last executing test programs: 6.307937173s ago: executing program 1 (id=31): socket$inet6_sctp(0x1c, 0x1, 0x84) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000380)={@broadcast, @random="34ed432a7a6e", [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x30, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0x81, '\x00', {0x9, 0x6, "45e128", 0x8, 0x5a, 0x0, @rand_addr="f0a8550f04fed9b43740b3dba37e1fe2", @mcast2}}}}}}}) r1 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) mkdir(&(0x7f0000000040)='./file2\x00', 0xc1) mkdir(&(0x7f0000000300)='./file2/file0\x00', 0xc2) rename(&(0x7f00000000c0)='./file2\x00', &(0x7f0000000100)='./file2/file0\x00') freebsd11_mknod(&(0x7f0000000000)='./file2/file0\x00', 0x100, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_get_link(&(0x7f0000000100)='./file0\x00', 0x1, &(0x7f00000006c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"^Z\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f{\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7*/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\xebSj\xfa\x96X\x8d\x00\xde', 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) readv(r2, &(0x7f0000002a80)=[{0x0}], 0x1) listen(r2, 0xeb) r3 = socket(0x26, 0x2, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000180)={0x11, 0x1, 0xffffffffffffffff}) recvmsg(0xffffffffffffffff, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x40082) socketpair$unix(0x1, 0x4, 0x0, 0x0) procctl$PROC_TRACE_CTL(0x2, 0x0, 0x7, &(0x7f0000000140)=0x2) setresuid(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ksem_wait(0x0) ksem_wait(0x0) socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0xffff, 0x1013, &(0x7f00000000c0)=0x1000006, 0x18) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0x4, &(0x7f0000000040)=0x8, 0x4) sendto$inet6(r4, 0x0, 0x0, 0x20086, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x9, @empty, 0x7}, 0x1c) fork() 5.59673496s ago: executing program 1 (id=35): rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') r0 = socket$bt_rfcomm(0x24, 0x1, 0x88) copy_file_range(r0, &(0x7f0000000080), 0xffffffffffffff9c, &(0x7f00000000c0)=0x8, 0x7fffffff, 0x0) r1 = socket$bt_rfcomm(0x24, 0x1, 0x88) ftruncate(r1, 0xffff) r2 = socket$unix(0x1, 0x5, 0x0) getsockname$unix(r2, &(0x7f0000000100)=@abs={0x8}, &(0x7f0000000140)=0x8) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0x101, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x1, 0x0, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0x40}}, 0x0, 0x0, 0x10001, 0x5, 0x8001, 0xa54}, &(0x7f0000000240)=0x98) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x13, &(0x7f0000000280)={r4, 0x4, 0xc7, "d993400a282ed0ae1ebaef67d6cf58ba2479281e4ca74516d23c4ae70992e9975993b19f607533abf1e5a29e953a2eadcd66e6b7b144725a587aa88668a7897c2e3a427e2ddbd26461678915495767ade98907f0ad32b355e8ead4ac8380a9411bc5aeea03bfe727368711394101c23019fb52c590b32d9021690ce16838767b06bf02f70a9e0fcdc2229a98ede16f49646a4a9a3e877e53b1e750517112a5ae31e6a59a6d12707aa28e1fa62780abf9295f44650014a42676c4a948fc742ef6748ebf6d081e83"}, 0xcf) r5 = fcntl$dupfd(r1, 0x11, r0) ioctl$KBADDKBD(r5, 0x80244b44, &(0x7f0000000380)={0x4, "4c64a99bfef4a65630ab83a665c2c945", 0x5, 0x9, 0x7, 0x2157}) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) rmdir(&(0x7f00000003c0)='./file0\x00') getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x11, &(0x7f0000000400), &(0x7f0000000440)=0x4) getsockopt$inet6_sctp_SCTP_RTOINFO(r3, 0x84, 0x1, &(0x7f0000000480)={r4, 0x0, 0x6, 0x4f9}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r6, 0x84, 0x107, &(0x7f0000000500)={r7, 0x2cc, 0xf, 0x0, 0x7fffffffffffffff}, &(0x7f0000000540)=0x18) r9 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r10 = socket(0x1c, 0x20000000, 0xd6) ioctl$DIOCGETALTQSV1(r5, 0xc130442f, &(0x7f0000000580)="270c7952cf2bb16b205bc0c55436896d2fc1aaa723643143df4a155841c8c05d2e9e7dd8bf270453ccfce24a0cd1cb1d5c7cdb43e5e1ad3b684048e9bded963bc0853a37d59464cfa415") getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xb, &(0x7f0000000600)={0xd, 0xa78f, 0x7400, 0x6, 0x7f, 0x6, 0xd398, 0x3ff, r8}, &(0x7f0000000640)=0x20) recvmsg(r9, &(0x7f00000009c0)={&(0x7f0000000680)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @ipv4={""/10, ""/2, @broadcast}}, 0x1c, &(0x7f0000000900)=[{&(0x7f00000006c0)=""/101, 0x65}, {&(0x7f0000000740)=""/126, 0x7e}, {&(0x7f00000007c0)=""/18, 0x12}, {&(0x7f0000000800)=""/188, 0xbc}, {&(0x7f00000008c0)=""/12, 0xc}], 0x5, &(0x7f0000000980)=""/25, 0x19}, 0x40040) extattr_get_link(&(0x7f0000000a00)='./file0\x00', 0x0, &(0x7f0000000a40)='\x00', &(0x7f0000000a80)=""/143, 0x8f) r11 = open$dir(&(0x7f0000000b40)='./file0\x00', 0x200, 0x114) getsockopt$inet6_sctp_SCTP_EVENTS(r10, 0x84, 0xc, &(0x7f0000000b80), &(0x7f0000000bc0)=0xb) ioctl$DIOCGETRULESET(r5, 0xc444443b, &(0x7f0000000c00)="12fd6a402b9c6de0ae48bff485d6ee568be40a8093e3055e5e3f0c5de13473cb1b6ed80a27f977a3f8fcb53d94975cd942241311a7bc906fb6da5fc64888380a41768a4075dbbffc8d712bc8aa85628e9cb401cb6719d3761d193fef39520f1f7c45b9e910978aa2f9b0e143e825446174c8c6425412abb2e21de99e8bc13bb14754cd03331834476061c4322644f67375166c6b96633085599f40af2e72b841e88523346071ff2b9cfc9e36713e493f73b66eb9e5fa22258a97ddea09720bd52e86551c4cacf00edcd713af8b3a6d56093bbef11abf6b861eb357bd38ea47f31c1383bedb164a9f0bd7f294f3377fe96a") ioctl$SMB_BWRITE(r5, 0x8030690a, &(0x7f0000000d80)={0xa, 0x6, 0x1c0, @word=0x5f, @buf='g^', 0x9, &(0x7f0000000d00)=0xf8, 0x1, &(0x7f0000000d40)=0x6, 0x1}) getdirentries(r11, &(0x7f0000000dc0)=""/225, 0xe1, &(0x7f0000000ec0)) r12 = fcntl$dupfd(r9, 0x0, r2) getsockopt$inet_sctp_SCTP_RTOINFO(r12, 0x84, 0x1, &(0x7f0000000f00)={r4, 0x4a, 0x4, 0x9}, &(0x7f0000000f40)=0x10) 5.596290263s ago: executing program 3 (id=36): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) (async) mlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) (async) fork() (async) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) preadv(0xffffffffffffffff, &(0x7f0000001780)=[{0x0}], 0x1, 0x0) (async) close(0xffffffffffffffff) (async) mmap(&(0x7f0000351000/0x1000)=nil, 0x1000, 0x0, 0x2010, 0xffffffffffffffff, 0x0) (async) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x20000410) 5.51964702s ago: executing program 3 (id=37): r0 = socket$inet6(0x1c, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) select(0x40, &(0x7f0000000040)={0x4, 0xb, 0x6, 0x8468, 0xffffffff, 0x2528, 0x7, 0x8}, &(0x7f00000000c0)={0x2, 0x40, 0x8000000000000000, 0x3, 0x816, 0xe78, 0x769, 0x9}, &(0x7f0000000140)={0x0, 0x80000001, 0xd, 0x9, 0x7, 0x3, 0xfffffffffffffff9, 0x9}, &(0x7f00000001c0)={0xbf, 0x7}) setsockopt$sock_int(r1, 0xffff, 0x200, &(0x7f0000000100)=0x6, 0x12) setsockopt$inet6_int(r0, 0x29, 0x1a, &(0x7f0000000080), 0x4) socket$inet6(0x1c, 0x3, 0x0) syz_emit_ethernet(0x7b, &(0x7f0000000000)=ANY=[@ANYBLOB="c3b58b132350aaaaaaaaaabb86dd6004000000452e00fe8000000000000000000000000000aaff02"]) 5.518232908s ago: executing program 3 (id=38): profil(0x0, 0x0, 0x0, 0x1) socket$inet_sctp(0x2, 0x1, 0x84) openat$bpf(0xffffff9c, &(0x7f0000000280), 0x1, 0x0) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8008, 0x8, 0xe8c8, 0x4000000, [0x0, 0x2, 0x89b5]}], 0x1, 0x0, 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r1 = open$dir(&(0x7f0000000fc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) symlinkat(&(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r2, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r3 = open$dir(&(0x7f00000000c0)='./file1\x00', 0x40, 0x15) mkdirat(r3, &(0x7f0000000a80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r4 = open$dir(&(0x7f00000002c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x100000, 0x190) symlinkat(&(0x7f00000010c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') symlinkat(&(0x7f0000000dc0)='./file0\x00', r4, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000500)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r5 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x0, @multicast2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000240)}, {&(0x7f0000000080)="1e81b63eec2966024fc54a32d49f3e74105eaeb31f76", 0x16}], 0x2, 0x0, 0x0, 0x149}, 0x108) writev(r5, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x2000000, 0x104) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0xb1c, 0x0) setitimer(0x0, 0x0, 0x0) r6 = socket(0x26, 0x2, 0x0) setsockopt$sock_int(r6, 0xffff, 0x1002, &(0x7f0000000000)=0x101, 0x4) 5.4266783s ago: executing program 2 (id=39): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r2, 0x0, 0x9, &(0x7f00000000c0)={@local={0xac, 0x14, 0x0}}, 0x52) sendto$inet(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x0, @multicast2}, 0x10) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0x68, &(0x7f0000000080)={{0x1c, 0x1c, 0x2, 0x0, @loopback}, {0x1c, 0x1c, 0x2, 0x0, @rand_addr="0000deffffffffffffff00"}}, 0x5c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0xfffffffe, @rand_addr="4000609b00", 0x100}, 0x1c) procctl$PROC_SPROTECT(0x2, 0x0, 0x1, &(0x7f00000000c0)=0x21) setsockopt$inet6_int(r0, 0x29, 0x1b, 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000580)=@in6={0x1c, 0x1c, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\b\x00\x00\b\x00'}, 0x1c) setitimer(0x2, &(0x7f0000000000)={{0x3}}, 0x0) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{0xffffffffffffffff, 0xb0}], 0x1, &(0x7f00000000c0)={0x200000077359400}, &(0x7f0000000100)={[0xfffffffffffffffd]}, 0x10) symlink(&(0x7f0000000580)='.\x02/file1\x00', &(0x7f00000002c0)='.\x02\x00') setsockopt$inet6_int(r0, 0x29, 0x24, &(0x7f0000000300)=0x3, 0x4) semget$private(0x0, 0x3, 0x308) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000300)}, {&(0x7f0000000100)="2d6423617603beca7fe150dceeb4b7b850d489b5eb94c1a26ff1adacdb47295698b10167a3c88c3f82e5d95ee15854a88d65f18f590e9513b0bf7657550851ac00482c598c55157212c8e620bb", 0x4d}], 0x2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r4, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) socket(0x17, 0x20000000, 0xf) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x0, 0x2, &(0x7f0000000040)='./file0\x00', 0x10004, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffebe, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x36ef, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x537, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x653, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff]}) open(&(0x7f0000000440)='.\x02/file1\x00', 0x70e, 0x0) msync(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd685ee511001c49ff00000000000000000000ffffe0000002000000000000000000000000000000008200907800070005ff02000000000030fccf056bd972c69b"]) 5.320468311s ago: executing program 3 (id=41): r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sigaction(0x9, &(0x7f0000000240)={0x0, 0x6, {[0x2, 0x4f, 0xfc5, 0x80]}}, &(0x7f0000000300)={0x0}) getsockopt$inet6_buf(r0, 0x29, 0x2e, 0x0, &(0x7f0000000480)) r1 = socket(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000040)={0xc, 0x2, 0x2}, 0x10) connect$inet(r1, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00', 0x7}, 0x24) sendmsg$unix(r1, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000180)="839dbc7bb26a7fe10dbff9e6d8923676b5c02a8c37fd0276d19ebf963555c33dd91f2324e73d3ac64ab3208b50ab19b4d24622a2ecbda973aa9c994bb029c1dd25b15dc952601fb8d5cdae7d", 0x4c}, {&(0x7f0000000200)="92eac22d3f1dd1159f3b76e257936fed25273a78e4075b7357812b822eeaa0c44e512218a9774654ea9bffbd7fb450d7ee452258553c2c01d20450e6bceb6ef12053b3f68556ce781a05439d01db70f7d0fd7c6715eead8fb0d359cd03ca425e578faca762d715", 0x67}, {&(0x7f0000000380)="7be34bb09c62fa9dd448edd4981dd1a0b1298356a9409285e8f7c89044b115735a2e64240768d4634329d0472d8293015e110aedd10196686111fb890dafc65b5656013a0964afa2", 0x48}, {&(0x7f00000006c0)="37300adbf1b0817756037c25fea08ec1094c34e69c0293e9acb98f3b739e224681ce781cd56e194087f9a9673ee5402ad43926d27caaee01a9b77c00eef161b32dd0f6f31756ac16e73db27528cee6a8e6903c949237c01a1239e29f8af6c67aac10ff5b764fc654c5cf472410244b5e21b5017709a2c75d829032f2b235257d08167b863453f41c6dc88d4d44efc70200c2264496eea660ab2846bbffe3b573127f95a0ab7b6c6e90fe0054b72e257eec61d8b96def39271f06d6c62f210fa5bedfe8b5c59f4a60205264762ce8ad2db6d6f8649336f1057f3db98a0000000004000000000000000000", 0xea}, {&(0x7f0000000280)="47fdbd5a14193fa91e7eff684085f8ee7ccddf9359f9699f4341156af4", 0x1d}, {&(0x7f0000000540)="9d3db7a926b88f602529b2ffc1281dff30f773f8daf148a1208ec93a79dac20fe436f1bcab77051060f11668e72e1449cc321c9ff76bfceb133fd2488b60942de55bef6383ea6fb7a1989a1c78dce8a8a123d754ee4c06066c1a4f728e1e2fe03a75d52416a5fdbfd0e8e8dd8e10341e8e3e0a64d680b1478ea6dd641678eab6845fd76fff7fad06ad91be740d80257cf09b25e0c21653c7a447127ea679371aed6dfdc4959a8b49c9ab29d9698dea4618d19e1e2b556913058dd0a3a6e775065bc70eb051011a4c787dbb405b3fc97d1c1a19bc0f623d94388cb39786cf8225da2f88da484b4f2160e39e906c5ec84bebc017c29eb21b1b1a154efde4a79a", 0xff}], 0x6, 0x0, 0x0, 0x180}, 0x0) setsockopt$sock_splice(r1, 0xffff, 0x1023, &(0x7f0000000000)={r1, 0x4021, {0x4, 0x7}}, 0x20) open(&(0x7f0000000000)='./file0\x00', 0x20000, 0x24) getsockopt$inet6_int(r0, 0x29, 0x2f, &(0x7f0000000040), &(0x7f00000000c0)=0x4) rfork(0x14014) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f0000000080)={0x10, 0x14, 0x1, &(0x7f0000000740)='$', 0x1, &(0x7f00000000c0)='\"', 0x1000, 0x7d86619b, [0x0, 0x9, 0xc]}) ioctl$CIOCCRYPT(r2, 0xc0306367, &(0x7f0000000140)={0x0, 0x2, 0x2, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0}) chroot(&(0x7f00000000c0)='.\x00') mkdir(&(0x7f0000000340)='./file\x00', 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file/file0/../\x00', 0x0) chdir(&(0x7f0000000400)='./file/file0/..//file0\x00') __getcwd(&(0x7f00000000c0)=""/148, 0x94) shmget$private(0x0, 0x1000, 0x5a0, &(0x7f0000fff000/0x1000)=nil) rfork(0x93050) mkdir(&(0x7f0000000300)='./file0\x00', 0x43) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) syz_emit_ethernet(0x9f, &(0x7f0000000000)={@random="9f4c4662c957", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x91, 0x68, 0x0, 0x1, 0x2, 0x0, @rand_addr=0x7, @multicast2}, @icmp=@generic={0x11, 0x8, 0x0, "000000000000000074fa58a68f3d7baf050ef7e2d238f1de42fef7f48516b1f9881e1a7e2211e7171e4222e6f1eaa0fd922e82a8d86f4b9ca8f7e99e84caddf82b5f3906e421bb197d802502458dda454892df2ceae4e11ca93a05e8ed9cb5fcb2bf7c8b4e827e3b7d89e25333a59a32259723bd410f5b01ec"}}}}}) chdir(&(0x7f00000002c0)='./file0\x00') mkdir(&(0x7f0000000440)='./file/file0/..//file0\x00', 0x0) sysarch$I386_GET_IOPERM(0x3, &(0x7f0000002100)) rfork(0x84000) 4.99581385s ago: executing program 3 (id=43): open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x7369a0733676a8) link(&(0x7f0000000940)='./file0\x00', &(0x7f0000000d40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x110) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000080), 0x4) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x7fffff, @empty, 0xb}, 0x1c) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f00000000c0)={r2, 0x80000001, &(0x7f00000001c0)="e2d6", 0x2, [0x2, 0x1ff], 0x0, 0x20, 0x0, {0x0, 0x7, 0x0}, {0x3, 0xfffffffe, @sigval_int=0x4003e, @ke_flags=0x9fc040a3bd859cca}}) r3 = socket$inet6(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x2e, &(0x7f0000000100)={@empty}, 0x14) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x2e, &(0x7f0000000000)={@loopback}, 0x14) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0x0) fchflags(r1, 0x40008) sync() 4.898203834s ago: executing program 3 (id=44): open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c2, 0x31) (async) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c2, 0x31) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f00000004c0), 0x10000, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000080)={0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdefffff, [0x0, 0x0, 0x0, 0xb1]}) (async) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000080)={0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdefffff, [0x0, 0x0, 0x0, 0xb1]}) ioctl$CIOCCRYPT(r1, 0xc0306367, &(0x7f0000000040)={0x0, 0x0, 0x70, 0x30038, &(0x7f0000000180), 0x0, 0x0, 0x0}) pwritev(r0, &(0x7f0000000080), 0x0, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_buf(r2, 0x29, 0x3f, 0x0, &(0x7f0000000100)) (async) getsockopt$inet6_buf(r2, 0x29, 0x3f, 0x0, &(0x7f0000000100)) munlock(&(0x7f0000002000/0x1000)=nil, 0xffffffffdfffdfff) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x80, 0x4887) msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) (async) msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) setrlimit(0x1, 0x0) syz_emit_ethernet(0xffffffffffffff0f, 0x0) (async) syz_emit_ethernet(0xffffffffffffff0f, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x40000400000002c2, 0x10577db39771b91c) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) extattr_set_link(&(0x7f0000000000)='./file0\x00', 0x1, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0/file0\x00') extattr_set_link(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)='zfs\x00', &(0x7f0000000480)='./file0\x00', 0x40, &(0x7f0000000540)="1a38ed2946b680be3709ec6a62afa65b620fd12ce70f173ef79a665ad6fff31b4ab04858b59f7b6d49f53f48646ff43c106a0e1aee9ccec6b0a92b187627f6864b16e4210985b73459c3db3297b8170d1b37a9986010bcc9c5712cb620232536f8ab0958264e7f52ae0b5c4391efb7707ab464f2d7466ceaaa42ab093e62cad9dab8c93e835e8a7770bf5ea38927146e40c7f094ed5c37967ccecf0147c63f0f3a287ffa3d1a0f5c91bddd") extattr_list_link(&(0x7f0000000500)='./file0\x00', 0x3, &(0x7f00000002c0)=""/81, 0x51) truncate(0x0, 0x8001) socket(0x11, 0x3, 0x1c) (async) socket(0x11, 0x3, 0x1c) execve(0x0, &(0x7f0000000340)=[0x0], 0x0) 4.658237086s ago: executing program 1 (id=46): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r0, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int, @ke_flags=0xc088}}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x10001, &(0x7f00000009c0)={0x0, 0x0, &(0x7f0000000940), 0x40000}, 0x0, 0x8) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x18) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) syz_emit_ethernet(0x66, &(0x7f00000000c0)={@random="9f4c4662c957", @random="00e0ffff8252", [], {@ipv6={0x86dd, {0x2, 0x6, "c9f80c", 0x30, 0x6, 0x1, @empty, @ipv4={'\x00', '\xff\xff', @multicast1}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x8, {0xf, 0x6, "74f82e", 0x5, 0x3b, 0xff, @local={0xfe, 0x80, '\x00', 0x0}, @loopback}}}}}}}) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x40000400000002c2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x400000, 0x73) read(r2, &(0x7f00000000c0)=""/5, 0x10c) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x4a, &(0x7f0000003600)="aa28c4cacb4e87b348498e492916ef0eec4449222ea48033d984539af6d41221f8a31eb9e1c2104f1e437a2de541290ca1ddb84f6ae5739948903758c3750d78874d4ab66625f5257f7e38140ac43d8d16e92af5e4ef578517dd591463a4bb548544cfdf243f8113f0c5e05c64eb8898fd240f9549c0054aa00856a9941d55dbf9ea7760f0d0a6f754b851459d568069123ba3aa398107b1", 0x98) openat$md(0xffffffffffffff9c, &(0x7f0000000080), 0x40000, 0x0) mlockall(0x2) r4 = kqueue() kevent(r4, &(0x7f0000000080)=[{0x7, 0xfffffffffffffffa, 0x31, 0x10, 0x1000000009, 0x885, [0x8001, 0x5, 0xfffffffffffffff9, 0x6]}], 0x1, 0x0, 0x0, 0x0) lio_listio(0x0, 0x0, 0x0, &(0x7f0000002c00)={0x1, 0x13, @sival_ptr=0x200000b, @ke_flags}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) 4.34832385s ago: executing program 2 (id=48): setuid(0xffffffffffffffff) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) rtprio(0x1, 0x0, &(0x7f0000000140)={0x2, 0x5}) bind(r1, &(0x7f0000000040)=@un=@file={0xa, 0x0, './file0\x00'}, 0xa) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) open$dir(0x0, 0x200, 0x0) fcntl$lock(0xffffffffffffffff, 0x9, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) flock(0xffffffffffffffff, 0x8) chroot(&(0x7f00000000c0)='.\x00') r2 = open$dir(&(0x7f0000000200)='./file0\x00', 0x80, 0x0) fcntl$lock(r2, 0x16, &(0x7f0000000000)={0x570}) r3 = socket(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) openat$filemon(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, 0x0, 0x2, 0x0) freebsd11_kevent(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000001ac0)=[{}], 0x1, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) pipe2(0x0, 0x100000) r4 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r4, &(0x7f0000001140)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) connect$inet6(r4, &(0x7f0000000000)={0x1c, 0x1c, 0x2, 0x4, @mcast1}, 0x1c) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r5 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x1) read(r5, &(0x7f0000000040)=""/11, 0xb) rfork(0x83e7907e7154d937) 4.268329655s ago: executing program 2 (id=49): ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f0000000080)={0xfffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, [0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc7, 0x0, 0x1, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xae77, 0x20000, 0x0, 0x0, 0x2000, 0x0, 0x20002, 0x0, 0x1, 0x0, 0xc, 0xfffffffe, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x4, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd6c4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x80000000, 0x80, 0x0, 0xfffffff0, 0x2000, 0x0, 0x100000, 0x0, 0x6, 0x0, 0x0, 0x8, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe74, 0x400, 0x100, 0x10001, 0x0, 0x0, 0x0, 0xfffffffd]}) extattr_list_file(0xfffffffffffffffe, 0x1, &(0x7f0000000240)=""/214, 0xd6) openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) (async) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f0000000080)={0x0, 0x7, 0x0, 0x0, 0x1, &(0x7f00000000c0)='\"', 0x1000, 0x7d86619b, [0x0, 0x9, 0x8001, 0x1400004]}) cpuset_setaffinity(0x3, 0x9, 0x0, 0xcf, &(0x7f00000000c0)) freebsd11_getfsstat(&(0x7f0000000980), 0x1d8, 0x2) semget$private(0x0, 0x0, 0x100) (async) r1 = semget$private(0x0, 0x0, 0x100) __semctl$SETALL(r1, 0x0, 0x9, &(0x7f0000000000)=[0xfbff, 0x0]) 4.236546899s ago: executing program 2 (id=50): r0 = kqueue() r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x7, 0xffffffffffffff00, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) socket$inet6_icmp(0x1c, 0x2, 0x3a) socket$inet6_udplite(0x1c, 0x2, 0x88) getsockname(0xffffffffffffffff, &(0x7f0000000280)=@un=@abs={0x8}, &(0x7f00000002c0)=0x8) symlink(&(0x7f0000000080)='./file1\x00', &(0x7f00000004c0)='./file1\x00') ioctl$MDIOCDETACH(0xffffffffffffffff, 0xc1c06d01, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) kqueue() open$dir(&(0x7f0000000880)='./file0\x00', 0x8, 0x0) socket(0x1c, 0x1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom(r2, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) unmount(&(0x7f00000000c0)='./file0\x00', 0x180244) kevent(r0, &(0x7f0000000040), 0x7fffffff, 0x0, 0xfffffffb, 0x0) fork() pipe2(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r3, &(0x7f0000000200)=[{&(0x7f0000000100)="19", 0x4000}], 0x1) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80400000200a06, 0x0) getsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f0000000140)={@in={{0x10, 0x2, 0x1, @multicast1}}, 0x0, 0x2, 0x0, 0x97dd8c5d9cbe459a, 0x1, 0x16a, 0x9}, &(0x7f00000000c0)=0x98) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0x101, &(0x7f0000000380)={@in6={{0x1c, 0x1c, 0x1, 0xff, @remote={0xfe, 0x80, '\x00', 0x0}, 0x7fffffff}}, r5, 0x8a1a, 0x5, 0x1080000, 0x8368, 0x7fffffff}, 0x0) r6 = open$dir(&(0x7f0000000100)='./file1\x00', 0x40000400000002c2, 0x0) writev(r6, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x440100, 0x1c9) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x1) 3.760591475s ago: executing program 0 (id=52): __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r0 = accept4$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @empty}, &(0x7f0000000040)=0x1c, 0x0) freebsd11_fstat(r0, &(0x7f0000000080)) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x2) 3.598116372s ago: executing program 1 (id=53): setsockopt$bt_hci_HCI_FILTER(0xffffffffffffffff, 0x802, 0x1, 0xfffffffffffffffe, 0x0) setsockopt$sock_timeval(0xffffffffffffff9c, 0xffff, 0x1006, &(0x7f0000000000)={0x9}, 0x10) r0 = dup(0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f0000000680)={0x0, 0x7, 0x0}, &(0x7f00000006c0)=0xc) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x901, &(0x7f0000000700)={0x0, 0x11, 0x1, [0x3]}, &(0x7f0000000740)=0xa) sendmsg$inet_sctp(r0, &(0x7f0000000800)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3, 0xe1a1, @empty, 0x7fff}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000080)="ac2d97624e94b6327965c2", 0xb}, {&(0x7f00000000c0)="1787af428633a0760c1cee0df994fe05eaa2fef314ce021008370d3f01b30cc2641a86b3443d90dbe0721b21988fd70b0817c06b05cd9f261c5834501b9416ae38ff35b46f7d90619ad98470cfa5ad69dda79f707cdba3b22339a4f8e7c93b7a0ae48c0d4b84c7157958afedd4719cf39bd5fbb2974522056a7d84bcdb72e33203061bf60f311857f82bc5e41b4eba415b965715a24f9f94844d91e21bd0f1f9c456b361de9ed217604db2c328bc73b46ce8cf4def621ccf9a0317300a26dab138df1fe765bc3b0bea218c", 0xcb}, {&(0x7f00000001c0)="b4b9fc700948b7e72566e46e3f3df3e7f82eccd364b050", 0x17}, {&(0x7f0000000200)="591e7bfbe660f164ee83bab951bd7d2a671b5643f166098a9d1881face3aca4f08553e296c8b4d7f197b5569dfa25a4b4b44fc91dcda03ad8ea0fa9b252f61953e51727a0203a86f660b9ae0eacacdf5333f784a141e9ee5f4e4af7df1e8e52e28a32064528b56a80a1498721d95099759d94a133658e89aeaa315d5b7d3951027b66b09597a5c14dc41d32608e8a9185b075179c826f523aacd77", 0x9b}, {&(0x7f00000002c0)="a989513477e9fe9b7809b40927880522e007f1a3d4a61b8243a1b01502da6013e7d27b9c610880406a358d19a1ed8977723cfa29509705f343f0a393a11c6d9141d207fb98cb0210678a477fb44044e073a57e4e141f87bbed9b9eefe14fc47a349cb33aaf3ba126f6b3f76ebc21a6b873f61b4a2e301f5d8127d36f26a9c3153bf14bd5dc56eaff7bfcf88cda52e733f9b36a778c1ab1a7f16c1f", 0x9b}, {&(0x7f0000000380)="45bd06b7cd3bd9e0a2f856b1ebd4f372cc71ea75739322651dd8ca3fe2e6cbd1424cdbcb21508f11e663d97bf1a01247e03f7c9c61a208e309a0576e30ba571fa6be0b15b348e643a7345ed33ce8962aa4b9e49d4834f66dbc663cc12e63f5186398c4898b7629ea08a031fd3a6b387c8a4dc1c5e28584937d144ab009e9bd970696837be17613a34bc8ec20494f857eb503c50a0c209549d2bbba74191927ed71508dec95aa162509a2e7dfc69e4538618f97ab508cb7733ee6426b916375c3725c386cd044332f6d41fd4832f505839e630fb8e9441cca0c9320bb0aaad09bc078d0d343ce", 0xe6}, {&(0x7f0000000480)="9212ee0fa3bd150bdfe5d5f46205e77dc5b0b4db1873400e223ee4d4f7cc72326660eddd29147fcd6a24eb250d79ccc79b2722855084443c370d4493ee8e08c60f3cb9c29ca01d8fbf7743e678948177efed7793729be081aa8e85f1a0cc746e562071e9862336c1000a5759b0d9c31dabe2ec733784bc59054f22eebbaef87064d6a3cdc844dfe3318ef8c804c13e08a68626e2eae92965707bea6903ead71fd4bd55c5a15cdb2c0f2ddd542c8949fc3463d6c35e243c524a14ecc17829eec32fd096b6ed3f2fd61a69e8f4e723df4bfec592ac3d5cf2d40b19e8dfc775b60fb7eff775b9ec7ae65364290f", 0xec}, {&(0x7f0000000580)="b2b1e3ad5d34cf669785358b544b4d9d0a77c8aed5ac97591233b5cbfd9465134b3083b581b1bf2aa74cb2ecd08d2e08f7e450f8338f58b82082c8bd32e917532e1f02feddbe78d8fa0206d725d4", 0x4e}], 0x8, &(0x7f0000000780)=[@authinfo={0x10, 0x84, 0x8, {0x1}}, @sndrcv={0x2c, 0x84, 0x2, {0x4, 0x2, 0x2930, 0xc, 0x9, 0x5, 0x0, 0x2, r1}}, @init={0x14, 0x84, 0x1, {0x7ff, 0x8, 0x4, 0x8001}}, @sndrcv={0x2c, 0x84, 0x2, {0x4, 0xc, 0x400, 0x2, 0x6bc3f505, 0x1000, 0x2, 0x2, r2}}], 0x7c, 0x20000}, 0x1) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000840)={r1, 0x0, 0x0, 0xad09}, 0x10) r3 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_int(r3, 0xffff, 0x1014, &(0x7f0000000880), &(0x7f00000008c0)=0x4) setsockopt$inet_int(r3, 0x0, 0x41, &(0x7f0000000900)=0x7, 0x4) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x11, r0, 0xe205) setsockopt$inet6_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000940)={r1, 0xb6b2}, 0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000980)={0x0, 0x5b46}, &(0x7f00000009c0)=0x8) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000a00)={@in6={{0x1c, 0x1c, 0x0, 0x2, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0xfffffff8}}, r4}, &(0x7f0000000ac0)=0x88) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000b00)={r1, 0xe7, "dc0df5665429b72946a301e327dcd98d978f5ab6ea62d5b374f867fe7d58e6554a99e72b7433538202a48f7e92fffe8edc61477ad64316e2ce4659d718cfb0564a2ba3bec73e8ae8d555936df8205cdad206a3deeae60f1f57bb803afe583c7ac789af2d9a3c0e7c013e4722722a6c456a7974958b212005d07f4951bad5d8594f295ca2d0082b6f231388143298f3056d7bc4bc86b0babe2cd327d7caef3f1124de32c59a48233a1e7982fe3eecb4cb3678d9c569c449d99c72950f3c69dfaacc77c24e0560bbef65599880065daf643cc32db7f87210a69ef5056f335427a230942adb575730"}, &(0x7f0000000c00)=0xef) getpeername$inet(r0, &(0x7f0000000c40)={0x10, 0x2, 0xffffffffffffffff, @rand_addr}, &(0x7f0000000c80)=0x10) openat(r0, &(0x7f0000000cc0)='./file0\x00', 0x100, 0x118) r5 = open(&(0x7f0000000d00)='./file0\x00', 0x80000, 0x0) setsockopt$inet_sctp_SCTP_EVENT(r5, 0x84, 0x1e, &(0x7f0000000d40)={r4, 0x5, 0xff}, 0x8) kqueue() setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, &(0x7f0000000d80)={@remote={0xac, 0x14, 0x0}, @empty, @rand_addr=0x5}, 0xc) open$dir(&(0x7f0000000dc0)='./file0\x00', 0x100, 0x4) procctl$PROC_REAP_STATUS(0x0, 0x0, 0x4, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x0}) ktrace(&(0x7f0000000e00)='./file0\x00', 0x2, 0x2244, r6) socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r5, 0x84, 0x903, &(0x7f0000000ec0)={r2, 0x2, 0x1000}, 0x8) getsockopt$sock_accept_filter(r5, 0xffff, 0x1000, &(0x7f0000000f00), &(0x7f0000001000)=0x100) openat$bpf(0xffffffffffffff9c, &(0x7f0000001040), 0x0, 0x0) r7 = openat$evdev(0xffffffffffffff9c, &(0x7f0000001080), 0x140000, 0x0) ioctl$UI_GET_VERSION(r7, 0x4004552d, 0xfffffffa) 1.288088779s ago: executing program 0 (id=54): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80000002, &(0x7f0000000040)="e2", 0x1, [], 0x1, 0x5, 0xfffffffc, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int=0xe, @thr={0x0, 0x0}}}) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff8, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x2, 0x3, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r4 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x6908bd7c4cbb1798) fchmod(r4, 0x188) setsockopt(r2, 0x0, 0x6a, 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd2) fcntl$dupfd(r3, 0xef7df6f69ce117c0, r3) undelete(&(0x7f0000000540)='./file0\x00') r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) r6 = dup(r5) connect$inet6(r6, &(0x7f0000000100)={0x1c, 0x1c, 0x0, 0x0, @rand_addr="fe9571df2a72c3746660c8a1fabed6de", 0x40}, 0x1c) ktimer_create(0x0, &(0x7f0000000700)={0x3, 0x1d, @sigval_ptr=0x5, @spare=[0x7, 0xf81, 0x1f2a9c89, 0xf54d, 0x800, 0x0, 0x0, 0x453f]}, &(0x7f0000000400)) syz_emit_ethernet(0x58, &(0x7f0000001280)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x22, 0x3a, 0xff, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@ndisc_ns={0x87, 0x0, 0x0, @mcast1, [{0x2, 0x1, "a2dd8b6d81d74308220780a8"}]}}}}}}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ksem_init(0x0, 0x0) r7 = socket(0x1, 0x30000003, 0x2) sendto(r7, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) sync() 1.048224019s ago: executing program 0 (id=55): r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r0, 0x3862) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200, 0x1a3) posix_fadvise(r1, 0xff, 0x0, 0x2) (async) posix_fadvise(r1, 0x7fffffffeffffff6, 0x10000009, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$MDIOCATTACH(r2, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x0, 0x2, &(0x7f0000000280)='./file0\x00', 0x10000, 0x8, 0xa3d, 0x0, 0x0, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x9, 0x0, 0x0, 0x1000004, 0x0, 0x8, 0x8, 0xfffffffe, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4000000, 0x2, 0xffffffff, 0x2, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x653, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x1]}) r3 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) (async) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) (async) r5 = socket(0x1c, 0x1, 0x0) sendto(r5, 0x0, 0x0, 0x20100, 0x0, 0x0) (async) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') (async) open(&(0x7f0000000040)='./file1\x00', 0x8381, 0x4) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r6 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x1) ioctl$DIOCBEGINADDRS(r6, 0x8004667d, &(0x7f0000000040)) (async) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0x0) shmat(0x0, &(0x7f0000ffc000/0x3000)=nil, 0x2000) (async) fchflags(r3, 0x40008) (async) sync() 848.107251ms ago: executing program 2 (id=56): open(&(0x7f00000000c0)='./file0\x00', 0x800, 0x110) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f0000000000)={0x0, 0x26, 0x0, 0x0, 0x20, &(0x7f00000003c0)="70638953df0cef7e00080000000bf98994164394b5d947fa8802ca13b7270000", 0x10000, 0xbdfffffd, [0x0, 0x4]}) (async) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x4b, 0x0, 0x0) (async) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write(r2, &(0x7f0000000140)='\x00', 0xfe80) (async) writev(r2, &(0x7f00000000c0)=[{&(0x7f00000004c0)="86", 0x1}], 0x1) (async) dup2(r2, r1) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) (async) socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x52, &(0x7f0000001480)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x1c, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @remote={0xfe, 0x80, '\x00', 0x0}, [{0x1}, {0x1}]}}}}}}) (async) setrlimit(0xf, &(0x7f0000000340)={0x5, 0xe}) (async) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) (async) open(&(0x7f0000000280)='./file0\x00', 0x200, 0x0) (async) open$dir(0x0, 0x488200, 0x176) cpuset_setaffinity(0x3, 0x4, 0x20, 0x8, &(0x7f0000000380)={[0x2]}) (async) kqueue() (async) syz_emit_ethernet(0x2a, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa0f26ba05dee708060001080006040001aaaaaaaaaabbac14abbbaaaaaaaaaaaaffffffff"]) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) (async) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) (async) lchown(0x0, 0xee01, 0xee00) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x200000000000c, 0x0, 0x0) (async) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) (async) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r5, 0x4004667f, &(0x7f0000000080)) (async) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0x0) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x4) posix_fadvise(r6, 0x0, 0xbd9f, 0x5) 747.85439ms ago: executing program 0 (id=57): socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffa, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x8]}], 0x1, 0x0, 0x0, 0x0) ioctl$EVIOCSABS(0xffffffffffffffff, 0x5, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x9, 0x10000, 0x7, 0x5}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) getsockopt$inet6_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r2, 0x84, 0x24, &(0x7f0000000140)={0x0, @in={{0x10, 0x2, 0x2, @loopback}}, 0x7f}, &(0x7f0000000300)=0x90) setsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r3, 0x84, 0x24, 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x8, 0x0) ioctl$CIOCGSESSION2(r5, 0xc040636a, &(0x7f0000000440)={0x28, 0x0, 0x18, &(0x7f00000000c0)="3c9e89526b1700b07f82ee18e15b4e73e47f022de5aa3505", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x0, 0xc]}) r6 = fcntl$dupfd(r5, 0x11, r4) ioctl$CIOCCRYPT(r6, 0xc0306367, &(0x7f0000000300)={0x0, 0x1, 0x40, 0x8203, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r3, 0x0) setsockopt$sock_accept_filter(r1, 0xffff, 0x1000, &(0x7f00000004c0)={'accf_data\x00', "044791a0c1f000188bdcd809663d210600000000000000683b7cc0673e11a7c824293af5ce0665cc3143766bfe1283f6e2e4b135702c67b60cfb9e1ed93563c4267a7820b3f1f058d6876247cb64563d7a06f4f45dd9d2d0223f3309446fddb43e282ca55738404bf83e18e8f62b4373d173ab82716d59ff761b5e483329e26bb5cf43d2531d8aeb768aabe7931dceed0e37530d842320059692985295405448ad57dc5fd6eb3282b485bbc9e08552ed0a4f0d387840fb3fafcc1b285753b66f145bbbff9717be06e66404c67391f01417375dcf66ab61b044f3152069d81d33b924ce324f9200"}, 0x100) __specialfd$inotify(0x2, &(0x7f0000000100)={0x4}, 0x4) thr_new(&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001180), 0x0, 0x7, 0x0, [0xfffffffffffffffd, 0xffffffff]}, 0x68) syz_emit_ethernet(0x2a, &(0x7f0000001940)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08004500001c0008000001029078e0000002e000100112009078000000dd598fe7222ff34eeb563ee262978162453efeeda756064044e349dfcf62ceca3ef2d8d741e0fe02c555806d520721b4af748e75c706011bf8410e16dec02a1ee7aa0de3bb7a6cc4203e69455571d502f3fb67197ea8fbe5ef725e81aa54c44b22a5f41f8efea0f1de1870af66cf7227e9e3b15a531877dc587af38f62a998b1aaaa181be085f922e4d855e355"]) open$dir(0x0, 0x0, 0x0) r7 = socket$unix(0x1, 0x5, 0x0) bind$unix(r7, &(0x7f00000002c0)=@file={0xa, 0x1, './file1\x00'}, 0xa) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0xfff, 0x9, 0x6, 0xb, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xd383, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x8000, 0xd, 0xa, 0x81, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x9, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x0, 0x8, 0xc, 0x8]}, {0x5c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x3fe, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0x0, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x80008, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x6, 0x2, 0x58, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x6, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x800, 0x0, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x538, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x3, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x4, 0x3, 0xfff, 0x343d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x104, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x3, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8003, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1ff, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0x7ff, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124442, 0x8, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x40, 0x225, 0x80, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x2, 0x7fffffff, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0xffffffff, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0x10000, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0x2, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xfffffffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x3, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x1000000, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x1320, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd1, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff5, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x5, 0xfff, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xfffffff8, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc9, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x10000, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x400, 0x5, 0xfffffffc, 0xffffffff, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x500, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x4, 0x81, 0x8, 0x2, 0x4, 0x6, 0x1, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x4002, 0x6, 0x7, 0x8, 0x1ff, 0x7ff, 0xa, 0x0, 0x1, 0x7, 0xc0, 0xf58f, 0x1000, 0x80000000, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x6, 0x7fff, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x1a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xfffffffb]}, {0x6, [0x10, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x1, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x6, 0x8, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x7fffffff, 0x8, 0x1, 0x200, 0x40004, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0xa39, 0x0, 0x0, 0x8, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x4, 0x0, 0x3ff, 0x1000, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x0, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x4, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x100009, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x8, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x9, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x5, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0x7, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x4, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x401, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x6, 0xffff, 0x1, 0x7, 0x1400000, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0x4, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x0, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0x3, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x1, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x7, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff3, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x6, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x2, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x8, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0x10001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x8, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) listen(r7, 0x0) open$dir(0x0, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) sendmsg$inet6_sctp(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100)=[{0x0}], 0x1, 0x0, 0x0, 0x8d}, 0x2008f) 528.290842ms ago: executing program 0 (id=58): open$dir(&(0x7f0000000180)='./file0\x00', 0x20000, 0x64) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f0000000040)=0x2, 0x4) open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) sysarch$I386_SET_LDT(0x1, 0x0) r1 = msgget$private(0x0, 0x790) msgsnd(r1, &(0x7f00000005c0)=ANY=[@ANYRESDEC=r1, @ANYRES64=r1], 0x401, 0x0) msgsnd(r1, 0x0, 0x8, 0x0) msgrcv(r1, 0x0, 0x0, 0x0, 0x800) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x7, 0x7fffffffffffffff, 0x7, 0xfff]}], 0x1, 0x0, 0x0, 0x0) freebsd11_getfsstat(0x0, 0x0, 0x0) symlink(0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0xffffffffffffff9b, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0xfffffffffffffdd5, 0x20084, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x48, &(0x7f0000000100)={@multicast1, @rand_addr=0x8, @rand_addr=0x2}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x48, &(0x7f0000000200)={@multicast1, @rand_addr, @multicast1}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x48, 0x0, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x48, &(0x7f0000000080)={@multicast1, @local={0xac, 0x14, 0x0}}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x49, &(0x7f00000001c0)={@loopback, @local={0xac, 0x14, 0x0}, @rand_addr=0x8}, 0xc) fstatat(0xffffffffffffffff, 0x0, 0x0, 0xc000) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000)={0x0, 0x40, 0x0, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x10}, 0xb) syz_emit_ethernet(0x0, 0x0) mkdir(0x0, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000040)={0x29, 0x0, 0x20, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735fbe8e5aa4f4bb674", 0x0, 0x0, 0x0, 0xfdffffff, [0x8]}) 448.310287ms ago: executing program 0 (id=59): open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000340)={0x8, 0x0, 0xffffffffffffffff, 0x5, 0xffffffffffffffff}) procctl$PROC_TRAPCAP_STATUS(0x2, r0, 0xa, &(0x7f0000000040)) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x10) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) socket(0x2, 0x1, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x80000, &(0x7f0000000140)) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, 0xffffffffffffffff, 0x0) aio_write(0x0) r2 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0xd2) setsockopt$sock_accept_filter(r2, 0xffff, 0x1000, &(0x7f0000000240)={'accf_http\x00', "5b08f795003ade010a08b15b62ab4e6bdad53c7c9f1614a7a79430a235841cdcd10726ca436814bbdd042b208ba9c8ef74b7b1ed806e36492b9253fa17e31dce68a4e3b4dbeec4e41f16d48cf9d371f25eb46e4fb452d938fd754b9455b9adee0e7e3216c906dbd1cd1b4aef7e803e68d165a7eb8fbf6caad116a1cae4be92f4679564ec231c498606cd75e7ea3e2413da2b501d16d3da33c99a28dd47c517e6113e6b2fce1442e0d3510ba67d7becd71a628ef64d9443e138e5a9647fab03118e3d9c8550536b8628a14941dc4eb65ad5b88eebcc1d098c569f4b17377d1f1369e8cc21cb57a0baf83bd350b1686bd9"}, 0x100) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r2, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2000000, 0x26) preadv(r3, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001780), 0x0, 0x9) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x3, 0x410, 0xffffffffffffffff, 0x0) 288.235892ms ago: executing program 1 (id=60): r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(r0, 0x14040000) syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x2c, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0x9, 0x0, 0x0, {[@window={0x3, 0x3, 0x7}]}}}}}}}) r1 = getsid(0xffffffffffffffff) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x13, &(0x7f00000001c0)=0x2, 0x4) sendto$inet(r2, 0x0, 0x0, 0x20004, &(0x7f0000000380)={0x10, 0x2, 0x0, @multicast2}, 0x10) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x1, 0x8) procctl$PROC_TRACE_CTL(0x0, r1, 0x7, &(0x7f0000000000)=0x2) statfs(&(0x7f00000009c0)='./file0\x00', &(0x7f0000000080)) socket(0x1c, 0x4, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8, 0x1) openat$ptmx(0xffffffffffffff9c, 0x0, 0x4, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f00000000c0)={'bbr\x00'}, 0x24) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x1ff, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) sendto(0xffffffffffffffff, &(0x7f0000000500)="b9d5cf29033fda9f0d47f14a5babefe85e2f1027c0bb21378a3d78aef12d04ee87a6", 0x22, 0x100, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x1, 0x0, @mcast1, 0x2006}, 0x1c) mount(&(0x7f0000000740)='ext2fs\x00', 0x0, 0x10, &(0x7f0000000680)="ade842ebae21f7633aca48499e99749030ddbd9e14874ce6a586d90a306cb74264626630e10532de6c39d4332680bcfd0f4d702e0d69a62e7d5efef16b33148f") munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) setgroups(0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r4, 0x0, 0x3, &(0x7f0000000100)="09001000", 0x4) sendto$unix(r3, 0x0, 0x0, 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) msync(&(0x7f0000860000/0x600000)=nil, 0x600000, 0x2) madvise(&(0x7f00009d6000/0x600000)=nil, 0x600000, 0x3) 287.595101ms ago: executing program 2 (id=61): kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) mmap(&(0x7f000008c000/0x4000)=nil, 0x4000, 0x3, 0x1010, 0xffffffffffffffff, 0x0) rfork(0x90010) r0 = open$dir(&(0x7f0000000400)='./file1\x00', 0x40000400000002c2, 0x258) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connect$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x74) semop(0x0, 0x0, 0x0) __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000240)=[0x24, 0xe]) syz_emit_ethernet(0x3e, &(0x7f0000000300)=ANY=[]) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x89c]}], 0x1, 0x0, 0x0, 0x0) kqueue() socket$inet_sctp(0x2, 0x1, 0x84) openat$crypto(0xffffffffffffff9c, 0x0, 0x80000, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r3, 0x3862) r4 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r4, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) bind$inet6(r4, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) connect$inet6(r4, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r5 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r4, r5) r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x2, 0x25) fhopen(&(0x7f0000000080)={{[0x5c8951ac, 0x3bea9983]}, {0xf, 0x2, "fe020000fd1604001a00"}}, 0x2) sendfile(r6, r5, 0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=[{&(0x7f00000014c0)}], 0x1, 0x0}, 0x0, 0x14) syz_emit_ethernet(0xbd, &(0x7f0000000280)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "cc58da", 0x87, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[@routing={0x3a}], @icmpv6=@ni={0x8c, 0x0, 0x0, 0x0, 0x0, 0x0, "f015053c694faef7dbd73a3d4030e235f159bc780fb4e5967d66208422f84cf37b94a7e3fa2dffdbbc0dbf19038f1b590db5b297b4d2b59379d3ff080cf387567c275d0709be7297eaa53547de514ef91b8437849f6cf2d32828bee573d27c3050c318461cbf7787c8d882b41f00c7"}}}}}}) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) 18.365036ms ago: executing program 1 (id=62): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) (async) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000040)=0x6, 0x4) (async, rerun: 64) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000000)={'rack\x00', 0x5}, 0x24) (async, rerun: 64) rfork(0x3060) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x25, &(0x7f00000001c0)) 0s ago: executing program 32 (id=44): open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c2, 0x31) (async) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c2, 0x31) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f00000004c0), 0x10000, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000080)={0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdefffff, [0x0, 0x0, 0x0, 0xb1]}) (async) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000080)={0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdefffff, [0x0, 0x0, 0x0, 0xb1]}) ioctl$CIOCCRYPT(r1, 0xc0306367, &(0x7f0000000040)={0x0, 0x0, 0x70, 0x30038, &(0x7f0000000180), 0x0, 0x0, 0x0}) pwritev(r0, &(0x7f0000000080), 0x0, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_buf(r2, 0x29, 0x3f, 0x0, &(0x7f0000000100)) (async) getsockopt$inet6_buf(r2, 0x29, 0x3f, 0x0, &(0x7f0000000100)) munlock(&(0x7f0000002000/0x1000)=nil, 0xffffffffdfffdfff) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x80, 0x4887) msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) (async) msync(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) setrlimit(0x1, 0x0) syz_emit_ethernet(0xffffffffffffff0f, 0x0) (async) syz_emit_ethernet(0xffffffffffffff0f, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x40000400000002c2, 0x10577db39771b91c) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) extattr_set_link(&(0x7f0000000000)='./file0\x00', 0x1, 0x0, 0x0, 0x0) chroot(&(0x7f0000000100)='./file0/file0\x00') extattr_set_link(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, 0x0, 0x0, 0x0) mount(&(0x7f0000000140)='zfs\x00', &(0x7f0000000480)='./file0\x00', 0x40, &(0x7f0000000540)="1a38ed2946b680be3709ec6a62afa65b620fd12ce70f173ef79a665ad6fff31b4ab04858b59f7b6d49f53f48646ff43c106a0e1aee9ccec6b0a92b187627f6864b16e4210985b73459c3db3297b8170d1b37a9986010bcc9c5712cb620232536f8ab0958264e7f52ae0b5c4391efb7707ab464f2d7466ceaaa42ab093e62cad9dab8c93e835e8a7770bf5ea38927146e40c7f094ed5c37967ccecf0147c63f0f3a287ffa3d1a0f5c91bddd") extattr_list_link(&(0x7f0000000500)='./file0\x00', 0x3, &(0x7f00000002c0)=""/81, 0x51) truncate(0x0, 0x8001) socket(0x11, 0x3, 0x1c) (async) socket(0x11, 0x3, 0x1c) execve(0x0, &(0x7f0000000340)=[0x0], 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.31' (ED25519) to the list of known hosts. Expensive callout(9) function: 0xffffffff81a300f0(0xfffffe006df99000) 0.008440013 s vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe006e4a6dc0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83713000 usecount 10, writecount 7, refcount 70 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe005411a2e8 ref 1 pages 544 cleanbuf 62 dirtybuf 6 lock type ufs: EXCL by thread 0xfffffe00540ad000 (pid 883, syz-executor, tid 100167) nlink=1, effnlink=1, size=2147483650, extsize 0 generation=60f6aba7, uid=0, gid=0, flags=0x40008 ino 84, on dev gpt/rootfs WARNING pid 905 (syz-executor): ioctl sign-extension ioctl 200000040184567 Warning! syz-executor[930] uses SF_SYNC sendfile(2) flag. Please follow up to https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=287348. To be removed in FreeBSD 16 SYZFAIL: SIGFPE if_delmulti_locked: detaching ifnet instance 0xfffffe0058590800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058590800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058590800 pc-offset:0xffffffff217ce221 pc:0xdeadbeef addr:0x0 code=65537 (errno 9: Bad file descriptor) Connection to 10.128.1.31 closed by remote host. if_delmulti_locked: detaching ifnet instance 0xfffffe0058592000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058592000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058592000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058591000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058591000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058591000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058591000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058591000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058591000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058592000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058592000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058592000 ZFS filesystem version: 5 ZFS storage pool version: features support (5000) if_delmulti_locked: detaching ifnet instance 0xfffffe0058590800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058590800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058590800 if_delmulti_locked: detaching ifnet instance 0xfffffe0057e4d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0057e4d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0057e4d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0057e4d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0057e4d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0057e4d000