last executing test programs: 6.393920059s ago: executing program 1 (id=491): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x4) connect(r1, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\f\x00\x00\x00)\x00 \x00'], 0xc}, 0x88) fpathconf(0xffffffffffffffff, 0x3b) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@in={0x10, 0x2, 0xffffffffffffffff, @local}, &(0x7f0000000080)=0x10) syz_emit_ethernet(0xe8, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff803cd6cab2fa77f5ccf705fb396dfd166b9a3cc69d9116179dec217edf7e7162c28a3315243fef1b0e9120561d24ab4f32f8e2197d9d00298be3fa519322fb96ad40b41077bcf68670480cf4c468223e920fcfec1310bc8ef9f17c5fc920780c12f6fc1bd4a37b2b7f299f65eced82d97c54b87ec3476c34637eb7483fe97d834f4193210b68d17882526460fabb1f08ce5873531aca97442bb6154fa2f1362d3d4ce6b41798fc240de31caa8d34ce32f336314a3a85fe97"]) socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN(0xffffffffffffffff, 0x6, 0x401, &(0x7f0000000140)={0x0, "747ccff61dc359f8e13c2a68a2fa9bb3"}, 0x14) undelete(&(0x7f0000000100)='./file0/file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r3, 0x6, 0x24, &(0x7f00000001c0)="e754d56b37195d92c5454fd6cd61734ed173d05747ab7a160be29248799822e2a93f3b3a41ecab86b8f5bb92967d59c29ccfae8e5ec9d318905b264ee927fb22bec1a2646e43f0a9cc390121c0b017e50248705e9918a96fb27cab729a60127adb4e9eab8caa32877bb7c6b0949df0409b7b4ae8b222da1e58b572884c16942cd0a08fc2cd729f2b3f39d85fe2ac995971e68f5ea782fdddead41b684bbfb1e7265d082a9718259976f93c", 0xab) setsockopt$inet_tcp_buf(r3, 0x6, 0x24, &(0x7f00000005c0), 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) open$dir(&(0x7f00000000c0)='./file0\x00', 0xd6dfe06bdea017f9, 0x141) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x4e50, 0x0) syz_emit_ethernet(0x0, 0x0) utimensat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)={{0x0, 0xffffffffffffffff}, {0x0, 0xffffffffffffffff}}, 0x4000) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000040)={0xb, 0x0, 0xf, &(0x7f0000000180)="0070c65142bfdb626a5686aaf6f3dc", 0x0, 0x0, 0x0, 0x4d46b770, [0x80, 0x60, 0x0, 0x2]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) 6.118924009s ago: executing program 3 (id=492): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000d40)='./file1\x00') aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) openat$bpf(0xffffff9c, 0x0, 0x200, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c1, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x31, &(0x7f0000000400)=ANY=[@ANYBLOB='c^'], 0x2f8) sendto$inet6(r2, &(0x7f00000002c0)="5a89c9f1dc48a250600846cbddc0dca4215e850edb81ba4b97bd0ffa9c9707d7c3a601392047798a51028964d28d53bacea05dcf7cb0ecca3b95af84974d03ab51c0825c988ce5f3b6db3457640829195dd559591d8cb16ac95871ef00a338410bb50254d2f95fcc90e00b109b2d287639b7e74b9f8735ebc3fbb97691b115b054a2e1536a0f90d4689c734b224c5a5c72fc0e1662d98ac4c1c9205a2c3532fcd5ab793e60208255d775670af929beba5d1ff51b044f585302ed74206f6aa4b7fcd4afa4fd3ce5fbbc50ecef9e03de6730136a45743669efbb93b8ff8d3a4c4bddb7a5f0fa6484a1ba7707eb0e61cb6c86e3d8ca63664576db7091c3bc160b94a0cb0835c315a6190131989b92d7405268ce1867f777586c7178437b4c63095172458b603e519a9629bfcc62162588f2c42922c4366c66a6f54b79ea80adc4653e90dac0a4f4820e43c30c687662fd82c5e7dd530623d67e30a4892ca76b726b5be001be4472abf6d00dd742f625a1f6b43e9b370e50b1e6199bd1f9d6bc6e3b096a486d9cf7acf1287a9e10478eacf63863f24617c3fb03b82879da1e47e8f2acfa2c85f42e0b289f0a71cba7da8507578424073967577ef92aebc3ef329b0d9f52567f8656a1d8eba41e0969043de5a61b54a8abb3beeebd", 0x1d9, 0x60040, &(0x7f00000012c0)={0x1c, 0x1c, 0x0, 0x4, @mcast2, 0x6}, 0x1c) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sendmsg$inet6_sctp(r1, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000340)}], 0x1, 0x0) open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) r3 = socket(0x11, 0x3, 0x0) sendto$unix(r3, &(0x7f00000001c0)="9401050138a85a8035e104d2121a5190b469d8f40ae6e2e563b65e32d4b0f7e6f7ee761207ad1b5f879357781fa4011c7baf69815801085957e2f1c3103d74de0813126ca5bd1b8b7bd01dec73fe25ff50dfcd4c7dd4c09faad8df2191d275ba1cfe57549a372339491b590d01", 0x6d, 0x108, 0x0, 0x0) open$dir(0x0, 0x8, 0x20) ioctl$SMB_WRITEB(0xffffffffffffffff, 0xc0086924, 0x0) r4 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) lpathconf(&(0x7f0000000340)='./file0\x00', 0x2) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 5.938107265s ago: executing program 0 (id=493): setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) kevent(0xffffffffffffffff, &(0x7f00000006c0)=[{0xfffffffe, 0xfffffffffffffff9, 0x9, 0x1, 0xcf0, 0x1000, [0x0, 0x0, 0x4, 0x40000000000000]}, {0x40000, 0xfffffffffffffff5, 0x4010, 0x1, 0x4, 0x688c, [0x9, 0x100, 0x4, 0x8c]}, {0x0, 0xfffffffffffffffd, 0x8090, 0x2, 0xbe08, 0x3, [0x0, 0xfff, 0x7, 0xffffffffffff8001]}, {0x2, 0xfffffffffffffff8, 0x4004, 0xffffff, 0xd3dc, 0x4, [0x3, 0x3, 0x2, 0x3]}, {0x8, 0xffffffffffffffff, 0xd3, 0x8, 0x30e, 0x7, [0x8, 0xf03, 0x8, 0x5b42]}, {0x3, 0xfffffffffffffff8, 0xc011, 0x8, 0x1, 0x200, [0x3, 0x8, 0x9, 0x1]}], 0x6, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) open(0x0, 0x80000000000206, 0x0) kqueue() openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd8) open$dir(&(0x7f0000000280)='./file0\x00', 0x400, 0x24) r0 = socket(0x1c, 0x1, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f0000000080)={0x29, 0x0, 0x18, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x1000]}) ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x8, 0x401, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000001c0)}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) socket(0x2, 0x1, 0x0) pipe2(&(0x7f0000000480), 0x0) setrlimit(0xa, &(0x7f0000000100)={0x60000000, 0x62000404}) r2 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xa, 0x0, 0x0) r3 = socket(0x11, 0x10000000000003, 0x0) setitimer(0x2, &(0x7f0000000180)={{0x3, 0xf423f}, {0x0, 0x2710}}, 0x0) setsockopt$sock_int(r3, 0xffff, 0x40, 0x0, 0x0) sendto$unix(r3, &(0x7f0000000140)="b10005019000e803480308c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a300a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x20000, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000300)="0814", 0x2, 0x100, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 5.813675871s ago: executing program 0 (id=494): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) aio_read(&(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x1, 0x20, @sigval_ptr=0x100000000, @spare}}) aio_cancel(r1, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) sendmsg$inet6_sctp(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20009}, 0x100) syz_extract_tcp_res(0x0, 0x3, 0x0) fchmod(0xffffffffffffffff, 0x9dcebc2f0df9d10c) socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r3, 0x80000001, &(0x7f0000000040)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int, @ke_flags=0xc088}}) r4 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) ksem_open(&(0x7f0000000000), 0x0, 0x200, 0x6c, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r4, 0x0) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) r6 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r6, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) pipe2(0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000140)={0x80000000, &(0x7f00000000c0)=[{0x3}, {0xa}, {0x18f}, {0x6}, {0x1}], 0x5}) preadv(r5, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x3) syz_emit_ethernet(0x149, &(0x7f00000000c0)=ANY=[]) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0x19, 0x0, 0x18, &(0x7f0000000000)="ec7b00000900ff2425c1f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0x1000]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x0, 0x6, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000001400)}) 5.760822763s ago: executing program 2 (id=495): r0 = kqueue() kevent(r0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x4) connect(r1, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\f\x00\x00\x00)\x00 \x00'], 0xc}, 0x88) r2 = socket(0x1c, 0x1, 0x0) fpathconf(0xffffffffffffffff, 0x3b) getsockname(r2, &(0x7f0000000000)=@in={0x10, 0x2, 0xffffffffffffffff, @local}, &(0x7f0000000080)=0x10) syz_emit_ethernet(0xe8, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff803cd6cab2fa77f5ccf705fb396dfd166b9a3cc69d9116179dec217edf7e7162c28a3315243fef1b0e9120561d24ab4f32f8e2197d9d00298be3fa519322fb96ad40b41077bcf68670480cf4c468223e920fcfec1310bc8ef9f17c5fc920780c12f6fc1bd4a37b2b7f299f65eced82d97c54b87ec3476c34637eb7483fe97d834f4193210b68d17882526460fabb1f08ce5873531aca97442bb6154fa2f1362d3d4ce6b41798fc240de31caa8d34ce32f336314a3a85fe97"]) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN(0xffffffffffffffff, 0x6, 0x401, &(0x7f0000000140)={0x0, "747ccff61dc359f8e13c2a68a2fa9bb3"}, 0x14) undelete(&(0x7f0000000100)='./file0/file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r3, 0x6, 0x24, &(0x7f00000001c0)="e754d56b37195d92c5454fd6cd61734ed173d05747ab7a160be29248799822e2a93f3b3a41ecab86b8f5bb92967d59c29ccfae8e5ec9d318905b264ee927fb22bec1a2646e43f0a9cc390121c0b017e50248705e9918a96fb27cab729a60127adb4e9eab8caa32877bb7c6b0949df0409b7b4ae8b222da1e58b572884c16942cd0a08fc2cd729f2b3f39d85fe2ac995971e68f5ea782fdddead41b684bbfb1e7265d082a9718259976f93c", 0xab) setsockopt$inet_tcp_buf(r3, 0x6, 0x24, &(0x7f00000005c0), 0x0) 5.306795152s ago: executing program 1 (id=496): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x400, 0x24) r1 = socket(0x1c, 0x1, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000080)={0x29, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x1000]}) syz_emit_ethernet(0xffa3, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaa03bb080600"]) setresuid(0xee01, 0xee01, 0x0) ktrace(0x0, 0x5, 0x40000424, 0xffffffffffffffff) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, 0x0) syz_emit_ethernet(0x50f, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]) extattr_delete_fd(r0, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setrlimit(0xa, &(0x7f0000000100)={0x60000000, 0x62000404}) r4 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x8) chflags(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000000)={@broadcast, @empty, [{[], {0x8100, 0x1, 0x0, 0x2}}], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x9, @random="8ae977b3ea2e", @remote={0xac, 0x14, 0x0}, @remote, @broadcast}}}}) socket(0x11, 0x10000000000003, 0x0) setitimer(0x2, &(0x7f0000000180)={{0x3, 0xf423f}, {0x0, 0x2710}}, 0x0) lpathconf(&(0x7f0000000200)='./file0\x00', 0x12) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x22, &(0x7f00000004c0)={0x2, 0x6}, &(0x7f0000000500)=0xc) freebsd11_stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) ioctl$CRIOGET(r3, 0xc0046364, &(0x7f0000000040)=0xffff) 5.029133271s ago: executing program 3 (id=497): pipe2(0x0, 0xd505eb4556f41fdb) r0 = semget$private(0x0, 0x2, 0x7de) __semctl$SETALL(r0, 0x0, 0x9, &(0x7f0000000080)=[0x199, 0xfffd]) aio_waitcomplete(0x0, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) r1 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r1, 0xc1b46d00, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) r2 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000d80)={0x1, 0xb, @sigval_ptr=0xe, @spare=[0x4005, 0x8015, 0x6, 0x5, 0x8, 0x7, 0x10000, 0x8]}) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x2, 0x1, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x10, 0x2, 0x1, @rand_addr=0x7ffffffe}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20104, &(0x7f0000000000)={0x10, 0x2, 0x0, @multicast2}, 0x10) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r6 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r6, 0x0) accept$inet6(r6, &(0x7f0000000040)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, &(0x7f0000000080)=0x1c) dup2(r5, r6) execve(0x0, 0x0, 0x0) shutdown(r4, 0x1) r7 = socket(0x1b, 0x3, 0x0) sendmsg$unix(r7, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x10}], 0x60, 0x9}, 0x188) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) getsockopt$sock_linger(r3, 0xffff, 0x80, &(0x7f0000000040), &(0x7f0000000080)=0x8) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 4.959898495s ago: executing program 2 (id=498): kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0xfffffffd, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x0, 0x88f, 0x0, 0xfffffffffffffffe]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) aio_waitcomplete(0x0, 0x0) setsid() kqueue() kqueue() r0 = kqueue() kevent(r0, &(0x7f0000000380)=[{0x3, 0xfffffffffffffffe, 0x1, 0x400, 0x5, 0xfffffffe, [0x4, 0x9, 0x7]}, {0x6, 0xfffffffffffffffd, 0xc001, 0x2, 0x0, 0x2, [0x2, 0x9, 0x9c, 0xfc]}, {0x6, 0xfffffffffffffff3, 0x20, 0x8, 0x3, 0x7, [0x8, 0x59f75742, 0x10000, 0x100]}], 0x3, 0x0, 0x2d, 0x0) r1 = socket(0x1c, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) listen(r1, 0x5) socket(0x1c, 0x1, 0x0) rfork(0x3000) r2 = socket(0x1c, 0x1, 0x0) chflags(&(0x7f0000000300)='./file0\x00', 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r4, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c921bf0817a0000000000006a89dbdf", 0x2c) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x20081, &(0x7f0000000000)={0x10, 0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r3, &(0x7f0000001480)={&(0x7f0000000040)=@in={0x10, 0x2, 0x1, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="140000008400000001000000ccec050082700100100000008400000009000000e000000186476d"], 0x24, 0x20180}, 0x80) cap_fcntls_get(0xffffffffffffffff, &(0x7f0000000200)) getsockopt$inet_tcp_TCP_TXTLS_MODE(0xffffffffffffffff, 0x6, 0x28, 0x0, 0x0) 4.325030051s ago: executing program 0 (id=499): ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) kevent(0xffffffffffffffff, &(0x7f00000006c0)=[{0xfffffffe, 0xfffffffffffffff9, 0x9, 0x1, 0xcf0, 0x1000, [0x0, 0x0, 0x4, 0x40000000000000]}, {0x40000, 0xfffffffffffffff5, 0x4010, 0x1, 0x4, 0x688c, [0x9, 0x100, 0x4, 0x8c]}, {0x2, 0xfffffffffffffff8, 0x4004, 0xffffff, 0xd3dc, 0x4, [0x3, 0x3, 0x2, 0x3]}, {0x8, 0xffffffffffffffff, 0xd3, 0x8, 0x30e, 0x7, [0x8, 0xf03, 0x8, 0x5b42]}, {0x3, 0xfffffffffffffff8, 0xc011, 0x8, 0x1, 0x200, [0x3, 0x8, 0x9, 0x1]}], 0x5, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) open(0x0, 0x80000000000206, 0x0) kqueue() openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd8) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x400, 0x24) r1 = socket(0x1c, 0x1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x29, 0x0, 0x20, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x1000]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x8, 0x401, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000001c0)}) extattr_delete_fd(r0, 0x0, &(0x7f0000000040)='\x00') ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) socket(0x2, 0x1, 0x0) pipe2(&(0x7f0000000480), 0x0) setrlimit(0xa, &(0x7f0000000100)={0x60000000, 0x62000404}) r3 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xa, 0x0, 0x0) r4 = socket(0x11, 0x10000000000003, 0x0) setitimer(0x2, &(0x7f0000000180)={{0x3, 0xf423f}, {0x0, 0x2710}}, 0x0) setsockopt$sock_int(r4, 0xffff, 0x40, 0x0, 0x0) sendto$unix(r4, &(0x7f0000000140)="b10005019000e803480308c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a300a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x20000, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000300)="0814", 0x2, 0x100, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 4.261717761s ago: executing program 1 (id=500): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000d40)='./file1\x00') aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r0 = kqueue() kevent(r0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x31, &(0x7f0000000400)=ANY=[@ANYBLOB='c^'], 0x2f8) sendto$inet6(r2, &(0x7f00000002c0)="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", 0x1d9, 0x60040, &(0x7f00000012c0)={0x1c, 0x1c, 0x0, 0x4, @mcast2, 0x6}, 0x1c) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sendmsg$inet6_sctp(r1, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000340)}], 0x1, 0x0) open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) r3 = socket(0x11, 0x3, 0x0) sendto$unix(r3, &(0x7f00000001c0)="9401050138a85a8035e104d2121a5190b469d8f40ae6e2e563b65e32d4b0f7e6f7ee761207ad1b5f879357781fa4011c7baf69815801085957e2f1c3103d74de0813126ca5bd1b8b7bd01dec73fe25ff50dfcd4c7dd4c09faad8df2191d275ba1cfe57549a372339491b590d01", 0x6d, 0x108, 0x0, 0x0) open$dir(0x0, 0x8, 0x20) ioctl$SMB_WRITEB(0xffffffffffffffff, 0xc0086924, 0x0) r4 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) lpathconf(&(0x7f0000000340)='./file0\x00', 0x2) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 4.112786549s ago: executing program 2 (id=501): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000d40)='./file1\x00') aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) openat$bpf(0xffffff9c, 0x0, 0x200, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c1, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x31, &(0x7f0000000400)=ANY=[@ANYBLOB='c^'], 0x2f8) sendto$inet6(r2, &(0x7f00000002c0)="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", 0x1d9, 0x60040, &(0x7f00000012c0)={0x1c, 0x1c, 0x0, 0x4, @mcast2, 0x6}, 0x1c) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sendmsg$inet6_sctp(r1, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000340)}], 0x1, 0x0) open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) r3 = socket(0x11, 0x3, 0x0) sendto$unix(r3, &(0x7f00000001c0)="9401050138a85a8035e104d2121a5190b469d8f40ae6e2e563b65e32d4b0f7e6f7ee761207ad1b5f879357781fa4011c7baf69815801085957e2f1c3103d74de0813126ca5bd1b8b7bd01dec73fe25ff50dfcd4c7dd4c09faad8df2191d275ba1cfe57549a372339491b590d01", 0x6d, 0x108, 0x0, 0x0) open$dir(0x0, 0x8, 0x20) ioctl$SMB_WRITEB(0xffffffffffffffff, 0xc0086924, 0x0) r4 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) lpathconf(&(0x7f0000000340)='./file0\x00', 0x2) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 4.095577938s ago: executing program 3 (id=502): ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) kevent(0xffffffffffffffff, &(0x7f00000006c0)=[{0xfffffffe, 0xfffffffffffffff9, 0x9, 0x1, 0xcf0, 0x1000, [0x0, 0x0, 0x4, 0x40000000000000]}, {0x40000, 0xfffffffffffffff5, 0x4010, 0x1, 0x4, 0x688c, [0x9, 0x100, 0x4, 0x8c]}, {0x0, 0xfffffffffffffffd, 0x8090, 0x2, 0xbe08, 0x3, [0x0, 0xfff, 0x7, 0xffffffffffff8001]}, {0x2, 0xfffffffffffffff8, 0x4004, 0xffffff, 0xd3dc, 0x4, [0x3, 0x3, 0x2, 0x3]}, {0x8, 0xffffffffffffffff, 0xd3, 0x8, 0x30e, 0x7, [0x8, 0xf03, 0x8, 0x5b42]}, {0x3, 0xfffffffffffffff8, 0xc011, 0x8, 0x1, 0x200, [0x3, 0x8, 0x9, 0x1]}], 0x6, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) open(0x0, 0x80000000000206, 0x0) kqueue() openat(0xffffffffffffff9c, 0x0, 0x300201, 0xd8) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x400, 0x24) r1 = socket(0x1c, 0x1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x29, 0x0, 0x20, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x1000]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x8, 0x401, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000001c0)}) extattr_delete_fd(r0, 0x0, &(0x7f0000000040)='\x00') ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) socket(0x2, 0x1, 0x0) pipe2(&(0x7f0000000480), 0x0) setrlimit(0xa, &(0x7f0000000100)={0x60000000, 0x62000404}) r3 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xa, 0x0, 0x0) r4 = socket(0x11, 0x10000000000003, 0x0) setitimer(0x2, &(0x7f0000000180)={{0x3, 0xf423f}, {0x0, 0x2710}}, 0x0) setsockopt$sock_int(r4, 0xffff, 0x40, 0x0, 0x0) sendto$unix(r4, &(0x7f0000000140)="b10005019000e803480308c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a300a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x20000, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000300)="0814", 0x2, 0x100, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 3.477705712s ago: executing program 0 (id=503): setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) kevent(0xffffffffffffffff, &(0x7f00000006c0)=[{0xfffffffe, 0xfffffffffffffff9, 0x9, 0x1, 0xcf0, 0x1000, [0x0, 0x0, 0x4, 0x40000000000000]}, {0x40000, 0xfffffffffffffff5, 0x4010, 0x1, 0x4, 0x688c, [0x9, 0x100, 0x4, 0x8c]}, {0x0, 0xfffffffffffffffd, 0x8090, 0x2, 0xbe08, 0x3, [0x0, 0xfff, 0x7, 0xffffffffffff8001]}, {0x2, 0xfffffffffffffff8, 0x4004, 0xffffff, 0xd3dc, 0x4, [0x3, 0x3, 0x2, 0x3]}, {0x8, 0xffffffffffffffff, 0xd3, 0x8, 0x30e, 0x7, [0x8, 0xf03, 0x8, 0x5b42]}, {0x3, 0xfffffffffffffff8, 0xc011, 0x8, 0x1, 0x200, [0x3, 0x8, 0x9, 0x1]}], 0x6, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) open(0x0, 0x80000000000206, 0x0) kqueue() openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd8) open$dir(&(0x7f0000000280)='./file0\x00', 0x400, 0x24) r0 = socket(0x1c, 0x1, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f0000000080)={0x29, 0x0, 0x1c, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc011", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x1000]}) ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x8, 0x401, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000001c0)}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) socket(0x2, 0x1, 0x0) pipe2(&(0x7f0000000480), 0x0) setrlimit(0xa, &(0x7f0000000100)={0x60000000, 0x62000404}) r2 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xa, 0x0, 0x0) r3 = socket(0x11, 0x10000000000003, 0x0) setitimer(0x2, &(0x7f0000000180)={{0x3, 0xf423f}, {0x0, 0x2710}}, 0x0) setsockopt$sock_int(r3, 0xffff, 0x40, 0x0, 0x0) sendto$unix(r3, &(0x7f0000000140)="b10005019000e803480308c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a300a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x20000, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000300)="0814", 0x2, 0x100, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 3.445344619s ago: executing program 0 (id=504): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x4) connect(r1, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\f\x00\x00\x00)\x00 \x00'], 0xc}, 0x88) r2 = socket(0x1c, 0x1, 0x0) fpathconf(0xffffffffffffffff, 0x3b) getsockname(r2, &(0x7f0000000000)=@in={0x10, 0x2, 0xffffffffffffffff, @local}, &(0x7f0000000080)=0x10) syz_emit_ethernet(0xe8, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff803cd6cab2fa77f5ccf705fb396dfd166b9a3cc69d9116179dec217edf7e7162c28a3315243fef1b0e9120561d24ab4f32f8e2197d9d00298be3fa519322fb96ad40b41077bcf68670480cf4c468223e920fcfec1310bc8ef9f17c5fc920780c12f6fc1bd4a37b2b7f299f65eced82d97c54b87ec3476c34637eb7483fe97d834f4193210b68d17882526460fabb1f08ce5873531aca97442bb6154fa2f1362d3d4ce6b41798fc240de31caa8d34ce32f336314a3a85fe97"]) r3 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN(0xffffffffffffffff, 0x6, 0x401, &(0x7f0000000140)={0x0, "747ccff61dc359f8e13c2a68a2fa9bb3"}, 0x14) undelete(&(0x7f0000000100)='./file0/file0\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, &(0x7f00000001c0)="e754d56b37195d92c5454fd6cd61734ed173d05747ab7a160be29248799822e2a93f3b3a41ecab86b8f5bb92967d59c29ccfae8e5ec9d318905b264ee927fb22bec1a2646e43f0a9cc390121c0b017e50248705e9918a96fb27cab729a60127adb4e9eab8caa32877bb7c6b0949df0409b7b4ae8b222da1e58b572884c16942cd0a08fc2cd729f2b3f39d85fe2ac995971e68f5ea782fdddead41b684bbfb1e7265d082a9718259976f93c", 0xab) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, &(0x7f00000005c0), 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) open$dir(&(0x7f00000000c0)='./file0\x00', 0xd6dfe06bdea017f9, 0x141) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x4e50, 0x0) syz_emit_ethernet(0x0, 0x0) utimensat(r5, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)={{0x0, 0xffffffffffffffff}, {0x0, 0xffffffffffffffff}}, 0x4000) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000040)={0xb, 0x0, 0xf, &(0x7f0000000180)="0070c65142bfdb626a5686aaf6f3dc", 0x0, 0x0, 0x0, 0x4d46b770, [0x80, 0x60, 0x0, 0x2]}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 3.343640541s ago: executing program 1 (id=505): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000d40)='./file1\x00') aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) openat$bpf(0xffffff9c, 0x0, 0x200, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c1, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x31, &(0x7f0000000400)=ANY=[@ANYBLOB='c^'], 0x2f8) sendto$inet6(r2, &(0x7f00000002c0)="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", 0x1d9, 0x60040, &(0x7f00000012c0)={0x1c, 0x1c, 0x0, 0x4, @mcast2, 0x6}, 0x1c) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sendmsg$inet6_sctp(r1, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000340)}], 0x1, 0x0) open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) r3 = socket(0x11, 0x3, 0x0) sendto$unix(r3, &(0x7f00000001c0)="9401050138a85a8035e104d2121a5190b469d8f40ae6e2e563b65e32d4b0f7e6f7ee761207ad1b5f879357781fa4011c7baf69815801085957e2f1c3103d74de0813126ca5bd1b8b7bd01dec73fe25ff50dfcd4c7dd4c09faad8df2191d275ba1cfe57549a372339491b590d01", 0x6d, 0x108, 0x0, 0x0) open$dir(0x0, 0x8, 0x20) ioctl$SMB_WRITEB(0xffffffffffffffff, 0xc0086924, 0x0) r4 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) lpathconf(&(0x7f0000000340)='./file0\x00', 0x2) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 3.144966684s ago: executing program 3 (id=506): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x4) connect(r1, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\f\x00\x00\x00)\x00 \x00'], 0xc}, 0x88) fpathconf(0xffffffffffffffff, 0x3b) getsockname(0xffffffffffffffff, &(0x7f0000000000)=@in={0x10, 0x2, 0xffffffffffffffff, @local}, &(0x7f0000000080)=0x10) syz_emit_ethernet(0xe8, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff803cd6cab2fa77f5ccf705fb396dfd166b9a3cc69d9116179dec217edf7e7162c28a3315243fef1b0e9120561d24ab4f32f8e2197d9d00298be3fa519322fb96ad40b41077bcf68670480cf4c468223e920fcfec1310bc8ef9f17c5fc920780c12f6fc1bd4a37b2b7f299f65eced82d97c54b87ec3476c34637eb7483fe97d834f4193210b68d17882526460fabb1f08ce5873531aca97442bb6154fa2f1362d3d4ce6b41798fc240de31caa8d34ce32f336314a3a85fe97"]) socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN(0xffffffffffffffff, 0x6, 0x401, &(0x7f0000000140)={0x0, "747ccff61dc359f8e13c2a68a2fa9bb3"}, 0x14) undelete(&(0x7f0000000100)='./file0/file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r3, 0x6, 0x24, &(0x7f00000001c0)="e754d56b37195d92c5454fd6cd61734ed173d05747ab7a160be29248799822e2a93f3b3a41ecab86b8f5bb92967d59c29ccfae8e5ec9d318905b264ee927fb22bec1a2646e43f0a9cc390121c0b017e50248705e9918a96fb27cab729a60127adb4e9eab8caa32877bb7c6b0949df0409b7b4ae8b222da1e58b572884c16942cd0a08fc2cd729f2b3f39d85fe2ac995971e68f5ea782fdddead41b684bbfb1e7265d082a9718259976f93c", 0xab) setsockopt$inet_tcp_buf(r3, 0x6, 0x24, &(0x7f00000005c0), 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) open$dir(&(0x7f00000000c0)='./file0\x00', 0xd6dfe06bdea017f9, 0x141) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x4e50, 0x0) syz_emit_ethernet(0x0, 0x0) utimensat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)={{0x0, 0xffffffffffffffff}, {0x0, 0xffffffffffffffff}}, 0x4000) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000040)={0xb, 0x0, 0xf, &(0x7f0000000180)="0070c65142bfdb626a5686aaf6f3dc", 0x0, 0x0, 0x0, 0x4d46b770, [0x80, 0x60, 0x0, 0x2]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) 3.142648983s ago: executing program 2 (id=507): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) open$dir(0x0, 0x8110, 0x0) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x4) connect(r1, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\f\x00\x00\x00)\x00 \x00'], 0xc}, 0x88) r2 = socket(0x1c, 0x1, 0x0) fpathconf(0xffffffffffffffff, 0x3b) getsockname(r2, &(0x7f0000000000)=@in={0x10, 0x2, 0xffffffffffffffff, @local}, &(0x7f0000000080)=0x10) syz_emit_ethernet(0xe8, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff803cd6cab2fa77f5ccf705fb396dfd166b9a3cc69d9116179dec217edf7e7162c28a3315243fef1b0e9120561d24ab4f32f8e2197d9d00298be3fa519322fb96ad40b41077bcf68670480cf4c468223e920fcfec1310bc8ef9f17c5fc920780c12f6fc1bd4a37b2b7f299f65eced82d97c54b87ec3476c34637eb7483fe97d834f4193210b68d17882526460fabb1f08ce5873531aca97442bb6154fa2f1362d3d4ce6b41798fc240de31caa8d34ce32f336314a3a85fe97"]) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN(0xffffffffffffffff, 0x6, 0x401, &(0x7f0000000140)={0x0, "747ccff61dc359f8e13c2a68a2fa9bb3"}, 0x14) undelete(&(0x7f0000000100)='./file0/file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r3, 0x6, 0x24, &(0x7f00000001c0)="e754d56b37195d92c5454fd6cd61734ed173d05747ab7a160be29248799822e2a93f3b3a41ecab86b8f5bb92967d59c29ccfae8e5ec9d318905b264ee927fb22bec1a2646e43f0a9cc390121c0b017e50248705e9918a96fb27cab729a60127adb4e9eab8caa32877bb7c6b0949df0409b7b4ae8b222da1e58b572884c16942cd0a08fc2cd729f2b3f39d85fe2ac995971e68f5ea782fdddead41b684bbfb1e7265d082a9718259976f93c", 0xab) setsockopt$inet_tcp_buf(r3, 0x6, 0x24, &(0x7f00000005c0), 0x0) 2.233107142s ago: executing program 2 (id=508): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) aio_read(&(0x7f00000002c0)={r1, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x1, 0x20, @sigval_ptr=0x100000000, @spare}}) aio_cancel(r1, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) sendmsg$inet6_sctp(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20009}, 0x100) syz_extract_tcp_res(0x0, 0x3, 0x0) fchmod(0xffffffffffffffff, 0x9dcebc2f0df9d10c) socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r3, 0x80000001, &(0x7f0000000040)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int, @ke_flags=0xc088}}) r4 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) ksem_open(&(0x7f0000000000), 0x0, 0x200, 0x6c, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r4, 0x0) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) r6 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r6, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) pipe2(0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000140)={0x80000000, &(0x7f00000000c0)=[{0x3}, {0xa}, {0x18f}, {0x6}, {0x1}], 0x5}) preadv(r5, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x3) syz_emit_ethernet(0x149, &(0x7f00000000c0)=ANY=[]) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0x19, 0x0, 0x18, &(0x7f0000000000)="ec7b00000900ff2425c1f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0x1000]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x0, 0x6, &(0x7f00000001c0), 0x0, 0x0, &(0x7f0000001400)}) 2.089595656s ago: executing program 0 (id=509): kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0xfffffffd, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x0, 0x88f, 0x0, 0xfffffffffffffffe]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) aio_waitcomplete(0x0, 0x0) setsid() kqueue() kqueue() r0 = kqueue() kevent(r0, &(0x7f0000000380)=[{0x3, 0xfffffffffffffffe, 0x1, 0x400, 0x5, 0xfffffffe, [0x4, 0x9, 0x7]}, {0x6, 0xfffffffffffffffd, 0xc001, 0x2, 0x0, 0x2, [0x2, 0x9, 0x9c, 0xfc]}, {0x6, 0xfffffffffffffff3, 0x20, 0x8, 0x3, 0x7, [0x8, 0x59f75742, 0x10000, 0x100]}], 0x3, 0x0, 0x2d, 0x0) r1 = socket(0x1c, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) listen(r1, 0x5) socket(0x1c, 0x1, 0x0) rfork(0x3000) r2 = socket(0x1c, 0x1, 0x0) chflags(&(0x7f0000000300)='./file0\x00', 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r4, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c921bf0817a0000000000006a89dbdf", 0x2c) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) sendto$inet(r4, &(0x7f0000001040), 0x0, 0x20081, &(0x7f0000000000)={0x10, 0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r3, &(0x7f0000001480)={&(0x7f0000000040)=@in={0x10, 0x2, 0x1, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="140000008400000001000000ccec050082700100100000008400000009000000e000000186476d"], 0x24, 0x20180}, 0x80) cap_fcntls_get(0xffffffffffffffff, &(0x7f0000000200)) getsockopt$inet_tcp_TCP_TXTLS_MODE(0xffffffffffffffff, 0x6, 0x28, 0x0, 0x0) 1.865447677s ago: executing program 1 (id=510): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x400, 0x24) socket(0x1c, 0x1, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000080)={0x29, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x1000]}) syz_emit_ethernet(0xffa3, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaa03bb080600"]) setresuid(0xee01, 0xee01, 0x0) ktrace(0x0, 0x5, 0x40000424, 0xffffffffffffffff) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, 0x0) syz_emit_ethernet(0x50f, &(0x7f0000000bc0)=ANY=[@ANYBLOB="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"]) extattr_delete_fd(r0, 0x0, 0x0) socket(0x2, 0x20000000, 0x8) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) setrlimit(0xa, &(0x7f0000000100)={0x60000000, 0x62000404}) r3 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, 0x0, 0x0) sendmsg$unix(r2, 0x0, 0x8) chflags(&(0x7f00000000c0)='./file0\x00', 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000000)={@broadcast, @empty, [{[], {0x8100, 0x1, 0x0, 0x2}}], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x9, @random="8ae977b3ea2e", @remote={0xac, 0x14, 0x0}, @remote, @broadcast}}}}) socket(0x11, 0x10000000000003, 0x0) setitimer(0x2, &(0x7f0000000180)={{0x3, 0xf423f}, {0x0, 0x2710}}, 0x0) lpathconf(&(0x7f0000000200)='./file0\x00', 0x12) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r1, 0x84, 0x22, &(0x7f00000004c0)={0x2, 0x6}, &(0x7f0000000500)=0xc) freebsd11_stat(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) ioctl$CRIOGET(r2, 0xc0046364, &(0x7f0000000040)=0xffff) 1.835991235s ago: executing program 3 (id=511): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x4) connect(r1, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\f\x00\x00\x00)\x00 \x00'], 0xc}, 0x88) r2 = socket(0x1c, 0x1, 0x0) fpathconf(0xffffffffffffffff, 0x3b) syz_emit_ethernet(0xe8, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff803cd6cab2fa77f5ccf705fb396dfd166b9a3cc69d9116179dec217edf7e7162c28a3315243fef1b0e9120561d24ab4f32f8e2197d9d00298be3fa519322fb96ad40b41077bcf68670480cf4c468223e920fcfec1310bc8ef9f17c5fc920780c12f6fc1bd4a37b2b7f299f65eced82d97c54b87ec3476c34637eb7483fe97d834f4193210b68d17882526460fabb1f08ce5873531aca97442bb6154fa2f1362d3d4ce6b41798fc240de31caa8d34ce32f336314a3a85fe97"]) socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN(0xffffffffffffffff, 0x6, 0x401, &(0x7f0000000140)={0x0, "747ccff61dc359f8e13c2a68a2fa9bb3"}, 0x14) undelete(&(0x7f0000000100)='./file0/file0\x00') r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, &(0x7f00000001c0)="e754d56b37195d92c5454fd6cd61734ed173d05747ab7a160be29248799822e2a93f3b3a41ecab86b8f5bb92967d59c29ccfae8e5ec9d318905b264ee927fb22bec1a2646e43f0a9cc390121c0b017e50248705e9918a96fb27cab729a60127adb4e9eab8caa32877bb7c6b0949df0409b7b4ae8b222da1e58b572884c16942cd0a08fc2cd729f2b3f39d85fe2ac995971e68f5ea782fdddead41b684bbfb1e7265d082a9718259976f93c", 0xab) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, &(0x7f00000005c0), 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) open$dir(&(0x7f00000000c0)='./file0\x00', 0xd6dfe06bdea017f9, 0x141) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x4e50, 0x0) syz_emit_ethernet(0x0, 0x0) utimensat(r5, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)={{0x0, 0xffffffffffffffff}, {0x0, 0xffffffffffffffff}}, 0x4000) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000040)={0xb, 0x0, 0xf, &(0x7f0000000180)="0070c65142bfdb626a5686aaf6f3dc", 0x0, 0x0, 0x0, 0x4d46b770, [0x80, 0x60, 0x0, 0x2]}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 1.704168ms ago: executing program 2 (id=512): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x87) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() openat$bpf(0xffffff9c, &(0x7f0000000240), 0x608c80, 0x0) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000280)) pipe2(0x0, 0x100004) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff0200000000000000000000000000013a04010700000000ff0100000000009ddd8982281bd8b101ff0196862c940000000000000000000187"]) r0 = socket(0x2, 0x3, 0x0) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) socket$inet_udplite(0x2, 0x2, 0x88) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x0, 0x80000001, @loopback, 0x7}, 0x1c) dup2(r1, r1) open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x0) open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x10d) extattr_set_link(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f0000000a40)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16\x01\x00\x00\x00\x00\x00\x00\x00\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\x14$/\x8bU\xff\x7f/C\xba}\x88s\b_aR\xe1\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xb0G\xdc\xed\x00\x00\x00\x00\x00\x00\x00X\xc9(E\xa15\x0e?q\xe5T:\x11\x8a\x05\xa9&>=%\x88\xa1\x0e x\'$h\xe1M\x98\xb9C]\x88\xc4\xda\xde\x1c\xa7\x10|\n1\xa7\xa1\tK\a\xc9\t\x1e\x12\x81/\xa6\xc3\xc2\xff\xa5\x1d\xf2d4\xa2q\xb0\x9f\xae\x8e\x83\x7f\f\xe6*\x88\xc3\xb1\xf9\xd7\xf1\xa6F\x7f\x83\xa5?\x87\xe9\x98[\xf7\xc0\xb7\bK\xc1F\x05\xec\x0e]\xcf\xad\x10j\x1e\xb9\xf9uG\xc7\xa3\xa3\xf4\xa9\xd6X\xc6\xbb\xf7\x94\xf5W\xc1\x93u\x93[|\x87&\xf5\xf8\xaf\x81W\x13\x19A\xca\xd45\a!\x1c\xb3l`\x12\x03v\xd8\xd8\x81R\x02>\xba\xa4}&\x13\xda\xf4s\xcemg\x02d\x80\x0e\x89d\x93\xce\x00\xadV\xd0\xb7\x80`\xbbKl\xb8\xc6\x89\b\xdeC\x914\xb4\xe9\xf3\x81\xa3\xe8\x873\xecO\xe2\xe9][\x01f\xdb\xeb\x9a\xb8\x06\n\xe5o}\xc6\x9ew\x87\xb4\x1d\xc0\x9f\x87r\xcb\xeb\t\xf0:#}=\xa6\xc7\xa3\xa6\x90\xb2\x91\xa4\x9bU\xb0\x00'/433, 0x0, 0x0) 1.392439ms ago: executing program 3 (id=513): kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0xfffffffd, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x0, 0x88f, 0x0, 0xfffffffffffffffe]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) aio_waitcomplete(0x0, 0x0) setsid() kqueue() kqueue() r0 = kqueue() kevent(r0, &(0x7f0000000380)=[{0x3, 0xfffffffffffffffe, 0x1, 0x400, 0x5, 0xfffffffe, [0x4, 0x9, 0x7]}, {0x6, 0xfffffffffffffffd, 0xc001, 0x2, 0x0, 0x2, [0x2, 0x9, 0x9c, 0xfc]}, {0x6, 0xfffffffffffffff3, 0x20, 0x8, 0x3, 0x7, [0x8, 0x59f75742, 0x10000, 0x100]}], 0x3, 0x0, 0x2d, 0x0) r1 = socket(0x1c, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) listen(r1, 0x5) socket(0x1c, 0x1, 0x0) rfork(0x3000) r2 = socket(0x1c, 0x1, 0x0) chflags(&(0x7f0000000300)='./file0\x00', 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r3 = socket$inet_sctp(0x2, 0x5, 0x84) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r4, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c921bf0817a0000000000006a89", 0x2a) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) sendto$inet(r4, &(0x7f0000001040)="017a88ca8330d4f5ef2e52a27f685a1722ec5ec9d67a6015a0e6a0db75dddaa395dc8ad6ad357a23bc2e62ce7f337680f84936d556374f9eee59c76751277129fbd3b79351767a317387f641529ae7dcf61fd7b6719203f15cd30c4a5306811406f996883a6c71e7e979fd78965a2fcc16fc6c4baad81eb619aed659186a91324cdf2cc4b4671410f520fdf219b067afdc2bbcf7c56b42efa753f918a6cfc27260ee0b4931bd0a7cfd7838913079ca36bcd35ea9bf836192f527ab7daa650daa6c0e4893b979ef12526bb99d46155a9e6c1a7350a9cc51e9029573e9d93cd1699bcc73bb25877696ad0ea494d66052f367c3578eedeccabfc4372c04a1129e68e823ec6efab725694ab91854bd1fb70435596489d8e922bc970f393351a41d6544296779ff91feda15de341cb6aff5082ea0d36bbe6dd8ec2a128b11772a943b55c40e67058d5606954e821fd9a57c2593d17a223ac64248a73c835d5c4f1e936459c2674f0aef8ca49e426bb901d2b8dc48b58e963a24c5f62fe3e2471dccc81f6d2258ae02418d11465184869adeddb6c60b0f44beb3a4f52bfd1f848ec953a59cabefc7e935a84064d07211315bd4713f8276e70fb4000644ec3533f66079e780d90d791125a0448058b0e2365452eca540e7e247ab218642eeee75605274548e207c61c748fae8f0bdf0a4679087b7a6d8f57cbc4e87840d36e9fd66780c1ff19cbe5f74fc3c3c562bffb8ba5c7fb9daf7a5b02c7d05938b8162e7e870acc047cb9afeb4190ba91e222dfdad522588c26b6132f36e2811d50903ef8d4a82cb99662e411f405a7b136203adc93e4e5b70025e64785ea8b6e02d636021447da01c9cfe530fbc3277fadf03c6b6674080c22299e1af1f8f724579b74894a46795661e62c4105de1f458fd6316be9ec41256427890fea130e7d9aea2abf8c3dab06d595d86bef0272ceb6d50b96b6ac0737d531c81cbda927c4cae2378924561ce08c7bce258f69e7903bd839062c3767654cc84e698c73e4e1bd9701b7368a032186af44ff657a1428435079edd102e9f1086e5e7a4b6ef4ee20863bf67daf076c3f00ab287384b00bd9e6762c79d34e07e9b5b41c106f264e8d3d565c665c98d026eb11f9f3fd0714d29c7784287ddc634977467509d1ca01c07fc69ce16edf1fc7d91e8a88a1c37b669e0644280b2462328541b0bdf0491a81703154c31277247defd158ae2a962cf35ea8318257ad705a574e776cb5341b12d30a7e31cab6ae73c222adf8a356da66230673d9cd30869d2dcd09dfd87f47f6a758eaafaf38820bd4806e705367e6af88748281e57ab2a909424c8079863af49c99fd8ffcf1935e4a32670577f30beb868254b4b21aa83965ef7061deccd5de504a05c2be3e399ad7a862826d984a09f600afa501e663d28aeb3029b4dcc3fa3ba956830b5cb4a004ecf1d4cf6531e5419941a3c4b30f839d71967873e8fedf2d25ec24184b5b98b156c66624a72bc99b60bb918516fcee950f9cac1c6135f3b9e28cab6dc6be7b1f93baf4b860d5e0dac64f956ce93caf1f94d36300e296e9f6746dc4fa0a3e2e188c818481c5abca7d0be72cbeb0269ec8f29938f7534e3321cd3f4c4e6c1a29fa4280181757264de2adef909a56dd5486e1599089c0a77aa51beb1c0686c6e9713fc10f7789b5682183eccf955638b7e21c06490bb17abce59a88ca6bf734828e3a3e0fa7e9242b30f8007197f923ccfc5524500cac5aa7501fcc9b3e088c9e55b6f54e71145cbc0fbc23e213d3926123e7927580db233434b58ced4018cc09bae6ca329c73939905d260028a3321e67821aa9afc8430142ccacda7c0a54f8b51b300f0501424d7083342138b7d9823e72ad34a5b1654c2cb42a74594a6ad9c23847506b034a4866da7b38f855ecf2cd999ef29e996815c2cc14", 0xffffffffffffffd2, 0x20081, &(0x7f0000000000)={0x10, 0x2, 0x0, @loopback}, 0x10) sendmsg$inet_sctp(r3, &(0x7f0000001480)={&(0x7f0000000040)=@in={0x10, 0x2, 0x1, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="140000008400000001000000ccec050082700100100000008400000009000000e000000186476d"], 0x24, 0x20180}, 0x80) cap_fcntls_get(0xffffffffffffffff, &(0x7f0000000200)) getsockopt$inet_tcp_TCP_TXTLS_MODE(0xffffffffffffffff, 0x6, 0x28, 0x0, 0x0) 0s ago: executing program 1 (id=520): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000d40)='./file1\x00') aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c1, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x31, &(0x7f0000000400)=ANY=[@ANYBLOB='c^'], 0x2f8) sendto$inet6(r2, &(0x7f00000002c0)="5a89c9f1dc48a250600846cbddc0dca4215e850edb81ba4b97bd0ffa9c9707d7c3a601392047798a51028964d28d53bacea05dcf7cb0ecca3b95af84974d03ab51c0825c988ce5f3b6db3457640829195dd559591d8cb16ac95871ef00a338410bb50254d2f95fcc90e00b109b2d287639b7e74b9f8735ebc3fbb97691b115b054a2e1536a0f90d4689c734b224c5a5c72fc0e1662d98ac4c1c9205a2c3532fcd5ab793e60208255d775670af929beba5d1ff51b044f585302ed74206f6aa4b7fcd4afa4fd3ce5fbbc50ecef9e03de6730136a45743669efbb93b8ff8d3a4c4bddb7a5f0fa6484a1ba7707eb0e61cb6c86e3d8ca63664576db7091c3bc160b94a0cb0835c315a6190131989b92d7405268ce1867f777586c7178437b4c63095172458b603e519a9629bfcc62162588f2c42922c4366c66a6f54b79ea80adc4653e90dac0a4f4820e43c30c687662fd82c5e7dd530623d67e30a4892ca76b726b5be001be4472abf6d00dd742f625a1f6b43e9b370e50b1e6199bd1f9d6bc6e3b096a486d9cf7acf1287a9e10478eacf63863f24617c3fb03b82879da1e47e8f2acfa2c85f42e0b289f0a71cba7da8507578424073967577ef92aebc3ef329b0d9f52567f8656a1d8eba41e0969043de5a61b54a8abb3beeebd", 0x1d9, 0x60040, &(0x7f00000012c0)={0x1c, 0x1c, 0x0, 0x4, @mcast2, 0x6}, 0x1c) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sendmsg$inet6_sctp(r1, 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f0000000340)}], 0x1, 0x0) open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) r3 = socket(0x11, 0x3, 0x0) sendto$unix(r3, &(0x7f00000001c0)="9401050138a85a8035e104d2121a5190b469d8f40ae6e2e563b65e32d4b0f7e6f7ee761207ad1b5f879357781fa4011c7baf69815801085957e2f1c3103d74de0813126ca5bd1b8b7bd01dec73fe25ff50dfcd4c7dd4c09faad8df2191d275ba1cfe57549a372339491b590d01", 0x6d, 0x108, 0x0, 0x0) open$dir(0x0, 0x8, 0x20) ioctl$SMB_WRITEB(0xffffffffffffffff, 0xc0086924, 0x0) r4 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) lpathconf(&(0x7f0000000340)='./file0\x00', 0x2) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.19' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe0054218800 vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe006e787370: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371e980 usecount 4, writecount 2, refcount 2 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00587003e0 ref 1 pages 1 cleanbuf 0 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0058714000 (pid 849, syz-executor, tid 100188) nlink=1, effnlink=1, size=67538, extsize=0 generation=57443c1, uid=0, gid=0, flags=0x160000 ino 83, on dev gpt/rootfs vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe006e787c08: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371e980 usecount 4, writecount 2, refcount 2 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00587431f0 ref 1 pages 1 cleanbuf 0 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe005872a780 (pid 886, syz-executor, tid 100262) nlink=1, effnlink=1, size=67538, extsize=0 generation=d1b1de7, uid=0, gid=0, flags=0x160000 ino 107, on dev gpt/rootfs vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe006e78c1b8: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371e980 usecount 4, writecount 2, refcount 2 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe005872ee88 ref 1 pages 1 cleanbuf 0 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0058720780 (pid 900, syz-executor, tid 100301) nlink=1, effnlink=1, size=67538, extsize=0 generation=16d16420, uid=0, gid=0, flags=0x160000 ino 78, on dev gpt/rootfs Expensive callout(9) function: 0xffffffff81a77e20(0xfffffe006dfc6000) 0.003062675 s if_delmulti_locked: detaching ifnet instance 0xfffffe0054218800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e6eb800 vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe006de90a50: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371e980 usecount 6, writecount 4, refcount 4 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00587418b8 ref 1 pages 11 cleanbuf 1 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe005873e000 (pid 1004, syz-executor, tid 100532) with exclusive waiters pending nlink=1, effnlink=1, size=73810, extsize=0 generation=1bef6f19, uid=0, gid=0, flags=0x160000 ino 131, on dev gpt/rootfs md2: truncating fractional last sector by 3 bytes lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe006de97518 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1741 2nd 0xffffffff83ce2e40 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1440 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff81699e21 at witness_checkorder+0x781 #1 0xffffffff8151f747 at __mtx_lock_flags+0x187 #2 0xffffffff81885dc6 at tuninit+0x76 #3 0xffffffff81873fd4 at ether_ioctl+0x1b4 #4 0xffffffff81884b62 at tunifioctl+0x3c2 #5 0xffffffff819c1324 at in_control_ioctl+0x1744 #6 0xffffffff81863bbb at ifioctl+0xdeb #7 0xffffffff816a8c0a at kern_ioctl+0x52a #8 0xffffffff816a85ee at sys_ioctl+0x36e #9 0xffffffff8218aa62 at amd64_syscall+0x4e2 #10 0xffffffff8212c40b at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff8169acf2 at witness_checkorder+0x1652 #1 0xffffffff81589299 at _sx_xlock+0x139 #2 0xffffffff8188482a at tunifioctl+0x8a #3 0xffffffff81860876 at ifhwioctl+0x1dc6 #4 0xffffffff81882292 at tunioctl+0xd92 #5 0xffffffff811f34b6 at devfs_ioctl+0x266 #6 0xffffffff8234f3f7 at VOP_IOCTL_APV+0x87 #7 0xffffffff81806e57 at vn_ioctl+0x3c7 #8 0xffffffff811f4379 at devfs_ioctl_f+0x69 #9 0xffffffff816a8c0a at kern_ioctl+0x52a #10 0xffffffff816a85ee at sys_ioctl+0x36e #11 0xffffffff804443c7 at freebsd32_ioctl+0x607 #12 0xffffffff823173a2 at ia32_syscall+0x4d2 #13 0xffffffff8212cc6f at int0x80_syscall_common+0x9c vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe006e05e370: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371e980 usecount 4, writecount 2, refcount 2 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00587640f8 ref 1 pages 1 cleanbuf 0 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0058720780 (pid 1052, syz-executor, tid 100638) nlink=1, effnlink=1, size=67538, extsize=0 generation=edd52106, uid=0, gid=0, flags=0x160000 ino 129, on dev gpt/rootfs vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe006dfbcc08: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371e980 usecount 4, writecount 2, refcount 2 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00587397c0 ref 1 pages 1 cleanbuf 0 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0058713780 (pid 1070, syz-executor, tid 100656) nlink=1, effnlink=1, size=67538, extsize=0 generation=fd9dfd9d, uid=0, gid=0, flags=0x160000 ino 106, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe0054218800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793800 Nov 29 04:36:41 ci-freebsd-i386-1 dhclient[1449]: send_packet: No buffer space available Nov 29 04:37:15 ci-freebsd-i386-1 syslogd: last message repeated 3 times Nov 29 04:37:41 ci-freebsd-i386-1 syslogd: last message repeated 2 times SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-1.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Nov 29 04:41:17 ci-freebsd-i386-1 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl