last executing test programs: 36.27107858s ago: executing program 3 (id=103): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) openat$bpf(0xffffff9c, &(0x7f0000000000), 0x80, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) socket(0x1c, 0x3, 0xa) socket(0x1c, 0x1, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) freebsd11_statfs(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)) r1 = socket(0x2, 0x1, 0x0) listen(r1, 0xe) select(0x40, &(0x7f0000000040)={0x8, 0x5, 0x4008, 0x8000000000000003, 0x3, 0x1000000000090, 0x4c}, 0x0, 0x0, 0x0) shutdown(r1, 0x2) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') r2 = socket(0x1c, 0x1, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r3, 0x0, 0x18, 0x0, 0x0) writev(r3, &(0x7f0000000600)=[{&(0x7f0000000080)="ce3572fd348cd79b", 0x2400}], 0x1) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) chdir(0x0) kevent(r5, &(0x7f0000000740)=[{0x8000, 0xfffffffffffffff3, 0xc005, 0x8, 0x5, 0x1, [0x7, 0x10001, 0x5, 0x81]}, {0x5, 0xfffffffffffffffd, 0x6, 0x20000000, 0x80, 0x8, [0x0, 0x3, 0x800000000003, 0x7]}, {0x5, 0xfffffffffffffff8, 0x8010, 0xc0000201, 0xa9f, 0xffff, [0x8, 0x0, 0x8, 0x7]}, {0x4, 0xfffffffffffffff3, 0xba, 0x200, 0x9, 0x4, [0x0, 0x8, 0xc477, 0x80000000]}, {0x6, 0xfffffffffffffffa, 0x8078, 0x200, 0x4, 0x2, [0x81, 0xe72, 0x0, 0x2]}, {0xd8, 0xfffffffffffffff5, 0x4, 0x1, 0x0, 0x10001, [0x2cd2, 0x8, 0x1]}, {0xbd8, 0xfffffffffffffffc, 0x8005, 0x40, 0x2, 0x9, [0x7e, 0x1, 0x9, 0x80]}, {0x1, 0xfffffffffffffffe, 0x28, 0xc0000000, 0x7, 0x2c, [0x2, 0x8d, 0x6, 0xd]}, {0x504fcb44, 0xfffffffffffffffa, 0x10, 0x0, 0x3, 0x7, [0x0, 0x101, 0x100000000]}], 0x9, 0x0, 0x0, 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80000001, &(0x7f0000000300)="e2", 0x1, [0x0, 0xc9], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x10, @sival_int, @spare=[0x0, 0x0, 0x8000]}}) aio_write(&(0x7f0000000140)={0xffffffffffffffff, 0x40000000006, &(0x7f0000000240)="a3", 0x1, [0x20005], 0x0, 0x0, 0x1000007, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sigval_int=0x9}}) bind$inet6(r4, &(0x7f0000000200)={0x1c, 0x1c, 0x0, 0x2, @loopback, 0x9}, 0x1c) ksem_open(&(0x7f0000002580), &(0x7f0000000100)='\x00\xee\xd4\x94\\]\xaa\xf2\x1b<\x89\xb2p\x8ci\x1f\xc6\x9e\xa4\x9foXK\x03\x00\x00\x00\x00\x00\x00\x00\xecw\x0f\xd2\xadk\x00W\x86\x02\x05\x85\xfc&\xbf\t\xae\xe1\xa2\xea0\xfa\xa9\'\xca\xe1\xda\xec\xd8k\xb5\x93e\x1e\x8d}{&\x8b', 0xa00, 0x34, 0x9) copy_file_range(0xffffffffffffffff, &(0x7f0000000000)=0x80000001, 0xffffffffffffffff, 0x0, 0x100000, 0x0) r6 = semget(0x2, 0x4, 0x200) semop(r6, &(0x7f0000000040)=[{0x0, 0x7fff, 0x1800}, {0x0, 0x8001}], 0x2) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) syz_emit_ethernet(0x36, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffffffff000000000000c100300008060018800606000008aaaaaabbffffffffffffe85896b7a01d4ae66d146cc3bd623650"]) 35.763011001s ago: executing program 3 (id=105): symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0xe76, &(0x7f0000002100)=ANY=[@ANYRES32=r0]) r1 = socket(0x2, 0x1, 0x0) setitimer(0x1, 0x0, 0x0) r2 = openat$smbus(0xffffff9c, 0x0, 0x40000, 0x0) ioctl$SMB_BREAD(r2, 0xc01c690b, &(0x7f0000000400)={0xa1, 0xb, 0xd, @word, @byte=0x5, 0x8, &(0x7f0000000200)=0x7, 0x1, 0x0}) connect$inet(r1, 0x0, 0x0) socket(0x1c, 0x1, 0x0) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) ftruncate(r3, 0x107d2) fspacectl(r3, 0x1, &(0x7f0000000000)={0x3, 0x400000010001}, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000001100)={'freebsd\x00', 0x2}, 0x24) openat$bpf(0xffffff9c, &(0x7f0000000280), 0x1, 0x0) r4 = socket(0x1c, 0x1, 0x0) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f00000000c0)={0x15, 0x25, 0x10, &(0x7f0000000280)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0x6, 0xfdffff85, [0x0, 0x0, 0x0, 0x6e4]}) ioctl$CIOCCRYPT(r5, 0xc01c6367, &(0x7f0000000340)={0x0, 0x1, 0x0, 0xd60, &(0x7f0000000380), 0x0, 0x0, 0x0}) syz_emit_ethernet(0x66, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r6 = socket(0x1c, 0x1, 0x0) socket$inet6_icmp(0x1c, 0x2, 0x3a) aio_readv(&(0x7f0000000480)={r6, 0x3, &(0x7f0000001140)="44b0c8a183f77e06f935d85fc9fb879de7430532027c9af6a31ae37e7716371dc3cbd98831a756b8692e8378b0100b5a0e8e924d5a93ec042bfa9a0550b1ba0ad85124597fcf1786044c39cb0f5c68ffe5f8cd7278771f0ac5821c97303f93f3d971bca76a37f7648e1d094b143715c25864c31992212f25f506b1e9652f541a44cc0105241d371dd93ff971eff25810222158279edd5388562046f37ca2a11fefa4058359b105fd90ad5a36a970615004730fca9a4c08d12a1eac20aae4de9634", 0xc1, [0x6, 0x7e5], 0xfffffffe, 0x6, 0x8, {0x8, 0xd17, &(0x7f0000000b00)="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"}, {0x2, 0x20, @sival_int=0x5, @ke_flags=0x4061}}) unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x48000001) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r7, 0x29, 0x3e, 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) setrlimit(0x3, &(0x7f0000000000)={0x100000}) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 34.871134199s ago: executing program 3 (id=109): r0 = socket$inet(0x2, 0x2, 0x0) socket$inet(0x2, 0x2, 0x0) (async) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000080)="eaef125c00000000", 0x8) (async) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') (async, rerun: 32) r2 = open(&(0x7f0000000480)='./file0\x00', 0x4, 0x102) (rerun: 32) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r2, 0xfffffcf5) ioctl$BIOCLOCK(r1, 0x2000427a) ioctl$BIOCGRTIMEOUT(r1, 0x4010426e, &(0x7f0000000180)) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x600009a8) (async) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000240)="ea00000100000000", 0xc) aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) (async, rerun: 64) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x1) (rerun: 64) mkdirat(r3, &(0x7f0000000a80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async, rerun: 32) getpid() (async, rerun: 32) r4 = open$dir(&(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, 0x0) r5 = open$dir(&(0x7f0000000980)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100001, 0x66) mkdirat(r5, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async, rerun: 32) symlinkat(&(0x7f0000000000)='./file0\x00', r5, &(0x7f0000000200)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async, rerun: 32) write(r4, &(0x7f0000000700), 0x0) symlinkat(&(0x7f0000000800)='./file0\x00', r5, &(0x7f0000000400)='./file1\x00') (async) rename(&(0x7f0000000100)='./file1\x00', &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') unlink(&(0x7f0000001080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000e80)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async, rerun: 32) open$dir(&(0x7f0000000080)='./file0\x00', 0x8000, 0x4) (async, rerun: 32) truncate(&(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x7) (async, rerun: 64) open(&(0x7f0000000480)='./file0\x00', 0x80000, 0x18) (async, rerun: 64) r6 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r6, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x6, @loopback}, 0x1c, &(0x7f00000001c0)=[{&(0x7f0000000240)}, {&(0x7f0000000140)}], 0x2, 0x0, 0x0, 0x149}, 0x20000) 34.781234716s ago: executing program 3 (id=110): syz_emit_ethernet(0x5e, &(0x7f0000000340)=ANY=[@ANYBLOB="fb000000000000000000000086dd60826e03000e000000000100000000000e14fc11133f6400fe"]) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) ioctl$CIOCGSESSION(0xffffffffffffffff, 0xc0306365, &(0x7f0000000480)={0x17, 0x24, 0x26, &(0x7f0000000340)="6be00f371406426a1d9afcedff6054241bb337df6091e256f10000000000eaffffffffffffff", 0x0, 0x0, 0x5}) (async) r1 = dup2(r0, r0) ioctl$DIOCCHANGERULE(r1, 0x8048756d, &(0x7f0000000340)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r2, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) (async) sendto(r3, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) lpathconf(&(0x7f0000000000)='./file0\x00', 0xf) (async) dup2(r2, r3) (async, rerun: 64) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) (async, rerun: 64) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6, 0x1010, 0xffffffffffffffff, 0x400) 34.701146677s ago: executing program 3 (id=111): openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x462, 0x0) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) (async) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00', 0x4}, 0x24) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) kmq_open(&(0x7f0000000080)='./file0\x00', 0x200, 0x102, 0x0) (async) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) (async) mlockall(0x3) (async) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) (async) open(0x0, 0x200, 0x8) (async) truncate(&(0x7f0000000140)='./file0/file0\x00', 0xaa480) (async) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) (async) fork() syz_emit_ethernet(0x42, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaff11c3d78e70b3c30010000a8325949bc43eee7801000000ffffffff44eaf4ffffffffffff0000000d0090780010002300000002000000020000000727795e96f3bcb5015bf47b790e28a26729aa2eaa704908eb474a83147f7171182075b0a9465546630e73fbb10612950a1675f56032ecca0857d14e430882fe0fff20f2475a2b02c1ae2ad35465892e9e0b55f71cd422faba7ed3bd79faa41e4df7f3fd23f4eb71545485edfc7a589e64955665311bd31e49dd4e0cf90e03eb215693c62e2641f9b1b947d5fa"]) aio_waitcomplete(0x0, 0x0) (async) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) fcntl$setstatus(r0, 0x4, 0x0) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)) (async) sysarch$I386_SET_LDT(0x1, &(0x7f0000000200)={0x7, &(0x7f00000001c0)=[{0x6}, {0x2}, {0x80}], 0x3}) (async) socket(0x1c, 0x1, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f0000000040)={0x1f, 0x1e, 0x1, &(0x7f0000000240)="ab", 0x0, 0x0, 0x0, 0xfdf9ff81, [0x0, 0x2]}) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$SMB_BREAD(r2, 0x80246987, &(0x7f0000000080)={0x0, 0x0, 0x0, @buf="a40d", @buf="db05", 0x0, 0x0, 0x0, 0x0}) socket(0x11, 0x3, 0x0) (async) rfork(0x5000) (async) openat$bpf(0xffffff9c, &(0x7f00000000c0), 0x203000a, 0x0) shm_rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='./file0\x00', 0x3) 34.70068534s ago: executing program 3 (id=112): r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, &(0x7f0000000040)=0x1c, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x51, &(0x7f0000000080)={0x1, {{0x1c, 0x1c, 0x1, 0x0, @rand_addr="995f0672b9f38965d8c2fe8887695b99", 0x9}}}, 0x80) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8, 0x14) kevent(0xffffffffffffff9c, &(0x7f0000000140)=[{0x1, 0xfffffffffffffffc, 0x1, 0x4, 0x5, 0x7fffffff, [0x1, 0xaa, 0x9, 0x4]}, {0x6, 0xfffffffffffffffb, 0x2, 0x80000000, 0x4, 0x4, [0x9, 0xfffffffffffffffb, 0xfffffffffffff635, 0x1]}, {0x3, 0xfffffffffffffffb, 0x4002, 0x40, 0xb, 0x2, [0x9, 0x58cf6a, 0x0, 0xa]}, {0x81, 0xfffffffffffffff5, 0x0, 0x8, 0x7, 0x7, [0x6, 0x8, 0xa, 0x4f593c25]}, {0x0, 0xfffffffffffffff5, 0x0, 0xc0000000, 0x9, 0x3, [0x1, 0x4, 0x9, 0x80000001]}], 0x5, &(0x7f0000000280)=[{}], 0x1, &(0x7f00000002c0)={0xb7f, 0xffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) aio_write(&(0x7f0000000400)={r1, 0xfffffffffffffffc, &(0x7f0000000300)="5ed445800f4e1bea47e56ffda8", 0xd, [0x2, 0x4], 0xaad, 0x18, 0x8, {0x4, 0x4, &(0x7f0000000340)="a0b67a7c2c583b2906ddddcb264a8071cdd148a4a960e969e297b621c9aa8e525a36bc7e2e6a0b8bd5edccfb029cf15665fb61a9b30ec1e96e7a73958476c33cf98a55947c2bbe4cbf1c3b2df5483393eb38ef6b75f9b39815c5d85ef063b503e2be2536be2d131d6c19839877efbf8d194ee89a27ae85fcb29d5e22c6d3dbd5f678a141f72be38e7fcd5a6f48cb2781e493"}, {0x1, 0xe, @sival_ptr=0x5, @spare=[0xe0000000, 0x0, 0xffffffff, 0x0, 0x4, 0x0, 0x7]}}) poll(&(0x7f0000000480)=[{r1, 0x8}, {r1, 0x2000}, {r2, 0x2}, {r1, 0x40}, {r1, 0x2}], 0x5, 0x8) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') r3 = getpgid(0x0) r4 = getpgid(r3) r5 = socket$inet6(0x1c, 0x4, 0x20) sysarch$I386_GET_IOPERM(0x3, 0x0) extattr_delete_file(&(0x7f0000000540)='./file0\x00', 0x2, &(0x7f0000000580)='\xba,%\'{\x00') sigqueue(r3, 0x6c, @sigval_ptr=0x1) getsockopt$inet6_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000640)=@file={0x57, 0x0, ""/85}, &(0x7f00000006c0)=0x57, 0x0) r7 = openat$efidev(0xffffff9c, &(0x7f0000000800), 0x200000, 0x0) r8 = openat$md(0xffffff9c, &(0x7f0000000840), 0x100000, 0x0) r9 = getuid() getresuid(&(0x7f0000000880)=0x0, &(0x7f00000008c0), &(0x7f0000000900)) freebsd11_lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) freebsd11_fstat(r2, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() __semctl$SEM_STAT(0xffffffffffffffff, 0x1, 0xa, &(0x7f0000000ac0)=&(0x7f0000000a80)={{0x0, 0x0, 0x0, 0x0}}) fstat(r2, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) __semctl$SEM_STAT(0x0, 0x4, 0xa, &(0x7f0000000c40)=&(0x7f0000000c00)={{0x0, 0x0}}) freebsd11_lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) __semctl$SEM_STAT(0x0, 0x4, 0xa, &(0x7f0000000d80)=&(0x7f0000000d40)={{0x0, 0x0, 0x0, 0x0}}) r19 = getegid() sendmsg$unix(r6, &(0x7f0000004100)={&(0x7f0000000700)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, &(0x7f00000007c0)=[{&(0x7f0000000740)}, {&(0x7f0000000780)="2808548e8b4cb5a07300abfbdd4b80b73f7a0994aba96764cc46c24c", 0x1c}], 0x2, &(0x7f0000003ec0)=[@rights={0x18, 0xffff, 0x1, [r7, r8, r2]}, @cred={0x60, 0xffff, 0x3, r4, r9, r10, 0xffffffffffffffff, 0x10, [r11, r12, 0xffffffffffffffff, r13, r14, r15, r16, r17, 0x0, r18, r19]}, @rights={0xc}, @cred={0x60, 0xffff, 0x3, r3, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, @cred={0x60, 0xffff, 0x3, r3, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, @rights={0x28, 0xffff, 0x1, [r2, r5, r2, r1, r1, r5, r0]}, @rights={0x1c, 0xffff, 0x1, [r2, r0, r5, r1]}, @rights={0x18, 0xffff, 0x1, [r5, r2, r5]}, @rights={0x18, 0xffff, 0x1, [r0, r5, 0xffffffffffffffff]}, @cred={0x60, 0xffff, 0x3, r3, 0x0, 0x0, 0x0, 0x10}], 0x218, 0x20000}, 0x8d) 34.700245409s ago: executing program 32 (id=112): r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, &(0x7f0000000040)=0x1c, 0x0) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x51, &(0x7f0000000080)={0x1, {{0x1c, 0x1c, 0x1, 0x0, @rand_addr="995f0672b9f38965d8c2fe8887695b99", 0x9}}}, 0x80) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x8, 0x14) kevent(0xffffffffffffff9c, &(0x7f0000000140)=[{0x1, 0xfffffffffffffffc, 0x1, 0x4, 0x5, 0x7fffffff, [0x1, 0xaa, 0x9, 0x4]}, {0x6, 0xfffffffffffffffb, 0x2, 0x80000000, 0x4, 0x4, [0x9, 0xfffffffffffffffb, 0xfffffffffffff635, 0x1]}, {0x3, 0xfffffffffffffffb, 0x4002, 0x40, 0xb, 0x2, [0x9, 0x58cf6a, 0x0, 0xa]}, {0x81, 0xfffffffffffffff5, 0x0, 0x8, 0x7, 0x7, [0x6, 0x8, 0xa, 0x4f593c25]}, {0x0, 0xfffffffffffffff5, 0x0, 0xc0000000, 0x9, 0x3, [0x1, 0x4, 0x9, 0x80000001]}], 0x5, &(0x7f0000000280)=[{}], 0x1, &(0x7f00000002c0)={0xb7f, 0xffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) aio_write(&(0x7f0000000400)={r1, 0xfffffffffffffffc, &(0x7f0000000300)="5ed445800f4e1bea47e56ffda8", 0xd, [0x2, 0x4], 0xaad, 0x18, 0x8, {0x4, 0x4, &(0x7f0000000340)="a0b67a7c2c583b2906ddddcb264a8071cdd148a4a960e969e297b621c9aa8e525a36bc7e2e6a0b8bd5edccfb029cf15665fb61a9b30ec1e96e7a73958476c33cf98a55947c2bbe4cbf1c3b2df5483393eb38ef6b75f9b39815c5d85ef063b503e2be2536be2d131d6c19839877efbf8d194ee89a27ae85fcb29d5e22c6d3dbd5f678a141f72be38e7fcd5a6f48cb2781e493"}, {0x1, 0xe, @sival_ptr=0x5, @spare=[0xe0000000, 0x0, 0xffffffff, 0x0, 0x4, 0x0, 0x7]}}) poll(&(0x7f0000000480)=[{r1, 0x8}, {r1, 0x2000}, {r2, 0x2}, {r1, 0x40}, {r1, 0x2}], 0x5, 0x8) rename(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='./file0\x00') r3 = getpgid(0x0) r4 = getpgid(r3) r5 = socket$inet6(0x1c, 0x4, 0x20) sysarch$I386_GET_IOPERM(0x3, 0x0) extattr_delete_file(&(0x7f0000000540)='./file0\x00', 0x2, &(0x7f0000000580)='\xba,%\'{\x00') sigqueue(r3, 0x6c, @sigval_ptr=0x1) getsockopt$inet6_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, &(0x7f00000005c0), &(0x7f0000000600)=0x4) r6 = accept4$unix(0xffffffffffffffff, &(0x7f0000000640)=@file={0x57, 0x0, ""/85}, &(0x7f00000006c0)=0x57, 0x0) r7 = openat$efidev(0xffffff9c, &(0x7f0000000800), 0x200000, 0x0) r8 = openat$md(0xffffff9c, &(0x7f0000000840), 0x100000, 0x0) r9 = getuid() getresuid(&(0x7f0000000880)=0x0, &(0x7f00000008c0), &(0x7f0000000900)) freebsd11_lstat(&(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) freebsd11_fstat(r2, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getegid() __semctl$SEM_STAT(0xffffffffffffffff, 0x1, 0xa, &(0x7f0000000ac0)=&(0x7f0000000a80)={{0x0, 0x0, 0x0, 0x0}}) fstat(r2, &(0x7f0000000b00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) __semctl$SEM_STAT(0x0, 0x4, 0xa, &(0x7f0000000c40)=&(0x7f0000000c00)={{0x0, 0x0}}) freebsd11_lstat(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) __semctl$SEM_STAT(0x0, 0x4, 0xa, &(0x7f0000000d80)=&(0x7f0000000d40)={{0x0, 0x0, 0x0, 0x0}}) r19 = getegid() sendmsg$unix(r6, &(0x7f0000004100)={&(0x7f0000000700)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, &(0x7f00000007c0)=[{&(0x7f0000000740)}, {&(0x7f0000000780)="2808548e8b4cb5a07300abfbdd4b80b73f7a0994aba96764cc46c24c", 0x1c}], 0x2, &(0x7f0000003ec0)=[@rights={0x18, 0xffff, 0x1, [r7, r8, r2]}, @cred={0x60, 0xffff, 0x3, r4, r9, r10, 0xffffffffffffffff, 0x10, [r11, r12, 0xffffffffffffffff, r13, r14, r15, r16, r17, 0x0, r18, r19]}, @rights={0xc}, @cred={0x60, 0xffff, 0x3, r3, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, @cred={0x60, 0xffff, 