last executing test programs: 34.073330367s ago: executing program 2 (id=15): chmod(&(0x7f0000000040)='.\x00', 0x35e) setuid(0xffffffffffffffff) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) chmod(&(0x7f0000000080)='./file0\x00', 0x2ea) chdir(&(0x7f0000000100)='./file0\x00') mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xc0e99db6de761f86, 0x0) chmod(&(0x7f0000000040)='.\x00', 0x35e) rename(&(0x7f00000007c0)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) fspacectl(r0, 0x1, &(0x7f0000000000)={0x9, 0x7fffffff}, 0x0, 0x0) r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r1, r1, &(0x7f00000000c0)='./file0\x00', 0x21000625) 34.072415201s ago: executing program 2 (id=16): r0 = socket$inet(0x2, 0x1, 0x0) fcntl$setown(0xffffffffffffffff, 0x6, 0x0) symlink(0x0, &(0x7f0000000240)='./file0\x00') chroot(&(0x7f0000000000)='./file0\x00') open(&(0x7f0000000100)='./file0/file0/..\x00', 0x400280, 0x12) listen(r0, 0x100001ff) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) freebsd10_pipe(0x0) cap_rights_limit(0xffffffffffffffff, 0x0) sigaction(0x14, &(0x7f0000000080)={0x0, 0x35, {[0xfffff801, 0x5872c520, 0xfffffffe]}}, 0x0) ioctl$FILEMON_SET_PID(0xffffffffffffffff, 0xc0045302, 0x0) sigprocmask(0x0, &(0x7f0000000100)={[0x7, 0x0, 0x8, 0x6]}, 0x0) freebsd11_mknod(0x0, 0x2000, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x0) r2 = getegid() setresgid(r2, r2, r2) chown(&(0x7f0000000180)='./file0\x00', 0xffffffffffffffff, r2) getresuid(&(0x7f0000000200), &(0x7f0000000280)=0x0, &(0x7f0000000340)) fchownat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', r3, r2, 0x2000) ktimer_settime(0x0, 0x0, &(0x7f00000002c0)={{0x2}}, 0x0) r4 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) __realpathat(r5, &(0x7f00000000c0)='./file0/file0/..\x00', &(0x7f0000000380)=""/6, 0x6, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) setresuid(0x0, 0xee01, 0x0) fstat(r4, &(0x7f00000003c0)) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 33.193363402s ago: executing program 2 (id=21): recvfrom(0xffffffffffffffff, &(0x7f0000000100)=""/135, 0x87, 0xc2, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0/file0/file0\x00', 0x2000000, 0x182) pwritev(r0, &(0x7f00000001c0)=[{&(0x7f00000008c0)="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", 0x7bd}], 0x1, 0x0) ioctl$DIOCSETLIMIT(r0, 0xc0084428, &(0x7f0000000000)={0x5, 0x1}) ioctl$DIOCADDALTQV0(r0, 0xc0ec442d, &(0x7f0000000200)="f79658953f6d19fb8920612890e18a63c86dee1dc0e799da6d5da6f44930d4425f6d2938b5dfb2aec17f2b07e9966b264f8e969a1bba543cd9b3c8de1879b72e637ac61cd5664ecce7316f0ef7cd1a032ffb563ad246100e212b71bfbdacded5a31ba78adf19074d3d1efc847c7051bf47cc9c8461a0be12d9e679ca5a4dfca1aa045bfb101adf3c853e42d055c879197c11784e5916220829a8fef4c57309e4c97b69541aaee3bb2592465ca8fdc81dc2899e9508570219117d73e0b7606eeb012d6325ddb8cd04a30941ddb08e07e98f634c25") setresgid(0xffffffffffffffff, 0x0, 0xee01) 33.192986167s ago: executing program 2 (id=22): mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) unmount(&(0x7f0000000200)='./file0\x00', 0x0) r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000040)={@multicast1, @multicast1, @local={0xac, 0x14, 0x0}}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000080)={@multicast1, @broadcast, @local={0xac, 0x14, 0x0}}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x47, &(0x7f00000003c0)={@multicast1, @broadcast, @local={0xac, 0x14, 0x0}}, 0xc) r1 = socket$bt_l2cap(0x24, 0x5, 0x87) setsockopt$bt_l2cap(r1, 0x1609, 0x6, &(0x7f0000001040)=0xef, 0x4) freebsd11_getfsstat(&(0x7f00000004c0), 0x1d8, 0x3) unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x404000d0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) msync(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x4b, &(0x7f0000000080)=0x2, 0x4) 33.190763218s ago: executing program 2 (id=23): chflags(&(0x7f0000000300)='./file0\x00', 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0x1c, 0x1c, 0x3, 0x4, @loopback}, 0x1c) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000000c0)="8fcf828db5521fff02a7958e86c998590a0773caaabae4be20ca4e92629bff07a531bc2338b3b9c944b7e65a9f1a413b5da9123622ab2ccf1e36a6674739f42884df6eb868d20140090d60238cf9624c69eca8ce5f", 0x55}], 0x1) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000400)={0x0, 0xe99}, 0x8) r0 = socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) getresuid(0x0, &(0x7f0000000040)=0x0, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) freebsd11_fstatfs(r2, &(0x7f0000000080)) r3 = socket$unix(0x1, 0x5, 0x0) listen(r3, 0x2) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) unmount(&(0x7f0000000200)='./file1\x00', 0x0) setresuid(0x0, 0x0, r1) setresuid(0xee00, r1, 0xffffffffffffffff) r4 = msgget$private(0x0, 0x8) freebsd11_mknod(&(0x7f0000000380)='./file0\x00', 0x2000, 0x801) open(&(0x7f0000000480)='./file0\x00', 0x800, 0x0) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0xff8008, &(0x7f00000001c0)) setresuid(0x0, 0x0, 0x0) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) bind$inet6(r5, &(0x7f00000000c0)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}, 0x1c) sendto$inet6(r5, &(0x7f00000004c0)="88ddee51010024bc", 0x8, 0x1, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x3, @ipv4={'\x00', '\xff\xff', @loopback}, 0x3ff}, 0x1c) msgsnd(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="04001600"], 0x4, 0x800) freebsd11_getfsstat(&(0x7f0000000080), 0xff18, 0x1) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r6, 0x6, 0x24, &(0x7f00000000c0)="1ba17d", 0x3) setsockopt$inet_tcp_int(r6, 0x6, 0x22, &(0x7f0000003040)=0x3, 0x4) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 32.32313705s ago: executing program 2 (id=33): socket$inet(0x2, 0x1, 0x0) (async) r0 = socket$inet(0x2, 0x1, 0x0) ktimer_create(0x4, 0x0, &(0x7f0000000200)) (async) ktimer_create(0x4, 0x0, &(0x7f0000000200)=0x0) ktimer_settime(r1, 0x0, &(0x7f0000000240)={{0x0, 0x101}, {0x0, 0x20000002}}, 0x0) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) (async) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) r2 = getpgrp(0xffffffffffffffff) r3 = socket(0x1c, 0x1, 0x0) sendto(r3, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) sendto(r3, &(0x7f0000000dc0)="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", 0x579, 0x0, &(0x7f0000000480)=@in6={0x1c, 0x1c, 0x2, 0x9, @local={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c) sigqueue(r2, 0x48, @sigval_ptr) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, 0x401, 0x80000001}, &(0x7f0000000080)=0xc) (async) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, 0x401, 0x80000001}, &(0x7f0000000080)=0xc) setsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000000c0)={0x3, 0xfff, r4}, 0xc) (async) setsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000000c0)={0x3, 0xfff, r4}, 0xc) r5 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0xca0706ee3fd5d6f6) mmap(&(0x7f000064a000/0x1000)=nil, 0x1000, 0x0, 0x10, r5, 0xdffffffc) socket(0x17, 0x1, 0x46) (async) socket(0x17, 0x1, 0x46) r6 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r6, 0xb7c5) (async) listen(r6, 0xb7c5) r7 = openat$md(0xffffff9c, &(0x7f0000000140), 0x8, 0x0) ioctl$MDIOCATTACH(r7, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, 0x0, 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0xc4d, 0x0, 0x0, 0x7fff, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7b, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x8, 0xfff7fffd, 0x1, 0x0, 0x3, 0x3, 0xb, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0xfffffffe, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x20003, 0x0, 0x0, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x1000, 0x7, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r8 = socket$inet6_tcp(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) (async) r9 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r9, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) (async) setsockopt$inet6_buf(r9, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setsockopt$inet6_tcp_buf(r8, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r11, r8) (async) dup2(r11, r8) symlink(&(0x7f0000000280)='./file/file0/..//file0\x00', &(0x7f0000000340)='.\x00') recvmsg(r10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x33, 0x0}, 0x41) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 32.320526001s ago: executing program 32 (id=33): socket$inet(0x2, 0x1, 0x0) (async) r0 = socket$inet(0x2, 0x1, 0x0) ktimer_create(0x4, 0x0, &(0x7f0000000200)) (async) ktimer_create(0x4, 0x0, &(0x7f0000000200)=0x0) ktimer_settime(r1, 0x0, &(0x7f0000000240)={{0x0, 0x101}, {0x0, 0x20000002}}, 0x0) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) (async) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) r2 = getpgrp(0xffffffffffffffff) r3 = socket(0x1c, 0x1, 0x0) sendto(r3, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) sendto(r3, &(0x7f0000000dc0)="1d77c57c16eb5158caed03d9c0f6dca317dffc1d3274f66f21ae7c59f1ee36dfd4937ea42fcc31cb20e43d2d855805008764d272582aaa8e01850752a4ef2bf19ce924bc6abfa885ce3bb82db3049521de0dcadd05090b74beb5001cc836fa6a6df5a439bbd9f6e99853d26df8f1556d7f04d639b9608adf0c8a2160f6c84cb6465394f135182bd779fca31bd722fc8452862c193bd74a492389f1a6500f3f6cd32f8e3e2348640cf138e8d8fbd568b750a6590010e379273f4535083f61c543831816d5cd1c4c0964e45de2f0d8c80d98e7b7820f1087956616a031c3ce09e02719de4eb3c7b7521469c86d1e4f4422aeadfdc10f9281d64f1ae344a1a557a97e9a7732b5cb1b0f6e4603be46ec05d26db9302240f6341885308c9f5d3b53f88e472fef6b56f84d51ccb7a8a86d7ec53003991f262a3023331bda2476443fcaabedac625c94d6a225d395e9781cfa7ccbeee8c722aff529291d324fc39ba33b20b5a5e33a163bc4869234c8fc7c392a305f68930a65de05f4a05f44f6f7d57cc6505583c17955561d574c98c618966feb5d1221255309500ddf7543cee9fc480c6a868965d8680869203683cbc6d00ae71d0653d62ceccab106843004f3d2129b49582cd46f4dba029c6317554188223a363989bee5c145a1b8cad090e864922b978db289438eff50691f0f2e54e260b1f4e0ac62f1f5f55987e01e7ca8225bfdc154fb3a2a06ed6de8294723fd17996129ffd07f4681bd76c181fa867c038eb32535011da8adb6ffc304303e2166c92523c361d7d657d9070b83f75a039484b8f302e3991cdc1c5133ee495a5b13cb35375832f250f03018149f0866a33c17f3916bffb37307c0172cf7f246a03fba1a1cd3d75730865d7202eb26b7335b0dbdaf0397603c30ffe932cde59cfcf75ce099c2aead6b0857dc24a9f188f10a3258101a7ce0ced8d78bc50c2948640ada55d6478c93704d26be6a3cffbac6313e008c56c22ccd15841e84737c21596051177282128d5f4e594423fc5ae0a2f8ce75cf286ea2eabc3b4245d3a2f38d6db71857b1c98ad38db2884110701e6dc0b68f403304f5c7fde72e415fdcf3e55f720257c265deb4514532a2f068a8e8419bb277ffcdeccb50e6a2d4a372d24f8a9c766ba84411a53d14cc9ff5c7fe47028ee2047276298e296b43cf79a2479e264231b5b511761bf32b36357790efb2059265ac6a0efd0e5f5e771cd2e6f56b75aad124b3abf5e78c8df1a4cc542d9998ce02490b3e2e507ed82a2aab939436f98c1157cf2ac19160641ac4564329dcc6a24a8cfb1e42840e2d2a710e220e826dd62141d73c2cd5f802f5bd15d0c4ec9f2a90fab981a3ce35d3b8f232397bf3f0629d682060280bd20a257dc86a74f6d627a16df6448ce2b66cb091bcc2737611e32b87f04dc1ab3bc91ab889a18befd579219fe016a1f2dbf7d2bfc5db36ee78a8d396930930e292aeedb27263cfc5f8fbbc5a8497d52c6e54e196ba46aa300a7cd2eb01beb3ae11f29e6ca4345a37e2b534031d3188a0a48d7eecae231ce1a7b482c3b0d5671e8482f223eef64a69fa230486b1f03b7c086014607c9a8d074b66bb657ce9557fcbd51ff8175962f9fa29cf0725d153a39d8c51f6d40a769463bef1c5abe315852a86e4ae21059728bab180133a68469dadb297080eb19f3ca7fbdaa2beee6e33b42642ca7a75c54b9a61678c408ab034960f2fecb05b7003a7b94663d211b2292ca7d6a319ea6cd701ae12a000819da5c0bc3cf26265666b53b6c1631ba4b0943992915a8244b47da96af44604d01c9a83c68f27e1d10695c92a4f692b7387ef1899610ebf7fa1682d78352959c0d74567b033612f93bd30160f6d3e6d11f62385b378def19be8a2ff804bfa59a3a96fe95438720e97c1c8eefa0ce6cca70415522dcf8e5ccd90dc9737f4b6c8a69c6405b2c451ffe1dbaadcfc7ac6ec8fa48dc23b03", 0x579, 0x0, &(0x7f0000000480)=@in6={0x1c, 0x1c, 0x2, 0x9, @local={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c) sigqueue(r2, 0x48, @sigval_ptr) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, 0x401, 0x80000001}, &(0x7f0000000080)=0xc) (async) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000040)={0x0, 0x401, 0x80000001}, &(0x7f0000000080)=0xc) setsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000000c0)={0x3, 0xfff, r4}, 0xc) (async) setsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000000c0)={0x3, 0xfff, r4}, 0xc) r5 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0xca0706ee3fd5d6f6) mmap(&(0x7f000064a000/0x1000)=nil, 0x1000, 0x0, 0x10, r5, 0xdffffffc) socket(0x17, 0x1, 0x46) (async) socket(0x17, 0x1, 0x46) r6 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r6, 0xb7c5) (async) listen(r6, 0xb7c5) r7 = openat$md(0xffffff9c, &(0x7f0000000140), 0x8, 0x0) ioctl$MDIOCATTACH(r7, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, 0x0, 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0xc4d, 0x0, 0x0, 0x7fff, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x7b, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x8, 0xfff7fffd, 0x1, 0x0, 0x3, 0x3, 0xb, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0xfffffffe, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x20003, 0x0, 0x0, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x1000, 0x7, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r8 = socket$inet6_tcp(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) (async) r9 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r9, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) (async) setsockopt$inet6_buf(r9, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setsockopt$inet6_tcp_buf(r8, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r11, r8) (async) dup2(r11, r8) symlink(&(0x7f0000000280)='./file/file0/..//file0\x00', &(0x7f0000000340)='.\x00') recvmsg(r10, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x33, 0x0}, 0x41) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) 11.702643844s ago: executing program 4 (id=34): syz_emit_ethernet(0x9c, &(0x7f0000000800)=ANY=[@ANYBLOB="9f4c4662c957ffffffffffff08004500008e006800000102907800000007e00000024e234e2300089078f8a28b780e6f0cd035b9ac18445882568afff600002e977f0aaaaea63841046799c59b8e131cdcd476bdc247e12f65ce84b51105ca63eae7b758435cb781f70ac2e5885be30186035b0d17c3fb03375abf0496e38ae7b9aa1807d4b5739f4e40fd5f15456b258d044212d25aad1c637ad856"]) open$dir(&(0x7f00000008c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x3) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) select(0x40, &(0x7f0000000000)={0xffffffff9c3c4a58, 0xc, 0x4, 0x7, 0x3, 0x6, 0x4, 0x9}, &(0x7f0000000040)={0x7, 0x10, 0x8001, 0xff, 0x9, 0x7, 0x8000000000000000, 0x10}, &(0x7f00000000c0)={0x3, 0xffff, 0x7, 0x7fffffff, 0x4, 0x9, 0x2b1, 0xfffffffffffffff7}, &(0x7f0000000100)={0x9, 0x95}) aio_waitcomplete(0x0, &(0x7f0000000540)={0x0, 0xfff}) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x800, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f0000000580)={0x1, 0xfb, 0x7, 0x0, 0xffe, 0x8, 0x5, 0x26, 0x0, 0x1, 0x0, [0x0, 0x2, 0x3, 0x400, 0x9, 0x4, 0x3ff, 0xd1f, 0x2, 0x1, 0x4, 0x0, 0x7fff, 0x9001, 0x0, 0xfffffffc, 0x0, 0x4, 0x0, 0xfffff000, 0x0, 0x9, 0x6, 0x1, 0x0, 0x0, 0x448d, 0xe122, 0xfffffff6, 0x9, 0x9, 0xffe00001, 0x7fff, 0x400009, 0x9, 0x8, 0xfffffffd, 0x3, 0x209, 0x8400, 0x4, 0x2, 0x80a7, 0xc381, 0x7, 0x1000, 0x7, 0x400, 0x28000, 0x7, 0x0, 0xffc, 0x80, 0x4, 0x1, 0x5, 0x0, 0x100, 0x11, 0x3, 0x0, 0x7, 0x80100004, 0x9, 0x4, 0x8, 0xfffffffe, 0x4a05bb07, 0x4, 0x7, 0xfff, 0x0, 0x0, 0x4, 0x80000, 0xfc, 0x0, 0x349, 0x0, 0x3, 0x4, 0x6, 0x0, 0x5, 0x5, 0x800, 0x800003, 0x0, 0xfffffffb, 0x10, 0x5, 0x0, 0x4, 0x4fabb25c]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r1, &(0x7f0000000240)=@file={0xa, 0x1, './file0\x00'}, 0xa) socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x3ee, @rand_addr="0000fa0b0e000000000000004000"}, 0x1c) freebsd11_mknod(&(0x7f0000000a00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000, 0x1) socket(0x1, 0x5, 0xc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000040)='hfsp\x00', 0x0, 0x8400004, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180)={0x100004}, 0x4) kqueue() r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) socket$inet6(0x1c, 0x20000000, 0x3) getsockname$unix(r2, &(0x7f00000004c0)=@file={0xf0, 0x0, ""/238}, &(0x7f00000000c0)=0xf0) aio_write(&(0x7f0000000240)={r2, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) r4 = socket$inet(0x2, 0x1, 0x0) listen(r4, 0x14040000) 9.653905065s ago: executing program 4 (id=34): syz_emit_ethernet(0x9c, &(0x7f0000000800)=ANY=[@ANYBLOB="9f4c4662c957ffffffffffff08004500008e006800000102907800000007e00000024e234e2300089078f8a28b780e6f0cd035b9ac18445882568afff600002e977f0aaaaea63841046799c59b8e131cdcd476bdc247e12f65ce84b51105ca63eae7b758435cb781f70ac2e5885be30186035b0d17c3fb03375abf0496e38ae7b9aa1807d4b5739f4e40fd5f15456b258d044212d25aad1c637ad856"]) open$dir(&(0x7f00000008c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x3) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) select(0x40, &(0x7f0000000000)={0xffffffff9c3c4a58, 0xc, 0x4, 0x7, 0x3, 0x6, 0x4, 0x9}, &(0x7f0000000040)={0x7, 0x10, 0x8001, 0xff, 0x9, 0x7, 0x8000000000000000, 0x10}, &(0x7f00000000c0)={0x3, 0xffff, 0x7, 0x7fffffff, 0x4, 0x9, 0x2b1, 0xfffffffffffffff7}, &(0x7f0000000100)={0x9, 0x95}) aio_waitcomplete(0x0, &(0x7f0000000540)={0x0, 0xfff}) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x800, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f0000000580)={0x1, 0xfb, 0x7, 0x0, 0xffe, 0x8, 0x5, 0x26, 0x0, 0x1, 0x0, [0x0, 0x2, 0x3, 0x400, 0x9, 0x4, 0x3ff, 0xd1f, 0x2, 0x1, 0x4, 0x0, 0x7fff, 0x9001, 0x0, 0xfffffffc, 0x0, 0x4, 0x0, 0xfffff000, 0x0, 0x9, 0x6, 0x1, 0x0, 0x0, 0x448d, 0xe122, 0xfffffff6, 0x9, 0x9, 0xffe00001, 0x7fff, 0x400009, 0x9, 0x8, 0xfffffffd, 0x3, 0x209, 0x8400, 0x4, 0x2, 0x80a7, 0xc381, 0x7, 0x1000, 0x7, 0x400, 0x28000, 0x7, 0x0, 0xffc, 0x80, 0x4, 0x1, 0x5, 0x0, 0x100, 0x11, 0x3, 0x0, 0x7, 0x80100004, 0x9, 0x4, 0x8, 0xfffffffe, 0x4a05bb07, 0x4, 0x7, 0xfff, 0x0, 0x0, 0x4, 0x80000, 0xfc, 0x0, 0x349, 0x0, 0x3, 0x4, 0x6, 0x0, 0x5, 0x5, 0x800, 0x800003, 0x0, 0xfffffffb, 0x10, 0x5, 0x0, 0x4, 0x4fabb25c]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r1, &(0x7f0000000240)=@file={0xa, 0x1, './file0\x00'}, 0xa) socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x3ee, @rand_addr="0000fa0b0e000000000000004000"}, 0x1c) freebsd11_mknod(&(0x7f0000000a00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000, 0x1) socket(0x1, 0x5, 0xc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000040)='hfsp\x00', 0x0, 0x8400004, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180)={0x100004}, 0x4) kqueue() r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) socket$inet6(0x1c, 0x20000000, 0x3) getsockname$unix(r2, &(0x7f00000004c0)=@file={0xf0, 0x0, ""/238}, &(0x7f00000000c0)=0xf0) aio_write(&(0x7f0000000240)={r2, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) r4 = socket$inet(0x2, 0x1, 0x0) listen(r4, 0x14040000) 7.568073187s ago: executing program 4 (id=34): syz_emit_ethernet(0x9c, &(0x7f0000000800)=ANY=[@ANYBLOB="9f4c4662c957ffffffffffff08004500008e006800000102907800000007e00000024e234e2300089078f8a28b780e6f0cd035b9ac18445882568afff600002e977f0aaaaea63841046799c59b8e131cdcd476bdc247e12f65ce84b51105ca63eae7b758435cb781f70ac2e5885be30186035b0d17c3fb03375abf0496e38ae7b9aa1807d4b5739f4e40fd5f15456b258d044212d25aad1c637ad856"]) open$dir(&(0x7f00000008c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x3) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) select(0x40, &(0x7f0000000000)={0xffffffff9c3c4a58, 0xc, 0x4, 0x7, 0x3, 0x6, 0x4, 0x9}, &(0x7f0000000040)={0x7, 0x10, 0x8001, 0xff, 0x9, 0x7, 0x8000000000000000, 0x10}, &(0x7f00000000c0)={0x3, 0xffff, 0x7, 0x7fffffff, 0x4, 0x9, 0x2b1, 0xfffffffffffffff7}, &(0x7f0000000100)={0x9, 0x95}) aio_waitcomplete(0x0, &(0x7f0000000540)={0x0, 0xfff}) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x800, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f0000000580)={0x1, 0xfb, 0x7, 0x0, 0xffe, 0x8, 0x5, 0x26, 0x0, 0x1, 0x0, [0x0, 0x2, 0x3, 0x400, 0x9, 0x4, 0x3ff, 0xd1f, 0x2, 0x1, 0x4, 0x0, 0x7fff, 0x9001, 0x0, 0xfffffffc, 0x0, 0x4, 0x0, 0xfffff000, 0x0, 0x9, 0x6, 0x1, 0x0, 0x0, 0x448d, 0xe122, 0xfffffff6, 0x9, 0x9, 0xffe00001, 0x7fff, 0x400009, 0x9, 0x8, 0xfffffffd, 0x3, 0x209, 0x8400, 0x4, 0x2, 0x80a7, 0xc381, 0x7, 0x1000, 0x7, 0x400, 0x28000, 0x7, 0x0, 0xffc, 0x80, 0x4, 0x1, 0x5, 0x0, 0x100, 0x11, 0x3, 0x0, 0x7, 0x80100004, 0x9, 0x4, 0x8, 0xfffffffe, 0x4a05bb07, 0x4, 0x7, 0xfff, 0x0, 0x0, 0x4, 0x80000, 0xfc, 0x0, 0x349, 0x0, 0x3, 0x4, 0x6, 0x0, 0x5, 0x5, 0x800, 0x800003, 0x0, 0xfffffffb, 0x10, 0x5, 0x0, 0x4, 0x4fabb25c]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r1, &(0x7f0000000240)=@file={0xa, 0x1, './file0\x00'}, 0xa) socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x3ee, @rand_addr="0000fa0b0e000000000000004000"}, 0x1c) freebsd11_mknod(&(0x7f0000000a00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000, 0x1) socket(0x1, 0x5, 0xc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000040)='hfsp\x00', 0x0, 0x8400004, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180)={0x100004}, 0x4) kqueue() r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) socket$inet6(0x1c, 0x20000000, 0x3) getsockname$unix(r2, &(0x7f00000004c0)=@file={0xf0, 0x0, ""/238}, &(0x7f00000000c0)=0xf0) aio_write(&(0x7f0000000240)={r2, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) r4 = socket$inet(0x2, 0x1, 0x0) listen(r4, 0x14040000) 5.698198956s ago: executing program 1 (id=151): r0 = socket(0x1c, 0x5, 0xfe) r1 = socket(0x1c, 0x1, 0x0) sysarch$AMD64_SET_PKRU(0x85, &(0x7f0000000140)={&(0x7f00000001c0)="d252fa6b29f7dddb5d814f5fda705e4e62732d75890b048505ecd1be3e971d8d9627c3ae19e3db9c2c69b7f4ff20685ce854", 0x32, 0x20}) select(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r2 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, 0x0, 0x0) syz_emit_ethernet(0x98, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00623aff78042000000014000001000000086500ff0200000000000000000000000000018800907800000000fe8000000000000000000020000000bb030884c814c23d9b66e0080fbd81b768b77a8b9b3780d22952c0db0042da2e39ebf0581cbc744d58fb8fbb6518711503ef1b3a7dd76eac249ac9e93a99f085440301650595abc9d90200"]) cap_fcntls_limit(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x3866) open$dir(&(0x7f0000000180)='./file0/file0/file0\x00', 0x8000, 0x0) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xd}, 0x24) sendto$inet6(r3, 0x0, 0x0, 0x60280, &(0x7f00000000c0)={0x1c, 0x1c, 0x2, 0x8, @rand_addr="720f93f223bcc795438d3d69e16d756e"}, 0x1c) sendto$inet6(r3, 0x0, 0x0, 0x80, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x8001, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) r4 = open(&(0x7f0000000200)='./file0/file0/file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) r5 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x31, &(0x7f0000000240)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r2, @ANYRESOCT=r5, @ANYRES32=r4, @ANYRES8=r0], 0x8) sendto(r5, 0x0, 0x0, 0x100, 0x0, 0x0) extattr_get_link(0x0, 0x3, 0x0, 0x0, 0x0) cpuset_setid(0x2, 0x0, 0x0) socket(0x1c, 0x1, 0x0) select(0x0, 0x0, &(0x7f0000000140)={0x4c508b11, 0x0, 0x0, 0x9, 0x3b, 0x0, 0xfffffffffffffffc, 0xfffffffffffffffd}, 0x0, 0x0) ktrace(&(0x7f0000000100)='./file0/file0/file0\x00', 0x2, 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mount(0x0, 0x0, 0xc4, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) setsockopt$sock_accept_filter(r2, 0xffff, 0x1000, 0x0, 0x0) 5.10285668s ago: executing program 4 (id=34): syz_emit_ethernet(0x9c, &(0x7f0000000800)=ANY=[@ANYBLOB="9f4c4662c957ffffffffffff08004500008e006800000102907800000007e00000024e234e2300089078f8a28b780e6f0cd035b9ac18445882568afff600002e977f0aaaaea63841046799c59b8e131cdcd476bdc247e12f65ce84b51105ca63eae7b758435cb781f70ac2e5885be30186035b0d17c3fb03375abf0496e38ae7b9aa1807d4b5739f4e40fd5f15456b258d044212d25aad1c637ad856"]) open$dir(&(0x7f00000008c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x3) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) select(0x40, &(0x7f0000000000)={0xffffffff9c3c4a58, 0xc, 0x4, 0x7, 0x3, 0x6, 0x4, 0x9}, &(0x7f0000000040)={0x7, 0x10, 0x8001, 0xff, 0x9, 0x7, 0x8000000000000000, 0x10}, &(0x7f00000000c0)={0x3, 0xffff, 0x7, 0x7fffffff, 0x4, 0x9, 0x2b1, 0xfffffffffffffff7}, &(0x7f0000000100)={0x9, 0x95}) aio_waitcomplete(0x0, &(0x7f0000000540)={0x0, 0xfff}) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x800, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f0000000580)={0x1, 0xfb, 0x7, 0x0, 0xffe, 0x8, 0x5, 0x26, 0x0, 0x1, 0x0, [0x0, 0x2, 0x3, 0x400, 0x9, 0x4, 0x3ff, 0xd1f, 0x2, 0x1, 0x4, 0x0, 0x7fff, 0x9001, 0x0, 0xfffffffc, 0x0, 0x4, 0x0, 0xfffff000, 0x0, 0x9, 0x6, 0x1, 0x0, 0x0, 0x448d, 0xe122, 0xfffffff6, 0x9, 0x9, 0xffe00001, 0x7fff, 0x400009, 0x9, 0x8, 0xfffffffd, 0x3, 0x209, 0x8400, 0x4, 0x2, 0x80a7, 0xc381, 0x7, 0x1000, 0x7, 0x400, 0x28000, 0x7, 0x0, 0xffc, 0x80, 0x4, 0x1, 0x5, 0x0, 0x100, 0x11, 0x3, 0x0, 0x7, 0x80100004, 0x9, 0x4, 0x8, 0xfffffffe, 0x4a05bb07, 0x4, 0x7, 0xfff, 0x0, 0x0, 0x4, 0x80000, 0xfc, 0x0, 0x349, 0x0, 0x3, 0x4, 0x6, 0x0, 0x5, 0x5, 0x800, 0x800003, 0x0, 0xfffffffb, 0x10, 0x5, 0x0, 0x4, 0x4fabb25c]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r1, &(0x7f0000000240)=@file={0xa, 0x1, './file0\x00'}, 0xa) socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x3ee, @rand_addr="0000fa0b0e000000000000004000"}, 0x1c) freebsd11_mknod(&(0x7f0000000a00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000, 0x1) socket(0x1, 0x5, 0xc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000040)='hfsp\x00', 0x0, 0x8400004, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180)={0x100004}, 0x4) kqueue() r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) socket$inet6(0x1c, 0x20000000, 0x3) getsockname$unix(r2, &(0x7f00000004c0)=@file={0xf0, 0x0, ""/238}, &(0x7f00000000c0)=0xf0) aio_write(&(0x7f0000000240)={r2, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) r4 = socket$inet(0x2, 0x1, 0x0) listen(r4, 0x14040000) 3.195204686s ago: executing program 0 (id=157): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) (async) syz_emit_ethernet(0x4e, &(0x7f0000001280)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60ae029d01000000000000000000000000000000000000aaff020000000000000000000000000001870090"]) (async) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r1, 0x84, 0x20, &(0x7f0000000140)=0x2, 0x4) (async) recvmsg(r1, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x42) recvmsg(r1, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=""/211, 0xd3}, 0x84) (async) r2 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0xa2) copy_file_range(r2, 0x0, r0, 0x0, 0x7, 0x0) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x2, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000080)=ANY=[@ANYRESOCT=r0]) symlink(0x0, 0x0) (async) setreuid(0xee00, 0x0) open(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x205, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r5 = dup(r4) ioctl$SMB_OLD_TRANS(r5, 0xc01c690c, &(0x7f0000000140)={0x6c, 0x6f, 0x30, @word, @buf="e2f7", 0x0, 0x0, 0x0, 0x0}) (async) r6 = open(&(0x7f00000002c0)='.\x00', 0x2, 0x0) (async) r7 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r7, r6, &(0x7f0000000680)='./file0\x00', 0x400) r8 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) inotify_add_watch_at(r7, r8, &(0x7f0000000280)='.\x00', 0x21000e30) (async) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) (async) r9 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r9, &(0x7f0000000240)='./file0\x00') (async) cpuset_setid(0x4, 0x0, 0x0) (async) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) (async) socket(0x1c, 0x30000003, 0x0) (async) syz_emit_ethernet(0x42, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaa2263dc82e5dac42f8839e2ec3b8f722cb9b7d946000034fffc000000849078ffffffffac1400aa8903ef000b019078000000004507fffe0066"]) connect$inet6(r8, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) 3.194936754s ago: executing program 1 (id=158): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) (async) syz_emit_ethernet(0x82, &(0x7f0000000000)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x4c, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x38, {0x0, 0x6, "06c33e", 0x0, 0x2b, 0x0, @rand_addr="52e8604bc8b1641f1a39a00cc19509b1", @loopback, [@routing={0x33, 0x2, 0x0, 0x1, 0x0, [@loopback]}], '}EBd'}}}}}}}) (async) accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @empty}, &(0x7f0000000080)=0x1c) (async) freebsd12_shm_open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x106) 3.142952003s ago: executing program 1 (id=161): mlockall(0x1) syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) r0 = socket(0x1c, 0x1, 0x0) sysarch$AMD64_SET_PKRU(0x85, &(0x7f0000000140)={&(0x7f0000000040)="d252fa", 0x3}) select(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xb}, 0x24) r2 = socket(0x1c, 0x3, 0xfe) bind$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @empty, 0x3}, 0x1c) sendto$unix(r2, 0x0, 0x0, 0x100, 0x0, 0x0) sendto$inet(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r3, 0x29, 0x48, &(0x7f0000000040)=0x9, 0x4) connect$inet6(r2, &(0x7f0000000040)={0x1c, 0x1c, 0x2, 0x200, @empty, 0xf}, 0x1c) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) extattr_get_link(0x0, 0x3, 0x0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x200, 0x4) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, &(0x7f0000000080)={@local={0xac, 0x14, 0x0}}, 0xc) sysarch$I386_SET_LDT(0x1, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) setgid(0xffffffffffffffff) setgroups(0xfffffffffffffe26, 0x0) r5 = shmget$private(0x0, 0x3000, 0xa0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_SET(r5, 0x1, 0x0) setuid(0xffffffffffffffff) shmctl$IPC_STAT(r5, 0x2, 0x0) 2.95455824s ago: executing program 0 (id=162): symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdir(&(0x7f0000001040)='./file0\x00', 0x1) r0 = open$dir(&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000000, 0x101) linkat(0xffffffffffffffff, &(0x7f0000000000)='./file1\x00', 0xffffffffffffffff, 0x0, 0x4000) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) symlink(&(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000440)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x10) rename(&(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000010c0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') renameat(r1, &(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000140)='./file0/file0\x00') renameat(r0, &(0x7f0000000340)='./file0/file0\x00', r1, &(0x7f0000000380)='./file1\x00') 2.813271867s ago: executing program 0 (id=163): socket$inet6(0x1c, 0x3, 0x1) mount(&(0x7f0000000200)='ext2fs\x00', 0x0, 0x10000000, &(0x7f0000000240)) lio_listio(0x0, 0x0, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x400, 0x0) syz_emit_ethernet(0x7e, 0x0) r0 = open$dir(&(0x7f0000000000)='./file1\x00', 0x20000, 0x0) linkat(r0, &(0x7f0000000400)='./file0\x00', r0, &(0x7f0000000440)='./file0\x00', 0x0) openat$filemon(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r1 = kqueue() freebsd11_kevent(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x0, 0x300}], 0x6a81, 0x0, 0x50, 0x0) 2.69322566s ago: executing program 0 (id=164): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) (async) access(&(0x7f0000000000)='./file0/../file0\x00', 0x1) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x2004, 0x4, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @generic="179d64ca430bb096c6832cde18679e29dba3ef488e11ee14"}}}}) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2008, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) (async, rerun: 32) syz_emit_ethernet(0x52, &(0x7f0000000080)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x3, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0xff, 0x0, {0x9, 0x4, 0x0, 0x8, 0x5, 0x66, 0x800, 0x3, 0x1e, 0x401, @rand_addr=0x6, @loopback, {[@end, @ssrr={0x89, 0x3, 0x1}, @ssrr={0x89, 0x3, 0xb}, @ra={0x94, 0x6, 0x1}]}}, "7b1f2915"}}}}}) (rerun: 32) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) freebsd11_fstatat(r0, &(0x7f0000000080)='./file0/../file0\x00', &(0x7f00000000c0), 0x4200) utimes(&(0x7f0000000040)='./file0/../file0\x00', 0x0) 2.69290013s ago: executing program 4 (id=34): syz_emit_ethernet(0x9c, &(0x7f0000000800)=ANY=[@ANYBLOB="9f4c4662c957ffffffffffff08004500008e006800000102907800000007e00000024e234e2300089078f8a28b780e6f0cd035b9ac18445882568afff600002e977f0aaaaea63841046799c59b8e131cdcd476bdc247e12f65ce84b51105ca63eae7b758435cb781f70ac2e5885be30186035b0d17c3fb03375abf0496e38ae7b9aa1807d4b5739f4e40fd5f15456b258d044212d25aad1c637ad856"]) open$dir(&(0x7f00000008c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x3) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) select(0x40, &(0x7f0000000000)={0xffffffff9c3c4a58, 0xc, 0x4, 0x7, 0x3, 0x6, 0x4, 0x9}, &(0x7f0000000040)={0x7, 0x10, 0x8001, 0xff, 0x9, 0x7, 0x8000000000000000, 0x10}, &(0x7f00000000c0)={0x3, 0xffff, 0x7, 0x7fffffff, 0x4, 0x9, 0x2b1, 0xfffffffffffffff7}, &(0x7f0000000100)={0x9, 0x95}) aio_waitcomplete(0x0, &(0x7f0000000540)={0x0, 0xfff}) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x800, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f0000000580)={0x1, 0xfb, 0x7, 0x0, 0xffe, 0x8, 0x5, 0x26, 0x0, 0x1, 0x0, [0x0, 0x2, 0x3, 0x400, 0x9, 0x4, 0x3ff, 0xd1f, 0x2, 0x1, 0x4, 0x0, 0x7fff, 0x9001, 0x0, 0xfffffffc, 0x0, 0x4, 0x0, 0xfffff000, 0x0, 0x9, 0x6, 0x1, 0x0, 0x0, 0x448d, 0xe122, 0xfffffff6, 0x9, 0x9, 0xffe00001, 0x7fff, 0x400009, 0x9, 0x8, 0xfffffffd, 0x3, 0x209, 0x8400, 0x4, 0x2, 0x80a7, 0xc381, 0x7, 0x1000, 0x7, 0x400, 0x28000, 0x7, 0x0, 0xffc, 0x80, 0x4, 0x1, 0x5, 0x0, 0x100, 0x11, 0x3, 0x0, 0x7, 0x80100004, 0x9, 0x4, 0x8, 0xfffffffe, 0x4a05bb07, 0x4, 0x7, 0xfff, 0x0, 0x0, 0x4, 0x80000, 0xfc, 0x0, 0x349, 0x0, 0x3, 0x4, 0x6, 0x0, 0x5, 0x5, 0x800, 0x800003, 0x0, 0xfffffffb, 0x10, 0x5, 0x0, 0x4, 0x4fabb25c]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r1, &(0x7f0000000240)=@file={0xa, 0x1, './file0\x00'}, 0xa) socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x3ee, @rand_addr="0000fa0b0e000000000000004000"}, 0x1c) freebsd11_mknod(&(0x7f0000000a00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000, 0x1) socket(0x1, 0x5, 0xc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000040)='hfsp\x00', 0x0, 0x8400004, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180)={0x100004}, 0x4) kqueue() r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) socket$inet6(0x1c, 0x20000000, 0x3) getsockname$unix(r2, &(0x7f00000004c0)=@file={0xf0, 0x0, ""/238}, &(0x7f00000000c0)=0xf0) aio_write(&(0x7f0000000240)={r2, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) r4 = socket$inet(0x2, 0x1, 0x0) listen(r4, 0x14040000) 2.692769463s ago: executing program 0 (id=165): socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffff9c, 0x0, 0x0) listen(0xffffffffffffffff, 0x2000e) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000d40)=""/4096, 0x1000}], 0x1) r0 = socket(0x1c, 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0xffffffffffffffe7, 0x1c, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, 0xfffffffe}, 0x1c) connect$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffb}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000000)={'rack\x00', 0x40001007}, 0x24) sendto$inet6(r1, &(0x7f00000001c0)="16c6bcec8d66", 0xa75f, 0x0, 0x0, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r2 = socket(0x1c, 0x1, 0x0) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffff9c, 0x0, 0x0, 0x60000000) getresuid(0x0, &(0x7f0000000cc0), &(0x7f0000000d00)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, &(0x7f0000000180)="6b466c4768c480a50ba9fd6ec26a6435980a436d45a85de9b7f74ca8517e481da2e86a571ff3bd266384753794523d2b98762e79f24e06ff172c144aca28", 0x3e, 0x8, &(0x7f0000000200)=@un=@file={0xa, 0x0, './file0\x00'}, 0xa) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 613.577464ms ago: executing program 0 (id=166): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0xa3) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x500) truncate(&(0x7f0000000000)='./file0\x00', 0xaa480) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x2, 0x7, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000140)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3e, 0x30, 0x65, 0x9766, 0x0, 0x6, 0x0, @multicast2, @remote={0xac, 0x14, 0x0}}, @icmp=@parameter_prob={0xc, 0x1, 0x0, 0xcc, 0x40, 0x0, {0x5, 0x4, 0x1, 0x6, 0x8, 0x64, 0xfffa, 0x81, 0xc, 0xfff9, @empty, @loopback}}}}}}) __semctl$GETZCNT(0x0, 0x0, 0x7) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4, &(0x7f0000000000)=0xa, 0x4) recvmsg(0xffffffffffffffff, 0x0, 0x40) freebsd11_getfsstat(&(0x7f0000000280), 0x1d8, 0x2) getresgid(0x0, &(0x7f0000000080), &(0x7f00000000c0)=0x0) fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, r2, 0x200) __semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) 612.317883ms ago: executing program 1 (id=167): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r0, 0x4000000000a, &(0x7f0000000240)="a3", 0x1, [0x5, 0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x12, @sival_ptr=0x6}}) setrlimit(0x9, &(0x7f0000000100)={0x4}) socket$inet_icmp_raw(0x2, 0x3, 0x1) copy_file_range(r0, &(0x7f0000000040)=0x40000000000, r0, 0x0, 0xd, 0x0) fchmod(r0, 0x100) r1 = socket(0x1, 0x1, 0x0) r2 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1b, &(0x7f0000000080), 0x4) bind$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x0, 0xffffffff, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0xffffffff}, 0x1c) setgroups(0x0, &(0x7f0000000000)) setgid(0x0) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x2c, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x400, 0x0, 0x0, {[@fastopen={0x22, 0x2}]}}}}}}}) socket$inet6(0x1c, 0x5, 0x9) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) (async) aio_write(&(0x7f0000000140)={r0, 0x4000000000a, &(0x7f0000000240)="a3", 0x1, [0x5, 0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x12, @sival_ptr=0x6}}) (async) setrlimit(0x9, &(0x7f0000000100)={0x4}) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) copy_file_range(r0, &(0x7f0000000040)=0x40000000000, r0, 0x0, 0xd, 0x0) (async) fchmod(r0, 0x100) (async) socket(0x1, 0x1, 0x0) (async) socket$inet6_tcp(0x1c, 0x1, 0x0) (async) setsockopt$inet6_int(r2, 0x29, 0x1b, &(0x7f0000000080), 0x4) (async) bind$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x0, 0xffffffff, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0xffffffff}, 0x1c) (async) setgroups(0x0, &(0x7f0000000000)) (async) setgid(0x0) (async) syz_emit_ethernet(0x3a, &(0x7f0000000140)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x2c, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x400, 0x0, 0x0, {[@fastopen={0x22, 0x2}]}}}}}}}) (async) socket$inet6(0x1c, 0x5, 0x9) (async) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) (async) 611.100224ms ago: executing program 3 (id=168): openat$crypto(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) r0 = kqueue() r1 = socket$inet6(0x1c, 0x1, 0x0) setsockopt(r1, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x0, @loopback={0x4}}, 0x1c) setitimer(0x1, &(0x7f0000000000)={{0xffff8928, 0x9}, {0x1, 0x5}}, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x0, 0x8, @loopback={0x28}, 0x800}, 0x1c) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000240)={r2, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000606, 0x48) kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x3, 0x0) r3 = semget$private(0x0, 0x7, 0x764) semop(r3, &(0x7f0000000100)=[{0x1, 0x4709, 0x1000}, {0x0, 0x5da4}, {0x1, 0x9, 0x800}], 0x3) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 395.892799ms ago: executing program 3 (id=169): r0 = getpid() rtprio(0x1, r0, &(0x7f0000000000)={0x4, 0x16}) rtprio(0x1, r0, &(0x7f00000000c0)={0x4, 0x2}) r1 = open$dir(&(0x7f0000000040)='./file1\x00', 0x8000, 0x124) r2 = kqueue() kevent(r2, &(0x7f0000000080)=[{0x3, 0xfffffffffffffffc, 0x1, 0x4, 0x5, 0xfffffffe, [0x4, 0x9, 0x7]}], 0x1, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) 395.32236ms ago: executing program 1 (id=170): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000680), 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getresgid(0x0, &(0x7f0000005000), &(0x7f0000005040)) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f00000002c0)={0x1f, 0x13, 0x1, &(0x7f0000000340)="14", 0x1, &(0x7f00000003c0)="fb", 0x3, 0x4d46bf70, [0x0, 0x4, 0x1003]}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) openat$crypto(0xffffff9c, &(0x7f0000000100), 0x10000, 0x0) r1 = socket(0x2, 0x4, 0x0) procctl$PROC_REAP_ACQUIRE(0x0, 0xffffffffffffffff, 0x2, 0x2) freebsd11_mknod(&(0x7f0000000340)='./file0\x00', 0x1000, 0x3) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) setuid(0xffffffffffffffff) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x53, &(0x7f0000000500)={0x0, {{0x1c, 0x1c, 0x2, 0x20000, @rand_addr="000030da0a0891ca000000000100", 0xfffffffd}}, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="3f12c0d81c479be15ccb830030bc5ee7"}}}, 0xfc) getsockopt$inet6_int(r3, 0x29, 0x9, 0x0, &(0x7f0000000080)) renameat(r2, &(0x7f0000000240)='./file0\x00', r2, &(0x7f0000000280)='./file0\x00') openat$crypto(0xffffff9c, &(0x7f00000001c0), 0x800, 0x0) lchmod(&(0x7f0000000040)='./file0\x00', 0x19e98548cfb12f68) sigaction(0xc, &(0x7f0000000200)={&(0x7f00000002c0)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de351365e5e9989999908", 0x4, {[0xfffff801, 0x50e5, 0xfdffffff]}}, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) lgetfh(0x0, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) r5 = socket(0x1b, 0x3, 0x0) setsockopt$sock_int(r5, 0xffff, 0x1017, &(0x7f0000000000)=0x3, 0x4) setsockopt$inet_mreq(r4, 0x0, 0xd, &(0x7f0000000000)={@rand_addr=0xfffff395, @loopback}, 0x8) syz_emit_ethernet(0x7e, &(0x7f0000000140)=ANY=[@ANYBLOB="95e6d63e481d0000000000000800450016700000000000019078e0000002e00000020b01907800007e00451c000200000000008800007f000001ac14eabb891bfeac1400bb00000000ac1400aae0000001ac1400bb00000000831300ac1400bb00000000ac1400aa00000000890f0000000040ac1400bbac1400aa000000"]) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) socket$inet_icmp_raw(0x2, 0x3, 0x1) 243.227514ms ago: executing program 1 (id=171): sysarch$I386_GET_XFPUSTATE(0xb, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x615, 0x88) execve(0x0, &(0x7f00000004c0), &(0x7f0000000380)=[0xfffffffffffffffe]) r1 = open(&(0x7f0000000580)='./file0\x00', 0x80200, 0x62) flock(r0, 0x2) r2 = open(&(0x7f0000000200)='./file0\x00', 0x800, 0x39) r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r4 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) openat$kbd(0xffffff9c, &(0x7f00000001c0), 0x400, 0x0) fcntl$setown(r4, 0x6, 0x0) inotify_add_watch_at(r3, r2, &(0x7f0000000280)='.\x00', 0x21000630) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) openat$ptmx(0xffffff9c, &(0x7f0000000240), 0x2, 0x0) ioctl$DIOCBEGINADDRS(r1, 0xc0184460, &(0x7f0000000400)="e88b00000000000000000000000000000087b30654dbd057f0ab80a6c7d9276d52905848a3f1f886ea4faac731f66b32b8e272ba5e9c7943b6ef7a606e8db831d6f1") r5 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) r6 = accept4$unix(r0, &(0x7f0000000480)=@file={0xfd, 0x0, ""/251}, &(0x7f00000003c0)=0xfd, 0x0) bind$unix(r6, &(0x7f0000000080)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8) r7 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xb, &(0x7f00000001c0)={0x0, 0x6, 0x4120, 0x6, 0x8, 0xfffff9f8, 0x5, 0xf}, &(0x7f0000000200)=0x6d) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x7, &(0x7f0000000280)={@in6={{0x1c, 0x1c, 0x1, 0x7, @local={0xfe, 0x80, '\x00', 0x0}, 0xf27}}}, &(0x7f0000000340)=0x84) ksem_post(0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r8 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r8, 0x29, 0x2f, &(0x7f0000000000), 0x4) sendto$inet6(r2, 0x0, 0x0, 0xadecf088ceb4fa7a, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x81, @mcast1, 0x6}, 0x1c) socket(0x1c, 0x1, 0x0) mkdir(0x0, 0x3d) r9 = socket(0x1c, 0x1, 0x0) bind$inet6(r9, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0xbc0, @loopback, 0x7}, 0x1c) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) 133.338039ms ago: executing program 3 (id=172): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = socket(0x1c, 0x1, 0x0) (async) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BIOCSETF(r1, 0x80084267, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x15}]}) setresuid(0x0, 0x0, 0xffffffffffffffff) (async) mkdir(&(0x7f00000006c0)='./file0\x00', 0x110) (async) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x6000) (async) extattr_delete_link(&(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000040)='+\x00') ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 131.946736ms ago: executing program 3 (id=173): syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) r0 = socket(0x1c, 0x1, 0x0) (async) kmq_open(0x0, 0x2, 0x10, &(0x7f00000002c0)={0x11, 0x8fa4, 0x43dd, 0x5}) (async) msync(&(0x7f000047e000/0x4000)=nil, 0x4000, 0x0) (async) linkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x4000) (async) ktimer_settime(0x0, 0x0, 0x0, 0x0) (async) mlock(&(0x7f000079d000/0x2000)=nil, 0x2000) (async) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) (async) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) truncate(0x0, 0x3ff) (async) read(r1, &(0x7f0000000180)=""/67, 0x43) (async) select(0xfbff, 0x0, 0x0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x3000000}, &(0x7f0000001080)) (async) ioctl$KDGETMODE(r0, 0x40046676, 0x22a00000) (async) r2 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xb}, 0x24) (async) socket(0x1c, 0x1, 0x0) (async) rtprio_thread(0x1, 0xffffffffffffffff, &(0x7f0000000040)={0x1, 0x16}) r3 = socket(0x1c, 0x10000002, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x31, &(0x7f0000000140)=ANY=[@ANYRES16], 0x1010) (async) setsockopt$inet6_buf(r3, 0x29, 0x19, 0x0, 0x0) setlogin(&(0x7f0000000540)="0e1f2754e6c11a6d68b6f47e8a331b6fa50d4a5de2c49bd20e9340048a032a8103003c56aa7807c2f70c200bd9f242feb481f692e6d5caf6451fe4d26471e6993f703447012daf6f5ae278116649272d2b5062e2cfa3224c2758a041caac05ea002914284e47427fb3ccbb9af182ccbbc9b502a9a39db61bb9d42284b0fbe42b07cb7037b9887357b389e8bde032fda090739ff2c5cbce3a0442aa5ae5d652fdf0a6d35f9c5aa5beebcfbb57250c580f190a9354ba57dcfbaea772") (async) openat$md(0xffffff9c, &(0x7f0000000000), 0x8000, 0x0) (async) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) (async) setitimer(0x2, &(0x7f0000000140)={{0x0, 0x3ff}, {0x0, 0x3}}, 0x0) (async) symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') __specialfd$inotify(0x2, &(0x7f0000000180)={0x100004}, 0xffffffffffffffb1) (async) getitimer(0x2, &(0x7f0000000080)) (async) open(&(0x7f0000000240)='./file0\x00', 0x800, 0x2a) 63.15139ms ago: executing program 3 (id=174): sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x5, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="fee3a38e5cac1c51deba3c6b07a430a0"}, 0x1c) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) getsockopt$inet6_tcp_buf(0xffffffffffffff9c, 0x6, 0x25, &(0x7f0000000100)=""/42, &(0x7f0000000140)=0x2a) kevent(0xffffffffffffffff, &(0x7f00000003c0)=[{0x0, 0xfffffffffffffffb, 0x2, 0x10, 0x1, 0x8000000000000001, [0x0, 0x2, 0x822, 0x1]}], 0x1, 0x0, 0x0, 0x0) sysarch$I386_GET_LDT(0x0, &(0x7f0000000200)={0x0, &(0x7f0000000180)=[{0xe}, {0xa}, {0xe6}, {0xf9f0}, {0x8}, {0x7fffffffffffffff}, {0x7}, {0x25e}, {0x6}, {0x1}], 0xa}) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket(0x1, 0x2, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) ioctl$DIOCBEGINADDRS(r2, 0xc0184460, &(0x7f0000000440)) shutdown(r1, 0x2) sendto$inet6(r1, &(0x7f0000000340)="85cfe09d", 0x4, 0x20000, 0x0, 0x0) r3 = fork() getpgid(r3) aio_readv(&(0x7f0000000580)={r0, 0xfffffffffffffffe, 0x0, 0x0, [0x0, 0xfffffff7], 0x7fff, 0x0, 0xa, {0xffffffff, 0x8, 0x0}, {0x4, 0x1f, @sigval_ptr=0x3, @tid=r3}}) mmap(&(0x7f0000fee000/0x12000)=nil, 0x12000, 0x2, 0x1010, r0, 0x5) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x11, 0xc0000000, 0x0, 0x0, [0x0, 0x1, 0x1]}, {0x0, 0xfffffffffffffff9, 0x91, 0x2, 0x0, 0x0, [0x0, 0x1000]}, {0x0, 0xfffffffffffffff9, 0x15, 0x40000000}], 0x3, 0x0, 0x0, 0x0) 62.698242ms ago: executing program 4 (id=34): syz_emit_ethernet(0x9c, &(0x7f0000000800)=ANY=[@ANYBLOB="9f4c4662c957ffffffffffff08004500008e006800000102907800000007e00000024e234e2300089078f8a28b780e6f0cd035b9ac18445882568afff600002e977f0aaaaea63841046799c59b8e131cdcd476bdc247e12f65ce84b51105ca63eae7b758435cb781f70ac2e5885be30186035b0d17c3fb03375abf0496e38ae7b9aa1807d4b5739f4e40fd5f15456b258d044212d25aad1c637ad856"]) open$dir(&(0x7f00000008c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x3) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) select(0x40, &(0x7f0000000000)={0xffffffff9c3c4a58, 0xc, 0x4, 0x7, 0x3, 0x6, 0x4, 0x9}, &(0x7f0000000040)={0x7, 0x10, 0x8001, 0xff, 0x9, 0x7, 0x8000000000000000, 0x10}, &(0x7f00000000c0)={0x3, 0xffff, 0x7, 0x7fffffff, 0x4, 0x9, 0x2b1, 0xfffffffffffffff7}, &(0x7f0000000100)={0x9, 0x95}) aio_waitcomplete(0x0, &(0x7f0000000540)={0x0, 0xfff}) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x800, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f0000000580)={0x1, 0xfb, 0x7, 0x0, 0xffe, 0x8, 0x5, 0x26, 0x0, 0x1, 0x0, [0x0, 0x2, 0x3, 0x400, 0x9, 0x4, 0x3ff, 0xd1f, 0x2, 0x1, 0x4, 0x0, 0x7fff, 0x9001, 0x0, 0xfffffffc, 0x0, 0x4, 0x0, 0xfffff000, 0x0, 0x9, 0x6, 0x1, 0x0, 0x0, 0x448d, 0xe122, 0xfffffff6, 0x9, 0x9, 0xffe00001, 0x7fff, 0x400009, 0x9, 0x8, 0xfffffffd, 0x3, 0x209, 0x8400, 0x4, 0x2, 0x80a7, 0xc381, 0x7, 0x1000, 0x7, 0x400, 0x28000, 0x7, 0x0, 0xffc, 0x80, 0x4, 0x1, 0x5, 0x0, 0x100, 0x11, 0x3, 0x0, 0x7, 0x80100004, 0x9, 0x4, 0x8, 0xfffffffe, 0x4a05bb07, 0x4, 0x7, 0xfff, 0x0, 0x0, 0x4, 0x80000, 0xfc, 0x0, 0x349, 0x0, 0x3, 0x4, 0x6, 0x0, 0x5, 0x5, 0x800, 0x800003, 0x0, 0xfffffffb, 0x10, 0x5, 0x0, 0x4, 0x4fabb25c]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r1, &(0x7f0000000240)=@file={0xa, 0x1, './file0\x00'}, 0xa) socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x3ee, @rand_addr="0000fa0b0e000000000000004000"}, 0x1c) freebsd11_mknod(&(0x7f0000000a00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000, 0x1) socket(0x1, 0x5, 0xc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000040)='hfsp\x00', 0x0, 0x8400004, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180)={0x100004}, 0x4) kqueue() r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) socket$inet6(0x1c, 0x20000000, 0x3) getsockname$unix(r2, &(0x7f00000004c0)=@file={0xf0, 0x0, ""/238}, &(0x7f00000000c0)=0xf0) aio_write(&(0x7f0000000240)={r2, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) r4 = socket$inet(0x2, 0x1, 0x0) listen(r4, 0x14040000) 0s ago: executing program 3 (id=175): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = __specialfd$eventfd(0x1, &(0x7f0000000040)={0x0, 0x4}, 0x8) ioctl$BIOCSETZBUF(r1, 0x800c4281, &(0x7f00000001c0)={0x0, 0x0}) ioctl$KDGKBSTATE(r1, 0x40044b13, 0xc) getpriority(0x1, 0x0) socket(0x1c, 0x2, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000380)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6000000000ee4cf5d67775d99293b8a102a8000000000000005b359fbe00"/54]) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_udp(0x1c, 0x2, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) aio_waitcomplete(0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) aio_error(&(0x7f0000001240)={0xffffffffffffffff, 0x8, 0x0, 0x0, [0x10001, 0xfff], 0x401, 0x4, 0x80000, {0x8, 0x401, 0x0}, {0x0, 0x1a, @sival_int=0x800, @thr={0x0, 0x0}}}) setgid(0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.72' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 ZFS filesystem version: 5 ZFS storage pool version: features support (5000) Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 lock order reversal: 1st 0xffffffff830019c0 proctree (proctree, sx) @ /syzkaller/managers/i386/kernel/sys/kern/kern_ktrace.c:1151 2nd 0xfffffe007a931c78 ufs (ufs, lockmgr) @ /syzkaller/managers/i386/kernel/sys/kern/vfs_vnops.c:581 lock order proctree -> ufs attempted at: #0 0xffffffff816a3722 at witness_checkorder+0x1652 #1 0xffffffff8150a7e6 at lockmgr_lock_flags+0x1d6 #2 0xffffffff81de99fb at ffs_lock+0x18b #3 0xffffffff8235ade7 at VOP_LOCK1_APV+0x57 #4 0xffffffff8181463e at _vn_lock+0x14e #5 0xffffffff81814ee8 at vn_close1+0x1e8 #6 0xffffffff814fc0fa at ktrops+0x41a #7 0xffffffff814fb86d at sys_ktrace+0xaed #8 0xffffffff823204f2 at ia32_syscall+0x4d2 #9 0xffffffff82135eff at int0x80_syscall_common+0x9c if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 Expensive callout(9) function: 0xffffffff81afc400(0) 0.005800305 s if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 Jan 20 03:51:13 ci-freebsd-i386-0 kernel: arp: from aa:aa:aa:aa:aa:bb: addr len: new 0, i/f 6 (ignored) if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 ifconfig: interface tap4 does not exist SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=4 req=34 state=3 status=67 (errno 9: Bad file descriptor) if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 FreeBSD/amd64 (ci-freebsd-i386-0.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Jan 20 03:51:38 ci-freebsd-i386-0 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl