last executing test programs: 25.007511938s ago: executing program 0 (id=18): unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x48000101) fork() thr_self(&(0x7f0000000280)=0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f0000000080)={0x15, 0xf, 0x10, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0xfffffffe, 0xfdffff85, [0x0, 0x400000, 0x7fe, 0xfffffffc]}) sigtimedwait(&(0x7f0000000740)={[0xfffffffc, 0x100, 0x0, 0x2]}, 0x0, 0x0) rtprio_thread(0x0, r0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000200)="b8a01439408216cceabd5301b2b836fd062a9c8f9acdcc67c117dcc42da85dfa0c3ecd9e657601dbbe85ce9c10b22d020c7d780c8deed01af76cdef5bd656bdcc7f5a9dd691f4607e9c5d6ff61f92b370094c6efda5a2f6337eec2a785de46c91e5fca3b710a4fa6d626d1e134faf08deb8e8a827f51bf9391b9599a54cbebc3fa3ff252f99da4e0535f4efbd6fd5972f87eac31c2a0a37f392021a3d4cedae8d9b5c78339a697f3", 0xa8}], 0x1, 0x0, 0x0, 0x20000}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000080)={0x2}, 0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) setsockopt$inet_int(r2, 0x0, 0x4, &(0x7f0000001040)=0xcd, 0x4) extattr_get_file(0x0, 0x6, &(0x7f00000010c0)='\x00~\xc3\x9d\x9a\xb0\x1e\x00v<\x03\x1a\xcbR\xe5{\xff\xa5\xd5\xde\x1b*\a\x84\xb0\xdeOek\x8e\x1aS\xaa\xbd\xb6\x88\xa4J\x93\xd8K\xa7\x15\xf1\x87\xfa\xf8\xe4\x8e1\x10\xa2XG\xba\x88\xd2\xc0\xe5\xf6\xae^ol\x94\x92\xea\x8aG\xafI\xda\xc0!\xa9\x05\xaeGdqZ\xc6!\x1b\xa8m\x8a\x9c(\x8b}}\x8e\xa3\x87\xb0\xf1\xa9t\x8c\xba4\xdd\rHo\x13A9\xef\xaa\x86q0\xac\xda', 0x0, 0x0) 24.122137475s ago: executing program 0 (id=22): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x2a) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') aio_waitcomplete(0x0, 0x0) symlink(&(0x7f0000000580)='.\x02/file1\x00', &(0x7f00000002c0)='.\x02\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open$dir(&(0x7f0000000980)='./file0\x00', 0x40000, 0x0) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f0000000200)=[{0x3, 0xffffffffffffffff, 0x1, 0x20000000, 0x0, 0x0, [0x0, 0x9]}], 0x1, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='.\x00', 0x80000049, &(0x7f0000000080)) r3 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x2000, 0x0) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff020000000000"]) 21.783282835s ago: executing program 0 (id=26): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000040)={0x17, 0xe, 0x10, &(0x7f00000000c0)="72e8789fa2e77d9bcf47eaa3c96be443", 0x0, 0x0, 0xffffffff, 0x7d32559c, [0x2, 0xa98, 0x800000, 0x5]}) 21.766314661s ago: executing program 0 (id=28): r0 = semget$private(0x0, 0x7, 0x3c4) __semctl$GETPID(r0, 0x2, 0x4) __semctl$GETVAL(r0, 0x351b53a117a770b4, 0x5) 21.695607729s ago: executing program 0 (id=29): r0 = semget$private(0x0, 0x7, 0x3c0) semop(r0, &(0x7f00000000c0)=[{0x4, 0xb, 0x1000}], 0x1) 21.685853138s ago: executing program 0 (id=30): unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x48000101) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x29, &(0x7f00000001c0)={&(0x7f00000000c0), 0x0, 0x0, 0x29, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x1}, 0x30) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) fork() thr_self(&(0x7f0000000280)=0x0) sigtimedwait(&(0x7f0000000740)={[0xfffffffc, 0x100, 0x0, 0x2]}, 0x0, 0x0) rtprio_thread(0x0, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) aio_writev(&(0x7f00000015c0)={r1, 0x0, 0x0, 0x0, [0x0, 0xfffffffe], 0x7fffffff, 0x8, 0x0, {0x0, 0xffff, 0x0}, {0x0, 0x2, @sival_int, @tid=0xffffffffffffffff}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000200)="b8a01439408216cceabd5301b2b836fd062a9c8f9acdcc67c117dcc42da85dfa0c3ecd9e657601dbbe85ce9c10b22d020c7d780c8deed01af76cdef5bd656bdcc7f5a9dd691f4607e9c5d6ff61f92b370094c6efda5a2f6337eec2a785de46c91e5fca3b710a4fa6d626d1e134faf08deb8e8a827f51bf9391b9599a54cbebc3fa3ff252f99da4e0535f4efbd6fd5972f87eac31c2a0a37f392021a3d4cedae8d9b5c78339a697f3", 0xa8}], 0x1, 0x0, 0x0, 0x20000}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000080)={0x2}, 0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) setsockopt$inet_int(r2, 0x0, 0x4, &(0x7f0000001040)=0xcd, 0x4) extattr_get_file(0x0, 0x6, &(0x7f00000010c0)='\x00~\xc3\x9d\x9a\xb0\x1e\x00v<\x03\x1a\xcbR\xe5{\xff\xa5\xd5\xde\x1b*\a\x84\xb0\xdeOek\x8e\x1aS\xaa\xbd\xb6\x88\xa4J\x93\xd8K\xa7\x15\xf1\x87\xfa\xf8\xe4\x8e1\x10\xa2XG\xba\x88\xd2\xc0\xe5\xf6\xae^ol\x94\x92\xea\x8aG\xafI\xda\xc0!\xa9\x05\xaeGdqZ\xc6!\x1b\xa8m\x8a\x9c(\x8b}}\x8e\xa3\x87\xb0\xf1\xa9t\x8c\xba4\xdd\rHo\x13A9\xef\xaa\x86q0\xac\xda', 0x0, 0x0) 11.993229757s ago: executing program 3 (id=54): r0 = socket$inet(0x2, 0x4, 0x1) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000000)="e600100000000000", 0x8) (async) aio_waitcomplete(0x0, 0x0) (async) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) (async) clock_nanosleep(0x4, 0x0, &(0x7f0000000140)={0x5, 0x40}, &(0x7f0000000200)) r1 = socket(0x1c, 0x1, 0x0) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x4a, 0x0, 0x0) (async) r2 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) (async) futimesat(r2, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000100)={{0x6, 0x5}, {0x7, 0x3}}) (async, rerun: 32) fpathconf(r2, 0x11) (rerun: 32) listen(0xffffffffffffffff, 0x14000000) (async) syz_emit_ethernet(0xe2, &(0x7f0000000340)=ANY=[@ANYBLOB="ffffffffffff0000020000000800400000d40000000002069078e0000002ac1400aa01890d5765dca1024d8d75f8f3e8443031107f00000100000000000000ed80000001fffffff000000000000000030000000800000002ffffffff00000008071740e0000002ac1400aae0000002e00000020000000094086f43bc26e0bd831f08ac1400bb00000004e00000027f000001e0000001ac1400bbffffffff831700e000000100000000e0000001ac1400bb00000004891740e0000001e000000200000000ac1400bb0000000300004e204e23", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="dc254bef907a0407"]) (async, rerun: 32) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async, rerun: 32) execve(0x0, 0x0, 0x0) (async, rerun: 32) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) (async, rerun: 32) mlockall(0x3) (async) munlockall() (async) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) (async) openat$crypto(0xffffff9c, 0x0, 0x400, 0x0) (async) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000080)={0x1f, 0xe, 0x10, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0xffe, 0xfffffffc]}) (async) ioctl$CIOCCRYPT(r3, 0xc01c6367, &(0x7f0000000280)={0x0, 0x3, 0x76, 0x8040, &(0x7f0000000440)="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", 0x0, 0x0, 0x0}) (async) r4 = kqueue() kevent(r4, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0xa, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb08004500019078ac20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5120000890780005"]) (async, rerun: 64) profil(0x0, 0x0, 0x0, 0x1) (rerun: 64) socket$inet_sctp(0x2, 0x1, 0x84) mkdir(0x0, 0x0) (async) chroot(&(0x7f0000000180)='./file1/../file0\x00') 10.544740898s ago: executing program 2 (id=56): open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000005c0)='\x00', r0, &(0x7f0000000c80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) symlinkat(&(0x7f0000000dc0)='./file0\x00', r0, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(r0, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) rename(&(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a80)='./file0\x00') unlink(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000180)='./file1\x00') rename(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000010c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rmdir(&(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x9, &(0x7f0000000340)=0x3, 0x4) getsockopt$inet6_int(r1, 0x29, 0x24, 0x0, 0x0) unlink(&(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x9, 0x80000001, 0x10001, 0xf801, 0xc}, 0x14) 10.544387098s ago: executing program 3 (id=57): syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x2000, 0x4, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @generic="179d64ca430bb096c6832cde18679e29dba3ef488e11ee14"}}}}) syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@random="b905f0ffffff", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x1, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @tcp={{0x1, 0x0, 0x41424344, 0x41424344, 0x1, 0x0, 0x5, 0x2, 0xc800, 0x0, 0x4e}, {"f674e3a2"}}}}}}) 9.071203722s ago: executing program 1 (id=58): r0 = socket$inet6(0x1c, 0x3, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x30) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x3}) mlockall(0x1) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() open$dir(&(0x7f0000000580)='./file0/file0/file0\x00', 0x4, 0x2) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom(r1, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6(0x1c, 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendfile(0xffffffffffffffff, r2, 0x0, 0x400, &(0x7f0000000000), &(0x7f0000000000), 0x0) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f00000001c0)=0xa, 0x4) r3 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r3, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7ffffffd, 0x3, 0x0, 0x8000, 0x5, 0x37d, 0x0, 0x0, 0x4, 0x0, [0x0, 0x2, 0x100007ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xb32a, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0xe122, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0xf, 0xfffffffd, 0xdbd, 0x3ff, 0x11, 0xfffffffe, 0xffffffff, 0xa7, 0xc37b, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x941, 0x0, 0x200000, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0xfffffffe, 0xeffffffc, 0x0, 0x8, 0x0, 0x0, 0x40, 0xffffffff, 0x80000000, 0xa, 0x1, 0x1000, 0xfffffffc, 0x2, 0x80000, 0x7, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x5, 0xfffffffe, 0x6, 0x0, 0x0, 0x40000, 0xfffffffe, 0x0, 0x0, 0xffffffff, 0x0, 0xffffffff]}) syz_emit_ethernet(0x5e, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaf788a33fb3f386dd60c3200000282b00feffffff000000000000000000000002ff02"]) recvmsg(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000011c0)=""/242, 0xe9}, 0x82) 9.070343431s ago: executing program 2 (id=59): freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) aio_waitcomplete(0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000f80)=[{0x0, 0xfffffffffffffff5, 0xc0f1, 0x8, 0x3, 0x0, [0x0, 0x3, 0x400]}], 0x1, 0x0, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0xfffffffffffffff5, 0x6b, 0x8, 0xbc, 0x6, [0x0, 0xfc, 0x2000001, 0x7]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) dup(0xffffffffffffffff) ppoll(0x0, 0xffffffffffffff13, 0x0, 0x0, 0xffffffffffffff6c) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f000018b000/0x2000)=nil, 0x2000) truncate(0x0, 0x1) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) socketpair$unix(0x1, 0x1, 0x0, 0x0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x2, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6259848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x3, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x2, 0x6, 0x80000000, 0x5, 0x4, 0x5, 0x3ff, 0x401, 0x7, 0xba5f, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0x3, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x6, 0x4, 0xc0, 0xbe9a, 0x7, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x0, 0x4, 0x5229, 0x9, 0x7, 0xfffffffb, 0x81, 0x8001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x0, 0x8, 0xc, 0x8]}, {0x5c, [0x15, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x0, 0x7fff, 0x0, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x2, 0x7, 0x40000, 0x400, 0x9, 0x7fff, 0x40003, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x6, 0x2, 0x58, 0x0, 0x3, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x9, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x40000009, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0xa, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x3, 0x2, 0x800, 0x0, 0xff, 0x6, 0x7, 0x3, 0x800000e, 0x1, 0xdd, 0x538, 0x7bac, 0xa, 0xd, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x1, 0xfff, 0x343d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x4, 0x2, 0x1, 0x5, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x4, 0x3, 0x1, 0x1000, 0x8001, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0x800f10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x3, 0x1ff, 0x4, 0x9, 0x9, 0x5]}, {0x2, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x4, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x0, 0x9, 0x1, 0x2, 0xffffffff, 0x9, 0x4f124442, 0x8, 0x0, 0x2, 0x8007, 0x190, 0x8, 0x3, 0x1, 0x800, 0x9, 0xc, 0x10000, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x4, 0x4, 0x496a, 0x7, 0x7fffffff, 0x76, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x40, 0x225, 0x80, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x10000005, 0x1, 0x80, 0x9, 0x1ff, 0x1003, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0x8, 0x9, 0xe92, 0x408, 0x13, 0x2, 0x0, 0x7f, 0x3616, 0x0, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x7, 0x403, 0x54, 0x80, 0xf, 0x3ff, 0x2008, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x1, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x4, 0x3, 0x2, 0x1ff, 0x3, 0x1, 0x2000800, 0x1, 0x7, 0x10000468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x5, 0x7fe, 0xfffffffe, 0x10000, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x5, 0x4b, 0x200040, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0x2, 0x1, 0x10000, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x8, 0x1, 0x0, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x3, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x1000003, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xfffffffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x5, 0x6, 0x400000, 0x3, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0x3, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x124f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x100, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x200, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x6, 0x1, 0x200, 0x4a2, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x2c, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0x9, 0x9, 0x263, 0xabd1, 0xffffffff, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x1fc, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff5, 0x5, 0x3041, 0x8, 0x6f, 0x2, 0x7, 0x3, 0xfff, 0x1, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xfffffff8, 0x10000, 0x8001, 0x4220c0b8, 0xfff, 0xfffffff1, 0x6, 0x6, 0x80, 0x6, 0xc9, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0xc, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0xd, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x10000, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x2, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0xfffeffff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7fff, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x800, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0x1000008, 0x8, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x400, 0x5, 0xfffffffc, 0xffffffff, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x314, 0x1, 0x7, 0xfffffffc, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x0, 0x6, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x10000003, 0x1, 0x2, 0x1, 0x4, 0x81, 0x8, 0x2, 0x4, 0x6, 0x1, 0x8, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0xa, 0x7, 0x1ff, 0x7ff, 0xa, 0x0, 0x200008, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x8f3, 0xfe0, 0x3, 0x400007, 0x8, 0x0, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x6, 0x8, 0x5, 0x100, 0x8, 0x0, 0xd7ff, 0xa, 0x0, 0x5, 0x4, 0x1a0, 0x2, 0x5, 0x0, 0x6, 0x1ff, 0x200040, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xfffffffb]}, {0x5, [0x13, 0x1, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x3, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8e, 0xf3b, 0x4, 0x6, 0x8, 0x8, 0x7, 0x5, 0x4, 0x7, 0x5, 0xfffffff9, 0x2, 0x8, 0x3, 0x2, 0xfffffffb, 0x6, 0x7, 0xc, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x5, 0x21, 0x2, 0x40001, 0x3, 0x40, 0x3, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0xffffffff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x9, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x400000, 0x2, 0xe, 0x401, 0xb, 0x800, 0x9, 0x9, 0x40, 0xd7, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0x1000, 0x9, 0x3, 0x40, 0x8, 0xfffffffe, 0xf, 0x1, 0x8, 0x5627aa48, 0x4, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x3, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x0, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x401, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x13e, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x400000, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x9, 0x4, 0x9, 0x4, 0xffffffff, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0xd, 0x9, 0x6, 0x9ba, 0x404000, 0xfffffffd, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b2, 0x4, 0x0, 0xfffffff7, 0x6, 0x108, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x7, 0x14, 0x10, 0x9, 0x7, 0x3, 0xffffffff, 0x10, 0x800, 0x7, 0x3ff, 0xb7, 0x5, 0x4, 0x4, 0x5, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x8, 0x92, 0x40a54e46, 0x800001, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf769, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x7f, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x5, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x3, 0x0, 0x100, 0x0, 0xe296, 0xfffffffc, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xdffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x4, 0x6, 0x0, 0x4, 0x3, 0x7, 0x7fffffff, 0x4, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x401, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1fa, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xdff, 0x800, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x200, 0x8, 0x2000003, 0x4, 0x1ff, 0x1, 0x80, 0x7, 0x5, 0x5, 0xaa9, 0x0, 0x7, 0xd42, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x2, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0x101, 0x450, 0x3, 0x5, 0x2271, 0xffffffff, 0x2, 0x1, 0x3, 0x7fffffef, 0x0, 0x7, 0xc, 0x86, 0x0, 0xb959, 0x1ff, 0x8, 0x5, 0x2, 0x92ac, 0x1, 0x2, 0x41, 0x7ff, 0x10, 0x7f, 0x8, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x3, 0x0, 0x3, 0x78aa0000, 0x0, 0x0, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x1000003]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x4007, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0xf4, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x9, 0x2, 0x401, 0x8, 0x8, 0x1, 0x7, 0x20000f2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0xff, 0x9, 0xffffffff, 0x0, 0x8, 0x8eb7, 0x7, 0x200, 0x10000, 0x9, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x9, 0x10001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x8, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0x5, 0x4, 0x2, 0x7, 0xffffffff, 0x50, 0x9, 0x0, 0x3]}]}) r0 = kqueue() kevent(r0, &(0x7f0000000080)=[{}], 0x44000000, &(0x7f00000004c0), 0x80000000, 0x0) fork() open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) chmod(&(0x7f0000000280)='./file0\x00', 0x2768c724b44f58aa) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) open$dir(0x0, 0x488200, 0x176) execve(0x0, &(0x7f00000000c0)=[&(0x7f0000000000)='.(\x00'], 0x0) freebsd10_pipe(&(0x7f0000000040)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)) socket$inet_tcp(0x2, 0x1, 0x0) 9.069882956s ago: executing program 3 (id=60): kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x5) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x0, 0xa9) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) munmap(&(0x7f00001e4000/0x3000)=nil, 0x3000) __specialfd$eventfd(0x1, &(0x7f0000001480), 0x8) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r3, 0x0) ftruncate(r3, 0x107d2) r4 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) copy_file_range(r4, 0x0, r4, &(0x7f0000000180)=0xffff, 0x3ff, 0x0) fspacectl(r3, 0x1, &(0x7f0000000000)={0x0, 0x400000010001}, 0x0, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)='`', 0x1) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_delete_link(&(0x7f0000001ac0)='./file0\x00', 0x2, &(0x7f0000001b00)='\x02') dup2(r1, r2) syz_emit_ethernet(0x0, 0x0) sigprocmask(0x1, &(0x7f0000000140)={[0x9, 0x8, 0x3, 0xf]}, &(0x7f00000001c0)) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) madvise(&(0x7f0000000000/0x600000)=nil, 0xffffffffdfffffff, 0x5) 7.425593113s ago: executing program 1 (id=61): r0 = semget$private(0x0, 0x7, 0x3c0) semop(r0, &(0x7f00000000c0)=[{0x0, 0xbffd, 0x800}], 0x1) 7.424837214s ago: executing program 3 (id=62): kqueue() r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f00000002c0)=@file={0xa, 0x1, './file1\x00'}, 0xa) listen(r0, 0x2) r1 = socket$unix(0x1, 0x5, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) ioctl$KDGETMODE(0xffffffffffffff9c, 0x40044b09, 0x4b1b) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) open$dir(0x0, 0x1, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) connect$unix(r1, &(0x7f0000000000)=@file={0xa, 0x1, './file1\x00'}, 0xa) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x3ff, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x4, 0x8, 0x5, 0x0, 0x0, 0x3, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x6, 0xe, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x9, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x9, 0x7, 0xfffffffb, 0x81, 0x8001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x0, 0x8000008, 0xc, 0x8]}, {0x5c, [0x15, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0x0, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0xa, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x6, 0x2, 0x58, 0x2, 0x1, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x9, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x207, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x3, 0x2, 0x800, 0x0, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x538, 0x7bac, 0xa, 0xd, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x3, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0xb89b, 0x92, 0x4, 0x0, 0x98, 0x81, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x8001, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0x5, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x5, 0x3, 0x6, 0x1ff, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x0, 0x9, 0x9, 0x2, 0xffffffff, 0x1, 0x4f124442, 0x8, 0x0, 0x2, 0x8007, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x8, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0xe7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x40, 0x224, 0x80, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0x8, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x403, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x4002, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x3, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x8, 0x7ff, 0xfffffffe, 0x10000, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x4]}, {0x3, [0x7, 0x2, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x8, 0xfffffffe, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0xa, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x8000200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x15, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xfffffffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x124f8, 0x7fffffff, 0x6, 0xff, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x4a2, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x2c, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd1, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x1ff, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff5, 0x1, 0x3041, 0x8, 0x6f, 0x2, 0x7, 0x3, 0xfff, 0x1, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xfffffff8, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc9, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0xffffffff, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0xd, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x10000, 0x8, 0xae, 0x7, 0xffffffff, 0x2, 0x6, 0x2, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x800, 0x30e, 0x2, 0x2, 0x5, 0x9, 0x7ff, 0x8, 0x7, 0x1, 0x9, 0x100000c, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x400, 0x5, 0xfffffffc, 0xffffffff, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x314, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x0, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x4, 0x81, 0x8, 0x2, 0x4, 0x6, 0x1, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x7, 0xa, 0x1ff, 0x7ff, 0xa, 0x0, 0x8, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x400007, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x6, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x1a0, 0x2, 0x5, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xfffffffb]}, {0x6, [0x10, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x3, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0xc, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xfffffff9, 0x2, 0x8, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x1, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7b, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x400000, 0x2, 0xe, 0x401, 0x5, 0x7fe, 0x7, 0x9, 0x40, 0xfffffffe, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0x1000, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x3, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x0, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffbfe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0xb, 0xb, 0x400000, 0x99, 0xeae, 0xe4, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x4, 0x44f, 0x4, 0x9, 0x4, 0xffffffff, 0x6, 0xffffffef, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0x0, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b2, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x7, 0x18, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3fe, 0xb7, 0x5, 0x4, 0x4, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x8, 0x92, 0x40a54e46, 0x10001, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf769, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x5, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0x5, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x4, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x7, 0x6, 0x401, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x5, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x101, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x3, 0x4, 0x1ff, 0x7e, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0x8, 0x7fffffff, 0x0, 0x3, 0xc, 0x86, 0x0, 0xb959, 0x9, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x803, 0x10, 0x7f, 0x8, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x0, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x2, 0x1, 0xff, 0x1c0000, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0xf4, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xffffffff, 0x1, 0x2, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x8, 0xeb7, 0x7, 0x9, 0x10000, 0x9, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0x10001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0xffffffff, 0x50, 0x9, 0x0, 0x3]}]}) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff}) close(r2) r3 = semget$private(0x0, 0x3, 0x58c) __semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f00000000c0)=&(0x7f0000000080)) 5.747863137s ago: executing program 1 (id=63): r0 = socket(0x1c, 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) execve(&(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000240)=[&(0x7f0000000080)='\x00'], 0x0) setuid(0xee01) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f0000000000)="b10005016000000416000000070000000020000010c18125d7f96ecfc73fd38c23781fd6c61a27ddb06b36ac970bff03000000000000000000000000ebe1aa5323edeb51e2f0ca3ebbc2c4699a09000000acb5b302000d7d010000000100000021020000742fe2458bfbb770c1f5a8aec872ea772ec58904000000008d9810361b1257aba8c500002012010000de5000000000000020000000000000000000000000000000000000001f00000000000800", 0xb1, 0x3a3ae0e0de5f5dda, 0x0, 0x0) execve(0x0, &(0x7f0000000100), &(0x7f0000001900)) chdir(&(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') getsockopt$inet_mreqn(r1, 0x0, 0xc, 0x0, &(0x7f0000000100)) ioctl$BIOCSHDRCMPLT(0xffffffffffffffff, 0x80044275, 0x0) freebsd11_mknodat(r2, &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6000, 0x5) r5 = socket(0x2, 0x1, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x6) chroot(&(0x7f00000023c0)='./file0\x00') r6 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$SMB_QUICK_READ(r2, 0x801c6902, &(0x7f0000000300)={0x80, 0x80, 0x4, @buf="dd60", @word=0x1000, 0x400, &(0x7f00000000c0)=0x8, 0x1, &(0x7f00000001c0)=0x2, 0x1}) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0xc, &(0x7f0000000080)={0x7ff, {{0x1c, 0x1c, 0x2, 0x0, @rand_addr="0000000001000000d2603666ab2f3d00", 0x200}}, {{0x1c, 0x1c, 0x1, 0x0, @mcast2}}}, 0xfc) setsockopt$inet6_group_source_req(r7, 0x29, 0xc, &(0x7f0000000080)={0x1007ff, {{0x1c, 0x1c, 0x2, 0xfffffffc, @rand_addr="65cbb6bf040000000b603666ab2f3df4"}}, {{0x1c, 0x1c, 0x1, 0x0, @mcast2}}}, 0xfc) setsockopt$inet6_group_source_req(r7, 0x29, 0xc, &(0x7f0000000080)={0x7ff, {{0x1c, 0x1c, 0x2, 0x0, @rand_addr="65cb30df060000000b603666ab2f3df4"}}, {{0x1c, 0x1c, 0x1, 0x0, @mcast2, 0xfffffffc}}}, 0xfc) renameat(r6, 0x0, r6, &(0x7f0000000140)='./file0\x00') connect$inet(r5, &(0x7f0000000240)={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10) r8 = openat(r3, &(0x7f0000000000)='./file0\x00', 0x1, 0x49) ioctl$UI_ABS_SETUP(r8, 0x801c5504, &(0x7f0000000180)={0xffbd, {0x9, 0x1, 0xd, 0x5, 0x80000000, 0x8001}}) shutdown(r5, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) openat(r2, &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x408000, 0x60) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 5.74733168s ago: executing program 2 (id=64): socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) truncate(&(0x7f00000000c0)='./file1/file0\x00', 0xaa480) open$dir(&(0x7f0000000080)='./file1/file0\x00', 0x202, 0x0) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() socket$inet6_sctp(0x1c, 0x5, 0x84) syz_emit_ethernet(0x98, &(0x7f0000000180)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1, 0x8a, 0x65, 0x0, 0x4, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @rand_addr=0xff}, @udp={{0x3, 0x2, 0x8}, {"52456cf62e9ef88a0e44332a22d30c5100015154a7166f882be13f16e7521abb5e38bff04ccacb437ef62ac8fc1371d55fddc665befbc39deb0bd1a512e95165d0d77d98c41d858be3166bccc484a88617ed56a4f3ed8f1d8dce8c757c69b8be28fda5b28a68715dd8d09130c019"}}}}}}) rtprio(0x0, 0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x7}) aio_waitcomplete(0x0, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) futimesat(r0, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000100)={{0x6, 0x5}, {0x7, 0x3}}) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0xfdf9ff81}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000000)={0x0, 0x2, 0x4, 0x3, &(0x7f0000000340), 0x0, &(0x7f0000000340), &(0x7f0000000140)}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(0xffffffffffffffff, 0x14040000) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6015f2ff000000000000000000"]) syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x28, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x8001ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0xa7}}}}}}) socket(0x1c, 0x1, 0x0) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) syz_emit_ethernet(0x46, &(0x7f0000003980)={@random="8f6f77edbb61", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x10, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@ndisc_ra={0x86, 0x0, 0x0, 0x0, 0xa6, 0x9, 0x800, 0x3ff}}}}}}) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) 5.746904663s ago: executing program 3 (id=65): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000280), 0x100000, 0x0) sysarch$I386_GET_IOPERM(0x3, &(0x7f0000000000)) r1 = socket$inet6(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000080)=0xb, 0x4) bind$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x0, @empty}, 0x1c) r3 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r3, 0xffff, 0x10000, &(0x7f0000000080)=0xb, 0x4) getsockopt(r1, 0x7f, 0x1748, &(0x7f0000000100)=""/97, &(0x7f0000000180)=0x61) bind$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x0, @empty}, 0x1c) setresuid(0x0, 0xee00, 0x0) sysarch$I386_SET_IOPERM(0x4, &(0x7f00000006c0)={0x8000, 0x3, 0xfffffffc}) setsockopt(r1, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x0, @loopback={0x4}}, 0x1c) setuid(0xffffffffffffffff) setresgid(0x0, 0xee00, 0xee01) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000040)={0x1f, 0x0, 0x11, &(0x7f00000000c0)="72e8789fa2e77d9bcf47eaa3c96be44351", 0x0, 0x0, 0xfffffffd, 0x7d32559c, [0x0, 0x0, 0x800000, 0x5]}) 3.93566764s ago: executing program 1 (id=66): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r0, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000800)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x7, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0xe604}) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000001040)="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", 0x4b2, 0x20081, &(0x7f0000000000)={0x10, 0x2, 0x0, @loopback}, 0x10) chroot(&(0x7f0000000040)='./file0/file0/..\x00') r2 = socket(0x2, 0x1, 0x0) setuid(0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r3, 0x4, 0xcc) syz_emit_ethernet(0x69, &(0x7f0000000200)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "0400", 0x33, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0xfd, '\x00', {0x0, 0x6, "5adf00", 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1, [], "b03536"}}}}}}}) syz_emit_ethernet(0x72, &(0x7f0000000780)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x3fff, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x28, 0xb, 0x0, {0x12, 0x4, 0x0, 0x7, 0x5, 0x67, 0x75b, 0x8, 0x5d, 0x9, @broadcast, @loopback, {[@rr={0x7, 0x7, 0x7, [@multicast1]}, @lsrr={0x83, 0x1b, 0x5, [@loopback, @local={0xac, 0x14, 0x0}, @rand_addr=0x1, @empty, @multicast1, @rand_addr]}, @ssrr={0x89, 0x7, 0xb, [@multicast1]}, @rr={0x7, 0x3, 0xf}, @generic={0x85, 0x2}, @ra={0x94, 0x6, 0x3}]}}}}}}}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) syz_emit_ethernet(0x7e, &(0x7f0000000300)=ANY=[@ANYBLOB]) syz_emit_ethernet(0x42, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff080048140087150f3ef93f19280cf45adbbd7a68340000000000009078ac1400bbe000000294f5000000059406000000010d00907887"]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) socket(0x1c, 0x1, 0x0) extattr_list_file(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0xcc) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) 3.935217333s ago: executing program 2 (id=67): aio_waitcomplete(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r0, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000800)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x7, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0xe604}) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r2, 0x0, 0x1, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) sendto$inet(r2, &(0x7f0000001040)="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", 0xffffffffffffffd2, 0x20081, &(0x7f0000000000)={0x10, 0x2, 0x0, @loopback}, 0x10) chroot(&(0x7f0000000040)='./file0/file0/..\x00') r3 = socket(0x2, 0x1, 0x0) setuid(0xffffffffffffffff) pipe2(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0xcc) syz_emit_ethernet(0x69, &(0x7f0000000200)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "0400", 0x33, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0xfd, '\x00', {0x0, 0x6, "5adf00", 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1, [], "b03536"}}}}}}}) syz_emit_ethernet(0x72, &(0x7f0000000780)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x64, 0x0, 0x3fff, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x28, 0xb, 0x0, {0x12, 0x4, 0x0, 0x7, 0x5, 0x67, 0x75b, 0x8, 0x5d, 0x9, @broadcast, @loopback, {[@rr={0x7, 0x7, 0x7, [@multicast1]}, @lsrr={0x83, 0x1b, 0x5, [@loopback, @local={0xac, 0x14, 0x0}, @rand_addr=0x1, @empty, @multicast1, @rand_addr]}, @ssrr={0x89, 0x7, 0xb, [@multicast1]}, @rr={0x7, 0x3, 0xf}, @generic={0x85, 0x2}, @ra={0x94, 0x6, 0x3}]}}}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_emit_ethernet(0x7e, &(0x7f0000000300)=ANY=[@ANYBLOB]) syz_emit_ethernet(0x42, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff080048140087150f3ef93f19280cf45adbbd7a68340000000000009078ac1400bbe000000294f5000000059406000000010d00907887"]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) r4 = socket(0x1c, 0x1, 0x0) extattr_list_file(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x10, 0xffffffffffffffff, 0xcc) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) open$dir(&(0x7f0000000140)='./file0\x00', 0x2, 0x13c) 3.934319s ago: executing program 3 (id=68): vfork() rfork(0x1000) r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, 0x0, &(0x7f0000001700)) sendto$inet6(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) socket$inet6_udp(0x1c, 0x2, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) sendmsg$inet6_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)="ca1b3b5c422ca65675e274c429d4ecb6043c5c10548af3499af18ae3b738b9b6b5428e18e8a6f70a1fad05f03388e5d7fcc796fa874a4c850fc114d59d7d095f07c3338b7653ed757e08fc8325e69831de6411138839053b1a7b32636f2e05fcbcada2375bde92ed0ac706042efe8a3bcd095a7ab57ac9ddbdc94f1545f59d15ada6e76061b7834beac7d501f26c2752d451ca96b5f61b24c88865cfe25dfb939a9fcbb9146239110e08576b3ec84e75714e740034e78dba801094faa3edb5774e0c58a39e0a1439a32fb837000000000000800108fcaeec67663ce77bfbc50affa69135c9385cd6d36ff365039a3c5a89a24e3fed7dee1a35513534f7173d892afd3b73f76a08af4f857a1f2674d9ace7647aace412d13afc1ac098fe6f86bfdef411248be5e096c4e747bfdc32a173cf9cdba48cc3681978", 0x139}], 0x1, 0x0, 0x0, 0x81}, 0x0) r3 = socket(0x2, 0xb9ac48817114e5b2, 0x2) shutdown(r3, 0x2) syz_emit_ethernet(0x66, &(0x7f0000000180)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd6060626000302c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa020090780000000165b20a5500011d00fe800000c96c000000000000000000bbfe8000000000000000000000000000bb81393536673e115edd"]) socket(0x1c, 0x1, 0x0) socketpair(0x1, 0x1, 0x2, &(0x7f0000000080)) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0xc, &(0x7f0000000080)={0x10000000, {{0x1c, 0x1c, 0x2, 0x4, @rand_addr="65cb30df060000000b603666ab2f3df4", 0xfffffffd}}, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="3f12c0d81c479be15ccb830030bc5ee7", 0xfffffffc}}}, 0xfc) openat$smbus(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendto(r0, &(0x7f0000000380)="ce", 0xfffffffffffffea7, 0x20005, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'bbr\x00', 0xa}, 0x24) rfork(0x1000) 2.016398083s ago: executing program 1 (id=69): __specialfd$eventfd(0x1, &(0x7f00000000c0)={0x3, 0x4}, 0x8) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) truncate(&(0x7f0000000340)='./file0/file0\x00', 0xaa480) pipe2(&(0x7f0000000040), 0x100000) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() execve(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000002c0)=[&(0x7f0000000100)='!\x00', &(0x7f00000001c0)='#:).\'/%%`-##+\x00', &(0x7f0000000200)='\x00', &(0x7f0000000240)='@\x00', &(0x7f0000000280)='].,\x00'], &(0x7f0000000640)=[&(0x7f0000000380)='\xff\xff', &(0x7f00000003c0)='\xff\xff', &(0x7f0000000540)='\x00', &(0x7f0000000580)='@\x00', &(0x7f0000000600)='\x00']) r0 = socket$inet6_udp(0x1c, 0x2, 0x0) r1 = socket$inet6(0x1c, 0x2, 0x0) setsockopt(r1, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x1, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x10000a27}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x2e, &(0x7f00000005c0)={@remote={0xfe, 0x80, '\x00', 0x0}}, 0x14) connect$inet6(r1, &(0x7f0000000140)={0x1c, 0x1c, 0x1, 0x8, @empty, 0xfffffffe}, 0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x54, &(0x7f0000000440)={0x2, {{0x1c, 0x1c, 0x3, 0x101, @mcast1, 0x4000}}, {{0x1c, 0x1c, 0x3, 0x3, @rand_addr="5bc777e903c65c4509a6a361c6206a1a", 0x1}}}, 0xfc) syz_emit_ethernet(0x9c, &(0x7f0000000400)=ANY=[@ANYRESDEC=r0]) aio_waitcomplete(0x0, 0x0) rfork(0x85000) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000bc"]) getpid() 2.010039347s ago: executing program 2 (id=70): sigaction(0x14, &(0x7f0000000080)={0x0, 0x35, {[0xfffff801, 0x5872c520, 0xfffffffe]}}, 0x0) r0 = semget$private(0x0, 0x7, 0x3c0) semop(r0, &(0x7f0000000080)=[{0x0, 0x7, 0x1800}, {0x3, 0x3, 0x1000}], 0x2) sigaction(0x6b, &(0x7f0000000040)={&(0x7f0000000000)="0fb5a220540000c4e32d4af0b1d91bc4e10d71e2fec4c2d0f7f76564650fae4203c4c2d1bcc9660febae67a1000066f20f1a245d07000000660f38f616", 0x2a, {[0x5, 0x6, 0x8a1]}}, &(0x7f0000000100)={&(0x7f00000000c0)="d373108fc8e0a2ef00de69fe80b300000000a965f22edf81001000002ef30fa7c0c4c3e15c88f3ff00000ff30f2ad0fe82feefffff0f5e7ab0"}) r1 = semget$private(0x0, 0x2, 0x7de) __semctl$SETALL(r1, 0x0, 0x9, &(0x7f0000000080)=[0x199, 0xfffd]) 922.321µs ago: executing program 1 (id=71): socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() sendto$inet6(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) socket$inet6_udp(0x1c, 0x2, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) sendmsg$inet6_sctp(r1, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)="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", 0x139}], 0x1, 0x0, 0x0, 0x81}, 0x0) r2 = socket(0x2, 0xb9ac48817114e5b2, 0x2) shutdown(r2, 0x2) syz_emit_ethernet(0x66, &(0x7f0000000180)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd6060626000302c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa020090780000000165b20a5500011d00fe800000c96c000000000000000000bbfe8000000000000000000000000000bb81393536673e115eddaa42b18a999d53"]) r3 = socket(0x1c, 0x1, 0x0) socketpair(0x1, 0x1, 0x2, &(0x7f0000000080)) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) openat$smbus(0xffffffffffffff9c, 0x0, 0x400, 0x0) mount(&(0x7f0000000000), 0x0, 0x0, 0x0) getsockopt$inet6_int(r4, 0x29, 0xa, 0x0, &(0x7f0000000080)) freebsd11_mknod(&(0x7f0000000140)='.\x00', 0x1000, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 0s ago: executing program 2 (id=72): r0 = semget$private(0x0, 0x7, 0x3c0) semop(r0, &(0x7f00000000c0)=[{0x0, 0xbffd, 0x800}], 0x1) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.4' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e705800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e705800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054218000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054218000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007795000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e705800 SYZFAIL: invalid kcov comp type type=ffffffff82168569 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=0 req=30 state=1 status=67 (errno 35: Resource temporarily unavailable) FreeBSD/amd64 (ci-freebsd-i386-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl