last executing test programs: 2m17.976580416s ago: executing program 2 (id=67): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0xd0d6, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) __realpathat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/5, 0xffffffffffffff28, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) sendmsg$unix(r2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="10000000ffff000006"], 0x10}, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x6000) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca000000000000000000"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x30000241) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457d91d84c842fb3074", 0x47) extattr_get_file(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)='(*,\'$[:\x00', &(0x7f0000000100)=""/78, 0x4e) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 2m17.111385696s ago: executing program 2 (id=71): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) symlink(0x0, &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, r1, &(0x7f0000000280)='.\x00', 0x21000630) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) (fail_nth: 1) 2m16.227372056s ago: executing program 2 (id=75): kevent(0xffffffffffffffff, &(0x7f0000000540)=[{0xc8, 0xffffffffffffffff, 0x4021, 0x42, 0xffffffffffffffff, 0x0, [0x8, 0x8000000000080003]}], 0x1, 0x0, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff9, 0x17, 0x10}], 0x29f, 0x0, 0x8001, 0x0) thr_self(&(0x7f0000000000)) clock_nanosleep(0x4, 0x0, &(0x7f0000000bc0)={0x2, 0x6}, 0x0) r0 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000080)={0x0, 0x1, 0x8, 0x0, 0x7, 0x6}, 0x14) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r1 = socket$inet6(0x1c, 0x2, 0x0) r2 = socket$inet6(0x1c, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x20005, @loopback, 0x4}, 0x1c) connect$inet6(r2, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0000000000000000b8e75dce6e8bdcd8"}, 0x1c) bind$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x5, @mcast1, 0x3}, 0x1c) rfork(0x85000) fcntl$setown(0xffffffffffffffff, 0x6, 0x0) r3 = open(0x0, 0x400000, 0x0) open$dir(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x10) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0x79, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x401, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x9d84, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x5, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x4, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x1, 0x8, 0xc, 0x8]}, {0x4005c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0xfffffffc, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x7f33c58a, 0x2, 0x55, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x1000009, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x800, 0x7f, 0xff, 0x6, 0x7, 0x3, 0x80000001, 0x1, 0xdd, 0x2, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x1, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x5, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x6, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124446, 0x7, 0x0, 0x3, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x42, 0x225, 0x81, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x7, 0x0, 0x7f, 0x401, 0x7, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0xfffe, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0xb730, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xffffdffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0x2, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x8, 0x263, 0xabd4, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff8, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x3, 0x7, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xe, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc8, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x40]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x3, 0x7, 0x3, 0x1, 0x2, 0x80, 0x1, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x9, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x402, 0x5, 0xfffffffc, 0x0, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x0, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40001000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x7, 0x81, 0x8, 0x2, 0x4, 0x6, 0x2, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x1360000, 0x8, 0x1ff, 0x7ff, 0xa, 0x0, 0xfffffffd, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1002, 0xfffffff7, 0x1ff, 0xffffffff, 0x3, 0x8001, 0x1, 0x8, 0x0, 0x4, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x41a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xdc]}, {0x6, [0x3, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x7, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0xffe, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x4, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1003, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0xa, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x1000008, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x6, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x404, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x4, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0xc1, 0x5, 0x2271, 0x1, 0x2, 0x1, 0xe0, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x0, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x1, 0x8, 0x84e1, 0xd934, 0xe003, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xffffffff, 0x1, 0x3, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x5, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0xfffd, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x80005, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) rename(&(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000010c0)='./file0\x00') r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x51, &(0x7f0000001940)={0x7fffffff, {{0x1c, 0x1c, 0x2, 0x2, @local={0xfe, 0x80, '\x00', 0x0}, 0x5}}}, 0x80) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r5, 0xa9be, &(0x7f0000000440)="0a76f7", 0x3, [0x0, 0x2], 0xfffffffffffffffd, 0x0, 0xfffffffe, {0xfffffffffffffffd, 0x7, 0x0}, {0x0, 0x1, @sival_ptr, @spare=[0xf4c0, 0x2, 0x7f, 0x697f, 0x2, 0x5, 0x9, 0x3]}}) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x2b) preadv(r6, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) kqueue() inotify_add_watch_at(r4, r3, &(0x7f0000000280)='.\x00', 0x21000630) 2m16.077586554s ago: executing program 2 (id=77): socket(0x1c, 0x1, 0x0) socket$inet6(0x1c, 0x10000000, 0x6) r0 = __specialfd$inotify(0x2, &(0x7f0000000440)={0x100000}, 0x4) fcntl$setstatus(r0, 0x4, 0x40) syz_emit_ethernet(0x83, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d11c19e9ace00000000000000002100000002ff02000000000000000000000000000104004e20004d", @ANYRES8=r0, @ANYRES64=r0]) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x2, 0x7, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0xb, 0x8, 0xe8c1, 0x0, [0x6, 0x7f, 0x0, 0x4]}], 0x1, 0x0, 0x0, 0x0) setgroups(0x0, 0x0) syz_emit_ethernet(0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x108) socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x1a38, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4) write(r3, &(0x7f0000000080)="c3", 0x1) 2m15.265119602s ago: executing program 2 (id=81): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0xd0d6, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) __realpathat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/5, 0xffffffffffffff28, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) sendmsg$unix(r2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="10000000ffff000006"], 0x10}, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x6000) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca000000000000000000"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x30000241) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457d91d84c842fb3074", 0x47) extattr_get_file(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)='(*,\'$[:\x00', &(0x7f0000000100)=""/78, 0x4e) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 2m14.418789465s ago: executing program 2 (id=85): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) symlink(0x0, &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, r1, &(0x7f0000000280)='.\x00', 0x21000630) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 1m45.298064859s ago: executing program 3 (id=201): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0xd0d6, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) __realpathat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/5, 0xffffffffffffff28, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) sendmsg$unix(r2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="10000000ffff000006"], 0x10}, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) linkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x6000) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x30000241) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457d91d84c842fb3074", 0x47) extattr_get_file(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)='(*,\'$[:\x00', &(0x7f0000000100)=""/78, 0x4e) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 1m44.453811548s ago: executing program 3 (id=204): socket(0x1c, 0x1, 0x0) socket$inet6(0x1c, 0x10000000, 0x6) r0 = __specialfd$inotify(0x2, &(0x7f0000000440)={0x100000}, 0x4) fcntl$setstatus(r0, 0x4, 0x40) syz_emit_ethernet(0x83, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d11c19e9ace00000000000000002100000002ff02000000000000000000000000000104004e20004d", @ANYRES8=r0, @ANYRES64=r0]) dup2(0xffffffffffffffff, 0xffffffffffffffff) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x2, 0x7, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') __realpathat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/5, 0xffffffffffffff28, 0x0) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0xb, 0x8, 0xe8c1, 0x0, [0x6, 0x7f, 0x0, 0x4]}], 0x1, 0x0, 0x0, 0x0) setgroups(0x0, 0x0) syz_emit_ethernet(0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x108) socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x39, 0x0, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x1a38, 0x0) pipe2(&(0x7f0000000040)={0xffffffffffffffff}, 0x4) write(r3, &(0x7f0000000080)="c3", 0x1) 1m44.39655907s ago: executing program 3 (id=205): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0xd0d6, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="3c0000000600000009000000a6bea2c54ee07b816636f9c336b1ee33c6babd5ebd098f6562a8928d7835e0b1f545947d2883a57d247eb72bf83d22cad800000000000000080000005abea7a6d157c84eee170e8b148bbde521e491ff230386de21d4fcac433d13393c073f438d25ef889630ce5af3c03a9a02599e69b2a1e891d06922661c1d35d8408e4ad90f954f03e8cf18366b9530d0a204f0ff126a597ab8a31eac61ababfd053fcda7753eb07a948b2e7b8d4e0e23e6e9dd111191bc69c2ec3fa2241e4621f86e54f62ebe751a3ea22c2bacd10c66d685b6a70c987b5de663bd3a145c77d21edba118b920ced29e52e6f84845c1491c161fefad9c2e31a5332e6a2032784702aa40e7ed662c7947070d99a40000003a0000000200000068842e59facb31b354387c194390ca388a7ee4b90d44f632fa2b8c5c117235acf902441377fa5464fb5a632b7fd9875d5efb8dd688fca19ef34cf3474e34c7d465935a7ea879324aba9a84998444f395e008204568c2878724785daa4bc06edb22359a0724db1449da0a4b04562d4b5edf398af59ede9adc1672fcfb807048f0a4bd278f182759e3b828af114a2acdf330998233c4d0eb95"], 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) __realpathat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/5, 0xffffffffffffff28, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) sendmsg$unix(r2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="10000000ffff000006"], 0x10}, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x6000) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca000000000000000000"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x30000241) extattr_get_file(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)='(*,\'$[:\x00', &(0x7f0000000100)=""/78, 0x4e) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 1m43.552410996s ago: executing program 3 (id=208): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r1 = openat$bpf(0xffffff9c, &(0x7f00000001c0), 0x100000, 0x0) ioctl$BIOCSETWF32(r1, 0x8008427b, &(0x7f0000000480)={0x5, 0xfffeffff}) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffd}, 0x1c) sendto$inet6(r0, &(0x7f0000000240)="88", 0xffffffffffffffe5, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) aio_write(&(0x7f0000000340)={r2, 0xfffffffffffffff9, 0x0, 0x0, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x5, 0x7, 0x0}, {0x0, 0x0, @sival_int, @spare=[0x9, 0x9, 0xf, 0x2, 0x4, 0xd24, 0x10000, 0x6b]}}) setsockopt$sock_splice(r0, 0xffff, 0x1023, 0x0, 0x0) aio_write(&(0x7f0000000340)={0xffffffffffffffff, 0x80000001, 0x0, 0x0, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x1, 0x7, 0x0}, {0x4}}) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) aio_read(&(0x7f0000000180)={r3, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_ptr, @thr={0x0, 0x0}}}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) rfork(0x5040) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="1000"], 0x10}, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x41, &(0x7f0000000100)="7b93f6e87361369503b3e9c14ba8273028fd5516ced513cae97562f466178dedb8395367a6880b5554a708b6f0d6fa666e1ced9f123aeffd96db5e2faff2650b669279e57ed275498d9fc3d7dba030cafd6c9d439990cd3c9a72b945091642e8b43678ace84518413d11c1419b9a2ec1dd52292f65453b5666709fc43addf25b73dcc68e37835aa86eddef6812d7a395a29c5d28c1ea026e0084c4c0577340cb9fe3ce4f817218a1bb108904a5fedb895f9a18263fc4441ee78e24ecd6e59aa87dfd90bbe0fe50dbb62242b06eb59e38c9dc0aa0e73233bc4a9160751340d3c441f5f2020d31c97ed8ee86b48ad71d1df79c0f7d54fe9fee", 0xf8) socket$inet(0x2, 0x1, 0x0) kqueue() mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 1m42.710776119s ago: executing program 3 (id=212): r0 = socket(0x1b, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000100)=0xcb72, 0x40) ioctl$BIOCSTSTAMP(0xffffffffffffff9c, 0x80044284, &(0x7f0000000140)=0x3) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x8) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r1, 0x0, 0xd, &(0x7f0000000000)={@multicast1, @multicast2}, 0xc) getsockopt$inet_mreqn(r1, 0x0, 0x9, 0x0, &(0x7f00000004c0)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x1, 0x1, 0x0) freebsd11_lstat(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgid(r4) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) writev(r5, &(0x7f0000000e80)=[{&(0x7f0000000880)='\'', 0x1}], 0x1) msgsnd(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="a1f1675381769f1efeed7d7a988f56ed99a38d12967940cc0a7cfd9bc7b8ae798c263e15047cc200d8046684a504ca58adbbb2b2f84f50aba405b6902e989a8949ebb8acdc0971ed934ea9bc6bb318a9a2"], 0x4, 0x0) msync(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) bind$inet(r6, 0x0, 0x0) r7 = open(&(0x7f0000000340)='./file0\x00', 0x80000000000206, 0x20) ftruncate(0xffffffffffffffff, 0x13c1) fspacectl(r7, 0x1, &(0x7f0000000000)={0x1000, 0x5d}, 0x0, 0x0) r8 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r8, 0xc030636a, &(0x7f0000000080)={0x28, 0x0, 0x10, &(0x7f0000000000)="ec7b0000f2feff03000000000000007f", 0x0, 0x0, 0x0, 0xfdffef85}) ioctl$CIOCCRYPT(r8, 0xc01c6367, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x10003, 0x0, 0x0, &(0x7f0000000100), &(0x7f0000000240)}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) aio_write(&(0x7f0000000240)={r2, 0xa9be, &(0x7f0000000440)='\n', 0x1, [0x0, 0x2], 0xfffffffffffffffd, 0x0, 0xfffffffe, {0xfffffffffffffffd, 0x7, 0x0}, {0x0, 0x1, @sival_ptr, @spare=[0xf4c0, 0x2, 0x7f, 0x697f, 0x2, 0x5, 0x9, 0x3]}}) r9 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x2b) preadv(r9, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) 1m41.863871897s ago: executing program 3 (id=215): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0xd0d6, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') __realpathat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/5, 0xffffffffffffff28, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) sendmsg$unix(r2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="10000000ffff000006"], 0x10}, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) linkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x6000) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) setsockopt$inet6_IPV6_RTHDR(r5, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca000000000000000000"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x30000241) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457d91d84c842fb3074", 0x47) extattr_get_file(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)='(*,\'$[:\x00', &(0x7f0000000100)=""/78, 0x4e) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 4.484979766s ago: executing program 0 (id=486): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r1 = openat$bpf(0xffffff9c, &(0x7f00000001c0), 0x100000, 0x0) ioctl$BIOCSETWF32(r1, 0x8008427b, &(0x7f0000000480)={0x5, 0xfffeffff}) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffd}, 0x1c) sendto$inet6(r0, &(0x7f0000000240)="88", 0xffffffffffffffe5, 0x0, 0x0, 0x0) aio_write(&(0x7f0000000340)={0xffffffffffffffff, 0xfffffffffffffff9, 0x0, 0x0, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x5, 0x7, 0x0}, {0x0, 0x0, @sival_int, @spare=[0x9, 0x9, 0xf, 0x2, 0x4, 0xd24, 0x10000, 0x6b]}}) setsockopt$sock_splice(r0, 0xffff, 0x1023, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r2, 0x80000001, 0x0, 0x0, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x1, 0x7, 0x0}, {0x4}}) aio_read(&(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_ptr, @thr={0x0, 0x0}}}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) rfork(0x5040) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x402, &(0x7f00000000c0)="08bea7c2", 0x4) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="1000"], 0x10}, 0x0) setsockopt$inet_tcp_buf(r3, 0x6, 0x41, &(0x7f0000000100)="7b93f6e87361369503b3e9c14ba8273028fd5516ced513cae97562f466178dedb8395367a6880b5554a708b6f0d6fa666e1ced9f123aeffd96db5e2faff2650b669279e57ed275498d9fc3d7dba030cafd6c9d439990cd3c9a72b945091642e8b43678ace84518413d11c1419b9a2ec1dd52292f65453b5666709fc43addf25b73dcc68e37835aa86eddef6812d7a395a29c5d28c1ea026e0084c4c0577340cb9fe3ce4f817218a1bb108904a5fedb895f9a18263fc4441ee78e24ecd6e59aa87dfd90bbe0fe50dbb62242b06eb59e38c9dc0aa0e73233bc4a9160751340d3c441f5f2020d31c97ed8ee86b48ad71d1df79c0f7d54fe9fee", 0xf8) socket$inet(0x2, 0x1, 0x0) kqueue() mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 3.638893194s ago: executing program 0 (id=487): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r1 = openat$bpf(0xffffff9c, &(0x7f00000001c0), 0x100000, 0x0) ioctl$BIOCSETWF32(r1, 0x8008427b, &(0x7f0000000480)={0x5, 0xfffeffff}) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffd}, 0x1c) sendto$inet6(r0, &(0x7f0000000240)="88", 0xffffffffffffffe5, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) aio_write(&(0x7f0000000340)={r2, 0xfffffffffffffff9, 0x0, 0x0, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x5, 0x7, 0x0}, {0x0, 0x0, @sival_int, @spare=[0x9, 0x9, 0xf, 0x2, 0x4, 0xd24, 0x10000, 0x6b]}}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r3, 0x80000001, 0x0, 0x0, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x1, 0x7, 0x0}, {0x4}}) aio_read(&(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_ptr, @thr={0x0, 0x0}}}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) rfork(0x5040) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x402, &(0x7f00000000c0)="08bea7c2", 0x4) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="1000"], 0x10}, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x41, &(0x7f0000000100)="7b93f6e87361369503b3e9c14ba8273028fd5516ced513cae97562f466178dedb8395367a6880b5554a708b6f0d6fa666e1ced9f123aeffd96db5e2faff2650b669279e57ed275498d9fc3d7dba030cafd6c9d439990cd3c9a72b945091642e8b43678ace84518413d11c1419b9a2ec1dd52292f65453b5666709fc43addf25b73dcc68e37835aa86eddef6812d7a395a29c5d28c1ea026e0084c4c0577340cb9fe3ce4f817218a1bb108904a5fedb895f9a18263fc4441ee78e24ecd6e59aa87dfd90bbe0fe50dbb62242b06eb59e38c9dc0aa0e73233bc4a9160751340d3c441f5f2020d31c97ed8ee86b48ad71d1df79c0f7d54fe9fee", 0xf8) socket$inet(0x2, 0x1, 0x0) kqueue() mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 3.637071062s ago: executing program 1 (id=495): r0 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r1 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000700)='./file1\x00', 0xd7848ede797c9e10, 0x0) r2 = socket(0x1b, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000180)="02090103020000008e4cb277fce00d8f", 0x10, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = kqueue() freebsd11_fstat(r3, &(0x7f00000000c0)) r4 = socket(0x1, 0x1, 0xfd) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x107, &(0x7f0000000000)={0x0, 0x3, 0x3, 0x7}, &(0x7f0000000080)=0x18) preadv(r4, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/33, 0x21}, {&(0x7f0000000200)=""/74, 0x4a}, {&(0x7f0000000300)=""/222, 0xde}, {&(0x7f0000000740)=""/4096, 0x1000}], 0x4, 0x6) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x900, &(0x7f0000000100)={r5, 0x389}, &(0x7f0000000140)=0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setreuid(0x0, 0xffffffffffffffff) chdir(&(0x7f0000000040)='./file0\x00') sendmsg$unix(r4, &(0x7f0000002b80)={&(0x7f00000000c0)=@file={0xa, 0x1, './file0\x00'}, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x84) shmctl$SHM_STAT(0x0, 0xd, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0x40, &(0x7f0000000040)='hd\x00', 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0x40, &(0x7f00000001c0)='dctcp\x00', 0x6) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 2.768936372s ago: executing program 0 (id=488): r0 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r1 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r1, r0, 0x0, 0x21000630) open$dir(&(0x7f0000000700)='./file1\x00', 0xd7848ede797c9e10, 0x0) r2 = socket(0x1b, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000180)="02090103020000008e4cb277fce00d8f", 0x10, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = kqueue() freebsd11_fstat(r3, &(0x7f00000000c0)) r4 = socket(0x1, 0x1, 0xfd) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x107, &(0x7f0000000000)={0x0, 0x3, 0x3, 0x7}, &(0x7f0000000080)=0x18) preadv(r4, &(0x7f0000000440)=[{&(0x7f00000001c0)=""/33, 0x21}, {&(0x7f0000000200)=""/74, 0x4a}, {&(0x7f0000000300)=""/222, 0xde}, {&(0x7f0000000740)=""/4096, 0x1000}, {&(0x7f0000000400)=""/34, 0x22}], 0x5, 0x6) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r4, 0x84, 0x900, &(0x7f0000000100)={r5, 0x389}, &(0x7f0000000140)=0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setreuid(0x0, 0xffffffffffffffff) chdir(&(0x7f0000000040)='./file0\x00') sendmsg$unix(r4, &(0x7f0000002b80)={&(0x7f00000000c0)=@file={0xa, 0x1, './file0\x00'}, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x84) shmctl$SHM_STAT(0x0, 0xd, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r6, 0x6, 0x40, &(0x7f0000000040)='hd\x00', 0x3) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 2.76463697s ago: executing program 1 (id=489): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0xd0d6, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="3c0000000600000009000000a6bea2c54ee07b816636f9c336b1ee33c6babd5ebd098f6562a8928d7835e0b1f545947d2883a57d247eb72bf83d22cad800000000000000080000005abea7a6d157c84eee170e8b148bbde521e491ff230386de21d4fcac433d13393c073f438d25ef889630ce5af3c03a9a02599e69b2a1e891d06922661c1d35d8408e4ad90f954f03e8cf18366b9530d0a204f0ff126a597ab8a31eac61ababfd053fcda7753eb07a948b2e7b8d4e0e23e6e9dd111191bc69c2ec3fa2241e4621f86e54f62ebe751a3ea22c2bacd10c66d685b6a70c987b5de663bd3a145c77d21edba118b920ced29e52e6f84845c1491c161fefad9c2e31a5332e6a2032784702aa40e7ed662c7947070d99a40000003a0000000200000068842e59facb31b354387c194390ca388a7ee4b90d44f632fa2b8c5c117235acf902441377fa5464fb5a632b7fd9875d5efb8dd688fca19ef34cf3474e34c7d465935a7ea879324aba9a84998444f395e008204568c2878724785daa4bc06edb22359a0724db1449da0a4b04562d4b5edf398af59ede9adc1672fcfb807048f0a4bd278f182759e3b828af114a2acdf330998233c4d0eb95c8"], 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) __realpathat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/5, 0xffffffffffffff28, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) sendmsg$unix(r2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="10000000ffff000006"], 0x10}, 0x0) recvmsg(r3, 0x0, 0x60043) setresuid(0x0, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca000000000000000000"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x30000241) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457d91d84c842fb3074", 0x47) extattr_get_file(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)='(*,\'$[:\x00', &(0x7f0000000100)=""/78, 0x4e) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 1.900559985s ago: executing program 0 (id=490): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r1 = openat$bpf(0xffffff9c, &(0x7f00000001c0), 0x100000, 0x0) ioctl$BIOCSETWF32(r1, 0x8008427b, &(0x7f0000000480)={0x5, 0xfffeffff}) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffd}, 0x1c) sendto$inet6(r0, &(0x7f0000000240)="88", 0xffffffffffffffe5, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) aio_write(&(0x7f0000000340)={r2, 0xfffffffffffffff9, 0x0, 0x0, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x5, 0x7, 0x0}, {0x0, 0x0, @sival_int, @spare=[0x9, 0x9, 0xf, 0x2, 0x4, 0xd24, 0x10000, 0x6b]}}) setsockopt$sock_splice(r0, 0xffff, 0x1023, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r3, 0x80000001, 0x0, 0x0, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x1, 0x7, 0x0}, {0x4}}) r4 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) aio_read(&(0x7f0000000180)={r4, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_ptr, @thr={0x0, 0x0}}}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) rfork(0x5040) setsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x402, &(0x7f00000000c0)="08bea7c2", 0x4) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="1000"], 0x10}, 0x0) setsockopt$inet_tcp_buf(r5, 0x6, 0x41, 0x0, 0x0) socket$inet(0x2, 0x1, 0x0) kqueue() mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 1.8962514s ago: executing program 1 (id=491): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0xd0d6, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) __realpathat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/5, 0xffffffffffffff28, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) sendmsg$unix(r2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="10000000ffff000006"], 0x10}, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) linkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x6000) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca000000000000000000"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x30000241) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf", 0x36) extattr_get_file(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)='(*,\'$[:\x00', &(0x7f0000000100)=""/78, 0x4e) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 1.005745613s ago: executing program 0 (id=492): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) seteuid(0xffffffffffffffff) r0 = socket(0x2, 0x1, 0x0) sendmsg$inet6_sctp(r0, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x8, 0x3fffffffffffffd]) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000200)=0x8, 0x4) writev(r2, 0x0, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000000)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "dcffd9", 0x50, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06db3e", 0xfffe, 0x2b, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @loopback, [@routing={0x2b, 0x2, 0x0, 0x73, 0x0, [@local={0xfe, 0x80, '\x00', 0x0}]}, @hopopts={0x23}]}}}}}}}) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) getrusage(0xffffffffffffffff, &(0x7f0000000040)) openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r3 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x602, 0x0) fcntl$setown(r3, 0x6, 0x0) readlink(0x0, &(0x7f0000000280)=""/16, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) r5 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r5, &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="14000000ffff000001000000", @ANYRES32=r4, @ANYRES32=r4, @ANYBLOB="10000000ffff"], 0x84}, 0x10004) setsockopt$sock_splice(r1, 0xffff, 0x1023, &(0x7f0000000100)={r5, 0x3, {0x200, 0x6113630c}}, 0x14) r6 = socket(0x1c, 0x1, 0x0) r7 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r8 = openat$kbd(0xffffff9c, &(0x7f00000001c0), 0x4, 0x0) ioctl$KDGETMODE(r8, 0x40044b09, 0xef) ioctl$CIOCGSESSION2(r7, 0xc030636a, &(0x7f0000000080)={0x17, 0x8, 0x6, &(0x7f0000000180)="04b17c7c0000", 0x0, 0x0, 0x7fffffff, 0xfdffff85, [0x1, 0x5, 0xffc, 0x4000]}) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 1.001291792s ago: executing program 1 (id=493): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0xd0d6, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) __realpathat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/5, 0xffffffffffffff28, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) sendmsg$unix(r2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[], 0x10}, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x6000) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca000000000000000000"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x30000241) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457d91d84c842fb3074", 0x47) extattr_get_file(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)='(*,\'$[:\x00', &(0x7f0000000100)=""/78, 0x4e) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 151.824265ms ago: executing program 1 (id=494): r0 = socket(0x1, 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r2 = openat$bpf(0xffffff9c, &(0x7f00000001c0), 0x100000, 0x0) ioctl$BIOCSETWF32(r2, 0x8008427b, &(0x7f0000000480)={0x5, 0xfffeffff}) connect$inet6(r1, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffd}, 0x1c) sendto$inet6(r1, &(0x7f0000000240)="88", 0xffffffffffffffe5, 0x0, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x40, 0x0) aio_write(&(0x7f0000000340)={r3, 0xfffffffffffffff9, 0x0, 0x0, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x5, 0x7, 0x0}, {0x0, 0x0, @sival_int, @spare=[0x9, 0x9, 0xf, 0x2, 0x4, 0xd24, 0x10000, 0x6b]}}) setsockopt$sock_splice(r1, 0xffff, 0x1023, 0x0, 0x0) aio_write(&(0x7f0000000340)={0xffffffffffffffff, 0x80000001, 0x0, 0x0, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x1, 0x7, 0x0}, {0x4}}) r4 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) aio_read(&(0x7f0000000180)={r4, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_ptr, @thr={0x0, 0x0}}}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) rfork(0x5040) setsockopt$inet_tcp_buf(r0, 0x6, 0x402, &(0x7f00000000c0)="08bea7c2", 0x4) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="1000"], 0x10}, 0x0) setsockopt$inet_tcp_buf(r5, 0x6, 0x41, &(0x7f0000000100)="7b93f6e87361369503b3e9c14ba8273028fd5516ced513cae97562f466178dedb8395367a6880b5554a708b6f0d6fa666e1ced9f123aeffd96db5e2faff2650b669279e57ed275498d9fc3d7dba030cafd6c9d439990cd3c9a72b945091642e8b43678ace84518413d11c1419b9a2ec1dd52292f65453b5666709fc4", 0x7c) socket$inet(0x2, 0x1, 0x0) kqueue() mkdir(&(0x7f0000000200)='./file0\x00', 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 141.967441ms ago: executing program 0 (id=496): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) listen(r1, 0x6) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) fcntl$setown(r2, 0x6, 0x0) r3 = open(0x0, 0x400000, 0x0) open$dir(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x10) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0x79, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c04, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x9d84, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x5, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x4, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x1, 0x8, 0xc, 0x8]}, {0x4005c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0xfffffffc, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x7f33c58a, 0x2, 0x55, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x800, 0x7f, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x2, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x1, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x5, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124446, 0x7, 0x0, 0x3, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x42, 0x225, 0x81, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x7, 0x0, 0x7f, 0x401, 0x7, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0xfffe, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0xb730, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xffffdffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0x2, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd4, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff8, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x3, 0x7, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xe, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc8, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x40]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x1, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x9, 0xb28a, 0x5, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x402, 0x5, 0xfffffffc, 0x0, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40001000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x7, 0x81, 0x8, 0x2, 0x4, 0x6, 0x2, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x1360000, 0x8, 0x1ff, 0x7ff, 0xa, 0x0, 0xfffffffd, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1002, 0xfffffff7, 0x1ff, 0xffffffff, 0x3, 0x8001, 0x1, 0x8, 0x0, 0x4, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x41a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xdc]}, {0x6, [0x3, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x7, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0xffe, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x4, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1003, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0xa, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x1000008, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x6, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x404, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x4, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0xc1, 0x5, 0x2271, 0x1, 0x2, 0x1, 0xe0, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x0, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x1, 0x8, 0x84e1, 0xd934, 0xe003, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xffffffff, 0x1, 0x3, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x5, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0xfffd, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x80005, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) rename(&(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000010c0)='./file0\x00') socket$inet_tcp(0x2, 0x1, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x4, 0x180) r4 = kqueue() kevent(r4, &(0x7f0000000380)=[{0x4, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, [0x0, 0x1, 0x0, 0x3]}], 0x1, 0x0, 0xc00, 0x0) r5 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r6, 0x29, 0x29, 0x0, &(0x7f0000000080)) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x51, &(0x7f0000001940)={0x7fffffff, {{0x1c, 0x1c, 0x2, 0x2, @local={0xfe, 0x80, '\x00', 0x0}, 0x5}}}, 0x80) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r7, 0xa9be, &(0x7f0000000440)="0a76f7", 0x3, [0x0, 0x2], 0xfffffffffffffffd, 0x0, 0xfffffffe, {0xfffffffffffffffd, 0x7, 0x0}, {0x0, 0x1, @sival_ptr, @spare=[0xf4c0, 0x2, 0x7f, 0x697f, 0x2, 0x5, 0x9, 0x3]}}) r8 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x2b) preadv(r8, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) kqueue() inotify_add_watch_at(r5, r3, &(0x7f0000000280)='.\x00', 0x21000630) unlink(&(0x7f00000000c0)='./file0\x00') openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 0s ago: executing program 1 (id=497): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0xd0d6, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) __realpathat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/5, 0xffffffffffffff28, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) sendmsg$unix(r2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="10000000ffff00"], 0x10}, 0x0) recvmsg(r3, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x6000) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca000000000000000000"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x30000241) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457d91d84c842fb3074", 0x47) extattr_get_file(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f00000000c0)='(*,\'$[:\x00', &(0x7f0000000100)=""/78, 0x4e) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.149' (ED25519) to the list of known hosts. vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe00543e2898: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83720f80 usecount 0, writecount 0, refcount 3 seqc users 0 hold count flags () flags (VIRF_PGREAD|VI_DOINGINACT|VMP_LAZYLIST) v_object 0xfffffe0058b0e2e8 ref 0 pages 2 cleanbuf 1 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0058b13780 (pid 940, syz-executor, tid 100208) nlink=1, effnlink=1, size=5057, extsize=0 generation=1e6ac41e, uid=0, gid=0, flags=0x4 ino 91, on dev gpt/rootfs md0: truncating fractional last sector by 4 bytes vnode_pager_putpages: zero-length write at 0 resid 8192 0xfffffe006e931898: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83720f80 usecount 6, writecount 4, refcount 6 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0058b5dd90 ref 1 pages 32 cleanbuf 1 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe0058b1e780 (pid 1352, syz-executor, tid 101091) nlink=1, effnlink=1, size=2147483650, extsize=0 generation=ed754376, uid=0, gid=0, flags=0x160000 ino 103, on dev gpt/rootfs vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe006e8ecc08: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83720f80 usecount 6, writecount 6, refcount 3 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0058b649b0 ref 1 pages 2 cleanbuf 1 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0058b4d780 (pid 1362, syz-executor, tid 101104) nlink=1, effnlink=1, size=5057, extsize=0 generation=6c0843d3, uid=0, gid=0, flags=0x4 ino 105, on dev gpt/rootfs Stopping cron. Waiting for PIDS: 685. Stopping sshd. Waiting for PIDS: 681. Stopping devd. Waiting for PIDS: 423serialport: VM disconnected.