last executing test programs: 14.924908487s ago: executing program 2 (id=89): aio_waitcomplete(0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x30, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000580)={0x1c, 0x1c, 0x2, 0xf4, @local, 0x1}, 0x1c) setsockopt$inet6_int(r0, 0x29, 0x2a, 0x0, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000500)="869dd2f35d15", 0x6) open(&(0x7f0000000480)='./file0\x00', 0x80, 0x13c) ioctl$BIOCSETF(0xffffffffffffffff, 0x80084267, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x1d, 0x1, 0x3, 0x3}]}) recvfrom$inet(0xffffffffffffffff, 0x0, 0x11, 0x401313ab1a02f21f, 0x0, 0x0) r2 = socket(0x1, 0x2, 0x3) socket(0x10, 0x5, 0x0) __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f00000007c0)) getsockopt$inet_mreqn(r2, 0x0, 0xc, &(0x7f00000000c0)={@multicast1, @remote, 0x0}, &(0x7f0000000100)=0xc) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000140)={@multicast2, @loopback, r3}, 0xc) ioctl$BIOCSHDRCMPLT(0xffffffffffffffff, 0x80044275, &(0x7f0000000380)=0x2) __specialfd$inotify(0x2, &(0x7f0000000000), 0x4) dup2(r2, 0xffffffffffffffff) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f0000000040)="b100050400000000380308000301000000000000ced335ca087ae27caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebb4257699a1f132e27acbdd602000d7d026ba8af63ff37282902e4fd007f720fd3873babfbb770a2f5a872c881ff7cc53c8943310b404f36a00f90006ee01bc43eaea8c500000002000000000000020208a371a3f8000400000000000000010000000000000010000000000000000000", 0xb1, 0x20188, 0x0, 0x0) fstatat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000180), 0x200) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r5, &(0x7f0000000700)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2, 0x5, @loopback, 0xfffffffd}, 0x1c, &(0x7f0000000000)=[{&(0x7f00000000c0)="85d9000000000000", 0x8}], 0x1, 0x0}, 0x8) r6 = socket(0x1c, 0x1, 0x0) select(0x40, &(0x7f00000000c0)={0x6, 0xb, 0xc, 0x7, 0x9, 0x80, 0x3, 0x5}, &(0x7f0000000140)={0x11, 0x6, 0x8000000000000000, 0x200, 0x8000, 0x3, 0x8, 0x2}, &(0x7f0000000180)={0x6, 0x102, 0x200, 0x9, 0x7, 0xffffffffffff8000, 0x3, 0x9}, &(0x7f00000001c0)={0x8001, 0x400}) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 13.366591291s ago: executing program 2 (id=92): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000280)) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff0200000000000000000000000000013a04010700000000ff0100000000009ddd8982281bd8b101ff0196862c94"]) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 12.497424008s ago: executing program 0 (id=102): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000280)) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff0200000000000000000000000000013a04010700000000ff0100000000009ddd89"]) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 10.692450691s ago: executing program 1 (id=96): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(0x0) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff0200000000000000000000000000013a04010700000000ff0100000000009ddd8982281bd8b101ff0196862c940000000000000000000187"]) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 9.056312954s ago: executing program 2 (id=97): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000280)) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[]) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 9.031632463s ago: executing program 3 (id=98): pipe2(0x0, 0xd505eb4556f41fdb) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x18, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @local={0xfe, 0x80, '\x00', 0x0}}}}}}}) cpuset_setid(0x2, 0x0, 0x0) r0 = socket(0x26, 0x2, 0x0) cpuset_setaffinity(0x2, 0x2, 0x0, 0x0, 0x0) aio_write(0x0) r1 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0x79) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r1, 0x0) openat$crypto(0xffffff9c, 0x0, 0x800, 0x0) bind$unix(r0, &(0x7f0000000200)=@abs={0x8, 0x0, 0x0, 0x1}, 0x8) r2 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) ioctl$KDGETMODE(r1, 0x40044b09, 0x200) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000080)={0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0xfdffff82, [0x0, 0x0, 0x7f7, 0xfffffffc]}) mkdir(&(0x7f0000001040)='./file0\x00', 0x61) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) extattr_set_link(&(0x7f0000000300)='./file0\x00', 0x2, &(0x7f0000000800)='uf\xcf\xdd\x91:\xd6lB\xda\a\xec\x065 \xdbs\x00', &(0x7f00000004c0)="8372519439d4c795feda4512b21f152c3d0aca3452c09a47cb8a159e91f3b69ecd20c6f0c6260d5e92b198dd7415394b59c88250cee870626c8b8eafa7b8e05e5c4e2f0e5872aa749397f6322a75c393f18855b1f551d05d2cff2be2361e33fc4ecba2403dab6c5d581aa1fd82d91f543ec65771be866cc2a2b765d6b0a27c639d1514d5b6d2650b49094c6ae171c395fb38ba4895c52e8e654fbe30b015ad81565772b43fc7dcb48b", 0xa9) rmdir(&(0x7f0000000580)='./file0\x00') ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x76, 0x8050, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000540)}) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendto(r5, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2, 0x1, @local={0xac, 0x14, 0x0}}, 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r6, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)=ANY=[@ANYBLOB="0c00000011006ee399060000"], 0xc}, 0x20000) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x1f, &(0x7f0000000000)="49fdff094b41f9cd219488a81d0b43da520befbd611e198d4545ebe5a25107", 0x0, 0x0, 0x0, 0xfdf9ff86, [0x1, 0x0, 0x0, 0x2]}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 8.891972553s ago: executing program 0 (id=99): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(0x0) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff0200000000000000000000000000013a04010700000000ff0100000000009ddd8982281bd8b101ff0196862c940000000000000000000187"]) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 7.679552869s ago: executing program 1 (id=100): pipe2(0x0, 0xd505eb4556f41fdb) syz_emit_ethernet(0x0, 0x0) cpuset_setid(0x2, 0x0, 0x0) socket(0x26, 0x2, 0x0) cpuset_setaffinity(0x2, 0x2, 0x0, 0x0, 0x0) aio_write(0x0) r0 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0x79) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r0, 0x0) openat$crypto(0xffffff9c, 0x0, 0x800, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) ioctl$KDGETMODE(r0, 0x40044b09, 0x200) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000080)={0x16, 0x0, 0x20, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798df97165e4fd55cd0a9cfbc8c96469dc0", 0x0, 0x0, 0x101, 0xfdffff82, [0x0, 0x0, 0x7f7, 0xfffffffc]}) mkdir(&(0x7f0000001040)='./file0\x00', 0x61) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) extattr_set_link(&(0x7f0000000300)='./file0\x00', 0x2, &(0x7f0000000800)='uf\xcf\xdd\x91:\xd6lB\xda\a\xec\x065 \xdbs\x00', &(0x7f00000004c0)="8372519439d4c795feda4512b21f152c3d0aca3452c09a47cb8a159e91f3b69ecd20c6f0c6260d5e92b198dd7415394b59c88250cee870626c8b8eafa7b8e05e5c4e2f0e5872aa749397f6322a75c393f18855b1f551d05d2cff2be2361e33fc4ecba2403dab6c5d581aa1fd82d91f543ec65771be866cc2a2b765d6b0a27c639d1514d5b6d2650b49094c6ae171c395fb38ba4895c52e8e654fbe30b015ad81565772b43fc7dcb48b", 0xa9) rmdir(&(0x7f0000000580)='./file0\x00') ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x76, 0x8050, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000540)}) r2 = socket(0x1c, 0x1, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendto(r4, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2, 0x1, @local={0xac, 0x14, 0x0}}, 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r5, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)=ANY=[@ANYBLOB="0c00000011006ee399060000"], 0xc}, 0x20000) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x1f, &(0x7f0000000000)="49fdff094b41f9cd219488a81d0b43da520befbd611e198d4545ebe5a25107", 0x0, 0x0, 0x0, 0xfdf9ff86, [0x1, 0x0, 0x0, 0x2]}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 7.200342845s ago: executing program 3 (id=101): sigaction(0xc, &(0x7f0000000200)={&(0x7f0000000180)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de3516cb69989999908", 0x35, {[0xfffff801, 0x50e5, 0xfdffffff]}}, 0x0) lgetfh(0x0, 0x0) socket(0x2, 0x1, 0x0) profil(0x0, 0x0, 0x1, 0xd6) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) ktimer_create(0x4, 0x0, &(0x7f0000000280)) lio_listio(0x0, 0x0, 0x0, &(0x7f0000002c00)={0x1, 0x13, @sigval_int=0x5, @ke_flags=0x8018}) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000040)={0xb, 0x0, 0x18, &(0x7f0000000140)="ec7b00000900ff2425c3f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdffff05}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x10000, &(0x7f0000000140), 0x0, 0x0, 0x0}) r3 = socket(0x1c, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) write(r3, &(0x7f0000000240)='?', 0x1) r4 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) fchflags(r4, 0x2) sendto$inet(r3, &(0x7f0000000200)="0e", 0xff66, 0x0, 0x0, 0x0) setsockopt$sock_splice(r3, 0xffff, 0x1023, &(0x7f0000000080)={r3, 0x25, {0x6, 0x8}}, 0x20) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0x19, 0x0, 0x10, &(0x7f00000000c0)="ec7b00002cfeff02000000000000007f", 0x0, 0x0, 0x0, 0xfdffef85}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x8000, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)}) minherit(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2) r5 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb089a04f19deee49a7189de"]) syz_emit_ethernet(0x0, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 7.157376567s ago: executing program 3 (id=103): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000280)) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff0200000000000000000000000000013a04010700000000ff0100000000009ddd8982281bd8b101ff0196862c94"]) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 6.310237258s ago: executing program 1 (id=104): r0 = socket(0x1b, 0x3, 0x0) r1 = getgid() sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, r1]}], 0x60, 0x9}, 0x188) r2 = socket(0x2, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) sigaction(0xc, &(0x7f0000000200)={&(0x7f0000000180)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de3516cb69989999908", 0x35, {[0xfffff801, 0x50e5, 0xfdffffff]}}, 0x0) lgetfh(0x0, 0x0) r4 = socket(0x1b, 0x3, 0x0) recvmsg(r4, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000640)=""/171, 0xab}], 0x1, 0x0}, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f00000001c0)=@in={0x10, 0x2, 0x3, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x185) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r5, 0x0, 0x51, &(0x7f0000000300)="33634fb519050f221002ceb88b0a43ab759be9ccf9b668f27c74c22107de1ab78a9df980a69fef8483a7e8b94504a2607c9c38da5f437b4436f3b2b5f0578e7610de538f2a198592520f47f4f13623f148681efffe12b79ad3e40092aefd5637d0f9d27977d9f595df759245aa5a40fc86f3238e91abf816b3da8aa4b7cbe9795217ef7a5effeef8fd", 0x89) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r6 = kqueue() kevent(r6, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff02000000000000000000000000000129"]) syz_emit_ethernet(0x76, &(0x7f0000000580)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x40, 0x3a, 0x0, @rand_addr="a4d2c5424d6aa513f09721a04f2b8881", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@dest_unreach={0x1, 0x1, 0x0, 0x0, '\x00', {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @rand_addr="d7ff9174e5369e9fbb2a0c6bbf926394", [@fragment={0x2c, 0x0, 0x7, 0x0, 0x0, 0xc, 0x66}, @routing={0x3c, 0x0, 0x0, 0x5}]}}}}}}}) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) sendmsg$inet6_sctp(r7, 0x0, 0x0) sysarch$AMD64_GET_GSBASE(0x82, &(0x7f0000000240)=0xfffffffffffffff7) r8 = socket(0x1c, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x8, @remote={0xfe, 0x80, '\x00', 0x0}, 0xfffffffd}, 0x1c) connect$inet6(r8, &(0x7f0000000180)={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0xffffffff}, 0x10) r9 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) lchmod(&(0x7f0000000140)='./file1\x00', 0x120) pwritev(r9, &(0x7f0000000080)=[{&(0x7f0000000340)='wb', 0x2}], 0x1, 0x0) 6.30996673s ago: executing program 2 (id=105): ppoll(0x0, 0x0, &(0x7f0000000200)={0x100005, 0x7}, &(0x7f0000000240)={[0x841b, 0x2, 0x4003, 0x80000000]}, 0x10) socket(0x1c, 0x20000000, 0x0) extattr_set_file(0x0, 0x1, 0x0, 0x0, 0x0) setegid(0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x0, 0x88f]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) socket(0x26, 0x2, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="e1ffffffffffaaaaaaaaaaaa08060001080006040001aaaaaaaaaabbac1400bbffffffffffffac1400aa"]) socket$inet_icmp_raw(0x2, 0x3, 0x1) freebsd10_pipe(&(0x7f00000005c0)) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x8001, 0x400, 0x0, 0x1}, {0x0, 0xffffffffffffffff, 0x91, 0x2, 0x0, 0x10}], 0x2, 0x0, 0x0, 0x0) socket(0x11, 0x3, 0x0) freebsd10_pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000001200)={0x10, 0x2, 0x1}, 0x10) fcntl$lock(r3, 0x16, &(0x7f0000000080)={0x570}) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) r6 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000080)=[{r6, 0x0, &(0x7f0000000080), 0x0, [0x9c, 0x7], 0x5, 0x2, 0x9, {0x0, 0x8, 0x0}, {0x1, 0x1e, @sigval_ptr=0x6, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x82, 0x10000], 0x6, 0x4, 0x8001, {0x4, 0x10000007, 0x0}, {0x1, 0x1, @sival_ptr=0x4, @thr={0x0, 0x0}}}, {r6, 0x2, 0x0, 0x0, [0x100009, 0xfffffffa], 0x3, 0x6, 0x1, {0x7f, 0x2, 0x0}, {0x3, 0x410, @sival_ptr=0xffffffff, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0xd, 0x0, 0x0, [0xfffffffc, 0xffffffdc], 0xcbbb, 0x0, 0x8057, {0x8, 0xffff8000, 0x0}, {0x1, 0x0, @sival_int=0xec1f, @thr={0x0, 0x0}}}], 0x4, 0x0) aio_fsync(0x1000000, &(0x7f0000000e00)={r5, 0x8000, 0x0, 0x0, [0x101, 0xfffc], 0x4, 0x6, 0x2, {0x5, 0x7fffffff, 0x0}, {0x4, 0x18, @sigval_ptr=0x7}}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r7 = socket(0x1c, 0x1, 0x0) getsockopt$inet_mreqn(r7, 0x0, 0xc, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x2a, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) 6.309278188s ago: executing program 0 (id=112): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000280)) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, 0x0) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 4.154464806s ago: executing program 2 (id=106): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000280)) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff0200000000000000000000000000013a04010700000000ff0100000000009ddd8982281bd8b101ff0196862c94"]) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 4.110972411s ago: executing program 0 (id=107): lgetfh(0x0, 0x0) socket(0x2, 0x1, 0x0) profil(0x0, 0x0, 0x1, 0xd6) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) ktimer_create(0x4, 0x0, &(0x7f0000000280)) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000040)={0xb, 0x0, 0x12, &(0x7f0000000140)="ec7b00000900ff2425c3f0a58b519798d25c", 0x0, 0x0, 0x0, 0xfdffff05}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x10000, &(0x7f0000000140), 0x0, 0x0, 0x0}) r3 = socket(0x1c, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) write(r3, &(0x7f0000000240)='?', 0x1) r4 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) setsockopt$sock_splice(r3, 0xffff, 0x1023, &(0x7f0000000080)={r3, 0x25, {0x6, 0x8}}, 0x20) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0x19, 0x0, 0x10, &(0x7f00000000c0)="ec7b00002cfeff02000000000000007f", 0x0, 0x0, 0x0, 0xfdffef85}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x8000, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)}) minherit(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x2) socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb089a04f19deee49a7189de"]) syz_emit_ethernet(0x0, 0x0) 3.941453742s ago: executing program 3 (id=108): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000280)) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff0200000000000000000000000000013a04010700000000ff0100000000009ddd89"]) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 3.462589611s ago: executing program 1 (id=109): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000280)) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[]) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 3.182444806s ago: executing program 0 (id=110): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000"]) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) chdir(&(0x7f0000000040)='./file1\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) chdir(&(0x7f0000000200)='./file1\x00') renameat(r1, &(0x7f00000000c0)='./file1\x00', r1, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') chmod(&(0x7f0000000180)='./file0\x00', 0x23f) setresuid(0x0, 0xee01, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000100)='/,&-,\x00'], 0x0) execve(0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) socket$inet6(0x1c, 0x3, 0x7) 1.679712333s ago: executing program 1 (id=111): pipe2(0x0, 0xd505eb4556f41fdb) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x18, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @local={0xfe, 0x80, '\x00', 0x0}}}}}}}) cpuset_setid(0x2, 0x0, 0x0) r0 = socket(0x26, 0x2, 0x0) cpuset_setaffinity(0x2, 0x2, 0x0, 0x0, 0x0) aio_write(0x0) r1 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0x79) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r1, 0x0) openat$crypto(0xffffff9c, 0x0, 0x800, 0x0) bind$unix(r0, &(0x7f0000000200)=@abs={0x8, 0x0, 0x0, 0x1}, 0x8) r2 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) ioctl$KDGETMODE(r1, 0x40044b09, 0x200) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000080)={0x16, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0, 0x101, 0xfdffff82, [0x0, 0x0, 0x7f7, 0xfffffffc]}) mkdir(&(0x7f0000001040)='./file0\x00', 0x61) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) extattr_set_link(&(0x7f0000000300)='./file0\x00', 0x2, &(0x7f0000000800)='uf\xcf\xdd\x91:\xd6lB\xda\a\xec\x065 \xdbs\x00', &(0x7f00000004c0)="8372519439d4c795feda4512b21f152c3d0aca3452c09a47cb8a159e91f3b69ecd20c6f0c6260d5e92b198dd7415394b59c88250cee870626c8b8eafa7b8e05e5c4e2f0e5872aa749397f6322a75c393f18855b1f551d05d2cff2be2361e33fc4ecba2403dab6c5d581aa1fd82d91f543ec65771be866cc2a2b765d6b0a27c639d1514d5b6d2650b49094c6ae171c395fb38ba4895c52e8e654fbe30b015ad81565772b43fc7dcb48b", 0xa9) rmdir(&(0x7f0000000580)='./file0\x00') ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x76, 0x8050, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000540)}) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendto(r5, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2, 0x1, @local={0xac, 0x14, 0x0}}, 0x10) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r6, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)=ANY=[@ANYBLOB="0c00000011006ee399060000"], 0xc}, 0x20000) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x1f, &(0x7f0000000000)="49fdff094b41f9cd219488a81d0b43da520befbd611e198d4545ebe5a25107", 0x0, 0x0, 0x0, 0xfdf9ff86, [0x1, 0x0, 0x0, 0x2]}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 942.854819ms ago: executing program 2 (id=113): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000280)) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[]) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 920.399796ms ago: executing program 3 (id=114): pipe2(0x0, 0xd505eb4556f41fdb) syz_emit_ethernet(0x0, 0x0) cpuset_setid(0x2, 0x0, 0x0) socket(0x26, 0x2, 0x0) cpuset_setaffinity(0x2, 0x2, 0x0, 0x0, 0x0) aio_write(0x0) r0 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0x79) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r0, 0x0) openat$crypto(0xffffff9c, 0x0, 0x800, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) ioctl$KDGETMODE(r0, 0x40044b09, 0x200) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000080)={0x16, 0x0, 0x20, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798df97165e4fd55cd0a9cfbc8c96469dc0", 0x0, 0x0, 0x101, 0xfdffff82, [0x0, 0x0, 0x7f7, 0xfffffffc]}) mkdir(&(0x7f0000001040)='./file0\x00', 0x61) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) extattr_set_link(&(0x7f0000000300)='./file0\x00', 0x2, &(0x7f0000000800)='uf\xcf\xdd\x91:\xd6lB\xda\a\xec\x065 \xdbs\x00', &(0x7f00000004c0)="8372519439d4c795feda4512b21f152c3d0aca3452c09a47cb8a159e91f3b69ecd20c6f0c6260d5e92b198dd7415394b59c88250cee870626c8b8eafa7b8e05e5c4e2f0e5872aa749397f6322a75c393f18855b1f551d05d2cff2be2361e33fc4ecba2403dab6c5d581aa1fd82d91f543ec65771be866cc2a2b765d6b0a27c639d1514d5b6d2650b49094c6ae171c395fb38ba4895c52e8e654fbe30b015ad81565772b43fc7dcb48b", 0xa9) rmdir(&(0x7f0000000580)='./file0\x00') ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x76, 0x8050, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000540)}) r2 = socket(0x1c, 0x1, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendto(r4, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in={0x10, 0x2, 0x1, @local={0xac, 0x14, 0x0}}, 0x10) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r5, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002180)=ANY=[@ANYBLOB="0c00000011006ee399060000"], 0xc}, 0x20000) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x1f, &(0x7f0000000000)="49fdff094b41f9cd219488a81d0b43da520befbd611e198d4545ebe5a25107", 0x0, 0x0, 0x0, 0xfdf9ff86, [0x1, 0x0, 0x0, 0x2]}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 120.208875ms ago: executing program 0 (id=115): aio_waitcomplete(0x0, 0x0) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) syz_emit_ethernet(0x10ed, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"]) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x149}, 0x9) socket$inet_icmp_raw(0x2, 0x3, 0x1) extattr_set_file(&(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x0) setgroups(0x0, &(0x7f0000000000)) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x0, 0x88f, 0x1]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000040)=0x2, 0x4) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = socket(0x1c, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r3 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r3, &(0x7f0000000180)={&(0x7f0000000140)=@in={0x10, 0x2, 0x2, @rand_addr=0x5}, 0x10, &(0x7f00000006c0)=[{&(0x7f00000000c0)="7ba10f80", 0x4}], 0x1}, 0x88) sendto$inet(r2, &(0x7f0000000380)="0edfad78b1e800c88082675d25f16f144fdc23a657b5308876d30fde2fa2324769f31e6f476a3167c448388489209bb99a27f59831dcfc1e91781012b7e7a091beda1b8cf6a457a62b6ed1ed0bf5b0be1a902fa89e3a156593d50f24671324ab33472700329fb1e7dc1db9", 0x6b, 0x20085, 0x0, 0x0) setsockopt$sock_splice(r2, 0xffff, 0x1023, &(0x7f0000000080)={r2, 0x400007, {0x4, 0x5}}, 0x20) fstatat(r1, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000400), 0x4200) r4 = socket(0x1c, 0x1, 0x0) semget$private(0x0, 0x7, 0x3c0) syz_emit_ethernet(0x4a, &(0x7f0000000680)={@local, @broadcast, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @timestamp={0x44, 0xc, 0x8, 0x2c5dc33797744fae, 0x5, [{[], 0x1}, {[], 0x7}]}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1, 0x4}}}}}) setsockopt$inet6_MRT6_ADD_MIF(r4, 0x29, 0x66, &(0x7f0000000200)={0x96, 0x1, 0x54, 0x40, 0xfffffff8}, 0xc) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 119.919899ms ago: executing program 1 (id=116): ppoll(0x0, 0x0, &(0x7f0000000200)={0x100005, 0x7}, &(0x7f0000000240)={[0x841b, 0x2, 0x4003, 0x80000000]}, 0x10) socket(0x1c, 0x20000000, 0x0) extattr_set_file(0x0, 0x1, 0x0, 0x0, 0x0) setegid(0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x0, 0x88f]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) socket(0x26, 0x2, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="e1ffffffffffaaaaaaaaaaaa08060001080006040001aaaaaaaaaabbac1400bbffffffffffffac1400aa"]) socket$inet_icmp_raw(0x2, 0x3, 0x1) freebsd10_pipe(&(0x7f00000005c0)) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x8001, 0x400, 0x0, 0x1}, {0x0, 0xffffffffffffffff, 0x91, 0x2, 0x0, 0x10}], 0x2, 0x0, 0x0, 0x0) socket(0x11, 0x3, 0x0) freebsd10_pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000001200)={0x10, 0x2, 0x1}, 0x10) fcntl$lock(r3, 0x16, &(0x7f0000000080)={0x570}) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) r6 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000080)=[{r6, 0x0, &(0x7f0000000080), 0x0, [0x9c, 0x7], 0x5, 0x2, 0x9, {0x0, 0x8, 0x0}, {0x1, 0x1e, @sigval_ptr=0x6, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x82, 0x10000], 0x6, 0x4, 0x8001, {0x4, 0x10000007, 0x0}, {0x1, 0x1, @sival_ptr=0x4, @thr={0x0, 0x0}}}, {r6, 0x2, 0x0, 0x0, [0x100009, 0xfffffffa], 0x3, 0x6, 0x1, {0x7f, 0x2, 0x0}, {0x3, 0x410, @sival_ptr=0xffffffff, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0xd, 0x0, 0x0, [0xfffffffc, 0xffffffdc], 0xcbbb, 0x0, 0x8057, {0x8, 0xffff8000, 0x0}, {0x1, 0x0, @sival_int=0xec1f, @thr={0x0, 0x0}}}], 0x4, 0x0) aio_fsync(0x1000000, &(0x7f0000000e00)={r5, 0x8000, 0x0, 0x0, [0x101, 0xfffc], 0x4, 0x6, 0x2, {0x5, 0x7fffffff, 0x0}, {0x4, 0x18, @sigval_ptr=0x7}}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r7 = socket(0x1c, 0x1, 0x0) getsockopt$inet_mreqn(r7, 0x0, 0xc, 0x0, &(0x7f0000000100)) syz_emit_ethernet(0x2a, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) 0s ago: executing program 3 (id=117): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000280)) pipe2(0x0, 0x100004) aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x72, 0x0) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.54' (ED25519) to the list of known hosts. Expensive callout(9) function: 0xffffffff814aa7f0(0xfffffe0071980e60) 0.003660195 s Oct 29 06:36:08 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:4::2aa Oct 29 06:36:08 ci-freebsd-i386-4 syslogd: last message repeated 1 times Oct 29 06:36:12 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:5::aa Oct 29 06:36:14 ci-freebsd-i386-4 syslogd: last message repeated 2 times Oct 29 06:36:15 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:3::1aa Oct 29 06:36:16 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:5::aa Oct 29 06:36:18 ci-freebsd-i386-4 syslogd: last message repeated 1 times Oct 29 06:36:19 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:3::1aa Oct 29 06:36:19 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:5::aa if_delmulti_locked: detaching ifnet instance 0xfffffe00585a0800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f5000 Oct 29 06:36:26 ci-freebsd-i386-4 syslogd: last message repeated 2 times Oct 29 06:36:26 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:3::1aa Oct 29 06:36:28 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:5::aa Oct 29 06:36:28 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:4::2aa Oct 29 06:36:33 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:6::3aa Oct 29 06:36:41 ci-freebsd-i386-4 syslogd: last message repeated 1 times Oct 29 06:36:49 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:3::1aa FreeBSD/amd64 (ci-freebsd-i386-4.us-central1-b.c.syzkaller.internal) (ttyu0) SYZFAIL: failed to send rpc fd=3 want=110976 sent=0 n=-1 (errno 32: Broken pipe) login: if_delmulti_locked: detaching ifnet instance 0xfffffe00585a0000 if_delmulti_locked: detaching ifnet instance 0xfffffe00585a0000 if_delmulti_locked: detaching ifnet instance 0xfffffe00585a0000 if_delmulti_locked: detaching ifnet instance 0xfffffe00585a0000 if_delmulti_locked: detaching ifnet instance 0xfffffe00585a0000 if_delmulti_locked: detaching ifnet instance 0xfffffe00585a0000