61ed373b41075387eedc824524765f23d2f2db32acbc66b190c4f9b1e6bac9bcdce289288d9e1fd9710070c5d386aa385547cdab0f657e303e61497"}], 0x170}, 0x2) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0xc) r7 = fcntl$getown(0xffffffffffffff9c, 0x5) r8 = getppid() getpgid(r8) r9 = msgget$private(0x0, 0x20000003c4) msgrcv(r9, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/12], 0xc, 0x2, 0x1000) msgrcv(r9, &(0x7f00000007c0)={0x0, ""/227}, 0xfffffffffffffcc9, 0x1, 0x1000) socket(0x10, 0x1, 0x9) msgsnd(r9, 0x0, 0x0, 0x1800) msgsnd(r9, &(0x7f0000000040)={0x1, "48696a280567b1a6342fcc8ec5d56f596329414fa22f5c0ed193424179fc5bd8017a071300"}, 0x2d, 0x800) msgctl$IPC_SET(r9, 0x1, &(0x7f0000000980)={{0x7fffffff, r4, r6, r3, 0x0, 0x46, 0x81}, 0x100000000, 0x1, r7, r8, 0xa5, 0x1, 0x4e2c, 0x6}) setuid(r3) mknod(&(0x7f0000000100)='./bus\x00', 0x2000, 0x86139) r10 = open(&(0x7f0000000080)='./bus\x00', 0x5, 0x0) write(r10, &(0x7f0000000040)="670dc3", 0x3) write(r10, &(0x7f0000000140)="09917b2f2d25d3e5e3df3765279232c01f1eb7dfe6000b7a", 0x18) pwritev(r10, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0, 0x0) 17:14:09 executing program 1: ktrace(&(0x7f00000001c0)='./file0\x00', 0x4, 0x100, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x200, 0x82) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0) unveil(&(0x7f0000000180)='./file0/file0\x00', &(0x7f00000013c0)='x\x00') 17:14:09 executing program 1: ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1fc], [0x0, 0x0, 0x0, 0x9, 0xffffffffffffffff, 0xbffffffef7ffffff], [0x0, 0x0, 0x401]}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) sync() r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETWF(r2, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) r3 = socket(0x18, 0x400000002, 0x0) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) getsockopt$SO_PEERCRED(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) ioctl$VT_RELDISP(r1, 0x20007604, &(0x7f0000000040)) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) r5 = getgid() fchown(r2, r4, r5) ioctl$TIOCFLUSH(r1, 0x8080691a, &(0x7f0000000300)) 17:14:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) link(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') bind(r1, &(0x7f0000000240)=@un=@file={0xd80f49edce43012d, './file0\x00'}, 0xa) r2 = dup2(r1, r0) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r4, &(0x7f0000000240)=ANY=[@ANYBLOB="2d012e2f662718692081"], 0xa) dup2(r4, r3) connect$unix(r4, &(0x7f0000000000)=ANY=[@ANYBLOB="00012e2f66696c653000"], 0xa) r5 = accept(0xffffffffffffff9c, &(0x7f0000000200)=@in, &(0x7f0000000280)=0xc) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000002c0), &(0x7f0000000300)=0xc) sendto$inet(r0, &(0x7f0000000080)="bcef29461efd2caa6e1c99a0ba1420fc62d34b56c0685b34cfa64448d423ecc23314e71f4c4e7fd45d9b533e0f160aa21f65519cadd1e15711d255f6320d1ea3823e63ee42c4ea8279573213d272ef7ecac056f3d2ada271fd4318e3422cd75a6de1e385cef61991b2e56f58e236709bf770aad77015a2f84640709248047f02b71b84c237d12b", 0x87, 0x404, &(0x7f0000000140)={0x2, 0x0}, 0xc) accept$inet(r2, 0x0, 0x0) 17:14:10 executing program 0: mknod(&(0x7f0000000100)='./bus\x00', 0x2000, 0x86135) r0 = open(&(0x7f0000000040)='./bus\x00', 0x2, 0x0) pwritev(r0, &(0x7f0000000600), 0x100000000000004d, 0x0, 0xffffffffffffc5bb) write(r0, &(0x7f0000000140)="220e22", 0x3) getppid() r1 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1023, 0x0, 0x0) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000640)=0xc) r3 = geteuid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r4, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[{0xe0, 0xffff, 0x7fff, "7c916b60848a9dadb1517769f4b5b2c849a47107836de37b3e1f48a368be8c6464ed53a98b69f38017cf1b04755d408c03834b7689b7b130bcc4607fbf11497a54080e56ed044d2868622a679a8a08a886916c5f9bb1e8350854e944fb1455deb7a586fb8222d6b728264b5a28d6b0f5a45dceab7eba4033e90a0bd323e33a25ec2e7e5a53b8a11d9c8b861a25f0dfcbeb61b2e4eb1458dd33a576d813878459e55186f6c90c657388af2f3854826f536d8235b4bd7b270f291a4ffde25e1ce547e943b3d257d4f28f487eec53896c33"}, {0x90, 0xffff, 0x8, "6c2838e9fe7f51442f07396d7910fffe388ff614567198fa9e12922b6c68516290e722245f1bb2de62c8893d78524e237199d15856896291085e5301673fb50357bcf1c61ed373b41075387eedc824524765f23d2f2db32acbc66b190c4f9b1e6bac9bcdce289288d9e1fd9710070c5d386aa385547cdab0f657e303e61497"}], 0x170}, 0x402) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0xc) r6 = fcntl$getown(0xffffffffffffff9c, 0x5) r7 = getppid() getpgid(r7) r8 = msgget$private(0x0, 0x20000003c4) msgrcv(r8, &(0x7f00000000c0)=ANY=[@ANYBLOB="00000000eeff00000000005b4109c689edd92e6cf200"], 0xc, 0x2, 0x1000) msgrcv(r8, &(0x7f00000007c0)={0x0, ""/227}, 0xfffffffffffffcc9, 0x1, 0x1000) msgsnd(r8, 0x0, 0x0, 0x1800) msgsnd(r8, &(0x7f0000000040)={0x1, "48696a280567b1a6342fcc8ec5d56f596329414fa22f5c0ed193424179fc5bd8017a071300"}, 0x2d, 0x800) msgctl$IPC_SET(r8, 0x1, &(0x7f0000000980)={{0x1, r3, r5, r2, 0x0, 0x46, 0x81}, 0x10001, 0x1, r6, r7, 0xa5, 0x1, 0x4e2c, 0x6}) r9 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200)='/dev/bpf\x00', 0x4000000001, 0x0) ioctl$BIOCSETIF(r9, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r9, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x35}, {0x6, 0x0, 0x0, 0x8000000000102}]}) pwrite(r9, &(0x7f0000000140)="fbaf8a8d1a029be9374ebcb5e2a6", 0xe, 0x0, 0x0) r10 = getppid() fcntl$setown(r9, 0x6, r10) ioctl$WSDISPLAYIO_GETSCREENTYPE(r0, 0xc028575d, &(0x7f00000008c0)={0x4, 0x9, './bus\x00', 0x1, 0x7fffffff, 0x4, 0xff}) r11 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_int(r11, 0xffff, 0x1023, 0x0, 0x0) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000640)=0xc) r13 = geteuid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg(r14, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=[{0xe0, 0xffff, 0x7fff, "7c916b60848a9dadb1517769f4b5b2c849a47107836de37b3e1f48a368be8c6464ed53a98b69f38017cf1b04755d408c03834b7689b7b130bcc4607fbf11497a54080e56ed044d2868622a679a8a08a886916c5f9bb1e8350854e944fb1455deb7a586fb8222d6b728264b5a28d6b0f5a45dceab7eba4033e90a0bd323e33a25ec2e7e5a53b8a11d9c8b861a25f0dfcbeb61b2e4eb1458dd33a576d813878459e55186f6c90c657388af2f3854826f536d8235b4bd7b270f291a4ffde25e1ce547e943b3d257d4f28f487eec53896c33"}, {0x90, 0xffff, 0x8, "6c2838e9fe7f51442f07396d7910fffe388ff614567198fa9e12922b6c68516290e722245f1bb2de62c8893d78524e237199d15856896291085e5301673fb50357bcf1c61ed373b41075387eedc824524765f23d2f2db32acbc66b190c4f9b1e6bac9bcdce289288d9e1fd9710070c5d386aa385547cdab0f657e303e61497"}], 0x170}, 0x402) getsockopt$SO_PEERCRED(r14, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0xc) r16 = fcntl$getown(0xffffffffffffff9c, 0x5) r17 = getppid() getpgid(r17) r18 = msgget$private(0x0, 0x20000003c4) msgrcv(r18, &(0x7f0000000440)=ANY=[@ANYBLOB='\x00'/12], 0xc, 0x2, 0x1000) msgrcv(r18, &(0x7f00000007c0)={0x0, ""/227}, 0xfffffffffffffcc9, 0x1, 0x1000) msgsnd(r18, 0x0, 0x0, 0x1800) msgsnd(r18, &(0x7f0000000040)={0x1, "48696a280567b1a6342fcc8ec5d56f596329414fa22f5c0ed193424179fc5bd8017a071300"}, 0x2d, 0x800) msgctl$IPC_SET(r18, 0x1, &(0x7f0000000980)={{0x1, r13, r15, r12, 0x0, 0x46, 0x81}, 0x10001, 0x1, r16, r17, 0xa5, 0x1, 0x4e2c, 0x6}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0xffffffa8, r3, 0x0, 0x0, 0x0, 0x8, 0x3f}, 0x4000000000004, 0xb8, r17, 0x0, 0x0, 0x10000000000000, 0xfffffffffffffffe}) r19 = socket(0x18, 0x400000002, 0x0) setsockopt(r19, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) getsockopt$sock_cred(r19, 0xffff, 0x1022, &(0x7f0000000900), &(0x7f0000000940)=0xc) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000180), 0xff20}], 0x100000000000005e, 0x0, 0x0) 17:14:10 executing program 1: r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x800000018, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1000, &(0x7f0000000000)=0x8, 0x4) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1f, "d730c1e7bb6fc6e23c5b00000000000000e74de4"}) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x3}}) r2 = socket(0x18, 0x1, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x1, 0xb59cdf54c7505222) ioctl$WSKBDIO_GETMODE(r3, 0x40045714, &(0x7f0000000100)) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x1ff, 0x0, "000000000000000100002000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) close(r2) socket(0x0, 0x4000, 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) dup2(r0, r2) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) r4 = socket(0x18, 0x400000002, 0x0) setsockopt(r4, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000180)=0xc) sendto$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 17:14:10 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080)='/dev/bpf\x00', 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000200)={'tap', 0x0}) syz_emit_ethernet(0xe, &(0x7f0000000a80)="b6bc1fc92479ff2b783f6e8a9c81") uvm_fault(0xfffffd806bc0a660, 0x0, 0, 2) -> e kernel: page fault trap, code=0 Stopped at memcpy+0x15: repe movsq (%rsi),%es:(%rdi) ddb> ddb> set $lines = 0 ddb> set $maxwidth = 0 ddb> show panic kernel page fault uvm_fault(0xfffffd806bc0a660, 0x0, 0, 2) -> e memcpy() at memcpy+0x15 end trace frame: 0xffff80001d377d20, count: 0 ddb> trace memcpy() at memcpy+0x15 uipc_usrreq(fffffd805e4d7780,9,fffffd805e05e000,0,0,ffff8000ffff93c8) at uipc_usrreq+0xb5e sosend(fffffd805e4d7780,0,ffff80001d377e20,0,0,80) at sosend+0x669 sendit(ffff8000ffff93c8,5,ffff80001d377f80,0,ffff80001d378070) at sendit+0x52b sys_sendmsg(ffff8000ffff93c8,ffff80001d378020,ffff80001d378070) at sys_sendmsg+0x1a4 syscall(ffff80001d3780f0) at syscall+0x507 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0x7f7ffffd8cb0, count: -7 ddb> show registers rdi 0 rsi 0xfffffd805e05e070 rbp 0xffff80001d377c80 rbx 0x1 rdx 0x10 rcx 0x2 rax 0 r8 0 r9 0x5 r10 0x629226b28e0ecc76 r11 0 r12 0xfffffd805e05e000 r13 0xfffffd805e05e600 r14 0x1 r15 0xfffffd805e4d7988 rip 0xffffffff81eb9c85 memcpy+0x15 cs 0x8 rflags 0x10202 __ALIGN_SIZE+0xf202 rsp 0xffff80001d377c08 ss 0x10 memcpy+0x15: repe movsq (%rsi),%es:(%rdi) ddb> show proc PROC (dhclient) pid=115951 stat=onproc flags process=100010 proc=0 pri=50, usrpri=50, nice=20 forw=0xffffffffffffffff, list=0xffff8000ffff84f8,0xffff8000ffff5658 process=0xffff8000ffff6010 user=0xffff80001d373000, vmspace=0xfffffd806bc0a660 estcpu=0, cpticks=1, pctcpu=0.0 user=0, sys=1, intr=0 ddb> ps PID TID PPID UID S FLAGS WAIT COMMAND 85979 214602 80848 0 2 0 syz-executor.0 85979 245685 80848 0 2 0x4000000 syz-executor.0 57785 518847 0 0 3 0x14200 bored sosplice 87296 176463 49891 0 2 0x2 syz-executor.1 80848 417476 49891 0 2 0x482 syz-executor.0 49891 474542 54698 0 3 0x82 thrsleep syz-fuzzer 49891 515733 54698 0 3 0x4000082 nanosleep syz-fuzzer 49891 382070 54698 0 3 0x4000082 thrsleep syz-fuzzer 49891 284611 54698 0 3 0x4000082 thrsleep syz-fuzzer 49891 171339 54698 0 3 0x4000082 thrsleep syz-fuzzer 49891 301911 54698 0 3 0x4000082 kqread syz-fuzzer 49891 363924 54698 0 3 0x4000082 thrsleep syz-fuzzer 49891 1968 54698 0 3 0x4000082 thrsleep syz-fuzzer 54698 430694 21930 0 3 0x10008a pause ksh 21930 453548 10345 0 3 0x92 select sshd 88393 66905 1 0 3 0x100083 ttyin getty 10345 124886 1 0 3 0x80 select sshd 91751 465421 85306 73 3 0x100090 kqread syslogd 85306 498476 1 0 3 0x100082 netio syslogd *20609 115951 1 77 7 0x100010 dhclient 35620 77229 1 0 2 0x80 dhclient 35395 79139 0 0 2 0x14200 zerothread 29568 504455 0 0 3 0x14200 aiodoned aiodoned 80891 192066 0 0 3 0x14200 syncer update 40230 317115 0 0 3 0x14200 cleaner cleaner 31353 76358 0 0 3 0x14200 reaper reaper 86681 73742 0 0 3 0x14200 pgdaemon pagedaemon 72784 148504 0 0 3 0x14200 bored crynlk 28860 322231 0 0 3 0x14200 bored crypto 87253 266150 0 0 3 0x40014200 acpi0 acpi0 55875 360001 0 0 3 0x14200 bored softnet 16270 124870 0 0 3 0x14200 bored systqmp 5643 55907 0 0 3 0x14200 bored systq 12593 255330 0 0 3 0x40014200 bored softclock 253 499049 0 0 3 0x40014200 idle0 31999 323905 0 0 3 0x14200 bored smr 1 140085 0 0 3 0x82 wait init 0 0 -1 0 3 0x10200 scheduler swapper ddb> show all locks No such command ddb> show malloc Type InUse MemUse HighUse Limit Requests Type Lim devbuf 9470 6334K 7622K 78643K 10797 0 pcb 13 8K 8K 78643K 31 0 rtable 91 11K 11K 78643K 218 0 ifaddr 51 11K 11K 78643K 67 0 counters 19 16K 16K 78643K 19 0 ioctlops 0 0K 2K 78643K 15 0 iov 0 0K 12K 78643K 6 0 mount 1 1K 1K 78643K 1 0 vnodes 1226 77K 77K 78643K 1280 0 UFS quota 1 32K 32K 78643K 1 0 UFS mount 5 36K 36K 78643K 5 0 shm 2 1K 1K 78643K 2 0 VM map 2 0K 0K 78643K 2 0 sem 5 0K 0K 78643K 6 0 dirhash 12 2K 2K 78643K 12 0 ACPI 1794 195K 288K 78643K 12646 0 file desc 5 13K 25K 78643K 64 0 proc 48 38K 54K 78643K 359 0 subproc 32 2K 2K 78643K 34 0 NFS srvsock 1 0K 0K 78643K 1 0 NFS daemon 1 16K 16K 78643K 1 0 ip_moptions 0 0K 0K 78643K 2 0 in_multi 29 1K 2K 78643K 46 0 ether_multi 1 0K 0K 78643K 2 0 mrt 0 0K 0K 78643K 2 0 ISOFS mount 1 32K 32K 78643K 1 0 MSDOSFS mount 1 16K 16K 78643K 1 0 ttys 43 201K 201K 78643K 43 0 exec 0 0K 1K 78643K 183 0 pagedep 1 8K 8K 78643K 1 0 inodedep 1 32K 32K 78643K 1 0 newblk 1 0K 0K 78643K 1 0 VM swap 7 26K 26K 78643K 7 0 UVM amap 109 21K 22K 78643K 987 0 UVM aobj 4 2K 2K 78643K 4 0 memdesc 1 4K 4K 78643K 1 0 crypto data 1 1K 1K 78643K 1 0 ip6_options 0 0K 0K 78643K 15 0 NDP 8 0K 0K 78643K 14 0 temp 83 3006K 3070K 78643K 3341 0 kqueue 0 0K 0K 78643K 2 0 SYN cache 2 16K 16K 78643K 2 0 ddb> show all pools Name Size Requests Fail Releases Pgreq Pgrel Npage Hiwat Minpg Maxpg Idle arp 64 6 0 2 1 0 1 1 0 8 0 rtpcb 80 19 0 17 1 0 1 1 0 8 0 rtentry 112 49 0 15 2 0 2 2 0 8 0 unpcb 120 49 0 40 1 0 1 1 0 8 0 syncache 264 4 0 4 1 1 0 1 0 8 0 tcpqe 32 71 0 71 1 0 1 1 0 8 1 tcpcb 544 26 0 22 1 0 1 1 0 8 0 inpcb 280 96 0 88 1 0 1 1 0 8 0 nd6 48 5 0 3 1 0 1 1 0 8 0 ppxss 1128 1 0 1 1 0 1 1 0 8 1 art_heap8 4096 1 0 0 1 0 1 1 0 8 0 art_heap4 256 236 0 67 14 0 14 14 0 8 1 art_table 32 237 0 67 2 0 2 2 0 8 0 art_node 16 48 0 17 1 0 1 1 0 8 0 sysvmsgpl 40 8 0 6 1 0 1 1 0 8 0 semapl 112 4 0 1 1 0 1 1 0 8 0 shmpl 112 2 0 0 1 0 1 1 0 8 0 dirhash 1024 17 0 0 3 0 3 3 0 8 0 dino1pl 128 1464 0 62 46 0 46 46 0 8 0 ffsino 240 1464 0 62 83 0 83 83 0 8 0 nchpl 144 1734 0 135 60 0 60 60 0 8 0 uvmvnodes 72 1563 0 0 29 0 29 29 0 8 0 vnodes 208 1563 0 0 83 0 83 83 0 8 0 namei 1024 4265 0 4265 1 0 1 1 0 8 1 scxspl 192 4743 0 4743 1 0 1 1 0 8 1 plimitpl 152 16 0 9 1 0 1 1 0 8 0 sigapl 432 235 0 222 2 0 2 2 0 8 0 futexpl 56 1038 0 1038 1 0 1 1 0 8 1 knotepl 112 60 0 41 1 0 1 1 0 8 0 kqueuepl 104 14 0 12 1 0 1 1 0 8 0 pipepl 112 146 0 127 1 0 1 1 0 8 0 fdescpl 424 236 0 222 2 0 2 2 0 8 0 filepl 120 1313 0 1217 4 0 4 4 0 8 1 lockfpl 104 12 0 11 1 0 1 1 0 8 0 lockfspl 48 6 0 5 1 0 1 1 0 8 0 sessionpl 112 17 0 7 1 0 1 1 0 8 0 pgrppl 48 17 0 7 1 0 1 1 0 8 0 ucredpl 96 68 0 61 1 0 1 1 0 8 0 zombiepl 144 222 0 222 1 0 1 1 0 8 1 processpl 872 251 0 222 4 0 4 4 0 8 0 procpl 632 300 0 263 4 0 4 4 0 8 0 sockpl 384 164 0 146 3 0 3 3 0 8 0 mcl8k 8192 1 0 1 1 0 1 1 0 8 1 mcl4k 4096 15 0 15 2 1 1 1 0 8 1 mcl2k2 2112 1 0 1 1 0 1 1 0 8 1 mcl2k 2048 67948 0 67912 16 3 13 14 0 8 8 mtagpl 80 26 0 12 2 1 1 1 0 8 0 mbufpl 256 107517 0 107425 11 0 11 11 0 8 1 bufpl 280 6195 0 1326 348 0 348 348 0 8 0 anonpl 16 41856 0 22412 80 1 79 79 0 107 0 amapchunkpl 152 1096 0 945 8 0 8 8 0 158 1 amappl16 192 1249 0 174 54 0 54 54 0 8 0 amappl15 184 65 0 59 1 0 1 1 0 8 0 amappl14 176 32 0 30 1 0 1 1 0 8 0 amappl13 168 1 0 0 1 0 1 1 0 8 0 amappl12 160 6 0 4 1 0 1 1 0 8 0 amappl11 152 50 0 39 1 0 1 1 0 8 0 amappl10 144 11 0 10 1 0 1 1 0 8 0 amappl9 136 574 0 569 1 0 1 1 0 8 0 amappl8 128 126 0 103 1 0 1 1 0 8 0 amappl7 120 98 0 87 1 0 1 1 0 8 0 amappl6 112 55 0 49 1 0 1 1 0 8 0 amappl5 104 143 0 134 1 0 1 1 0 8 0 amappl4 96 440 0 417 1 0 1 1 0 8 0 amappl3 88 116 0 108 1 0 1 1 0 8 0 amappl2 80 1102 0 1029 3 1 2 3 0 8 0 amappl1 72 14002 0 13578 27 14 13 20 0 8 4 amappl 80 521 0 478 1 0 1 1 0 84 0 dma4096 4096 1 0 1 1 1 0 1 0 8 0 dma256 256 6 0 6 1 1 0 1 0 8 0 dma128 128 253 0 253 1 1 0 1 0 8 0 dma64 64 6 0 6 1 1 0 1 0 8 0 dma32 32 7 0 7 1 1 0 1 0 8 0 dma16 16 18 0 17 1 0 1 1 0 8 0 aobjpl 64 3 0 0 1 0 1 1 0 8 0 uaddrrnd 24 236 0 222 1 0 1 1 0 8 0 uaddrbest 32 2 0 0 1 0 1 1 0 8 0 uaddr 24 236 0 222 1 0 1 1 0 8 0 vmmpekpl 168 5733 0 5708 2 0 2 2 0 8 0 vmmpepl 168 36931 0 34761 142 9 133 133 0 357 37 vmsppl 272 235 0 222 2 0 2 2 0 8 1 pdppl 4096 478 0 444 6 0 6 6 0 8 1 pvpl 32 133882 0 111478 185 0 185 185 0 265 4 pmappl 200 235 0 222 1 0 1 1 0 8 0 extentpl 40 46 0 29 1 0 1 1 0 8 0 phpool 112 143 0 6 4 0 4 4 0 8 0