last executing test programs: 24.80827943s ago: executing program 1 (id=40): r0 = semget$private(0x0, 0x4000000009, 0x12) semop(r0, &(0x7f0000000000)=[{0x3, 0x3, 0x1000}, {0x1, 0x19, 0x800}, {0x4, 0x2007}, {0x1, 0x7ffd}], 0x4) unlinkat(0xffffffffffffffff, &(0x7f00000018c0)='./file0\x00', 0x800) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000100), 0x10000, 0x0) ioctl$MDIOCQUERY(r1, 0xc1c06d02, &(0x7f0000000580)={0x0, 0x2, 0x3, 0x0, 0x0, 0x1, 0x400, 0x2, 0x8, 0x7ff, 0x0, [0x7, 0x4, 0x3, 0x2, 0x6, 0x1, 0x1, 0x5, 0x1, 0xb6, 0x0, 0x9a2, 0x9, 0x0, 0x10, 0x172, 0x5, 0x6, 0xa770, 0x3, 0x7ff, 0x0, 0xfffff6de, 0xb, 0xe0, 0x5, 0x63a, 0x14e5, 0x80000001, 0x7, 0x8, 0x5, 0x1, 0x4, 0x8, 0xffffffff, 0x4, 0x25, 0x2, 0x8, 0x10001, 0x6, 0x401, 0x8, 0x8, 0x2, 0x834, 0x19, 0x4, 0x10, 0x81, 0x9, 0x4, 0x0, 0xa55, 0x5, 0x7, 0x200, 0xa, 0x1, 0xce65, 0x80000001, 0x7, 0x2, 0x1, 0x6, 0x7, 0x780, 0x0, 0x5, 0x0, 0x6, 0x7fff, 0xbc, 0x4, 0x10100, 0xe21c, 0x5, 0x80000000, 0x3, 0x10001, 0x576, 0x7, 0xb896, 0x5, 0x4000001, 0x1, 0x5, 0xfe10, 0x46db, 0x57, 0x5, 0x33b, 0xfffffffa, 0x1, 0x3]}) semget(0x0, 0x2, 0x408) cpuset_getaffinity(0x2, 0x2, 0x3, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_writev(&(0x7f00000001c0)={0xffffffffffffffff, 0x5, &(0x7f0000000140)="3e6e286303596ad4dbcf8b3a66b81cda1b3a213bd90f356e1f7511a3169f4eefcd9c360dae65440d0e35d9e6fe3a16", 0x2f, [0x10000, 0x3], 0xfffffff7, 0x1, 0x453c, {0xc3de, 0x10000, 0x0}, {0x2, 0x3, @sigval_int=0x9, @ke_flags=0x40}}) cpuset_setaffinity(0x1, 0x7, 0x7, 0x0, 0x0) r2 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r2, 0x29, 0x27, 0x0, 0x0) close(0xffffffffffffffff) r3 = dup2(r2, r2) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000000)={0x2, 0x7, 0x0}, &(0x7f0000000040)=0xc) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x901, &(0x7f0000000080)={r4, 0xfc00, 0x1, [0x1]}, 0xa) 24.752695467s ago: executing program 1 (id=41): r0 = socket(0x17, 0x1, 0x7) setsockopt$inet_sctp_SCTP_BINDX_REM_ADDR(r0, 0x84, 0x8002, &(0x7f0000000340)=@in={0x10, 0x2, 0x2}, &(0x7f0000000380)=0x10) madvise(&(0x7f0000580000/0x2000)=nil, 0x2000, 0x7) rfork(0x1000) getsockname(r0, 0x0, &(0x7f0000000040)) munlock(&(0x7f0000581000/0x4000)=nil, 0x4000) thr_new(&(0x7f00000002c0)={&(0x7f0000000080)="c4e2e590b4b965566666660f38108a07d64da30f0f24e500000080b40f85faffffffc4c2a928a2000000003e7e0066d2b0aa000000c4c12d5da3ae1932fa672ef20f10f5f74e0f00000000", 0x10000000, &(0x7f0000000100)="e3a369089d544e4edff4a43135c3f3b3db53b4882f4320fb027da125e7ee7169b7261c9e48509b6b5ce3c34a02a6cf739ebf4f294201092a2199645d4e0a35d49fa7e4609c445e284941c0e993dff7b23feb951d8e318e9bbde5768ca1a3d28789dbc25a9a27d5b0e468d6da7988d140cf057163c6150c1226f790ab8b5518f631525de6bc8212f62beb0ef73fef02e06b17550d7cef26e6e3a832a1f645", 0x9e, &(0x7f00000001c0)="541055552d19974da3aa3d6280706f57a9405d0579127dcfc156109bb1baa7db8679fa92c07802466656ec137b774ecf04566565952fe8d87a90cef91a9a701a364588e39a4199af57", 0x49, &(0x7f0000000000), &(0x7f0000000240)={0x0}, 0x3, &(0x7f0000000280)={0x2, 0x1e}, [0x3d41, 0xa, 0x2]}, 0x3c) rtprio_thread(0x0, r1, &(0x7f0000000300)={0x3, 0xf}) syz_emit_ethernet(0x22, &(0x7f0000000340)={@random="5dee02f6d0b7", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x1, 0x0, 0x0, 0x6c, 0x0, @rand_addr=0x7, @multicast1}}}}}) socket(0x1c, 0x10000000, 0x6) 24.752290803s ago: executing program 1 (id=42): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x40000, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000"]) aio_waitcomplete(0x0, 0x0) statfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000ec0)) open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) extattr_get_link(&(0x7f00000001c0)='./file0\x00', 0x1, &(0x7f0000000200)='}&@][{\',\x00', 0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180)) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2010c, &(0x7f0000000300)={0x1c, 0x1c, 0x3, 0x1, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) openat$bpf(0xffffff9c, 0x0, 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) rename(&(0x7f0000000640)='./file1/../file0\x00', &(0x7f0000000600)='./file0/file0/file0/file0\x00') extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') syz_emit_ethernet(0x4e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaa3aff000000400000600000000000ee00000600000000000000ee00000187019078000000ef0000000000000000000000000e00d1ce0000000000"]) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) 23.52994095s ago: executing program 1 (id=47): mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) mlockall(0x1) truncate(&(0x7f0000000040)='./file0\x00', 0xaa481) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1, &(0x7f0000001180)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x3, @loopback}, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r1 = __specialfd$inotify(0x2, &(0x7f00000007c0)={0x100000}, 0x4) inotify_add_watch_at(r1, 0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x615, 0x0) r3 = socket(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) sendto(r3, &(0x7f00000002c0)="8a74ae8f0b73df9f469c1ddac445d735b07f08c68187f8c2", 0x2800, 0x20005, 0x0, 0x0) ftruncate(r2, 0x107d2) open$dir(&(0x7f00000000c0)='./file1\x00', 0x80201, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) rename(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000180)='./file1\x00') connect$inet(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) fstat(0xffffffffffffffff, &(0x7f0000000540)) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) 22.349589398s ago: executing program 1 (id=54): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000"]) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000180)='./file1\x00', 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') chmod(&(0x7f0000000180)='./file0\x00', 0x23f) r2 = socket(0x1, 0x5, 0x0) close(r2) socket(0x11, 0x3, 0x0) setsockopt$sock_int(r2, 0xffff, 0x1002, &(0x7f0000000180)=0xff, 0x4) kmq_unlink(&(0x7f0000000200)='./file1\x00') execve(0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) 21.30272138s ago: executing program 1 (id=60): ppoll(0x0, 0x0, &(0x7f0000000200)={0x100005, 0x7}, &(0x7f0000000240)={[0x841b, 0x2, 0x4003, 0x80000000]}, 0x10) socket(0x1c, 0x20000000, 0x0) extattr_set_file(&(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x0) setegid(0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x0, 0x88f]}], 0x1, 0x0, 0x0, 0x0) pread(0xffffffffffffffff, 0x0, 0x0, 0x21a) r1 = socket(0x1c, 0x5, 0x0) socket$bt_l2cap(0x24, 0x3, 0x87) r2 = socket(0x26, 0x2, 0x0) bind(r2, &(0x7f0000000040)=@in6={0x22, 0x1c, 0x3, 0x0, @mcast1}, 0xc) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @remote={0xac, 0x14, 0x0}, @broadcast, @local={0xac, 0x14, 0x0}}}}}) recvfrom$inet(r2, 0x0, 0x0, 0x81, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) freebsd10_pipe(&(0x7f00000005c0)) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x2, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r3, &(0x7f0000000140)="4b420055bfb403f04ef8f6ebbb5a59f3f11b820796181cdff7763f0361a5d88f694eb55da3194702e0afdfec22c53982452e3fdc3c8c1aa6998c1f866df1277653fe5993af6acbc81d2bc0", 0x4b, 0xf8c14ce03ad0efbc, &(0x7f0000001200)={0x10, 0x2, 0x1, @multicast2}, 0x10) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r5 = socket(0x11, 0x3, 0x0) sendto$unix(r5, &(0x7f0000000200)="b10005019000e80348031bc75786ca900f0e08fecea11ea8fef96ebd67bd002f01b1fa62d416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872bab00b770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a300a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x0, 0x0, 0x0) 10.561474805s ago: executing program 2 (id=83): mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) mlockall(0x1) truncate(&(0x7f0000000040)='./file0\x00', 0xaa481) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1, &(0x7f0000001180)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x3, @loopback}, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r1 = __specialfd$inotify(0x2, &(0x7f00000007c0)={0x100000}, 0x4) inotify_add_watch_at(r1, 0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x615, 0x0) r3 = socket(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000100)=""/31, 0x1f}], 0x1) ftruncate(r2, 0x107d2) open$dir(&(0x7f00000000c0)='./file1\x00', 0x80201, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) rename(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000180)='./file1\x00') connect$inet(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) fstat(0xffffffffffffffff, &(0x7f0000000540)) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) 9.04372401s ago: executing program 0 (id=85): truncate(&(0x7f0000000080)='./file0\x00', 0x80008) cap_fcntls_get(0xffffffffffffffff, 0x0) sync() thr_suspend(0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, 0x0, 0x0) syz_emit_ethernet(0x1000e, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100000, 0x0) open$dir(0x0, 0x200, 0x72) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, 0x0) rfork(0x4) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f00000006c0)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r1 = __specialfd$inotify(0x2, &(0x7f00000001c0)={0x100000}, 0x4) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') r2 = open$dir(&(0x7f0000000040)='.\x00', 0x8, 0x10) symlinkat(&(0x7f0000000dc0)='./file0\x00', r2, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') inotify_add_watch_at(r1, r2, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x25000430) truncate(&(0x7f0000000440)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x7f) mount(&(0x7f0000000200)='ufs\x00', 0x0, 0x0, &(0x7f0000000140)) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[0x0], 0x0) cpuset_getaffinity(0x3, 0x3, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x2a, 0x0, 0x20, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x9]}) ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x3fb, &(0x7f0000000800)="ff8c898646396880cbab0b53be54ed1603891091fbc12640764bec4632c2c9189535aa7b90a77e15d33ea17080b68890d2e5dc6c899b6a00669a585b883eef82b9f0221779a49bec5c39e92b43b50ecc3fa8b34696018438d5f3be24702b951687dc609137faedbc80669bd036812b86f460819b6a14c2534bee7f38e7d9755d8244727ff8c74f4af8c6cddbb5bd47a40285902fcbd0e024ea0fb5f0fa33d50d0664634c39e5f1d9e0edb2a8f43a8ddf0643a6841932d6d211e02a9d", 0x0, 0x0, &(0x7f00000005c0)="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"}) extattr_list_file(&(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 9.042535803s ago: executing program 3 (id=86): setpriority(0x1, 0x1, 0x151d) (async) symlink(&(0x7f0000000300)='./file0/file0/..\x00', &(0x7f0000000140)='./file0\x00') aio_waitcomplete(0x0, 0x0) (async) r0 = openat$filemon(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) sendto(r1, &(0x7f0000000600)="0814883b798a67b633dd655bfa79db05a408668b60cf56793771929bc45ba2e1ffb0bddc394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c805923deb54e2461942717d99412d0900000000000000a3bb877a4446b3ba0c0000000000000000000c518aa070bd6d7e8c0e4bc369b3342b4e611914a93490835eab1003c1611c74a63c91f788cced0060e576192e5688da48789db7d76b584b0d04287dfba679e14a1454382a1a98d8e1d30a4ec7cd464cd7d54da0809b7889bde3af33557dd6cb35ee51d65df33a8f3353de1760fefe03ce81", 0xf2, 0xf, 0x0, 0x0) (async) setsid() (async) ioctl$FILEMON_SET_PID(r0, 0xc0045302, &(0x7f00000002c0)) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) ioctl$FILEMON_SET_FD(r0, 0xc0045301, &(0x7f0000000000)=r2) (async) r3 = open$dir(&(0x7f0000000340)='.\x00', 0x20000, 0x0) openat(r3, &(0x7f0000000080)='./file0\x00', 0x200, 0x61) r4 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) socket(0x1c, 0x10000000, 0x6) (async) pwritev(r4, &(0x7f00000001c0)=[{&(0x7f0000000480)="11b971ea0ba3c3094c8ef03f186c3b0a684510fe08fc57b130d9f50151caa3e9aee9ea0f2014fe0525b0b8a94b27a940c349c87ae9f3f6d83014a44c3fead5e890cca50f78dc3acd9358aadff373d857269055685e56ca21a0cb8c5da9a8c19ac2c4a20b5f732b2808c4990c25ec316d9fac26b438ae48089e7580613ae40efd0bc3913a008d7ca101abdeba5bee118bde54dc2a085795b6bf8dae82ed81bc38df8f1faecf53a22038185f55b08a153bc994f2c33ae23929ce83054ff6d9e1276cb5e3cfd668ea4aa32a0e2fb2ad6070c342fb6fd2691f84f16a2d41b0f9c51be6d75e5404b1d4ca7556630039a8d7799c958e459be4", 0xf6}, {&(0x7f0000000240)="3ec53d740e7087c156b837a8955f501791184498d18009a470a81068b24d69a7bea699d4ec046b4153a37b1b6d459c10939d421057b4c18d3faffa069fb36db9b5f58ab30741a188bbd0966735259f647f51041315a6cec1092277020f", 0x5d}, {&(0x7f0000000700)="730ede00f32395341f328cb45a9b952bc5babdd4206986206d06819002561d34594e3a7ce259affaaef7e91eece37456ff8f950b6f74915bb7d394fc62aaf1473d3cd54228db12ecc4cbf5595fe070ff382a655959da0846e4b89caa76cd846a4d6c977fcb23ee1d9c", 0x69}, {&(0x7f00000007c0)="07298501a4d1a5d091516ae54f641625533eb67f917ce48da6e7efa4162112d0d068225373895af2a4cbd225e0f0fd6b96127e3681f90d9f4369cf042fc19aa2277098c9553a55956b3193bff2abd308358ba7bf68c757bee1f4f0ff0b4d93afd269c2997f52dc36eb7a572cb438a4d0c537c0c054e68374e4b5b473daeeed09a29e2b03ce146e33694a97", 0x8b}], 0x4, 0x24) (async) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) select(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, &(0x7f0000001900)={0x800000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1}, &(0x7f0000000440)={0x8}) (async) chroot(&(0x7f0000000080)='./file0/file0/..\x00') (async) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) (async) freebsd10_pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) open$dir(&(0x7f0000000200)='./file0\x00', 0x4, 0x180) r7 = kqueue() kevent(r7, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x8001, 0x400, 0x0, 0x1}], 0x1, 0x0, 0x0, 0x0) freebsd10_pipe(&(0x7f00000005c0)) (async) close(r5) freebsd11_lstat(&(0x7f0000000100)='./file0\x00', 0x0) (async) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 7.441121483s ago: executing program 0 (id=87): mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) truncate(&(0x7f0000000340)='./file0/file0\x00', 0xaa480) pipe2(&(0x7f0000000040), 0x100000) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) syz_emit_ethernet(0x5e, &(0x7f0000000680)={@random="73b9ccc300", @random="00f7000400", [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x28, 0x3a, 0x0, @rand_addr="fef0372e0865911feb7ee80000008000", @mcast2, {[], @icmpv6=@ndisc_redir={0x89, 0x0, 0x0, '\x00', @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, @mcast1}}}}}}) fork() socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000), 0x0) aio_waitcomplete(0x0, 0x0) openat$crypto(0xffffff9c, 0x0, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[], 0x100}, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1, 0x2, 0x4) r1 = openat$bpf(0xffffff9c, &(0x7f0000000380), 0x1, 0x0) syz_emit_ethernet(0xfcb0, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x2c, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0xa7, 0x0, 0x0, {[@window={0x3, 0x3, 0x1}]}}}}}}}) socket$inet6_udp(0x1c, 0x2, 0x0) r2 = socket(0x11, 0x3, 0x0) sendto$unix(r2, &(0x7f0000000040)="b100050400000000000008000501000000000000cea1fea7fef96ecfc73fd335ca087ae27caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebb4257699a1f132e27acbdd602000d7d026ba8af63ff37282902e4fd007f720fd3873babfbb770a2f5a872c881ff7cc53c8943310b404f36a00f90006ee01bc43eaea8c500000002000000000000020208a371a3f8000400000000000000010000000000000010", 0xb1, 0xc, 0x0, 0x0) ioctl$BIOCSETWF(r1, 0x8008427b, &(0x7f0000000400)={0x1ffffffffffffed1, &(0x7f00000001c0)}) socket$inet6(0x1c, 0x3, 0x0) open$dir(&(0x7f0000000800)='./file0\x00', 0x40000400000002c2, 0x1c0) setreuid(0xee00, 0x0) getuid() freebsd11_stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240)) select(0x40, &(0x7f0000000080)={0x3, 0xb95, 0x4, 0x101, 0x1, 0x5, 0x32d1bb00, 0x6}, &(0x7f00000001c0)={0x6, 0xaa, 0x0, 0x8, 0x8, 0x5, 0x6}, 0x0, &(0x7f0000000240)={0x9d03, 0x2}) 7.440249416s ago: executing program 2 (id=88): truncate(0x0, 0x80008) cap_fcntls_get(0xffffffffffffffff, 0x0) sync() thr_suspend(0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, 0x0, 0x0) syz_emit_ethernet(0x1000e, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100000, 0x0) open$dir(0x0, 0x200, 0x72) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4, &(0x7f0000002dc0)={0x10, 0x2, 0x2, @multicast2}, 0x10) rfork(0x4) open(&(0x7f0000000380)='./file0\x00', 0x80000000000206, 0x4ebfac6bbaf7949) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f00000006c0)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r1 = __specialfd$inotify(0x2, &(0x7f00000001c0)={0x100000}, 0x4) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') r2 = open$dir(&(0x7f0000000040)='.\x00', 0x8, 0x10) inotify_add_watch_at(r1, r2, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x25000430) truncate(&(0x7f0000000440)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x7f) mount(&(0x7f0000000200)='ufs\x00', 0x0, 0x0, &(0x7f0000000140)) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[0x0], 0x0) cpuset_getaffinity(0x3, 0x3, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x2a, 0x0, 0x20, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x9]}) ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x3fb, &(0x7f0000000800)="ff8c898646396880cbab0b53be54ed1603891091fbc12640764bec4632c2c9189535aa7b90a77e15d33ea17080b68890d2e5dc6c899b6a00669a585b883eef82b9f0221779a49bec5c39e92b43b50ecc3fa8b34696018438d5f3be24702b951687dc609137faedbc80669bd036812b86f460819b6a14c2534bee7f38e7d9755d8244727ff8c74f4af8c6cddbb5bd47a40285902fcbd0e024ea0fb5f0fa33d50d0664634c39e5f1d9e0edb2a8f43a8ddf0643a6841932d6d211e02a9d", 0x0, 0x0, &(0x7f00000005c0)="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"}) extattr_list_file(&(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 7.439983637s ago: executing program 3 (id=89): openat$bpf(0xffffff9c, &(0x7f0000000040), 0x200, 0x0) r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) socket(0x1c, 0x1, 0x0) futimesat(r0, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000100)={{0x6, 0x5}, {0x7, 0x3}}) socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x30) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x3}) mlockall(0x1) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) munlock(&(0x7f0000079000/0x3000)=nil, 0x3000) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() open$dir(0x0, 0x4, 0x2) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom(r2, 0x0, 0x0, 0x860, 0x0, 0x0) socket$inet6(0x1c, 0x2, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCCRYPT(r3, 0xc01c6367, &(0x7f0000000000)={0x0, 0x2, 0x4, 0x3, &(0x7f0000000340), 0x0, &(0x7f0000000340), &(0x7f0000000140)}) ioctl$KDGETMODE(r1, 0x40046676, 0x22dffffc) r4 = socket$inet(0x2, 0x1, 0x0) listen(r4, 0x14040000) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x30, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x8001ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0xa7, 0x0, 0x0, {[@window={0x3, 0x3, 0x6}, @mss={0x2, 0x4, 0x5754}]}}}}}}}) socket(0x1c, 0x1, 0x0) r5 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x8, &(0x7f0000000000)=0x9, 0x4) bind$inet(r5, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) connect$inet(r5, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) 5.731744186s ago: executing program 0 (id=90): r0 = socket$inet6(0x1c, 0x3, 0x23) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x0, @loopback={0x4}, 0x2}, 0x1c) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r1 = socket(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000080)=0xb, 0x4) setsockopt$inet6_tcp_TCP_FASTOPEN(r1, 0x6, 0x401, &(0x7f0000000100)={0x2, ' \x009\t\x00'}, 0x14) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0xaa) fcntl$setstatus(r2, 0x4, 0x4900bf732d83df73) mmap(&(0x7f0000029000/0x800000)=nil, 0x800000, 0x3, 0x20011, r2, 0x0) listen(r1, 0xb) r3 = kqueue() kevent(r3, &(0x7f0000000280)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x1, 0x8, 0x9]}, {0x7ff, 0xffffffffffffffff, 0x95, 0x20000000, 0x5, 0x3, [0x1, 0x4, 0x1, 0x6c8]}, {0x40, 0xfffffffffffffff3, 0xa, 0x0, 0x5, 0x80, [0x4, 0x4, 0x3, 0xfffffffffffffffe]}], 0x3, 0x0, 0x0, 0x0) ktimer_create(0x4, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x1, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1b0) ktrace(&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4, 0xd27d43220c7df9b, 0x0) freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) cap_rights_limit(r5, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) cap_rights_limit(r4, &(0x7f0000000180)=[0x20000207fffffdc, 0x400000000000005]) r6 = kqueue() kevent(r6, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x1a2, 0x4400) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x6, 0x81, 0xc}, &(0x7f0000000380)=0x10) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) semget(0x1, 0x4, 0x682) socket$inet6_sctp(0x1c, 0x1, 0x84) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) openat$filemon(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) openat$filemon(0xffffffffffffff9c, &(0x7f0000000180), 0x4, 0x0) setsid() 5.731105205s ago: executing program 2 (id=91): truncate(&(0x7f0000000080)='./file0\x00', 0x80008) cap_fcntls_get(0xffffffffffffffff, 0x0) sync() r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, 0x0, 0x0) syz_emit_ethernet(0x1000e, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100000, 0x0) open$dir(0x0, 0x200, 0x72) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4, &(0x7f0000002dc0)={0x10, 0x2, 0x2, @multicast2}, 0x10) rfork(0x4) open(&(0x7f0000000380)='./file0\x00', 0x80000000000206, 0x4ebfac6bbaf7949) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f00000006c0)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r1 = __specialfd$inotify(0x2, &(0x7f00000001c0)={0x100000}, 0x4) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') r2 = open$dir(&(0x7f0000000040)='.\x00', 0x8, 0x10) symlinkat(&(0x7f0000000dc0)='./file0\x00', r2, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') inotify_add_watch_at(r1, r2, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x25000430) rename(&(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) truncate(&(0x7f0000000440)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x7f) mount(&(0x7f0000000200)='ufs\x00', 0x0, 0x0, &(0x7f0000000140)) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[0x0], 0x0) cpuset_getaffinity(0x3, 0x3, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x2a, 0x0, 0x20, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x9]}) ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x3fb, &(0x7f0000000800)="ff8c898646396880cbab0b53be54ed1603891091fbc12640764bec4632c2c9189535aa7b90a77e15d33ea17080b68890d2e5dc6c899b6a00669a585b883eef82b9f0221779a49bec5c39e92b43b50ecc3fa8b34696018438d5f3be24702b951687dc609137faedbc80669bd036812b86f460819b6a14c2534bee7f38e7d9755d8244727ff8c74f4af8c6cddbb5bd47a40285902fcbd0e024ea0fb5f0fa33d50d0664634c39e5f1d9e0edb2a8f43a8ddf0643a6841932d6d211e02a9d", 0x0, 0x0, &(0x7f00000005c0)="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"}) extattr_list_file(&(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 5.730585002s ago: executing program 3 (id=92): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x40000, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000"]) aio_waitcomplete(0x0, 0x0) statfs(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000ec0)) open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) extattr_get_link(&(0x7f00000001c0)='./file0\x00', 0x1, &(0x7f0000000200)='}&@][{\',\x00', 0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180)) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2010c, &(0x7f0000000300)={0x1c, 0x1c, 0x3, 0x1, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) openat$bpf(0xffffff9c, 0x0, 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) rename(&(0x7f0000000640)='./file1/../file0\x00', &(0x7f0000000600)='./file0/file0/file0/file0\x00') extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') syz_emit_ethernet(0x4e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaa3aff000000400000600000000000ee00000600000000000000ee00000187019078000000ef0000000000000000000000000e00d1ce0000000000"]) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) getppid() 3.922369764s ago: executing program 0 (id=93): r0 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) ftruncate(r0, 0x107d2) fork() mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) truncate(&(0x7f0000000100)='./file0/file0\x00', 0x7f) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100000) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() socket$inet6_udp(0x1c, 0x2, 0x0) r2 = socket$inet6(0x1c, 0x2, 0x0) aio_waitcomplete(0x0, 0x0) minherit(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) semget$private(0x0, 0x5, 0x40) socket(0x1c, 0x20000000, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ioctl$BIOCSETWF(0xffffffffffffffff, 0x8008427b, 0x0) syz_emit_ethernet(0x37, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYRES8=r1, @ANYBLOB, @ANYRESHEX=r2]) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) copy_file_range(r3, &(0x7f0000000000)=0xaa8, r3, 0x0, 0x3, 0x0) close(r3) freebsd11_getfsstat(0x0, 0x0, 0x2) socket(0x1c, 0x1, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x18289, 0x114) ftruncate(r4, 0x10000) aio_writev(&(0x7f0000001480)={r0, 0x1000, &(0x7f00000001c0)="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", 0xfa, [0x6, 0x5], 0x6, 0x6, 0x18, {0x4, 0x6, &(0x7f0000000000)="5c2a7562c7d024428f87641c47a56b8d4cfe04373b2ba9a152ade11261fb8599efbd0697f492d17b857a97"}, {0x3, 0x1c, @sival_int=0xbf6a, @thr={&(0x7f0000000300)="f0315cb3d5f30f01e867660f71d00bc4c3b57ca5ac29c3057b3ef0825e08780fb4bf00000000c4c26590bcade9095d320fb7928200000065660f5b4107c4e1f85f5f7e", &(0x7f00000013c0)="9e7c8d9039b398f740e7685a72570d18ffd433d3441ab758d97a1debb96d0b214cfa6dce80d00d1ba2228d7a1de1d9a0d930b9c12b59a2b5335299fa1ff8a4fbda33bc1a758ca9caecabd85e1c9c97c7551446cad7b6b1277c46f90ff360808ad0e6cb8ac3a873d0b9617e4ce2c1f2d226d18232d3d10e642dbed75293101dd546c2ea3e224c0877343464e9e16d1cb71a2b74e33b3b70d84acbe77e417206d4c327"}}}) 3.921714629s ago: executing program 2 (id=94): umask(0x40) r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x100, 0xfffffffffffffff9, 0xc008, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x110206, 0x0) r3 = socket(0x1c, 0x1, 0x0) ksem_open(&(0x7f0000000540)=0x0, &(0x7f0000000580)='/\\)!\x00', 0x200, 0x0, 0x0) ksem_close(r4) fcntl$lock(r2, 0x16, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000100)={0x29, 0x0, 0xfffffea0, &(0x7f00000000c0)="ec7b00002cfeff02000000000000007f", 0x0, 0x0, 0x0, 0xb, [0x40000000, 0x0, 0x0, 0x3]}) close(0xffffffffffffffff) ftruncate(0xffffffffffffffff, 0x107d2) sendto$inet6(0xffffffffffffffff, &(0x7f00000020c0)="d1", 0xffef, 0x20184, 0x0, 0x0) munlockall() r5 = fork() mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) sigqueue(r5, 0xf, @sival_int=0x8000) fcntl$lock(0xffffffffffffffff, 0xd, &(0x7f0000000140)={0x3, 0x4, 0x403, 0x0, r5}) munmap(&(0x7f0000400000/0xc00000)=nil, 0xc00000) r6 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x7369a0733676a8) preadv(r6, &(0x7f00000002c0)=[{&(0x7f0000000080)=""/21, 0x15}, {&(0x7f00000000c0)=""/230, 0xe6}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x3, 0xb) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 3.920920484s ago: executing program 3 (id=95): r0 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0xad9, &(0x7f00000022c0)={@local, @random="0000e200", [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0xacb, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @local={0xac, 0x14, 0x0}, {[@end, @timestamp={0x44, 0x10, 0x7f, 0x3, 0x6, [{}, {[], 0x88dd}, {[], 0x101}]}]}}, @icmp=@echo={0x8, 0x0, 0x0, 0x7, 0xb, "62251256745ab9f7ecd15a7a9b8780db47bd9c7cedc131e2642721a1aad7237772a3f8627e1aa4df43cb04a0ae909ee0eff67cc6d4d2922354672b7eaf2cebad015e3b275541f527d305f171ffd2eef689eab87ccbf727757e73b7b0df119691de847db31a9c296c6179d630f62787b75dbe3c7c05c9090fdd5b85b19699fbe935c86d102af913da077d749d12c9a7dffe00c6b8e34e3e40fbc767c616851e18b974ef08b4953df977268c07266eaf929ba67e518f914f26d75f3e103080a1791c35ad232f5f8c83cd2ac7bfe0b8e0545388073b6987d284d187bd31d86f8599051b165cb1229c6b5452c51c0c286108abaa4961aa2039c45a00679aaa02074f24e6adc9023e23e78281e91f009bb29ab13c06193ab514e1a53019167cf9359f66e484de7d91df84dfac0f0fec0bad76f2e89f8e5bd64c467d1b4c9a8051c92bbfc48eb2bdf031309c0cf23108822a9eaa7fa9818c01ac2c3aa9281e8cbd5b9129a210e899ab15087066c5662549439b14f4c9a5d8bfc049c780933ed27b6c07bd3833e71fd8de5854faadf0aa1467415ce6607e05722edadc2915bb68e469f6c7035bcf755570ace9c9cc76a63d3e785400f8b809818cbbf12190e7933d9735904245708cdba28c716b4b73178e746d478a5a129d1a4092424f84bb25fd6799534187042807e38a7c884bfdebc28101eea9e25a2030b89eb4a38066fb104dd7e8e7785ba6a52870737fc4fd0d39501ab80d09df46cb25fe2d231fb15e81ea13a845ed623927f8693d4659a60bff78d3b5bfdc9a13d713634410f2ebea449c14863f6cd85534a6741c53faa55af0ff3ab589c446e6862e2471620cb11c83958dc4bdd51edc46f898fd9423c4a60d99a24ec51efda9cb8e79309107703d49c0b63f0c5748c07d9f0415cb2042cf705c5cfd39fe08bab1fb33c080795d1c95c169a0980eb5c0fa9901dfce9a148d56daf2e1807f27c79dcbef1fa079ab883ccf1cfdd1b3135433eded34c852870e1bf4f4f3ccbf4b2583ea7fe7f71ce20c1378a935b49a840bb0f4480fb6ec9785ccdc659919fa6b526648df52e44f62820ada3b75ddb296ef5d2a2fc541aba6d4aba3e97e663808ecf5cbffcfb28ff57dafb36c4f6630383fd24ff329f5e3006a3ed53d9caf8157e90bacc9f1fb78311691997eefcc1c8dbcb04368b60a2cfe134b4d47becfa017f88ef9007483eda5a8614023206353c7850a6eb0a55a820d4dcf1e47c9cad60fd3f0289dc917aba0bddcadff87d2a49c8e88506e253fa1f37beabfb39ede9ab21e0dc31c1f6166a193999b1b218cebbbf8ebe2983fb2b281df46346ce849199ab66d26d4ab08ed27d2e8e70495f16819d3dda63b55e5079ff5cbd7e311c7778bd3157cb46ec80724037b22b22d27b4de2318ee3f7995e7c7f77354d49095339ff73a8bd1712571547beec3a469f5e96fc1c31332a81f5af5a0c1832f3b6e95bc177b181b5155283ee36ce0332bc4d7c4e38f823c6a1b25a783f11cfaf7aa78ce527f649243adb008fdd1d8297f24b3aa5ecc9629523cf864f398928727d1263cbe754ef70c3670280f6123352f372a47bc20fe6c7f3980fbdff87cf8302a429993ab099bd3c50be18e37e2c68cb72c0f37cc5965e422beb6a036b062bf636db874a2eb957f182b8b3818ff46f20bb7f0e6c481e06f1a07c19293d351a5e5d3d242260f53fb4c64ce0475d4f829bd67f6e1af052468cfcc94346b8b35cab4ee11e56157d6cd5d5544e9b58216f0680f3809721991808f0ad6945fd820eb2b2f6f901f4bafc0f2f2035db8dcf56d9e4af39a913c6aa00c3afeaa56e1a424e91cb00c8cb233d222cbe2316fdd8101ef82e9ef05694ce4a3dd3759d860d400ea0f115ace0e6a3387fd31bbfb9b51af912e847f47c874482f4436d5d9377242798f0511a7abe90da29f7a6fced30864d9681599e8a41338b7dc45d3b24aa19c6840173d8820ce1f0f2ffeaa9265cb5e6162816ce39f3290b6c5751f64747e750e0e151be3964b605d54d4483bb49f2edbf12968b70aa19fac173ed68560be159322b07ee0c5f6645dc0af23d2b6f4b4f8ad58dcb0d6b5ae7d5ab19e23bc9dc2ffcd3be6094dcf3c136f8a70e16b12086e507d9935d07d166e50d02fa86820f48b1a2d45cc8f39f3e6319e6f307bf9add7e7285a73b78b617274d24a9125c53e87390160c165e7738d330de7925a77958c02ef8eb3c80818d9c2c0ae0953ee48787b55fe6cb9d815ebc8e1b27c8a8efcb5c9322a490e88ff1b4ef5a510d02ce7e23125be0a19399aba84c025987ea0672be950c824d9540867973f3bf2fd0e76fa968090b204f66960f6c0b1b4e67665742d24a6c0c48be944b7b2f0c68d5d76d72fb501d175e2e041bfc247f88df4a328b86de2b20de88759c1476cdbc1dc715417af9eb7ae17d810d426a0f9bb8ff640dbdfd17d4d4530e558a0a89fcae71ef7924004e64caa7bba5ee8e880e94955ee0f0407406f32f2faca10c121442b757527c41f85ca4f9541f989e92fee5b2cac7b01f2c7adff54faa8c331438220df80a9294f6ac7b3d8c64179481f894e83a67d1ab066e5ceb64021687873c7242b849de751e58995656d1eab76301f445757b184c818fd39671fc15c408b9d76b92c245a5276f8ce7bf21fabad82053dcb31d6cbb7fb75b946d4b92f16063ca28984dcf6dd7b57ab76d44ac9ae1973fffef8e38585f9ffe89947974f991289e761748687f3b52af812e77673ae8c183ceea45caffcc945bd122478949c7e6ad06d322ec9148d9b1a8a27d330163fe325b6d969b19843cbe6ceb456a7d9ea9b58f736571867f14b6c555fe402320d6b29498178ff23a318dd61402f7e4d5dff5e5864032be89e8bd08f46cf124a75c07206669f8f7b2a266afbac80d00f49ee04ee4f5cfae1b8be115c15a9cb96e83836198cd986d9262075303278df9c05bc4b4e50e16324fe3522e226ca924ae386d0937b01371d2162a004b63e4e54df5114cf7185f6515852d22099be318dbc844a4ea1557fcd0a025a41efc56a3cd34843c50432368d1ce2e8467ae1a0c1707dd22f8c736aa9a5836f853894f9d30208bb787a4ee2f13fd114d461284acc24a0859d2aa7b0d1013d2a1360dc1c837fb8ff1f20ca1bb91603e07797e49d2d1a1fd1fc5783f6eeede29d3a3446c575075bbf6100cc255bfed82c7c34b00d12d4c9c06ae101793679d09886f81f20037776db52a38710d1e5ddf5861329508d3bee0b5232c71e163e462941fe7bcfd221c9cbd8e444c92e2d772efdeef7b5b5516a61cf572daccddd6d26d09b2f8f1b6160854f12395d55e9a39330271dac368bb38e0ffc45ba4020bce870f7e2fd3f277e433a7ec14b7377beff57a7ebc85def750fdd63cbf8caa4ea94bdda2182680d89c521cbe9421fe39d72ea982868e25a148995a956cd74c550333ae8dca4e40b2af3465f1329fe17fbef79393495be69d5699a5ab2c284fa27c9d0b91c320c8a9e89bd8431f5ec81162fcf49b430c6fba46abda855d84d607245995878cdec152896134c5203d1dff46286d47cdd140e1ae4a7c27552ac4eb403248f1c2780c161e1fc59865d2833431656981d97b59ff5e0abc0d5b5dae6737810113afc80a37ad131080b30d0af82111010b3d176ac0c6523d01b9ce2961ec29a534ddbb7e85fd68a18d9a6abf181850331dc5f0d68bf60e4a7763d883e872e63bf6eecbf810174011563e549bc4be3536ca463ce4f706d4729cd1d45552f7c11b4bc9594f3d7ae46f6f0a47fa4ca0a09ed0c9961041346116f1ccba544e1d395ccbef3fa2c3e9a592824570491e7b2d33e9e"}}}}}) r2 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) syz_emit_ethernet(0x42, &(0x7f0000000780)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa080046000034fffc000000849078ffffffffac1400aa890302000b01907800020000aecb450800020066000907560ffc7f000001fffffff8"]) sendmsg$unix(r0, &(0x7f0000003280)={&(0x7f0000000340)=@abs={0x8, 0x0, 0x0, 0x2}, 0x8, &(0x7f0000000480)=[{0x0}, {&(0x7f0000000500)="a41b47776b77a1a0e6781c308f86b75ec107b52101757f48888ed674746e581f76ff3f417fbb58502ef313cb60451d30cf775b0db3f67a0c4f1358242a80761729b9a058617927c4cfa9d97723fe3d4c4a95532884106302262d216ffe3045ee63ee0034261e988e7162c033d569ca78cff1c0d835b14e17ea4504f9ac8d1bcb997afc524307139a569bad9dbea035271a49728fd948b3309211533a1be85151b79deab4c167102500d4d31bd4d3ebe9606e6b54fe576956830c4b1979c7a2a489bfcd91be378be5f2", 0xc9}, {&(0x7f0000000440)="810a8a4ee6e9a0dc0822eb769dd536efe06bfb1c5d", 0x15}, {&(0x7f0000000680)="69366df92ecc1efcf8f118319e684a2e69fea03a2a96b8a8328e583f3b11a40fc3cf063845ca47255aeafa38eb793e4b7d0fa2161782ddea46925509ea3ec469bd61e392c2cc43883c789db66e0e59f671e6c14b35652554599a4905f6ff7ddf114eea3bb3df6294469a0e262a894db0fed120f6e6edc2854ee94c", 0x7b}], 0x4, &(0x7f0000003140)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x10}, @rights={0x28, 0xffff, 0x1, [0xffffffffffffffff, r1, r2, r1, r1, r0, r0]}, @rights={0x14, 0xffff, 0x1, [r0, r1]}, @rights={0x1c, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r1, r1]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]}], 0x118, 0x9}, 0x80) r3 = fcntl$dupfd(r2, 0x11, r2) sigaction(0x71, &(0x7f0000000140)={&(0x7f0000000100)="c4c2ddb66ded660f38289000000000420f493e0f2aac7f00000100c4e2f9abe5f30f1ee8c4e28d8c64e3000f0fcfbfc464d4", 0x4579aace5d4d62c3, {[0x8000005, 0x2, 0x0, 0x27fff]}}, 0x0) ioctl$KDGKBTYPE(r3, 0x40044b40, 0x9) ioctl$SMB_READB(r2, 0xc020697a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) kqueue() mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) rename(&(0x7f0000000640)='./file1/../file0\x00', &(0x7f0000000600)='./file0/file0/file0/file0\x00') r4 = socket(0x1c, 0x1, 0x0) setuid(0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x6, 0x1010, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x1010, 0xffffffffffffffff, 0x0) r5 = dup(0xffffffffffffffff) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r5, 0x6, 0x27, &(0x7f00000001c0)={&(0x7f0000000280)="b6c307e3fdfdd0957961d22e637dafca44ad7e2e005f4136a9f2152807a2c208ab604fa65c75f17aacd10abb03daac791c48fc6e8319037409c94b65bca9e2b76366a39ba66ebba48c98a3add6fd87342dcd65016a6188c8d35552340439704c5917be3199d813e78fe7f70a93e45501f06c9c6f3a61da6ac1327a2cb5ffaf2df2f83b8b7b2d1e3af0df4b8ad32d655eae0ef46cabc74267d2eecf51266d2a05ba0c878059", &(0x7f0000000180)="16d767fb3040a9fa1377dbe198733525638d8fae641f0e31210a4462e1e96dd8dd50547111cf80c7bc8ef83fa86fa3cfaff9e849", &(0x7f0000000f40)="57c059f99ffd17b6f6df13a68e18e763f8554aac17aeeba0e9ab1b05fa0d6e8f18b54c75ce6f8d95dc127d4fbd1b9404619134e47782c10064cde77deb8197a78e46f79ca8b3fd43654a5e148acde7a0fc812953a0c1278174575381d5d07747415a3834dd8e99f44e20cd28c495fceac14b1210f38b76d4d18f66ef20c7e87044f4e99ad855d13b0073a46758ee13e9ec45bf96520cbdd9f6d3a417ef6565c66b76549a90981fea74012a474030195e5b54c2442bde1f0bcea5e2c59e80f0625f644d4d2345554579e1c1dab2e383685c79108f389622d4230306a42b75769b65ce15", 0xb, 0xa5, 0x34, 0x0, 0xe3, 0x0, 0x3, 0x2, "5d4e9759b62f6606"}, 0x30) setgid(0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r6 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) preadv(r1, 0x0, 0x0, 0x0) 2.002834252s ago: executing program 0 (id=96): truncate(&(0x7f0000000080)='./file0\x00', 0x80008) cap_fcntls_get(0xffffffffffffffff, 0x0) sync() thr_suspend(0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, 0x0, 0x0) syz_emit_ethernet(0x1000e, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100000, 0x0) open$dir(0x0, 0x200, 0x72) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, 0x0) rfork(0x4) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f00000006c0)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r1 = __specialfd$inotify(0x2, &(0x7f00000001c0)={0x100000}, 0x4) link(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000400)='./file0\x00') r2 = open$dir(&(0x7f0000000040)='.\x00', 0x8, 0x10) symlinkat(&(0x7f0000000dc0)='./file0\x00', r2, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') inotify_add_watch_at(r1, r2, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x25000430) truncate(&(0x7f0000000440)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x7f) mount(&(0x7f0000000200)='ufs\x00', 0x0, 0x0, &(0x7f0000000140)) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[0x0], 0x0) cpuset_getaffinity(0x3, 0x3, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x2a, 0x0, 0x20, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x9]}) ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x3fb, &(0x7f0000000800)="ff8c898646396880cbab0b53be54ed1603891091fbc12640764bec4632c2c9189535aa7b90a77e15d33ea17080b68890d2e5dc6c899b6a00669a585b883eef82b9f0221779a49bec5c39e92b43b50ecc3fa8b34696018438d5f3be24702b951687dc609137faedbc80669bd036812b86f460819b6a14c2534bee7f38e7d9755d8244727ff8c74f4af8c6cddbb5bd47a40285902fcbd0e024ea0fb5f0fa33d50d0664634c39e5f1d9e0edb2a8f43a8ddf0643a6841932d6d211e02a9d", 0x0, 0x0, &(0x7f00000005c0)="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"}) extattr_list_file(&(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 2.00139161s ago: executing program 2 (id=97): mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) mlockall(0x1) truncate(&(0x7f0000000040)='./file0\x00', 0xaa481) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() r0 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r0, 0x0, 0x0, 0x1, &(0x7f0000001180)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x3, @loopback}, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r1 = __specialfd$inotify(0x2, &(0x7f00000007c0)={0x100000}, 0x4) inotify_add_watch_at(r1, 0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x40) r2 = open(&(0x7f0000000300)='./file0\x00', 0x615, 0x0) r3 = socket(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) readv(r3, &(0x7f0000000140)=[{&(0x7f0000000100)=""/31, 0x1f}], 0x1) ftruncate(r2, 0x107d2) open$dir(&(0x7f00000000c0)='./file1\x00', 0x80201, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) rename(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000180)='./file1\x00') connect$inet(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) fstat(0xffffffffffffffff, &(0x7f0000000540)) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) 2.000499072s ago: executing program 3 (id=98): r0 = getpid() r1 = kqueue() r2 = getpgid(0x0) kevent(r1, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x40000000, 0xe8c5, 0x40000000, [0x0, 0x88f]}], 0x1, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x141) r4 = openat$md(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f0000000500)={0x0, 0xfffffffe, 0x2, &(0x7f00000000c0)='./file0\x00', 0x800, 0x200, 0x346, 0x2000000, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0xffffffff, 0x10011, 0xfffffffc, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x100, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x40000002, 0x41, 0x0, 0x9, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x84, 0x0, 0x0, 0x0, 0x7, 0x40000002, 0x0, 0x0, 0xfffffffd, 0x0, 0x1, 0x3, 0x3, 0x0, 0xfffffffe, 0x0, 0x100, 0x0, 0x8000, 0x2, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x1ff, 0xb, 0x4, 0x800, 0x0, 0x80, 0x0, 0x3, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7]}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r5, 0x80000001, &(0x7f0000000300)="e2", 0x1, [0x3], 0x80000, 0x0, 0x0, {0x8000, 0x7, 0x0}, {0x0, 0x0, @sival_int, @ke_flags=0xc088}}) r6 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) r7 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r7, 0x0) fchflags(r6, 0x48008) fstat(0xffffffffffffffff, &(0x7f00000009c0)) freebsd11_stat(&(0x7f0000002b40)='./file0\x00', &(0x7f0000002b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) freebsd11_lstat(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000002ec0)={&(0x7f0000000100)=@file={0xa, 0x0, './file0\x00'}, 0xa, &(0x7f0000000880)=[{&(0x7f0000000140)="9bc31f53e8853027d4b8fae68bec088121b798d5ac7095d4fef6d2ff97791066c312209c98fa1d8596abc12ee4377c6dd396f823b3ce539ea1bfa697c32de9fa064663b631939a415b4c2855e768a4207bb2750611a91579d362cdc3b203fb5d749a1fa54e05dd275a47bab58ebc2c2b657961a56e", 0x75}, {&(0x7f00000001c0)="deabf603f14ed1a404105e0bd6b424fe3176a532b01a", 0x16}, {&(0x7f0000000440)="1f9667443eb7edcdab9e8fcac3fb5645c7d236c6efb8bd04af57db4e5eaa8dddd4644bcdfd0687ff5f45f8df52ba8333", 0x30}, {&(0x7f00000006c0)="40ee9f0ca12f0b46cceda1895a680fa24869752eaa60bd855d42c203313a7c3d0261867d4a721fc360203418c41ba2c7b822432ebb570557ec2e3923de41cd127bf850c1c10c6a6b3ffcaf7ba2ad3423548eaf6b43bfa86356394fe670077915d72eff18cf1e0f32e595c127ce8ee1985d329bac1bd579b4b14bd1805785685252605b28cf858cd0c035c74e2de84dfc46e348c01bcb3065", 0x98}, {&(0x7f0000000780)="401ca2ca36ad6b31699976d91a62d4a3d83c3b827bb14ec39d91973d30e8e3dfc2cc8f7a7a80cd8180eb394fac6d4c66a0de50fa9103829d0bc4e7a7de6a11af85de278c73e79a72e0a6", 0x4a}, {&(0x7f00000004c0)="c4240a36302b2682dee02f364df06800c2b7e1c1ad2e3ee66540366301c241a426e9ad0cb555d4a6f0b5b06240536c", 0x2f}, {&(0x7f0000000800)="4e02e760142f9286ddf6e5ee3c986d1cbd666f8704630a9deee411007f20fb7a4bcb5335", 0x24}], 0x7, &(0x7f0000000ac0)=ANY=[@ANYBLOB="30000000ffff000001000000", @ANYRES32=r5, @ANYRES32, @ANYRES32, @ANYRES32=r5, @ANYRES32=r4, @ANYRES32=r5, @ANYRES32=r5, @ANYRES32, @ANYRES32=r3, @ANYBLOB="24000000ffff000001000000", @ANYRES32, @ANYRES32=r3, @ANYRES32=r6, @ANYRES32=r6, @ANYRES32=r5, @ANYRES32, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRESOCT, @ANYRESHEX=r0, @ANYRES32=0x0, @ANYRES8=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES64=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r11, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="60000000ffff000003000000", @ANYRESDEC, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES8=r5, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=r2, @ANYRES32=r8, @ANYRES32=r9, @ANYRES32, @ANYBLOB="24000000ffff000001000000", @ANYRES32=r5, @ANYRES32=r6, @ANYRES32=r11, @ANYRES64=r10, @ANYRES32=r6, @ANYRES32=r6], 0x198, 0x8}, 0x80) rtprio_thread(0x0, 0x0, &(0x7f0000000840)={0x3, 0x6}) sync() r12 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f00000002c0), 0x100004) r13 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080), 0x100004) getfhat(r1, &(0x7f0000000400)='./file0\x00', &(0x7f00000003c0), 0x0) sendto$unix(r13, &(0x7f0000000200)="3d0e7377543d2e9ae850aa84c5fa2b40cf909d5f757e09c57673e09b703578daf67d4670bad916514ef99cd3b05a32d64847f8ed3b19602a28004f5f853437a980124d184fcd5999cc1d244b1e65fd5ca6afdd94644c46a9ddbed6069c5da8e3103d875f52e829c724c95a6cc1fc0c162fb0645dde6aebfd4b1c6d606c73c55f94547b6fafc08f2432aa6d02355736303353544c36a463e1", 0x98, 0x20008, 0x0, 0x0) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) aio_writev(&(0x7f00000015c0)={0xffffffffffffffff, 0x0, &(0x7f0000000000)="f2", 0x1, [0x0, 0xfffffffe], 0x7fffffff, 0x8, 0x0, {0x0, 0xffff, 0x0}, {0x0, 0x2, @sival_int, @tid=0xffffffffffffffff}}) ioctl$KDGETMODE(r12, 0x40046676, 0x22e00000) 1.115752ms ago: executing program 0 (id=99): mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) truncate(&(0x7f0000000340)='./file0/file0\x00', 0xaa480) pipe2(&(0x7f0000000040), 0x100000) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) syz_emit_ethernet(0x5e, &(0x7f0000000680)={@random="73b9ccc300", @random="00f7000400", [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x28, 0x3a, 0x0, @rand_addr="fef0372e0865911feb7ee80000008000", @mcast2, {[], @icmpv6=@ndisc_redir={0x89, 0x0, 0x0, '\x00', @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, @mcast1}}}}}}) fork() socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000), 0x0) aio_waitcomplete(0x0, 0x0) openat$crypto(0xffffff9c, 0x0, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[], 0x100}, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1, 0x2, 0x4) r1 = openat$bpf(0xffffff9c, &(0x7f0000000380), 0x1, 0x0) syz_emit_ethernet(0xfcb0, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x2c, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0xa7, 0x0, 0x0, {[@window={0x3, 0x3, 0x1}]}}}}}}}) semop(0x0, &(0x7f0000000140), 0x0) r2 = socket(0x11, 0x3, 0x0) sendto$unix(r2, &(0x7f0000000040)="b100050400000000000008000501000000000000cea1fea7fef96ecfc73fd335ca087ae27caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebb4257699a1f132e27acbdd602000d7d026ba8af63ff37282902e4fd007f720fd3873babfbb770a2f5a872c881ff7cc53c8943310b404f36a00f90006ee01bc43eaea8c500000002000000000000020208a371a3f8000400000000000000010000000000000010", 0xb1, 0xc, 0x0, 0x0) ioctl$BIOCSETWF(r1, 0x8008427b, &(0x7f0000000400)={0x1ffffffffffffed1, &(0x7f00000001c0)}) socket$inet6(0x1c, 0x3, 0x0) open$dir(&(0x7f0000000800)='./file0\x00', 0x40000400000002c2, 0x1c0) setreuid(0xee00, 0x0) getuid() freebsd11_stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240)) select(0x40, &(0x7f0000000080)={0x3, 0xb95, 0x4, 0x101, 0x1, 0x5, 0x32d1bb00, 0x6}, &(0x7f00000001c0)={0x6, 0xaa, 0x0, 0x8, 0x8, 0x5, 0x6}, 0x0, &(0x7f0000000240)={0x9d03, 0x2}) 362.207µs ago: executing program 2 (id=100): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x100000, 0x0) r1 = dup(r0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f00000000c0)={0x10, 0x1d, 0x1, &(0x7f0000000340)="14", 0x0, 0x0, 0x0, 0x4d46b770, [0x0, 0x0, 0x3ff]}) r2 = socket(0x2, 0x1, 0x0) getsockopt$inet6_tcp_int(r2, 0x6, 0x200, 0x0, &(0x7f0000000140)) ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), 0x0}) 0s ago: executing program 3 (id=101): openat$bpf(0xffffff9c, &(0x7f0000000040), 0x200, 0x0) r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) socket(0x1c, 0x1, 0x0) futimesat(r0, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000100)={{0x6, 0x5}, {0x7, 0x3}}) socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x30) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x3}) mlockall(0x1) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) munlock(&(0x7f0000079000/0x3000)=nil, 0x3000) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() open$dir(0x0, 0x4, 0x2) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom(r2, 0x0, 0x0, 0x860, 0x0, 0x0) socket$inet6(0x1c, 0x2, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCCRYPT(r3, 0xc01c6367, &(0x7f0000000000)={0x0, 0x2, 0x4, 0x3, &(0x7f0000000340), 0x0, &(0x7f0000000340), &(0x7f0000000140)}) ioctl$KDGETMODE(r1, 0x40046676, 0x22dffffc) r4 = socket$inet(0x2, 0x1, 0x0) listen(r4, 0x14040000) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x30, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x8001ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x2, 0xa7, 0x0, 0x0, {[@window={0x3, 0x3, 0x6}, @mss={0x2, 0x4, 0x5754}]}}}}}}}) socket(0x1c, 0x1, 0x0) r5 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x8, &(0x7f0000000000)=0x9, 0x4) bind$inet(r5, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) connect$inet(r5, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.243' (ED25519) to the list of known hosts. vnode_pager_putpages: zero-length write at 0 resid 2002 0xfffffe0077a4d370: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371eee0 usecount 2, writecount 2, refcount 3 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0058758c98 ref 1 pages 1 cleanbuf 1 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0058754780 (pid 942, syz-executor, tid 100257) nlink=1, effnlink=1, size=2002, extsize=0 generation=8a721d8c, uid=0, gid=0, flags=0x4 ino 104, on dev gpt/rootfs Expensive callout(9) function: 0xffffffff81a7f240(0xfffffe006e96ea80) 0.004072088 s vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe0077a4ea50: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371eee0 usecount 6, writecount 5, refcount 69 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe005874c7c0 ref 1 pages 536 cleanbuf 64 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe0058772780 (pid 1139, syz-executor, tid 100392) nlink=1, effnlink=1, size=2147483650, extsize=0 generation=1172060d, uid=0, gid=0, flags=0x48008 ino 148, on dev gpt/rootfs SYZFAIL: too much cover cov=7456540 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=1 req=60 state=1 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-0.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl