last executing test programs: 16.850004609s ago: executing program 0 (id=218): openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x462, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) syz_emit_ethernet(0x1, &(0x7f00000005c0)={@local, @remote, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x12, 0x28, 0x0, 0xffff, 0x0, 0x46, 0x0, @local={0xac, 0x14, 0x0}, @multicast1, {[@generic={0x82, 0x9, "c2519f21a4b212"}, @rr={0x7, 0x3, 0x4}]}}, @icmp=@mask_request={0x11, 0x0, 0x0, 0x5}}}}}) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x30) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) syz_emit_ethernet(0x5eb, &(0x7f00000005c0)={@random="4b8f3a6f6f98", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x5b5, 0x3a, 0xff, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@echo_request={0x80, 0x0, 0x0, 0x400, 0x7, "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"}}}}}}) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0xca0706ee3fd5d6f6) r2 = openat$filemon(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) ioctl$FILEMON_SET_FD(r2, 0xc0045301, &(0x7f0000000000)=r1) r3 = setsid() ioctl$FILEMON_SET_PID(r2, 0xc0045302, &(0x7f00000002c0)=r3) r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r4, &(0x7f0000000000)='./file0\x00', 0x100000, 0x69) mlockall(0x1) freebsd10_pipe(&(0x7f0000000540)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int, @spare}}) truncate(&(0x7f0000000140)='./file0/file0\x00', 0x5) 16.500082654s ago: executing program 1 (id=219): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) munlock(&(0x7f000005f000/0x3000)=nil, 0x3000) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x6, 0x20411, 0xffffffffffffffff, 0xfffffffc) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() ioctl$FILEMON_SET_PID(0xffffffffffffffff, 0xc0045302, 0x0) open$dir(0x0, 0x2540000, 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x4, 0x0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) renameat(r1, &(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000140)='./file0/file0\x00') __getcwd(&(0x7f0000000440)=""/79, 0xfffffffffffffdf7) renameat(r0, &(0x7f00000000c0)='./file0/file0\x00', r0, &(0x7f0000000180)='./file1\x00') __getcwd(&(0x7f0000000240)=""/152, 0x98) pipe2(0x0, 0x0) aio_waitcomplete(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sigaction(0x4b, &(0x7f0000000200)={0x0, 0x34, {[0x5, 0x20a2, 0xfdffffff, 0x2]}}, 0x0) syz_emit_ethernet(0xe2, 0x0) syz_emit_ethernet(0xae, &(0x7f0000000300)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa88a830008100180086dd6004000000703a0000000000000000000000000000000000ff02000000000000000000000000000110040004000000004bb0a6ef51a426bc253d8e6e66867f53ff010000007e81175506a2ec6af1000000000000000000000111009078fd0000006000000000007000ff01000000000000000000000000000100000000000000000000ffffe0000001700200080000000000000000000000000000ffffe0000002"]) 16.499514596s ago: executing program 2 (id=220): aio_waitcomplete(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r0, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) chroot(&(0x7f0000000040)='./file0/file0/..\x00') r3 = socket(0x2, 0x1, 0x0) setuid(0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r4, 0x4, 0xcc) syz_emit_ethernet(0x69, &(0x7f0000000200)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "0400", 0x33, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0xfd, '\x00', {0x0, 0x6, "5adf00", 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1, [], "b03536"}}}}}}}) fcntl$setown(r4, 0x6, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000780)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x3fff, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x28, 0xb, 0x0, {0x15, 0x4, 0x0, 0x7, 0x5, 0x67, 0x75b, 0x8, 0x5d, 0x9, @broadcast, @loopback, {[@rr={0x7, 0x7, 0x7, [@multicast1]}, @lsrr={0x83, 0x23, 0x5, [@remote={0xac, 0x14, 0x0}, @loopback, @local={0xac, 0x14, 0x0}, @rand_addr=0x1, @empty, @multicast1, @rand_addr, @multicast1]}, @ssrr={0x89, 0xb, 0xb, [@multicast1, @multicast2]}, @rr={0x7, 0x3, 0xf}, @generic={0x85, 0x2}, @ra={0x94, 0x6, 0x3}]}}}}}}}) ppoll(0x0, 0x0, &(0x7f0000000200)={0x0, 0x7}, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_emit_ethernet(0x7e, &(0x7f0000000300)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd605f6ad900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa020090780000fe8000000000000000000000000000aa0000000000000000000000000000000164020071faff0000fe8000000000000000000000000000a994dc66187f07a1ecd47b3a0a87ec6a7ab5c3e1ee2dd0a4d127f9d922a35b8076ca5be56ead9e734210c644"]) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @ra={0x94, 0x6, 0x1}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1}}}}}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)={0x81, 0x2, 0x8, 0x6}, 0x8) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) r5 = socket(0x1c, 0x1, 0x0) extattr_list_file(0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) connect$unix(r0, &(0x7f0000000040)=@file={0xa, 0x1, './file0\x00'}, 0xa) 15.411730564s ago: executing program 2 (id=223): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000"]) aio_waitcomplete(0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000580)) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180)) execve(0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r1 = socket$inet6(0x1c, 0x3, 0x7) setsockopt$inet6_int(r1, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r1, 0x0, 0x0, 0xffff0000, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="fff71fdcedff000080009e000000e216", 0x3}, 0x1c) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') socket(0x1c, 0x1, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) readlinkat(r2, &(0x7f0000000540)='./file0\x00', &(0x7f0000001140)=""/113, 0x71) socket(0x1c, 0x20000000, 0x0) recvmsg(r0, &(0x7f0000001100)={&(0x7f0000000200)=@in={0x10, 0x2, 0xffffffffffffffff, @loopback}, 0x10, &(0x7f0000001000)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000000440)=""/202, 0xca}, {&(0x7f0000000ec0)=""/63, 0x3f}, {&(0x7f0000000f00)=""/24, 0x18}, {&(0x7f0000000f40)=""/174, 0xae}], 0x7, &(0x7f0000001040)=""/182, 0xb6}, 0x3) 14.678967849s ago: executing program 0 (id=232): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) r0 = socket(0x26, 0x2, 0x0) sendto$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) cap_rights_limit(r2, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(r1, 0x0, &(0x7f0000000180)) execve(0x0, 0x0, 0x0) syz_emit_ethernet(0x11e, &(0x7f0000000280)={@random="172140030f70", @empty, [], {@ipv6={0x86dd, {0x6, 0x6, "00f435", 0xe8, 0xa1ac705b7926ce00, 0x1, @rand_addr="5796bdca6f177b098b2b5ae22967efd7", @mcast2, {[@dstopts={0x11, 0x1c, '\x00', [@generic={0xc, 0xde, "bf071851b7e875bd43d6b48938b8f67b3fc159e4eb49df8314504f098faceedc2f1df271aecb61103d5cb014ab62060e8b959e4688e02611dc3386442dc54f93c304102ba74de4373a5ee9801ff200c8c1c9c429e74a0e50e3962cd49fb0bf09dd1fc41c3bace9e89b029a929e1d9f9e19334ad9e16f0c5d404bb14343b14debb02c98e89cfe0f27e935f21ffd26288bd70aee09336101215ae4a669e282b217e5ac9011241caeb18eae7d519a81dbe41cadb08ef97b59208a1725bd03aa53a98cd067ec3201ee192bbac8118e5e04c88748028e8f81f2263879827c1cbf"}]}]}}}}}) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) r4 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$BIOCSETF(r4, 0x80084267, &(0x7f0000000040)={0x1, &(0x7f0000000200)=[{0x94, 0x9, 0x10, 0xfffffffe}]}) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) socket(0x1c, 0x3, 0xa) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r5, &(0x7f0000001040)="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", 0x406, 0x20081, &(0x7f0000000000)={0x10, 0x2, 0x0, @loopback}, 0x10) socket(0x1c, 0x1, 0x0) 13.615250428s ago: executing program 2 (id=225): r0 = open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$sock_int(r1, 0xffff, 0x1023, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) mkdir(0x0, 0x0) r3 = socket(0x1c, 0x2, 0x0) ioctl$DIOCNATLOOK(0xffffffffffffffff, 0x8008745b, &(0x7f00000003c0)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000100)=@in={0x10, 0x2, 0x2, @rand_addr=0x7}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x10145}, 0x0) setuid(0xee01) socket$inet6(0x1c, 0x2, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x2a, 0x0, 0x20, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x400, 0xfdffff85, [0x0, 0x3, 0x9]}) ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f0000000240)={0x0, 0x2, 0x2, 0x3, &(0x7f0000000100), 0x0, &(0x7f0000000580), &(0x7f00000001c0)}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_emit_ethernet(0x5e, &(0x7f0000000480)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x28, 0x3a, 0xff, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@ndisc_redir={0x89, 0x0, 0x0, '\x00', @mcast1, @empty}}}}}}) r5 = socket(0x1c, 0x1, 0x0) eaccess(&(0x7f0000000040)='./file/file0/../\x00', 0x0) ioctl$EFIIOC_VAR_NEXT(0xffffffffffffffff, 0xc0244505, 0x0) openat$crypto(0xffffff9c, &(0x7f0000000140), 0xedb6ff2617a54ad9, 0x0) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$CIOCGSESSION2(r6, 0xc030636a, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) clock_nanosleep(0x0, 0x0, &(0x7f00000000c0)={0x5fdd8493, 0xfffffff9}, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) sendmsg$inet_sctp(r2, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="02161dd50200000000000000", 0xc, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x400) 13.614903949s ago: executing program 3 (id=226): openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(&(0x7f0000000300)='./file0\x00', 0x800aa480) open$dir(&(0x7f00000001c0)='./file0/file0/file0\x00', 0x202, 0x16d) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) fcntl$setstatus(r0, 0x4, 0x0) socketpair(0x1c, 0x1, 0x0, &(0x7f0000000200)) aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r2, 0x80000004, &(0x7f00000004c0)='E', 0x1, [0x3], 0x200000000000000, 0x8, 0x0, {0x1, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0xf, @spare=[0x6, 0xffffff6f, 0x7, 0x6, 0x1, 0x1, 0x5, 0x10]}}) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000580)=""/222, 0xde}], 0x2d) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f0000000040)={0x1f, 0x1e, 0x1, &(0x7f0000000240)="ab", 0x0, 0x0, 0x0, 0xfdf9ff81, [0x0, 0x2]}) ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f0000000000)={0x1, 0x2, 0x0, 0x5c46, &(0x7f0000000280)="dece6105e0d5584b411e8a97545c99769fbd2ce1c80c6c02524dd968b6f678d6748ee008726e536a469866638c12ab58eb0df66a7f06caff88d60314e9516613b5f656c425936247ae362fadaa2e223efc41d79db7d301", 0x0, &(0x7f0000000140)="03555dc6f22b9ddba95f7b6b51cdf41643902f03d506202e62c86f444af2f5b1863e6a781fd0acf336dc78b91aa7e7f54a774191c5cae43858de26de", 0x0}) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f0000000740)="b1000502900000000c0008000700ca900f0e08fecea11ea8fef968f3c73fd3357aa0eb2c0900852e126336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0200a371a3f80000feffffffffffff010000000000000000", 0xb1, 0x0, 0x0, 0x0) rfork(0x5000) openat$bpf(0xffffff9c, &(0x7f00000000c0), 0x203000a, 0x0) 13.61422571s ago: executing program 1 (id=234): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) munlock(&(0x7f000005f000/0x3000)=nil, 0x3000) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x6, 0x20411, 0xffffffffffffffff, 0xfffffffc) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() ioctl$FILEMON_SET_PID(0xffffffffffffffff, 0xc0045302, 0x0) open$dir(0x0, 0x2540000, 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x4, 0x0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) renameat(r1, &(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000140)='./file0/file0\x00') __getcwd(&(0x7f0000000440)=""/79, 0xfffffffffffffdf7) renameat(r0, &(0x7f00000000c0)='./file0/file0\x00', r0, &(0x7f0000000180)='./file1\x00') __getcwd(&(0x7f0000000240)=""/152, 0x98) pipe2(0x0, 0x0) aio_waitcomplete(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sigaction(0x4b, &(0x7f0000000200)={0x0, 0x34, {[0x5, 0x20a2, 0xfdffffff, 0x2]}}, 0x0) syz_emit_ethernet(0xe2, 0x0) syz_emit_ethernet(0xae, &(0x7f0000000300)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa88a830008100180086dd6004000000703a0000000000000000000000000000000000ff02000000000000000000000000000110040004000000004bb0a6ef51a426bc253d8e6e66867f53ff010000007e81175506a2ec6af1000000000000000000000111009078fd0000006000000000007000ff01000000000000000000000000000100000000000000000000ffffe0000001700200080000000000000000000000000000ffffe0000002"]) 13.109993202s ago: executing program 0 (id=227): open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r0 = socket(0x1c, 0x1, 0x0) mkdir(0x0, 0x0) r1 = socket(0x1c, 0x2, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$DIOCNATLOOK(0xffffffffffffffff, 0x8008745b, &(0x7f00000003c0)="28a7c7f9812306") sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x6, @empty, 0xfffffffc}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x10145}, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r2 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x1aa, &(0x7f0000000cc0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa008100000086dd602e5cea01703c0020010000000000000000000000000002ff020000000000000000000000000001"]) eaccess(&(0x7f0000000040)='./file/file0/../\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) lpathconf(&(0x7f00000001c0)='./file0\x00', 0xa) socketpair(0x0, 0x0, 0x4, 0x0) ioctl$EFIIOC_VAR_NEXT(0xffffffffffffffff, 0xc0244505, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x1ff, @empty, 0x5}, 0x1c) listen(r3, 0xb) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000640)=""/170, 0xaa}], 0x1, 0x0}, 0xc0) syz_emit_ethernet(0x52, &(0x7f0000000100)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "2f5105", 0x1c, 0x0, 0xff, @rand_addr="fe567b243af0e85d482a3f1912ba750c", @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6, 0x0, 0x0, 0x3}], @tcp={{0x2, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2}}}}}}}) aio_write(&(0x7f00000002c0)={0xffffffffffffffff, 0x5c, &(0x7f0000000780)="eb29ca18212d14e3c95bdf00f85351cbd228c6da204bbc0e622c3b2088dba5a3bfbfcff4bc46af4e2033a85f73f718af7698629d6f19027889edb523f479a11014834c3341b1c863ccf215ea219362a60a0afc7f1398c8a7968ce6b5c61bb631e028349aa2c6470ffced3eda865008db9f1bfddc17faf68c9f1e90e2522f1ea2f65bbd9b7cad98a07a4be8c4264e466839099d1195503636794b62d5dede884f6616f969793da671f517b1c73ebeef9b5c6e465aea678168429f6b2a78b435e07ddcba9af6ae91f55034bfeed67b1d515a3e029926cc24014580686365de6134befdb1355d8f6904eef9910c2d55c3dcb78801f6f0da1a2ac2edb37dd0e976", 0xff, [0x1ff, 0x5], 0xe4, 0x6, 0x2, {0x8, 0x8, 0x0}, {0x3, 0xc, @sival_ptr=0x3, @thr={&(0x7f0000000100)="2e653ef30f590500000100d2d80f01d03de3000000660f5ffdc4c16dd8c50f43ce8fc900908107000000c4c185da1dbe0000008fe808cee2f2", &(0x7f0000001240)="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"}}}) r5 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) r6 = socket(0x1b, 0x3, 0x0) sendto$inet6(r6, &(0x7f0000000000)="02161dd502000000000000008fc30d4e", 0x10, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 12.638339163s ago: executing program 2 (id=228): freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000"]) aio_waitcomplete(0x0, 0x0) statfs(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000580)) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180)) execve(0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xffff0000, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="fff71fdcedff000080009e000000e216", 0x3}, 0x1c) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) socket(0x1c, 0x20000000, 0x0) recvmsg(r0, &(0x7f0000001100)={&(0x7f0000000200)=@in={0x10, 0x2, 0xffffffffffffffff, @loopback}, 0x10, &(0x7f0000001000)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000340)=""/9, 0x9}, {&(0x7f0000000380)=""/162, 0xa2}, {&(0x7f0000000440)=""/202, 0xca}, {&(0x7f0000000ec0)=""/63, 0x3f}, {&(0x7f0000000f00)=""/24, 0x18}, {&(0x7f0000000f40)=""/174, 0xae}], 0x7, &(0x7f0000001040)=""/182, 0xb6}, 0x3) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) 12.380061762s ago: executing program 3 (id=229): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x6, 0x20411, 0xffffffffffffffff, 0xfffffffc) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() pipe2(0x0, 0x0) aio_waitcomplete(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sigaction(0x2c, &(0x7f0000000200)={0x0, 0x35, {[0xfffff801, 0xa2, 0xfdffffff]}}, 0x0) syz_emit_ethernet(0xe2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x1480200, 0x1f6) syz_emit_ethernet(0xa0, &(0x7f0000000300)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd600400000000000000000000ff0100000000000000000000000000014fa3a9ca4aa3f9720d13dafd7c571f6a9e5202c7de822fc28190cd5b270f0725fce53f271f4a000ff564f26c877749d33e110d33d2e3c6baa6b784219515c85aeec9236f9c7a199fa2057766e34063c51401609ebcb6cff7ffe6a03d8174c1f0cd60c6ab1a99eaa71b1f"]) r0 = socket(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x5, &(0x7f0000000140)={0x10, 0x2, 0x3, @remote={0xac, 0x14, 0x0}}, 0x10) sendto(r0, &(0x7f0000000180)="8e741440cbec08ded2c5eca7d3d5098a1eeb19d5f95476270256fe6ccc554d0112981bdcc2c23a064b7da59f4fd0571e7cbd32f04f51420be57ceeaf74a083211a0a9f05174fc729688ccbe3732a6e005c5c302016acb744e9dfb32375be2b2e0147b6bad4ca2bff6ab6", 0x6a, 0x20005, &(0x7f0000000200)=@in={0x10, 0x2, 0x3, @loopback}, 0x10) munmap(&(0x7f000000f000/0x2000)=nil, 0x2000) lio_listio(0x1, &(0x7f0000000080)=[{0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0, [0x9c, 0x7], 0x5, 0x1, 0x80009, {0x0, 0x8, 0x0}, {0x1, 0xe, @sigval_ptr=0x6, @ke_flags=0x82}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x82, 0x10000], 0x6, 0x4, 0x8001, {0x3, 0x10000007, 0x0}, {0x1, 0x1, @sigval_int=0x8, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0x2, 0x0, 0x0, [0x9, 0x40], 0x3, 0x6, 0x1, {0x7f, 0x2, 0x0}, {0x3, 0x10, @sival_ptr=0xffffffff, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0xd, 0x0, 0x0, [0x0, 0xfffeffdc], 0xcbbb, 0x20, 0x8057, {0x8, 0xec, 0x0}, {0x3, 0x1a, @sival_int=0xec1f, @thr={0x0, 0x0}}}], 0x4, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) rfork(0x83000) openat$bpf(0xffffff9c, 0x0, 0x1, 0x0) socket(0x1c, 0x1, 0x0) open$dir(0x0, 0x0, 0x0) 11.390537452s ago: executing program 0 (id=230): openat$bpf(0xffffff9c, &(0x7f00000002c0), 0x2008449, 0x0) sysarch$I386_SET_FSBASE(0x8, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6(0x1c, 0x2, 0x0) setsockopt(r1, 0x3, 0x40, &(0x7f0000000000)='w', 0x1) bind$inet6(r1, 0x0, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000140)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x0, 0x6, @loopback, 0x290}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x4) sigtimedwait(&(0x7f0000001940)={[0x8001, 0x3a, 0x4, 0x7]}, 0x0, &(0x7f00000019c0)={0xffff, 0x9}) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_mreqsrc(r2, 0x0, 0x46, &(0x7f0000000080)={@multicast1, @multicast2, @local={0xac, 0x14, 0x0}}, 0xc) dup2(r2, 0xffffffffffffffff) bind$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x1ff, @loopback, 0x5}, 0x1c) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) semget$private(0x0, 0x4000000009, 0x82) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) sysarch$I386_SET_LDT(0x1, 0x0) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x9) r3 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffddffff0000000000060000000000000000000004019078ac1400bbe00000010d009078000700"]) socketpair(0x10, 0x2, 0x9, &(0x7f0000000180)) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x1f, 0x0, 0x18, &(0x7f0000000000)="ec7b00000900ff2425c1f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0x1004, 0xe3]}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) setsockopt$inet_mreqsrc(r2, 0x0, 0x46, &(0x7f0000000080)={@multicast1, @multicast2, @local={0xac, 0x14, 0x0}}, 0xc) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) fsync(r5) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 10.969153486s ago: executing program 3 (id=231): clock_nanosleep(0x0, 0x0, 0x0, 0x0) aio_waitcomplete(0x0, 0x0) r0 = socket(0xa, 0x1, 0x0) getsockopt$inet6_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000440)={0x0, 0x1}, &(0x7f0000000480)=0x8) sendmsg$inet6_sctp(r0, &(0x7f0000000540)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1, 0x5, @local={0xfe, 0x80, '\x00', 0x0}, 0xfffffffb}, 0x1c, &(0x7f0000000400)=[{&(0x7f00000001c0)="e22cf4528c1fbc063b64b6b7932df90b7c1608896a29e69dcb5c9aa69af059cf5aa705bf45cd7a9bce4199e3102d91fd4ac827424cf0846c7c140d5d9bb3c05c64fb86dec36dc25f18e2016ca1c8b13af1cfca4779bca37dd4d9c399bb763c078560f27797948d6747ea25a617675acfd1ed83ffc403da1af967f13a7978dd127e6fd775246c090491fb9e4e820c6c8ef745b4d723302a82770548d04f779d1cc7d48359ffe49d1ca2d00e46fe27bbf3b69a3c0426b318a4ddab8b9fe40d884b04f1ee5f3141cc84d15e902cf9b8f1b6d73fea52c7eb510a03f0619ac1", 0xdd}, {&(0x7f00000002c0)}, {&(0x7f0000000380)='$\f', 0x2}], 0x3, &(0x7f0000000580)=ANY=[@ANYBLOB="14000000840000000100000005000b000500010010000000840000000810000008000017bac2134ebe8a41c51491a9dee574001c00000084ecffff09000000ff0100"/78, @ANYRES32=r1], 0x5c}, 0x18c) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000040)={@rand_addr=0xd, @loopback, @multicast2}, 0xc) dup(0xffffffffffffffff) ioctl$KDSKBSTATE(0xffffffffffffffff, 0x20044b14) r3 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00') msgget$private(0x0, 0x790) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x100000, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f00000000c0)={0x17, 0xf, 0x18, &(0x7f0000000000)="ec7b00000900ff2425c1f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdffff85, [0x8001, 0x2, 0x2, 0x8]}) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000001180)={0xffffffffffffff97, 0x2, 0x2, @multicast2}, 0x10) connect$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x188, 0x0, 0x0) r6 = shmget(0x2, 0x1000, 0x67a, &(0x7f0000fff000/0x1000)=nil) shmctl$SHM_STAT(r6, 0xd, 0xffffffffffffffff) shmctl$IPC_INFO(r6, 0x3, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) setrlimit(0x6, &(0x7f0000000000)={0x6, 0x6}) r7 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r7, &(0x7f0000000340)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c000000290000003f"], 0x1c}, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 10.610187372s ago: executing program 1 (id=233): mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1) poll(&(0x7f0000000ac0)=[{0xffffffffffffff9c}], 0x20000000000000d7, 0x887e) extattr_set_file(&(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x0, 0x88f]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1, 0x5, 0x0) r2 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000000)={0x28, 0x0, 0x10, &(0x7f0000000040)="72e8789fa2e77d9bcf47eaa3c96be443", 0x0, 0x0, 0x0, 0x7d32559c, [0x7, 0x0, 0x0, 0x60]}) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000100)='./file0\x00') readlink(&(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x0) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000700)={0x0, 0x1, 0x0, 0x10004, &(0x7f0000000000), 0x0, 0x0, &(0x7f00000008c0)}) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2002, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x26, &(0x7f0000000080)={@random="b905f0ffffff", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x18, 0x0, 0x41, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@generic={0x20}}}}}) sendto$inet(0xffffffffffffffff, &(0x7f0000000200)="4b420055bfb403f04ef8f6ebbb5a59f3f1", 0x11, 0x88, &(0x7f0000000000)={0x10, 0x2, 0x1, @multicast2}, 0x10) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0xc, 0x0, &(0x7f0000000100)) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5, 0x1010, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2008, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x62, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004e00c47afffd000880009078ac1400bbffffffff00940600b60005441c00d100006276e00000020400798400000005ac1400bb00000081000b0190780006000045250fc70066192c4014fffeac1400bbac"]) r4 = openat$bpf(0xffffffffffffff9c, &(0x7f0000001580), 0x200200, 0x0) fcntl$setstatus(r4, 0x4, 0x8) socket(0x2, 0x1, 0x4) syz_emit_ethernet(0xfffffffffffffe99, &(0x7f0000000240)={@random="172140030f70", @empty, [], {@ipv6={0x86dd, {0x6, 0x6, "0cf5b8", 0xd6, 0x0, 0x1, @rand_addr="5796bdca6f177b098b2b5ae22967efd7", @remote={0xfe, 0x80, '\x00', 0x0}, {[@dstopts={0x11, 0x0, '\x00', [@padn={0x1, 0x20}]}], @generic="d2160877b761bd7765535ba60e6dd8a787862c26c83de8eec49184d524009e318bbebb5321ebbff1b3945b932e113a7cd9e7ad9195675c1eadee9bb36b6c475b80917dfbfe564aa7e790ea7c101e398b1ead71e16773c72da6958c30c3932132f7ad41d00fd9be4712a3c71c14270f0c7e7fb6894e997c4206e0713652c4c4d78ca4d2688374411acc04ad69c9ef987e2ea4e19bbb42c395fe9a0e96f2b468bcc408c521a45a77337cd928b1e6c7727831f97833758fe2ec29eca074f812845a7fdf6ee849d0"}}}}}) socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @mcast1, 0x3}, 0x1c) syz_emit_ethernet(0x2e, &(0x7f0000000200)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x67, 0x0, 0x0, 0x1, 0x0, @broadcast, @broadcast, {[@lsrr={0x83, 0x3}]}}, @icmp=@mask_reply={0x12, 0x0, 0x0, 0x4}}}}}) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 9.310058152s ago: executing program 1 (id=235): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) r0 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(0x0, 0x6000, 0x9) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffc]}], 0x1, 0x0, 0x0, 0x0) setpriority(0x2, 0x0, 0xfffffffc) getsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000001680), &(0x7f00000016c0)=0x8) select(0x40, &(0x7f0000000340)={0x0, 0x10000000000a39e, 0x0, 0x300, 0xffffffffffffffff}, 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x10000}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000140)='chd\x00', 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) syz_emit_ethernet(0x66, &(0x7f0000001d00)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd605f6ad900303a003bcc3f06000000d6f8a13c315edae0ef3e64a458132fa13a8be186e3fe80000000000000"]) sigaction(0x13, &(0x7f0000000040)={&(0x7f0000000180)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de3516cb69989999908", 0x35, {[0xfffff801, 0x70e5, 0xffff]}}, 0x0) r2 = fork() sigqueue(r2, 0x11, @sigval_int=0xfd51) sigqueue(r2, 0x13, @sigval_ptr=0x1000000) r3 = socket(0x1c, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(r3, 0x0, 0x0, 0x4cdf0000, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r4 = socket$inet6(0x1c, 0x3, 0x7) setsockopt$inet6_int(r4, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r4, 0x0, 0x0, 0xffff0000, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="fff71fdcedff000080009e000000e216", 0x3}, 0x1c) r5 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) setpriority(0x0, 0x0, 0x8000) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x1c, 0x1c, 0x0, 0x0, @loopback}, 0x1c) 9.309756005s ago: executing program 3 (id=236): mount(0x0, 0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r0 = kqueue() freebsd11_mknod(0x0, 0x1000, 0x0) chmod(&(0x7f0000000280)='./file0\x00', 0x2768c724b44f58aa) open$dir(&(0x7f00000000c0)='./file1\x00', 0x80201, 0x0) kevent(r0, &(0x7f0000000040)=[{0x12dd, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) __semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) msgget(0x1, 0x213) msgget(0x1, 0x501) select(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r2, 0x29, 0x25, &(0x7f0000000000)=0x10000, 0x4) syz_emit_ethernet(0x400e, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "15f2ff", 0x3a3a, 0x0, 0x0, @rand_addr="eee7567b2c0e280000004c1e7b3b00", @local={0xfe, 0x80, '\x00', 0x0}}}}}) r3 = socket(0x11, 0x3, 0x0) sendto$unix(r3, &(0x7f0000000740)="b100050390000000050008000700ca900f0e08fece6ef0ffffffffffff3fd3357a00000000000000006336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af080037282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0208a371a3f8000000800080000001000000000000000000", 0xb1, 0x20000, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa94ea09066dbd00000000000000000000000000bbfe8000000000000000000000000000aa4e204e220008907800"/62]) readlink(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) syz_emit_ethernet(0x118, &(0x7f00000002c0)=ANY=[@ANYBLOB="9958f7d20cf5647f0c8c24fc4c774a9f1da928f6e16d6687a59efc14405e758aa8613549e0de08b0babfc46a5b2d95e77ed1cca5d53ef840", @ANYRESOCT, @ANYRESDEC]) setsockopt$inet_mreqn(r5, 0x0, 0x8, 0x0, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 9.308870748s ago: executing program 0 (id=243): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) munlock(&(0x7f000005f000/0x3000)=nil, 0x3000) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x6, 0x20411, 0xffffffffffffffff, 0xfffffffc) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() ioctl$FILEMON_SET_PID(0xffffffffffffffff, 0xc0045302, 0x0) open$dir(0x0, 0x2540000, 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x4, 0x0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) renameat(r1, &(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000140)='./file0/file0\x00') __getcwd(&(0x7f0000000440)=""/79, 0xfffffffffffffdf7) renameat(r0, &(0x7f00000000c0)='./file0/file0\x00', r0, &(0x7f0000000180)='./file1\x00') __getcwd(&(0x7f0000000240)=""/152, 0x98) pipe2(0x0, 0x0) aio_waitcomplete(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) sigaction(0x4b, &(0x7f0000000200)={0x0, 0x34, {[0x5, 0x20a2, 0xfdffffff, 0x2]}}, 0x0) syz_emit_ethernet(0xe2, 0x0) syz_emit_ethernet(0xae, &(0x7f0000000300)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa88a830008100180086dd6004000000703a0000000000000000000000000000000000ff02000000000000000000000000000110040004000000004bb0a6ef51a426bc253d8e6e66867f53ff010000007e81175506a2ec6af1000000000000000000000111009078fd0000006000000000007000ff01000000000000000000000000000100000000000000000000ffffe0000001700200080000000000000000000000000000ffffe0000002"]) 8.281597275s ago: executing program 2 (id=237): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) r0 = fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000"]) aio_waitcomplete(0x0, 0x0) statfs(&(0x7f0000000080)='./file0/file1\x00', &(0x7f0000000580)) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180)) execve(0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r1 = socket$inet6(0x1c, 0x3, 0x7) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sendto$inet(r2, 0x0, 0x0, 0x101, &(0x7f0000000240)={0x10, 0x2, 0x2, @multicast2}, 0x10) setsockopt$inet6_int(r1, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r1, 0x0, 0x0, 0xffff0000, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="fff71fdcedff000080009e000000e216", 0x3}, 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r3, 0x80000002, &(0x7f0000000040)="e2", 0x1, [], 0x1, 0x5, 0xfffffffc, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int=0xe, @tid=r0}}) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') 7.822659962s ago: executing program 1 (id=238): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x6, 0x20411, 0xffffffffffffffff, 0xfffffffc) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() pipe2(0x0, 0x0) aio_waitcomplete(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket(0x10, 0x2, 0x0) sigaction(0x2c, &(0x7f0000000200)={0x0, 0x35, {[0xfffff801, 0xa2, 0xfdffffff]}}, 0x0) syz_emit_ethernet(0xe2, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x1480200, 0x1f6) syz_emit_ethernet(0x7e, &(0x7f0000000280)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "0400", 0x48, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0xfd, '\x00', {0x0, 0x6, '\x00', 0x0, 0x70, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @ipv4={'\x00', '\xff\xff', @multicast1}, [@routing={0x70, 0x2, 0x0, 0x8, 0x0, [@local={0xfe, 0x80, '\x00', 0x0}]}]}}}}}}}) r0 = socket(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x5, &(0x7f0000000140)={0x10, 0x2, 0x3, @remote={0xac, 0x14, 0x0}}, 0x10) sendto(r0, &(0x7f0000000180)="8e741440cbec08ded2c5eca7d3d5098a1eeb19d5f95476270256fe6ccc554d0112981bdcc2c23a064b7da59f4fd0571e7cbd32f04f51420be57ceeaf74a083211a0a9f05174fc729688ccbe3732a6e005c5c302016acb744e9dfb32375be2b2e0147b6bad4ca2bff6ab6", 0x6a, 0x20005, &(0x7f0000000200)=@in={0x10, 0x2, 0x3, @loopback}, 0x10) munmap(&(0x7f000000f000/0x2000)=nil, 0x2000) lio_listio(0x1, &(0x7f0000000080)=[{0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0, [0x9c, 0x7], 0x5, 0x1, 0x80009, {0x0, 0x8, 0x0}, {0x1, 0xe, @sigval_ptr=0x6, @ke_flags=0x82}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x82, 0x10000], 0x6, 0x4, 0x8001, {0x3, 0x10000007, 0x0}, {0x1, 0x1, @sigval_int=0x8, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0x2, 0x0, 0x0, [0x9, 0x40], 0x3, 0x6, 0x1, {0x7f, 0x2, 0x0}, {0x3, 0x10, @sival_ptr=0xffffffff, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0xd, 0x0, 0x0, [0x0, 0xfffeffdc], 0xcbbb, 0x20, 0x8057, {0x8, 0xec, 0x0}, {0x3, 0x1a, @sival_int=0xec1f, @thr={0x0, 0x0}}}], 0x4, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x5) rfork(0x83000) socket(0x1c, 0x1, 0x0) open$dir(0x0, 0x0, 0x0) 7.09006958s ago: executing program 3 (id=239): r0 = open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$sock_int(r1, 0xffff, 0x1023, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) mkdir(0x0, 0x0) r3 = socket(0x1c, 0x2, 0x0) ioctl$DIOCNATLOOK(0xffffffffffffffff, 0x8008745b, &(0x7f00000003c0)) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000100)=@in={0x10, 0x2, 0x2, @rand_addr=0x7}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x10145}, 0x0) setuid(0xee01) socket$inet6(0x1c, 0x2, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x2a, 0x0, 0x20, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x400, 0xfdffff85, [0x0, 0x3, 0x9]}) ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f0000000240)={0x0, 0x2, 0x2, 0x3, &(0x7f0000000100), 0x0, &(0x7f0000000580), &(0x7f00000001c0)}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_emit_ethernet(0x5e, &(0x7f0000000480)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x28, 0x3a, 0xff, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@ndisc_redir={0x89, 0x0, 0x0, '\x00', @mcast1, @empty}}}}}}) r5 = socket(0x1c, 0x1, 0x0) eaccess(&(0x7f0000000040)='./file/file0/../\x00', 0x0) ioctl$EFIIOC_VAR_NEXT(0xffffffffffffffff, 0xc0244505, 0x0) openat$crypto(0xffffff9c, &(0x7f0000000140), 0xedb6ff2617a54ad9, 0x0) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x80, 0x0) ioctl$CIOCGSESSION2(r6, 0xc030636a, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) clock_nanosleep(0x0, 0x0, &(0x7f00000000c0)={0x5fdd8493, 0xfffffff9}, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) sendmsg$inet_sctp(r2, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000000)="02161dd50200000000000000", 0xc, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x400) 5.039813035s ago: executing program 0 (id=240): open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r0 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x101) r1 = socket(0x1c, 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x17, &(0x7f0000000100)=0x2, 0x4) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)="76e5eac907f9ccf7a251ceddcec7d6aa45cffe2c63a56077123a276d3ba4e9d17eb3eb5db12a3783a8e0620d357de1fe04fa9465b5bd1286e9624dec06a00c222f", 0x41}], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='.\x00') open(&(0x7f0000000100)='./file0\x00', 0x180000, 0x80) r4 = dup2(r3, r3) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f00000000c0)={0x0, 0x13, 0x0, 0x0, 0x0, &(0x7f0000000040), 0x0, 0x4d46b76e}) ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xa3f, &(0x7f00000000c0), 0x0, 0x0, 0x0}) setsockopt$inet_int(r2, 0x0, 0x2, &(0x7f0000000040)=0x2, 0x4) ioctl$DIOCNATLOOK(0xffffffffffffffff, 0x8008745b, &(0x7f00000003c0)) socket(0x1c, 0x4, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x1aa, &(0x7f0000000cc0)=ANY=[@ANYBLOB]) eaccess(0x0, 0x2) socketpair(0x0, 0x0, 0x0, 0x0) mount(&(0x7f0000000000)='cd9660\x00', &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x0) statfs(&(0x7f0000000240)='./file/file0/../\x00', 0x0) r5 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000140), 0x100004) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) 5.037684964s ago: executing program 3 (id=241): aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = open(0x0, 0x2, 0xfffffffffffffffc) sysarch$I386_SET_LDT(0x1, &(0x7f0000000700)={0x2, &(0x7f00000003c0)=[{0x10001}, {0x2}, {0x85d4}, {0xfffffffffffffff5}, {0x3ff}, {0x10001}], 0x6}) ftruncate(r2, 0x100000) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) sendmsg$inet_sctp(r1, 0x0, 0x0) aio_return(0x0) getsockopt$inet6_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000000440)={r3, 0x9, 0x0, 0x4112, 0x4}, &(0x7f0000000100)=0x18) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = openat$md(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) sendto$unix(r2, &(0x7f0000000640)="e80d50b6f14a062fe3a0577d05368b17db25c9b389b2f5e3ebec3b0394fa9cf15aa7edf60ac457510efa620a3e0d2c95a6da0f4881c629339555d2836b99a96e75d446935a4c8c1b800eb189618778f58b0f3c9e63358700cd663e778367a8109fd2d8a891c48a3834b3df80ea61ce0ce5b9415bc6a8705792bfd110759917c35d51dc76b191ef7d9c95", 0x8a, 0x4, 0x0, 0x0) ioctl$MDIOCATTACH(r6, 0xc1b46d00, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x4, 0x1, 0x4, 0x0, 0xc00, 0x3a632ebe, 0x0, [0x1, 0x2, 0x0, 0x0, 0x0, 0x800000, 0x2000, 0x0, 0x4000, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x430, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000001, 0x0, 0xfffffffc, 0x10000, 0x0, 0x0, 0x0, 0xe467, 0x1ff, 0x0, 0x8, 0x800, 0x1, 0x0, 0x80000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x8, 0x0, 0x4000, 0x0, 0x0, 0x4, 0x0, 0x73b849a, 0xfffffffd, 0xfffffffe, 0x4000, 0x0, 0x1, 0xfffffffc, 0x0, 0xffffffff, 0x0, 0x0, 0x7, 0x6, 0x0, 0x62c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x7]}) listen(r5, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) r7 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, &(0x7f00000004c0)={0x8, 0x3, 0x7, 0x8, 0x0, 0x0, &(0x7f0000000380)="cb53d53efe29b13dc3bc9f1e8c879e376c62cee5", 0x0}) setsockopt$sock_linger(0xffffffffffffffff, 0xffff, 0x80, &(0x7f0000000740)={0x2, 0x8}, 0x8) ioctl$CIOCGSESSION2(r7, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x10, &(0x7f0000000100)="ec7b0000000000000001f0a5a2519798", 0x0, 0x0, 0x0, 0xfdf9ff85, [0x0, 0x1, 0x20000]}) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(r4, 0x84, 0x103, &(0x7f0000000580)={r3, 0x92, "f88f14bb219a5f537ea30e89f6a64c9f999d71a738f586caaf1caf1227cf9e30eedb45215068d156825f15669ab95278bc8d8502bc919fb0c963a9c6c956d43d8b45feb929dad00fcd21f1ae4b036597ae91f56f1d10d3b3ded8a11b58e96ccca91d8ba5bae3798071e10535d5fc1bf2561c81e65543ef802f8e9f5468ab066d61a88f5b1e1cc07a54556b66548e1a779140"}, &(0x7f0000000400)=0x9a) semget$private(0x0, 0x0, 0x286) ioctl$CIOCCRYPT(r7, 0xc01c6367, &(0x7f0000000000)={0x0, 0x2, 0x0, 0xb3, &(0x7f0000000300), 0x0, &(0x7f0000000140), &(0x7f00000000c0)}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sendmsg$inet_sctp(r2, &(0x7f0000000300)={&(0x7f0000000540)=@in={0x10, 0x2, 0x2, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x203c1}, 0x18c) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) 270.024765ms ago: executing program 1 (id=242): syz_emit_ethernet(0x4e, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) r1 = openat$bpf(0xffffff9c, &(0x7f0000000380), 0x1, 0x0) ioctl$BIOCSETF(r1, 0x80084267, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x16, 0x1, 0x51, 0x3}]}) r2 = socket(0x1c, 0x1, 0x0) getsockopt$inet_mreqn(r2, 0x0, 0xc, &(0x7f00000000c0)={@multicast1, @remote}, 0x0) r3 = kqueue() r4 = socket(0x2, 0x3, 0x0) close(r4) r5 = socket$inet6(0x1c, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000480)={0x1c, 0x1c, 0x1, 0x5, @loopback, 0x8}, 0x1c) setsockopt$sock_int(r4, 0xffff, 0x1001, &(0x7f0000000100)=0x20000, 0x4) write(r4, &(0x7f0000001680)="04bdfa5d1d2873c63e3534825ba166e2fea9aec43050006123339a346f731573d8d508753f95b7688ad48b8cf6bbca325cebc37fc4e1dd543dbe2da6dd", 0x1001c) fstatfs(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) kevent(r3, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x4, 0x88f]}], 0x1, 0x0, 0x0, 0x0) r7 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$CIOCGSESSION2(r7, 0xc030636a, &(0x7f0000000080)={0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0xfdffff85, [0x0, 0x1]}) kevent(r3, &(0x7f00000016c0)=[{0x1, 0xfffffffffffffffb, 0xc053, 0x10, 0xfffffffffffffff5, 0x65, [0x92d, 0x3, 0x100]}], 0x1, 0x0, 0x0, 0x0) r8 = socket(0x11, 0x3, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000740), 0x0, 0x0, 0x0, 0x0) accept4$inet(0xffffffffffffffff, &(0x7f0000000180)={0x10, 0x2, 0xffffffffffffffff, @multicast2}, 0x0, 0x20000000) fspacectl(0xffffffffffffffff, 0x1, &(0x7f00000003c0)={0x0, 0xfff}, 0x0, &(0x7f0000000440)) getsockopt$inet_buf(r4, 0x0, 0x4a, &(0x7f0000000200)=""/133, &(0x7f00000002c0)=0x85) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r9, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="10000000ffff000001000000", @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=r7, @ANYRES32, @ANYRES32=0x0, @ANYRES64=r3, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYBLOB="10000000ffff000001000000"], 0x80}, 0x114) bindat(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=@in={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10) getsockopt(r8, 0x8, 0xa77, &(0x7f0000000300)=""/104, &(0x7f0000000380)=0x68) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 0s ago: executing program 2 (id=244): r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) fchmodat(r0, &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x38, 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f0000000100)='.\x00', 0x0, 0x0) aio_waitcomplete(0x0, 0x0) symlink(&(0x7f0000000580)='.\x02/file1\x00', &(0x7f00000002c0)='.\x02\x00') sigaction(0x9, &(0x7f0000000240)={0x0, 0x6, {[0x2, 0x4f, 0xfc5, 0x80]}}, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open$dir(&(0x7f0000000980)='./file0\x00', 0x40000, 0x0) r2 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r3, r2, &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20000410) r4 = openat$md(0xffffff9c, &(0x7f0000000080), 0x4, 0x0) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000009c0)={0xfffffff0, 0x7f, 0x0, &(0x7f0000000340)='.\x02\x00', 0xfffffffffffffffa, 0xf, 0x8, 0x8, 0x4, 0x1ff, &(0x7f0000000300)='\x00', [0x3, 0x200, 0xfffffffc, 0x4, 0x4, 0x9, 0xed, 0x6c6740c0, 0x2, 0x5, 0xb, 0x29, 0x6, 0x80000000, 0xfffffff9, 0x0, 0x9, 0xfffffffd, 0x3, 0x8, 0x3d2, 0x80000001, 0x2, 0x1000, 0x3, 0x7ff, 0xe3d6, 0x9, 0xb5, 0x5000, 0xe4a0, 0x3ff, 0x803, 0x10, 0x2b74, 0x4, 0x81, 0x81, 0x7, 0x6, 0x3, 0x3, 0xa69, 0x2, 0x6, 0x7, 0x8, 0x7, 0x3, 0xffffffff, 0x3, 0xfffffffc, 0x79, 0x10001, 0x7d8, 0x4, 0xe01, 0x1, 0x7, 0x0, 0xd8, 0xc, 0x5787e3ff, 0x6, 0x0, 0x1, 0xc, 0x4, 0x9, 0xdf59, 0x0, 0x62d1, 0x8, 0xd, 0x9, 0x9, 0xfff, 0xffff, 0x2, 0x0, 0x3, 0xe23d, 0x8, 0xd69, 0x871, 0x80000000, 0x11, 0x1, 0xb, 0x9, 0x5, 0x2, 0x1, 0x76, 0x2, 0x8]}) bind$inet(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000001740)={0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}, 0x10) openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) rfork(0x3060) r5 = kqueue() kevent(r5, &(0x7f0000000200)=[{0x3, 0xffffffffffffffff, 0x1, 0x20000000, 0x0, 0x0, [0x0, 0x9]}], 0x1, 0x0, 0x0, 0x0) rmdir(0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='.\x00', 0x80000049, &(0x7f0000000080)) r6 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x2000, 0x0) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1\xa9\xb8R\x96\x7f\xbf\xcaV\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.230' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe005859a800 if_delmulti_locked: detaching ifnet instance 0xfffffe005859b800 Oct 7 16:59:44 ci-freebsd-i386-2 kernel: arp: from aa:aa:aa:aa:aa:bb: addr len: new 0, i/f 6 (ignored) Oct 7 16:59:44 ci-freebsd-i386-2 kernel: attempted source route from 224.0.0.2 to 172.20.0.187 Oct 7 16:59:45 ci-freebsd-i386-2 kernel: arp: from aa:aa:aa:aa:aa:bb: addr len: new 0, i/f 6 (ignored) md0: truncating fractional last sector by 3 bytes Oct 7 16:59:50 ci-freebsd-i386-2 kernel: attempted source route from 224.0.0.2 to 172.20.0.187 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe0059935dc0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371c560 usecount 6, writecount 5, refcount 69 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0054138c98 ref 1 pages 536 cleanbuf 64 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe005412f780 (pid 896, syz-executor, tid 100296) nlink=1, effnlink=1, size=2147483650, extsize=0 generation=8e56349, uid=0, gid=0, flags=0x48008 ino 105, on dev gpt/rootfs vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe005968b000: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371c560 usecount 6, writecount 6, refcount 9 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00540ecc98 ref 3 pages 56 cleanbuf 4 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe0054141000 (pid 917, syz-executor, tid 100326) with shared waiters pending nlink=1, effnlink=1, size=2147483650, extsize=0 generation=ed2c9c53, uid=0, gid=0, flags=0x4 ino 99, on dev gpt/rootfs vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe005968b000: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371c560 usecount 0, writecount 0, refcount 25 seqc users 0 hold count flags () flags (VIRF_PGREAD|VI_DOINGINACT|VMP_LAZYLIST) v_object 0xfffffe00540ecc98 ref 0 pages 184 cleanbuf 20 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe0054142000 (pid 917, syz-executor, tid 100323) nlink=1, effnlink=1, size=2147483650, extsize=0 generation=ed2c9c53, uid=0, gid=0, flags=0x4 ino 99, on dev gpt/rootfs Expensive callout(9) function: 0xffffffff814963c0(0xfffffe006ddef000) 0.004473383 s if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 vnode_pager_putpages: zero-length write at 0 resid 2002 0xfffffe00777b4528: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371c560 usecount 2, writecount 2, refcount 3 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00541062e8 ref 1 pages 1 cleanbuf 1 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe005412e000 (pid 936, syz-executor, tid 100355) nlink=1, effnlink=1, size=2002, extsize=0 generation=6a8556ea, uid=0, gid=0, flags=0x4 ino 109, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe005859b800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f6000 vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe00777b51b8: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371c560 usecount 5, writecount 4, refcount 69 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0054171d90 ref 1 pages 536 cleanbuf 64 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe005417a000 (pid 989, syz-executor, tid 100459) nlink=1, effnlink=1, size=2147483650, extsize=0 generation=1e1f4bdc, uid=0, gid=0, flags=0x48008 ino 152, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe005859b800 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe00077f6800 ZFS filesystem version: 5 ZFS storage pool version: features support (5000) Expensive callout(9) function: 0xffffffff81a5f700(0xfffffe0077975000) 0.005262354 s if_delmulti_locked: detaching ifnet instance 0xfffffe00077f6800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f6000 SYZFAIL: clone failed (errno 12: Cannot allocate memory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=0 req=240 state=1 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-2.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl