0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r10) r11 = getppid() ktrace(0x0, 0xd, 0x10, r11) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r10) r11 = getppid() ktrace(0x0, 0xd, 0x10, r11) 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r10) r11 = getppid() ktrace(0x0, 0xd, 0x10, r11) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(r1, 0x82485608, &(0x7f0000000100)={0x7fff, 0x4, 0x361, {[0x918, 0xffffffffffff8004, 0x5, 0x8, 0x200, 0xfffffffffffffff9, 0x80000000, 0x70c2, 0x800, 0x9, 0x1, 0x6, 0x6fb5, 0x80000000, 0x5, 0x4, 0x7, 0x2], [0x4, 0x2, 0x80000000, 0x1, 0xf4, 0x2, 0xffff, 0x5, 0x8, 0x3], [0x0, 0xb1, 0x32f, 0x2, 0x7, 0x1, 0x1], [0x3c, 0x9, 0x8001, 0x7, 0x5, 0x4], [{0x81, 0x200, 0x30000, 0xfffffffffffffff9}, {0x0, 0x3, 0x0, 0xcd5f}, {0x9, 0x70, 0x8, 0x7}, {0x7, 0x1000, 0x3f, 0x80000001}, {0x4, 0xffffffff, 0x14d1, 0xfff}, {0x9, 0x3f, 0x6, 0x5}, {0x0, 0x9, 0x3, 0xe1}, {0xf5, 0x101, 0x6, 0x20}], {0x7fff, 0x8, 0x3ff, 0x7}, {0x1, 0x401, 0x0, 0x2}}}) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r10) getppid() 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r10) r11 = getppid() ktrace(0x0, 0xd, 0x10, r11) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(r1, 0x82485608, &(0x7f0000000100)={0x7fff, 0x4, 0x361, {[0x918, 0xffffffffffff8004, 0x5, 0x8, 0x200, 0xfffffffffffffff9, 0x80000000, 0x70c2, 0x800, 0x9, 0x1, 0x6, 0x6fb5, 0x80000000, 0x5, 0x4, 0x7, 0x2], [0x4, 0x2, 0x80000000, 0x1, 0xf4, 0x2, 0xffff, 0x5, 0x8, 0x3], [0x0, 0xb1, 0x32f, 0x2, 0x7, 0x1, 0x1], [0x3c, 0x9, 0x8001, 0x7, 0x5, 0x4], [{0x81, 0x200, 0x30000, 0xfffffffffffffff9}, {0x0, 0x3, 0x0, 0xcd5f}, {0x9, 0x70, 0x8, 0x7}, {0x7, 0x1000, 0x3f, 0x80000001}, {0x4, 0xffffffff, 0x14d1, 0xfff}, {0x9, 0x3f, 0x6, 0x5}, {0x0, 0x9, 0x3, 0xe1}, {0xf5, 0x101, 0x6, 0x20}], {0x7fff, 0x8, 0x3ff, 0x7}, {0x1, 0x401, 0x0, 0x2}}}) 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r10) r11 = getppid() ktrace(0x0, 0xd, 0x10, r11) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(r1, 0x82485608, &(0x7f0000000100)={0x7fff, 0x4, 0x361, {[0x918, 0xffffffffffff8004, 0x5, 0x8, 0x200, 0xfffffffffffffff9, 0x80000000, 0x70c2, 0x800, 0x9, 0x1, 0x6, 0x6fb5, 0x80000000, 0x5, 0x4, 0x7, 0x2], [0x4, 0x2, 0x80000000, 0x1, 0xf4, 0x2, 0xffff, 0x5, 0x8, 0x3], [0x0, 0xb1, 0x32f, 0x2, 0x7, 0x1, 0x1], [0x3c, 0x9, 0x8001, 0x7, 0x5, 0x4], [{0x81, 0x200, 0x30000, 0xfffffffffffffff9}, {0x0, 0x3, 0x0, 0xcd5f}, {0x9, 0x70, 0x8, 0x7}, {0x7, 0x1000, 0x3f, 0x80000001}, {0x4, 0xffffffff, 0x14d1, 0xfff}, {0x9, 0x3f, 0x6, 0x5}, {0x0, 0x9, 0x3, 0xe1}, {0xf5, 0x101, 0x6, 0x20}], {0x7fff, 0x8, 0x3ff, 0x7}, {0x1, 0x401, 0x0, 0x2}}}) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0), &(0x7f0000000240)=0xc) getppid() 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r10) r11 = getppid() ktrace(0x0, 0xd, 0x10, r11) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getppid() 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r10) r11 = getppid() ktrace(0x0, 0xd, 0x10, r11) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) getppid() 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r10) getppid() 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) getppid() 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r10) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080), &(0x7f0000000040)=0xc) getppid() 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0), &(0x7f0000000240)=0xc) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getppid() 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) ktrace(&(0x7f0000000600)='./file0\x00', 0x2c3a576044daa0ef, 0x308, r6) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) getppid() 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() getppid() 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setregid(0x0, r8) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() getppid() 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000080), &(0x7f0000000040)=0xc) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() getppid() 16:03:14 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:14 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) getppid() 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) getppid() 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) getppid() 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) getppid() 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) getppid() 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) getppid() 16:03:15 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r5 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r5) getppid() 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r5 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r5) getppid() 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380), &(0x7f0000000440)=0xc) r2 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r2, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080), &(0x7f00000000c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) getppid() 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) accept$inet(r5, &(0x7f0000000580), &(0x7f00000005c0)=0xc) r6 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x350fc59e1cfe4a73, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r5 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: socket$inet(0x1e, 0x3, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r0, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380), &(0x7f0000000440)=0xc) r1 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r1, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r2 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r2) getppid() 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380)={0x0, 0x0}, &(0x7f0000000440)=0xc) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r3, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r1, r2, r4) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r5 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: socket$inet(0x1e, 0x3, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r0, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380), &(0x7f0000000440)=0xc) accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) getppid() 16:03:15 executing program 0: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380), &(0x7f0000000440)=0xc) r2 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r2, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000080), &(0x7f00000000c0)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: socket$inet(0x1e, 0x3, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r0, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380), &(0x7f0000000440)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) getppid() 16:03:15 executing program 0: socket$inet(0x1e, 0x3, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r0, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380), &(0x7f0000000440)=0xc) r1 = accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) bind$unix(r1, &(0x7f0000000500)=@file={0x1, './file0\x00'}, 0xa) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r2 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: socket$inet(0x1e, 0x3, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r0, 0x800c5606, &(0x7f00000000c0)={0x1}) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) getppid() 16:03:15 executing program 0: socket$inet(0x1e, 0x3, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r0, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380), &(0x7f0000000440)=0xc) accept$unix(0xffffffffffffff9c, &(0x7f0000000480)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f2ffffff000000000000000000"], &(0x7f0000000400)=0x59) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: socket$inet(0x1e, 0x3, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 0: socket$inet(0x1e, 0x3, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r0, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000380), &(0x7f0000000440)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: socket$inet(0x1e, 0x3, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 0: socket$inet(0x1e, 0x3, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_INTR(r0, 0x800c5606, &(0x7f00000000c0)={0x1}) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 0: socket$inet(0x1e, 0x3, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 0: socket$inet(0x1e, 0x3, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) getppid() 16:03:15 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) getppid() 16:03:15 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) getppid() 16:03:15 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) getppid() 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) getppid() 16:03:15 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) getppid() 16:03:15 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) getppid() 16:03:15 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) getppid() 16:03:15 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r1, 0x0, 0x2, &(0x7f0000000040), 0x4) setsockopt$inet_opts(r1, 0x0, 0x1, &(0x7f0000000000)="94d16e4061bc30deb08a02d7ba5804f8171791cf9d522b34027e2301fe06fee3f04f17e7d2ea3d53ef60b304daa0525c016386505282a9e0d2f920753a0dfbe124178f65e183c59cd1bb62b382fb4b634faf8fb81b8ace975b2c2bbd4eca750f78b372e01952da606fb9fdb8dc485defce1bb5", 0x73) 16:03:15 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f0000000040)={0xffffffff, 0x1ff, 0xfffc}) r2 = fcntl$dupfd(r0, 0xa, r1) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:15 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:15 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f0000000040)={0xffffffff, 0x1ff, 0xfffc}) r2 = fcntl$dupfd(r0, 0xa, r1) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f0000000040)={0xffffffff, 0x1ff, 0xfffc}) r2 = fcntl$dupfd(r0, 0xa, r1) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f0000000040)={0xffffffff, 0x1ff, 0xfffc}) r2 = fcntl$dupfd(r0, 0xa, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f0000000040)={0xffffffff, 0x1ff, 0xfffc}) ioctl$WSDISPLAYIO_GETSCREEN(0xffffffffffffffff, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f0000000040)={0xffffffff, 0x1ff, 0xfffc}) ioctl$WSDISPLAYIO_GETSCREEN(0xffffffffffffffff, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f0000000040)={0xffffffff, 0x1ff, 0xfffc}) ioctl$WSDISPLAYIO_GETSCREEN(0xffffffffffffffff, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, 0x0) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) r2 = fcntl$dupfd(r0, 0xa, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, 0x0) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) kqueue() r1 = fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, 0x0) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) kqueue() r1 = fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) kqueue() r1 = fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x10) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) symlinkat(&(0x7f00000000c0)='./file0\x00', r2, &(0x7f0000000100)='./file1\x00') 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, 0x0, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) r2 = fcntl$dupfd(r0, 0xa, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x8000, 0x2) r0 = getpid() open$dir(&(0x7f0000000040)='./file0\x00', 0x20, 0x98) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x42ec6892864dbd70) ioctl$WSDISPLAYIO_DELFONT(r1, 0x8058574f, &(0x7f0000000100)={'./file0\x00', 0x7, 0x3, 0x0, 0x1, 0x101, 0x4, 0x8001, 0x3, 0x0, 0xf01b, 0xae3}) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) r2 = fcntl$dupfd(r0, 0xa, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffb000/0x4000)=nil) shmctl$SHM_LOCK(r1, 0x3) shmctl$IPC_STAT(r1, 0x2, &(0x7f00000000c0)=""/4096) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0xa, r0) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000080)=""/110) r2 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r8, 0x0) r9 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r9, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000100)={0x0}, &(0x7f0000000140)=0xc) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000180)={{0x401, r2, r4, r6, 0xffffffffffffffff, 0x1, 0x1f}, 0x81, 0xbed4, r8, r10, 0x6, 0x100000001, 0x6, 0x677f}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0xa, r0) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 1: r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0xa, r0) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = semget(0x1, 0x3, 0x4) semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f00000000c0)=""/4096) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x0, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) r2 = fcntl$dupfd(r0, 0xa, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ioctl$WSDISPLAYIO_ADDSCREEN(0xffffffffffffffff, 0x80245753, &(0x7f0000000040)={0x6, './file0\x00', './file0\x00'}) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x0, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) r2 = fcntl$dupfd(r0, 0xa, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r3, 0x0) wait4(r3, &(0x7f00000000c0), 0x2, &(0x7f0000000100)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f00000001c0)=@abs={0x2, 0x0, 0x0}, 0x8, &(0x7f00000004c0)=[{&(0x7f0000000280)="ae60f06ecc5911c65de760d52a6a33f21ebb32a40b89a13a45461b9c1ab7db992689e4e8a939104917c8e3121f0dcdbe7e5ddc05ae02bf0f13f43963942dd3d7de57dc31079909b710cf42b0e354a92a9d8ec75417439ca5cd9437c278dbe145a45ebd2b3d4ea55ce4465ffe127191a30b38aa095e57471d89e7e554ab4c1f865dd82346db7cb511a0a99e004557a6c4150164fcb8a6925d90ee7e647433b93ac801c1", 0xa3}, {&(0x7f0000000540)="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", 0x163}, {&(0x7f0000000340)="1ea86b204c37552bad1616e3a724c99c25efe479373c47edf69fe492ee7060a181520193fce75480ecac277751426b3c7d9348cf692428eecde4ee792b971eed5a0a7d29dce16d4e11fa5080e8072c56f720689f6bb58ed6719ff446f67c20fc95b5fba805a2770d4443f3485e99f29c41", 0x71}, {&(0x7f00000006c0)="811cc1d9a1eece162e829890e80c5edfc79f93efd79b393b3b174ce6f0fe0874ec5230913d962f4f1953bb7ee752afeeb7ef0bf98cc504ca6cedf9ada1a18690d2c77a5dfa517e23215b404d34985cd723aebca4a4dc4a3d6bec3cdbf30220b9763fee198b8046a9d3a810a59d756e655e5fff63e71e3fdbbd713346c0fb807c336f17c2e577ecf4c661377bbbac671181fb9c5ede713a5e5f0f3f9630234b9a50bd903b212abb634d8cb708528af791848d329c9a", 0xb5}], 0x4, 0x0, 0x0, 0xc}, 0x4) r5 = socket$inet6(0x18, 0x3, 0x0) ioctl$BIOCSDIRFILT(r5, 0x40047309, &(0x7f0000001180)) getpeername$inet6(r5, &(0x7f0000000400), &(0x7f0000000440)=0xc) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r6) setsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000040)={r0, r6}, 0xc) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) setuid(r6) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x0, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) r2 = fcntl$dupfd(r0, 0xa, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r2, 0x0) setregid(r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) setgroups(0x2, &(0x7f0000000040)=[r2, r4]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, 0x0, 0x10, 0x0) r2 = fcntl$dupfd(r0, 0xa, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) rmdir(&(0x7f0000000040)='./file0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, 0x0, 0x10, 0x0) r2 = fcntl$dupfd(r0, 0xa, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) r4 = socket$inet(0x2, 0x3, 0x0) sendto(r4, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@in, &(0x7f0000000180)=0xc) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, 0x0, 0x10, 0x0) r2 = fcntl$dupfd(r0, 0xa, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0xa, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x3, 0x4000150e, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: socket$inet(0x1e, 0x3, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0xa, r0) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000040)='./file0/file0\x00', 0x4, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: socket$inet(0x1e, 0x3, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0xa, r0) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x20) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f00000000c0)) 16:03:16 executing program 1: socket$inet(0x1e, 0x3, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0xa, r0) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x800, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r3, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78669a, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r2 = getgid() lchown(&(0x7f0000000040)='./file1\x00', r1, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) ioctl$WSDISPLAYIO_GETSCREEN(r1, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$WSDISPLAYIO_GETSCREEN(0xffffffffffffffff, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x8) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) ioctl$BIOCGRSIG(0xffffffffffffffff, 0x40044273, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = accept$inet6(0xffffffffffffffff, &(0x7f00000000c0), &(0x7f0000000100)=0xc) bind(r1, &(0x7f0000000140)=@un=@file={0x4f567590ddd8b614, './file0\x00'}, 0xa) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$WSDISPLAYIO_GETSCREEN(0xffffffffffffffff, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x21aa7ccb93c934c4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r0, 0x0, r1) ioctl$WSDISPLAYIO_GETSCREEN(0xffffffffffffffff, 0xc0245755, &(0x7f0000000000)={0x1, './file0\x00', './file0\x00'}) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, 0x0) 16:03:16 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d20298f53a0c121ab3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec0"], 0x6a) r2 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000040)='/dev/speaker\x00', 0x1, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, r2, 0x0, 0x0) accept$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r4, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x5, 0x4, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = openat(r0, &(0x7f00000000c0)='./file0\x00', 0x20, 0x40) ioctl$TIOCDRAIN(r5, 0x2000745e) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) r2 = fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) getgid() openat(r2, &(0x7f00000000c0)='./file0\x00', 0x20401, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$WSDISPLAYIO_GETSCREEN(0xffffffffffffff9c, 0xc0245755, &(0x7f0000000040)={0x4, './file0\x00', './file0\x00'}) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, 0x0) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, 0x0) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) open$dir(&(0x7f0000000040)='./file0\x00', 0xb669ef6d6a15f289, 0x14) 16:03:16 executing program 1: r0 = socket$inet(0x1e, 0x3, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$WSDISPLAYIO_GETSCREEN(r2, 0xc0245755, &(0x7f0000000000)={0x0, './file0\x00', './file0\x00'}) 16:03:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) msgget$private(0x0, 0x80) ioctl$WSDISPLAYIO_SMODE(0xffffffffffffffff, 0x8004574c, &(0x7f0000000040)=0x2) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) ioctl$VT_GETACTIVE(r2, 0x40047607, &(0x7f00000000c0)) 16:03:16 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) fchmodat(r0, &(0x7f0000000140)='./file0\x00', 0x84, 0x6) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10000) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f00000000c0), &(0x7f0000000100)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:16 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) r4 = socket$inet(0x2, 0x3, 0x0) sendto(r4, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@in, &(0x7f0000000180)=0xc) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) r4 = socket$inet(0x2, 0x3, 0x0) sendto(r4, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@in, &(0x7f0000000180)=0xc) 16:03:17 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) r2 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000400)='/dev/ttyCcfg\x00', 0x800, 0x0) r3 = socket$inet6(0x18, 0x7e5054f06d311c36, 0xab) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wsmuxkbd(0xffffffffffffff9c, &(0x7f0000000440)='/dev/wskbd\x00', 0x80, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000680)=0xc) setpgid(r13, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r14, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r15) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r16, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r17) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r18, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r19, 0x0) setregid(r19, 0x0) getgroups(0x1, &(0x7f0000000480)=[r19]) r20 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r20, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) r22 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r22, 0x800c5606, &(0x7f00000000c0)={0x1}) r23 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r23, 0x800c5606, &(0x7f00000000c0)={0x1}) r24 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r24, 0x800c5606, &(0x7f00000000c0)={0x1}) r25 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r25, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r26, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r27, 0x0) r28 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r28, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r28, 0xffff, 0x1022, &(0x7f0000000640)={0x0, 0x0}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r30, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r31, 0x0) r32 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r33, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r34, 0x0) setregid(r34, 0x0) r35 = openat$pci(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/pci\x00', 0x2, 0x0) r36 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r36, 0x800c5606, &(0x7f00000000c0)={0x1}) r37 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r37, 0x800c5606, &(0x7f00000000c0)={0x1}) r38 = fcntl$dupfd(0xffffffffffffffff, 0x0, r37) r39 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r39, 0x800c5606, &(0x7f00000000c0)={0x1}) r40 = getgid() sendmsg$unix(r18, &(0x7f0000000600)={&(0x7f0000000500)=ANY=[@ANYBLOB="25bb57ccf13c0bf0457a0f28b2111ea53f00fac9b4b911f86bc6cc57b577fefbc506072c62c7783302f64eb8fa7f0c1859e18933bcedf2b171716efc381ad15668f366ae9251098149860ce7b4c2ff3858249f9bb26cca249080978e8f36686a1d8f99a6b23fcdfa3167628059dfd98ead0bf294208c01962a7523b6309eb46ed336361a57b06504a7663cbd1c3bac6805c52167ab6b559c10afe32d3e77"], 0x1, &(0x7f0000000380)=[{&(0x7f00000000c0)="e52a61b1fa413eeb52b8b3ab4b05ee13aa", 0x11}, {&(0x7f0000000100)="ab17d951cd8559fd853d83c7ad378b03a2c8f82e4583874d7b19664b2ec0f45f2071ff4d718ea9b4d05896ee3f5de225aabdd2e81c8188b21d006551cdeea8ab8eea6095af9062b5a3957879a4a69bbd156016c6bd86a3d234a8c85d297191aa30f0f5f4463519c1cdb74ed18c87c516540e12563d1489b6b07c642439cd9d11eeb38f20fb63eb4c9b27", 0x8a}, {&(0x7f00000001c0)="9b0999af3155492e1749b93ab3373ef2b14218b424a178f45facf624510ae180f18e947f8524ad5d493163e3a8ad5edd3cd5084f773c656c064155288d281db668e4a2ec0be085673b3f6616ff6c23bab867398c0cc43ccc7059c1855efd72b3d10e014673c832915efe9ff1c532777e1532761e41a7a994d625b7a3facf20e241022ec551756c918854a2", 0x8b}, {&(0x7f0000000280)="160bea8a436dbcdac7a9534ffc71241afbb3f30e7f72050fefaee2ec2b1ba44216fb6560d496f071423796085488cbe8d315669c341f6687f855ea", 0x3b}, {&(0x7f00000002c0)="d5f21a4e1407632e1e0a034e9d1634268aca62ecb53e5c81513db9fe5d5c14d7626985b3a7a8b0c6d067ae2a93ac0c1653232757f3cdd7019215e89a55c36860e2744047346d9f78563ae0770ae6a6f2fe98ba04ae6b4e00aaa5d1b3c519a2011f523a62abd04537b848f764c4d98bedcad327b509bf9f3b391fe14322b3167a7f8d15e0918b0d87c9c3", 0x8a}], 0x5, &(0x7f0000000800)=ANY=[@ANYBLOB="3800000000000000ffff000001000000", @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r0, @ANYRES32, @ANYRES32=r7, @ANYRES32=r0, @ANYBLOB="000000002000000000000000ffff000000000000", @ANYRES32=r27, @ANYRES32=r29, @ANYRES32=r40, @ANYBLOB="000000002000000000000000ffff000000000000", @ANYRES32=r13, @ANYRES32=r15, @ANYRES32=0x0, @ANYBLOB="cc8a6913299203f400000000ffff0002000000f43fb0f11e2f932aac56f9b6816570abe92ef9ee0737c44eb40a42f66aa6a41cf23f1062b39de9c0240e8442a9d9899a4a1b3951e484e40b69787ce441f47e1329fcb39d2bc44ef70eeba7126916fe8aa9643a9f483553c086dd814932bfa4fd84507bd11b71", @ANYRES32=r31, @ANYRES32=r32, @ANYRES32=r34, @ANYBLOB="000000002000000000000000ffff000001000000", @ANYRES32=r35, @ANYRES32=r36, @ANYRES32=r38, @ANYRES32=r39, @ANYBLOB="3000000000000000ffff000001000000", @ANYRES32=r20, @ANYRES32=r21, @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r22, @ANYRES32=r23, @ANYRES32=r24, @ANYRES32=r25], 0xe8, 0xc}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) r4 = socket$inet(0x2, 0x3, 0x0) sendto(r4, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getsockname(0xffffffffffffffff, &(0x7f0000000140)=@in, &(0x7f0000000180)=0xc) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) r4 = socket$inet(0x2, 0x3, 0x0) sendto(r4, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x100, 0x100) symlinkat(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00') r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) r4 = socket$inet(0x2, 0x3, 0x0) sendto(r4, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockname(r0, &(0x7f0000000040)=@in6, &(0x7f00000000c0)=0xc) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) sendto(0xffffffffffffffff, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = getpgrp() ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, r1) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) sendto(0xffffffffffffffff, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x1, 0x1, 0x81, 0x81, r1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) r3 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) sendto(0xffffffffffffffff, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) r3 = kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = kqueue() r6 = fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r6, 0x0, 0x0) r7 = openat(r6, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) r8 = openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r14 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r18, 0x0) r19 = getuid() r20 = getegid() r21 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r21, 0x800c5606, &(0x7f00000000c0)={0x1}) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000000200)=[{&(0x7f0000000100)="556baaaefa5d461b2b0178d3b6d76b0b8451bd21227be0b474f9fadbda7702320c2da0588d8731406ee79da9d5253ead63c0ed5ef538a0744917efcc6ffe8307ee24ac37830b80e20703b2e0a0dfffe44d90526afb392c431225d470cc59160c359f9f580e6723470682f3be69bafeadb7070b5b012b182fcfa416b96a4c61315e0f5cdc495032deed979645dff9063e409372e73d47a0d4b0756debad35b0759da833ecf7b3638b482e3444", 0xac}, {&(0x7f00000001c0)="5d66ca457df303e79623fe2d9acda02e20c0be2a8a930172a17b812be6b691eacb101b1c5c1de4cd70", 0x29}], 0x2, &(0x7f0000000440)=[@rights={0x38, 0xffff, 0x1, [r0, r1, r21, r1, r3, r4, r7, r8, r1]}, @rights={0x20, 0xffff, 0x1, [r9, r10, r11, r12]}, @rights={0x30, 0xffff, 0x1, [r13, r14, r15, r0, r1, r0, r0, r16]}, @cred={0x20, 0xffff, 0x0, r18, r19, r20}], 0xa8, 0x605}, 0x400) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) getpid() r3 = socket$inet(0x2, 0x3, 0x0) sendto(r3, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$unix(0x1, 0x5, 0x0) recvfrom(r1, &(0x7f00000000c0)=""/90, 0x5a, 0x2, &(0x7f0000000040)=@in6={0x18, 0x3, 0x70, 0x9}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) getpid() r3 = socket$inet(0x2, 0x3, 0x0) sendto(r3, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r1, 0x2, &(0x7f0000000080)=""/110) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r3) r4 = getgid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r6) r7 = getgid() r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000000040)={0x0}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r11, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f00000000c0)={{0x3, r3, r4, r6, r7, 0x108, 0x5ea}, 0x1, 0x6, r9, r11, 0x8, 0xfffffffffffffffc, 0x45, 0x7c}) r12 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x1, 0x8) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r14, 0x800c5606, &(0x7f00000000c0)={0x1}) r15 = openat$bpf(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bpf\x00', 0x10000, 0x0) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) r18 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r18, 0x800c5606, &(0x7f00000000c0)={0x1}) kevent(r12, &(0x7f0000000280)=[{{r2}, 0xfffffffffffffffe, 0x0, 0x0, 0x10000, 0x2}, {{r13}, 0xfffffffffffffffe, 0x36, 0x2, 0x6, 0x4}, {{0xffffffffffffff9c}, 0xfffffffffffffffe, 0x90, 0x85, 0x1, 0x8}, {{r14}, 0x8000000000000006, 0x40, 0x2, 0x7fc4c813}, {{r15}, 0xfffffffffffffff9, 0x0, 0x5, 0x6, 0x8}, {{r16}, 0xfffffffffffffffd, 0x0, 0x4, 0xfffffffffffffff8, 0x8}, {{r17}, 0xfffffffffffffffd, 0x1, 0xfffff, 0x66e, 0x4}], 0x6b1, &(0x7f0000000200)=[{{r18}, 0xfffffffffffffffa, 0x62, 0x4, 0x9}], 0x2, &(0x7f0000000380)={0x49bb, 0xfffffffffffffff7}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) getpid() r3 = socket$inet(0x2, 0x3, 0x0) sendto(r3, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r3 = socket$inet(0x2, 0x3, 0x0) sendto(r3, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000140)=0x6e) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r3 = socket$inet(0x2, 0x3, 0x0) sendto(r3, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) ktrace(&(0x7f00000000c0)='./file0/file0\x00', 0x0, 0xedb0e8ee80aca973, r2) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) open$dir(&(0x7f0000000300)='./file0/file0\x00', 0xa00, 0x8) wait4(r5, &(0x7f0000000180), 0x2, &(0x7f00000001c0)) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000280), &(0x7f00000002c0)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r7 = kqueue() r8 = fcntl$dupfd(r7, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r8, 0x0, 0x0) accept$unix(r6, &(0x7f0000000340)=@file={0x0, ""/70}, &(0x7f00000003c0)=0x48) mknodat(r8, &(0x7f0000000040)='./file0\x00', 0x1, 0x7) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) linkat(r0, &(0x7f0000000200)='./file0/file0\x00', r2, &(0x7f0000000240)='./file0\x00', 0x4) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r3 = socket$inet(0x2, 0x3, 0x0) sendto(r3, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) acct(&(0x7f0000000180)='./file0\x00') getrusage(0x0, &(0x7f0000000380)) acct(&(0x7f0000000040)='./file0\x00') r1 = semget(0x2, 0x0, 0x0) semctl$GETVAL(r1, 0x0, 0x5, &(0x7f0000000240)=""/115) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = kqueue() r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat(r3, &(0x7f00000000c0)='./file0\x00', 0x400, 0xedc14def806aa27d) getpeername$inet6(r4, &(0x7f0000000100), &(0x7f0000000140)=0xc) r5 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x0, 0x0) ioctl$WSKBDIO_SETMODE(r5, 0x80045713, &(0x7f0000000200)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) r2 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r2) r3 = socket$inet(0x2, 0x3, 0x0) sendto(r3, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r0 = kqueue() fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) r2 = socket$inet(0x2, 0x3, 0x0) sendto(r2, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f0000000740)={&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00\n\x00'/110], 0x6e, &(0x7f0000000680)=[{&(0x7f0000000240)=""/236, 0xec}, {&(0x7f0000000400)=""/214, 0xd6}, {&(0x7f0000000500)=""/87, 0x57}, {&(0x7f0000000580)=""/107, 0x6b}, {&(0x7f00000001c0)=""/19, 0x13}, {&(0x7f0000000600)=""/67, 0x43}], 0x6, &(0x7f0000000700)=""/41, 0x29}, 0xde3081060e18187f) r0 = socket$inet(0x2, 0xc002, 0x0) setsockopt$inet_opts(r0, 0x0, 0x20, &(0x7f0000000040), 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000780), 0x20004) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = accept$unix(r1, &(0x7f0000000040)=@file={0x0, ""/44}, &(0x7f00000000c0)=0x2e) bind(r2, &(0x7f0000000100)=@in={0x2, 0x3}, 0xc) r3 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r3, 0x0, 0x2, &(0x7f0000000040), 0x4) sendto(r3, &(0x7f00000007c0)="8964709ce2c3ff1d31463c22c7f73632470181eb37963203002802f01c0d3a80f518f49c72da84b89e7899aaa0b02d6abdae6be4fa0979761760a099a1d25becc0b43079", 0x44, 0x401, &(0x7f0000000840)=@in6={0x18, 0x1, 0x5, 0x1}, 0xc) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) kqueue() r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x400, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x0, 0x80) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: socketpair(0x36, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) bind$inet(r0, &(0x7f0000000100)={0x2, 0x3}, 0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) open$dir(&(0x7f0000000040)='./file0\x00', 0x20, 0x5) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) connect$unix(r1, &(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000040)='./file0\x00', 0x300, 0x8) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: r0 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyCcfg\x00', 0x8000, 0x0) ioctl$VT_GETSTATE(r0, 0x40067664, &(0x7f00000000c0)) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$VT_WAITACTIVE(r1, 0x20007606, &(0x7f0000000100)=0x23) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r2 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) syz_open_pts() 16:03:17 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) mkdir(&(0x7f0000000140)='./file0\x00', 0x12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r1, &(0x7f00000011c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e1ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009850bc9fb06c14c7609d4b124d0647a563453371b537cfb4c2ae7517185c7612a599d6012ffa9ce966ad12baf0c1dce4ca10ccb18558eff4d75611e9fb6210247fb08bfabac796662b932a078fdf6e3cf3bc7e300a8cedeba61a20a5228a376fd99f73e088dcb7c39c1632ef25fb8ffea159b995891ec00e2249951dc962c8b2761368847a779b2458bf5d0b3338f355fbd3d4117862135f22718f30f2e435e37c9054514b2838c46d51030b4ed0fe0f8bbfe2a5c38d5998e7dd28bbe2844d7e120045f01b3bf6fb82ab7d2da7ccf5903dc33a9d86592df5cc4112e8806a0a0b39361ce8e871e26033b7bd8d7b17a2"], &(0x7f0000001100)=0x1002) r2 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r2) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f00000000c0), &(0x7f0000000100)=0xc) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) 16:03:17 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x80, 0x0) r0 = getpid() ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x5, 0x6) setsockopt$inet_opts(r1, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockname(r1, &(0x7f0000000140)=@un=@abs, &(0x7f00000000c0)=0x8) socketpair$unix(0x1, 0x4, 0x0, &(0x7f0000000100)) 16:03:17 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) getpeername$inet6(r1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000180)=0xc) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x6, 0x397fb2143085914e, r2) socketpair(0x6, 0x4, 0x81, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) ioctl$VT_GETMODE(r1, 0x40087603, &(0x7f0000000040)) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x4) r2 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r3, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = kqueue() kevent(r1, &(0x7f0000000140)=[{{r4}, 0xfffffffffffffffa, 0x8, 0x3, 0x3, 0x3}, {{r5}, 0xfffffffffffffffc, 0x46, 0x11, 0x72, 0x6}, {{}, 0xffffffffffffffff, 0x8, 0x20000000, 0x6, 0xf6cb}, {{r6}, 0xfffffffffffffffa, 0x90, 0x1, 0x1, 0x677}, {{r7}, 0xfffffffffffffffa, 0x64, 0xfffff, 0x100000001, 0xeace}, {{r8}, 0xca51363fe7cf0ec4, 0x5d, 0x40000000, 0x3, 0x200}], 0x4, &(0x7f0000000200)=[{{r9}, 0xfffffffffffffffd, 0x100, 0x436bdb80abbbed86, 0x1, 0x3ff}], 0x2, &(0x7f0000000240)={0x80000001, 0x6}) ioctl$WSMOUSEIO_SETMODE(r3, 0x80045726, &(0x7f00000000c0)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x80, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getgid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) utimensat(r1, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r2, 0x0, 0x2, &(0x7f0000000040), 0x4) recvmsg(r2, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) open$dir(&(0x7f0000000040)='./file0\x00', 0x20000, 0x8) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) r5 = openat$klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0x1, 0x0) r6 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r6, 0x0, 0x2, &(0x7f0000000040), 0x4) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) connect(r7, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) ioctl$LIOCSFD(r5, 0x80046c7f, &(0x7f0000000180)=r6) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) mknodat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x80, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x80) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:17 executing program 0: r0 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyCcfg\x00', 0x1, 0x0) ioctl$WSDISPLAYIO_GVIDEO(r0, 0x40045744, &(0x7f00000000c0)) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:17 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:18 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x100, r0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) shmget$private(0x0, 0x10000, 0x400, &(0x7f0000fef000/0x10000)=nil) 16:03:18 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) sendto(r0, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:18 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x200, 0x0) faccessat(r1, &(0x7f00000000c0)='./file0\x00', 0x80, 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r3, 0x0) setregid(r3, 0x0) setgid(r3) 16:03:18 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) sendto(r0, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:18 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x120, 0x46) getpid() r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f00000001c0)={0x0}, &(0x7f0000000200)=0xc) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x400, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = semget(0x3, 0x0, 0x0) semop(r2, &(0x7f0000000040)=[{0x0, 0x40, 0x1000}], 0x1) semctl$GETVAL(r2, 0x3, 0x5, &(0x7f00000000c0)=""/238) 16:03:18 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) sendto(r0, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:18 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:18 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) r2 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x30308, 0x143) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x0, 0x0}, 0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) 16:03:18 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:18 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:18 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) sendto(r1, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:18 executing program 0: socketpair(0x18, 0x3, 0x12, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$inet6(r0, &(0x7f00000000c0), &(0x7f0000000100)=0xc) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) ktrace(&(0x7f0000000140)='./file0\x00', 0x1, 0x114, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:18 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) sendto(0xffffffffffffffff, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:18 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) truncate(&(0x7f0000000040)='./file1\x00', 0x0, 0x3) r1 = getpgid(0xffffffffffffffff) ktrace(&(0x7f00000000c0)='./file0\x00', 0x1, 0x424, r1) 16:03:18 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) sendto(0xffffffffffffffff, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:18 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() openat$diskmap(0xffffffffffffff9c, &(0x7f0000000040)='/dev/diskmap\x00', 0x80, 0x0) socket$inet(0x2, 0x5, 0x2) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = msgget$private(0x0, 0x500) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r5, 0x0) setregid(r5, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r7 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000180)=0xc) msgctl$IPC_SET(r1, 0x1, &(0x7f00000001c0)={{0xd5f, r3, r5, r6, r7, 0x40}, 0x9, 0x9, r8, r0, 0x200, 0x100000001, 0xea, 0x7}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpgid(0x0) 16:03:18 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) sendto(0xffffffffffffffff, &(0x7f00000000c0)="07182a6cdcc3988afea2447887646df92cd6474116578c678b6aa59f032a388ed6587725d8be2d5b6e488e89f31998daeb7db7d8da6cf804e4c59fca57f2d6f4c4c98a380dde", 0x46, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) 16:03:18 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) r18 = fcntl$dupfd(r17, 0x2, r16) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r18, 0x0, 0x0) r19 = openat(r18, &(0x7f0000000040)='./file0\x00', 0x800, 0x8) utimensat(r19, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x8000, 0x80000001}, {0x2, 0x9}}, 0x2) 16:03:18 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in={0x2, 0x2}, 0xc) pckbd_enable: command error 16:03:19 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x6, 0x1, &(0x7f0000000040)) pckbd_enable: command error 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) r15 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r15) openat(r14, &(0x7f0000000040)='./file0\x00', 0x100, 0x1a) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) sendto(r1, 0x0, 0x0, 0x0, 0x0, 0x0) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x100, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getpid() r1 = openat$null(0xffffffffffffff9c, 0xffffffffffffffff, 0x1, 0x0) ioctl$TIOCCDTR(r1, 0x20007478) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x400, 0xffffffffffffffff) 16:03:20 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) getgroups(0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r4]) lchown(&(0x7f0000000040)='./file0\x00', r2, r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c9b5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da700"/187], 0x6a) getsockname$unix(r6, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000100), 0xc) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) r15 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r15) openat(r14, &(0x7f0000000040)='./file0\x00', 0x100, 0x1a) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4) ioctl$WSMOUSEIO_SETPARAMS(r1, 0x80105728, &(0x7f0000000100)={&(0x7f00000000c0)=[{0x88, 0x8c}], 0x1}) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) r15 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r15) openat(r14, &(0x7f0000000040)='./file0\x00', 0x100, 0x1a) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = fcntl$dupfd(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c) r2 = getpgrp() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r6, 0x0) setregid(r6, 0x0) setsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000040)={r2, r4, r6}, 0xc) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) r15 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r15) openat(r14, &(0x7f0000000040)='./file0\x00', 0x100, 0x1a) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x268, 0x1a) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='@\x00\x00\x00\x00\x00#\x00', 0x90, 0x0) utimensat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x200, 0x11}, {0x8, 0x5c8}}, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x20, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) r15 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r15) openat(r14, &(0x7f0000000040)='./file0\x00', 0x100, 0x1a) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 0: open$dir(&(0x7f00000000c0)='./file0\x00', 0x80, 0x0) openat$pci(0xffffffffffffff9c, &(0x7f0000000040)='/dev/pci\x00', 0x10000, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f786d9a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0x200, 0x1, 0x5, 0x4c}, {0x9638, 0x2, 0xe0, 0x7}, {0x5, 0x20, 0xe5, 0x8}]}) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) r15 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r15) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) getpgrp() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r1) setreuid(r1, 0xffffffffffffffff) socketpair(0x20, 0x1, 0x73, &(0x7f0000000140)={0xffffffffffffffff}) sendto$inet6(r2, &(0x7f0000000280)="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", 0xfb, 0x410, 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r3 = getpid() pledge(&(0x7f00000000c0)='-\\%-\x00', &(0x7f0000000100)='\x00') ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) getpgrp() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = getpgid(0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x0, r1) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) r5 = getpgrp() setpgid(r3, r5) setregid(r4, 0x0) getgroups(0x7, &(0x7f00000000c0)=[0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0x0, 0xffffffffffffffff]) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) lchown(&(0x7f0000000100)='./file0\x00', r8, r10) kqueue() setregid(r6, 0x0) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) getpgrp() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ioctl$KDSETRAD(0xffffffffffffff9c, 0x20004b43) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) r2 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r2, 0x2, &(0x7f0000000080)=""/110) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, 0xc) socketpair$unix(0x1, 0x6, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) kqueue() setregid(r5, 0x0) setregid(r5, 0x0) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r6, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r6, 0xffff, 0x1022, &(0x7f0000000180)={0x0, 0x0}, 0xc) r8 = getgid() r9 = getppid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) openat(r0, &(0x7f0000000040)='./file0/file0\x00', 0x8000, 0x164) setpgid(r11, 0x0) r12 = msgget$private(0x0, 0x0) msgctl$IPC_STAT(r12, 0x2, &(0x7f0000000080)=""/110) msgctl$IPC_SET(r12, 0x1, &(0x7f00000001c0)={{0x7, r3, r5, r7, r8, 0x40, 0x2}, 0x15e, 0x0, r9, r11, 0x0, 0x101, 0x8000, 0x7}) r13 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r14 = open$dir(&(0x7f0000000280)='./file0/file0\x00', 0x80, 0xc) symlinkat(&(0x7f0000000000)='./file0\x00', r14, &(0x7f00000002c0)='./file0/file0\x00') chflagsat(r13, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) getpid() 16:03:20 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r2, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r4 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r6) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r4, r6, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r5, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r14, 0x800c5606, &(0x7f00000000c0)={0x1}) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r10, &(0x7f0000000b00)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYRES64, @ANYRES64=r11, @ANYRESHEX, @ANYRESOCT=0x0, @ANYRES32, @ANYRESDEC, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRESDEC=r7, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRES32=r12, @ANYPTR, @ANYRES64=r13, @ANYPTR, @ANYRES16=r14, @ANYPTR, @ANYRESOCT=r15, @ANYRES64, @ANYRES32], @ANYRESOCT=0x0]], 0xa) sendmsg$unix(r9, &(0x7f0000000880)={&(0x7f00000004c0)=@abs={0x1, 0x0, 0x2}, 0x8, &(0x7f0000000800)=[{&(0x7f0000000500)="a4512dd457a628052cc21a9225b69a701fc8787ab29500e174f29968e365eaf83c0fe9a9e1271d84326069e31a8f622b534057af225e0484d485fe4310df0403b1a6f317ccefa960f0134ce880edfa6231b74b8773f4d94ec9a2bed650155b3f3a1c3e05e862b499246e6e8e69e2250ac57e6c5f93c70e733468ea380dc2cb146533aa70b26f71ad36e193e15117cff7e02b6336b03809d2ff3d5939fb6ae012eeefaa5684269bfba637d26d32bef3a885bceff1f2dc05bb4da3d7d8b31601902eb9c52ebb1cd612f7c25b4bd2662a6d0c92ec3107cb6de48f34a2c3eebe401b670d7874d8181a3d74dc05a1511e8d4d1b0ee8df95", 0xf5}, {&(0x7f0000000600)}, {&(0x7f0000000640)="c73cef20118d9828656474104a3111afcf42e07c641c7a197b2628d7e3741ea268b0d31764290cd5f6cabdeb925b326eb222b9654767fd56eaa5a1f6403804070dada2b508a7e9315fac7d7f53bea284e509ac87c2b43e287a6007c05dc522a6cfaf01", 0x63}, {&(0x7f00000006c0)="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", 0xfc}, {&(0x7f00000007c0)="14e2138021890dec1fdfb5cb864a72bb9974bdc501417514489fc560c24a2923176054700765538063faa4", 0x2b}], 0x5, 0x0, 0x0, 0x8}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r16, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x1, 0x0) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r9, 0x0) setregid(r9, 0x0) r10 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r12, 0x0) setregid(r12, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r9, r10, r12, 0x40}, 0x400, 0x40, 0xdd4}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) ioctl$VMM_IOC_CREATE(r2, 0xc5005601, &(0x7f0000000180)={0x10, 0x4, 0x4, 0x5, [{&(0x7f0000007000/0x4000)=nil, &(0x7f0000063000/0x4000)=nil, 0xfffffffffffffffe}, {&(0x7f000002f000/0x1000)=nil, &(0x7f000008f000/0x3000)=nil, 0x2f}, {&(0x7f00000f1000/0x1000)=nil, &(0x7f00001b4000/0x2000)=nil, 0x100000000}, {&(0x7f00000d2000/0xf000)=nil, &(0x7f000000d000/0x4000)=nil, 0x81}, {&(0x7f0000ffd000/0x3000)=nil, &(0x7f00000dc000/0x4000)=nil, 0x2ce}, {&(0x7f0000160000/0x4000)=nil, &(0x7f0000185000/0x1000)=nil, 0x7}, {&(0x7f00000b4000/0x3000)=nil, &(0x7f00000e3000/0x2000)=nil, 0x6}, {&(0x7f00001f6000/0x4000)=nil, &(0x7f0000003000/0x4000)=nil, 0x2}, {&(0x7f00000e2000/0x2000)=nil, &(0x7f00000a6000/0x4000)=nil}, {&(0x7f0000130000/0x3000)=nil, &(0x7f000014c000/0x3000)=nil, 0x4}, {&(0x7f0000025000/0x14000)=nil, &(0x7f00000e9000/0x1000)=nil, 0x1}, {&(0x7f0000116000/0x1000)=nil, &(0x7f0000199000/0x4000)=nil, 0x2}, {&(0x7f00000cc000/0x1000)=nil, &(0x7f0000186000/0x14000)=nil, 0x8001}, {&(0x7f0000131000/0x1000)=nil, &(0x7f000011b000/0x1000)=nil, 0x8}, {&(0x7f000001f000/0x4000)=nil, &(0x7f000013a000/0x3000)=nil, 0x7}, {&(0x7f00000e1000/0x1000)=nil, &(0x7f00001b3000/0x3000)=nil, 0x1}], ['./file0\x00', './file0\x00', './file0\x00', './file0\x00'], './file0\x00', './file0/file0\x00', './file0/file0\x00', ['.\x00', './file', './file', './file'], 0xfffffff9}) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = getuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r5, 0x0) setregid(r5, 0x0) getgroups(0x7, &(0x7f0000000100)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, r5, 0xffffffffffffffff]) socket$inet6(0x18, 0x5, 0x4) fchown(r1, r3, r6) r7 = kqueue() r8 = fcntl$dupfd(r7, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r8, 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r8, &(0x7f00000000c0)='./file0\x00') 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r8, 0x0) setregid(r8, 0x0) geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) chflagsat(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r8, 0x0) setregid(r8, 0x0) geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x10000, 0x0) r0 = socket$inet6(0x18, 0x8000, 0x1) connect(r0, &(0x7f0000000140)=@in={0x2, 0x1}, 0xc) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) r2 = kqueue() r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x80, 0x0) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x200, 0x0) ioctl$BIOCGRSIG(r5, 0x40044273, &(0x7f00000001c0)) r6 = kqueue() r7 = fcntl$dupfd(r6, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r7, 0x0, 0x0) ioctl$DIOCMAP(r7, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000200)='./file0/file0\x00', r4, 0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r8, 0x0) setregid(r8, 0x0) geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f00000000c0)=0xffffffffffffffa6) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) setpgid(0xffffffffffffffff, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r8, 0x0) setregid(r8, 0x0) geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040), 0x4) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000040)=@un=@file={0x3, './file0\x00'}, 0xa, &(0x7f0000000140)=[{&(0x7f00000000c0)="1a6760d2ec01cfbfd2373b9bd82c184bb65c301dff6426b90864bf601fce946fc5b5e689cdc72407e09fd2b1794e9bad839276f1897906785e28b49fb12456113a028aaddaecaf36fc56d43d50c59ef8691881523f4c7cfa475dd7f5ec59cd1ca8583d0b2a0ae248d4fede762e797ed92453bf5cc7a89dc2842b8a2295", 0x7d}], 0x1, &(0x7f0000000180)=[{0x10, 0xffff, 0x9}, {0x70, 0x1, 0x3, "ad5abd0910f36b37e40b1f6aabf682c9434a4a6c65a0ddebeee87938179dc66996a2e3fd0d24c3ec21bcd889081c1f3fbce687368e889c095f11b06357463759fffca958a9708db72a246b8ac63d1d868aa8c63a659fb7203b21584e"}, {0x10, 0xffff, 0x3}, {0xc0, 0x1, 0x81, "c09cfcfb65597a9e0f9319c795602d9751f26b35c7f52ad030b79e94b9e2fd5bdd512c703f033705954708478171a3d6e5ac818e71ab6a169b30ed9137ff286a7228e21e9de23b2cd531bb4e30e9ad20ba5aa850d127c6cc9700c47febe05a3a728aee9f84e0249cce813bea34639b635f034be5207acf0c38a3cd115a9781c91e08acead21b23312bb75d59f65a1c03ef3a00cb965e1eb96aa39a82158d526cca685c25971981ec57"}, {0xf8, 0x0, 0x3, "abe507f41733913a95f20474f0e98586b25bc454d1869627fb6f77c0b56223d00342fe793eb41a372e08d9566174c3a0285c8caced619e0938c60a9d42b1b96dbe00070efa48bd895522040d72b0aafbc03917d0cf71b09677d6767cd9cc5d2fef5d3323587c010070cf321e473e7b0cd6f1efa2a6845921715e1a41873bd6b5915d0e22b830cc76d1e493ac8ddeead35cbce5ca6a996cf8ccc775df93c424ea7c7cc9ac1b3a534c23af03d5aef0792ce08c6d00f2e5e2b621af09dfbe612b92525ee5fff2313e47f0d0bd30638867e3eab8d1f31da7e62760884c20facf9666d59e"}, {0xc8, 0xab2cd63d8cbfbb30, 0x1, "2636569fd4afe458630cb30467cc9ee9c4b0bafd8d06dab9745b0a6cb62f71938d04e18a5b356d960cb68d554fcb1c8eac0ab13d7e59ca87329d63bc25304c6f50b0bde0e7f0cc73fcfe898bb533146b84b60c5f4098cb570c958b010954e7af17594ba9efef8833605b50bfb9a7f16fbdcfbead5bd3a9597accb5b6935c030f5ae5ccf9bc44d4bbd34837cace2ec8a0e7ec998d1c130d304a973ef7e8c208c1a1766db198307a06c177bb87af3f76ba3c02ce"}, {0xb0, 0xffff, 0x200, "2fc11f4fd5f668bbae531ae183dc9b26a15caef4d5b63e30aa83766f04ac64bd0f8d9cd15696ea94393985c8617394151009f5549523e78e4e95785e5fb0b69323b1b504b8da9ea279438c234991c4ef635c77087e65a046e41de2f8935ea23e29d864349b212ad45cf45e906d08198e74de73245c59676e11641e1024d618ea253a96dccd60b08582e48c93bed82920876f1c461cfea15b6f0d7f1416dd22fd"}, {0x20, 0xffff, 0x8, "3c3f9069ba991792c3"}, {0x88, 0x1, 0xebcc, "f56f2b82012d5a3f80753c2d7749bf26e05d28cb72fbf9eef30250102030a38c41104826390974ac39825d49942b74c12f5f7774c092793890179ac09422f021b5fd3ce53ac82228c28e54c23c27eafe5fb17c82f84fe4bdaec4e913a224d9a2ad32a0e3785dc28accf5d58a45349f94c51ef9e0784e"}], 0x468}, 0x2) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r8, 0x0) setregid(r8, 0x0) geteuid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() sendto$inet6(0xffffffffffffff9c, &(0x7f0000000000)="b70d2d32ce64f5d8f5c5673b271e40b569903c03757e5886289a3e9201721c036abb2bc2199a135b13a3e52e4d9e6ba1f658c82bf54f770f5538c4a65d45d0e7818c10344e99a838c275447037f2e1dc46bdc6bb1bcbe3fabe7cc1837ce37c0cc22c82a7db2bbbe664da13a8f6bfdb4d271c744d9a890b9d2fd0fa", 0x7b, 0x401, &(0x7f00000000c0)={0x18, 0x1, 0x9, 0xef7}, 0xc) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r8, 0x0) setregid(r8, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0x1, 0x5f4) r2 = getpid() open$dir(&(0x7f00000000c0)='./file0\x00', 0x480, 0x1) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:20 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r8, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: r0 = shmat(0xffffffffffffffff, &(0x7f0000ffd000/0x2000)=nil, 0x1000) shmdt(r0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r1 = getpid() kqueue() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f00000000c0)=0xffffffffffffffa6) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = syz_open_pts() r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) ioctl$WSDISPLAYIO_SBURNER(r2, 0x800c5751, &(0x7f00000000c0)={0x1, 0x3, 0x4}) ioctl$TIOCGWINSZ(r0, 0x40087468, &(0x7f0000000000)) r3 = getppid() ktrace(&(0x7f0000000080)='./file0\x00', 0x4, 0x4, r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: chroot(&(0x7f00000000c0)='./file0\x00') r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r2, &(0x7f0000000100)=@abs={0x1, 0x0, 0x2}, 0x8) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x3) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) kqueue() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x8000, 0x0) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r2, 0x0, 0x2, &(0x7f0000000040), 0x4) setsockopt$inet_opts(r2, 0x0, 0x2, &(0x7f0000000040), 0xfffffffffffffe62) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000040), &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) truncate(&(0x7f0000000180)='./file1\x00', 0x0, 0x8) accept$unix(r3, 0x0, &(0x7f0000000140)) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000040)='/dev/wsmouse0\x00', 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r3, 0x0) fcntl$lock(r1, 0x8, &(0x7f00000000c0)={0x2, 0x0, 0x6, 0x4, r3}) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x41, 0x2) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000001240)={0x0, 0x0}, 0xc) r7 = getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r9, 0x0) r10 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r10, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r11 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r11, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r11, 0xffff, 0x1022, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r14, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r15, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r16) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r18, 0x0) setregid(r18, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000012c0)={0x0}, &(0x7f0000001300)=0xc) r20 = geteuid() r21 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r21, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r21, 0xffff, 0x1022, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0xc) sendmsg$unix(r2, &(0x7f0000001440)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000001200)=[{&(0x7f00000000c0)="e8def3c93fbaaa6138059a90de7f7c667fce7bb808825cf1b10921e837044d5dbd7d32a90c6022a9568fed5eecc1e33b8217ef1d3ae1e2e994673cb527c144cbdd252791215ab5632e50a413f9feae19420a35d348885c275cba3b12b57410b7351cee9bfbe8ea5db02cc8ed9cc6d147f1241aa855f90332ce9e7215c7cbe855d9916c9ef9469afe1f8fe0f49f65acfdf7d81802f9a0060428438134e55f0bc1ed989c58686bdadb28238f3444c22903", 0xb0}, {&(0x7f0000000180)="be9242b16545dcc37aedca0d6f2c26715af4f25aed03a702746dfe31df19e220b8f075423b7f4b651c4699e9336913fd37726ed1d015e9916323d818da5fc2afdcbcfa126339d5ce664a4acdae8b6513bee3dc4394fee595e8c500fbb495befc0f7e0f998278640c9b6202", 0x6b}, {&(0x7f0000000200)="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", 0x1000}], 0x3, &(0x7f0000001380)=[@rights={0x20, 0xffff, 0x1, [r3, r0, r0, 0xffffffffffffffff]}, @rights={0x20, 0xffff, 0x1, [r0, r0, r4]}, @cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, r6, r7}, @cred={0x20, 0xffff, 0x0, r9, 0xffffffffffffffff, r12}, @cred={0x20, 0xffff, 0x0, r14, r16, r18}, @cred={0x20, 0xffff, 0x0, r19, r20, r22}], 0xc0, 0x8ec29dd25586813e}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bind$unix(r1, &(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) fcntl$setown(r1, 0x6, r0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) clock_settime(0x4, &(0x7f0000000040)={0xf80000000000, 0x4}) fcntl$setown(r1, 0x6, r0) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10000) linkat(r0, &(0x7f00000001c0)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00', 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r3) setuid(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4) linkat(r4, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00', 0xc) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) ioctl$WSDISPLAYIO_LDFONT(r2, 0x8058574d, &(0x7f00000000c0)={'./file0\x00', 0x80000000, 0x3, 0x7, 0x0, 0x1, 0x81, 0x3, 0x1, 0x0, 0x3, 0x1f}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)=@un=@abs, 0x8, &(0x7f0000000200)=[{&(0x7f0000000140)=""/61, 0x3d}, {&(0x7f0000000180)=""/56, 0x38}, {&(0x7f00000001c0)=""/45, 0x2d}], 0x3, &(0x7f0000000240)=""/71, 0x47}, 0xc0) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() rmdir(&(0x7f0000000040)='./file0\x00') ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) getpgid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r4, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b177db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495850900000073b326d686b2cb4265b669dff315e672148d"], 0x6a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = getuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r9, 0x0) setregid(r9, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r11, 0x0) sendmsg$unix(r4, &(0x7f0000000500)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f0000000480)=[{&(0x7f0000000180)="8d28e71a3be31b5c4e2bca51bed2e5e6ac8569899fc5d4732a18eb70ba6a9d636cf72a07dad49e67b8e3605c391d6a5c22bdc06f751585aec29e606f065e51dd740c8e0a179235b3c8c2b37ad835dbb75275250e7ac8a150c35d88c7c737d093d25942aee7eb1ecc6ce3596f4443e059879838e995529fb9a434d215e63fccc74e", 0x81}, {&(0x7f0000000240)="fa5d1ae5987683709d98fc524a1efe6e2a0a46ee76819d0d2726328f5d34ee05d0765cb3457862b577fba7a62261dfd3716e8b5e42a542f07b9df679a5de084fa6aeb66681c6aeac5252313446ffcb1eb3e1e304049013ad0a9b30b7eeb447886311b36553c7d0d1879a569d76779ecb4171b4748311d658ff473831b2d0c6f4f661415fa82711b2b2b97b13f7354f24030bddb8a25fa733eea9f3c5f2ac3d3b4e73a2522041c45702bdf7502ae12a7d6396c1a09d97b972a5cc69083ae2c5bb0285a885d37d4d8ab2c95450c0baf4be716beeca2dbacc782573541f043c6f511fbfdb3051c78d2a529241492f6399", 0xef}, {&(0x7f0000000340)="ed0fb10a23a7c9fbd878ba06011d7d8e07ab4ec892d05984f1449dfd5314ce7bf7454dbf091612b38964b6986bf3dabf611cf3521eb53efb12436fe0a474c145bf9708512cb80d52ce466b9d0a42c43178523d88651acbde3a7a267c76c7f08ee8c94c8156f920c3ec04d03e34a9048ccbd87f1ad174907420a03a8db13d8b8517fdb45bd7ea407eab1ae5a8864f74db9a402bd35074f00f765cd8c8ca", 0x9d}, {&(0x7f0000000400)="41bc4704ddfdb4622799570ef8798a20242a28b6be6d39038516796f9a242b9b23624f8c35d1eece58979e6464bbb64b0f7a86303d6ad5e59a4320e140a38a1177d31f4d86ad6b9b4be279a8d530a28dc73df6f80c", 0x55}], 0x4, &(0x7f00000004c0)=[@cred={0x20, 0xffff, 0x0, r6, r7, r9}, @cred={0x20, 0xffff, 0x0, r11, 0xffffffffffffffff, r3}], 0x40, 0x400}, 0x5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 1: ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r3) setuid(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r5, 0x0) setregid(r5, 0x0) setregid(r1, r5) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 1: ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: open$dir(0x0, 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 1: open$dir(0x0, 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000040)='./file0/file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: open$dir(0x0, 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000001240)={0x0, 0x0}, 0xc) r7 = getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r9, 0x0) r10 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r10, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r11 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r11, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r11, 0xffff, 0x1022, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r14, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r15, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r16) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r18, 0x0) setregid(r18, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000012c0)={0x0}, &(0x7f0000001300)=0xc) r20 = geteuid() r21 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r21, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r21, 0xffff, 0x1022, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0xc) sendmsg$unix(r2, &(0x7f0000001440)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000001200)=[{&(0x7f00000000c0)="e8def3c93fbaaa6138059a90de7f7c667fce7bb808825cf1b10921e837044d5dbd7d32a90c6022a9568fed5eecc1e33b8217ef1d3ae1e2e994673cb527c144cbdd252791215ab5632e50a413f9feae19420a35d348885c275cba3b12b57410b7351cee9bfbe8ea5db02cc8ed9cc6d147f1241aa855f90332ce9e7215c7cbe855d9916c9ef9469afe1f8fe0f49f65acfdf7d81802f9a0060428438134e55f0bc1ed989c58686bdadb28238f3444c22903", 0xb0}, {&(0x7f0000000180)="be9242b16545dcc37aedca0d6f2c26715af4f25aed03a702746dfe31df19e220b8f075423b7f4b651c4699e9336913fd37726ed1d015e9916323d818da5fc2afdcbcfa126339d5ce664a4acdae8b6513bee3dc4394fee595e8c500fbb495befc0f7e0f998278640c9b6202", 0x6b}, {&(0x7f0000000200)="00111b039a9ff65dfba52badba4c20651e819153460cb17e1ea7e18bbba948f14049809a4df43ae1bbc85cac7ba6c2ffd5ce43acf9d754cb3dbb9393b79c27488be2ad7e2d3f486a0b6df145dc4ac87cc2828128fe7e1ff765adf0939aedaba74d17a470c25c66f17d2467ab64b1d733b01a0399e6e983f74b4f9dfc06da6ea908ea384c192ec4c7a757477f9fc801c8417bfdd0e2f81837c4c941ad2a02282a04339f50bb90764e6cdc8d7e04039b11141eebbe2c3814cf7ea6269844d0a4e903aaf300554d579d4561e31e914f4cbfeb09ab90176957f52890d9a1b8229de897416926f8eb4ec6c87837307124f3f0f2898ceb65252de02d97c5dacf21174494b53185efe7fc1f1fa11b58bd9b0b127231427facba075240e88aafe9ca6bc336be9c0bde93db1b5b48bf1e85366b17e55418b186e7353a4504fede012c8ea0f39f0efd565a105a65ce9913101e1bf6c343eb2fdb1ef1518bf4a4f6923a0745af6b8fe24ba7d5aee4c399b276d56fc3976a518652acf1ce2d334b28ef2f8efc5a413c5e4e4a18d49b5f489baa201c78dfdc33c1a8408b7f02b90dbb9057fd1db6dc77e6bb3fa84500b166077f72f34c45ad899953ee5f14c181a459665add2d7db21832582b58a4af73468b4542c77c0105a4930659769b1e7947422a523de45b4472176af3927b845dd49bcabbd6675356d3abd85e312a894265023ee05119614c7d7f455328d4e3a205c40cae3af9644ca6a6c82a6647843ce8b442f0051f0fa9a4b1507cd0f0e3a40c62c8c42a2e73137b971e42cdb1e9c29309eb33c1d12aa338f4f51be51bd02ec9fedab6c14d9d031d1e97d8d3746700309c6c8af61c08de4786cfd17cecf6b7a15f43b29f26c741bfd6eefc26f455c54f555bbfc7af0c17049f7a8c8eac9789dfc7cfb22f64cb9dee3635a315568f2ff20038d268a85b8c5a6000f1aa96ecf4feea0558d4bfa038057664da360ef2f14401f52b1a4163ea1d4bf6badfdd38282d080a3e8d8d47814bff1cdc22a4f34d6f4c66b3ebd0673951bdc2cb211df365f9e70b2c1b7e605814540f832a5745c60bff9ef2e6db9bf3a78f3c4fad9d0716c06a05d9f265384d0baab75923a77b093a4994b0973da4574cfbf420c7aca9685b79048eb0f129bb3abc1aa871f881bd45c48565acc26fdc3a73826c08952921f3042ede24b35ab78f9e1a22fc13b295089920f2fa5502ce880d0693f8f3168259ed38789d694d4a5ef341d624bdd581678a29af76d6e4644c9d6aca18823c14e4d58bc7d6ad0424c98b86b0c7d4b09568e0f35e532203da9b459046fd7b242943031e54c82ceb46bc357ff142368b91eb90240d9e832b301b501e39881bd18ca3bbd664eeb1abb5716ff7e7890c1084511d37993ae8cf84df9a4a34b0be033ce81a6d822ccaac9bfafafd4d4a23d60021893e084ad15bd73ed094b8c82b09abcd8a71923f2c88258dfa7d9b636e1fab7027c5e2077018517f64d510fdd31ac1957f8c5c2d994248eb53546abbe526f0ab85cc41730c359cd2a4afad23f5555559107f5bcd0018438812d2b39792d78f2331e57ff88500d736d4f242f7dfb6b75915475aeb5fa2a97550376ddb7d2ffe379bde3d98ad12f2fbae6f11c70861e1e32f4f54ddeae95ffb6ae0377b0244d01ed0084c9801513d19bea66bcb97027a944397b5abf02521f9331e64bb647c55c5af8d1570d10b32cc8b06fbde39ed2cf02f43c33365c5eb06094c442ddee121e2ff7b9e14fbc9b054ecfc85932096ef4b21cf66fd0686beba153d608a40eef63c21ecd52a875707fbfbeba8e43618d4ea27e113c8eb0a604da3aacbc6bb1c4eadc2b68cd3a317a57083b55c789c974cb47b6553704ff164509b40f8b4f1208a0efb33782d95d39405ad1e7587ae4b1fd7b6b1e7c0d3654af0e127da0468bc6155f703663669f4c0d2c4627f509fa998f9290bd7e431d30b82ee2e15ea73e8f101eec5df988fb6efa46970ff1985e58a773c2a8f2ec2684cae1657e00948c5a7a66995fb164dc623d37dd7e9cca52338d54cae2c00f3b9e0db33e1a27f7e2d0a13b435910baebfae2effc71657d1e7d642fd282a7ebe1b69250d622ab8b4ba55b71adeba9a18c9118870d464c66af3c5f66dc6524c1920933bda9cc35944b5fed03f7f228901e021034b5c3adcae6931f95b75b50116cd133c7aed2ede6fc804650e348096f41b25b06bdc33e69848bf098327a43d7e588815686a3e698921e869eb14a03c3fd3d1fe9bd0f0b7b72d09a47b7e5f43d930ce8e03fa69995eaf6da916bffbb91caba31a859af0050e1489ecc7894292bf8e81bb4f5fc5ed6f4b19c0bf0b1248fc82536f58fe2ce905357e718d4bf378dbd8a242f8d42ce54075900f447e9d9b645e3af15dc47bd65f9e1eb726c563fb2f914e36a5306f7ba434476abbcba7b201cbefb5cd76d982353587205b0f20f0ad5735ff666ca39386cf1f72213bc0d791b01718951e2a331a969e84066ebca48477c57c69a850660b3b1195ffba5f549d563951e246685b5bbf4a4268f52b13af22d95522af179f58032fe08770e5860c499a9f4376cc67cc9cb833a9d268e55cdf222ffdb00911c8b92abf85223ba0072fac7411eefe5fff796d0a385212a7c2fe8de63bfb5a31a5ae6a2a9151a9e69ae12cc979abdfa0b23399948b2987e6c37df946c55060ac215cc14ca2535ce5a964ff0470acd86284bcff9426137c613a60d3efb050b21d098f4379a40678884c70dd4f616e5cdb30604d47c12b3e7100af4f1c1937c9e392c0f415bb8cfcccefef63139824810f243d2e707693b0d8860c4ddee3e3614c6a263776e63ba8b0a79cfc9f6f6586287911475b9cb0698240de5e2e6f752873f8c13c081a02840a6ba84a42545274f58a44105e442cbb530d7e316d3285c5e68966d3fe77fa00d9d35d50d91c3806e8872f462d09b1efa4a2766fa7026e2f80222154d311636d81af6d689303627774058db09885d76f54c09a6b8711d5484215fe4aac895bdb1388e401d84276d7089bd6a8c5a04653bfb4ae1ea6b7a8894e68b698a8c90bc07b02e82d6523f837f9f5e16645744791db3e3279676faf1562846d25eba8c64fbc350b5f6ebfa1086a4b1334bff7044952b91affe04acb07ba8a9d096306bde55b1ca4cad4b60a3cd7f81cacbc9ffe1fbb5a71aab3735e11f15a3dfded7c88dbad5bd97ca6dc0fcc6681e997c5c1d9b4848849dff4739b4ac69e0a218cd93a4bcee17ad0bcf2ea4c8712167962cd7dfdb39bbadeef73c4cd1829d1aecb29ecdfbc1efd33ffe40b07fa1c10872f0e98eaae31085cb645bfcc8db8a7a16768ca898054ba8e04c62ca14917c1a65b41ce07f1f874ead13b53c982af1723af53e52b0daafaeb4dce7930a4025f40b2a2b46f8a35623923885a15300ccab72f3586cd60094e4d611d840f56eb21e9427b31f01c5a24182b152d0affb21fa0eb68b0e7980aeaa68a556d0e14dbf1775e3dba6e11bac2f29a6a19d2ad19b53ec510a0ebe333e5e3798c296bb9ed2432948d8ea4a8d815eb8f2417b65e33ba694e0ffce3c91f59751b5f4bc196ad5ad12300f8ea150e2ec82cf68f2cd5f5c4623bcb396200f466994163d0777b26eb51e2b818ac4b7d3096e9f4bbcedf48062c34eeca49eda3fecd7713f4d4f1555742245edac465c96cdb16e24558722154866d6ab648924b2da7cc1ccbe7469fff023e17d24cc95fb3e8fe7aee9f9a0a53cac05dc6d8739943b73f23af4853c7bf7568db0e38388bdc671ed39460b90ad65eb7aca28e42e8863b555c8e429d5f52f8c0e1242a70d678f64fd04c0432773ff4fba5e9b2a08ac2b81b8d8ca1108d62b825c2d704a7327672b75f9eb02413259e01ba19cef6f5bc9b351042226d83c17ade0c63609f91518c9b211678d47086cdfb9f4d09a691067a0e875b10ab3f9900dd95a0d822fb99c1e5ca74ad4504d3457aea4fb41f206d9d87cefffa77e929845940148b1b1af346e30c6a8a0119304f58a09d73c8ef47044df43193c7fbf4c2cc320e85a45e4db140d525e52e2f5344bead3a871f3e4512b825aeabd95bb81947461f3ad1dc2a211b6866928650c08bdc7963a02d442f6fdbe9c776b2b083b6983d5a7a732d78322a04f1c87125758b9f55bacb5635bedb4c2ada8e7dca92056c4f9751bf4b453d8115291cfa4401ba608a6ba57f2b657dbd7c72961cf41d9a36c9addaab157494f36f560f5127b0120c0beee5afa21dc440319042b38353d840b629a403592edf238f26722e383af1af64dac369eedfb3a91f306c63f559c8482d906964cba931903c925bc3cbdf85698d7d39e30ca1241752d98989367c32833558616ee2130707a0a0ac132c27ef94fa2bf7bf01fe6cd30d772478264bc4dce644454bdedbd62964ab8fc7826543d2c816d7a5fed468118c97bc9289017645b6984f954e077209475284a19ebdf4e481a91f2e37756c85ebdfe2b972a2a343f525af1d5eda196497b7a6beb8ddb8a46287481d72faef461ed8e31ec9679aea79192094c311d5be91824dafd150ff6f22982a9cecf311594dfd6fbbfa473fd233d73404321463f8ac1c0ca06fbeddf7fca22074eeccb4b7a2b8a9d6109d19ed1a4326708c093c97d492494d89e20b84e3446c8c8a94843cb2d1c4d28130fbd2d48e4b9ae1e42f84f62463e3a3e9556e31e031f32783c5be1cdda2e8258405474192256b597f5984b503fd9daed57eec9c034f562a7d481849c30e2fd5a705fbf85acb89108d998de9864b94fff3466429efebd75259e95e857557ce618242d973a038d23fbfb933853adcc066cf7b60956ab87002eb8e400842ca6ecb221734f80dc539227e5978ef76e0fbe9c1fa43e068ed9f6562280d952a7fa1b37ba9eab3e72ba76b243bc56c040712710e25482401395edad5c9fb6d3d5ca968ea98468e5d6a06c70e0e79c0df83c07c8623b835d3057833a2ef4cbf22cebd2425561b5276164ded21f6b9a96b2acf4c9c3c6ea8e59a5c2f68566672630f14df8e4e5b1c3403b7d1c8159966cecc08d33c91863d7a0d76ff5fa1abf68c4057013e1f1f1b0c8b4668bb7735142c2eca99379010362642c7891dc08a15f7b681f0871534164107a8850aa0d73fbcf1466ac75769d6bcc3b968c437b9be55ea41eec83c73f59354b78083e925f1e03823aee6ebd056ac83457463d60c0c0fc3133d9852b1b9f7d99a840af32fe1b456f795bab7115ff0ccc6388f5167f014ef0747ad9ee08826b4cc7a3c8c8db824f10106f74d72008a8d297bd435c75c28969013e853dce0749788654cdf114df2defa675cce1aefae8ca17c3393fa58a398f5621fc918dee4f163534c06870465e1879adccab8a29b938948dd6815918c8af336e787b688c87a5e6d0426e7e9bf13e064defe71f446d0efaae2216296d58ac650130ec45d727e408a63574dc7022db016df361cc13c817a121d7319edbe023f67b225ab545c96cfd1c5b4941d5f453f63fc0cf87882cd913d0a4752a9038e7377669a2bf82156a59e97492dde22398d2b43366e5326867b3b4641060393c85ea7b42e2c637c17ddc4cee88c0f09ac72e8bb85efb5084d0417cc233df2efe42c9e9ab5af6b2a7add53d21c3aed3ca8eefa8e12c8d074fd0625649b11020ff3528449d0c013395dcce93507bb0239e9fd5f8f49e94798e59a74f48de7531860a91d7e90c727b4e8ae20d6ac8271399e81b75c63aa81cb8356c67c5a9bb18406950244c77da0ce42ffad84a3d419999efb015c2fabb7c2275433", 0x1000}], 0x3, &(0x7f0000001380)=[@rights={0x20, 0xffff, 0x1, [r3, r0, r0, 0xffffffffffffffff]}, @rights={0x20, 0xffff, 0x1, [r0, r0, r4]}, @cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, r6, r7}, @cred={0x20, 0xffff, 0x0, r9, 0xffffffffffffffff, r12}, @cred={0x20, 0xffff, 0x0, r14, r16, r18}, @cred={0x20, 0xffff, 0x0, r19, r20, r22}], 0xc0, 0x8ec29dd25586813e}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000001240)={0x0, 0x0}, 0xc) r7 = getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r9, 0x0) r10 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r10, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r11 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r11, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r11, 0xffff, 0x1022, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r14, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r15, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r16) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r18, 0x0) setregid(r18, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000012c0)={0x0}, &(0x7f0000001300)=0xc) r20 = geteuid() r21 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r21, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r21, 0xffff, 0x1022, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0xc) sendmsg$unix(r2, &(0x7f0000001440)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000001200)=[{&(0x7f00000000c0)="e8def3c93fbaaa6138059a90de7f7c667fce7bb808825cf1b10921e837044d5dbd7d32a90c6022a9568fed5eecc1e33b8217ef1d3ae1e2e994673cb527c144cbdd252791215ab5632e50a413f9feae19420a35d348885c275cba3b12b57410b7351cee9bfbe8ea5db02cc8ed9cc6d147f1241aa855f90332ce9e7215c7cbe855d9916c9ef9469afe1f8fe0f49f65acfdf7d81802f9a0060428438134e55f0bc1ed989c58686bdadb28238f3444c22903", 0xb0}, {&(0x7f0000000180)="be9242b16545dcc37aedca0d6f2c26715af4f25aed03a702746dfe31df19e220b8f075423b7f4b651c4699e9336913fd37726ed1d015e9916323d818da5fc2afdcbcfa126339d5ce664a4acdae8b6513bee3dc4394fee595e8c500fbb495befc0f7e0f998278640c9b6202", 0x6b}, {&(0x7f0000000200)="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", 0x1000}], 0x3, &(0x7f0000001380)=[@rights={0x20, 0xffff, 0x1, [r3, r0, r0, 0xffffffffffffffff]}, @rights={0x20, 0xffff, 0x1, [r0, r0, r4]}, @cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, r6, r7}, @cred={0x20, 0xffff, 0x0, r9, 0xffffffffffffffff, r12}, @cred={0x20, 0xffff, 0x0, r14, r16, r18}, @cred={0x20, 0xffff, 0x0, r19, r20, r22}], 0xc0, 0x8ec29dd25586813e}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(0x0, 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(0x0, 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000001240)={0x0, 0x0}, 0xc) r7 = getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r9, 0x0) r10 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r10, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r11 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r11, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r11, 0xffff, 0x1022, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r14, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r15, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r16) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r18, 0x0) setregid(r18, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000012c0)={0x0}, &(0x7f0000001300)=0xc) r20 = geteuid() r21 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r21, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r21, 0xffff, 0x1022, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0xc) sendmsg$unix(r2, &(0x7f0000001440)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000001200)=[{&(0x7f00000000c0)="e8def3c93fbaaa6138059a90de7f7c667fce7bb808825cf1b10921e837044d5dbd7d32a90c6022a9568fed5eecc1e33b8217ef1d3ae1e2e994673cb527c144cbdd252791215ab5632e50a413f9feae19420a35d348885c275cba3b12b57410b7351cee9bfbe8ea5db02cc8ed9cc6d147f1241aa855f90332ce9e7215c7cbe855d9916c9ef9469afe1f8fe0f49f65acfdf7d81802f9a0060428438134e55f0bc1ed989c58686bdadb28238f3444c22903", 0xb0}, {&(0x7f0000000180)="be9242b16545dcc37aedca0d6f2c26715af4f25aed03a702746dfe31df19e220b8f075423b7f4b651c4699e9336913fd37726ed1d015e9916323d818da5fc2afdcbcfa126339d5ce664a4acdae8b6513bee3dc4394fee595e8c500fbb495befc0f7e0f998278640c9b6202", 0x6b}, {&(0x7f0000000200)="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", 0x1000}], 0x3, &(0x7f0000001380)=[@rights={0x20, 0xffff, 0x1, [r3, r0, r0, 0xffffffffffffffff]}, @rights={0x20, 0xffff, 0x1, [r0, r0, r4]}, @cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, r6, r7}, @cred={0x20, 0xffff, 0x0, r9, 0xffffffffffffffff, r12}, @cred={0x20, 0xffff, 0x0, r14, r16, r18}, @cred={0x20, 0xffff, 0x0, r19, r20, r22}], 0xc0, 0x8ec29dd25586813e}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(0x0, 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000001240)={0x0, 0x0}, 0xc) r7 = getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r9, 0x0) r10 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r10, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r11 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r11, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r11, 0xffff, 0x1022, &(0x7f0000001280)={0x0, 0x0, 0x0}, 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r14, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r15, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r16) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r18, 0x0) setregid(r18, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000012c0)={0x0}, &(0x7f0000001300)=0xc) r20 = geteuid() r21 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r21, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r21, 0xffff, 0x1022, &(0x7f0000001340)={0x0, 0x0, 0x0}, 0xc) sendmsg$unix(r2, &(0x7f0000001440)={&(0x7f0000000040)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000001200)=[{&(0x7f00000000c0)="e8def3c93fbaaa6138059a90de7f7c667fce7bb808825cf1b10921e837044d5dbd7d32a90c6022a9568fed5eecc1e33b8217ef1d3ae1e2e994673cb527c144cbdd252791215ab5632e50a413f9feae19420a35d348885c275cba3b12b57410b7351cee9bfbe8ea5db02cc8ed9cc6d147f1241aa855f90332ce9e7215c7cbe855d9916c9ef9469afe1f8fe0f49f65acfdf7d81802f9a0060428438134e55f0bc1ed989c58686bdadb28238f3444c22903", 0xb0}, {&(0x7f0000000180)="be9242b16545dcc37aedca0d6f2c26715af4f25aed03a702746dfe31df19e220b8f075423b7f4b651c4699e9336913fd37726ed1d015e9916323d818da5fc2afdcbcfa126339d5ce664a4acdae8b6513bee3dc4394fee595e8c500fbb495befc0f7e0f998278640c9b6202", 0x6b}, {&(0x7f0000000200)="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", 0x1000}], 0x3, &(0x7f0000001380)=[@rights={0x20, 0xffff, 0x1, [r3, r0, r0, 0xffffffffffffffff]}, @rights={0x20, 0xffff, 0x1, [r0, r0, r4]}, @cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, r6, r7}, @cred={0x20, 0xffff, 0x0, r9, 0xffffffffffffffff, r12}, @cred={0x20, 0xffff, 0x0, r14, r16, r18}, @cred={0x20, 0xffff, 0x0, r19, r20, r22}], 0xc0, 0x8ec29dd25586813e}, 0x0) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r14, 0x0) setregid(r14, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000012c0), &(0x7f0000001300)=0xc) geteuid() r15 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r15, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r15, 0xffff, 0x1022, &(0x7f0000001340), 0xc) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r14, 0x0) setregid(r14, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000012c0), &(0x7f0000001300)=0xc) geteuid() r15 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r15, 0x0, 0x2, &(0x7f0000000040), 0x4) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r14, 0x0) setregid(r14, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000012c0), &(0x7f0000001300)=0xc) geteuid() socket$inet(0x2, 0x3, 0x0) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0) ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r14, 0x0) setregid(r14, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000012c0), &(0x7f0000001300)=0xc) geteuid() 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0) ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0) ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, 0x0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r14, 0x0) setregid(r14, 0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000012c0), &(0x7f0000001300)=0xc) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 16:03:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r14, 0x0) setregid(r14, 0x0) 16:03:21 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r14, 0x0) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f00000000c0)=0xffffffffffffffa6) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r2, r4) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r8, 0x0) setregid(r8, 0x0) geteuid() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r12) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) 16:03:22 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r2, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r4 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r6) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r4, r6, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r5, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r14, 0x800c5606, &(0x7f00000000c0)={0x1}) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r10, &(0x7f0000000b00)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYRES64, @ANYRES64=r11, @ANYRESHEX, @ANYRESOCT=0x0, @ANYRES32, @ANYRESDEC, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRESDEC=r7, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRES32=r12, @ANYPTR, @ANYRES64=r13, @ANYPTR, @ANYRES16=r14, @ANYPTR, @ANYRESOCT=r15, @ANYRES64, @ANYRES32], @ANYRESOCT=0x0]], 0xa) sendmsg$unix(r9, &(0x7f0000000880)={&(0x7f00000004c0)=@abs={0x1, 0x0, 0x2}, 0x8, &(0x7f0000000800)=[{&(0x7f0000000500)="a4512dd457a628052cc21a9225b69a701fc8787ab29500e174f29968e365eaf83c0fe9a9e1271d84326069e31a8f622b534057af225e0484d485fe4310df0403b1a6f317ccefa960f0134ce880edfa6231b74b8773f4d94ec9a2bed650155b3f3a1c3e05e862b499246e6e8e69e2250ac57e6c5f93c70e733468ea380dc2cb146533aa70b26f71ad36e193e15117cff7e02b6336b03809d2ff3d5939fb6ae012eeefaa5684269bfba637d26d32bef3a885bceff1f2dc05bb4da3d7d8b31601902eb9c52ebb1cd612f7c25b4bd2662a6d0c92ec3107cb6de48f34a2c3eebe401b670d7874d8181a3d74dc05a1511e8d4d1b0ee8df95", 0xf5}, {&(0x7f0000000600)}, {&(0x7f0000000640)="c73cef20118d9828656474104a3111afcf42e07c641c7a197b2628d7e3741ea268b0d31764290cd5f6cabdeb925b326eb222b9654767fd56eaa5a1f6403804070dada2b508a7e9315fac7d7f53bea284e509ac87c2b43e287a6007c05dc522a6cfaf01", 0x63}, {&(0x7f00000006c0)="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", 0xfc}, {&(0x7f00000007c0)="14e2138021890dec1fdfb5cb864a72bb9974bdc501417514489fc560c24a2923176054700765538063faa4", 0x2b}], 0x5, 0x0, 0x0, 0x8}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r16, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x1, 0x0) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r12) 16:03:22 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r2, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r4 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r6) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r4, r6, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r5, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r14, 0x800c5606, &(0x7f00000000c0)={0x1}) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r10, &(0x7f0000000b00)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYRES64, @ANYRES64=r11, @ANYRESHEX, @ANYRESOCT=0x0, @ANYRES32, @ANYRESDEC, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRESDEC=r7, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRES32=r12, @ANYPTR, @ANYRES64=r13, @ANYPTR, @ANYRES16=r14, @ANYPTR, @ANYRESOCT=r15, @ANYRES64, @ANYRES32], @ANYRESOCT=0x0]], 0xa) sendmsg$unix(r9, &(0x7f0000000880)={&(0x7f00000004c0)=@abs={0x1, 0x0, 0x2}, 0x8, &(0x7f0000000800)=[{&(0x7f0000000500)="a4512dd457a628052cc21a9225b69a701fc8787ab29500e174f29968e365eaf83c0fe9a9e1271d84326069e31a8f622b534057af225e0484d485fe4310df0403b1a6f317ccefa960f0134ce880edfa6231b74b8773f4d94ec9a2bed650155b3f3a1c3e05e862b499246e6e8e69e2250ac57e6c5f93c70e733468ea380dc2cb146533aa70b26f71ad36e193e15117cff7e02b6336b03809d2ff3d5939fb6ae012eeefaa5684269bfba637d26d32bef3a885bceff1f2dc05bb4da3d7d8b31601902eb9c52ebb1cd612f7c25b4bd2662a6d0c92ec3107cb6de48f34a2c3eebe401b670d7874d8181a3d74dc05a1511e8d4d1b0ee8df95", 0xf5}, {&(0x7f0000000600)}, {&(0x7f0000000640)="c73cef20118d9828656474104a3111afcf42e07c641c7a197b2628d7e3741ea268b0d31764290cd5f6cabdeb925b326eb222b9654767fd56eaa5a1f6403804070dada2b508a7e9315fac7d7f53bea284e509ac87c2b43e287a6007c05dc522a6cfaf01", 0x63}, {&(0x7f00000006c0)="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", 0xfc}, {&(0x7f00000007c0)="14e2138021890dec1fdfb5cb864a72bb9974bdc501417514489fc560c24a2923176054700765538063faa4", 0x2b}], 0x5, 0x0, 0x0, 0x8}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r16, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x1, 0x0) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0), &(0x7f0000000240)=0xc) 16:03:22 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r2, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r4 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r6) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r4, r6, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r5, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r14, 0x800c5606, &(0x7f00000000c0)={0x1}) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r10, &(0x7f0000000b00)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYRES64, @ANYRES64=r11, @ANYRESHEX, @ANYRESOCT=0x0, @ANYRES32, @ANYRESDEC, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRESDEC=r7, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRES32=r12, @ANYPTR, @ANYRES64=r13, @ANYPTR, @ANYRES16=r14, @ANYPTR, @ANYRESOCT=r15, @ANYRES64, @ANYRES32], @ANYRESOCT=0x0]], 0xa) sendmsg$unix(r9, &(0x7f0000000880)={&(0x7f00000004c0)=@abs={0x1, 0x0, 0x2}, 0x8, &(0x7f0000000800)=[{&(0x7f0000000500)="a4512dd457a628052cc21a9225b69a701fc8787ab29500e174f29968e365eaf83c0fe9a9e1271d84326069e31a8f622b534057af225e0484d485fe4310df0403b1a6f317ccefa960f0134ce880edfa6231b74b8773f4d94ec9a2bed650155b3f3a1c3e05e862b499246e6e8e69e2250ac57e6c5f93c70e733468ea380dc2cb146533aa70b26f71ad36e193e15117cff7e02b6336b03809d2ff3d5939fb6ae012eeefaa5684269bfba637d26d32bef3a885bceff1f2dc05bb4da3d7d8b31601902eb9c52ebb1cd612f7c25b4bd2662a6d0c92ec3107cb6de48f34a2c3eebe401b670d7874d8181a3d74dc05a1511e8d4d1b0ee8df95", 0xf5}, {&(0x7f0000000600)}, {&(0x7f0000000640)="c73cef20118d9828656474104a3111afcf42e07c641c7a197b2628d7e3741ea268b0d31764290cd5f6cabdeb925b326eb222b9654767fd56eaa5a1f6403804070dada2b508a7e9315fac7d7f53bea284e509ac87c2b43e287a6007c05dc522a6cfaf01", 0x63}, {&(0x7f00000006c0)="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", 0xfc}, {&(0x7f00000007c0)="14e2138021890dec1fdfb5cb864a72bb9974bdc501417514489fc560c24a2923176054700765538063faa4", 0x2b}], 0x5, 0x0, 0x0, 0x8}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r16, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x1, 0x0) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) 16:03:22 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r2, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r4 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r6) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r4, r6, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r5, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r14, 0x800c5606, &(0x7f00000000c0)={0x1}) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r10, &(0x7f0000000b00)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYRES64, @ANYRES64=r11, @ANYRESHEX, @ANYRESOCT=0x0, @ANYRES32, @ANYRESDEC, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRESDEC=r7, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRES32=r12, @ANYPTR, @ANYRES64=r13, @ANYPTR, @ANYRES16=r14, @ANYPTR, @ANYRESOCT=r15, @ANYRES64, @ANYRES32], @ANYRESOCT=0x0]], 0xa) sendmsg$unix(r9, &(0x7f0000000880)={&(0x7f00000004c0)=@abs={0x1, 0x0, 0x2}, 0x8, &(0x7f0000000800)=[{&(0x7f0000000500)="a4512dd457a628052cc21a9225b69a701fc8787ab29500e174f29968e365eaf83c0fe9a9e1271d84326069e31a8f622b534057af225e0484d485fe4310df0403b1a6f317ccefa960f0134ce880edfa6231b74b8773f4d94ec9a2bed650155b3f3a1c3e05e862b499246e6e8e69e2250ac57e6c5f93c70e733468ea380dc2cb146533aa70b26f71ad36e193e15117cff7e02b6336b03809d2ff3d5939fb6ae012eeefaa5684269bfba637d26d32bef3a885bceff1f2dc05bb4da3d7d8b31601902eb9c52ebb1cd612f7c25b4bd2662a6d0c92ec3107cb6de48f34a2c3eebe401b670d7874d8181a3d74dc05a1511e8d4d1b0ee8df95", 0xf5}, {&(0x7f0000000600)}, {&(0x7f0000000640)="c73cef20118d9828656474104a3111afcf42e07c641c7a197b2628d7e3741ea268b0d31764290cd5f6cabdeb925b326eb222b9654767fd56eaa5a1f6403804070dada2b508a7e9315fac7d7f53bea284e509ac87c2b43e287a6007c05dc522a6cfaf01", 0x63}, {&(0x7f00000006c0)="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", 0xfc}, {&(0x7f00000007c0)="14e2138021890dec1fdfb5cb864a72bb9974bdc501417514489fc560c24a2923176054700765538063faa4", 0x2b}], 0x5, 0x0, 0x0, 0x8}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r16, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r10, 0x0) 16:03:22 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r2, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r4 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r6) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r4, r6, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r5, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r14, 0x800c5606, &(0x7f00000000c0)={0x1}) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r10, &(0x7f0000000b00)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYRES64, @ANYRES64=r11, @ANYRESHEX, @ANYRESOCT=0x0, @ANYRES32, @ANYRESDEC, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRESDEC=r7, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRES32=r12, @ANYPTR, @ANYRES64=r13, @ANYPTR, @ANYRES16=r14, @ANYPTR, @ANYRESOCT=r15, @ANYRES64, @ANYRES32], @ANYRESOCT=0x0]], 0xa) sendmsg$unix(r9, &(0x7f0000000880)={&(0x7f00000004c0)=@abs={0x1, 0x0, 0x2}, 0x8, &(0x7f0000000800)=[{&(0x7f0000000500)="a4512dd457a628052cc21a9225b69a701fc8787ab29500e174f29968e365eaf83c0fe9a9e1271d84326069e31a8f622b534057af225e0484d485fe4310df0403b1a6f317ccefa960f0134ce880edfa6231b74b8773f4d94ec9a2bed650155b3f3a1c3e05e862b499246e6e8e69e2250ac57e6c5f93c70e733468ea380dc2cb146533aa70b26f71ad36e193e15117cff7e02b6336b03809d2ff3d5939fb6ae012eeefaa5684269bfba637d26d32bef3a885bceff1f2dc05bb4da3d7d8b31601902eb9c52ebb1cd612f7c25b4bd2662a6d0c92ec3107cb6de48f34a2c3eebe401b670d7874d8181a3d74dc05a1511e8d4d1b0ee8df95", 0xf5}, {&(0x7f0000000600)}, {&(0x7f0000000640)="c73cef20118d9828656474104a3111afcf42e07c641c7a197b2628d7e3741ea268b0d31764290cd5f6cabdeb925b326eb222b9654767fd56eaa5a1f6403804070dada2b508a7e9315fac7d7f53bea284e509ac87c2b43e287a6007c05dc522a6cfaf01", 0x63}, {&(0x7f00000006c0)="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", 0xfc}, {&(0x7f00000007c0)="14e2138021890dec1fdfb5cb864a72bb9974bdc501417514489fc560c24a2923176054700765538063faa4", 0x2b}], 0x5, 0x0, 0x0, 0x8}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) 16:03:22 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r2, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r4 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r6) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r4, r6, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r5, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r14, 0x800c5606, &(0x7f00000000c0)={0x1}) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r10, &(0x7f0000000b00)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYRES64, @ANYRES64=r11, @ANYRESHEX, @ANYRESOCT=0x0, @ANYRES32, @ANYRESDEC, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRESDEC=r7, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRES32=r12, @ANYPTR, @ANYRES64=r13, @ANYPTR, @ANYRES16=r14, @ANYPTR, @ANYRESOCT=r15, @ANYRES64, @ANYRES32], @ANYRESOCT=0x0]], 0xa) sendmsg$unix(r9, &(0x7f0000000880)={&(0x7f00000004c0)=@abs={0x1, 0x0, 0x2}, 0x8, &(0x7f0000000800)=[{&(0x7f0000000500)="a4512dd457a628052cc21a9225b69a701fc8787ab29500e174f29968e365eaf83c0fe9a9e1271d84326069e31a8f622b534057af225e0484d485fe4310df0403b1a6f317ccefa960f0134ce880edfa6231b74b8773f4d94ec9a2bed650155b3f3a1c3e05e862b499246e6e8e69e2250ac57e6c5f93c70e733468ea380dc2cb146533aa70b26f71ad36e193e15117cff7e02b6336b03809d2ff3d5939fb6ae012eeefaa5684269bfba637d26d32bef3a885bceff1f2dc05bb4da3d7d8b31601902eb9c52ebb1cd612f7c25b4bd2662a6d0c92ec3107cb6de48f34a2c3eebe401b670d7874d8181a3d74dc05a1511e8d4d1b0ee8df95", 0xf5}, {&(0x7f0000000600)}, {&(0x7f0000000640)="c73cef20118d9828656474104a3111afcf42e07c641c7a197b2628d7e3741ea268b0d31764290cd5f6cabdeb925b326eb222b9654767fd56eaa5a1f6403804070dada2b508a7e9315fac7d7f53bea284e509ac87c2b43e287a6007c05dc522a6cfaf01", 0x63}, {&(0x7f00000006c0)="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", 0xfc}, {&(0x7f00000007c0)="14e2138021890dec1fdfb5cb864a72bb9974bdc501417514489fc560c24a2923176054700765538063faa4", 0x2b}], 0x5, 0x0, 0x0, 0x8}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:22 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r2, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r4 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r6) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r4, r6, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) accept(r5, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r14, 0x800c5606, &(0x7f00000000c0)={0x1}) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r10, &(0x7f0000000b00)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYRES64, @ANYRES64=r11, @ANYRESHEX, @ANYRESOCT=0x0, @ANYRES32, @ANYRESDEC, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRESDEC=r7, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRES32=r12, @ANYPTR, @ANYRES64=r13, @ANYPTR, @ANYRES16=r14, @ANYPTR, @ANYRESOCT=r15, @ANYRES64, @ANYRES32], @ANYRESOCT=0x0]], 0xa) sendmsg$unix(r9, &(0x7f0000000880)={&(0x7f00000004c0)=@abs={0x1, 0x0, 0x2}, 0x8, &(0x7f0000000800)=[{&(0x7f0000000500)="a4512dd457a628052cc21a9225b69a701fc8787ab29500e174f29968e365eaf83c0fe9a9e1271d84326069e31a8f622b534057af225e0484d485fe4310df0403b1a6f317ccefa960f0134ce880edfa6231b74b8773f4d94ec9a2bed650155b3f3a1c3e05e862b499246e6e8e69e2250ac57e6c5f93c70e733468ea380dc2cb146533aa70b26f71ad36e193e15117cff7e02b6336b03809d2ff3d5939fb6ae012eeefaa5684269bfba637d26d32bef3a885bceff1f2dc05bb4da3d7d8b31601902eb9c52ebb1cd612f7c25b4bd2662a6d0c92ec3107cb6de48f34a2c3eebe401b670d7874d8181a3d74dc05a1511e8d4d1b0ee8df95", 0xf5}, {&(0x7f0000000600)}, {&(0x7f0000000640)="c73cef20118d9828656474104a3111afcf42e07c641c7a197b2628d7e3741ea268b0d31764290cd5f6cabdeb925b326eb222b9654767fd56eaa5a1f6403804070dada2b508a7e9315fac7d7f53bea284e509ac87c2b43e287a6007c05dc522a6cfaf01", 0x63}, {&(0x7f00000006c0)="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", 0xfc}, {&(0x7f00000007c0)="14e2138021890dec1fdfb5cb864a72bb9974bdc501417514489fc560c24a2923176054700765538063faa4", 0x2b}], 0x5, 0x0, 0x0, 0x8}, 0x0) bind(0xffffffffffffffff, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r2, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r2, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r4 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r6) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r4, r6, r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r5, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r14, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r9, &(0x7f0000000b00)=ANY=[@ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYRES64, @ANYRES64=r10, @ANYRESHEX, @ANYRESOCT=0x0, @ANYRES32, @ANYRESDEC, @ANYRESDEC=r0, @ANYPTR=&(0x7f0000000a80)=ANY=[@ANYRESDEC=r7, @ANYRES16, @ANYRESHEX, @ANYRES16, @ANYPTR=&(0x7f0000000a00)=ANY=[@ANYRES32=r11, @ANYPTR, @ANYRES64=r12, @ANYPTR, @ANYRES16=r13, @ANYPTR, @ANYRESOCT=r14, @ANYRES64, @ANYRES32], @ANYRESOCT=0x0]], 0xa) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r15, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r12, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) r8 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r11, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r11, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r10, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) accept(0xffffffffffffffff, &(0x7f0000001480)=@in6, &(0x7f00000014c0)=0xc) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) r8 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r8, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r10, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) socket$inet(0x2, 0x3, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r7, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r9, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) r7 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r7, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) r6 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r6, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r9, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r5 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r8, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) getegid() r5 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r8, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001240), 0xc) r5 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r7, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) r5 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r7, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet(0x2, 0x3, 0x0) r4 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r7, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r7, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r3 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r3, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r7, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r3, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r7, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r2 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r4) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480), 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r5, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r2 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r2, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r5, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r1 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f00000003c0), &(0x7f0000000240)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r4, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r3, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:22 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r3, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r3, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r3, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:23 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: r0 = socket$inet(0x2, 0x0, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000001280), 0xffffffffffffff98) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, 0x0, 0x0) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, 0x0, 0x0) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) getsockopt$SO_PEERCRED(r0, 0xffff, 0x1022, 0x0, 0x0) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r8, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) bind(r1, &(0x7f00000008c0)=ANY=[@ANYPTR], 0x1) sendmsg$unix(r1, &(0x7f00000002c0)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000280)=[{&(0x7f0000000100)="5c476959e240b0749521b484545bb2f8c1253e3fa379f4477dbac714fbdb714cae6554961f248013a638a6cd0e6bd6fee14cdad6bf0288673072412e01b275a30d08b223a2138e0ccc57ff8d01ca2aef5b38ed02d811c228723553ed712cb53bfa1feb2a04a8c5bd42c87497c249d75fbf53e6b5a5fc75", 0x77}, {&(0x7f0000000180)="c31fa696634ac27405ee1315a2478d59aae9c99206b469dd90943d48278e20f07f0d3c5ff1a1558ee194ce3b2b937e669b7e5e8c67f161820dbe5cd8b31eb6d9a746061ed2eae2f9dc33426663b46400814bd28e18d17ecfdaa8f5b72e4f9dd047d07a1a1e7ffbe4228d7e2430af0677727055169c5d53721dcb7883732580c49158a5e336adab0c740dfa4aad6074c3a8cd0e1fb0c043b75581ff22e553e6355ef004bc411be2a374cb917f17c9", 0xae}, {&(0x7f0000000240)="f683b634682c51beabd162c870abd51e4665633f2c63e7a899552a6562272eba457bd2695dffeb301a14054d67cbc4f0fe9704d6f86ba2440f7b", 0x3a}], 0x3, 0x0, 0x0, 0x2}, 0x6) r3 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000440)='/dev/ttyCcfg\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0xc) fchown(r3, r5, r6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) accept(r4, &(0x7f0000000600)=@in6, &(0x7f0000000900)=0xc) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000980)) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r11, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) getgroups(0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r4]) lchown(&(0x7f0000000040)='./file0\x00', r2, r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c9b5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da700"/187], 0x6a) getsockname$unix(r6, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000100), 0xc) 16:03:23 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) getgroups(0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r4]) lchown(&(0x7f0000000040)='./file0\x00', r2, r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c9b5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da700"/187], 0x6a) getsockname$unix(r6, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000100), 0xc) 16:03:23 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) getgroups(0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r4]) lchown(&(0x7f0000000040)='./file0\x00', r2, r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c9b5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da700"/187], 0x6a) getsockname$unix(r6, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000100), 0xc) 16:03:23 executing program 1: open$dir(0x0, 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) getgroups(0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r4]) lchown(&(0x7f0000000040)='./file0\x00', r2, r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r6, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c9b5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da700"/187], 0x6a) getsockname$unix(r6, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(0x0, 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) getgroups(0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r4]) lchown(&(0x7f0000000040)='./file0\x00', r2, r5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r6, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(0x0, 0x200, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) getgroups(0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r4]) lchown(&(0x7f0000000040)='./file0\x00', r2, r5) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) getgroups(0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r4]) lchown(&(0x7f0000000040)='./file0\x00', r2, r5) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) getgroups(0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r4]) lchown(&(0x7f0000000040)='./file0\x00', r2, r5) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) getgroups(0x2, &(0x7f00000000c0)=[0xffffffffffffffff, r4]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r5, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) setregid(r4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r5, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r5, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f00000000c0)=0xffffffffffffffa6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r4, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r3, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r3, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0), &(0x7f0000000240)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r2, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:23 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:23 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x4) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:24 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, 0x0) bind(0xffffffffffffffff, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:24 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) bind(0xffffffffffffffff, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:24 executing program 0: open$dir(0x0, 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) bind(0xffffffffffffffff, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:24 executing program 0: open$dir(0x0, 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)) bind(0xffffffffffffffff, &(0x7f0000000400)=@un=@file={0x0, './file0\x00'}, 0xa) 16:03:24 executing program 0: open$dir(0x0, 0x200, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, 0x0, 0x0) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, 0x0, 0x0) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x4) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, 0x0, 0x0) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) r15 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r15) openat(r14, &(0x7f0000000040)='./file0\x00', 0x100, 0x1a) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) r15 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r15) openat(r14, &(0x7f0000000040)='./file0\x00', 0x100, 0x1a) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) r15 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r15) openat(r14, &(0x7f0000000040)='./file0\x00', 0x100, 0x1a) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r7, 0x0) setpgid(r5, r5) setpgid(r2, r5) r8 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r10, 0x0) setregid(r10, 0x0) r11 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r3, r10, r11, r13, 0x40}, 0x400, 0x40, 0xdd4}) r14 = fcntl$dupfd(r8, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r14, 0x0, 0x0) r15 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r15) openat(r14, &(0x7f0000000040)='./file0\x00', 0x100, 0x1a) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r1, r4) r7 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r9, 0x0) setregid(r9, 0x0) r10 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r12, 0x0) setregid(r12, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r2, r9, r10, r12, 0x40}, 0x400, 0x40, 0xdd4}) r13 = fcntl$dupfd(r7, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r13, 0x0, 0x0) r14 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r14) openat(r13, &(0x7f0000000040)='./file0\x00', 0x100, 0x1a) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r1, r4) r7 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r9, 0x0) setregid(r9, 0x0) r10 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r12, 0x0) setregid(r12, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r2, r9, r10, r12, 0x40}, 0x400, 0x40, 0xdd4}) r13 = fcntl$dupfd(r7, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r13, 0x0, 0x0) r14 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r14) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r1, r4) r7 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r9, 0x0) setregid(r9, 0x0) r10 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r12, 0x0) setregid(r12, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r2, r9, r10, r12, 0x40}, 0x400, 0x40, 0xdd4}) r13 = fcntl$dupfd(r7, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r13, 0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r0, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r1, r4) r7 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r9, 0x0) setregid(r9, 0x0) r10 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r12, 0x0) setregid(r12, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r2, r9, r10, r12, 0x40}, 0x400, 0x40, 0xdd4}) r13 = fcntl$dupfd(r7, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r13, 0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r1, r4) r7 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r9, 0x0) setregid(r9, 0x0) r10 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r12, 0x0) setregid(r12, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r2, r9, r10, r12, 0x40}, 0x400, 0x40, 0xdd4}) r13 = fcntl$dupfd(r7, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r13, 0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r1, r4) r7 = kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r9, 0x0) setregid(r9, 0x0) r10 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r12, 0x0) setregid(r12, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r2, r9, r10, r12, 0x40}, 0x400, 0x40, 0xdd4}) fcntl$dupfd(r7, 0x2, 0xffffffffffffffff) r13 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r13) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r6, 0x0) setpgid(r4, r4) setpgid(r1, r4) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r8, 0x0) setregid(r8, 0x0) r9 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r11, 0x0) setregid(r11, 0x0) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f00000001c0)={{0x9, r2, r8, r9, r11, 0x40}, 0x400, 0x40, 0xdd4}) r12 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r12) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) setpgid(r1, r3) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r7, 0x0) setregid(r7, 0x0) geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r9, 0x0) setregid(r9, 0x0) r10 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r10) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) setpgid(r1, r3) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r7, 0x0) setregid(r7, 0x0) geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r9, 0x0) r10 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r10) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) setpgid(r1, r3) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r7, 0x0) setregid(r7, 0x0) geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f00000000c0)=0xffffffffffffffa6) r9 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r9) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) setpgid(r1, r3) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r7, 0x0) setregid(r7, 0x0) geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r8 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r8) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) setpgid(r1, r3) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r7, 0x0) setregid(r7, 0x0) geteuid() r8 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r8) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) getsockname$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs, &(0x7f00000001c0)=0x8) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) setpgid(r1, r3) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r7, 0x0) setregid(r7, 0x0) r8 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r8) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, 0x0, &(0x7f00000001c0)) 16:03:24 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) setpgid(r1, r3) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r7, 0x0) r8 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r8) 16:03:24 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, 0x0, 0x0) 16:03:25 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) setpgid(r1, r3) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f00000000c0)=0xffffffffffffffa6) r7 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r7) 16:03:25 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, 0x0, 0x0) 16:03:25 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) setpgid(r1, r3) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) r6 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r6) 16:03:25 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$unix(r1, 0x0, 0x0) 16:03:25 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) setpgid(r1, r3) kqueue() r6 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r6) 16:03:25 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) r18 = fcntl$dupfd(r17, 0x2, r16) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r18, 0x0, 0x0) r19 = openat(r18, &(0x7f0000000040)='./file0\x00', 0x800, 0x8) utimensat(r19, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x8000, 0x80000001}, {0x2, 0x9}}, 0x2) 16:03:25 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) setpgid(r1, r3) r6 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r6) 16:03:26 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) setpgid(r3, r3) r6 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r6) 16:03:26 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) r18 = fcntl$dupfd(r17, 0x2, r16) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r18, 0x0, 0x0) r19 = openat(r18, &(0x7f0000000040)='./file0\x00', 0x800, 0x8) utimensat(r19, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x8000, 0x80000001}, {0x2, 0x9}}, 0x2) pckbd_enable: command error 16:03:26 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r4, 0x0) r5 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r5) pckbd_enable: command error 16:03:27 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) r4 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r4) 16:03:27 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) r18 = fcntl$dupfd(r17, 0x2, r16) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r18, 0x0, 0x0) r19 = openat(r18, &(0x7f0000000040)='./file0\x00', 0x800, 0x8) utimensat(r19, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x8000, 0x80000001}, {0x2, 0x9}}, 0x2) 16:03:27 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r3 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r3) pckbd_enable: command error 16:03:28 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) r3 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r3) 16:03:28 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) r18 = fcntl$dupfd(r17, 0x2, r16) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r18, 0x0, 0x0) r19 = openat(r18, &(0x7f0000000040)='./file0\x00', 0x800, 0x8) utimensat(r19, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={{0x8000, 0x80000001}, {0x2, 0x9}}, 0x2) 16:03:29 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r2) pckbd_enable: command error 16:03:29 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) r2 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r2) 16:03:29 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) r18 = fcntl$dupfd(r17, 0x2, r16) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r18, 0x0, 0x0) openat(r18, &(0x7f0000000040)='./file0\x00', 0x800, 0x8) 16:03:29 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) r1 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r1) pckbd_enable: command error 16:03:30 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) r18 = fcntl$dupfd(r17, 0x2, r16) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r18, 0x0, 0x0) 16:03:30 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) r1 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r1) 16:03:31 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) r1 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r1) 16:03:31 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) fcntl$dupfd(r17, 0x2, r16) 16:03:31 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) pckbd_enable: command error 16:03:31 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) pckbd_enable: command error 16:03:32 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:03:32 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:03:33 executing program 1: setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:03:33 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:03:33 executing program 1: setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) pckbd_enable: command error pckbd_enable: command error 16:03:34 executing program 1: setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:03:34 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:34 executing program 1: open$dir(0x0, 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:03:35 executing program 1: open$dir(0x0, 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) pckbd_enable: command error 16:03:35 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:03:35 executing program 1: open$dir(0x0, 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:03:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:03:36 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:03:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) pckbd_enable: command error 16:03:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) pckbd_enable: command error 16:03:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(0x0, 0x4, 0x10, r0) 16:03:37 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(0x0, 0x4, 0x10, r0) 16:03:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(0x0, 0x4, 0x10, r0) pckbd_enable: command error 16:03:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r0) 16:03:38 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:03:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r0) 16:03:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r0) 16:03:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0, r0) pckbd_enable: command error 16:03:39 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0, r0) 16:03:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0, r0) pckbd_enable: command error 16:03:40 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:03:40 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) 16:03:40 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) pckbd_enable: command error 16:03:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) setpgid(0x0, 0x0) getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:03:41 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:03:41 executing program 1: r0 = socket(0x40000000011, 0x3, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000100)=[{{r0}, 0xfffffffffffffffe, 0x1}], 0x0, 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000000)=[{{r0}, 0xffffffffffbfffff, 0x2f}], 0x34, 0x0, 0xc68, 0x0) pckbd_enable: command error 16:03:42 executing program 1: r0 = socket(0x40000000011, 0x3, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000100)=[{{r0}, 0xfffffffffffffffe, 0x1}], 0x0, 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000000)=[{{r0}, 0xffffffffffbfffff, 0x2f}], 0x34, 0x0, 0xc68, 0x0) 16:03:42 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) 16:03:42 executing program 1: r0 = socket(0x40000000011, 0x3, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000100)=[{{r0}, 0xfffffffffffffffe, 0x1}], 0x0, 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000000)=[{{r0}, 0xffffffffffbfffff, 0x2f}], 0x34, 0x0, 0xc68, 0x0) 16:03:43 executing program 1: r0 = socket(0x40000000011, 0x3, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000100)=[{{r0}, 0xfffffffffffffffe, 0x1}], 0x0, 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000000)=[{{r0}, 0xffffffffffbfffff, 0x2f}], 0x34, 0x0, 0xc68, 0x0) pckbd_enable: command error 16:03:43 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) 16:03:43 executing program 1: r0 = socket(0x40000000011, 0x3, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000100)=[{{r0}, 0xfffffffffffffffe, 0x1}], 0x0, 0x0, 0x0, 0x0) kqueue() 16:03:43 executing program 1: r0 = socket(0x40000000011, 0x3, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000100)=[{{r0}, 0xfffffffffffffffe, 0x1}], 0x0, 0x0, 0x0, 0x0) pckbd_enable: command error 16:03:44 executing program 1: socket(0x40000000011, 0x3, 0x0) 16:03:44 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:03:44 executing program 1: socket(0x0, 0x3, 0x0) 16:03:44 executing program 1: socket(0x0, 0x3, 0x0) pckbd_enable: command error 16:03:45 executing program 1: socket(0x0, 0x3, 0x0) 16:03:45 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:45 executing program 1: socket(0x40000000011, 0x0, 0x0) 16:03:45 executing program 1: socket(0x40000000011, 0x0, 0x0) pckbd_enable: command error 16:03:46 executing program 1: socket(0x40000000011, 0x0, 0x0) 16:03:46 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:03:46 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c78ded4f3580314f18490b618a9694b645a270cb8afe8c0dcb8835d92612d9fef21ba46ff39ae9826a18b2b3ae0bf900685b0534d7a16a2238bb19bbd749f0d66985a1f642d43f0046c6fa11f0e8b12d5cb957ae16f80cbb29926b158ae62d073a0947d49cc0fe7717b8739b70e6b8a75ff49c7c6dce96c0b19c15df82fa60a8d1736e17c8d22ba148dea668f30b97c53ae683136e69b5b4f01accdcf286acb0ad4f0bdef2c29fab26307bba65e1076f46f979a81f10f2a61e5fb3f057f6e2ddfa306de841c70d57efa03e0927146475b29a922b643bbdfa55b76fd116c7390bf11bb277a28acf3de11c9b7ebab899c40cb544208fa7e51bbcc97d137ba35b87e", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:47 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:47 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:47 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) pckbd_enable: command error 16:03:47 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:03:48 executing program 1: poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:48 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:03:48 executing program 1: poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:03:49 executing program 1: poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:49 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:49 executing program 1: sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:03:50 executing program 1: sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:50 executing program 1: sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:50 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:03:50 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:51 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:51 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:51 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error pckbd_enable: command error 16:03:52 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:52 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:03:52 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:53 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:53 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) pckbd_enable: command error 16:03:54 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{0x0}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:54 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:54 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{0x0}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error pckbd_enable: command error 16:03:55 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:55 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{0x0}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:55 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:55 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:55 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:55 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:55 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:55 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:55 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x201}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:03:56 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3", 0x201}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:56 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x201}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:56 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:56 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x301}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:03:57 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:57 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x301}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:03:58 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffff9c) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:03:58 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c", 0x301}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:58 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x381}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:03:59 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) pckbd_enable: command error 16:04:00 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c78ded4f3580314f18490b618a9694b645a270cb8afe8c0dcb8835d92612d9fef21ba46ff39ae9826a18b2b3ae0bf900685b0534d7a16a2238bb19bbd749f0d66985a1f642d43f0046c6fa11f0e8b12d5cb957ae16f80cbb29926b158ae62d073a0947d49cc0fe7717b8739b70e6b8a75ff49c7c6dce96c0b19c15df82fa60a8d", 0x381}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:00 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x381}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:00 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) pckbd_enable: command error 16:04:00 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3c1}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:01 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3c1}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:01 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) pckbd_enable: command error 16:04:02 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3c1}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:04:02 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c78ded4f3580314f18490b618a9694b645a270cb8afe8c0dcb8835d92612d9fef21ba46ff39ae9826a18b2b3ae0bf900685b0534d7a16a2238bb19bbd749f0d66985a1f642d43f0046c6fa11f0e8b12d5cb957ae16f80cbb29926b158ae62d073a0947d49cc0fe7717b8739b70e6b8a75ff49c7c6dce96c0b19c15df82fa60a8d1736e17c8d22ba148dea668f30b97c53ae683136e69b5b4f01accdcf286acb0ad4f0bdef2c29fab26307bba65e1076f46f979a81f10f2a61e5fb3f057f6e2ddfa306de841c70d57efa03e0927146475b29a922b643bbdfa55b76fd116c7390bf", 0x3e1}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:02 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:02 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3e1}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:03 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3e1}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:04:03 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3f1}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:03 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:03 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3f1}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:03 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3f1}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:04:04 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3f9}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:04 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:04 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3f9}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:04:05 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:05 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3f9}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:05 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3fd}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:04:06 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3fd}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:06 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:06 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c78ded4f3580314f18490b618a9694b645a270cb8afe8c0dcb8835d92612d9fef21ba46ff39ae9826a18b2b3ae0bf900685b0534d7a16a2238bb19bbd749f0d66985a1f642d43f0046c6fa11f0e8b12d5cb957ae16f80cbb29926b158ae62d073a0947d49cc0fe7717b8739b70e6b8a75ff49c7c6dce96c0b19c15df82fa60a8d1736e17c8d22ba148dea668f30b97c53ae683136e69b5b4f01accdcf286acb0ad4f0bdef2c29fab26307bba65e1076f46f979a81f10f2a61e5fb3f057f6e2ddfa306de841c70d57efa03e0927146475b29a922b643bbdfa55b76fd116c7390bf11bb277a28acf3de11c9b7ebab899c40cb544208fa7e51bbcc97d137", 0x3fd}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:04:07 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:07 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3ff}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:07 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3ff}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:04:08 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:08 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x3ff}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:08 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x400}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:04:09 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x400}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) 16:04:09 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:09 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x400}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x20000000000000c1, 0x0) pckbd_enable: command error 16:04:10 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c78ded4f3580314f18490b618a9694b645a270cb8afe8c0dcb8835d92612d9fef21ba46ff39ae9826a18b2b3ae0bf900685b0534d7a16a2238bb19bbd749f0d66985a1f642d43f0046c6fa11f0e8b12d5cb957ae16f80cbb29926b158ae62d073a0947d49cc0fe7717b8739b70e6b8a75ff49c7c6dce96c0b19c15df82fa60a8d1736e17c8d22ba148dea668f30b97c53ae683136e69b5b4f01accdcf286acb0ad4f0bdef2c29fab26307bba65e1076f46f979a81f10f2a61e5fb3f057f6e2ddfa306de841c70d57efa03e0927146475b29a922b643bbdfa55b76fd116c7390bf11bb277a28acf3de11c9b7ebab899c40cb544208fa7e51bbcc97d137ba35b87e", 0x401}], 0x1}, 0x0) poll(0x0, 0x0, 0x0) 16:04:10 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(0x0, 0x0, 0x0) 16:04:10 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:11 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(0x0, 0x0, 0x0) pckbd_enable: command error 16:04:11 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:11 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:11 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) pckbd_enable: command error 16:04:12 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:13 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:13 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:13 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) pckbd_enable: command error 16:04:14 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:14 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:14 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:14 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c78ded4f3580314f18490b618a9694b645a270cb8afe8c0dcb8835d92612d9fef21ba46ff39ae9826a18b2b3ae0bf900685b0534d7a16a2238bb19bbd749f0d66985a1f642d43f0046c6fa11f0e8b12d5cb957ae16f80cbb29926b158ae62d073a0947d49cc0fe7717b8739b70e6b8a75ff49c7c6dce96c0b19c15df82fa60a8d1736e17c8d22ba148dea668f30b97c53ae683136e69b5b4f01accdcf286acb0ad4f0bdef2c29fab26307bba65e1076f46f979a81f10f2a61e5fb3f057f6e2ddfa306de841c70d57efa03e0927146475b29a922b643bbdfa55b76fd116c7390bf11bb277a28acf3de11c9b7ebab899c40cb544208fa7e51bbcc97d137ba35b87e", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) pckbd_enable: command error 16:04:15 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:15 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:15 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c78ded4f3580314f18490b618a9694b645a270cb8afe8c0dcb8835d92612d9fef21ba46ff39ae9826a18b2b3ae0bf900685b0534d7a16a2238bb19bbd749f0d66985a1f642d43f0046c6fa11f0e8b12d5cb957ae16f80cbb29926b158ae62d073a0947d49cc0fe7717b8739b70e6b8a75ff49c7c6dce96c0b19c15df82fa60a8d1736e17c8d22ba148dea668f30b97c53ae683136e69b5b4f01accdcf286acb0ad4f0bdef2c29fab26307bba65e1076f46f979a81f10f2a61e5fb3f057f6e2ddfa306de841c70d57efa03e0927146475b29a922b643bbdfa55b76fd116c7390bf11bb277a28acf3de11c9b7ebab899c40cb544208fa7e51bbcc97d137ba35b87e", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) pckbd_enable: command error 16:04:16 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:16 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:16 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:17 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) pckbd_enable: command error 16:04:17 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) pckbd_enable: command error 16:04:18 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:18 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:18 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) pckbd_enable: command error 16:04:19 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c78ded4f3580314f18490b618a9694b645a270cb8afe8c0dcb8835d92612d9fef21ba46ff39ae9826a18b2b3ae0bf900685b0534d7a16a2238bb19bbd749f0d66985a1f642d43f0046c6fa11f0e8b12d5cb957ae16f80cbb29926b158ae62d073a0947d49cc0fe7717b8739b70e6b8a75ff49c7c6dce96c0b19c15df82fa60a8d1736e17c8d22ba148dea668f30b97c53ae683136e69b5b4f01accdcf286acb0ad4f0bdef2c29fab26307bba65e1076f46f979a81f10f2a61e5fb3f057f6e2ddfa306de841c70d57efa03e0927146475b29a922b643bbdfa55b76fd116c7390bf11bb277a28acf3de11c9b7ebab899c40cb544208fa7e51bbcc97d137ba35b87e", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:19 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:19 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c78ded4f3580314f18490b618a9694b645a270cb8afe8c0dcb8835d92612d9fef21ba46ff39ae9826a18b2b3ae0bf900685b0534d7a16a2238bb19bbd749f0d66985a1f642d43f0046c6fa11f0e8b12d5cb957ae16f80cbb29926b158ae62d073a0947d49cc0fe7717b8739b70e6b8a75ff49c7c6dce96c0b19c15df82fa60a8d1736e17c8d22ba148dea668f30b97c53ae683136e69b5b4f01accdcf286acb0ad4f0bdef2c29fab26307bba65e1076f46f979a81f10f2a61e5fb3f057f6e2ddfa306de841c70d57efa03e0927146475b29a922b643bbdfa55b76fd116c7390bf11bb277a28acf3de11c9b7ebab899c40cb544208fa7e51bbcc97d137ba35b87e", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:19 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c78ded4f3580314f18490b618a9694b645a270cb8afe8c0dcb8835d92612d9fef21ba46ff39ae9826a18b2b3ae0bf900685b0534d7a16a2238bb19bbd749f0d66985a1f642d43f0046c6fa11f0e8b12d5cb957ae16f80cbb29926b158ae62d073a0947d49cc0fe7717b8739b70e6b8a75ff49c7c6dce96c0b19c15df82fa60a8d1736e17c8d22ba148dea668f30b97c53ae683136e69b5b4f01accdcf286acb0ad4f0bdef2c29fab26307bba65e1076f46f979a81f10f2a61e5fb3f057f6e2ddfa306de841c70d57efa03e0927146475b29a922b643bbdfa55b76fd116c7390bf11bb277a28acf3de11c9b7ebab899c40cb544208fa7e51bbcc97d137ba35b87e", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:20 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:20 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="1746da9321aa318618287f4761e21e7adb95ae05bb6ac358963ebd839ad08dc71c8313eb64d95fe35b11172af51d41dcda502ecd37749906e5fd2d05fd2bd2788bdd27688d33b1c63329a8c3f103b6377c0797becca0379e36f31cd3b7212bc627d1d517f7a8ea93087ac4461be3ace3f4b6d94015967526c42b01de6bcd0a0cc9408680dd43d6f112828af778cbb2e18491984c67631a863b779416797c67e136dc9c1ce457d47b70086dfb05f647f84f93968692be1ad4b84117641c0e8a4f1575bbdf8ad4e67f5e62b527d865efabd7b59b2e6630c9f2047869c4e1ff4225ffbf49d16a0b23c938c48207ecdfbb88ab65ab4d8aa7980e71e1b20466653383210bf38dfe5fb07c1b4cab29bb6ff0ad42793816344276ee68b6ed1b870050105ad82576d145e7e6dd5a2adf0c8dbf7141fbc35d2e7f9b01589a546620b51741376d57a58d6a2c51dbfb5d51727de580580062bbc97d3b02268e97fd7835d85c11097c3b788423244ed667a1ba743a67f7175271391f599b2e8225f4e7b7c32c1d614d8b3f18d00888432c4dbca5682fb46876835b3d9f235503dea35be4582034a7335815e8719f45526615b3891c0562d09f41341d1abbbdcf3dc59a8f690d57a74bc02e44d7ba7b1cd97550db0e144b66ed17840aa56c697ed99662a252c48fd8a5d3a35e43afb4d05cd4ee6600c0dcc2ef9b8488a4e91795b0226170fbd0c3a17af99413079ba11f4083d6de8a7965dabc2b532e39c4eb6452d4f114b850e981ec1db1249eaa22edb9bd317a0da74f88b4580a79b73fea68b440530367702048f03ad7715ad0e6224af27bdeaf67ac067eea1b93cb24d05d7e481dbe48fcc733938466fb03542ba6d6f8df96afb4f1c00f37a53cddb9620b590271473b57eb0a02b74b9902b5ac46ac1a1129939d7c4b2f85ffd81fb605b64929788f1df40cdbd004b60d03d24dfdc7cfa7121bd527cb6500f94c87a89261261e37df5044d638e897e91fb12335821559a947725ec430e76157a46b9be57cfa45425ae8d854d1e7cb5a5bfbb8eef37652611584d75627250d36bde57e2749e7d5505648369c78ded4f3580314f18490b618a9694b645a270cb8afe8c0dcb8835d92612d9fef21ba46ff39ae9826a18b2b3ae0bf900685b0534d7a16a2238bb19bbd749f0d66985a1f642d43f0046c6fa11f0e8b12d5cb957ae16f80cbb29926b158ae62d073a0947d49cc0fe7717b8739b70e6b8a75ff49c7c6dce96c0b19c15df82fa60a8d1736e17c8d22ba148dea668f30b97c53ae683136e69b5b4f01accdcf286acb0ad4f0bdef2c29fab26307bba65e1076f46f979a81f10f2a61e5fb3f057f6e2ddfa306de841c70d57efa03e0927146475b29a922b643bbdfa55b76fd116c7390bf11bb277a28acf3de11c9b7ebab899c40cb544208fa7e51bbcc97d137ba35b87e", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) pckbd_enable: command error 16:04:20 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) pckbd_enable: command error 16:04:21 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:21 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:21 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:21 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) 16:04:22 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:22 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000000200)="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", 0x401}], 0x1}, 0x0) poll(&(0x7f0000000000)=[{}, {}, {}, {}, {}, {}, {}], 0x7, 0x0) pckbd_enable: command error 16:04:22 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpgrp() fcntl$setown(r0, 0x6, r1) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r3 = getppid() fcntl$setown(r2, 0x6, r3) pckbd_enable: command error 16:04:23 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:23 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, &(0x7f0000000140), 0x0) 16:04:24 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, &(0x7f0000000140), 0x0) pckbd_enable: command error 16:04:24 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:24 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, &(0x7f0000000140), 0x0) 16:04:24 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, &(0x7f0000000140), 0x0) pckbd_enable: command error 16:04:25 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:25 executing program 1: setsockopt(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140), 0x0) 16:04:25 executing program 1: setsockopt(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140), 0x0) pckbd_enable: command error 16:04:26 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:26 executing program 1: setsockopt(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140), 0x0) 16:04:26 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, &(0x7f0000000140), 0x0) pckbd_enable: command error 16:04:27 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, &(0x7f0000000140), 0x0) 16:04:27 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:27 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, &(0x7f0000000140), 0x0) 16:04:28 executing program 1: r0 = socket(0x18, 0x0, 0x0) setsockopt(r0, 0x29, 0x36, &(0x7f0000000140), 0x0) pckbd_enable: command error 16:04:28 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, 0x0, 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:28 executing program 1: r0 = socket(0x18, 0x0, 0x0) setsockopt(r0, 0x29, 0x36, &(0x7f0000000140), 0x0) 16:04:28 executing program 1: r0 = socket(0x18, 0x0, 0x0) setsockopt(r0, 0x29, 0x36, &(0x7f0000000140), 0x0) 16:04:28 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, 0x0, 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:28 executing program 1: socket(0x18, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140), 0x0) 16:04:28 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, 0x0, 0x710, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:28 executing program 1: socket(0x18, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140), 0x0) 16:04:28 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x0, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:28 executing program 1: socket(0x18, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000140), 0x0) 16:04:29 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x0, 0x0) openat$vmm(0xffffffffffffff9c, 0x0, 0x0, 0x0) pckbd_enable: command error 16:04:29 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x0, 0x36, &(0x7f0000000140), 0x0) 16:04:30 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x0, 0x36, &(0x7f0000000140), 0x0) pckbd_enable: command error 16:04:30 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x0, 0x0) openat$vmm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:04:30 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x0, 0x36, &(0x7f0000000140), 0x0) 16:04:31 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x0, 0x0) openat$vmm(0xffffffffffffff9c, 0x0, 0x0, 0x0) 16:04:31 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x0, &(0x7f0000000140), 0x0) pckbd_enable: command error 16:04:32 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x0, &(0x7f0000000140), 0x0) 16:04:32 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) recvfrom$unix(r0, 0x0, 0x250, 0x0, 0x0, 0x0) 16:04:32 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x0, &(0x7f0000000140), 0x0) pckbd_enable: command error 16:04:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10040, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x100) 16:04:32 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) 16:04:32 executing program 0: r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000001840)=ANY=[@ANYBLOB="0200000000000000faa5553b79fc2b4abd68876494cdc4e802508d2ecd10daa4a449c3d44e9502b7096c5bc8e7be44d8edd8223e03125371c257835fe7a7ea2b6a3df8e26b246e4a98085a3ce08a49410933685a463b940ec8a9230ffbefb4063e6ce643f8aae4bd3f932fe7b8bc6a5dbc7a1e907f15ceb0bad58452fe9f525bb6b2e6f5c90b5e084dd55144ca9c267399a760aedc9f59b1a3fdccbb67d753354e5d7593d6e1b73894156483f5fb8421f9e3b9b4c8413dbec86c20863aefefa4e217f11d1aeed4d8c0d7454df425fb2630f7a2272d4bde0952f1c5fc24bdf0a49b3cf7aae6ca258dac32cffd67980621a99053aec4cd86a38704ed9770e6d571eeea964b5d396de232aedfebd18fb7cd12b950f7c63cf819c8f795f2062f09c28dee50fb98e2a3bc25af88df97ecf79cface73a65441e6419373ab4d06f4e2508fe290ff3c2277de1958586984cc7a5c2f7ada18b24824ce4bf47a92e0e2ac1772dbf7c582caa764fc9498e7c1eb91bb14649fb4e7e21799db51ee5ccbd11a27e765d9b1fc903024d6977c564745d3621a63efa2dc4d2f4926b6dd46eeff06e883706cec9707376d4382cc21a770151f5c5e6acef3550459caa57ae5292f42e670288b023b9d1318138c65d59abd3302d44779fea22fa1e7ab68e7efb393dcb83a0984900cdf5b66d753462c33b8c7e2dd075841db977af59ea2f54818cfaaccacb9c0e8e74baafaa9e2a2b6bfa966d3c46c80d3a8a14558982bb46718f74e1617b591c5fc3af5d660e8ec7c1e230a1a695a47700f5df88b111cfdf240d70c24af19de5da7d5d957719f860505b896583f8cb3a30547f70c576744257defbfce15f8e1fe327e2e1e74a02ff48e0b2d6a80fa408c9247b2a9b48ac266f89b903604d739ee4aea9a2105371ad61a0faa07000aa3ddc44f02f27c59f664fd31713ea013455bc64a97c85181f3bdd038400f1bebcab2282c1600166791c7105b77548b43a26279d81243ecf98c32a1948dfe608eb80b18094dcdee98df6474ed18eab5bb3d43090137efbcfdadb28bda0776609bb8612f6590fe64a30ead0486ee163f539b2e2293cf0f0b0326ea439df1a3af666e882a250a7266ca68dda6ae4e48eab6899ac27c79052fde79a98c131d7f0ebaddbf10db4448c826e4103a0fc7a65761042e3a35eaa4bee019648a47f9b5b402c8a22b2d78615b5e36f7ebda2a8542d6d811dd722a2aba365215b534bdd18765f0a73b2a97f6150993362498cebb59d0f5d86e3603d7593d695a52f0388a04787d8e2f302b2e94b18421cafc6039e99109e0ff3b2e1c4bd4c37a31788ea0b87b2bf8a3ea18e3bccc14d4a07d4fb2eb12b14d7ccf901294af4f53b3a1178bb92af88a459071ed95da555704bcbc75633a3fb59c482e23646aee26aa484f334da45d1990394a5ea69a439bb192c28ae6cc874f6967d2d48131c4b51d1aa64a74aa218f8426ec99b485e94f1a858361cb3b68aa253d3e1dfecc9f039adab1239064b42cca6463256e17cd2d3d69cc5888934ae99e6b411b9b0e5317c801f1a4adafa2e0c5b52a8947b32932343413a56f75ebafeed5272243fe15f5a152adeef1c3a980b322cac3566f9d6a0c034bd487192aede23101f8df0286b2592eb23715a041043666c115f3562fa9315f14e7a3e2d6246309879ccd1bb689d96054a0c69d340f28f74786848ff94069f046a499997a5e76d1098d84ecc0a3e0cde8cfac2b9e44942e79459c571548ee43d71b63f2194274e0b27724afb07067aec3bc7f071704059f3baa7d5bceec581c86f0469300236327019cdf995714d4f2a1de76b17fb07b7f67e93b13f8d511956f328d170c9a67976ad89341b88ae3a884e4ef844680b3730b2cb5de3114f0b3c466decda7bd2d015320221bc9590744df2cf340f47a4e2e6aa6bfa9bc589eb61731f849dec57394c4368c6d9e6dd025d8c20bdefe15d5f8478eecacdbbba4ef9b98a57b5e6cfc2d27faa2d0182a7e2a82598f64d83bc82679ca1fc313c1c121d4099919cf7b39210b80f50dbbb9f02a14c9ea6b840152dc6be3fb0313a26304e697779eaf1281522202bcd6a5af7526c1ce098a41b6880ec81e971723e53bae8841a0a1040d7a9805d28305b1683826cedc94e0804873a00e4728a9d07b6cc8e8ac4d89e7164033bb867f41d6ff64e6bc3e6b728ba30e7c0abe69f46ef89124a48df028fffc7f0c92fc988a66ab762820285d85a1522bd885ffb3e999bd469f1de81e2f39e2c9e2977096a404db5c40e6120b3ce638f7785ff9bb66b77bebcacfc6f97b905ee12103ebd7835fda7244018cdb19d862ec602e79bc75bcb9f35386a4fd748824531316465b8cb0769555132bfd59a728d0605296126ffd56934b820becd94d76a60a4114d972dadcc2b3c682b93cfa943164ab52341f40efee04d0843fd51b73d67afeafe110f9b4f411f3d75a201e62344c1579715941b2b2c0fb49e7347723e78a07a7211dca7d13eee69ee2e1a63b733cadf928b2afe3c74c0d72be6a05e451fb3ddc63de32aadcc169ae4a82980f0d88b9401679813fefab8b56d8e5d0027517098fab2a974ec67af451b98f6d942af9512e54aed255ef4e44831a76c81632dd4faaaf645a006b0a5c9def36343e81058d15cb64915df7e3302da50b604a60f9153f93137b8c6d8da84578792b0cde490b3efed059706fe2778ea4e8b340fa5639c2ba7400a0617838762844f43c985e3fcc248ca1a0295abbf2f9a517d52a238175b2dbc9059a7378754be1549ca510b100be95ca7893dae4becb97016d28f59a38bfd38d1014c7c6db623debf16b1e08eb5bbdcc9da48faa9853b98d1b8f5c47b7498a83c0dc351a8badbf6f404a6054266a35de8c9ee8f87fb8b15ddf5d7ebda307e46ca00edc15f7de426c57c0bcdf39e0768096aec259e04cf9941a62308a7616bb28f766b17a94e1199c59103e36a0a6ce0fd3fc4ebb95f2bd9de72d30cbd53405160a7cbe2ad9649bbe3cb7412578537fdfc6c953b7aa26d74c74723d8c0c56a164f643b4229b9f31af6ec66bb77e33010b0db0121b996e7775ab187146a3c9647bcf99900ad414463bdf197f55ecab533147407f6057a66227be1e30cfd6702968fee0106cc62ee0dd0e4d891d3cdb6a57b5d0693972f1dc4036bea8fb88841d703dbd9467c0d7a4faedcd576e56ae7c8c81649b6bc450ea623e04816464770b3461f2b7bba7f1fae15d7be1f2592747e0170c5f400664fb36164a8c742e984511a13f646ab1bbb2458e4408d1f1c347d35aa4de6055cdf9b542d2bf6bc049d92a75a8a19ab3016b5bc96678a9fbd0586ddab762fa61c9583d83e318e658be714b23c1e3ed9d7698f91024db2af487e4e9de578a30e8436a801038f51d8856862abc883202012dbee75afc2c7da285d8e153a2cf0bfa816f332486cffa62a8cb4fd187a463d429db0ba0a46a9f9a519cba6b1ede14254bdd5c6ebd6929045105549d529d1c4f8ddba0a9c4ac459a3a028660e1113d11d18e2a3d0762c9b04f57f6c44379afb1eb1ce81e7fc9e6fa58dd8edf1f34230ba98be5f444061929cbaf1deef99d1294094427fa9d444e89f118ac5ebbaea9b54c09cf0b81fc57a435f14d7a8b84d58ce7b898db26fb8d33c363bea47c24223648bd206e84de4090c45058e8226bbac392b8eb2161dbaac77e1577ce04523aed6d8e86eb25ae30f38553194a10d1eda821399887e3383e518d9cfdea0bba63a54ed478568fe27f31d9f484f7ba6d820f2bafc140cd172efdffd61dd97ee1124ffac2d9498b86a2945eaecf48051c63ec141ec94462bc70a130b79f4c2042395592c6c339d0703fd4a068a6362a49b778c10a1a14afe2e17d8431cc1df109484227da4f13e650b89c3c9ef8ca1504addd4380fdf1a8bfe1fdb15b64a7d65e131d2960c8008fc56cb05fd4ad286f2a093851e46afe739af3c57cfdf75e6d59f4b9f73003452a6d1abfb25a168d6e2774d8952a181d959e39330f8ca61de4c5f6c66828ee56832284115034a07b39e4e5fadb43abeec5f335ee0d51d2bc848d300aaef4f7efa3c53f22d3b2776986c0f92ce74eec01cd1707583a656b25aa50d852a3574fe3135866d6969e3e3c4e766b1e579463bc5f60d44279ac4f29d51bc24f09e1f2940039d878d7294bc57b189514ba568b3fc1348272edcc8887ab007e2d4551a1ac5c49142e127cda612f0ddfb0ee8bd7e714fb65c7b88946fec05b32fbe2411a520acd6b3703afed554ff30a75010e354c3f64f33e741ef29a9921fe2f4d76a584c0a22189c8012ceb4b3a333cf835006d6b2f60be4c1940cc06844f5415ae5228679d9f45cbd09a49fb8aa9819498d9c7f1700755c138baf89eac394667c0671f805e4f888a0551e9979376e2e351476e206a1cdcefdf13c0b05cf08e85c037eff4df1c009d2a3fcb599722394fd5ef9534f14f303a7f11331830754635b75a6dfe24bc3c4987e0f6aa7fddc00b3c3375dfa08b2a395443bb6171adb4dc7702e89b9ff19893d19571948fde5508f402536faa00578d4ef85017b50502a24141b1eef22708c60617995999a89f66ded885e59a9aa1cb0f66e61b92b22e8567e266ca932c3ebb3d80016b426a3762420538da575dc3e1f951ec4466f8b7fd0d134d16bb084031435241684d4d2d858fc502bb6ed1ddab040027f34f6a15bdfc105f2f5a1c588247bcbd1ced8b5243ccd05be4abc018aa0c44f4ba03d0fc4b8a7dc664b110df615c00e4eeac2848aab1a043ab52d7348d1b7bb19d0783eab9954173f0beab89e8a599fd9489ad244d501969521a1a024eb0018a510c7f5b8c080b714dd5f00c3757ccc9efa5c5bba14646e8fa92b79864b2dc67ae840f9f466b88f78765c8dcd08effea658e19ffc49a8c4900e3a619aeccd30905b87f1111e1ed518e430ec9f54a616e312cc1ea31eb4cf7b5c2ecdd4b7131400a4cb55c86b109c2e82341c79ed6a5eb0b66551d2e92733f9d38822142b0a1945ae50484cc76fd5bc41a19f45554e61d75cb11f9352a5264eec31751555f56cf1cc97d5a0d367e51daa382cc4372bd896df110c648b8df527982cdcf76801dd364ed3d7f5db9cede9030ea250be98162e7559cf1fb7bd7f36ce972b301eb240210d9f8627be6a9d54418bd06944b6795f1690d07390eabf0c6182648282e706997dd8437cdcfe4b1431a0c8a0aa4713a454aab2c95d270ccd86d564e5bc0e1d11ad93c58328329972f69b322b441a2bc729b80d98fd5f0492f765aa8f8d02c2a2a30e7b021fde9613995189768df07521a38d0af875817a4abfc4232863293e94e28d640c7f1f7892a2ba18d6976ab8583c5ad26093b8e81c5d1bee1b9376976807cfae5fb839a6742f1a72d21993ef08cabfdb989ce193e9c75080c1b5e1aed340e24aba2d491313d73a8b2ebf72a653602e4100d3bbbe533406d16f9822efa096f5d5330a66384d462ec069ae08e3e5cd025a0c162f1a9365004cc1e5cd5c5c9df0c99ff0ec8edae7429a3f7542c8d4f5e067ef241e9654415f6690b94725ae55c7fcb044a6ddbb3c8236e624ca409572330c7049d2bc95d0332b7974e982b3d1546f7b71299d57de94cb7ab5ca4d07e4321e70ad3c6d5ea069d403d30f23fc3f6853a6ed148e107da00434d92cdc0b3d75535013b673c7c539866476a6a595f9a935db892c9647a9b08798a52fb838f13e477860edaf11be1c3063f46d48655ff65f492923315e68ead8e70b821cf049a7bbf7f88cd9a4be80a56f9f5a3"], 0x1008, 0xc00) 16:04:32 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) 16:04:32 executing program 0: r0 = socket(0x2, 0x2, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000001b80)='B', 0x1}], 0x1) 16:04:32 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) 16:04:32 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semctl$GETPID(r0, 0x1, 0xb, &(0x7f00000001c0)=""/103) 16:04:32 executing program 1: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semctl$GETPID(r0, 0x1, 0xb, &(0x7f00000001c0)=""/103) 16:04:32 executing program 1: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semctl$GETPID(r0, 0x1, 0xb, &(0x7f00000001c0)=""/103) 16:04:32 executing program 1: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 0: r0 = semget$private(0x0, 0x6, 0x0) semctl$GETPID(r0, 0x1, 0xb, &(0x7f00000001c0)=""/103) 16:04:32 executing program 1: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 1: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 1: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 1: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 16:04:32 executing program 1: munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 0: munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 16:04:32 executing program 1: munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 0: munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 16:04:32 executing program 1: munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 0: munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) 16:04:32 executing program 1: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 16:04:32 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 1: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 16:04:32 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 1: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) munlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 16:04:32 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) 16:04:32 executing program 0: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) 16:04:32 executing program 0: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) 16:04:32 executing program 0: madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4) 16:04:32 executing program 1: setsockopt(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 16:04:32 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 16:04:32 executing program 1: setsockopt(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 16:04:32 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 16:04:32 executing program 1: setsockopt(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 16:04:32 executing program 0: mlock(&(0x7f0000ffb000/0x2000)=nil, 0x2000) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) 16:04:32 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) 16:04:32 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r5 = fcntl$dupfd(r4, 0x0, 0xffffffffffffff9c) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140)='/dev/bpf\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wskbd0\x00', 0x710, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/vmm\x00', 0x10000, 0x0) kevent(r0, &(0x7f00000001c0)=[{{r5}, 0x42adaf119b85403c, 0x10, 0x4, 0xffffffff, 0x2}, {{r6}, 0xfffffffffffffff8, 0x100, 0x20000000, 0x7f, 0x13d}, {{r3}, 0xfffffffffffffff8, 0x22, 0x9c8fea1295067161, 0x9, 0x3f}, {{r7}, 0x8000000000000002, 0x1, 0x1, 0x100, 0xa3}, {{r8}, 0xfffffffffffffff8, 0x40, 0x10, 0x7, 0xfffffffffffffaf4}, {{r4}, 0xfffffffffffffffe, 0xb2, 0xf0000000, 0x0, 0xe698}, {{r14}, 0xfffffffffffffff8, 0x20, 0x1, 0x3, 0x5}], 0xffffffff, &(0x7f00000002c0)=[{{r9}, 0xfffffffffffffffd, 0x71ed6f7b12f9f46f, 0xbddd7f73db7461fe, 0x8, 0x3}, {{r10}, 0xffffffffffffffff, 0x10, 0x10, 0xfffffffffffffffd, 0x3}, {{r11}, 0xffffffffffffffff, 0x54, 0x2, 0x8000, 0x5}, {{r12}, 0xfffffffffffffff9, 0x23, 0x0, 0x2, 0xd654}, {{r2}, 0xffffffffffffffff, 0x82, 0x4, 0x9, 0xfffffffffffffff9}, {{r13}, 0xfffffffffffffffb, 0x80, 0x1, 0x2, 0x6}], 0x5, &(0x7f0000000380)={0xa8, 0x7fff}) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) socket$inet6(0x18, 0xe008, 0x7) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:32 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) pckbd_enable: command error 16:04:33 executing program 1: r0 = socket(0x0, 0x1, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) 16:04:33 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) r1 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r1) 16:04:33 executing program 1: r0 = socket(0x18, 0x0, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) 16:04:33 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) r1 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r1) 16:04:33 executing program 1: r0 = socket(0x18, 0x0, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) 16:04:33 executing program 1: r0 = socket(0x18, 0x0, 0x0) setsockopt(r0, 0x29, 0x36, 0x0, 0x0) 16:04:33 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) r1 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r1) 16:04:33 executing program 1: socket(0x18, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 16:04:33 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:04:33 executing program 1: socket(0x18, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 16:04:33 executing program 1: socket(0x18, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) 16:04:33 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:04:33 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x0, 0x36, 0x0, 0x0) 16:04:33 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:04:33 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x0, 0x36, 0x0, 0x0) 16:04:33 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x0, 0x36, 0x0, 0x0) 16:04:33 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:33 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x0, 0x0, 0x0) 16:04:33 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:33 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x0, 0x0, 0x0) 16:04:33 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x0, 0x0, 0x0) 16:04:33 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:33 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:04:33 executing program 0: r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:33 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:34 executing program 0: r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) r5 = openat$klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0x1, 0x0) r6 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r6, 0x0, 0x2, &(0x7f0000000040), 0x4) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) connect(r7, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) ioctl$LIOCSFD(r5, 0x80046c7f, &(0x7f0000000180)=r6) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) r5 = openat$klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0x1, 0x0) r6 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r6, 0x0, 0x2, &(0x7f0000000040), 0x4) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) connect(r7, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) ioctl$LIOCSFD(r5, 0x80046c7f, &(0x7f0000000180)=r6) 16:04:34 executing program 0: r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) r5 = openat$klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0x1, 0x0) r6 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r6, 0x0, 0x2, &(0x7f0000000040), 0x4) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) connect(r7, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) ioctl$LIOCSFD(r5, 0x80046c7f, &(0x7f0000000180)=r6) 16:04:34 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) openat$klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0x1, 0x0) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x2, &(0x7f0000000040), 0x4) r6 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r6, 0x0, 0x2, &(0x7f0000000040), 0x4) connect(r6, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:34 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) openat$klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0x1, 0x0) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x2, &(0x7f0000000040), 0x4) r6 = socket$inet(0x2, 0x3, 0x0) connect(r6, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) openat$klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0x1, 0x0) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x2, &(0x7f0000000040), 0x4) connect(0xffffffffffffffff, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) openat$klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0x1, 0x0) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x2, &(0x7f0000000040), 0x4) connect(0xffffffffffffffff, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) openat$klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0x1, 0x0) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r5, 0x0, 0x2, &(0x7f0000000040), 0x4) connect(0xffffffffffffffff, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpgrp() ktrace(0x0, 0x4, 0x10, r0) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpgrp() ktrace(0x0, 0x4, 0x10, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) openat$klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0x1, 0x0) socket$inet(0x2, 0x3, 0x0) r5 = socket$inet(0x2, 0x3, 0x0) connect(r5, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpgrp() ktrace(0x0, 0x4, 0x10, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) openat$klog(0xffffffffffffff9c, &(0x7f0000000140)='/dev/klog\x00', 0x1, 0x0) r5 = socket$inet(0x2, 0x3, 0x0) connect(r5, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r0) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) ioctl$DIOCMAP(r3, 0xc0106477, &(0x7f0000000100)={&(0x7f0000000040)='./file0/../file0\x00', r4, 0x2}) r5 = socket$inet(0x2, 0x3, 0x0) connect(r5, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/zero\x00', 0x800, 0x0) r4 = socket$inet(0x2, 0x3, 0x0) connect(r4, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x0, 0x10, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) r3 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) r4 = socket$inet(0x2, 0x3, 0x0) connect(r4, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = kqueue() syz_open_pts() r2 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r2, 0x40045720, &(0x7f00000001c0)) fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x3, 0x0) connect(r3, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() syz_open_pts() r1 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r1, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) ioctl$WSMOUSEIO_GTYPE(r1, 0x40045720, &(0x7f00000001c0)) r2 = socket$inet(0x2, 0x3, 0x0) connect(r2, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x0, r0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() syz_open_pts() r1 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r1, 0x80105728, &(0x7f0000000040)={&(0x7f0000000000)=[{0x101}], 0x1}) r2 = socket$inet(0x2, 0x3, 0x0) connect(r2, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() syz_open_pts() openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/wsmouse0\x00', 0x0, 0x0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() syz_open_pts() r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpgrp() ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x10, 0x0) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) kqueue() r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) utimensat(r1, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r2, 0x0, 0x2, &(0x7f0000000040), 0x4) recvmsg(r2, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) open$dir(&(0x7f0000000040)='./file0\x00', 0x20000, 0x8) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) utimensat(r1, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r2, 0x0, 0x2, &(0x7f0000000040), 0x4) recvmsg(r2, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) open$dir(&(0x7f0000000040)='./file0\x00', 0x20000, 0x8) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) utimensat(r1, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r2, 0x0, 0x2, &(0x7f0000000040), 0x4) recvmsg(r2, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) open$dir(&(0x7f0000000040)='./file0\x00', 0x20000, 0x8) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) utimensat(r1, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r2, 0x0, 0x2, &(0x7f0000000040), 0x4) recvmsg(r2, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) utimensat(r1, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x3, 0x0) recvmsg(r2, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) utimensat(r1, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) utimensat(r1, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) utimensat(r1, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) utimensat(r1, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r2 = socket$inet(0x2, 0x3, 0x0) recvmsg(r2, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r0, 0x0, 0x0) utimensat(r0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r0, 0x0, 0x0) utimensat(r0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r0, 0x0, 0x0) utimensat(r0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0x2, 0x2}, {0x9, 0x8}}, 0x0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r2 = socket$inet(0x2, 0x3, 0x0) recvmsg(r2, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() fcntl$dupfd(0xffffffffffffffff, 0x2, 0xffffffffffffffff) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:34 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:34 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) connect(r0, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) connect(r1, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) connect(0xffffffffffffffff, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) connect(0xffffffffffffffff, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) connect(0xffffffffffffffff, &(0x7f0000000200)=@in={0x2, 0x3}, 0xc) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, 0x0, 0x0) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, 0x0, 0x0) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) connect(r1, 0x0, 0x0) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) recvmsg(r1, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000000c0)=@in, 0xc, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, 0x0, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, 0x0, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, 0x0, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000100)=""/53, 0x35}, {&(0x7f0000000140)=""/57, 0x39}, {&(0x7f0000000180)=""/158, 0x9e}, {&(0x7f0000000240)=""/19, 0x13}, {&(0x7f0000000280)=""/223, 0xdf}, {&(0x7f0000000380)=""/174, 0xae}, {&(0x7f0000000440)=""/141, 0x8d}, {&(0x7f0000000500)=""/124, 0x7c}], 0x8, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:35 executing program 1: ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1) 16:04:35 executing program 1: ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:35 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:35 executing program 1: ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 1: open$dir(0x0, 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(0x0, 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(0x0, 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(0x0, 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(0x0, 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) lchown(0x0, 0xffffffffffffffff, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:36 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:36 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, 0x0, 0x0) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, 0x0, 0x0) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, 0x0, 0x0) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000140)=0x6e) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) recvmsg(r0, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000140)=0x6e) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000140)=0x6e) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x0, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000140)=0x6e) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000140)=0x6e) getpid() mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000140)=0x6e) getpid() mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socket$inet(0x2, 0x3, 0x0) recvmsg(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=""/177, 0xb1}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000140)=0x6e) getpid() mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, 0x0, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000140)=0x6e) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000140)=0x6e) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, 0x0, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) getpeername$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000140)=0x6e) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r1 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r1) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, 0x0, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket$inet(0x2, 0x3, 0x0) recvmsg(r1, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) 16:04:37 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) r3 = kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = kqueue() r6 = fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r6, 0x0, 0x0) r7 = openat(r6, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) r8 = openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r14 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r18, 0x0) r19 = getuid() r20 = getegid() r21 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r21, 0x800c5606, &(0x7f00000000c0)={0x1}) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000000200)=[{&(0x7f0000000100)="556baaaefa5d461b2b0178d3b6d76b0b8451bd21227be0b474f9fadbda7702320c2da0588d8731406ee79da9d5253ead63c0ed5ef538a0744917efcc6ffe8307ee24ac37830b80e20703b2e0a0dfffe44d90526afb392c431225d470cc59160c359f9f580e6723470682f3be69bafeadb7070b5b012b182fcfa416b96a4c61315e0f5cdc495032deed979645dff9063e409372e73d47a0d4b0756debad35b0759da833ecf7b3638b482e3444", 0xac}, {&(0x7f00000001c0)="5d66ca457df303e79623fe2d9acda02e20c0be2a8a930172a17b812be6b691eacb101b1c5c1de4cd70", 0x29}], 0x2, &(0x7f0000000440)=[@rights={0x38, 0xffff, 0x1, [r0, r1, r21, r1, r3, r4, r7, r8, r1]}, @rights={0x20, 0xffff, 0x1, [r9, r10, r11, r12]}, @rights={0x30, 0xffff, 0x1, [r13, r14, r15, r0, r1, r0, r0, r16]}, @cred={0x20, 0xffff, 0x0, r18, r19, r20}], 0xa8, 0x605}, 0x400) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:04:37 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) r3 = kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = kqueue() r6 = fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r6, 0x0, 0x0) r7 = openat(r6, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) r8 = openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r14 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r18, 0x0) r19 = getuid() r20 = getegid() r21 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r21, 0x800c5606, &(0x7f00000000c0)={0x1}) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000000200)=[{&(0x7f0000000100)="556baaaefa5d461b2b0178d3b6d76b0b8451bd21227be0b474f9fadbda7702320c2da0588d8731406ee79da9d5253ead63c0ed5ef538a0744917efcc6ffe8307ee24ac37830b80e20703b2e0a0dfffe44d90526afb392c431225d470cc59160c359f9f580e6723470682f3be69bafeadb7070b5b012b182fcfa416b96a4c61315e0f5cdc495032deed979645dff9063e409372e73d47a0d4b0756debad35b0759da833ecf7b3638b482e3444", 0xac}, {&(0x7f00000001c0)="5d66ca457df303e79623fe2d9acda02e20c0be2a8a930172a17b812be6b691eacb101b1c5c1de4cd70", 0x29}], 0x2, &(0x7f0000000440)=[@rights={0x38, 0xffff, 0x1, [r0, r1, r21, r1, r3, r4, r7, r8, r1]}, @rights={0x20, 0xffff, 0x1, [r9, r10, r11, r12]}, @rights={0x30, 0xffff, 0x1, [r13, r14, r15, r0, r1, r0, r0, r16]}, @cred={0x20, 0xffff, 0x0, r18, r19, r20}], 0xa8, 0x605}, 0x400) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:04:37 executing program 0: r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) r3 = kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = kqueue() r6 = fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r6, 0x0, 0x0) r7 = openat(r6, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) r8 = openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r14 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r18, 0x0) r19 = getuid() r20 = getegid() r21 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r21, 0x800c5606, &(0x7f00000000c0)={0x1}) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000000200)=[{&(0x7f0000000100)="556baaaefa5d461b2b0178d3b6d76b0b8451bd21227be0b474f9fadbda7702320c2da0588d8731406ee79da9d5253ead63c0ed5ef538a0744917efcc6ffe8307ee24ac37830b80e20703b2e0a0dfffe44d90526afb392c431225d470cc59160c359f9f580e6723470682f3be69bafeadb7070b5b012b182fcfa416b96a4c61315e0f5cdc495032deed979645dff9063e409372e73d47a0d4b0756debad35b0759da833ecf7b3638b482e3444", 0xac}, {&(0x7f00000001c0)="5d66ca457df303e79623fe2d9acda02e20c0be2a8a930172a17b812be6b691eacb101b1c5c1de4cd70", 0x29}], 0x2, &(0x7f0000000440)=[@rights={0x38, 0xffff, 0x1, [r0, r1, r21, r1, r3, r4, r7, r8, r1]}, @rights={0x20, 0xffff, 0x1, [r9, r10, r11, r12]}, @rights={0x30, 0xffff, 0x1, [r13, r14, r15, r0, r1, r0, r0, r16]}, @cred={0x20, 0xffff, 0x0, r18, r19, r20}], 0xa8, 0x605}, 0x400) getpid() socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:04:37 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) r3 = kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = kqueue() r6 = fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r6, 0x0, 0x0) r7 = openat(r6, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) r8 = openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r14 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r18, 0x0) r19 = getuid() r20 = getegid() r21 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r21, 0x800c5606, &(0x7f00000000c0)={0x1}) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000000200)=[{&(0x7f0000000100)="556baaaefa5d461b2b0178d3b6d76b0b8451bd21227be0b474f9fadbda7702320c2da0588d8731406ee79da9d5253ead63c0ed5ef538a0744917efcc6ffe8307ee24ac37830b80e20703b2e0a0dfffe44d90526afb392c431225d470cc59160c359f9f580e6723470682f3be69bafeadb7070b5b012b182fcfa416b96a4c61315e0f5cdc495032deed979645dff9063e409372e73d47a0d4b0756debad35b0759da833ecf7b3638b482e3444", 0xac}, {&(0x7f00000001c0)="5d66ca457df303e79623fe2d9acda02e20c0be2a8a930172a17b812be6b691eacb101b1c5c1de4cd70", 0x29}], 0x2, &(0x7f0000000440)=[@rights={0x38, 0xffff, 0x1, [r0, r1, r21, r1, r3, r4, r7, r8, r1]}, @rights={0x20, 0xffff, 0x1, [r9, r10, r11, r12]}, @rights={0x30, 0xffff, 0x1, [r13, r14, r15, r0, r1, r0, r0, r16]}, @cred={0x20, 0xffff, 0x0, r18, r19, r20}], 0xa8, 0x605}, 0x400) getpid() 16:04:37 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) r3 = kqueue() r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = kqueue() r6 = fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r6, 0x0, 0x0) r7 = openat(r6, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) r8 = openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff}) r14 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r16, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r17, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r18, 0x0) r19 = getuid() r20 = getegid() r21 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r21, 0x800c5606, &(0x7f00000000c0)={0x1}) sendmsg$unix(r2, &(0x7f0000000500)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000000200)=[{&(0x7f0000000100)="556baaaefa5d461b2b0178d3b6d76b0b8451bd21227be0b474f9fadbda7702320c2da0588d8731406ee79da9d5253ead63c0ed5ef538a0744917efcc6ffe8307ee24ac37830b80e20703b2e0a0dfffe44d90526afb392c431225d470cc59160c359f9f580e6723470682f3be69bafeadb7070b5b012b182fcfa416b96a4c61315e0f5cdc495032deed979645dff9063e409372e73d47a0d4b0756debad35b0759da833ecf7b3638b482e3444", 0xac}, {&(0x7f00000001c0)="5d66ca457df303e79623fe2d9acda02e20c0be2a8a930172a17b812be6b691eacb101b1c5c1de4cd70", 0x29}], 0x2, &(0x7f0000000440)=[@rights={0x38, 0xffff, 0x1, [r0, r1, r21, r1, r3, r4, r7, r8, r1]}, @rights={0x20, 0xffff, 0x1, [r9, r10, r11, r12]}, @rights={0x30, 0xffff, 0x1, [r13, r14, r15, r0, r1, r0, r0, r16]}, @cred={0x20, 0xffff, 0x0, r18, r19, r20}], 0xa8, 0x605}, 0x400) 16:04:37 executing program 0: open$dir(0x0, 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r11, 0x0) getuid() getegid() r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r11, 0x0) getuid() getegid() openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r11, 0x0) getuid() getegid() 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r11, 0x0) getuid() 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r11, 0x0) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000100)=0x1) 16:04:37 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:04:37 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(0x0, 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x0, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) openat$diskmap(0xffffffffffffff9c, &(0x7f0000000400)='/dev/diskmap\x00', 0x0, 0x0) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, 0x0) mkdir(&(0x7f0000000040)='./file1\x00', 0x24) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) accept$unix(0xffffffffffffff9c, &(0x7f0000000300)=@file={0x0, ""/88}, &(0x7f0000000380)=0x5a) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(0x0, 0x24) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(0x0, 0x24) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(0x0, 0x24) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) mkdir(&(0x7f0000000040)='./file1\x00', 0x0) 16:04:38 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) openat(r4, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) openat(r0, &(0x7f00000002c0)='./file0\x00', 0x8, 0x80) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) r2 = kqueue() r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) openat(r3, &(0x7f0000000280)='./file0\x00', 0x100, 0x4e95eb235ff353ec) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = getpgrp() ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, r1) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) r2 = kqueue() r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = getpgrp() ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, r1) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) r2 = kqueue() fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = getpgrp() ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, r1) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) kqueue() 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = getpid() r1 = getpgrp() ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, r1) ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() r0 = getpgrp() ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, r0) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) getpid() ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) kqueue() 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) openat$pci(0xffffffffffffff9c, &(0x7f0000000240)='/dev/pci\x00', 0x40, 0x0) 16:04:38 executing program 0: ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) 16:04:38 executing program 0: ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) 16:04:38 executing program 0: ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) getpid() 16:04:38 executing program 0: open$dir(0x0, 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:38 executing program 0: open$dir(0x0, 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:38 executing program 0: open$dir(0x0, 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(0x0, 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(0x0, 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(0x0, 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(0x0, 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(0x0, 0x2, 0x2, 0x0) 16:04:38 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:38 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(0x0, 0x2, 0x2, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(0x0, 0x200, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x2, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(0x0, 0x200, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(0x0, 0x200, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x13e) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x1a, 0x1) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 16:04:39 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040), 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) setsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000000)={r2, r5}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f00000002c0)=0xc) setuid(r6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r8, 0x0) setregid(r8, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) r9 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r9, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0x3) setuid(r10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r12, 0x0) setregid(r12, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r14, 0x0) r15 = getpgid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r16, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r17, 0x0) setregid(r17, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x7, r6, r8, r10, r17, 0x1, 0x2}, 0x2, 0x7, r14, r15, 0x2, 0x1, 0x200}) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 16:04:39 executing program 0: pipe2(&(0x7f0000000140), 0x20cea1924d95fee7) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x400, 0x80) r1 = getppid() ktrace(&(0x7f0000000040)='./file0\x00', 0x1, 0x504, r1) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) mmap(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x1, 0x5019, r0, 0x0, 0x7) ioctl$VMM_IOC_CREATE(r2, 0xc5005601, &(0x7f0000000180)={0x10, 0x8, 0x4, 0x419b, [{&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x9}, {&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, 0x2}, {&(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0x1}, {&(0x7f0000ffb000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x2}, {&(0x7f0000ffa000/0x6000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x7fff}, {&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x4}, {&(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil, 0x3ff}, {&(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, 0x3f}, {&(0x7f0000ff9000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil, 0xc3}, {&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x101}, {&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x9}, {&(0x7f0000ff9000/0x3000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x7}, {&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ff9000/0x4000)=nil, 0x4}, {&(0x7f0000ff8000/0x2000)=nil, &(0x7f0000ff8000/0x3000)=nil, 0xc00000000}, {&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x3ff}, {&(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffb000/0x4000)=nil, 0x7}], ['./file0\x00', './file0\x00', './file0\x00', './file0\x00'], './file0\x00', './file0\x00', './file0\x00', ['./file', './file', './file', './file'], 0x7}) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:39 executing program 0: getpgid(0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1ca) syz_emit_ethernet(0x0, &(0x7f0000000340)) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) pledge(&(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r2, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockname(r2, &(0x7f00000000c0)=@in6, &(0x7f0000000280)=0xc) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r3, 0x0) r4 = kqueue() r5 = fcntl$dupfd(r4, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r5, 0x0, 0x0) ioctl$VT_GETSTATE(r5, 0x40067664, &(0x7f0000000340)) sendto(0xffffffffffffff9c, &(0x7f0000000180)="f3c4a1e7a943f9c5bd7a01d06a7c212f48b9de4b710cd625c7fa29857ff9116d15b100771dcc7ed243586a517a4da1613cad6cce5276bb57f065e4ae4c1b31d7886328a05edffbdabff7b56843fbbf896ca284a68c6ca35a0c03b71ad65711b5e6af4c84213430145cc455f2cd8afbcf7d8aef147c7e4213494e6383920e728929430d123b2926ea75ee2de4fdf780f63998b8ffccf3794e7b61de0aceac1cf3dfa235387e4978386ed00bc7db6b85f6eed200b28329ad08f348bc46354daeb5124829a0d7cb35aa14d9a7f3f03a1d539d84d4306580825dcc3a6221a4c814d4d9a583f67e0755f8d5d26a8bff4f9249915c2e2fdc66d7c2cd91fe037d64", 0xfe, 0x400, 0x0, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000000)={0x2, 0xdb2eff69244d1816, 0x6, 0x6, r3}) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) socketpair(0x10, 0x4, 0xd7, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040), 0x4) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r2, 0x0, 0x2, &(0x7f0000000040), 0x4) r3 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r3, 0x0, 0x2, &(0x7f0000000040), 0x4) getpeername(r1, &(0x7f00000000c0)=@in6, &(0x7f00000001c0)=0xc) mkdir(&(0x7f0000000280)='./file0\x00', 0x1) open$dir(&(0x7f00000002c0)='./file0\x00', 0x2, 0x21) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000300)="f951d3dd34463916457ab2db4e782b9848e5032ec94c499013a5f502a4682783b8cb26d1bf79dd77a73b368887f42303c5c6ed6527c8014de65c762c6f6878057c82a3e2b5e8f635225d480db4252ff31b522579f961f357b8ce99d1f1ce4550e5361866a84e89f38cc5e0ab4b8331f7bbff042ede8b4c15f61275a4ea20b2eeb0df339f165339d1418ee310f6ffc949af965d8096d6d0a33fedfe1e7aab922148eb0c9446971e778d407317b2077fe653a96ebab6cf3c024c03b40b72b1ea9857033bc7dacaa1d73b2349315fb34003510ddae038d2911d95e1442693a63f4163", 0xe1) r5 = accept$inet(r4, &(0x7f0000000240), &(0x7f0000000200)) connect$inet(r5, &(0x7f0000000180)={0x2, 0x2}, 0xc) getsockopt$inet_opts(r5, 0x0, 0x1, &(0x7f0000000100)=""/30, &(0x7f0000000140)=0x1e) 16:04:39 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040), 0x4) setsockopt$sock_int(r0, 0xffff, 0x800, &(0x7f0000000000)=0x4, 0x4) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) wait4(r1, &(0x7f0000000000), 0x9, &(0x7f00000000c0)) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:39 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0xc) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xdb) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r7, 0x0) setregid(r7, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r9, 0x0) setregid(r9, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000180), 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r11, 0x0) setregid(r11, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r14, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r15, 0x0) setregid(r15, 0x0) setregid(r15, r2) setregid(r5, 0x0) setsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={r1, r3, r5}, 0xc) ioctl$KDGKBMODE(0xffffffffffffffff, 0x40044b06) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) getgid() r16 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x10000, 0x0) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x10, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) fchown(r17, r3, r2) ioctl$WSKBDIO_SETMODE(r16, 0x80045713, &(0x7f00000000c0)=0x2) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x10, 0x165) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x144) 16:04:39 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) r5 = kqueue() r6 = fcntl$dupfd(r5, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r6, 0x0, 0x0) ioctl$SPKRTUNE(r6, 0x20005302, &(0x7f00000001c0)={0xffffff7f, 0x613}) ioctl$KDSETMODE(r4, 0x20004b0a, &(0x7f0000000180)=0x1) r7 = openat(r0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0) ioctl$WSDISPLAYIO_SBURNER(r7, 0x800c5751, &(0x7f0000000140)={0x81, 0x7, 0x1}) renameat(r0, &(0x7f0000000000)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x40, 0x1000}], 0x1) semctl$GETALL(r0, 0x0, 0x6, &(0x7f00000000c0)=""/4096) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x102) 16:04:39 executing program 1: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040), 0x4) sendto(r0, &(0x7f00000000c0)="21c2b6559284662883a6667d1d7be66d50b7aad1d516d1fc263a6126aa913af68436ec6459a16e15a6082865091863c8d8918a6a7776dfae213a7902770314d7243d4d5b98bc8dd4b57c717d", 0x4c, 0x400, &(0x7f0000000140)=@un=@file={0x1, './file0\x00'}, 0xa) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) chflagsat(r2, &(0x7f0000000000)='./file0\x00', 0x10001, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x80, 0x40) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) ioctl$WSDISPLAYIO_GETEMULTYPE(r1, 0xc014575e, &(0x7f00000000c0)={0x9, './file0\x00'}) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) ioctl$WSDISPLAYIO_LSFONT(r1, 0xc058574e, &(0x7f00000000c0)) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r0, 0x800c5606, &(0x7f00000000c0)={0x1}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x2010, r0, 0x0, 0x8) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) geteuid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r3) geteuid() r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r4, 0xffff, 0x1022, &(0x7f0000000100)={0x0, 0x0}, 0xc) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f00000001c0)={0x0, 0x0}, &(0x7f0000000200)=0xc) setuid(r6) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r8) r9 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r9, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000180)=0xc) r10 = getuid() seteuid(r10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) getsockopt$sock_cred(r11, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r12) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r13, 0xffff, 0x1022, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000280)=0xfffffdab) setuid(r14) setreuid(r14, r5) 16:04:39 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x8, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) ioctl$TIOCGWINSZ(r1, 0x40087468, &(0x7f0000000080)) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff}, 0x10008) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f0000000480)={0x9, 0x8, 0xff, 0xebb7, &(0x7f0000000200)={{0xe0, 0x1, 0x5, 0x80, 0xa2, 0x9, 0x5}, {[0x8, 0xc43, 0x7, 0x3, 0x138, 0x9, 0x8, 0x7, 0x6, 0x8, 0x200, 0x5, 0x9, 0x80000001, 0xfffffffffffffffc, 0x2, 0x5cb, 0x1], [0x7ff, 0x1000, 0x7ff, 0x10001, 0x7fff, 0x20, 0x8, 0x5bf, 0x8, 0x8000], [0x1000, 0x7f, 0xba7, 0x99, 0x9, 0x9, 0xbb20], [0x80, 0x8, 0xd3e2, 0x2da, 0x9], [{0x3, 0x7, 0x6, 0x7}, {0xfff, 0x5, 0x8, 0x7}, {0x4, 0x1, 0x4, 0x10001}, {0x0, 0x2, 0x401, 0x2}, {0x9, 0x6e4a, 0xe, 0x81}, {0x2, 0x7, 0xfffffffa, 0x8}, {0x7, 0x7, 0x800, 0x1}, {0x8, 0x3, 0xff, 0xd94e}], {0x81d, 0x1, 0x2}, {0x6, 0xc0, 0x4, 0x4}}}, 0xff, 0x9}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000180)='/dev/zero\x00', 0x400, 0x0) ioctl$WSKBDIO_SETMODE(r4, 0x80045713, &(0x7f00000001c0)) ioctl$DIOCMAP(r2, 0xc0106477, &(0x7f0000000140)={&(0x7f0000000100)='./file0\x00', r3, 0x3}) ioctl$KDDISABIO(0xffffffffffffffff, 0x20004b3d) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000180)={&(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000000140)=[{&(0x7f0000000100)="9da9ff6ddaf131d2919f996dc400e40044bc9c75d5c071d1ef065ca37d2676849223c34dfc2e", 0x26}], 0x1, 0x0, 0x0, 0x4}, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r1) r2 = getegid() lchown(&(0x7f0000000000)='./file0\x00', r1, r2) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r0 = semget(0x3, 0x0, 0x0) semop(r0, &(0x7f0000000040)=[{0x0, 0x40, 0x1000}], 0x1) semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)=""/65) r1 = semget(0x3, 0x0, 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x40, 0x1000}], 0x1) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r2, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000140)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r6, 0x0) setregid(r6, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000001c0)=0xc) r9 = msgget$private(0x0, 0x20) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r11) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r12, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r13, 0x0) setregid(r13, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r14, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r15, 0x0) msgctl$IPC_SET(r9, 0x1, &(0x7f0000000280)={{0xff, r11, r13, 0x0, r8, 0x6, 0x4}, 0xffffffffffffffff, 0x80, r15, r5, 0x5, 0x5a, 0x1, 0xffffffffffffe103}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r16, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r17, 0x0) setregid(r17, 0x0) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000200)={{0x1, r3, r6, r7, r17, 0x1, 0x1}, 0x1000, 0x9, 0x2037}) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x0, 0xdb1) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x20000, 0x0) r0 = semget(0x2, 0x2, 0x100) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10004) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$bpf(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bpf\x00', 0x400, 0x0) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = openat$wsmuxkbd(0xffffffffffffff9c, &(0x7f0000000200)='/dev/wskbd\x00', 0x10, 0x0) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) kevent(r1, &(0x7f0000000280)=[{{r2}, 0xfffffffffffffffd, 0xd5a78617d5588504, 0x1, 0x6, 0x9}, {{}, 0xfffffffffffffff9, 0x1, 0x3, 0x7f, 0x5}, {{r3}, 0xfffffffffffffffe, 0x0, 0x0, 0x1, 0xfffffffffffffff9}, {{r4}, 0xfffffffffffffff2, 0x79, 0xefbac3a654ed7098, 0x1, 0xa7}, {{r5}, 0xfffffffffffffffa, 0x8, 0x1, 0x6, 0x40}], 0x7, &(0x7f0000000340)=[{{0xffffffffffffff9c}, 0xfffffffffffffffb, 0x0, 0xf0000000, 0x6455, 0x9}, {{r6}, 0xfffffffffffffffb, 0x10, 0xfffff, 0xc8de, 0x8001}], 0x100, &(0x7f0000000380)={0x6, 0x100}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r8) r9 = getgid() getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, &(0x7f00000000c0)=0xc) r11 = getegid() semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000100)={{0x8, r8, r9, r10, r11, 0x44, 0x200}, 0x0, 0x8, 0x3ff}) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x10) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x1403789266f54fce, 0xffffffffffffffff) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x1, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) semget(0x0, 0x0, 0x10) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x140, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0xfc8635a3cdf8aa85, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x400, 0xc0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCSETAF(r1, 0x802c7416, &(0x7f0000000040)={0x50ccd34c, 0x800, 0xffff7fff, 0x2, "170493a379bfc4fccde993071e55f7f8cc066e51", 0x79ab6386, 0x6}) 16:04:39 executing program 0: r0 = socket$inet6(0x18, 0x8000, 0x2) setsockopt$sock_int(r0, 0xffff, 0x810, &(0x7f0000000000)=0x8, 0x4) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x8182, 0x83) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x2c8273b3c76e873b) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x200, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x0, 0x2, r1) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x9c7700b8d808f59f, 0x0, 0x0) 16:04:39 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000100)="3a8e34d51a21ed0f496537c2ebfc1a8a7dc1494b5a6f2e0c5698d9f2b5f1e375799410f9c04495fcc6dd93a2541544e7a2c0fd6951831236df7a97e782f718fb0236b0b9bcecc69cacf5386947149325de5e89e98f6b7ee2604f922b", 0x5c) setsockopt$inet_opts(r1, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f00000000c0)=0xc) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2, 0x11, r0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x20000, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0xdcf5667036939862, 0xc0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:39 executing program 1: r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x8, 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r4) seteuid(r4) ioctl$VMM_IOC_RESETCPU(r2, 0x82405605, &(0x7f00000000c0)={0x20, 0x200, {[0x7, 0x400, 0x9, 0x101, 0xfffffffffffffffc, 0x3, 0x4, 0x518, 0x0, 0x5, 0x1bd, 0x37, 0x6, 0xa07f, 0x0, 0xffffffffffffffff, 0x6, 0x2c8f], [0x2, 0x3, 0x1, 0x7, 0x1, 0x8001, 0x101, 0x10001, 0x7, 0x1], [0x2, 0x5, 0x1, 0x7, 0x40, 0xffffffffffffff7f, 0x7], [0x3, 0xfff, 0x87, 0x401, 0x7, 0x2], [{0x3f, 0x5, 0x2, 0x9}, {0xa0, 0x5563, 0x9, 0x4}, {0x9, 0x9307, 0x2, 0xf95b}, {0x633, 0x8, 0x1}, {0x80, 0x6, 0x6, 0x6}, {0x1, 0x1, 0xffff0001, 0x401}, {0xe95, 0xdae9, 0x9, 0x7}, {0x8, 0x5, 0x8001, 0x78}], {0xc000, 0xffffffff, 0x8, 0x1ff}, {0x4, 0x3, 0x3, 0xffffffff00000001}}}) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:39 executing program 0: open$dir(&(0x7f0000000000)='./file0/file0\x00', 0x40, 0x48) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x400, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80, 0x100) 16:04:39 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x1, 0x100, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) r3 = socket$unix(0x1, 0x5, 0x0) accept$unix(r3, 0x0, &(0x7f0000000040)) ioctl$WSDISPLAYIO_SVIDEO(0xffffffffffffff9c, 0x80045745, &(0x7f0000000180)=0x1) setpgid(r2, 0x0) fcntl$setown(r0, 0x6, r2) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x4) fchflags(r4, 0x10000) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0xac) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r3, 0x0) setregid(r3, 0x0) getgroups(0x4, &(0x7f0000000180)=[r3, 0x0, 0x0, 0xffffffffffffffff]) fchownat(r0, &(0x7f00000000c0)='./file0\x00', r1, r4, 0x8) 16:04:39 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:39 executing program 1: r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) ioctl$WSDISPLAYIO_DELFONT(r1, 0x8058574f, &(0x7f00000000c0)={'./file0\x00', 0x6, 0x3, 0x7, 0x1, 0x101, 0x1f, 0x7fffffff, 0x2, 0x0, 0x10001, 0xfffffffffffffff9}) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair(0x20, 0x4, 0x81, &(0x7f0000000000)={0xffffffffffffffff}) recvfrom$unix(r0, &(0x7f00000000c0)=""/68, 0x44, 0x10c4, &(0x7f0000000140)=@abs={0x0, 0x0, 0x0}, 0x8) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:39 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r0 = socket$inet(0x2, 0x3, 0x7) getpeername(r0, &(0x7f0000000000)=@un=@abs, &(0x7f00000000c0)=0x8) 16:04:40 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0) 16:04:40 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) chflagsat(r0, &(0x7f0000000000)='./file0/../file0\x00', 0x1, 0x0) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000000240)=@file={0x0, ""/95}, &(0x7f00000002c0)=0x61) fcntl$dupfd(r1, 0xa, r3) r4 = openat(r2, &(0x7f0000000180)='\x00', 0x10000, 0x5) renameat(r4, &(0x7f00000001c0)='./file0/../file0\x00', r0, &(0x7f0000000200)='./file0/../file0\x00') open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x100, 0x0) faccessat(r5, &(0x7f0000000140)='./file0\x00', 0x80, 0x7570baa61605c58a) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file1\x00', r1, &(0x7f00000000c0)='./file0\x00') 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0xa068984fa20a809d) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x20000, 0x0) ioctl$VMM_IOC_READREGS(r0, 0xc2485607, &(0x7f00000000c0)) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) r2 = fcntl$dupfd(r1, 0x0, r0) fchmodat(r2, &(0x7f0000000000)='./file0\x00', 0x34, 0x2) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:41 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x110) renameat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: getsockname$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x8) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000100)='/dev/zero\x00', 0x800, 0x0) ioctl$BIOCLOCK(r0, 0x20004276) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x401a, r1, 0x0, 0x4) open$dir(&(0x7f0000000040)='./file0\x00', 0x8000, 0x0) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x40, 0x20) truncate(&(0x7f0000000000)='./file0\x00', 0x0, 0x4) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mknodat(r1, &(0x7f00000000c0)='./file0\x00', 0x40, 0x9) ktrace(&(0x7f0000000040)='./file0\x00', 0x6, 0x10, 0x0) 16:04:41 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x180, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r2, 0x80105728, &(0x7f0000000100)={&(0x7f00000000c0)=[{0x0, 0x3}, {0x43, 0x7}, {0x89, 0x1000000}, {0x0, 0x1}, {0x42, 0x7}, {0x5, 0x7}, {0xcc, 0x6d4}], 0x7}) r3 = kqueue() r4 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000680)='/dbv/\x00', 0x8, 0x0) ioctl$KDMKTONE(r4, 0x20004b08, &(0x7f0000000640)=0x3f) r5 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r5, 0x0, 0x0) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wsmouse(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/wsmouse0\x00', 0x10, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) getsockopt$SO_PEERCRED(r5, 0xffff, 0x1022, &(0x7f0000000600)={0x0, 0x0}, 0xc) setuid(r10) r11 = openat$wsmuxkbd(0xffffffffffffff9c, &(0x7f0000000440)='/dev/wskbd\x00', 0x802, 0x0) r12 = openat(r0, &(0x7f0000000480)='./file0\x00', 0x8, 0x180) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0xab, 0x0, 0x9}) kevent(r3, &(0x7f0000000300)=[{{}, 0xfffffffffffffff8, 0x0, 0x8, 0x400, 0xfffffffffffffffd}, {{r7}, 0xfffffffffffffffd, 0x1, 0x80, 0x5, 0x1}, {{r8}, 0x4, 0x81, 0xfffff, 0x8000000000000000, 0x960000}, {{r3}, 0xfffffffffffffff9, 0xed09090e428c0da2, 0x20000000, 0xfffffffffffffff7, 0x7}, {{}, 0xfffffffffffffffc, 0x8, 0x1077e311f1f917a4, 0x80, 0x20}, {{r1}, 0xfffffffffffffff8, 0x40, 0xfffff, 0x2, 0x68ba}, {{r0}, 0xffffffffffffffff, 0x80, 0x2, 0x0, 0x5dc}, {{r2}, 0xfffffffffffffff9, 0x1c, 0xfffff, 0x80000001, 0x1}, {{r9}, 0xfffffffffffffffd, 0x1, 0x2, 0x6, 0x9}, {{}, 0xfffffffffffffffc, 0x0, 0x2, 0x0, 0x1}], 0x3, &(0x7f00000004c0)=[{{r0}, 0x9, 0x2, 0x400fffdf, 0x8, 0x1}, {{r11}, 0xfffffffffffffffe, 0x1a, 0x6fdf39ee534fb945, 0x1000, 0x1}, {{}, 0xfffffffffffffffd, 0x80, 0xf0000000, 0xf, 0xfffffffffffff789}, {{r0}, 0xffffffffffffffff, 0x22, 0x1, 0xfffffffffffffffd, 0x17e9}, {{r12}, 0xfffffffffffffffd, 0x51, 0x4, 0x8000000, 0xff}, {{r13}, 0xfffffffffffffffb, 0x80, 0x4, 0x8, 0x3}], 0x8, &(0x7f0000000580)={0x8, 0x1}) r14 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/wsmouse0\x00', 0x80, 0x0) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000005c0)={0x1, 0x20000}) kevent(r5, &(0x7f0000000140)=[{{r2}, 0xfffffffffffffffe, 0x80, 0xfffdf, 0x3}], 0xfffffff8, &(0x7f00000001c0)=[{{}, 0xfffffffffffffff8, 0x80, 0x20, 0x9, 0x1000}, {{r1}, 0x0, 0xa1, 0x80, 0x8001, 0x6}, {{r6}, 0xfffffffffffffffb, 0x20, 0x4, 0xfffffffffffffffe, 0x1ff}, {{r14}, 0xfffffffffffffffa, 0x20, 0x10, 0x5, 0x2f4f}, {{r15}, 0xfffffffffffffff8, 0x10, 0x80, 0xfffffffffffffff8, 0x6}], 0x6, &(0x7f0000000280)={0x3ff, 0x7}) 16:04:41 executing program 0: syz_emit_ethernet(0xd3, &(0x7f00000000c0)="53ed7dbb01824abab2c9720e86efc11855478703bd5b9248d68086d72aa36507691f6d848b6fa0dc9d75ce997a44263f1ff8c6dd6f326447caca02fa8e1b2d52360264d26b2e9c350021c91a5fa17ee8433e8fd66db415101a4443abfa497941f5b89e8df75108a8a2e951cc77ef0a7090393d70051ec06e5344f5d5d599b540519c89c99248a14f9b6b00e0366e67b0b35f636f8c77f793cd92beeca229be1dac7196c459a2d8496de458ed1502464f89545407efc7e0d400d364d95831ba18c3acaa8acf492e695bca194599cd2674bc5948") open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0) accept$unix(0xffffffffffffffff, &(0x7f0000001100)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e7ff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f87e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a6fe000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000612fbcbb3de2684a2cb08f81978e78634e7ef75896b213214100"/4109], &(0x7f0000000040)=0x1002) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2226a2ff1f0a28cb) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) accept$inet(0xffffffffffffff9c, &(0x7f0000000000), &(0x7f00000000c0)=0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r1, 0x0) r2 = getpgid(r1) ktrace(&(0x7f0000000180)='./file0\x00', 0x7, 0x1000, r2) r3 = accept$inet6(0xffffffffffffff9c, &(0x7f00000001c0), &(0x7f0000000200)=0xc) sendto(r3, &(0x7f0000000240)="ea0498abe41a2afaf3451a478af9c447d69689fcd1e4b57fb07c4a6f97288ea272d3f4918a3b9342a7891a1ded31396e2f9bd5a1f8de1e05171f0754cd20be96bfe4eb968e41e0a81f2a2639042d46f6fdc9526df77763a5bd1570b81b5a79d5d08c8218fe2f41f7112c2fd2a44bc0a034393f5c829cf0bc906091d6a7a1f3653cb50b845110eee8625de9e2ef6b9b9e82e856c7f1977ba33abdf95a8173ecd4c95ab930ceca9ee1c79fedfd18f50f4e1a852aa6", 0xb4, 0x4, &(0x7f0000000300)=@un=@file={0x1, './file0\x00'}, 0xa) mkdir(&(0x7f0000000340)='./file0\x00', 0xc6) r4 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r4, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockname(r4, &(0x7f0000000100)=@un=@abs, &(0x7f0000000140)=0xc4) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) faccessat(r1, &(0x7f0000000000)='./file0\x00', 0x10, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) r0 = accept$unix(0xffffffffffffff9c, &(0x7f00000000c0)=@file={0x0, ""/80}, &(0x7f0000000000)=0x52) bind$unix(r0, &(0x7f0000000140)=@abs={0x0, 0x0, 0x3}, 0x8) 16:04:41 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) fchmodat(r1, &(0x7f0000000000)='./file0\x00', 0x81, 0x4) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8004) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000140)='/dev/zero\x00', 0x0, 0x0) kevent(r1, &(0x7f00000000c0)=[{{r2}, 0xfffffffffffffffd, 0x8a, 0x2, 0x5353, 0x7ff}, {{r3}, 0xc28eeecfdcc09aa7, 0x14, 0x2, 0x5, 0x4}, {{r0}, 0xfffffffffffffffd, 0x40, 0x20000057, 0x69b8, 0x9}, {{r0}, 0xfffffffffffffffa, 0xd0, 0x780fffff, 0x100, 0xffffffffffffff81}], 0x3, &(0x7f0000000180)=[{{r4}, 0xfffffffffffffffc, 0x5e1082847f7a368a, 0x80000000, 0x70, 0xffffffff9a598074}, {{}, 0xffffffffffffffff, 0x64, 0x1, 0x80000001, 0x9}], 0x3, &(0x7f00000001c0)={0x5, 0x4}) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:41 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) linkat(r0, &(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00', 0x4) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:41 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) r1 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r3, 0x0) setregid(r3, 0x0) fchownat(r0, &(0x7f0000000000)='./file0\x00', r1, r3, 0x6) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) rmdir(&(0x7f0000000000)='./file0\x00') 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) semget(0x3, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) r1 = accept$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/4096}, &(0x7f0000000000)=0x1002) getpeername(r1, &(0x7f0000001100)=@in, &(0x7f0000001140)=0xc) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00') 16:04:41 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) ioctl$WSDISPLAYIO_GETEMULTYPE(r4, 0xc014575e, &(0x7f0000000140)={0x2, './file0\x00'}) r5 = socket$inet(0x2, 0x4000, 0x19) connect$inet(r2, &(0x7f0000000180)={0x2, 0x2}, 0xc) kevent(r1, &(0x7f0000000000)=[{{r5}, 0xfffffffffffffffd, 0x323a8a7f7537a01e, 0xfffff, 0x1, 0x3}, {{}, 0x8000000000000004, 0x10, 0x1, 0xff, 0x1ff}], 0x80, &(0x7f00000000c0)=[{{r0}, 0xffffffffffffffff, 0x4a, 0x6, 0x4, 0x7}], 0x4, &(0x7f0000000100)={0x100, 0x8}) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = openat$pci(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pci\x00', 0x80, 0x0) r3 = fcntl$dupfd(r2, 0xa, r0) r4 = kqueue() fcntl$dupfd(r4, 0x2, 0xffffffffffffffff) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000300)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000140)='/dev/wskbd0\x00', 0x8149ce7247c3c34a, 0x0) kevent(r4, &(0x7f00000000c0)=[{{r5}, 0xfffffffffffffffa, 0x41, 0x1c, 0xfffffffffffff349, 0x1}, {{r6}, 0x0, 0x8, 0x20, 0x8, 0x7fffffff}, {{r7}, 0x7ffffffffffffff0, 0x117, 0x70000001, 0x4, 0x80000001}], 0x3db, &(0x7f0000000180)=[{{r8}, 0xffffffffffffffff, 0x0, 0x3, 0x243}, {{r3}, 0xfffffffffffffffa, 0xf6, 0x2, 0x0, 0x80}, {{r0}, 0xfffffffffffffffe, 0x50, 0x1, 0x100000001, 0xa235}, {{r0}, 0xfffffffffffffffd, 0x2, 0x8, 0x6, 0xcb}, {{0xffffffffffffff9c}, 0xfffffffffffffffa, 0x20, 0x20000000, 0x93, 0x1}, {{r1}, 0xfffffffffffffff9, 0x20, 0x10, 0x93, 0x8c}, {{r3}, 0xfffffffffffffffa, 0x64, 0x4, 0x9, 0xffffffffffffffff}, {{r9}, 0xfffffffffffffffd, 0x20, 0xf0000000, 0x0, 0x94}, {{r10}, 0x7ffffffffffffffe, 0xa4, 0x40, 0xd2b9, 0x5}, {{r1}, 0xffffffffffffffff, 0x28, 0x0, 0x4, 0x8}], 0xf5, &(0x7f00000002c0)={0x957e0000000000, 0x6}) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x60) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r5, 0x0) setregid(r5, 0x0) fchownat(r0, &(0x7f0000000180)='./file0\x00', r2, r5, 0x2) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000000c0)={0x0, 0x0}, &(0x7f0000000100)=0xc) r7 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x40, 0x0) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vmm\x00', 0x4089cc8c68e2ec3b, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) kevent(0xffffffffffffff9c, &(0x7f0000000280)=[{{r7}, 0xffffffffffffffff, 0x81, 0x4, 0x8, 0x100}, {{r8}, 0xffffffffffffffff, 0x4, 0x20, 0xffffffff, 0xffffffffffff7fff}, {{r3}, 0xfffffffffffffff8, 0x145, 0x1, 0x7, 0x9}], 0x3e, &(0x7f0000000300)=[{{r9}, 0x8000000000000007, 0x92, 0x20, 0x80000000, 0x7}], 0x24e, &(0x7f0000000340)={0x6, 0xfff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r10, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r11, 0x0) setregid(r11, 0x0) lchown(&(0x7f0000000000)='./file0\x00', r6, r11) r12 = semget(0x0, 0x0, 0x6) semctl$SETALL(r12, 0x0, 0x9, &(0x7f0000000380)=[0x1]) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) truncate(&(0x7f0000000100)='./file0/file0\x00', 0x0, 0x3) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r2, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r5, 0x0) setregid(r5, 0x0) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) sendmsg$unix(r0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="00002e2f66696c6519f6"], 0xa, &(0x7f0000000380)=[{&(0x7f0000000280)="f57c0669a4948af0670928211ce4c32b7bac70926287b089acd8025daed2d338c408a1b2b435dbffbc8dded41fb13357f6a2a822aac15366327d0824f1e7f3191e6ae1a30c02a1f4d85d2aba39c575588e584fb887db1d4fec331096a984c4145b6f000acd2563abc6a49d988efefda183607d8faa6cae9d095bc02d2b6ed61f9e96c36e9a0c2d1da577ab178b29507c4816e19f65f955d0c93245264be77b46b76af4e9f02c00e94dcd98b079be5665fc7cef0eee0773b5fefa6045b58081d44d919b1ad7addd", 0xc7}], 0x1, &(0x7f0000000440)=[@cred={0x20, 0xffff, 0x0, r2, r3, r5}, @rights={0x18, 0xffff, 0x1, [r6]}], 0x38, 0xd}, 0x2) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r7, 0x0, 0x2, &(0x7f0000000040), 0x4) r8 = accept$inet(r7, &(0x7f0000000140), &(0x7f0000000180)=0xc) r9 = socket$inet(0x2, 0x2, 0x1f) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000500), &(0x7f0000000540)=0xc) r10 = kqueue() openat$vmm(0xffffffffffffff9c, &(0x7f00000005c0)='/dev/vmm\x00', 0x23433513573e4d55, 0x0) r11 = fcntl$dupfd(r10, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r11, 0x0, 0x0) unlinkat(r11, &(0x7f0000000580)='./file0/file0\x00', 0x0) getsockopt$sock_timeval(r8, 0xffff, 0x1005, &(0x7f00000001c0), &(0x7f0000000200)=0x10) mknod(&(0x7f00000004c0)='./file0/file0\x00', 0x2000, 0x0) getsockopt$sock_cred(r8, 0xffff, 0x1022, &(0x7f0000000000)={0x0}, &(0x7f00000000c0)=0xc) ktrace(&(0x7f0000000040)='./file0\x00', 0x7, 0x820, r12) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x80, 0x8) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockname(r0, &(0x7f00000000c0)=@un=@file={0x0, ""/89}, &(0x7f0000000000)=0x5b) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r0 = socket$inet6(0x18, 0x3, 0x0) ioctl$BIOCSDIRFILT(r0, 0x40047309, &(0x7f0000001180)) r1 = accept$inet6(r0, 0x0, &(0x7f0000000000)) openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x40, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0x68, &(0x7f00000000c0)={{0x18, 0x1, 0x4, 0x20a2}, {0x18, 0x3, 0x2, 0x4}, 0x8000, [0x4f680, 0x9, 0x400, 0x2, 0x56, 0x6, 0x10001, 0x49]}, 0x3c) 16:04:41 executing program 0: open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) syz_emit_ethernet(0x42, &(0x7f00000000c0)="adf9a06d2230f2de0bc61a17539ab9f0cffd771d30cd12824431a2daa7a3efd165b8bea765315d04f9807ba63f769427320c9265184b7f8eb714bbbf92b52aa6148b") 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x4000, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000380), 0x0, 0x0, 0x6}, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x100) 16:04:41 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) fchmodat(r0, &(0x7f0000000000)='./file0/file0\x00', 0x20, 0x4) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000100), 0x1f, 0x8) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) ioctl$WSDISPLAYIO_LSFONT(0xffffffffffffffff, 0xc058574e, &(0x7f00000000c0)) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x0, 0x80000000) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r2) r3 = getegid() fchownat(r0, &(0x7f0000000000)='./file0\x00', r2, r3, 0x2) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:41 executing program 0: 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) fchmodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x59, 0x2) 16:04:41 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x800, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x20380, 0x0) ioctl$BIOCGETIF(r0, 0x4020426b, &(0x7f00000000c0)={""/16, @ifru_dstaddr=@in}) open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0xc4) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:41 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r3, 0x0) setregid(r3, 0x0) fchownat(r1, &(0x7f0000000000)='./file0\x00', 0x0, r3, 0xe) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000440)={0x0, 0x0}, 0xc) fchownat(r1, &(0x7f0000000400)='./file0\x00', r2, 0x0, 0x7) r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r5) pipe2(&(0x7f00000004c0)={0xffffffffffffffff}, 0x1000c) faccessat(r6, &(0x7f0000000880)='./file0\x00', 0xb2, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r7, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r8, 0x0) r9 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r9, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r9, 0xffff, 0x1022, &(0x7f0000000780)={0x0, 0x0}, &(0x7f00000007c0)=0xc) sendmsg$unix(r3, &(0x7f0000000840)={&(0x7f0000000980)=@file={0x1, './file0\x00'}, 0xa, &(0x7f00000006c0)=[{&(0x7f0000000140)}, {&(0x7f0000000180)="59764a69889038066c7e7e7bc14e3db518603ac8de4ce50ec5e6bbb5524b8a02bbee322a89d798311a602ca2d912b72298dd5c383277188f41a6302a61ca89939f6eda281bf6b89a0c14233ac3fcf636da68e8017925291090fe89513f08f87c0cde346a623f074c3cf8b67ce57003b63e36a824eed815d34fa3946a68bf199932d2f328689e57b574e313e9775397db683f8f", 0x93}, {&(0x7f0000000240)="767ac28cbded806eb4326d8a2e4867fc0cd71a630601661622710feee4cf8ea97a370ca8185317c8efacebedb8c3522cb3c045f34d717e76f972e1f98ce5484bece9ce874fffaa4a91405d3beabd5c272be5248fcf0d8e4a83b18029816836ffa8f06563cc619d718f6970aed6ae3acf88ce79590dfc1255da29b804f09f0360de9e3a2abf26e3f842d1cfa387808d50add76866298ef00a6e515bed30e0242a45bb610c3f3869f4290abd51cd2b36aa94495c5428755c04a530368e", 0xbc}, {&(0x7f0000000300)="da9d1ecb6a191cbb3ea336ad6f8f1a0e0c8b415c0f8c4165fbc78a31368449f5c97c0a530a8e5f844117292b8feb0c141ef25d23c529b1891dd2a26d5d33e4d6bd7b07d3ebc80ceb5b028c963067ebadd696c652b635a5bdcf5f7e6cdd8f480e4348e62beb22b5cfcf44fdd648c6212e2dc7ce73d72f5b57560d050c34e2f3f860fbca0b41989b0e1a3b9f83ea71145e5132b75be9c84eb69aaefab1dd1cd5754ac56ecc98e3ae3dfb14debc327007d0cd0cdfe433f023daa9d7c8e219b468db21f0f3aac319d382cd6f26cac70bd148c4c2217885e2650367ce84012157fefd", 0xe0}, {&(0x7f00000009c0)="9c2e4a728f1733b0d42f7c664ae7205921f850ffefaa6d9696cb85a6f7f5ed6b70585f4ad61d97fea781f8c9d018e00a9d4ae5da6af8f4bc97e7386e66f31a502718c5df8deffd837964", 0x4a}, {&(0x7f0000000a40)="8efa966a80ad68713b63b00688c71e842dad33034785c0e00b470833e14dc524bb623277d7344fda8fc934ed0eea6ea89606f430f14427864c72ce3dc429cb147df18e92e5d2e6381ebe4cfc280019ce8e1a4e59247a68045123daad53976b6ea51b523644b5c1e4c50000000000000000", 0x71}, {&(0x7f00000008c0)="4ede91a638bfd79d7ea83323665e337498becdec8241ca5aefba96d461e9b035c857b1c296c1d04df586e8846485b2661e7046a3dc35e296cea1aeafeea9c710893b88dc2054ebf83598f3dd93aaebf155b357951ca2946f92dfb9cdb01c166b7205809994725442298cc769c671edba9726e8f08699e0f318394bef3be767d912283a692db72122572b46792d851e80d54b19ca81774525a29e4e410123576261cf3709", 0xa4}, {&(0x7f0000000500)="09e292dcf47f32e111d6e726c4dc0875aeb54b6b5ca147f287159085dee1670726d38583337e6db4f9440016710742981b71ef40d7ff5c4b9150156fad1f2a10eea6f6a3de12afc6d0d5cbf44319d648bd6bcd1b84e02583d28221dfd1d29a4ac45f6d23cda002ffb04b051887fc8708ecc956c2b59adc07948ee135e6f834974a7c3f501f56ac531c34ae", 0x8b}, {&(0x7f00000005c0)="848daf95a82cbfecdfb42528214dda6b3bd9bd12c8b4da5697b266f3d885bced59ed707f14dd446d79c07680c467c47e54729fb1464f039720fb29aeb71b345c70c9d3acc9c35f1e68c5bf14ca83b750a6b6e9fb415970aa44853967495ca3aab8175c9b462001d4b4fdc8197709872cc94c8f2143e7005288662978ae23f13513e1caac193f4b849940ed9c184336511d6e7075407da2e1ea3dbb0420e38f6d40ec493dfcb1121e8b82d2eba123dc9ab9ccb5ed135c9d0be333080c57e95a762c166cf1328dd4", 0xc7}], 0x9, &(0x7f0000000800)=[@cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, r5, 0xffffffffffffffff}, @cred={0x20, 0xffff, 0x0, r8, r10, 0xffffffffffffffff}], 0x40, 0x400}, 0x11) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x80, 0x20) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x8, 0x10) symlinkat(&(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000180)='./file0\x00') utimensat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x28a4}, {0x4, 0x48000000}}, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r1 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r1, 0x800c5606, &(0x7f00000000c0)={0x1}) ioctl$VMM_IOC_CREATE(r1, 0xc5005601, &(0x7f0000000140)={0x10, 0x41, 0x4, 0x4, [{&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x7}, {&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x80000001}, {&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0xe6fb}, {&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x3}, {&(0x7f0000ffa000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x80000001}, {&(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x3000)=nil, 0x8dba}, {&(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x200}, {&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, 0x2}, {&(0x7f0000ff9000/0x7000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x7ff}, {&(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0x2}, {&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffa000/0x1000)=nil, 0x5819d7cc}, {&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, 0x3175}, {&(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, 0xfffffffffffff001}, {&(0x7f0000ffc000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, 0x4}, {&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, 0x2}, {&(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, 0x7fffffff}], ['./file0\x00', './file0/file0\x00', './file0\x00', './file0\x00'], './file0\x00', './file0\x00', './file0\x00', ['./file', './file', './file', './file'], 0x4}) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xc) fchown(r0, r2, r3) getgroups(0x1, &(0x7f0000000100)=[r3]) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0xa) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: r0 = socket(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x1021, &(0x7f0000000080)="02000000", 0x4) open$dir(&(0x7f0000000080)='.\x00', 0x80, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) mknodat(r2, &(0x7f0000000000)='./file1\x00', 0x1, 0x2) 16:04:41 executing program 0: chmod(&(0x7f0000000100)='./file0\x00', 0x80) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) getppid() r3 = openat(r2, &(0x7f0000000140)='./file0\x00', 0x420, 0x1) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) ioctl$WSDISPLAYIO_GETSCREEN(r3, 0xc0245755, &(0x7f0000000540)={0x5, './file0/file0\x00', './file0/file0\x00'}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='\x00\x00 \x00\x00\x00\x10\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) r7 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000200)='/dev/speaker\x00', 0x20000, 0x0) getsockname$inet(r3, &(0x7f0000000440), &(0x7f0000000480)=0xc) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f00000004c0)="9e056f2fe76c80", 0x7, 0x400, &(0x7f0000000500)=@in={0x2, 0x3}, 0xc) openat$klog(0xffffffffffffff9c, &(0x7f0000000400)='/dev/klog\x00', 0x20000, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) pipe2(&(0x7f0000000580)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) ioctl$VMM_IOC_WRITEREGS(r10, 0x82485608, &(0x7f00000005c0)={0x2, 0x2, 0x10000, {[0x0, 0x5, 0x3ff, 0x4, 0x1000, 0x0, 0x6, 0x9, 0x20, 0x9, 0x2, 0xf09, 0x7, 0x2, 0x1f, 0xfffffffffffffffd, 0x3, 0x6], [0xe, 0x7f, 0x0, 0x0, 0x10001, 0x100000000, 0xfffffffffffffffa, 0x64, 0x8, 0xf591], [0x10001, 0x6, 0x10001, 0x4, 0x4, 0x2, 0x4], [0xff, 0xd693, 0xffffffff, 0x3, 0xa02, 0xe2a], [{0x4, 0x9, 0x3f}, {0x3ff, 0x39fd, 0x1, 0x101}, {0xff, 0x1000, 0x0, 0x2}, {0x0, 0x645b035e, 0x5, 0x1d}, {0x100, 0x4, 0x400, 0xffffffffffffff7f}, {0x1ff, 0x4, 0x7fffffff, 0x4000000000}, {0xff81, 0x9, 0x8}, {0x7, 0x7ff, 0x52, 0x8}], {0x8, 0x1ff, 0x0, 0x10001}, {0x8000, 0xff, 0x40000000, 0x80000001}}}) kevent(r3, &(0x7f00000001c0)=[{{r4}, 0xfffffffffffffff8, 0x4, 0x1, 0x2, 0x47}, {{r5}, 0xfffffffffffffff8, 0xb, 0xffff7, 0xc9, 0x4}], 0x7507, &(0x7f0000000240)=[{{r6}, 0xfffffffffffffffd, 0x32, 0x80, 0x3, 0x400}, {{r0}, 0xba54ff3b6808feff, 0x0, 0x2, 0x3e000000000000, 0x400}, {{r7}, 0xfffffffffffffffd, 0x91, 0x40000000, 0x9c, 0x2}, {{r8}, 0xfffffffffffffffb, 0xc, 0x20000000, 0x1000, 0x80000001}, {{r0}, 0xfffffffffffffff8, 0x30, 0x40000000, 0x30ee34b9, 0x7}, {{r0}, 0xfffffffffffffffa, 0x40, 0xfffff, 0x13, 0x5}, {{r9}, 0xfffffffffffffffa, 0x0, 0x40, 0x55, 0x7ff}, {{}, 0xfffffffffffffff9, 0x90, 0x1, 0x2, 0x3}], 0x7f, &(0x7f0000000340)={0x62, 0x8}) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@in, &(0x7f00000003c0)=0xc) r11 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x100, 0x0) mknodat(r11, &(0x7f00000000c0)='./file0/file0\x00', 0x2000, 0x5) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyCcfg\x00', 0x100, 0x0) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="2f012e2f66696c6530809afdfd2de3374ea91b4b2a248ffb9abc0ec8027250ae27228f72a71f0ac5e3787e922c8e5a6bd0d2f097f53a0cb3ce034e0596aafecc2d59698c9ff71ecff082c162efe611d047704b1728c8ddb0a938ec64d5437db6692ebf21a5268a83e892fa98d60ac1470b6bcca71b88de244395b4c0d874bcaf6ede9a4c8c3ce0db6cac42030e86234f150415134e0e68bd4e028d2f785fad6a32811495857fa169f473b326d686b2cb4265b669dff3e9cec07da7"], 0x6a) accept$unix(r0, &(0x7f00000000c0)=@file={0x0, ""/108}, &(0x7f0000000000)=0x6e) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) symlinkat(&(0x7f0000000140)='./file0\x00', r2, &(0x7f0000000180)='./file0\x00') r3 = openat$klog(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/klog\x00', 0x10002, 0x0) mmap(&(0x7f00001b9000/0x4000)=nil, 0x4000, 0x4, 0x2010, r3, 0x0, 0x7fff) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 0: r0 = socket$inet(0x2, 0x4000, 0x4) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x20000) ioctl$WSMUXIO_LIST_DEVICES(r1, 0xc1045763, &(0x7f0000000200)={0x5, [{0x1, 0x1}, {0x2, 0xec9f}, {0x3, 0x80000000}, {0x7, 0x7}, {0x2, 0xe0000}, {0x3, 0x6}, {0x0, 0x80000000}, {0x6, 0x1}, {0x1, 0xffff}, {0x7, 0x2e4d8a99}, {0x3, 0xfffffffc}, {0x3}, {0x3, 0x80000000}, {0x3, 0x5}, {0x3, 0x8001}, {0x2}, {0x2, 0x9}, {0x3, 0x4}, {0x1, 0x8}, {0x2, 0x7}, {0x3, 0x6}, {0x8a21d5582f79c3a6, 0x80}, {0x1, 0xcbf9}, {0x1}, {0x2, 0x5}, {0x3, 0x7fff}, {0x7ea896d600cee6b5, 0x7}, {0x1, 0x8}, {0x2, 0x3cf8}, {0x1, 0x5}, {0x1, 0x800}, {0x892088593dcfcf94, 0x7ff}]}) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000000c0)=""/146, &(0x7f0000000000)=0x92) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r2 = socket$inet(0x2, 0x4000, 0x2) setsockopt$inet_opts(r2, 0x0, 0x1, &(0x7f0000000180)="a3d011f01e5b4a5a4b6d93c88ef26094331df3e56f542fdd97210d7a", 0x1c) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x800, 0xbc) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2, &(0x7f0000000040), 0x4) sendto(r0, &(0x7f00000000c0)="c917eaf0540dc3055df87811012baa0c0102fcc9f5f24c208f4dd606b1e33fb97162ca92a3ebdbba63270edac1e4627189d7fcaf8f1fed051e7dd8fbd10309c0872f397a7a17818f6e936266981d31f7f33f99015069fc7363363ea470e80d34401aee766371d53056b9e10e5c804ab559dbdd0885e2a9b75e464c5d4e4a58940db140d3", 0x84, 0x1, &(0x7f0000000180)=@un=@abs={0x1, 0x0, 0x0}, 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x10000) ioctl$WSMOUSEIO_SETMODE(r0, 0x80045726, &(0x7f00000000c0)={0x1}) r1 = kqueue() ioctl$KDGKBMODE(r0, 0x40044b06) r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) faccessat(r2, &(0x7f0000000100)='./file0\x00', 0x8, 0x2) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x0, 0x0) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x8, 0x6) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:41 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x1) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x80, 0x0) r2 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r2, 0x800c5606, &(0x7f00000000c0)={0x1}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0x20001, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)=0x1) setpgid(r5, 0x0) r6 = openat(r0, &(0x7f0000001600)='./file0\x00', 0x20000, 0xf502a0b735814fb0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = socket$inet6(0x18, 0x8000, 0x2) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = socket$inet(0x2, 0x2, 0x0) r13 = socket$unix(0x1, 0x2, 0x0) r14 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r14, 0x800c5606, &(0x7f00000000c0)={0x1}) r15 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r15, 0x800c5606, &(0x7f00000000c0)={0x1}) r16 = socket$inet(0x2, 0x0, 0x52) r17 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r17, 0x800c5606, &(0x7f00000000c0)={0x1}) r18 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r18, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r19, 0xffff, 0x1022, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000100)=0x1) setpgid(r20, 0x0) r22 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r22, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r22, 0xffff, 0x1022, &(0x7f0000001640)={0x0, 0x0}, 0xc) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r25, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r26, 0x0) setregid(r26, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r27, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r28, 0x0) setregid(r28, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r29, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r30, 0x0) setregid(r30, 0x0) getgroups(0x6, &(0x7f0000001680)=[0x0, 0x0, r26, r28, r30, 0x0]) r32 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r32, 0x800c5606, &(0x7f00000000c0)={0x1}) r33 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r33, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r34, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r35, 0x0) setregid(r35, 0x0) r36 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r36, 0x800c5606, &(0x7f00000000c0)={0x1}) sendmsg$unix(r1, &(0x7f0000001840)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x0}, 0x8, &(0x7f0000001540)=[{&(0x7f0000000100)="3072d25730f978d090b35560825f9d7c4dc1357a99b33f9ffd6744de7af4bbd99fd59f6b585ab5d5f1c436181d135469186a1911def7f47c539738d1996efc3bc851447d7480cec0c0f6fde6f167db13c21ffcd232083b8f18245321b78f55a87d2f3f8aa4878752c183a80fa3cb1601845ef0b8e649a234fb87056c5e47ea8ea57012ce56c57337bfce5c1d28355abfaa21dc399d106902b9566bac6ffe438331618ba3200c6d4737b0d692785febe6a16acb80bff728d3e20fe1117c4ac4208062f2c06b29a7bef77f261055d0949ead17867a7807f9327ec9f7fa96ce", 0xde}, {&(0x7f0000000200)="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", 0x1000}, {&(0x7f0000001200)="444f9019b6a7f369086fe73bf83c47ecdb32a220733946f73d2796cbceaf3370a62fdd1793184731f26f6b85a1ec4f5d11237a4044b716e9afa3568c588b6c00602b1c9e22dafed9738f625f23d0832c4f2bbc3754dedeeead11aa916a380bada6a2769a8ad8c0dab8d1e08a124b94", 0x6f}, {&(0x7f0000001280)="1d5e0d6573af02fce5d8e96dcace967251c17b601e10701d8b93f053564e96c9717c25685d6da45247983ccd2e5179281e1094c023e057f5a1a4a48b8ef4481d552627c771a3f64de10d459a1b7d6f29f8f28784e44d06c6a30f2870898bc169a11c9b2cf46f29c57b8112332fa4662a2be972194d14933a9f2961de407e799fa2365f1de82e1fa4d40faf05b19841d062785321314e8b012a18e99ff0404ff0a5c710359b7bf44981e39fa1fad15a3d29d86587b5621a2817ea642a951152d3e0268f2c24924cebe5e5089cdd03e33c4be0b2ce3fcc48b4c611f829482884956bf1698a74fe0856eb0df617acf4", 0xee}, {&(0x7f0000001380)="79447fb294908e6f3edf71a73a75ca186fbcd66cf4aaa09ea78524b299f82e4cf96048aa1bb30fd839dbf8a0847ecb9a94fd53b17bdcbd", 0x37}, {&(0x7f00000013c0)="130266ab736f85e29878a69da5f46688c81d43eda544b9ddea97f1e772139d9d3a5df05ae1dbc370618784fd27ac08a2df47da61de4e2cbcfde16988dfc94db6b0ad054cac171945e7d99d2cec9266f66e71eae8915a851ce7f53bf22b6797a44d312879d0faf4ddccc9be92936d7ec4f81446d7e80e3be1e4175ffe1baab7455bc4399edc5546200781587096d019366dff", 0x92}, {&(0x7f0000001480)="f1b7006e2929b569d6affb63df23a7f4e560b15b5683132c881023d17ccd69f6eebc46956a57779b2f921318998d7714ae21995df37c6eef91e44a3e038827011eaab28b76efbb26593ded12e14e6953e2ac8704085f6315264094d482c3bc736f91b077325abe099c30c547f801af9a6abc6ffb2c250a3e1c866f1540529167aac364c08726b848365e9f9475c4e6633fce929ec450c3c7fd25e9314c18df7840", 0xa1}], 0x7, &(0x7f0000001880)=[@rights={0x20, 0xffff, 0x1, [r0, r2, r3]}, @cred={0x20, 0xffff, 0x0, r5}, @rights={0x28, 0xffff, 0x1, [0xffffffffffffffff, r0, r36, r0, r6]}, @rights={0x20, 0xffff, 0x1, [r0, r0, r7, r0]}, @rights={0x38, 0xffff, 0x1, [r8, r9, r0, r10, r0, r11, r12, r13, r0]}, @rights={0x20, 0xffff, 0x1, [r14, r15, 0xffffffffffffff9c]}, @rights={0x20, 0xffff, 0x1, [0xffffffffffffffff, r16, r17, r18]}, @cred={0x20, 0xffff, 0x0, r20, r24, r31}, @cred={0x20, 0xffff, 0x0, r23, r21, r35}, @rights={0x18, 0xffff, 0x1, [r0, r33]}], 0x158, 0x8}, 0x20e) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x8000, 0x6) 16:04:41 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) recvfrom(r0, &(0x7f00000000c0)=""/98, 0x62, 0x0, &(0x7f0000000000)=@in6={0x18, 0x3, 0x237, 0xa57}, 0xc) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) r1 = getppid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r3) r4 = geteuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r6, 0x0) setregid(r6, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000280)='/dev/ttyCcfg\x00', 0x8, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = getpgid(0xffffffffffffffff) r14 = getuid() getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f00000002c0)={0x0, 0x0, 0x0}, &(0x7f0000000300)=0xc) r16 = openat$pci(0xffffffffffffff9c, &(0x7f0000000340)='/dev/pci\x00', 0x2, 0x0) r17 = openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0/../file0\x00', 0x0, 0x210) r18 = openat$diskmap(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/diskmap\x00', 0x0, 0x0) r19 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r19, 0x800c5606, &(0x7f00000000c0)={0x1}) r20 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r20, 0x800c5606, &(0x7f00000000c0)={0x1}) r21 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000400)='/dev/speaker\x00', 0x0, 0x0) r22 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r22, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$SO_PEERCRED(r22, 0xffff, 0x1022, &(0x7f0000000440)={0x0}, 0xc) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$sock_cred(r24, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000240)=0xc) setuid(r25) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r26, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r27, 0x0) setregid(r27, 0x0) r28 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r28, 0x800c5606, &(0x7f00000000c0)={0x1}) sendmsg$unix(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000140)=@abs={0x0, 0x0, 0x1}, 0x8, &(0x7f0000000240)=[{&(0x7f0000000180)="513649bcb930d4c7d399b50f5af8a0d897b579241c20028c55c6e28457110b56f1900ae11bb851573bef3f", 0x2b}, {&(0x7f00000001c0)="5c8fd3eb68d868a6823db0c846806e44ae12517a19d75b95fbdf9cbc8e4ded45716833192acf00576fddcc25c9691610ab893d7c5abf5a65e69144b29cf5b8e5bcc0d02fdf8f5ed112904d7d4d7aef8a7448519008bda49d14af70868aed1d5a812e380df7097043", 0x68}], 0x2, &(0x7f0000000480)=ANY=[@ANYBLOB="180000000000000001ff000001000000", @ANYRES32=r0, @ANYBLOB="000000002000000000000000ffff000000000000", @ANYRES32=r1, @ANYRES32=r3, @ANYRES32, @ANYBLOB="000000002000000000000000ffff000000000000", @ANYRES32=0x0, @ANYRES32=r4, @ANYRES32=r6, @ANYBLOB="000000002800000000000000ffff000001000000", @ANYRES32=r7, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32=r10, @ANYRES32=r11, @ANYRES32=r12, @ANYBLOB="2000000000000000ffff000000000000", @ANYRES32=r13, @ANYRES32=r14, @ANYRES32=r15, @ANYBLOB="000000003000000000000000ffff000001000000", @ANYRES32=r0, @ANYRES32=r16, @ANYRES32=r17, @ANYRES32=r18, @ANYRES32=r19, @ANYRES32=r20, @ANYRES32=r21, @ANYBLOB="000000002000000000000000ffff000000000000", @ANYRES32=r23, @ANYRES32=r25, @ANYRES32=r27, @ANYBLOB="000000001800000000000000ffff000001000000", @ANYRES32=r0, @ANYRES32=r28], 0x108, 0x1}, 0x9) 16:04:41 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file1\x00', 0x200, 0x0) r1 = fcntl$dupfd(r0, 0xa, r0) r2 = openat$wsmuxkbd(0xffffffffffffff9c, &(0x7f0000000480)='/dev/wskbd\x00', 0x400, 0x0) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) kevent(0xffffffffffffff9c, &(0x7f0000000500)=[{{r0}, 0xfffffffffffffffa, 0xa5, 0x4, 0x100000001, 0x1}, {{r2}, 0x2, 0x20, 0x0, 0xfffffffffffff000, 0x100000001}, {{r3}, 0xfffffffffffffffb, 0x8, 0x40000000, 0x4, 0x4}, {{r1}, 0xfffffffffffffff8, 0x1badf61c094fe531, 0x1, 0xffff, 0x4}, {{r4}, 0x4, 0x0, 0x20000000, 0x7fffffff, 0x100}, {{r1}, 0xfffffffffffffffa, 0x9242f5fcbdd6cc55, 0x4, 0xffffffff80000001, 0x8001}, {{r5}, 0x7ffffffffffffffb, 0x66, 0x20, 0x7, 0x7ff}, {{r6}, 0xfffffffffffffffe, 0xa, 0x94, 0x8, 0x401}, {{r0}, 0xfffffffffffffffd, 0x83, 0x10, 0x1ff, 0x7}], 0x7ff, &(0x7f0000000640)=[{{r0}, 0xa, 0x8, 0x1, 0x6b, 0xdc4}], 0x1e1, &(0x7f0000000680)={0x7, 0x1844}) sendmsg$unix(r1, &(0x7f00000004c0)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x3}, 0x8, &(0x7f0000000440)=[{&(0x7f0000000140)="152de0c1d1cf0c0d2a7419206ec38ce6a76a45aaef703a389320aa839cf3db5c", 0x20}, {&(0x7f0000000180)="fb32752dc2f6e647d46041cfa077060a95b1f098957c58af743a90fdbec292d682ec3ec145f8238f75507255c53af8a75f411b441fff1341009b6bf1f032bd654327954ace4bfbc2544dc4576994d4a469bbf4ad716a4cd296ca932d0ce3641357697a80d1203257635f102eaebfde0e71b8e237154f2d67aebc55ea2abd3726008dda629d59e7c686e5448e04e470a3230f092fc909b432bd3a4c142c5d1044615b14c2370e3f938cfe364a5181f598f935c3549e17b83a0cc97c5e40708bd6929fb38f01", 0xc5}, {&(0x7f0000000280)="f5b3d7ac27e52ccf797b119da94e000f0eef3890394054c2c6188c80a6a2b27ea08aae4e40b3e6d6952a257b5e95588832b98436ef9ea9469ba45dd30427e296de2496e6e70e961e48b047be750da44accc5f2502b74fc60e5246cc1b470fec9ae0e679d696e5f62e0ffe282189797142cee450d65dafec86dcb4c8cb5622729d8d54cebf9f41c53b4164a1f32b04fe3074a1387ed4246", 0x97}, {&(0x7f0000000340)="e88ab8f69eccaaf6dd74263bb0006d0c73eb4a46d132997cbe4946bb4f9c95c5aa47b0ffaf1912291cb0da2dc09eeace8768d367a275e79a0db5237bad0f36524da92ccf222631e0373d22aef04e58a555b02a7788ae4fade9f0ca687a9c7a06a1068003c9ab9b05a81906199a12ff10fd530666293f3898dc01b9a4fa6117c4e2a9c8040f8bcd032e908201c8b4058446db380af5373ad25ba0d4464ab502cc9744405a0821b427fd825f90f2a4894399967f812d200a1a764bbcfda603d3650ee165aa3e8bfe79567b46a6eeb79e1b717a6681d0b580b0a688b3964e2033b00cf0ad8db0b783ef7a2bb4d01fa9b8de068420d50daa", 0xf6}], 0x4, &(0x7f0000000480)}, 0x0) open$dir(&(0x7f0000000100)='./file1/file0\x00', 0x80, 0x8) ioctl$WSDISPLAYIO_LDFONT(0xffffffffffffffff, 0x8058574d, &(0x7f0000000000)={'./file0\x00', 0x5830e6d0, 0x0, 0x1, 0x0, 0x80000000, 0xfffffff8, 0x1, 0x7, 0x0, 0xa31, 0x5}) 16:04:41 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000)='/dev/zero\x00', 0x20000, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = accept$unix(r0, 0x0, &(0x7f0000000180)) r3 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r3, 0x800c5606, &(0x7f00000000c0)={0x1}) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r4, 0x800c5606, &(0x7f00000000c0)={0x1}) r5 = getuid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r6, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffffa6) setregid(r7, 0x0) setregid(r7, 0x0) fchown(0xffffffffffffffff, r5, r7) r8 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r8, 0x800c5606, &(0x7f00000000c0)={0x1}) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) socketpair(0xdc95826b3187720d, 0x8001, 0x1, &(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) kevent(r1, &(0x7f00000001c0)=[{{}, 0xfffffffffffffffe, 0x8, 0x8, 0x0, 0x1}, {{r2}, 0xfffffffffffffff8, 0x10, 0x1, 0x6, 0x1fffbffffffd}, {{r10}, 0x6, 0x0, 0x80000000, 0x7ff, 0x5}, {{r4}, 0xfffffffffffffffb, 0x20, 0x20, 0x3, 0x2267}, {{r0}, 0xfffffffffffffffb, 0x2802dea9f8072bce, 0x40000000, 0x2, 0xb192}], 0x7, &(0x7f0000000280)=[{{r8}, 0xfffffffffffffffd, 0xf0, 0xf7f96806714581b2, 0x7, 0xff}, {{r0}, 0xfffffffffffffffc, 0x0, 0x4, 0xfffffffffffff000, 0x800}, {{r9}, 0x2, 0x6e, 0x4, 0x9, 0x9}], 0x6, &(0x7f0000000300)={0x5, 0x1b2}) getsockname$unix(r0, &(0x7f00000000c0)=@abs, &(0x7f0000000100)=0x8) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f0000000380)={0x4, 0x8000, 0x3}) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) socketpair(0x39, 0x3, 0xff, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = kqueue() fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) r3 = accept(r1, 0x0, &(0x7f0000000100)) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vmm\x00', 0x2, 0x0) r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r6, 0x800c5606, &(0x7f00000000c0)={0x1}) openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000480)='/dev/wsmouse0\x00', 0x80, 0x0) r7 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r7, 0x800c5606, &(0x7f00000000c0)={0x1}) r8 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x100, 0x81) r9 = socket$inet6(0x18, 0x4000, 0x4) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r11 = socket$inet(0x2, 0x3, 0x0) rename(&(0x7f0000000580)='./file0\x00', &(0x7f00000005c0)='./file0\x00') setsockopt$inet_opts(r11, 0x0, 0x2, &(0x7f0000000040), 0x4) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f00000004c0)={0x0, 0x0, 0x0}, &(0x7f0000000500)=0xc) r13 = getegid() setregid(r12, r13) getpeername(r11, &(0x7f0000000400)=@in6, &(0x7f0000000440)=0xc) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) kevent(r2, &(0x7f0000000180)=[{{r1}, 0xfffffffffffffff9, 0x0, 0x80, 0xffffffff, 0x7f}, {{r3}, 0xfffffffffffffffe, 0x10, 0x2, 0x1, 0x7}, {{r1}, 0xfffffffffffffffa, 0x70, 0xf0000000, 0xff}, {{r4}, 0x0, 0x48, 0x80, 0x920d, 0x7}, {{r5}, 0xfffffffffffffff5, 0x80, 0x2, 0x2, 0xbe}, {{r6}, 0xfffffffffffffffc, 0x18, 0x2, 0x6b5, 0x400}, {{r1}, 0xfffffffffffffffa, 0xc, 0x1, 0x9, 0x6f1f}, {{r7}, 0xfffffffffffffff9, 0x0, 0x2, 0x4}], 0x800, &(0x7f00000002c0)=[{{r0}, 0xfffffffffffffffa, 0x58, 0x40, 0x8, 0x3}, {{r8}, 0xfffffffffffffffd, 0x20, 0x1, 0x8, 0x6}, {{0xffffffffffffff9c}, 0xfffffffffffffff9, 0x8, 0x10, 0x1, 0x3}, {{r1}, 0xffffffffffffffff, 0x3d6c1430e3212e1f, 0x0, 0x7fff, 0x4}, {{r9}, 0xfffffffffffffff9, 0x4, 0x0, 0x214d, 0x9}, {{r10}, 0x0, 0x10, 0x1, 0x9, 0x1000}, {{r1}, 0xfffffffffffffff1, 0x2, 0x80000018, 0x3, 0x1}], 0x100, &(0x7f00000003c0)={0x7f, 0x7}) openat$null(0xffffffffffffff9c, &(0x7f0000000540)='/dev/null\x00', 0x800, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0xa) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:41 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) ioctl$WSDISPLAYIO_GETSCREENTYPE(r0, 0xc028575d, &(0x7f0000000000)={0x6, 0x1, './file0\x00', 0x5, 0x0, 0x3f0000, 0x6b75}) renameat(r0, &(0x7f00000000c0)='./file0\x00', r0, &(0x7f0000000100)='./file0/file0\x00') 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x1, 0x45) unlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) ioctl$WSKBDIO_SETMODE(0xffffffffffffff9c, 0x80045713, &(0x7f00000000c0)=0x1) 16:04:41 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) chflagsat(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x6) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x8) r2 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x10, 0x9fbadea96e970a40) chflagsat(r2, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) getpid() 16:04:41 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0xda27314efd4b35b) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f00000000c0)='./file0\x00') 16:04:41 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = kqueue() r2 = fcntl$dupfd(r1, 0x2, 0xffffffffffffffff) ioctl$KDGKBMODE(r2, 0x40044b06) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r2, 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file0\x00', r2, &(0x7f00000000c0)='./file0\x00') mmap(&(0x7f000003a000/0x3000)=nil, 0x3000, 0x5, 0x2012, r2, 0x0, 0x9) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f00000000c0)='./file0/file0\x00', 0x1, 0x1826, 0x0) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0x0) 16:04:41 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x60082, 0x1820f835fd037c92) r1 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ttyCcfg\x00', 0x2, 0x0) ioctl$VT_GETACTIVE(r1, 0x40047607, &(0x7f0000000180)) symlinkat(&(0x7f0000000000)='./file0\x00', r0, &(0x7f0000000100)='./file0\x00') r2 = kqueue() r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) ioctl$WSDISPLAYIO_SETSCREEN(r3, 0x80045756, &(0x7f00000001c0)=0x7fffffff) symlinkat(&(0x7f00000002c0)='./file0\x00', r2, &(0x7f0000000300)='./file0\x00') r4 = semget(0x2, 0x1, 0x608) semctl$GETALL(r4, 0x0, 0x6, &(0x7f0000000200)=""/143) ktrace(&(0x7f0000000140)='./file0\x00', 0x3, 0x120, 0x0) 16:04:41 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x20000, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/227, 0xe3) kqueue() openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x1, 0x0) 16:04:41 executing program 0: getuid() open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:42 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xe) open$dir(&(0x7f0000000000)='./file0\x00', 0x600, 0x1) 16:04:42 executing program 0: r0 = accept$unix(0xffffffffffffff9c, &(0x7f0000000000)=@abs, &(0x7f00000000c0)=0x8) getpeername$unix(r0, &(0x7f0000000240)=@abs, &(0x7f0000000140)=0x2) open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r1 = semget(0x3, 0x0, 0x0) semop(r1, &(0x7f0000000040)=[{0x0, 0x40, 0x1000}], 0x1) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) 16:04:42 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r0 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ttyCcfg\x00', 0x10000, 0x0) ioctl$WSDISPLAYIO_LSFONT(r0, 0xc058574e, &(0x7f00000000c0)) 16:04:42 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) 16:04:42 executing program 1: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) utimensat(r1, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x9}, {0x2, 0x7}}, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x2) 16:04:42 executing program 0: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x1, 0x2) kqueue() 16:04:42 executing program 1: r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2000c) bind$inet6(r2, &(0x7f0000000100)={0x18, 0x2, 0x3, 0xfffffffc}, 0xc) mkdir(&(0x7f0000000000)='./file0\x00', 0x100) r3 = kqueue() r4 = fcntl$dupfd(r3, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r4, 0x0, 0x0) renameat(r4, &(0x7f0000000500)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000540)='./file0\x00') r5 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000)='/dev/pf\x00', 0x0, 0x0) ioctl$DIOCMAP(r6, 0xc0504417, &(0x7f0000000100)={0x0}) ioctl$VMM_IOC_INTR(r5, 0x800c5606, &(0x7f00000000c0)={0x1}) r7 = open$dir(&(0x7f00000004c0)='./file0\x00', 0x8000, 0x8) kevent(r1, &(0x7f0000000140)=[{{r5}, 0x3, 0x9a, 0x9459e99e2f792798, 0x1f, 0x2}], 0x3, &(0x7f0000000180)=[{{r7}, 0xee55ef525dab33c3, 0x4, 0x1, 0x2, 0x101}], 0x70d3, &(0x7f00000001c0)={0x0, 0x1}) r8 = openat$null(0xffffffffffffff9c, &(0x7f0000000200)='/dev/null\x00', 0x8000, 0x0) r9 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r9, 0x800c5606, &(0x7f00000000c0)={0x1}) r10 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r10, 0x800c5606, &(0x7f00000000c0)={0x1}) r11 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r11, 0x800c5606, &(0x7f00000000c0)={0x1}) r12 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r12, 0x800c5606, &(0x7f00000000c0)={0x1}) r13 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vmm\x00', 0x0, 0x0) ioctl$VMM_IOC_INTR(r13, 0x800c5606, &(0x7f00000000c0)={0x1}) kevent(r8, &(0x7f0000000240)=[{{r5}, 0x9c4522eea2423499, 0x431a17524921806b, 0x8, 0x5, 0xfffffffffffffff8}, {{r9}, 0x8000000000000001, 0x8, 0x48, 0xffff, 0x9}, {{r5}, 0xfffffffffffffffe, 0x80, 0x80000000, 0xfffffffffffffffc, 0x9}, {{r5}, 0xfffffffffffffffe, 0x0, 0x1, 0x7ff, 0x401}, {{r10}, 0xfffffffffffffffa, 0x2, 0x40, 0x5, 0x9}, {{r1}, 0xfffffffffffffffc, 0x1, 0xf0000002, 0x9, 0x4}, {{}, 0x6c9ff47d26e27ec2, 0x4, 0x80000000, 0x7, 0x7}, {{r11}, 0x0, 0x10, 0x1, 0x4, 0x401}, {{r0}, 0xffffffffffffffff, 0x4c, 0x1, 0x2, 0x4}, {{0xffffffffffffff9c}, 0xfffffffffffffff9, 0x4, 0x0, 0xfff, 0x9}], 0x80000000, &(0x7f0000000380)=[{{r1}, 0x0, 0x46, 0x4, 0x0, 0x2}, {{r2}, 0x0, 0x115, 0x77c0cced6690bfbf, 0x1, 0x8}, {{}, 0x3, 0xce, 0x1, 0x6, 0x7ff}, {{r12}, 0x4, 0x96, 0x1, 0xdec, 0x8000}, {{r13}, 0xfffffffffffffff9, 0x20, 0x1, 0x4, 0xfffffffffffffc01}, {{}, 0xfffffffffffffffc, 0x190, 0x10, 0x2, 0xd2b3}, {{r5}, 0xfffffffffffffffe, 0x21, 0x1, 0x4, 0xc71}], 0xc0b, &(0x7f0000000480)={0x1, 0xfffffffffffffffa}) 16:04:42 executing program 0: open$dir(&(0x7f0000000080)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r1, 0x0, 0x0) r2 = kqueue() r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000002000/0x200000)=nil, 0x200000, 0x0, 0x10, r3, 0x0, 0x0) chflagsat(r3, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) panic: unhandled af 152 Stopped at db_enter+0x18: addq $0x8,%rsp TID PID UID PRFLAGS PFLAGS CPU COMMAND * 41027 98377 0 0 0x4000000 0 syz-executor.1 db_enter() at db_enter+0x18 panic(ffffffff821b8616) at panic+0x15c unhandled_af(98) at unhandled_af+0x16 pf_addrcpy(ffff80001d405ea8,ffff80001d4061a0,98) at pf_addrcpy+0x99 pfioctl(4900,c0504417,ffff80001d4061a0,1,ffff8000ffff33d8) at pfioctl+0x43c0 VOP_IOCTL(fffffd805d5ba340,c0504417,ffff80001d4061a0,1,fffffd806c3be840,ffff8000ffff33d8) at VOP_IOCTL+0x88 vn_ioctl(fffffd80636e62e0,c0504417,ffff80001d4061a0,ffff8000ffff33d8) at vn_ioctl+0xb7 sys_ioctl(ffff8000ffff33d8,ffff80001d4062b8,ffff80001d406300) at sys_ioctl+0x5b9 syscall(ffff80001d406380) at syscall+0x507 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0xa77f961b3f0, count: 5 https://www.openbsd.org/ddb.html describes the minimum info required in bug reports. Insufficient info makes it difficult to find and fix bugs. ddb> ddb> set $lines = 0 ddb> set $maxwidth = 0 ddb> show panic unhandled af 152 ddb> trace db_enter() at db_enter+0x18 panic(ffffffff821b8616) at panic+0x15c unhandled_af(98) at unhandled_af+0x16 pf_addrcpy(ffff80001d405ea8,ffff80001d4061a0,98) at pf_addrcpy+0x99 pfioctl(4900,c0504417,ffff80001d4061a0,1,ffff8000ffff33d8) at pfioctl+0x43c0 VOP_IOCTL(fffffd805d5ba340,c0504417,ffff80001d4061a0,1,fffffd806c3be840,ffff8000ffff33d8) at VOP_IOCTL+0x88 vn_ioctl(fffffd80636e62e0,c0504417,ffff80001d4061a0,ffff8000ffff33d8) at vn_ioctl+0xb7 sys_ioctl(ffff8000ffff33d8,ffff80001d4062b8,ffff80001d406300) at sys_ioctl+0x5b9 syscall(ffff80001d406380) at syscall+0x507 Xsyscall() at Xsyscall+0x128 end of kernel end trace frame: 0xa77f961b3f0, count: -10 ddb> show registers rdi 0xffffffff81f91017 db_enter+0x17 rsi 0xb92 rbp 0xffff80001d405d60 rbx 0xffff80001d405e10 rdx 0xb93 rcx 0xffff80001f639000 rax 0xffff80001f639000 r8 0xffff80001d405d20 r9 0x1 r10 0xffff8000009edf40 r11 0xef4dac1713b2cd4a r12 0x3000000008 r13 0xffff80001d405d70 r14 0x100 r15 0x1 rip 0xffffffff81f91018 db_enter+0x18 cs 0x8 rflags 0x246 rsp 0xffff80001d405d50 ss 0x10 db_enter+0x18: addq $0x8,%rsp ddb> show proc PROC (syz-executor.1) pid=41027 stat=onproc flags process=0 proc=4000000 pri=82, usrpri=82, nice=20 forw=0xffffffffffffffff, list=0xffff8000ffff3b40,0xffff8000ffff3170 process=0xffff8000ffff6a48 user=0xffff80001d401000, vmspace=0xfffffd8053388560 estcpu=36, cpticks=0, pctcpu=0.0 user=0, sys=0, intr=0 ddb> ps PID TID PPID UID S FLAGS WAIT COMMAND 98377 337770 39224 0 2 0 syz-executor.1 *98377 41027 39224 0 7 0x4000000 syz-executor.1 98377 41820 39224 0 3 0x4000080 fsleep syz-executor.1 78084 416440 99463 0 2 0x2 syz-executor.0 61772 190339 0 0 3 0x14200 acct acct 1682 110003 0 0 3 0x14200 bored sosplice 39224 124166 99463 0 3 0x82 nanosleep syz-executor.1 99463 64587 8780 0 3 0x82 thrsleep syz-fuzzer 99463 84374 8780 0 3 0x4000082 nanosleep syz-fuzzer 99463 459620 8780 0 3 0x4000082 thrsleep syz-fuzzer 99463 197157 8780 0 3 0x4000082 thrsleep syz-fuzzer 99463 167325 8780 0 3 0x4000082 thrsleep syz-fuzzer 99463 139377 8780 0 3 0x4000082 thrsleep syz-fuzzer 99463 49100 8780 0 3 0x4000082 thrsleep syz-fuzzer 99463 2668 8780 0 3 0x4000082 kqread syz-fuzzer 8780 483001 52009 0 3 0x10008a pause ksh 52009 142718 51481 0 3 0x92 select sshd 83534 505736 1 0 3 0x100083 ttyin getty 51481 47603 1 0 3 0x80 select sshd 39871 263840 73911 73 3 0x100090 kqread syslogd 73911 25437 1 0 3 0x100082 netio syslogd 9154 435282 1 77 3 0x100090 poll dhclient 7269 401620 1 0 3 0x80 poll dhclient 70949 521477 0 0 2 0x14200 zerothread 73620 435180 0 0 3 0x14200 aiodoned aiodoned 57483 242465 0 0 3 0x14200 syncer update 31312 186048 0 0 3 0x14200 cleaner cleaner 443 398032 0 0 3 0x14200 reaper reaper 33147 66309 0 0 3 0x14200 pgdaemon pagedaemon 68495 169710 0 0 3 0x14200 bored crynlk 44012 271908 0 0 3 0x14200 bored crypto 63111 189817 0 0 3 0x40014200 acpi0 acpi0 72556 422971 0 0 3 0x14200 bored softnet 7828 208864 0 0 3 0x14200 bored systqmp 96117 292552 0 0 3 0x14200 bored systq 91001 53239 0 0 3 0x40014200 bored softclock 58792 522044 0 0 3 0x40014200 idle0 63580 487335 0 0 3 0x14200 bored smr 1 471583 0 0 3 0x82 wait init 0 0 -1 0 3 0x10200 scheduler swapper ddb> show all locks No such command ddb> show malloc Type InUse MemUse HighUse Limit Requests Type Lim devbuf 9453 6332K 6978K 78643K 14784 0 pcb 13 8K 9K 78643K 1244 0 rtable 112 4K 4K 78643K 378 0 ifaddr 43 11K 12K 78643K 266 0 counters 19 16K 16K 78643K 19 0 ioctlops 0 0K 4K 78643K 1707 0 iov 0 0K 16K 78643K 162 0 mount 1 1K 1K 78643K 1 0 vnodes 1218 77K 77K 78643K 5543 0 UFS quota 1 32K 32K 78643K 1 0 UFS mount 5 36K 36K 78643K 5 0 shm 2 1K 5K 78643K 57 0 VM map 2 0K 0K 78643K 2 0 sem 12 0K 0K 78643K 144 0 dirhash 12 2K 2K 78643K 12 0 ACPI 1794 195K 288K 78643K 12646 0 file desc 5 13K 25K 78643K 25211 0 sigio 0 0K 0K 78643K 101 0 proc 66 39K 63K 78643K 633 0 subproc 32 2K 2K 78643K 51 0 NFS srvsock 1 0K 0K 78643K 1 0 NFS daemon 1 16K 16K 78643K 1 0 ip_moptions 0 0K 0K 78643K 195 0 in_multi 33 2K 2K 78643K 88 0 ether_multi 1 0K 0K 78643K 1 0 ISOFS mount 1 32K 32K 78643K 1 0 MSDOSFS mount 1 16K 16K 78643K 1 0 ttys 49 228K 228K 78643K 49 0 exec 0 0K 1K 78643K 233 0 pfkey data 0 0K 0K 78643K 6 0 pagedep 1 8K 8K 78643K 1 0 inodedep 1 32K 32K 78643K 1 0 newblk 1 0K 0K 78643K 1 0 VM swap 7 26K 26K 78643K 7 0 UVM amap 133 23K 23K 78643K 55576 0 UVM aobj 130 4K 4K 78643K 148 0 memdesc 1 4K 4K 78643K 1 0 crypto data 1 1K 1K 78643K 1 0 ip6_options 0 0K 0K 78643K 170 0 NDP 5 0K 0K 78643K 12 0 temp 105 3020K 3090K 78643K 307570 0 kqueue 0 0K 0K 78643K 107 0 SYN cache 2 16K 16K 78643K 2 0 ddb> show all pools Name Size Requests Fail Releases Pgreq Pgrel Npage Hiwat Minpg Maxpg Idle arp 64 8 0 2 1 0 1 1 0 8 0 rtpcb 80 29 0 27 1 0 1 1 0 8 0 rtentry 112 55 0 11 2 0 2 2 0 8 0 unpcb 120 57952 0 57944 26 24 2 3 0 8 1 syncache 264 4 0 4 1 1 0 1 0 8 0 sackhl 24 4 0 4 3 3 0 1 0 8 0 tcpcb 544 980 0 976 1 0 1 1 0 8 0 inpcb 280 10131 0 10124 14 12 2 2 0 8 1 nd6 48 6 0 2 1 0 1 1 0 8 0 pkpcb 40 570 0 570 3 3 0 1 0 8 0 pfrktable 1344 71 0 69 2 1 1 1 0 8 0 pftag 88 13 0 13 1 1 0 1 0 8 0 pfrule 1360 306 0 90 18 0 18 18 0 8 0 art_heap8 4096 1 0 0 1 0 1 1 0 8 0 art_heap4 256 256 0 43 14 0 14 14 0 8 0 art_table 32 257 0 43 2 0 2 2 0 8 0 art_node 16 54 0 14 1 0 1 1 0 8 0 semupl 112 203 0 203 18 17 1 1 0 8 1 semapl 112 142 0 132 1 0 1 1 0 8 0 shmpl 112 146 0 18 4 0 4 4 0 8 0 dirhash 1024 17 0 0 3 0 3 3 0 8 0 dino1pl 128 33442 0 32009 47 0 47 47 0 8 0 ffsino 240 33442 0 32009 85 0 85 85 0 8 0 nchpl 144 65669 0 64004 63 0 63 63 0 8 0 uvmvnodes 72 5926 0 0 108 0 108 108 0 8 0 vnodes 208 5926 0 0 312 0 312 312 0 8 0 namei 1024 170277 0 170276 1 0 1 1 0 8 0 vcpupl 1984 2 0 1 1 0 1 1 0 8 0 vmpool 528 2 0 1 1 0 1 1 0 8 0 pfiaddrpl 120 24 0 15 1 0 1 1 0 8 0 scxspl 192 171809 0 171809 1 0 1 1 0 8 1 plimitpl 152 2540 0 2533 1 0 1 1 0 8 0 sigapl 432 25379 0 25366 2 0 2 2 0 8 0 futexpl 56 244016 0 244015 1 0 1 1 0 8 0 knotepl 112 531 0 512 1 0 1 1 0 8 0 kqueuepl 104 8618 0 8614 1 0 1 1 0 8 0 pipepl 112 2186 0 2167 1 0 1 1 0 8 0 fdescpl 424 25380 0 25366 2 0 2 2 0 8 0 filepl 120 148395 0 148283 39 34 5 6 0 8 1 lockfpl 104 2138 0 2137 1 0 1 1 0 8 0 lockfspl 48 939 0 938 1 0 1 1 0 8 0 sessionpl 112 18 0 8 1 0 1 1 0 8 0 pgrppl 48 3563 0 3553 1 0 1 1 0 8 0 ucredpl 96 14936 0 14925 1 0 1 1 0 8 0 zombiepl 144 25423 0 25423 1 0 1 1 0 8 1 processpl 872 25453 0 25423 4 0 4 4 0 8 0 procpl 632 52671 0 52632 4 0 4 4 0 8 0 sockpl 384 69205 0 69188 98 92 6 10 0 8 4 mcl64k 65536 142 0 142 21 21 0 1 0 8 0 mcl16k 16384 120 0 120 20 19 1 1 0 8 1 mcl12k 12288 435 0 435 28 28 0 1 0 8 0 mcl9k 9216 83 0 83 19 18 1 1 0 8 1 mcl8k 8192 567 0 567 29 28 1 1 0 8 1 mcl4k 4096 1270 0 1270 33 32 1 1 0 8 1 mcl2k2 2112 77 0 77 29 28 1 1 0 8 1 mcl2k 2048 50290 0 50250 18 12 6 11 0 8 0 mtagpl 80 2 0 2 1 1 0 1 0 8 0 mbufpl 256 206917 0 206835 17 7 10 11 0 8 2 bufpl 280 34894 0 28710 442 0 442 442 0 8 0 anonpl 16 1438531 0 1433729 35 14 21 34 0 107 0 amapchunkpl 152 80936 0 80848 10 5 5 6 0 158 1 amappl16 192 100963 0 100733 22 10 12 22 0 8 0 amappl15 184 60 0 56 1 0 1 1 0 8 0 amappl14 176 31 0 29 1 0 1 1 0 8 0 amappl13 168 8 0 7 1 0 1 1 0 8 0 amappl12 160 5 0 5 1 1 0 1 0 8 0 amappl11 152 102 0 89 1 0 1 1 0 8 0 amappl10 144 12603 0 12599 1 0 1 1 0 8 0 amappl9 136 13102 0 13097 1 0 1 1 0 8 0 amappl8 128 12833 0 12777 2 0 2 2 0 8 0 amappl7 120 12693 0 12677 1 0 1 1 0 8 0 amappl6 112 99 0 93 1 0 1 1 0 8 0 amappl5 104 287 0 277 1 0 1 1 0 8 0 amappl4 96 25664 0 25637 1 0 1 1 0 8 0 amappl3 88 661 0 654 1 0 1 1 0 8 0 amappl2 80 202492 0 202421 3 1 2 3 0 8 0 amappl1 72 419096 0 418663 26 16 10 20 0 8 0 amappl 80 52930 0 52895 1 0 1 1 0 84 0 dma4096 4096 1 0 1 1 1 0 1 0 8 0 dma256 256 6 0 6 1 1 0 1 0 8 0 dma128 128 253 0 253 1 1 0 1 0 8 0 dma64 64 6 0 6 1 1 0 1 0 8 0 dma32 32 7 0 7 1 1 0 1 0 8 0 dma16 16 18 0 17 1 0 1 1 0 8 0 aobjpl 64 147 0 18 3 0 3 3 0 8 0 uaddrrnd 24 25382 0 25367 1 0 1 1 0 8 0 uaddrbest 32 2 0 0 1 0 1 1 0 8 0 uaddr 24 25382 0 25367 1 0 1 1 0 8 0 vmmpekpl 168 111850 0 111828 2 0 2 2 0 8 0 vmmpepl 168 2829389 0 2828021 126 61 65 79 0 357 3 vmsppl 272 25381 0 25367 3 1 2 2 0 8 0 pdppl 4096 50770 0 50735 6 1 5 6 0 8 0 pvpl 32 4146859 0 4139505 241 178 63 115 0 265 1 pmappl 200 25381 0 25367 1 0 1 1 0 8 0 extentpl 40 46 0 29 1 0 1 1 0 8 0 phpool 112 272 0 123 5 0 5 5 0 8 0