0x3, r3, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff]}, @rights={0x28, 0xffff, 0x1, [r2, r5, r2, r1, r1, r5, r0]}, @rights={0x1c, 0xffff, 0x1, [r2, r0, r5, r1]}, @rights={0x18, 0xffff, 0x1, [r5, r2, r5]}, @rights={0x18, 0xffff, 0x1, [r0, r5, 0xffffffffffffffff]}, @cred={0x60, 0xffff, 0x3, r3, 0x0, 0x0, 0x0, 0x10}], 0x218, 0x20000}, 0x8d) 11.954416611s ago: executing program 4 (id=113): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) extattr_set_link(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\x04\xaeQ\x02j\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1*\x1a\xb9g\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) extattr_set_fd(r0, 0x1, &(0x7f0000000040)=':$&{\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x4000000, 0x8, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x184, &(0x7f0000000100)={0xffffffffffffffd3, 0x1c, 0x1, 0x80000800, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) cap_rights_limit(0xffffffffffffffff, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0x4, 0x4]}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) semget(0x2, 0x2, 0x682) cap_ioctls_limit(0xffffffffffffffff, 0x0) socket(0x0, 0x6c1126327f275a5, 0x4) cpuset_getaffinity(0x3, 0x4, 0x7a, 0x32, 0x0) r4 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008004600002c000000000001907800000000ac1400aa898300000900907800"/58]) r5 = socket(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @random="c61800b000", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x0, 0x2, 0x8}}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) aio_write(&(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int, @spare}}) aio_cancel(0xffffffffffffffff, 0x0) 10.063350439s ago: executing program 0 (id=180): aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) procctl$PROC_TRAPCAP_CTL(0x0, 0x0, 0x9, &(0x7f0000000280)=0xa6b) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r2 = socket$inet(0x2, 0x3, 0x0) r3 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$BIOCSETWF32(r3, 0x8004667d, 0x0) setsockopt$inet_int(r2, 0x0, 0x41, &(0x7f0000000000)=0x2, 0x4) syz_emit_ethernet(0xf2, &(0x7f0000000440)=ANY=[]) setsockopt$inet_group_source_req(r2, 0x0, 0x54, &(0x7f00000005c0)={0x7, {{0x10, 0x2, 0x0, @rand_addr=0xa9}}, {{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x104) r4 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff8100470008060001080806040002aaaaaaaaaabb00000000000000000000000000054aef16ed41105bba409a92ee96dda41abd423f31ff634350ad719d5645023e1ed9bc0b9707f5dc30a0cfda3aa0f8f653f849cd895ca539cd623320a38a76d4c81c1371"]) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x10, &(0x7f0000000100)="ec7b0000006976ae0f7eccc0cfae9798", 0x0, 0x0, 0x0, 0xfdf9ff81}) r5 = open(0x0, 0x80000000000206, 0x0) r6 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7, 0x11, r6, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) r7 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r8, r7) r9 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendfile(r9, r7, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300), 0x0, 0x0}, &(0x7f0000000000), 0x0) getpeername$unix(0xffffffffffffff9c, &(0x7f0000000200)=@abs={0x8}, &(0x7f0000000240)=0x8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x7) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r10 = socket(0x1, 0x2, 0x3) sendmsg$unix(r10, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000ffff000001000065", @ANYRES32=r1, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x130, 0x19e}, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 9.811276009s ago: executing program 1 (id=184): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x11, r0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) lpathconf(&(0x7f0000000000)='./file0\x00', 0x6) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) r3 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f00000007c0)={0x100000}, 0x4) inotify_add_watch_at(r4, 0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x40) bind$inet(r1, &(0x7f0000000140)={0x10, 0x2, 0x1, @multicast1}, 0x10) copy_file_range(r3, 0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x2, 0x1, 0x0) connect$inet(r5, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) fstat(r0, &(0x7f0000000540)) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r6 = socket(0x1c, 0x3, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r6, 0x84, 0x12, 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) setgroups(0xfffe, 0x0) lio_listio(0x0, &(0x7f0000000080)=[{0xffffffffffffffff, 0x200000000000001, &(0x7f0000000380)="58e1b9d4b21058aef4b4de043dbe4ec1fc125afd3dc7bd1d9d7c61bddc736be2d328a9a19ad69edc72b6c82fc7", 0x2d, [0x100, 0x5], 0x7, 0x8, 0x9, {0x0, 0x9, 0x0}, {0x4, 0x13, @sigval_ptr=0x400009, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x2, 0x10001], 0x49, 0x20, 0x7fff, {0x4, 0x10000007, 0x0}, {0x1, 0x1, @sival_int=0xfffffffc, @ke_flags=0xc082}}, {0xffffffffffffffff, 0x6, 0x0, 0x0, [0x9], 0x100006, 0x6, 0x100, {0xa, 0x9, 0x0}, {0x3, 0x6, @sigval_int=0x9, @thr={&(0x7f0000000200)="f3ced9f766d8aa00000100646536f30f1a1ec4e139fda606000000660ff615e80000001403c4e17d5bab4159ffffd40036660f6e93fed60000", &(0x7f0000000440)="4fc7b51378f5244647702e580371590d72601cefdce9b246b37e68054051efc8d399d4ff5af6112702e21f728a9d0256fa7056e387a723c71e217075276d5cdf9272b46a658b72b36520adc27adaeaa47e22660db0b4a002a196b9d924eb605a8b601959def0b9a0d42a65cc2a4eeffc13bd04b0a7c407f4a7518190cdc217e0bd16676d9ae2e3a88dcd808dcb19"}}}, {0xffffffffffffffff, 0xffffffff7ffffffe, 0x0, 0x0, [0x4, 0x2], 0x8, 0x4, 0x5, {0x800008, 0x5, 0x0}, {0x3, 0x8, @sigval_ptr=0x800, @ke_flags=0xe}}], 0x4, 0x0) r7 = socket(0x1c, 0x5, 0x4) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r8 = openat$bpf(0xffffff9c, &(0x7f0000000240), 0x200000, 0x0) ioctl$BIOCSETWF(r8, 0x8008427b, &(0x7f0000000280)={0x0, 0x0}) dup(r7) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) socket(0x10, 0x4, 0x20) socketpair(0x1, 0x10000004, 0x0, &(0x7f0000000000)) __specialfd$inotify(0x2, &(0x7f0000000080), 0x4) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 9.663911868s ago: executing program 4 (id=113): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) extattr_set_link(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\x04\xaeQ\x02j\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1*\x1a\xb9g\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) extattr_set_fd(r0, 0x1, &(0x7f0000000040)=':$&{\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x4000000, 0x8, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x184, &(0x7f0000000100)={0xffffffffffffffd3, 0x1c, 0x1, 0x80000800, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) cap_rights_limit(0xffffffffffffffff, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0x4, 0x4]}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) semget(0x2, 0x2, 0x682) cap_ioctls_limit(0xffffffffffffffff, 0x0) socket(0x0, 0x6c1126327f275a5, 0x4) cpuset_getaffinity(0x3, 0x4, 0x7a, 0x32, 0x0) r4 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008004600002c000000000001907800000000ac1400aa898300000900907800"/58]) r5 = socket(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @random="c61800b000", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x0, 0x2, 0x8}}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) aio_write(&(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int, @spare}}) aio_cancel(0xffffffffffffffff, 0x0) 7.889163641s ago: executing program 0 (id=185): ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) r0 = socket(0x1c, 0x1, 0x0) ksem_open(&(0x7f0000000000)=0x0, &(0x7f0000000140)='$\x00', 0x600, 0x2, 0x400) ksem_post(r1) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f0000000200), &(0x7f00000002c0)=0x4) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$CIOCCRYPT(r2, 0xc01c6367, 0x0) minherit(&(0x7f0000692000/0x4000)=nil, 0x4000, 0x0) __realpathat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x20, 0x0) open$dir(0x0, 0x13689f7875b0fff6, 0x1de) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1b, &(0x7f0000000240), 0x4) connect(r3, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x1, 0x77, @mcast1, 0x3}, 0x1c) sendto(r3, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) sendmsg$inet6_sctp(r0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) socketpair(0x11, 0x3, 0x2, 0x0) r5 = open$dir(&(0x7f0000000100)='./file0/file0\x00', 0x400000, 0x110) rmdir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r6 = openat$kbd(0xffffff9c, &(0x7f00000001c0), 0x80000, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x80000000000209, 0xffffffffffffffdb) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x3, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40044b09, 0x1ff) shmget$private(0x0, 0x1000, 0x200, &(0x7f0000692000/0x1000)=nil) open(&(0x7f0000000280)='./file0/file0\x00', 0x80, 0x94) freebsd11_getdents(r5, 0x0, 0x0) ksem_open(&(0x7f0000000080), &(0x7f0000000180)=']\x00', 0x200, 0x0, 0x4000) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 7.887977751s ago: executing program 1 (id=186): r0 = socket(0x1b, 0x3, 0x0) rtprio(0x1, 0x0, &(0x7f00000000c0)={0x4, 0x1f}) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="000000be5eb7567d81ad4500733600"}, 0x1c) r1 = socket(0x26, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1015, &(0x7f0000000240)=0x101, 0x4) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) dup2(r2, r2) aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) r3 = socket$unix(0x1, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r4, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="10000000ffff0000", @ANYRES64=r3], 0x10}, 0x0) recvmsg(r5, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/100, 0x64}, 0x42) r6 = open$dir(0x0, 0x200, 0x0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) r7 = socket(0x1c, 0x1, 0x0) faccessat(r6, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fpathconf(r7, 0x7) socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r8, 0x0, 0x0, 0x180, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @local, 0x1}, 0x1c) sendto$inet6(0xffffffffffffff9c, &(0x7f0000000080)="a1", 0x1, 0x5, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @ipv4}, 0x1c) r9 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r9, 0x29, 0x1b, 0x0, 0x0) connect$inet6(r9, &(0x7f0000000040)={0x1c, 0x1c, 0x2, 0x4802ab46, @empty, 0x4d}, 0x1c) bind$inet6(r8, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x2, @remote={0xfe, 0x80, '\x00', 0x0}, 0x9}, 0x1c) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) rfork(0x1000) 7.887194252s ago: executing program 2 (id=187): openat$md(0xffffffffffffff9c, 0x0, 0x10000, 0x0) aio_read(&(0x7f0000000080)={0xffffffffffffffff, 0x4, &(0x7f0000000000)="c494c335975a80c1edff275c", 0xc, [0x188948e0, 0x1], 0xd, 0x1, 0xd6a, {0x3, 0x4, 0x0}, {0x2, 0x1a, @sigval_ptr=0x9, @spare=[0x8, 0xffffffff, 0x81, 0x4000009, 0x81, 0x1, 0x7, 0x6]}}) setrlimit(0x6, &(0x7f0000000000)={0x1b35d, 0x800000b35d}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) (async) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) mlockall(0x3) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) (async) recvfrom(r0, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) mkdir(&(0x7f00000003c0)='./file1\x00', 0x39) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x180) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) readlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=""/7, 0x7) (async) readlink(&(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)=""/7, 0x7) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mount(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) renameat(r2, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000140)='./file0/file0\x00') (async) renameat(r2, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000140)='./file0/file0\x00') kmq_open(&(0x7f0000000080)='./file0\x00', 0x200, 0x102, 0x0) r3 = kqueue() syz_emit_ethernet(0x2a, &(0x7f0000000240)={@random="03cb00", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x65, 0x0, 0x1, 0x2, 0x0, @rand_addr=0x1000, @multicast2}, @icmp=@generic={0x13, 0x2, 0x0, "423dcc0b"}}}}}) kevent(r3, &(0x7f0000000380)=[{0x0, 0xfffffffffffffffd, 0x8019, 0x1, 0xe8c7, 0x7, [0x400, 0x7]}], 0x1, 0x0, 0x0, 0x0) (async) kevent(r3, &(0x7f0000000380)=[{0x0, 0xfffffffffffffffd, 0x8019, 0x1, 0xe8c7, 0x7, [0x400, 0x7]}], 0x1, 0x0, 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x3, &(0x7f0000000340)={0xffff, 0x3, 0x1, 0x3}, 0x8) (async) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x3, &(0x7f0000000340)={0xffff, 0x3, 0x1, 0x3}, 0x8) r5 = open$dir(0x0, 0x1, 0x0) copy_file_range(r5, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) cpuset_setaffinity(0x1, 0x8, 0x6, 0x1, 0x0) (async) cpuset_setaffinity(0x1, 0x8, 0x6, 0x1, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) r6 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r6, &(0x7f00000000c0)="6a3364f80c04449d07afb23ef3409554adf6a79300f5fb5b7880cb0eabd568286b4b0bc2945f03d453cf4a291b6bb2936dbe969bf0820de6790050a104ce2bfe7ca05f9b8de34cfb", 0x48, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @mcast2, 0x2002}, 0x1c) setsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x0, 0x0, 0x0) sendto(r1, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) (async) sendto(r1, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) rfork(0x0) (async) rfork(0x0) 7.396784303s ago: executing program 4 (id=113): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) extattr_set_link(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\x04\xaeQ\x02j\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1*\x1a\xb9g\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) extattr_set_fd(r0, 0x1, &(0x7f0000000040)=':$&{\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x4000000, 0x8, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x184, &(0x7f0000000100)={0xffffffffffffffd3, 0x1c, 0x1, 0x80000800, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) cap_rights_limit(0xffffffffffffffff, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0x4, 0x4]}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) semget(0x2, 0x2, 0x682) cap_ioctls_limit(0xffffffffffffffff, 0x0) socket(0x0, 0x6c1126327f275a5, 0x4) cpuset_getaffinity(0x3, 0x4, 0x7a, 0x32, 0x0) r4 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008004600002c000000000001907800000000ac1400aa898300000900907800"/58]) r5 = socket(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @random="c61800b000", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x0, 0x2, 0x8}}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) aio_write(&(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int, @spare}}) aio_cancel(0xffffffffffffffff, 0x0) 5.501045676s ago: executing program 0 (id=188): mount(0x0, 0x0, 0x0, 0x0) r0 = socket(0x2, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) kqueue() freebsd11_mknod(0x0, 0x1000, 0x0) chmod(&(0x7f0000000280)='./file0\x00', 0x2768c724b44f58aa) open$dir(&(0x7f00000000c0)='./file1\x00', 0x80201, 0x0) kevent(r1, &(0x7f0000000340)=[{0x2, 0xfffffffffffffff9, 0x11, 0x20, 0x8000000000000001, 0x0, [0x100, 0x10001, 0xd55f, 0x7]}, {0x3c1, 0xffffffffffffffff, 0x40c0, 0xc0000000, 0x3, 0x0, [0xacd0000000, 0x10000, 0x6, 0x4]}, {0x6, 0xfffffffffffffffa, 0x4000, 0x4, 0x8, 0x401, [0x3ff, 0x8, 0x0, 0x7]}, {0x7, 0xfffffffffffffffb, 0x1, 0x0, 0x1ac11f92, 0x7f, [0x80000003, 0x1, 0x0, 0xa5]}, {0x5, 0x0, 0x80aa, 0x1, 0x7, 0x400000, [0x6d7b, 0x8, 0x8, 0x3]}], 0x5, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) __semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) msgget(0x1, 0x213) select(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r4, 0x29, 0x25, &(0x7f0000000000)=0x10000, 0x4) syz_emit_ethernet(0x400e, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "15f2ff", 0x3a3a, 0x0, 0x0, @rand_addr="eee7567b2c0e280000004c1e7b3b00", @local={0xfe, 0x80, '\x00', 0x0}}}}}) r5 = socket(0x11, 0x3, 0x0) sendto$unix(r5, &(0x7f0000000740)="b100050390000000050008000700ca900f0e08fece6ef0ffffffffffff3fd3357a00000000000000006336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af080037282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0208a371a3f8000000800080000001000000000000000000", 0xb1, 0x20000, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000800)=ANY=[@ANYRES8=r3, @ANYRESOCT=r0, @ANYRES16, @ANYRES8, @ANYBLOB="375441435f07ce2a039bc7c6295538d677c5e5ec2790b5c3a344f77e8f0b10e7450ae395f8ce970e53e4942a710af231cdfdb2906bbf96655055eaa3c32488af0d24c94e5b25591ccb3c4cdd1b50a91c62687ca7111403b743376b11aa91ee7b", @ANYRES32=r1, @ANYBLOB="105d22276282d3f6fca0eb6640a899fb48eb77e4aa875e4bf92444f237948b282a02d0e52c477fde86ef043e767ae901e9ef33992df9a6891c3d71ef65325fed87cae50198b6ee993fd9654030bae1b91740682e7008147b54b3a3867657e25e02b5a77ff5a31c2c709b10be38c04b92fb"]) readlink(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) 5.500398611s ago: executing program 1 (id=189): open(0x0, 0x4, 0x102) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_buf(r0, 0x6, 0x24, &(0x7f0000000000)="f461095369efc8a63df67d7fbf24859721996507cc36d59570742794676528b5ae95876ca759dcfca74d013eda6e8d57109c0bca46b2615dd5df4de042bba5", 0x3f) getsockopt$inet6_tcp_buf(r0, 0x6, 0x25, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x2) aio_waitcomplete(0x0, 0x0) r1 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x7369a0733676a8) r2 = kqueue() kevent(r2, &(0x7f0000000280)=[{0x3, 0xfffffffffffffffe, 0x80c7, 0x0, 0x203, 0x0, [0x0, 0x80030d5, 0x4, 0x401]}], 0x1, 0x0, 0x0, 0x0) procctl$PROC_REAP_STATUS(0x2, 0x0, 0x4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0}) openat(r1, &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x400, 0x11) ktimer_create(0x4, &(0x7f0000000140)={0x1, 0x0, @sival_int=0x5134, @tid=r3}, &(0x7f00000002c0)) r4 = open$dir(&(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, 0x110) r5 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r5, r4, &(0x7f00000005c0)='./file0\x00', 0x61000102) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r6 = socket$inet(0x2, 0x1, 0x9) connect$inet(r6, &(0x7f0000000000)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) rfork(0x1000) r7 = open(&(0x7f00000004c0)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r7, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_MODE(r8, 0x6, 0x28, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0) r9 = socket(0x1c, 0x1, 0x0) select(0x40, &(0x7f0000000480)={0x6, 0xb, 0xc, 0x7, 0x9, 0x80, 0x3, 0x1}, 0x0, &(0x7f0000000180)={0x7ff, 0x7, 0xdf, 0x9, 0x7, 0x2, 0x3, 0x7000000000000}, 0x0) ioctl$KDGETMODE(r9, 0x40046676, 0x22e00000) 5.499759021s ago: executing program 2 (id=190): getsockopt$inet_tcp_TCP_RXTLS_MODE(0xffffffffffffff9c, 0x6, 0x2a, &(0x7f0000000000), &(0x7f0000000040)=0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x24, &(0x7f0000000080)="68e1d098c4f9a6d974d502f87358cb9033ab2a3a3a2c59b207048bc7b761fd85458cbc69b37af9cdaf98be700e9882fb295a2568dcd581593fe6fe808cf077c8cc7b97e8df40a43ce1c5b040a5557b16a770316c4a64f44cfbed99fc720d88ee3e3f649b4873a855ad95a786aff1b80f878a59cdcbe3574399ad6f56f1", 0x7d) getsockopt$inet_tcp_TCP_RXTLS_MODE(r0, 0x6, 0x2a, &(0x7f0000000100), &(0x7f0000000140)=0x4) r1 = openat$bpf(0xffffff9c, &(0x7f0000000180), 0xc08ca7ab2a64e08, 0x0) aio_error(&(0x7f00000002c0)={r1, 0x66f5, &(0x7f00000001c0)="7890ce66d3e65911211341a895266bbfe5a995ee1f07e44de4f1d7915a5bb6a9d19281cefc440c78ff", 0x29, [0x75a, 0x8], 0x0, 0x5, 0x4, {0x9, 0x4, &(0x7f0000000200)="e4d89be0b9be5612259de6698cf8005f76430ffd1ea9d03f3ac0cf0158fdaf9b0e80ea9509691f2073c82925329b2e2dbcbcbe4e131f6ced342784ff438b395939bd12710bd1447f292aa2d5e41452830635fbb0ed4bbf63c3cd2723eab52c185f6b203f65d3b612c619d41c591e472eda9627192f8cf6e4a01941e532b050f91b023a8d3a7244afec41139ca16a9bf0ee8dcccfb6dcb5139aa8cda4f094346202b34d59d67250f6de8dc13e6139b5bd862448"}, {0x0, 0x18, @sival_int=0x5, @spare=[0x3, 0x3, 0x101, 0x8, 0x0, 0x5, 0x6, 0x7]}}) r2 = kqueue() kevent(r2, &(0x7f0000000340)=[{0xfffff2e6, 0xfffffffffffffff8, 0x8002, 0x21000682, 0x7ce2, 0x10, [0x9, 0x3, 0x800, 0x13]}, {0x3, 0xfffffffffffffffc, 0xc0, 0x40000000, 0x200, 0x10001, [0x8000, 0x9, 0x8, 0xd252]}, {0x1, 0xfffffffffffffff8, 0x4000, 0x1, 0x933a, 0x2, [0x0, 0x5, 0x1, 0x10]}, {0x9, 0xfffffffffffffffb, 0x4, 0x8, 0xf696, 0x80, [0x4b41, 0x4, 0x3, 0xf3c8]}, {0xce17, 0xfffffffffffffffd, 0x28, 0x1, 0x100000000, 0x101, [0x6, 0x4, 0xe, 0x5]}], 0x5, &(0x7f0000000480)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000000640)={0x9, 0x6}) r3 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r3, &(0x7f0000000680)={0x10, 0x2, 0x0, @remote={0xac, 0x14, 0x0}}, 0x10) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg$inet6_sctp(r4, &(0x7f0000000840)={&(0x7f00000006c0)=@in={0x10, 0x2, 0x0, @broadcast}, 0x10, &(0x7f00000007c0)=[{&(0x7f0000000700)="eaba2b72de6b2f1f0b78e2c5bf454d7f4f5bb8b9ddf3b057fc4ac25165d1aa53a26f081353988e234fe94b90d5c0ad957f686e99a372b4827b58bc17d268cf898091fb0ae59ba8d218aa6f37c8a536d0b9a160b6fa45ffcc8ee5991cda1324675aa43231e735cf3ba338e8b26d4bb97b4a585389b6e36a09360bf3a58b3e7bc046da6e3657fdc031d0f75d01f106ec1471c2a1ccce52d63ad465cd", 0x9b}], 0x1, &(0x7f0000000800)=[@dstaddrv4={0x10, 0x84, 0x9, @remote={0xac, 0x14, 0x0}}], 0x10, 0x5}, 0x100) ioctl$BIOCGRSIG(r1, 0x40044272, &(0x7f0000000880)) r5 = openat$md(0xffffff9c, &(0x7f00000008c0), 0x20000, 0x0) ioctl$MDIOCATTACH(r5, 0xc1b46d00, &(0x7f0000000980)={0x9, 0x6, 0x3, &(0x7f0000000900)='./file0\x00', 0x9, 0x7, 0x5, 0x5, 0x1, 0x4, &(0x7f0000000940)='\x00', [0x2, 0x1ff, 0xe7a, 0x10001, 0xffffffff, 0x10000, 0x46, 0x0, 0xfa8, 0x3f, 0x7ff, 0x4, 0x1ff, 0x9, 0x2, 0x6, 0x5, 0xd65, 0x1, 0xfffffffe, 0x3, 0xbff3, 0x300000, 0x6, 0x81, 0x80, 0x5, 0xffffffff, 0x6f85, 0x81, 0x5, 0x0, 0x3, 0x9, 0x101, 0x2, 0xffffffff, 0xfffffffc, 0x7fffffff, 0x74ba, 0x4, 0x40, 0xd, 0x61a, 0xcf41, 0xf, 0xab7d, 0xa3, 0x1c1d, 0x2, 0x8, 0xa3d, 0xffffffff, 0x7f, 0x10000, 0x6, 0xc91, 0xc, 0x9, 0x9559, 0x109c, 0x7, 0xa, 0x8, 0xb, 0x4, 0xd48, 0xc, 0x6, 0x800, 0x9, 0x33, 0x9, 0x9, 0x172eafbd, 0x0, 0x0, 0x7, 0x1, 0x2, 0x0, 0xb2a8, 0x4, 0x7, 0x18, 0x3, 0x2a, 0xeb, 0x4, 0x9, 0xa47, 0x50a7, 0x4, 0x2, 0xffff, 0x4]}) mount(&(0x7f0000000b40)='exfat\x00', &(0x7f0000000b80)='./file0\x00', 0x100, &(0x7f0000000bc0)="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") r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r6, 0x6, 0x40, &(0x7f0000001bc0)="60c27228c00f95874fbb41d1e427b4be67d193fcec45a038caca0d830e898c28ab4ffdd4416eee5290b8600ff8a654c70951ab781903ce2bd69e10e6d395a26ae33d1ff5d8af9fd016df4dd8e01cbf5dbb7fcfae841ff6bd96ce4094d8796a68140b5c5bd83a1c453d06a25ce243178481af26599eafb5b67cf7fd2f9fe4acd92afb26ab49721401fb720b5106467d0b10235aac82779e049c8a6cc01a7b47999493ded43cff178220171ee6a4bfdd7a98b5", 0xb2) fork() getsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000001c80), &(0x7f0000001cc0)=0x4) ioctl$BIOCROTZBUF(r1, 0x400c4280, &(0x7f0000001e00)={&(0x7f0000001d00)="87578459783532ec63a2685f4c43e679c1bc2420b10e883c61b2e01e48f981cf67e30d3ae180ca723277441cb3b055e0b1e602a59ab5caf2167c6bfff25a9f6244a99394247051e38964e2ecb2a0ee59b15eff2c7b69ef231504339ef192c816ebb1e565353ae0f78db1c16e8a35a163a07281befda57791fde1c2e6d6dafb356e6ce287b7fd104932fbfac2d3a0dd62cfba4fc21003c667fe75f159df01444f7ec9", &(0x7f0000001dc0)="e606f58c403707a57a65cbdd8c5e9cbc911e811225f223998637159d743baeae2514598fbf1de185d3e6f35d37d1c1816f", 0xa2}) r7 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_sctp_SCTP_PRIMARY_ADDR(r4, 0x84, 0x7, &(0x7f0000001e40)={@in6={{0x1c, 0x1c, 0x3, 0x6, @local={0xfe, 0x80, '\x00', 0x0}, 0x7ff}}, 0x0}, &(0x7f0000001f00)=0x84) getsockopt$inet6_sctp_SCTP_MAXSEG(r7, 0x84, 0xe, &(0x7f0000001f40)={r8, 0x1}, &(0x7f0000001f80)=0x8) ioctl$BIOCSRTIMEOUT(r1, 0x8008426d, &(0x7f0000001fc0)={0x1, 0x10}) r10 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connectat(r1, r10, &(0x7f0000002000)=@in6={0x1c, 0x1c, 0x3, 0x7, @mcast2, 0xa}, 0x1c) ioctl$BIOCSTSTAMP(r1, 0x80044284, &(0x7f0000002040)=0x6a) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0x101, &(0x7f0000002080)={@in={{0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}}, r8, 0x430df95d, 0x8, 0x4, 0x4, 0xc4cd}, &(0x7f0000002140)=0x98) getsockopt$inet6_sctp_SCTP_STATUS(r7, 0x84, 0x100, &(0x7f0000002180)={r8, 0x1, 0xcdb, 0x5, 0x8, 0x8000, 0x0, 0x5, {@in6={{0x1c, 0x1c, 0x0, 0x6, @mcast1, 0x7ff}}, r9, 0x3, 0x6fd, 0x9, 0x3, 0x1}}, &(0x7f0000002240)=0xb0) 5.301549142s ago: executing program 2 (id=191): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) syz_emit_ethernet(0x99, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x8b, 0xfffc, 0x0, 0x0, 0x84, 0x0, @broadcast, @local={0xac, 0x14, 0x0}, {[@ssrr={0x89, 0x3, 0x2}]}}, @udp={{0x3, 0x1, 0x8}, {"5074dd7baa129eca4be19f1042968ae04f6f3dd5b3eb384f8e67e2cf3e0841665077081a50191821d3c167d92bb9ee3c233acff0c0769b77311444822e5198159b755749b41b627e9bbcd598ad84b89575b3e4f24b797e0c1b2bd0350515525cc3356769e4d1808d93ef98"}}}}}}) (async) r1 = fcntl$dupfd(r0, 0x11, r0) ioctl$KDGKBTYPE(r1, 0x40044b40, 0x9) (async) ioctl$SMB_READB(r0, 0xc020697a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) (async) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) kqueue() (async) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x9, @loopback}, 0x1c, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x149}, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000680)={@random="73b9ccc300", @random="00f7000400", [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x28, 0x3a, 0x0, @rand_addr="fef0372e0865911feb7ee80000008000", @mcast2, {[], @icmpv6=@ndisc_redir={0x89, 0x0, 0x0, '\x00', @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, @mcast1}}}}}}) (async) setuid(0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x6, 0x1010, 0xffffffffffffffff, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000080)={0x8}, 0x1) (async) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) (async) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x1010, 0xffffffffffffffff, 0x0) r3 = openat$crypto(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$CRIOGET(r3, 0xc0046364, &(0x7f00000001c0)=0x456) (async) socket(0x17, 0x4, 0x8) fork() (async) wait4(0x0, 0x0, 0x0, 0x0) (async) rfork(0x1000) (async) openat$evdev(0xffffff9c, &(0x7f0000000040), 0x10000, 0x0) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) r4 = openat$bpf(0xffffff9c, &(0x7f0000000380), 0x1, 0x0) ioctl$BIOCSETF(r4, 0x80084267, &(0x7f0000000340)={0x1, &(0x7f0000000300)=[{0x1d, 0x1, 0x3, 0x3}]}) (async) r5 = socket(0x1, 0x2, 0x3) sendto$inet(r5, &(0x7f00000004c0)="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", 0xfa, 0x20004, &(0x7f0000000280)={0x10, 0x2, 0x3, @rand_addr=0x10000}, 0x10) (async) socket(0x10, 0x5, 0x0) 5.221164402s ago: executing program 2 (id=192): open(&(0x7f0000000080)='./file0/file0/file0\x00', 0x80, 0x11c) (async) r0 = open(&(0x7f0000000080)='./file0/file0/file0\x00', 0x80, 0x11c) openat$bpf(0xffffff9c, &(0x7f00000004c0), 0x1, 0x0) (async) r1 = openat$bpf(0xffffff9c, &(0x7f00000004c0), 0x1, 0x0) ioctl$BIOCSETF(r1, 0x80084267, &(0x7f0000000280)={0x1, &(0x7f0000000300)=[{0x1d, 0x1, 0x3, 0x3}]}) socket(0x10, 0x5, 0x0) (async) r2 = socket(0x10, 0x5, 0x0) pipe2(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) getsockopt$inet_mreqn(r2, 0x0, 0x9, &(0x7f00000000c0)={@multicast1, @remote, 0x0}, &(0x7f0000000100)=0xc) ioctl$SETFKEY(r0, 0xc0146b01, &(0x7f00000003c0)={0x8, "0dab762faa2e8b19da08273fb88ef9f1", 0x4}) (async) ioctl$SETFKEY(r0, 0xc0146b01, &(0x7f00000003c0)={0x8, "0dab762faa2e8b19da08273fb88ef9f1", 0x4}) r5 = kqueue() kevent(r5, 0x0, 0xfffffffffffffd80, &(0x7f0000000580)=[{}, {}, {}, {}], 0x4, &(0x7f0000000500)={0x10, 0x15}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000140)={@loopback, @loopback, r4}, 0xc) (async) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000140)={@loopback, @loopback, r4}, 0xc) ioctl$BIOCSHDRCMPLT(r3, 0x80044275, &(0x7f0000000380)=0x2) openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x10000, 0x0) (async) openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x10000, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) (async) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) sigtimedwait(&(0x7f00000001c0)={[0xfffffffb, 0xfffffff8, 0x4, 0x3]}, 0x0, &(0x7f00000002c0)={0x0, 0x1}) setrlimit(0x6, &(0x7f0000000000)={0x8, 0x200}) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) aio_write(0x0) (async) aio_write(0x0) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) (async) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() (async) fork() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) open$dir(&(0x7f0000000700)='./file1\x00', 0xd7848ede797c9e10, 0x0) pathconf(&(0x7f0000000200)='./file1\x00', 0x42) freebsd10_pipe(&(0x7f0000000540)) 4.996278348s ago: executing program 4 (id=113): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) extattr_set_link(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\x04\xaeQ\x02j\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1*\x1a\xb9g\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) extattr_set_fd(r0, 0x1, &(0x7f0000000040)=':$&{\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x4000000, 0x8, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x184, &(0x7f0000000100)={0xffffffffffffffd3, 0x1c, 0x1, 0x80000800, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) cap_rights_limit(0xffffffffffffffff, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0x4, 0x4]}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) semget(0x2, 0x2, 0x682) cap_ioctls_limit(0xffffffffffffffff, 0x0) socket(0x0, 0x6c1126327f275a5, 0x4) cpuset_getaffinity(0x3, 0x4, 0x7a, 0x32, 0x0) r4 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008004600002c000000000001907800000000ac1400aa898300000900907800"/58]) r5 = socket(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @random="c61800b000", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x0, 0x2, 0x8}}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) aio_write(&(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int, @spare}}) aio_cancel(0xffffffffffffffff, 0x0) 2.940040895s ago: executing program 0 (id=193): symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') aio_waitcomplete(0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f00000004c0)={0x17, 0x0, 0x12, &(0x7f0000000400)="ec5b00002cfeff0200000000bd1ae904b856", 0x0, 0x0, 0x0, 0x81, [0xffffffff, 0x0, 0x40000, 0x3]}) r1 = socket$inet_sctp(0x2, 0x5, 0x84) aio_write(&(0x7f00000001c0)={r1, 0xd, 0x0, 0x0, [0x299, 0x5], 0x3, 0x5, 0x0, {0x7, 0xfb, 0x0}, {0x4, 0x1e, @sigval_ptr=0x9}}) aio_error(&(0x7f0000000440)={0xffffffffffffffff, 0x5, 0x0, 0x0, [0x40, 0x9], 0x6, 0x1, 0x9, {0x20000004, 0x2, 0x0}, {0x3, 0xb, @sival_int=0x3}}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x8000, &(0x7f0000000140), 0x0, 0x0, 0x0}) socket(0x1c, 0x1, 0x1) r2 = socket(0x2, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) sigaction(0x23, &(0x7f0000000200)={&(0x7f0000000240)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e1898fe8eca241323281fe700600660f3a41828bcf0000def3ec326de3516cb69989999908", 0x35, {[0xfffff801, 0x50e1, 0xfdfffdff]}}, 0x0) lgetfh(0x0, 0x0) listen(0xffffffffffffffff, 0x9) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0}, 0x185) r4 = socket(0x1c, 0x1, 0x0) open(0x0, 0x80000000000206, 0x0) r5 = open$dir(&(0x7f0000000140)='./file0\x00', 0x2, 0x7e) lchflags(0x0, 0x8014) pwritev(r5, &(0x7f0000000000), 0x0, 0x2) fspacectl(r1, 0x0, &(0x7f0000000040)={0x3ff, 0x94d}, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) freebsd11_lstat(&(0x7f0000000100)='./file0\x00', 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r6 = socket$inet6(0x1c, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x0, @loopback}, 0x1c) setitimer(0x1, &(0x7f0000000140)={{}, {0x4}}, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}}, 0x1c) sendmsg(r6, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x20089) 2.669386408s ago: executing program 1 (id=194): aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) procctl$PROC_TRAPCAP_CTL(0x0, 0x0, 0x9, &(0x7f0000000280)=0xa6b) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r2 = socket$inet(0x2, 0x3, 0x0) r3 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$BIOCSETWF32(r3, 0x8004667d, 0x0) setsockopt$inet_int(r2, 0x0, 0x41, &(0x7f0000000000)=0x2, 0x4) syz_emit_ethernet(0xf2, &(0x7f0000000440)=ANY=[]) setsockopt$inet_group_source_req(r2, 0x0, 0x54, &(0x7f00000005c0)={0x7, {{0x10, 0x2, 0x0, @rand_addr=0xa9}}, {{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}}, 0x104) r4 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x2e, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff8100470008060001080806040002aaaaaaaaaabb00000000000000000000000000054aef16ed41105bba409a92ee96dda41abd423f31ff634350ad719d5645023e1ed9bc0b9707f5dc30a0cfda3aa0f8f653f849cd895ca539cd623320a38a76d4c81c1371"]) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x10, &(0x7f0000000100)="ec7b0000006976ae0f7eccc0cfae9798", 0x0, 0x0, 0x0, 0xfdf9ff81}) r5 = open(0x0, 0x80000000000206, 0x0) r6 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r5, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7, 0x11, r6, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) r7 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r8, r7) r9 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendfile(r9, r7, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300), 0x0, 0x0}, &(0x7f0000000000), 0x0) getpeername$unix(0xffffffffffffff9c, &(0x7f0000000200)=@abs={0x8}, &(0x7f0000000240)=0x8) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x7) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r10 = socket(0x1, 0x2, 0x3) sendmsg$unix(r10, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000015c0)=ANY=[@ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000ffff000001000065", @ANYRES32=r1, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x130, 0x19e}, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2.664274161s ago: executing program 2 (id=195): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x11, r0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) lpathconf(&(0x7f0000000000)='./file0\x00', 0x6) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) r3 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f00000007c0)={0x100000}, 0x4) inotify_add_watch_at(r4, 0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x40) bind$inet(r1, &(0x7f0000000140)={0x10, 0x2, 0x1, @multicast1}, 0x10) copy_file_range(r3, 0x0, r2, 0x0, 0xffffffffffffffff, 0x0) r5 = socket(0x2, 0x1, 0x0) connect$inet(r5, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) fstat(r0, &(0x7f0000000540)) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r6 = socket(0x1c, 0x3, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r6, 0x84, 0x12, 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r6, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) setgroups(0xfffe, 0x0) lio_listio(0x0, &(0x7f0000000080)=[{0xffffffffffffffff, 0x200000000000001, &(0x7f0000000380)="58e1b9d4b21058aef4b4de043dbe4ec1fc125afd3dc7bd1d9d7c61bddc736be2d328a9a19ad69edc72b6c82fc74d", 0x2e, [0x100, 0x5], 0x7, 0x8, 0x9, {0x0, 0x9, 0x0}, {0x4, 0x13, @sigval_ptr=0x400009, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x2, 0x10001], 0x49, 0x20, 0x7fff, {0x4, 0x10000007, 0x0}, {0x1, 0x1, @sival_int=0xfffffffc, @ke_flags=0xc082}}, {0xffffffffffffffff, 0x6, 0x0, 0x0, [0x9], 0x100006, 0x6, 0x100, {0xa, 0x9, 0x0}, {0x3, 0x6, @sigval_int=0x9, @thr={&(0x7f0000000200)="f3ced9f766d8aa00000100646536f30f1a1ec4e139fda606000000660ff615e80000001403c4e17d5bab4159ffffd40036660f6e93fed60000", &(0x7f0000000440)="4fc7b51378f5244647702e580371590d72601cefdce9b246b37e68054051efc8d399d4ff5af6112702e21f728a9d0256fa7056e387a723c71e217075276d5cdf9272b46a658b72b36520adc27adaeaa47e22660db0b4a002a196b9d924eb605a8b601959def0b9a0d42a65cc2a4eeffc13bd04b0a7c407f4a7518190cdc217e0bd16676d9ae2e3a88dcd808dcb19"}}}, {0xffffffffffffffff, 0xffffffff7ffffffe, 0x0, 0x0, [0x4, 0x2], 0x8, 0x4, 0x5, {0x800008, 0x5, 0x0}, {0x3, 0x8, @sigval_ptr=0x800, @ke_flags=0xe}}], 0x4, 0x0) r7 = socket(0x1c, 0x5, 0x4) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r8 = openat$bpf(0xffffff9c, 0x0, 0x200000, 0x0) ioctl$BIOCSETWF(r8, 0x8008427b, &(0x7f0000000280)={0x0, 0x0}) dup(r7) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) socket(0x10, 0x4, 0x20) socketpair(0x1, 0x10000004, 0x0, &(0x7f0000000000)) __specialfd$inotify(0x2, &(0x7f0000000080), 0x4) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x8) 2.646132734s ago: executing program 0 (id=196): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x11, r0) ioctl$KDGKBTYPE(r1, 0x40044b40, 0x9) ioctl$SMB_READB(r1, 0xc020697a, &(0x7f00000000c0)={0xff, 0xfd, 0x0, @word=0x2, @buf='(\x00', 0x0, 0x0, 0x0, 0x0}) syz_emit_ethernet(0x56, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaa4c77b99cbb86dd60c6ea090000000000000100000000e01f00000000000000ff02"]) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) r2 = socket(0x1c, 0x1, 0x0) r3 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0x68, &(0x7f0000000080)={{0x1c, 0x1c, 0x1, 0x0, @loopback, 0xffffffff}, {0x1c, 0x1c, 0x0, 0x0, @rand_addr="60c3e9befba730b32a7dd7e184ab01c7"}, 0x0, [0x0, 0xfffffffd, 0x6, 0x800, 0x8000001, 0x0, 0x0, 0x2ffff]}, 0x5c) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) connect$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="000000000104000000000000731600"}, 0x1c) r4 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r4, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x406, @loopback}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000240)}, {&(0x7f0000000240)}], 0x2, 0x0, 0x0, 0x149}, 0x0) writev(r4, 0x0, 0x0) accept(r2, &(0x7f0000000100)=@in={0x10, 0x2, 0xffffffffffffffff, @remote}, &(0x7f0000000140)=0x10) r5 = vfork() sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000040)={0x9, 0x9cb8, 0x6}) lio_listio(0x0, 0x0, 0x0, &(0x7f0000000300)={0x1, 0x9, @sigval_int=0x8, @tid=r5}) wait4(r5, 0x0, 0x2, 0x0) fhstatfs(&(0x7f0000000040)={{[0x5c8951ac, 0x3bea9983]}, {0x0, 0x0, "369f0000000000000000002000"}}, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x31, &(0x7f00000016c0)=ANY=[@ANYBLOB="0004000000000000040100040100c2"], 0x28) sendto(r2, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r6 = socket(0x1c, 0x1, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x80) write(r3, &(0x7f0000000640)="160ead004cf8dc7074d945160ae3bfdab274fc13bb8fc2ead61c2981450731d09fca69a0cc8220b3454b17a19c483adae223266d842d113d09ca8e25c40d99edba683065024275f6d1b8aeaefafed35b838f8f40121f59830c6ed9990000000000000000000000000000009b6862dd2ff554e3593e88eed80a7929cce4d56e3b9760451229509535c67258ca5e79e4f1756ecd97c11e60617d3e8f5a4b6d2d7906bfd9600ceb8f29636c174a4012475bb242d0f3b5b3f2de70d3dee835f2a34863b1d10139d5033aa0c04299ae44cd7da186c1f5a88a2d002571c92e6347cfad47b6f773c2cd81af3bd8e85bc216266fff0c949614b23ecbd166144929a7fbbe6b27779e81312ac7ad1d3fe41be9b3cacbfe249faa82e1ad6d2e9daee9ac3976a25dc10f2e4646e572c70429a6f144e769918ddcd20d19cf345c47", 0x13b) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 2.566763754s ago: executing program 4 (id=113): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) extattr_set_link(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\x04\xaeQ\x02j\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1*\x1a\xb9g\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) extattr_set_fd(r0, 0x1, &(0x7f0000000040)=':$&{\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x4000000, 0x8, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x184, &(0x7f0000000100)={0xffffffffffffffd3, 0x1c, 0x1, 0x80000800, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) cap_rights_limit(0xffffffffffffffff, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0x4, 0x4]}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) semget(0x2, 0x2, 0x682) cap_ioctls_limit(0xffffffffffffffff, 0x0) socket(0x0, 0x6c1126327f275a5, 0x4) cpuset_getaffinity(0x3, 0x4, 0x7a, 0x32, 0x0) r4 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008004600002c000000000001907800000000ac1400aa898300000900907800"/58]) r5 = socket(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @random="c61800b000", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x0, 0x2, 0x8}}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) aio_write(&(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int, @spare}}) aio_cancel(0xffffffffffffffff, 0x0) 489.574567ms ago: executing program 0 (id=197): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) r1 = openat$bpf(0xffffff9c, 0x0, 0x80, 0x0) ioctl$BIOCSETF(r1, 0x80084267, &(0x7f0000000040)={0x0, &(0x7f0000000080)}) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x3, 0xa) r2 = socket$inet6(0x1c, 0x3, 0x0) bind$inet6(r2, &(0x7f0000000040)={0x1c, 0x1c, 0x1, 0x80000001, @empty, 0x8}, 0x1c) __cap_rights_get(0x80000008, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x3, 0xff) getsockopt(r3, 0x0, 0xa, 0x0, 0x0) aio_write(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, [0x0, 0x2], 0x5, 0x18, 0x5fe4, {0xfffff3ee, 0x1, 0x0}, {0x0, 0x15, @sigval_int=0x2, @spare=[0xfffffffffffffffe, 0x80000001, 0x1, 0x2, 0x5, 0x8001, 0x0, 0x5]}}) ioctl$BIOCGDLT(r1, 0x4004426a, &(0x7f0000000140)) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) syz_emit_ethernet(0x5e, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() 486.991656ms ago: executing program 1 (id=198): aio_waitcomplete(0x0, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaff029078ac035644491400aa1100904f998df8eb0000000000000000000000000000000028b8d848d52c39394eb10f0064edff67ae5833d5de789de2b1cd73ff2248c102a9c64d12f2282f99dda3962083ee9cba93602e"]) ksem_open(0x0, &(0x7f0000000040)='/dev/bpf\x00', 0x0, 0x20, 0x7) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x51, 0x0, 0x0) r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x6, 0x1010, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) r1 = socket(0x1, 0x30000002, 0x0) rfork(0x13000) fcntl$getflags(r1, 0x1) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r3, 0x2) sendmsg$unix(r4, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="28000000ffff000001"], 0x28, 0x3010b}, 0x0) connectat$unix(0xffffffffffffffff, r4, &(0x7f0000000080)=@file={0x0, 0x1, './file0\x00'}, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1, 0x5, 0xfc) r5 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r5, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet6_sctp_SCTP_AUTH_CHUNK(r5, 0x84, 0x12, &(0x7f0000000440), 0x1) connect$inet6(r5, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f00000020c0)="d1", 0xffef, 0x20184, 0x0, 0x0) 480.276238ms ago: executing program 2 (id=199): r0 = open(0x0, 0x4, 0x102) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000000)="f461095369efc8a63df67d7fbf24859721996507cc36d59570742794676528b5ae95876ca759dcfca74d013eda6e8d57109c0bca46b2615dd5df4de042bba5", 0x3f) getsockopt$inet6_tcp_buf(r1, 0x6, 0x25, 0x0, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x2) aio_waitcomplete(0x0, 0x0) r2 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x7369a0733676a8) r3 = kqueue() kevent(r3, &(0x7f0000000280)=[{0x3, 0xfffffffffffffffe, 0x80c7, 0x0, 0x203, 0x0, [0x0, 0x80030d5, 0x4, 0x401]}], 0x1, 0x0, 0x0, 0x0) procctl$PROC_REAP_STATUS(0x2, 0x0, 0x4, &(0x7f00000001c0)) openat(r2, &(0x7f0000000300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x400, 0x11) setsockopt$inet6_tcp_TCP_FASTOPEN(r0, 0x6, 0x401, &(0x7f0000000440)={0x1000, "6040ba23ad32b5e1e50e6192b09a352b"}, 0x14) r4 = open$dir(&(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, 0x110) r5 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r5, r4, &(0x7f00000005c0)='./file0\x00', 0x61000102) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r6 = socket$inet(0x2, 0x1, 0x9) connect$inet(r6, &(0x7f0000000000)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) rfork(0x1000) r7 = open(&(0x7f00000004c0)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r7, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_MODE(r8, 0x6, 0x28, &(0x7f0000000080)=0x1, 0x4) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xfffffffffffffffe, 0x0) r9 = socket(0x1c, 0x1, 0x0) select(0x40, &(0x7f0000000480)={0x6, 0xb, 0xc, 0x7, 0x9, 0x80, 0x3, 0x1}, 0x0, &(0x7f0000000180)={0x7ff, 0x7, 0xdf, 0x9, 0x7, 0x2, 0x3, 0x7000000000000}, 0x0) ioctl$KDGETMODE(r9, 0x40046676, 0x22e00000) 221.274083ms ago: executing program 1 (id=200): setgroups(0x0, &(0x7f0000001180)) socketpair$unix(0x1, 0x5, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt(r1, 0x0, 0x6e, 0x0, 0x0) kqueue() (async) kqueue() sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@in={0x10, 0x2, 0x3, @loopback}, 0x10, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000040)}], 0x2, 0x0, 0x0, 0x149}, 0x0) (async) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000040)=@in={0x10, 0x2, 0x3, @loopback}, 0x10, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000040)}], 0x2, 0x0, 0x0, 0x149}, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(r2, 0x0, 0x48, &(0x7f0000000100)={@multicast1, @rand_addr=0x8, @rand_addr=0x2}, 0xc) setsockopt$inet_mreqsrc(r2, 0x0, 0x48, &(0x7f0000000140)={@multicast1, @multicast2, @broadcast}, 0xc) setsockopt$inet_mreqsrc(r2, 0x0, 0x48, &(0x7f0000000180)={@multicast1, @multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x48, &(0x7f0000000400)={@remote={0xac, 0x14, 0x0}, @rand_addr=0x9, @rand_addr=0x9}, 0xc) (async) setsockopt$inet_mreqsrc(r0, 0x0, 0x48, &(0x7f0000000400)={@remote={0xac, 0x14, 0x0}, @rand_addr=0x9, @rand_addr=0x9}, 0xc) setsockopt$inet_mreqn(r2, 0x0, 0xd, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) r3 = socket(0x2, 0x1, 0x0) thr_suspend(0x0) mkdir(&(0x7f0000000580)='./file\x00', 0x20) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x4a) open(&(0x7f0000000240)='./file/file0/../\x00', 0x205, 0x100) (async) open(&(0x7f0000000240)='./file/file0/../\x00', 0x205, 0x100) rmdir(&(0x7f0000000200)='./file/file0/..//file0\x00') bind$inet(r3, &(0x7f0000000100)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) (async) bind$inet(r3, &(0x7f0000000100)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) freebsd10_pipe(&(0x7f00000005c0)) (async) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x4, 0x0, 0x0) (async) socketpair$unix(0x1, 0x4, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="04010000ffff000001"], 0x104}, 0x0) (async) sendmsg(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="04010000ffff000001"], 0x104}, 0x0) recvmsg(r4, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/64, 0x40}, 0x81) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00'}, 0x24) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x106, &(0x7f00000000c0)=ANY=[@ANYBLOB="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"]) (async) syz_emit_ethernet(0x106, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd9d00c03aff78040010000000000023000000086500ff0200000000000000000000000000018800907800000000fe8000000000000000000000000000aa021793d996b5c97254c2c6456f4519126d842303f3a2bf6a9cd78f96437f6ee9be5c8ecb3c9dc54cf003cd4de98f20a4da81f3de698ba572c77969d3fe4c7935502dc76d54651dcffdbf2c64d0002fefa5c082966ed92e940cd05de3b36960d66d87e639e7485ebf74cb5602bd4cc0ea183c7f1918a519ab98cd6b55f77145a96fd4bbf86081d1db413d9ddec17facda8c577cb92406bd2b00000000000060fea02d93b087344fc1f031bc4aafb95f3f4d16839cdc70cc91000000"]) getsockname(r0, &(0x7f00000001c0)=@in={0x10, 0x2, 0xffffffffffffffff, @multicast2}, 0x0) (async) getsockname(r0, &(0x7f00000001c0)=@in={0x10, 0x2, 0xffffffffffffffff, @multicast2}, 0x0) 0s ago: executing program 4 (id=113): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) extattr_set_link(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\x04\xaeQ\x02j\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1*\x1a\xb9g\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) extattr_set_fd(r0, 0x1, &(0x7f0000000040)=':$&{\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x4000000, 0x8, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x184, &(0x7f0000000100)={0xffffffffffffffd3, 0x1c, 0x1, 0x80000800, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) cap_rights_limit(0xffffffffffffffff, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0x4, 0x4]}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) semget(0x2, 0x2, 0x682) cap_ioctls_limit(0xffffffffffffffff, 0x0) socket(0x0, 0x6c1126327f275a5, 0x4) cpuset_getaffinity(0x3, 0x4, 0x7a, 0x32, 0x0) r4 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000008004600002c000000000001907800000000ac1400aa898300000900907800"/58]) r5 = socket(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @random="c61800b000", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x0, 0x2, 0x8}}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) aio_write(&(0x7f0000000280)={0xffffffffffffffff, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int, @spare}}) aio_cancel(0xffffffffffffffff, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.193' (ED25519) to the list of known hosts. lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe0058125688 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1688 2nd 0xffffffff83ccca40 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1387 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff81682be1 at witness_checkorder+0x781 #1 0xffffffff81507bc7 at __mtx_lock_flags+0x187 #2 0xffffffff8186cd3c at tunifioctl+0x15c #3 0xffffffff81847f6e at ifhwioctl+0xefe #4 0xffffffff8184c162 at ifioctl+0xde2 #5 0xffffffff8169196a at kern_ioctl+0x4ca #6 0xffffffff816913ae at sys_ioctl+0x36e #7 0xffffffff82167702 at amd64_syscall+0x4e2 #8 0xffffffff8210c66b at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff81683ab2 at witness_checkorder+0x1652 #1 0xffffffff81571889 at _sx_xlock+0x139 #2 0xffffffff8186cc6a at tunifioctl+0x8a #3 0xffffffff81848e1b at ifhwioctl+0x1dab #4 0xffffffff8186a6d2 at tunioctl+0xd92 #5 0xffffffff811deba6 at devfs_ioctl+0x266 #6 0xffffffff82329ce7 at VOP_IOCTL_APV+0x87 #7 0xffffffff817ef2f7 at vn_ioctl+0x3c7 #8 0xffffffff811dfa69 at devfs_ioctl_f+0x69 #9 0xffffffff8169196a at kern_ioctl+0x4ca #10 0xffffffff816913ae at sys_ioctl+0x36e #11 0xffffffff80442dd7 at freebsd32_ioctl+0x607 #12 0xffffffff822f1c12 at ia32_syscall+0x4d2 #13 0xffffffff8210cecf at int0x80_syscall_common+0x9c if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 md2147483515: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0058575800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 Expensive callout(9) function: 0xffffffff81ad9d70(0) 0.005906465 s if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058574000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 Expensive callout(9) function: 0xffffffff81a5e380(0xfffffe006e561540) 0.005955571 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058575800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 Expensive callout(9) function: 0xffffffff81ad9d70(0) 0.011644116 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058573800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a44800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a44800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a44800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a44800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a44800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a44800 ifconfig: interface tap4 does not exist SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=4 req=113 state=3 status=67 (errno 9: Bad file descriptor) if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 FreeBSD/amd64 (ci-freebsd-i386-2.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Sep 23 11:39:15 ci-freebsd-i386-2 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl