last executing test programs: 2m25.573527959s ago: executing program 1 (id=322): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) recvfrom$unix(r0, &(0x7f0000000040)=""/110, 0x6e, 0x40, &(0x7f0000000100)=@file={0xa, 0x1, './file0\x00'}, 0xa) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r0, 0x6, 0x29, &(0x7f00000000c0)={&(0x7f0000001340)='(', 0x0, &(0x7f0000000000)="84", 0xb, 0x1, 0xfffffffffffffcb7, 0x7, 0x1, 0x0, 0x3, 0x4, "00000400000000ff"}, 0x40) profil(&(0x7f0000000140)="03cfa0d41a5b3568582e2fe5009c1d3f6e6d43b5d0c8349759d023dd2ae4fcfaab8450b1d678e937208c0ee8572de7cbf80627e635e347254269b1832df3c3b667887c169a2c5ad5acb1f814a08d48e97402fcef1f598a22c2af42f0befac1502fef6f88a56535c11bd88233ea877a6172078dffbaff0b3b89da9448625198a294e9e47a", 0x84, 0x6e, 0x5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) socket(0x2, 0x1, 0x0) (async) recvfrom$unix(r0, &(0x7f0000000040)=""/110, 0x6e, 0x40, &(0x7f0000000100)=@file={0xa, 0x1, './file0\x00'}, 0xa) (async) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r0, 0x6, 0x29, &(0x7f00000000c0)={&(0x7f0000001340)='(', 0x0, &(0x7f0000000000)="84", 0xb, 0x1, 0xfffffffffffffcb7, 0x7, 0x1, 0x0, 0x3, 0x4, "00000400000000ff"}, 0x40) (async) profil(&(0x7f0000000140)="03cfa0d41a5b3568582e2fe5009c1d3f6e6d43b5d0c8349759d023dd2ae4fcfaab8450b1d678e937208c0ee8572de7cbf80627e635e347254269b1832df3c3b667887c169a2c5ad5acb1f814a08d48e97402fcef1f598a22c2af42f0befac1502fef6f88a56535c11bd88233ea877a6172078dffbaff0b3b89da9448625198a294e9e47a", 0x84, 0x6e, 0x5) (async) 2m25.378983025s ago: executing program 1 (id=324): openat$bpf(0xffffffffffffff9c, 0x0, 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setuid(0xee01) r1 = msgget$private(0x0, 0x400) msgsnd(r1, &(0x7f0000000100)=ANY=[], 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) fork() setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0x68, &(0x7f0000000080)={{0x1c, 0x1c, 0x1, 0x80000001, @local={0xfe, 0x80, '\x00', 0x0}, 0x7ffffffd}, {0x1c, 0x1c, 0x0, 0x4, @mcast1, 0x5}, 0x6, [0x8800, 0xfdfffffd, 0x0, 0x6, 0x1, 0x0, 0x0, 0x60]}, 0x5c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x4a, &(0x7f0000000080)={0x10007ff, {{0x1c, 0x1c, 0x2, 0x0, @empty}}, {{0x1c, 0x1c, 0x3, 0x1, @ipv4={'\x00', '\xff\xff', @rand_addr=0x8}}}}, 0xfc) syz_emit_ethernet(0x9c, &(0x7f0000000c80)=ANY=[@ANYBLOB="4cbe81e26ef8a47d73cdc0fc76989dabfd6c9402745dc54524f112c53b98ef8ae799f35e7d0884ced9008401be4a30a2c5bd46071cac828290d733e3a8eb9d59318546b35dd3a2c294e8f8a62e12359c8d9edf41a1612e30b95bc8659ced7d2e09badb53e646d8cd3d60a492b5b62deed0482c2d68350211fa2df4dc33cf73f9201758e1e9c6f4bcfb4e4779164c4a781fa206710b71659774d0da4771a7a20fab7b01a83455fc35397368f7090402f30fb868dfb6ebd2849f48ad", @ANYRES32=r0]) aio_waitcomplete(0x0, 0x0) statfs(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180)) execve(0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r3 = socket$inet6(0x1c, 0x3, 0x7) setsockopt$inet6_int(r3, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r3, 0x0, 0x0, 0xffff0000, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="fff71fdcedff000080009e000000e216", 0x3}, 0x1c) socket(0x1c, 0x1, 0x0) 2m24.529091892s ago: executing program 1 (id=329): lio_listio(0x0, &(0x7f0000000080)=[{0xffffffffffffffff, 0x0, 0x0, 0x0, [0x100, 0x7], 0x3, 0x6, 0x9, {0x0, 0x9, 0x0}, {0x0, 0x12, @sigval_int=0xb939, @spare=[0xfffffffd, 0x8, 0xd83, 0x100, 0xa, 0x3, 0x1000, 0x8]}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x2, 0x10000], 0x9, 0x8, 0xf, {0x3, 0x10000009, 0x0}, {0x4, 0x1, @sival_ptr=0x8, @spare=[0x3, 0xffffffff, 0x7ff, 0xf9c, 0xfffffff8, 0x9, 0x5, 0x30000000]}}, {0xffffffffffffffff, 0xd, 0x0, 0x0, [0x0, 0xffffffdc], 0xcbbb, 0xe204ebbace928c63, 0x3, {0x88, 0x3, 0x0}, {0x3, 0x1a, @sigval_ptr=0x9}}], 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000001b00)={r0, 0x80000001, 0x0, 0x0, [0x40000, 0x4], 0x0, 0x2, 0x0, {0x0, 0x4, 0x0}, {0x0, 0x0, @sival_ptr=0x400, @spare=[0x1, 0x2, 0x0, 0x33518c07, 0xdca6, 0x7fffffff, 0x800000000, 0xffff]}}) open(&(0x7f0000000280)='./file0\x00', 0x80400000000206, 0xa0) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r2 = socket(0x1c, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) setsockopt$inet_tcp_int(r2, 0x6, 0x80, &(0x7f0000000200)=0x4, 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1002, &(0x7f0000000300)=0x6, 0x4) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00') ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = open(&(0x7f0000000480)='./file0\x00', 0x200202, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r5, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x5) writev(0xffffffffffffffff, 0x0, 0x0) bind$bt_l2cap(r5, 0x0, 0x0) recvfrom(r3, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) sendto(r4, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) 2m23.689083858s ago: executing program 1 (id=334): openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x100204, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x2, 0x7, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) cpuset_getdomain(0x2, 0x8, 0x2, 0x0, 0x0, &(0x7f0000000040)) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r1 = socket(0x1c, 0x1, 0x0) sigaltstack(&(0x7f0000001000/0x1000)=nil, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) lio_listio(0x0, 0x0, 0x0, &(0x7f0000000d80)={0x1, 0x20, @sigval_ptr=0xe, @spare=[0x4405, 0x0, 0x6, 0x2, 0x8, 0x7, 0xfd926ff, 0x9]}) open$dir(&(0x7f0000000b80)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x80) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0x40, &(0x7f0000000480)='dctcp\x00', 0x6) r2 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000dc0)='./file0\x00', r2, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(r2, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000005c0)='\x00', r3, &(0x7f0000000c80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) rename(&(0x7f0000000080)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a80)='./file0\x00') unlink(0x0) rename(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000180)='./file1\x00') r4 = openat$ptmx(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) cap_rights_limit(r4, &(0x7f0000000000)=[0x20000000000000a, 0x400000000000000]) fcntl$lock(r4, 0x16, &(0x7f0000000400)={0x570, 0x0, 0x23}) rename(&(0x7f0000000fc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000010c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r5 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000300)='./file0\x00', r5, &(0x7f0000000c80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(0x0, &(0x7f0000000a80)='./file0\x00') syz_emit_ethernet(0x48, &(0x7f0000000500)={@empty, @empty, [{[{0x88a8, 0x2, 0x0, 0x4}], {0x8100, 0x3, 0x0, 0x2}}], {@arp={0x806, @generic={0x6, 0x8005, 0x6, 0xe, 0x1, @random="6bdc7ed3dcf7", "9dad29483036cf9f83b32793fb93", @local, "fa34f0608301619d9581709c765fdfe2"}}}}) aio_waitcomplete(0x0, 0x0) 2m22.842733249s ago: executing program 1 (id=339): openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) (async) execve(0x0, 0x0, 0x0) (async) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) (async) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) (async) mlockall(0x3) (async) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) (async) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) (async) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) (async) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) (async) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) (async) r1 = semget$private(0x0, 0x7, 0x3c0) semop(r1, &(0x7f0000000480)=[{0x0, 0x20, 0x1800}], 0x1) __semctl$SETVAL(r1, 0x0, 0x8, &(0x7f0000000040)=0x0) (async) fork() (async, rerun: 32) aio_waitcomplete(0x0, 0x0) (async, rerun: 32) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180)) (async) execve(0x0, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x66, &(0x7f00000000c0)="003560eb3316dd409de6c7fd8fac2ca3394e4cfcbbccec82b48eb2754613d9b3d7d2602cb048aed29df18f412dcd2ed823b8d3", 0xfffffe6b) (async, rerun: 32) socket(0x2, 0x2, 0xfe) (async, rerun: 32) socket(0x2, 0x2, 0x0) (async) rfork(0x6010) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) close(r2) (async) cpuset_setaffinity(0x2, 0x2, 0x0, 0x0, 0x0) (async) r3 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0xd2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r3, 0x0) (async) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) 2m21.611497354s ago: executing program 1 (id=340): pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000140)={0x80000001}, 0x8) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000100)={'rack\x00', 0x5e8e}, 0xfda0) bind$inet6(r0, &(0x7f0000000300)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendto$inet6(r0, 0x0, 0x0, 0x44, 0x0, 0x0) rfork(0x5000) r1 = socket(0x1c, 0x1, 0x0) sigwaitinfo(&(0x7f0000000240)={[0x2, 0xe5, 0x9, 0x2]}, 0x0) execve(0x0, 0x0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r3, 0xffff, 0x1018, 0x0, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) recvfrom$unix(r4, &(0x7f0000000280)=""/95, 0x5f, 0x400c1, 0x0, 0x0) sendto(r3, 0x0, 0x0, 0x80, &(0x7f0000000080)=@in={0x10, 0x2, 0x1}, 0x10) r5 = dup2(r2, r2) ioctl$DIOCCHANGERULE(r5, 0x8048756d, &(0x7f0000000080)) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) getpriority(0x0, 0xa) rmdir(0x0) minherit(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x1) setsockopt$inet6_tcp_TCP_FASTOPEN(0xffffffffffffffff, 0x6, 0x21, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) getpriority(0x0, 0xfff) __semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000b00)=&(0x7f0000000ac0)={{0x0, 0x0, 0x0, 0x0, 0x28, 0x3e, 0x0, 0x5}, 0x57ed, 0x8000, 0x0, 0x0, 0x8, 0x7f}) getpriority(0x0, 0xe9d) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 9.104670094s ago: executing program 0 (id=830): socketpair(0x1, 0x1, 0x2, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000180)=0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000500)=0x7ff, 0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) socket(0x10, 0x10000000, 0x6c) recvmsg(r1, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) syz_emit_ethernet(0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaa00f6074d3b7447f90008004500006e080800000000000000ffffff77fc65e7ac14", @ANYRESHEX=r1, @ANYRES32=0x0, @ANYBLOB='P\x00\x00\x00']) r2 = socket(0x1c, 0x1, 0x0) shmat(0x0, &(0x7f00002ed000/0x1000)=nil, 0x2000) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) setreuid(0xee00, 0x0) seteuid(0x0) kevent(0xffffffffffffffff, &(0x7f0000000200)=[{0x10001, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x4, 0x0, 0x7, 0x40000000000000]}, {0x7, 0x2, 0x1, 0x1, 0x0, 0xfffffffd, [0x2a, 0x6, 0x8, 0x4]}], 0x2, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x8, 0x0, 0x0, 0x7}, 0x0, &(0x7f0000001000), &(0x7f0000001080)) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0x1000]}) ioctl$CIOCCRYPT(r3, 0xc01c6367, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x38, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000001400)}) r4 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0x514a3d84}, 0x24) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) cap_ioctls_get(r4, &(0x7f0000000000)=[0x0, 0x0], 0x2) socket(0x2, 0x1, 0x0) syz_emit_ethernet(0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000001"]) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="b886b4e47f", 0xfffffffffffffee7}], 0x1) syz_emit_ethernet(0x138, &(0x7f00000001c0)=ANY=[@ANYBLOB="9d33abe1d2678b88222abc32b6811ec5dff31f916455653368b490bdf56309", @ANYRES32=r0]) r5 = socket(0x2, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) bind(r5, &(0x7f0000000000), 0x10) listen(r5, 0x0) accept$unix(r5, &(0x7f0000000080)=@abs, &(0x7f00000000c0)=0x8) 9.104185728s ago: executing program 2 (id=831): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="04010000ffff000001"], 0x104}, 0x0) recvmsg(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/25, 0x9fb5baeefd4fee76}, 0x80) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[], 0x104}, 0x0) recvmsg(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/25, 0x9fb5baeefd4fee76}, 0x80) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) open$dir(&(0x7f0000000040)='./file0\x00', 0x400000, 0x0) r5 = __specialfd$eventfd(0x1, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGETMODE(r6, 0x40044b09, 0x3) r7 = socket(0x1c, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd0) r8 = open(&(0x7f0000000480)='./file0\x00', 0x2, 0x0) r9 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r9, 0x29, 0x32, &(0x7f0000000080)=ANY=[@ANYBLOB='K\x00\x00@'], 0x8) connect$inet6(r9, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sync() r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) ioctl$DIOCBEGINADDRS(r10, 0x20004416, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000015c0)={@random="c1798f7bc215", @local, [], {@ipv6={0x86dd, {0xb, 0x6, "2dfee8", 0x14, 0x15, 0x0, @rand_addr="5dc086546eae7053745e8a37d0dc41ea", @loopback, {[], @tcp={{0x3, 0x2, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0xa0, 0x7, 0x0, 0x39f}}}}}}}) fstatfs(r8, &(0x7f00000004c0)) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) ioctl$DIOCKILLSRCNODES(r5, 0xc068445b, &(0x7f0000000140)="992458e01f49935bc797ee15de240213bae64331acf5de5bc706d9c2a4cac48a46557339c24622798b5342c6cf088c26c3ca4c33af95ad29a88b71ad1e9bb2f79bec354959bce0e0602c22b5e5e9f010939959420b1691aad61c84835e05a8ec7f51f7378b9070d03c0938f2936a25f5c9f6e9ee865ee552f3dddf65a11be9e7fb36ad15fd1a2e3a998ff41ecfb538caa1a74486") 9.101603094s ago: executing program 3 (id=832): lio_listio(0x0, &(0x7f0000000080)=[{0xffffffffffffffff, 0x0, 0x0, 0x0, [0x100, 0x7], 0x3, 0x6, 0x9, {0x0, 0x9, 0x0}, {0x0, 0x12, @sigval_int=0xb939, @spare=[0xfffffffd, 0x8, 0xd83, 0x100, 0xa, 0x3, 0x1000, 0x8]}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x2, 0x10000], 0x9, 0x8, 0xf, {0x3, 0x10000009, 0x0}, {0x4, 0x1, @sival_ptr=0x8, @spare=[0x3, 0xffffffff, 0x7ff, 0xf9c, 0xfffffff8, 0x9, 0x5, 0x30000000]}}, {0xffffffffffffffff, 0xd, 0x0, 0x0, [0x0, 0xffffffdc], 0xcbbb, 0xe204ebbace928c63, 0x3, {0x88, 0x3, 0x0}, {0x3, 0x1a, @sigval_ptr=0x9}}], 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000001b00)={r0, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x40000, 0x4], 0x0, 0x2, 0x0, {0x0, 0x4, 0x0}, {0x0, 0x0, @sival_ptr=0x400, @spare=[0x1, 0x2, 0x0, 0x33518c07, 0xdca6, 0x7fffffff, 0x800000000, 0xffff]}}) open(&(0x7f0000000280)='./file0\x00', 0x80400000000206, 0xa0) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r2 = socket(0x1c, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) setsockopt$inet_tcp_int(r2, 0x6, 0x80, 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1002, 0x0, 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00') ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = open(&(0x7f0000000480)='./file0\x00', 0x200202, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r5, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x5) writev(0xffffffffffffffff, 0x0, 0x0) bind$bt_l2cap(r5, 0x0, 0x0) recvfrom(r3, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) sendto(r4, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d3", 0x40, 0x100, 0x0, 0x0) 7.480681995s ago: executing program 0 (id=833): lio_listio(0x0, &(0x7f0000000080)=[{0xffffffffffffffff, 0x0, 0x0, 0x0, [0x100, 0x7], 0x3, 0x6, 0x9, {0x0, 0x9, 0x0}, {0x0, 0x12, @sigval_int=0xb939, @spare=[0xfffffffd, 0x8, 0xd83, 0x100, 0xa, 0x3, 0x1000, 0x8]}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x2, 0x10000], 0x9, 0x8, 0xf, {0x3, 0x10000009, 0x0}, {0x4, 0x1, @sival_ptr=0x8, @spare=[0x3, 0xffffffff, 0x7ff, 0xf9c, 0xfffffff8, 0x9, 0x5, 0x30000000]}}, {0xffffffffffffffff, 0xd, 0x0, 0x0, [0x0, 0xffffffdc], 0xcbbb, 0xe204ebbace928c63, 0x3, {0x88, 0x3, 0x0}, {0x3, 0x1a, @sigval_ptr=0x9}}], 0x3, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000001b00)={r0, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x40000, 0x4], 0x0, 0x2, 0x0, {0x0, 0x4, 0x0}, {0x0, 0x0, @sival_ptr=0x400, @spare=[0x1, 0x2, 0x0, 0x33518c07, 0xdca6, 0x7fffffff, 0x800000000, 0xffff]}}) open(&(0x7f0000000280)='./file0\x00', 0x80400000000206, 0xa0) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r2 = socket(0x1c, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) setsockopt$inet_tcp_int(r2, 0x6, 0x80, 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1002, 0x0, 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00') ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = open(&(0x7f0000000480)='./file0\x00', 0x200202, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r5, 0x0) readv(0xffffffffffffffff, 0x0, 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x5) writev(0xffffffffffffffff, 0x0, 0x0) bind$bt_l2cap(r5, 0x0, 0x0) recvfrom(r3, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) sendto(r4, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d3", 0x40, 0x100, 0x0, 0x0) 7.479156929s ago: executing program 2 (id=834): aio_waitcomplete(0x0, 0x0) r0 = socket(0x2, 0x1, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f0000000080)={0x15, 0x0, 0x10, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0xfffffffe, 0xfdffff85, [0x0, 0x0, 0x7fe, 0xfffffffc]}) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000100)=[{0x3, 0xffffffffffffffff, 0x80a9, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x100) renameat(r3, 0x0, r3, &(0x7f0000000180)='./file1\x00') ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x76, 0x8040, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000540)="339991a32584f54cb905cc96e1b05cd59dfd6655"}) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000380)="8e", 0x1, 0x20004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0x9}, 0x24) r4 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040), 0x4) sendto$unix(r0, &(0x7f00000005c0)='sM', 0x2, 0x0, 0x0, 0x0) rfork(0x1020) syz_emit_ethernet(0x6e, &(0x7f0000000700)={@random="ab785be2a35d", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "1f00", 0x38, 0x3a, 0xff, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@param_prob={0x4, 0x1, 0x0, 0x75, {0x0, 0x6, '\x00', 0x0, 0x2b, 0xff, @empty, @loopback, [@dstopts={0x33}]}}}}}}}) recvmsg(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002680)=""/4096, 0x1000}], 0x1, 0x0}, 0x42) r5 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 7.478690061s ago: executing program 3 (id=835): open$dir(&(0x7f0000000100)='./file0\x00', 0x8, 0x0) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000001800)=""/4096) r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000240), 0x4) r1 = socket$inet6(0x1c, 0x1, 0x0) setsockopt(r1, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x0, @loopback={0x4}}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x31, &(0x7f0000000380)=ANY=[], 0x8) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x2, 0x0, @local, 0x1}, 0x1c) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0xa, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) mknodat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x8000, 0x7) utimes(&(0x7f0000000180)='./file1\x00', 0x0) flock(0xffffffffffffffff, 0x1) r3 = getpid() fcntl$lock(0xffffffffffffffff, 0xe, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000006, r3}) r4 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) fcntl$lock(r4, 0xb, &(0x7f0000000040)={0x3, 0x0, 0x2, 0x100000006}) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x4, 0x1011, 0xffffffffffffffff, 0xfffffffffffffffc) mount(0x0, 0x0, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xa, 0x0, 0x0) setgid(0xffffffffffffffff) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x8, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r5 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x1) open$dir(&(0x7f00000000c0)='./file1\x00', 0x400000, 0x8) fspacectl(r2, 0x1, 0x0, 0x0, 0x0) fchown(r5, 0x0, 0x0) semget$private(0x0, 0x1, 0x40) openat$ptmx(0xffffff9c, &(0x7f0000000000), 0x40000, 0x0) 5.767114049s ago: executing program 0 (id=836): truncate(&(0x7f0000000080)='./file0\x00', 0x80008) cap_fcntls_get(0xffffffffffffffff, 0x0) getrusage(0xffffffffffffffff, &(0x7f0000000040)) sync() thr_suspend(0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100000, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x72) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x188, &(0x7f0000002dc0)={0x10, 0x2, 0x1, @broadcast}, 0x10) rfork(0x4) truncate(&(0x7f00000003c0)='./file0\x00', 0x81) mount(&(0x7f0000000200)='ufs\x00', 0x0, 0x0, &(0x7f0000000140)) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000240)='\xb8o\xc9\xb7\xd1!7\xc0\x85\x97gB\x9f\x1b\xa70%;\xbc G\x9b$\xcd\xd9P/\xd9\xd2\xbc\xa1W3\xd0\xbc\xd3\xce\xbb'], 0x0) cpuset_getaffinity(0x3, 0x3, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', 0xc2ff8094, &(0x7f0000000700)="c61124e7641c53169d4389ffe377e7eb98ba25d252f7a313e4681e7054de4738b2fcb4bbd2a7c50e162a9351d65ca47ea9959741250e1c159102c24fee7a5a06b8e0273daa92cc964380847aab5910faf82f4b50fbb292da6f49ce27f5864e53d95245928b6db47a4cde7dd97f9c143bd9bb8f2a727400000000000000005e7934e98d5ee26898cf1d83c60b0826779faa289e90dbad39a97869d9bc4c09e20afe616f34efdea6673011f36136a3a92ce0f4e0ae4792cb5c88cc82b45cb5581af41635a76293aec844253d889902fa32ea3c9537b64b16aa1ffa66d76782874117644fcfb00df866b4d5c2128c2455ade9") r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) getsockopt$inet6_int(r3, 0x29, 0x30, 0x0, &(0x7f0000000080)) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x2a, 0x0, 0x20, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x9]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x3fb, &(0x7f0000000800)="ff8c898646396880cbab0b53be54ed1603891091fbc12640764bec4632c2c9189535aa7b90a77e15d33ea17080b68890d2e5dc6c899b6a00669a585b883eef82b9f0221779a49bec5c39e92b43b50ecc3fa8b34696018438d5f3be24702b951687dc609137faedbc80669bd036812b86f460819b6a14c2534bee7f38e7d9755d8244727ff8c74f4af8c6cddbb5bd47a40285902fcbd0e024ea0fb5f0fa33d50d0664634c39e5f1d9e0edb2a8f43a8ddf0643a6841932d6d211e02a9d", 0x0, 0x0, &(0x7f00000005c0)="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"}) open(&(0x7f0000000180)='./file0\x00', 0x400000, 0x10) extattr_list_file(&(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0) syz_emit_ethernet(0x148, &(0x7f00000008c0)={@random="fb00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "826e03", 0x112, 0x0, 0x0, @rand_addr="00000000000000000e14fc11133f6400", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x1, 0x41424344, 0x41424344, 0x1, 0x0, 0x6, 0x80, 0x2, 0x0, 0x3, {[@nop]}}, {"0940486efe7b830aa3110403333c62aaf41492159e78d18b209350f498c5c5801839c43879dc2a8a40fbeff7814dc1fa599d59b266f801385425507a2bbc6342f012e40e6244f8923c1fed441e77768f913f328de4ac1145ab72e4361c74e13200ba5a612f2206d472fc961c5d3875a16fcc88963215a7641eff8930431ce5202b9bbd8941ad399a07d0fc90a2f07d55542869e852ede58296f30b1cd389871f754ede48bf38bf3c4cd12afcdb0bf4def5256d55475f6cbe7155a7f18414a9746a77b7a59151f570388d52eabf71c3c28ca85267684bbbd5ea01e0db6b7a6101fee87b715db4956a62e6b9c835d8ca31e47dde3f48ac93577bc8"}}}}}}}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x6, [0x100, 0x3, 0x7]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 5.765762464s ago: executing program 2 (id=837): open(0x0, 0x80400000000206, 0x82) aio_waitcomplete(0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) r0 = socket(0x1, 0x1, 0x0) fpathconf(r0, 0x5) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000000)=0x7fffffff, 0x4) connect(r1, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3, 0x6, @empty, 0x9}, 0x1c) connect$inet6(r1, 0x0, 0x0) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x26, &(0x7f0000000000)=""/24, &(0x7f0000000080)=0x38) dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = kqueue() r3 = kqueue() freebsd11_kevent(r2, 0x0, 0x0, &(0x7f0000000080), 0x1d, 0x0) dup2(r3, r2) rfork(0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @loopback, 0x1}, 0x1c) rfork(0x3000) r4 = socket(0x1, 0x1, 0x3) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) chdir(&(0x7f0000000040)='./file0/file0/..\x00') getpriority(0x1, 0x3) rmdir(&(0x7f0000000140)='./file0/file0/..\x00') pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{0x0}], 0x1, 0x1ff) 5.765167203s ago: executing program 3 (id=838): open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r1 = socket(0x1c, 0x1, 0x0) mkdir(0x0, 0x101) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) setsockopt$inet_int(r2, 0x0, 0x41, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) ioctl$DIOCNATLOOK(0xffffffffffffffff, 0x8008745b, &(0x7f00000003c0)) ioctl$KDGETMODE(r0, 0x40044b09, 0xb) writev(0xffffffffffffffff, &(0x7f0000002340)=[{&(0x7f0000000000)="3c2e719e9fe467c83887bf0453b255ff131bf5999470b3562e087dfc1e51226d3deb834bd4fb66e4e04b8e33a0b0ba133ce23bb595064ffca711b84603a34d6bfc5454c0e02704a27492e6c92413a7bbe113e877f8f8c2f8522b1e4d66ed8bc87f05a82b245d8df90b9a314035cf27e21552fee422ca1aa8a0201762262ae6117e36603843e73775a92c0cb6384bdf885d7e770b", 0x94}, {&(0x7f0000001380)}, {0x0}, {&(0x7f00000015c0)}], 0x4) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) statfs(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x7e, &(0x7f00000003c0)=ANY=[@ANYBLOB="ffffffffffff0000000000000800455000700000000004019078ac1400bbe00000010c009078fd000000456cfffc00640000a6010000001200000000000094060000006289030783038544101ae0000000047f00000100000006890346690394"]) r4 = semget$private(0x0, 0x8, 0x2ca) semop(r4, &(0x7f0000000200)=[{0x1, 0xfff9, 0x1000}], 0x1) semop(r4, &(0x7f0000000380)=[{0x1, 0x7, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) clock_gettime(0x1, &(0x7f0000000380)) 3.942690713s ago: executing program 0 (id=839): aio_waitcomplete(0x0, 0x0) r0 = socket(0x2, 0x1, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f0000000080)={0x15, 0x0, 0x10, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0xfffffffe, 0xfdffff85, [0x0, 0x0, 0x7fe, 0xfffffffc]}) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000100)=[{0x3, 0xffffffffffffffff, 0x80a9, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x100) renameat(r3, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000180)='./file1\x00') ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x76, 0x8040, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000540)="339991a32584f54cb905cc96e1b05cd59dfd6655"}) bind$inet(r0, 0x0, 0x0) connect$inet(r0, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000380)="8e", 0x1, 0x20004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0x9}, 0x24) r4 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040), 0x4) connect$inet6(r4, &(0x7f0000000140)={0x1c, 0x1c, 0x0, 0x0, @empty}, 0x1c) rfork(0x1020) syz_emit_ethernet(0x6e, &(0x7f0000000700)={@random="ab785be2a35d", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "1f00", 0x38, 0x3a, 0xff, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@param_prob={0x4, 0x1, 0x0, 0x75, {0x0, 0x6, '\x00', 0x0, 0x2b, 0xff, @empty, @loopback, [@dstopts={0x33}]}}}}}}}) recvmsg(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002680)=""/4096, 0x1000}], 0x1, 0x0}, 0x42) r5 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 3.941845471s ago: executing program 2 (id=840): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000080)={@multicast1, @empty, @local={0xac, 0x14, 0x0}}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000100)={@multicast2, @multicast2, @rand_addr}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f00000001c0)={@multicast2, @broadcast, @local={0xac, 0x14, 0x0}}, 0xc) setsockopt$inet_mreqn(r0, 0x0, 0xd, &(0x7f0000000040)={@multicast2}, 0xc) 3.941143467s ago: executing program 3 (id=841): open(0x0, 0x80400000000206, 0x82) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd602f5105001c0000fe8000000000000000000000000000bbfe8000000000000000000000000000aa21000569670000004e204e20", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500000009078000068d9ca5b95b1bc0675f6bdefb8a04bdb768b3616bfd9dd36ff680bd17a5caaf02dc644bf108158"]) r0 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) r1 = socket(0x1, 0x1, 0x0) fpathconf(r1, 0x5) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000000)=0x7fffffff, 0x4) connect(r2, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3, 0x6, @empty, 0x9}, 0x1c) connect$inet6(r2, &(0x7f0000000100)={0x1c, 0x1c, 0x2, 0x8, @mcast1, 0x1}, 0x1c) getsockopt$inet_tcp_buf(r0, 0x6, 0x26, &(0x7f0000000000)=""/24, &(0x7f0000000080)=0x38) dup2(0xffffffffffffffff, 0xffffffffffffffff) r3 = kqueue() r4 = kqueue() freebsd11_kevent(r3, 0x0, 0x0, &(0x7f0000000080), 0x1d, 0x0) dup2(r4, r3) rfork(0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x24, 0x0, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @loopback, 0x1}, 0x1c) rfork(0x3000) r5 = socket(0x1, 0x1, 0x3) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) chdir(&(0x7f0000000040)='./file0/file0/..\x00') getpriority(0x1, 0x3) rmdir(&(0x7f0000000140)='./file0/file0/..\x00') pwritev(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000200)="37dc4b0e2e2062bb773e64c6e2778307f57e588f87f6d157a470388316dfec3cf9c791ab7a06cfb1327b8292544077439283f53379ababe29f6dd98a44a2c0aafd1a3f40e2", 0x45}], 0x1, 0x1ff) 2.026289775s ago: executing program 0 (id=842): sysarch$I386_SET_LDT(0x1, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="b1000501600000e9df0000c18125d7f96ecfc73fd3d89815a9c61d3952ddb06b36", 0x21, 0x808, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x11, 0x3, 0x9) sendto$unix(r0, &(0x7f0000000000)="b1000504000004000000000001000000331c13fecea10500fef96ec0c72fd3357ae30200004e3003000000acf20b7804be38164991f7c8cf5f882b297be1aa0500000051e2f0ad3ebbc257699a1f139b672f4d335c223e7d0c032bfa896443a42102034800720fd18bfbb670c1f5a872c881ea6e2ec5890400000000008000361b4cc702fac500002021fbfa0c0f00008abfba221554f4e0f668246c0900000008e371a3f8343712051eea040000000000", 0xb1, 0x20144, 0x0, 0x0) 2.024937507s ago: executing program 2 (id=843): setitimer(0x0, &(0x7f0000003380)={{0x0, 0x3f4bc948}, {0x7, 0x4001}}, 0x0) aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) r0 = socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x2) sendmsg$unix(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="28000000ffff000001"], 0x28, 0x3010b}, 0x0) connectat$unix(0xffffffffffffffff, r2, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1, 0x5, 0xfc) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) minherit(&(0x7f00004ac000/0x3000)=nil, 0x3000, 0x1) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) syz_emit_ethernet(0x9f, 0x0) rmdir(&(0x7f0000000080)='./file0/file1\x00') r5 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000300)={0x0, 0x14, 0x0, 0x0, 0x1, &(0x7f0000000040)='\b', 0x0, 0x4d46b76e, [0x0, 0x7fffffff, 0x5, 0x5]}) cpuset(&(0x7f0000000000)) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x18) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) r7 = kqueue() freebsd11_kevent(r7, &(0x7f0000000280)=[{0x2, 0xfffffffffffffffc, 0x8000, 0x10, 0x80000000000004, 0x3}, {0x101, 0xffffffffffffffff, 0x4048, 0x40000000, 0x1, 0x80000000}, {0x4551, 0xfffffffffffffff8, 0x8048, 0x80000000, 0x6, 0x1}, {0x0, 0xffffffffffffffff, 0x8004, 0x20, 0x3, 0x5}], 0x4, 0x0, 0x0, 0x0) getsockopt$inet6_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r4, 0x84, 0x24, &(0x7f0000000340)={r6, @in={{0x10, 0x2, 0x0, @broadcast}}, 0x4}, &(0x7f0000000100)=0x88) setsockopt$inet6_sctp_SCTP_DELAYED_SACK(r5, 0x84, 0xf, &(0x7f00000001c0)={r8, 0x0, 0xc39}, 0xc) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2.023369964s ago: executing program 3 (id=844): socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) __cap_rights_get(0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) ioctl$SMB_PCALL(r1, 0x8004667e, &(0x7f0000002400)={0x10, 0x1, 0x0, @byte=0xf, @buf="458f", 0x7, 0x0, 0x3d, 0x0}) sendmsg$unix(r0, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004cc0)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]}], 0x60}, 0x0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x2009, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0x12, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0xb, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x1, 0x5, 0x5229, 0x9, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x0, 0x8, 0xc, 0x8]}, {0x5c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x3, 0x1000, 0x7, 0x6, 0x7, 0x7ffe, 0x0, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x9, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x6, 0xf4, 0x58, 0x4, 0xff, 0x1, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x800, 0x0, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0x86a8, 0x538, 0x7bb0, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x8, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x0, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x20000001, 0xfff, 0x17e7, 0x8, 0x107, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1ff, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000000, 0xc, 0x0, 0x80000001, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x3, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124442, 0x8, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xebe, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0x61b, 0x2, 0x4, 0x3b, 0x3, 0x40, 0x225, 0x80, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0x9, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x4, 0x7, 0x2, 0x1ff, 0x7, 0x1, 0x2, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x6, 0x7ff, 0x7ff, 0x10000, 0x4, 0x6, 0x435c9460, 0x3ff, 0x7ff, 0x4a, 0x40, 0x0, 0x3, 0x7]}, {0x3, [0x7, 0x2, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xfffffffa, 0x3, 0x7ff, 0x430c, 0x8, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x6, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x13, 0xce94, 0x5, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0x100, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd1, 0x3, 0xda0, 0x9, 0x6, 0xb7af, 0x7, 0x2, 0x6, 0x6, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff5, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x3, 0xfff, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xfffffff8, 0x4, 0x18001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc9, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0xd8, 0x7, 0x5, 0x9, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0xd066, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x10000, 0x8, 0xae, 0xa, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x400001, 0x272, 0xc, 0x0, 0x4, 0x4, 0x400, 0x5, 0xfffffffc, 0xffffffff, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x1800000, 0x5, 0x4, 0xe6dc, 0x4, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0x0, 0x1ff, 0x2, 0x3, 0xdb84, 0x2, 0x1, 0x4, 0x81, 0x8, 0x2, 0x4, 0x6, 0x1, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x4, 0x80000001, 0x1ff, 0x7ff, 0xa, 0x3, 0x1, 0x7, 0xbc, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x4009, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x6, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x1, 0x5, 0x4, 0x1a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x4, 0x7, 0xfffffffb]}, {0x6, [0x10, 0x40, 0x1, 0x253, 0x8, 0x8, 0x6, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x4, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x3, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x2, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0xd, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7ff, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0x1000, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x7ffffffd, 0x7, 0x7fff, 0x0, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x4, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffe, 0xffffe64b, 0xfffffff9, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x9, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x2000000, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x80, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x8, 0x92, 0x40a54e46, 0x100001, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x2, 0x5, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x3b, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x2, 0x1, 0x41, 0x27c, 0x6, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x8, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x0, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x4, 0x6, 0x0, 0x5, 0x4003, 0x7, 0xff, 0x10a, 0x7, 0x3, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x401, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xbd, 0x800, 0x4, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x0, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0xa, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x80, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0x3, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x87ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x88, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x0, 0x8, 0x84e1, 0xd934, 0x7, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x28, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x4, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x4080, 0x1, 0x1, 0x5, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x10009, 0x8, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x2, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x8, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0xbe9e, 0x7, 0x6cec, 0x40010001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x3ff, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) aio_waitcomplete(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r2, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) sendmsg$unix(r4, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[], 0x100}, 0x0) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) r5 = socket(0x1c, 0x1, 0x0) r6 = socket(0x1b, 0x3, 0x0) sendto$inet6(r6, &(0x7f0000000180)="0216000702000300000000008fc3", 0xe, 0x188, 0x0, 0x0) syz_emit_ethernet(0x2dd, &(0x7f0000002f80)={@local, @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2cf, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1, {[@rr={0x7, 0x3, 0xad}]}}, @icmp=@echo={0x8, 0x0, 0x0, 0x7, 0xb, "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"}}}}}) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) r7 = semget$private(0x0, 0x7, 0x3c0) semop(r7, &(0x7f0000000140)=[{0x3, 0x3, 0x1000}, {0x5, 0x25f}, {0x5, 0x7, 0x800}, {0x4, 0x6, 0x800}, {0x3, 0x6, 0x1000}], 0x5) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) setsockopt$inet_sctp_SCTP_BINDX_ADD_ADDR(0xffffffffffffffff, 0x84, 0x8001, &(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x0, 0x2, @empty, 0x9}, 0x0) inotify_add_watch_at(0xffffffffffffffff, r1, &(0x7f0000001940)='./file0\x00', 0x1000000) socket(0x2, 0x1, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) fstat(r0, &(0x7f00000025c0)) 3.525024ms ago: executing program 0 (id=845): ktimer_create(0x0, 0x0, &(0x7f0000000100)=0x0) ktimer_settime(r0, 0x0, &(0x7f0000000240)={{0x0, 0x105}, {0x0, 0x3f}}, 0x0) ktimer_settime(r0, 0x0, 0x0, &(0x7f00000005c0)) 2.96002ms ago: executing program 2 (id=846): aio_waitcomplete(0x0, 0x0) r0 = socket(0x2, 0x1, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f0000000080)={0x15, 0x0, 0x10, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0xfffffffe, 0xfdffff85, [0x0, 0x0, 0x7fe, 0xfffffffc]}) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000100)=[{0x3, 0xffffffffffffffff, 0x80a9, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x100) renameat(r3, 0x0, r3, &(0x7f0000000180)='./file1\x00') ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x76, 0x8040, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000000540)="339991a32584f54cb905cc96e1b05cd59dfd6655"}) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000380)="8e", 0x1, 0x20004, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0x9}, 0x24) r4 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040), 0x4) sendto$unix(r0, &(0x7f00000005c0)='sM', 0x2, 0x0, 0x0, 0x0) rfork(0x1020) syz_emit_ethernet(0x6e, &(0x7f0000000700)={@random="ab785be2a35d", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "1f00", 0x38, 0x3a, 0xff, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@param_prob={0x4, 0x1, 0x0, 0x75, {0x0, 0x6, '\x00', 0x0, 0x2b, 0xff, @empty, @loopback, [@dstopts={0x33}]}}}}}}}) recvmsg(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000002680)=""/4096, 0x1000}], 0x1, 0x0}, 0x42) r5 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 0s ago: executing program 3 (id=847): socketpair(0x1, 0x1, 0x2, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000180)=0x3, 0x4) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000500)=0x7ff, 0x4) r1 = socket$inet_sctp(0x2, 0x5, 0x84) socket(0x10, 0x10000000, 0x6c) recvmsg(r1, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) syz_emit_ethernet(0x36, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaa00f6074d3b7447f90008004500006e080800000000000000ffffff77fc65e7ac14", @ANYRESHEX=r1, @ANYRES32=0x0, @ANYBLOB='P\x00\x00\x00']) r2 = socket(0x1c, 0x1, 0x0) shmat(0x0, &(0x7f00002ed000/0x1000)=nil, 0x2000) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) setreuid(0xee00, 0x0) seteuid(0x0) kevent(0xffffffffffffffff, &(0x7f0000000200)=[{0x10001, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x4, 0x0, 0x7, 0x40000000000000]}, {0x7, 0x2, 0x1, 0x1, 0x0, 0xfffffffd, [0x2a, 0x6, 0x8, 0x4]}], 0x2, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0x8, 0x0, 0x0, 0x7}, 0x0, &(0x7f0000001000), &(0x7f0000001080)) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000080)={0x19, 0x0, 0x12, &(0x7f0000000000)="ec7b00000900ff2425c1f0a58b519798d25c", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0x1000]}) ioctl$CIOCCRYPT(r3, 0xc01c6367, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x38, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000001400)}) r4 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0x514a3d84}, 0x24) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) cap_ioctls_get(r4, &(0x7f0000000000)=[0x0, 0x0], 0x2) socket(0x2, 0x1, 0x0) syz_emit_ethernet(0xe, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000001"]) writev(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000000)="b886b4e47f", 0xfffffffffffffee7}], 0x1) syz_emit_ethernet(0x138, &(0x7f00000001c0)=ANY=[@ANYBLOB="9d33abe1d2678b88222abc32b6811ec5dff31f916455653368b490bdf56309", @ANYRES32=r0]) r5 = socket(0x2, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) bind(r5, &(0x7f0000000000), 0x10) listen(r5, 0x0) accept$unix(r5, &(0x7f0000000080)=@abs, &(0x7f00000000c0)=0x8) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.74' (ED25519) to the list of known hosts. md0: truncating fractional last sector by 3 bytes Oct 9 16:22:30 ci-freebsd-i386-1 kernel: arp: from aa:aa:aa:aa:aa:bb: addr len: new 0, i/f 6 (ignored) if_delmulti_locked: detaching ifnet instance 0xfffffe00077f6800 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 if_delmulti_locked: detaching ifnet instance 0xfffffe005859b800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f6800 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 md2: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe005859b800 Oct 9 16:22:41 ci-freebsd-i386-1 syslogd: last message repeated 1 times md3: truncating fractional last sector by 3 bytes lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe006df43208 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1688 2nd 0xffffffff83cdea40 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1387 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff81683991 at witness_checkorder+0x781 #1 0xffffffff81508537 at __mtx_lock_flags+0x187 #2 0xffffffff8186dfec at tunifioctl+0x15c #3 0xffffffff8184921e at ifhwioctl+0xefe #4 0xffffffff8184d412 at ifioctl+0xde2 #5 0xffffffff8169277a at kern_ioctl+0x52a #6 0xffffffff8169215e at sys_ioctl+0x36e #7 0xffffffff8216a8b2 at amd64_syscall+0x4e2 #8 0xffffffff8210ef8b at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff81684862 at witness_checkorder+0x1652 #1 0xffffffff815721f9 at _sx_xlock+0x139 #2 0xffffffff8186df1a at tunifioctl+0x8a #3 0xffffffff8184a0cb at ifhwioctl+0x1dab #4 0xffffffff8186b982 at tunioctl+0xd92 #5 0xffffffff811df5c6 at devfs_ioctl+0x266 #6 0xffffffff8232cf87 at VOP_IOCTL_APV+0x87 #7 0xffffffff817f04e7 at vn_ioctl+0x3c7 #8 0xffffffff811e0489 at devfs_ioctl_f+0x69 #9 0xffffffff8169277a at kern_ioctl+0x52a #10 0xffffffff8169215e at sys_ioctl+0x36e #11 0xffffffff80442dd7 at freebsd32_ioctl+0x607 #12 0xffffffff822f4eb2 at ia32_syscall+0x4d2 #13 0xffffffff8210f7ef at int0x80_syscall_common+0x9c if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 Oct 9 16:23:16 ci-freebsd-i386-1 kernel: attempted source route from 224.0.0.2 to 172.20.0.187 vnode_pager_putpages: zero-length write at 0 resid 2002 0xfffffe006e5561b8: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371c540 usecount 2, writecount 2, refcount 3 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00540e83e0 ref 1 pages 1 cleanbuf 1 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe005414a780 (pid 1148, syz-executor, tid 100915) nlink=1, effnlink=1, size=2002, extsize=0 generation=5d91db11, uid=0, gid=0, flags=0x4 ino 134, on dev gpt/rootfs Oct 9 16:23:23 ci-freebsd-i386-1 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 ZFS filesystem version: 5 ZFS storage pool version: features support (5000) Oct 9 16:23:47 ci-freebsd-i386-1 kernel: attempted source route from 224.0.0.2 to 172.20.2.187 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 Oct 9 16:24:18 ci-freebsd-i386-1 syslogd: last message repeated 1 times Out of ktrace request objects. md4: truncating fractional last sector by 3 bytes ip6_pcbopts: all specified options are cleared. vnode_pager_putpages: zero-length write at 0 resid 2002 0xfffffe00782356e0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371c540 usecount 2, writecount 2, refcount 3 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe007da248b8 ref 1 pages 1 cleanbuf 1 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe007da0f780 (pid 1677, syz-executor, tid 102107) nlink=1, effnlink=1, size=2002, extsize=0 generation=aa557642, uid=0, gid=0, flags=0x4 ino 211, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f6800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=1 req=340 state=1 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-1.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl