last executing test programs: 11.534712372s ago: executing program 3 (id=26): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x55, &(0x7f0000000140)={0x3, {{0x10, 0x2, 0x3, @multicast1}}, {{0x10, 0x2, 0x2, @multicast2}}}, 0x108) kevent(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) openat$md(0xffffff9c, &(0x7f0000000040), 0x80000, 0x0) r1 = kmq_open(&(0x7f0000000080)='./file0\x00', 0x800, 0x100, &(0x7f00000000c0)={0x0, 0x4, 0xfffffffffffffeff, 0xfffffffffffffff8}) kmq_timedreceive(r1, &(0x7f0000000280)=""/91, 0x5b, 0x401, &(0x7f0000000100)={0xff, 0x74a}) fork() r2 = kqueue() kevent(r2, &(0x7f0000000040), 0x7fffffff, 0x0, 0xfffffffb, 0x0) kevent(0xffffffffffffffff, &(0x7f00000001c0)=[{0x0, 0xfffffffffffffffa, 0x4f, 0x1, 0xe8c5, 0x0, [0x8000, 0x0, 0x7ff000000, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r3 = kqueue() kevent(r3, &(0x7f00000001c0)=[{0x3, 0xffffffffffffffff, 0x21}], 0x1, 0x0, 0x12, 0x0) close(r3) rfork(0x85000) madvise(&(0x7f0000050000/0x2000)=nil, 0x2000, 0x8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) setregid(0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0) socket$inet6(0x1c, 0x2, 0x0) syz_emit_ethernet(0x4e, 0x0) r4 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r4, &(0x7f0000001140)={0x1c, 0x1c, 0x0, 0x9, @mcast2}, 0x1c) connect$inet6(r4, 0x0, 0x0) rfork(0x85000) 10.10573582s ago: executing program 3 (id=31): aio_suspend(0x0, 0x0, &(0x7f00000001c0)={0x0, 0x80000000}) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x170) ftruncate(r1, 0x7ffe) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x8000000000000000, 0x2]}], 0x1, 0x0, 0x0, 0x0) ioctl$DIOCIGETIFACES(r1, 0xc0284457, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1001, 0x0, 0x0) r3 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r3, 0x0) r4 = socket(0x1b, 0x3, 0x0) sendto$inet6(r4, &(0x7f0000000080)="02090100020000008e4ca277fce00d8f", 0x10, 0x20008, 0x0, 0x0) sysarch$AMD64_SET_GSBASE(0x83, 0x0) syz_emit_ethernet(0x52, &(0x7f00000003c0)={@local, @empty, [{[{0x88a8, 0x3, 0x1, 0x1}], {0x8100, 0x3, 0x1}}], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x14, 0x3a, 0xff, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@ndisc_ns={0x87, 0x0, 0x0, @mcast1}}}}}}) preadv(0xffffffffffffffff, 0x0, 0x0, 0x78dabc0a) bindat$unix(0xffffffffffffff9c, 0xffffffffffffffff, &(0x7f0000000240)=@file={0xa, 0x1, './file0\x00'}, 0xa) syz_emit_ethernet(0x36, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa0800452000280000000005069078000001ffac1400aa4e234e2386f0a78e69495e9571eeda4e5362b574f7cf58ffcc005f9c2084cce4c211511bfc9ff18c69631564578e1308386cb6c0c6ca4b01dbd1dcb3ba7b00c4e0c7a5b30f57ea65e3ebc5d0c98c144838bbf400d69e93397a1afecb621ad907f213678522eda6f140b0f06a26165ced65952aadfe3d12454d7906680e3f2247dd5555e869ec420af1a9bfed123b71c63cc7eef08eb2725f441a4e871a36393151f21a756bfeee09e341fd17e0ff885b0cc1b522e77618c92a63671e4a", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="500200a790780000"]) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f0000000040)={0x19, 0x0, 0x18, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735", 0x0, 0x0, 0x0, 0xfdffffff}) ioctl$CIOCCRYPT(r0, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0x10001, &(0x7f00000000c0)="6c0d9e9caf4d76146badbe5f675f596b826a2de005580ce1d2f4565c26ee4d554dc94f33c43c31ab3edb4a1162139beb27666dbd4b1d06db198b1a9ab2f862558cde3d062f0ee9596a5c9de4c89592c26d44fa5a4c7a2fa22f132381b85ef7b512b27b09b207538ff356556836600de1a943f896beac17ede29381ff8d327bb62d1719f5fbe08daf5a93e4def7ab244a64b428e4cba394e216c23489da4bc058c26a698065e1401a6656e968ffe5e00ff463f751ee27ac3b697a042a180419c1c0d142", 0x0, 0x0, &(0x7f0000000340)="62435ba4be194db614410d9abef62d32dc599179306af5d1615783dc2872472ebb0538add0d779983937066652e1d031e150695d949bc9da086730d19611fa6c393edba93b389684af8b10f5017f3aa1da4ea2073ea00b5b7fd2d7bc122ca7"}) 9.166768554s ago: executing program 3 (id=36): chmod(&(0x7f0000000000)='./file0\x00', 0x0) kmq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x4, 0x0, @sigval_ptr}) aio_write(0x0) open(0x0, 0x80000000000206, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000040)={0x0, 0x1e, 0x0, 0x0, 0x1, &(0x7f00000002c0)='h', 0x400000, 0x8d800000, [0x0, 0x2]}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000500)="182a187d094b09d5c2da5cb8b9e2629e18cc9e3f6a7690dabf8beb4abc1aa91a8f6646c64bdc3faf4d4aeece25e52ccfd49df6d49097189852e4fa84bd736151cdc165065d080000b71be2ced1dcaf7a729c730eea0600000000000000c94492ca6327e640d79c969f9b78f9235da433e80ac467889eadd506ccd40d703ae975e8fec78719d96b11828506baa1e92f506ed50ebe15e12e5d7da0b71b919682456af4c711ff34ffd5cc133a95774922c8e038fd622f", 0xb5}, {0x0}], 0x2, 0x0, 0x0, 0x149}, 0x0) r3 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r3, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x106, 0x0) bind$inet6(r3, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) truncate(&(0x7f0000000080)='./file0\x00', 0x7ffe) dup2(r1, r4) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) freebsd11_fstatat(r2, 0x0, &(0x7f00000000c0), 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r5 = kqueue() kevent(r5, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x7, 0xffffffffffffff00, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) socket$inet6_udplite(0x1c, 0x2, 0x88) getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000040)) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000004c0)='./file0\x00') ioctl$MDIOCDETACH(0xffffffffffffffff, 0xc1c06d01, 0x0) kqueue() syz_emit_ethernet(0x5e, &(0x7f0000000680)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "004ce5", 0x28, 0x3a, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@ndisc_redir={0x89, 0x0, 0x0, '\x00', @rand_addr="ddbcd6d351ce5ce9db90fcbbe8adb0df", @loopback={0x1000000, 0x89}}}}}}}) 6.289189991s ago: executing program 0 (id=41): openat$md(0xffffffffffffff9c, 0x0, 0x10000, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) r2 = kqueue() syz_emit_ethernet(0x2a, 0x0) kevent(r2, &(0x7f0000000380)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x6}], 0x1, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1b, &(0x7f00000001c0), 0x4) readv(r3, &(0x7f0000000540)=[{&(0x7f0000000040)=""/125, 0x7d}], 0x1) setsockopt$inet6_int(r3, 0x29, 0x48, &(0x7f0000000000)=0x7, 0x4) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x10, @empty, 0xfffffffb}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f0000000240)=ANY=[@ANYBLOB="717dc35b11bfc61800b000000800c830a2ab4077172c69ce834500001c0000000000119078ac1400bbac1400aa4e204e22000890783dca70af85b47b1047791ed769070983e406d7a74e779bc74eb8cef510324874ec3da827d955c6423eb965f62a3f6983643c39a65ba0c5ac5c9b2c73bcf92542443274deb32e604b91a801c22b81aa1814ebdb3c94d370df90c266dbe7b4688b2f855ec6ace45189105d89327f245717b39729706c3b8fe135db21ca40e735407641233436c549a97c42ec41f06a18b433a6141bb972def461fa5c513e20a19e86"]) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = fork() sigqueue(r5, 0xf, @sigval_ptr=0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0xffffffffffffffff) sigprocmask(0x0, &(0x7f0000000100)={[0x7, 0x0, 0x8, 0x6]}, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x5, 0x5410, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = open$dir(0x0, 0x1, 0x0) ktimer_create(0x4, 0x0, &(0x7f0000000100)=0x0) ktimer_delete(r7) ktimer_settime(r7, 0x1, &(0x7f0000000180)={{0x3, 0xfffffffffffffff8}, {0x2, 0x5}}, 0x0) copy_file_range(r6, 0x0, r4, 0x0, 0xffffffffffffffff, 0x0) r8 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind$inet(r1, &(0x7f0000000200)={0x10, 0x2, 0x3, @multicast2}, 0x10) setsockopt$sock_timeval(r8, 0xffff, 0x1005, 0x0, 0x0) r9 = openat$kbd(0xffffffffffffff9c, &(0x7f0000000000), 0x8, 0x0) ioctl$PIO_DEADKEYMAP(r9, 0x20006b09, 0x0) 4.401408642s ago: executing program 2 (id=43): sendmsg(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000040)=@un=@abs={0x8, 0x1, 0x0, 0x2}, 0x8, 0x0, 0x0, 0x0}, 0x20088) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x3, 0x0, @mcast2}}, {{0x1c, 0x1c, 0x2, 0x0, @rand_addr="483cb696615cbd5f23aa0675591532bf"}}}, 0x108) getitimer(0x0, &(0x7f0000000100)) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000400), 0x200000, 0x0) ioctl$MDIOCATTACH(r1, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x20, 0x0, 0x0, 0x8000000000000000, 0x8, 0x40, 0x8000000000000000, 0x0, 0x400, 0x0, [0x0, 0x41, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0xd, 0xffffffff, 0xfffffffd, 0x0, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0xe9a9056, 0x0, 0x0, 0x0, 0x0, 0x10004, 0xfffffffd, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x20010002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffbffffe, 0x0, 0x18, 0x7, 0x0, 0x0, 0x9, 0x0, 0x0, 0xfffffffc, 0x141, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x653, 0x0, 0x2000, 0xfffffffe, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x768]}) r2 = socket$inet_udplite(0x2, 0x2, 0x88) __cap_rights_get(0x9, r2, &(0x7f0000000200)) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f0000000400)={0x5, {{0x1c, 0x1c, 0x1, 0x0, @mcast2, 0x4}}, {{0x1c, 0x1c, 0x1, 0x0, @loopback}}}, 0x108) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x3, 0x80000000, @mcast2, 0xd}}, {{0x1c, 0x1c, 0x1, 0x3, @rand_addr="b036a587f0e7192a6e60ab635cdfbaf0", 0x39d1}}}, 0x108) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x4, @mcast2}}, {{0x1c, 0x1c, 0xffffffffffffffff, 0x0, @rand_addr="19fdb123c0a8a841280b53f7ac8be800"}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x3, 0x0, @mcast2}}, {{0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}}}}, 0x108) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @mcast2}}, {{0x1c, 0x1c, 0x3, 0x5, @rand_addr="19fdb123c091ae3db1f1c5f51d8be800", 0x2}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x52, 0x0, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x80000000, @mcast2, 0xf}}, {{0x1c, 0x1c, 0x1, 0x0, @rand_addr="2e3bd580583afb490ea98696165ed7d1", 0x4}}}, 0x108) syz_emit_ethernet(0x138, &(0x7f0000000000)=ANY=[@ANYBLOB="ff02"]) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000080)="890704", 0x3) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r5 = socket(0x2, 0x3, 0x1) setsockopt$inet_opts(r5, 0x0, 0x1, &(0x7f0000000080)="0315f1d8dec5a317a93546ba", 0xc) connect$unix(r5, &(0x7f0000000240)=@file={0xa, 0x0, './file0\x00'}, 0xa) sendto(r5, 0x0, 0x0, 0x0, 0x0, 0x0) write(r5, 0x0, 0x0) rfork(0x85000) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) getsockopt$inet6_udp(0xffffffffffffffff, 0x11, 0x0, &(0x7f0000000280), &(0x7f00000002c0)=0x4) 3.878830213s ago: executing program 3 (id=44): r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x33, 0x0, 0x0) getsockopt$inet6_buf(r0, 0x29, 0x33, 0x0, &(0x7f00000006c0)) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setrlimit(0x0, &(0x7f0000000480)={0x9, 0x7}) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f00000000c0)={0x16, 0x0, 0x40, &(0x7f0000000340)="0b6fac4103e7a00d4689e808d0d4755aedaacdd4743c7eaa2c7300d05fe86098acc6b6448c9abd58edc30d7c444335ad7a074c086a5a10639a860c19fd1d4ece", 0x0, 0x0, 0x0, 0x7d8e699a, [0x80, 0x0, 0x0, 0x48000]}) open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) fcntl$dupfd(r1, 0x0, r2) r3 = open(&(0x7f0000000480)='./file0\x00', 0x8000, 0x4ebfac6bbaf7941) r4 = socket(0x1c, 0x1, 0x0) ktimer_create(0x4, 0x0, 0x0) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r5, 0xc040636a, &(0x7f0000000000)={0x8d77620ea0c45435, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d86699a, [0x0, 0x0, 0x0, 0x3]}) ioctl$CIOCCRYPT(r5, 0xc0306367, &(0x7f0000000240)={0xfffffffe, 0x0, 0xfffe, 0x4dd9, &(0x7f0000000700)="67b2177dde2619094cfa04021870ff39c8105bd3728df9b978d71f3e9388bf3a3a451465f014f04be2f79a9800432cd1c01b8edd1f508f8d88f688737e7eac676e15739841ddefc8e0ea68238c331caf8a8faa06186d941caa38c42dae4c9ed4f7660d8adb98a12fe0515bc38668582423e7431816294f1b15275ad6e59628bbce47b66f944a14319929eb7f407c3c8e15399416b9c0033ddc51169ee2ec2c73e9fe1ece9509e5380cf96588e744fd8a5da78a456e4578fa6a1d4571dd640e95d38f235f36ba321221b0", 0x0, 0x0, &(0x7f0000000180)}) r6 = kqueue() kevent(r6, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7fffffff]}], 0x1, 0x0, 0x0, 0x0) r7 = socket(0x2, 0x1, 0x0) utimensat(r3, &(0x7f0000000040)='.\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x0, 0xffffffffffffffff}}, 0x200) __semctl$SETVAL(0x0, 0x0, 0x8, &(0x7f0000000040)=0x0) syz_emit_ethernet(0x169, &(0x7f00000004c0)=ANY=[@ANYBLOB="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"]) openat$filemon(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r8 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r8, 0xc040636a, &(0x7f0000000040)={0x39, 0x26, 0x0, 0x0, 0x0, 0x0, 0x400001, 0x8d800000, [0x0, 0x2, 0x0, 0x800]}) cpuset_setaffinity(0x3, 0x2, 0xa32, 0x8, &(0x7f0000000200)={[0x3e]}) setsockopt$inet_tcp_int(r7, 0x6, 0x8, &(0x7f0000000000)=0x9, 0x4) bind$inet(r7, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) setsockopt$inet_tcp_int(r7, 0x6, 0x22, 0x0, 0x0) connect$inet(r7, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r4, &(0x7f0000002580)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x180}, 0x104) 3.803896732s ago: executing program 2 (id=45): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r0, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) (async) mlockall(0x2) (async) r1 = socket$unix(0x1, 0x1, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/113, 0x71}], 0x1) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x80) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) copy_file_range(r3, 0x0, r3, &(0x7f0000000080)=0x81706, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 3.176445392s ago: executing program 2 (id=47): r0 = accept$unix(0xffffffffffffff9c, &(0x7f0000000000)=@abs={0x8}, &(0x7f0000000040)=0x8) sendto$unix(r0, &(0x7f0000000080)="35d5777337259974a9fa33b68662af06f7f15b22ea6534ea32ad7d028f1838d38e68a2dc54b71f8ed901860b0cb2a14ad9e30274219dba3287782d20bd856a63fe36206f0eaf1e892f02cdcffa", 0x4d, 0x20081, 0x0, 0x0) r1 = socket$inet6(0x1c, 0x2, 0x3) r2 = fork() procctl$PROC_TRAPCAP_CTL(0x2, r2, 0x9, &(0x7f0000000100)=0x3ff) access(&(0x7f0000000140)='./file0\x00', 0x4) procctl$PROC_REAP_GETPIDS(0x2, r2, 0x5, &(0x7f0000000380)={0x7, '\x00', &(0x7f0000000180)=[{r2, 0x0, 0x1}, {r2, r2, 0xe5a}, {r2, r2, 0x607}, {r2, r2, 0x10000}, {r2, r2, 0x40000000}, {r2, r2, 0x9}, {r2, r2, 0x2}]}) shutdown(r0, 0x0) r3 = shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffb000/0x2000)=nil) __semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000000440)=&(0x7f0000000400)={{0x0, 0x0, 0x0}}) fstatat(r1, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4000) freebsd11_fstatfs(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) procctl$PROC_REAP_KILL(0x2, r2, 0x6, &(0x7f00000007c0)={0xdb, 0x510, r2, 0x200, r2}) shmctl$IPC_SET(r3, 0x1, &(0x7f0000000840)={{r4, r5, r6, 0xffffffffffffffff, 0x84, 0xf, 0x0, 0xfffffffffffff25a}, 0xffff1095, 0x5, 0x4, 0xfffffffffffffffc, r2, r7, 0x6}) acct(&(0x7f00000008c0)='./file0\x00') r8 = fcntl$dupfd(r1, 0x0, r0) ioctl$CIOCCRYPT(r8, 0xc0306367, &(0x7f0000000b00)={0x7cf0, 0x1, 0x1, 0x159b, &(0x7f0000000900)="efd0aa27a965a34b577bc4cdeb469037f2b7211b706dbcf613499f9a893d78aabdb0fc1727dc0b98914859dea6bf906ad6ba0c6c9f37a159fe2206f7c891a01bee13be7bf403b9d780d26d2cbcdff3d8112bc3ba6a3aa05475f2a7", &(0x7f0000000980)="13d132667735ae6006469bd049", &(0x7f00000009c0)="51edada82e9dc1cf8b90c2cbfc2361a132a9bbee53699933e3fb7c090eaf74a477016f30019ce353e4de7e1cabb06b82b1aa6e8763c62689e6a6ebeadcf7289cbe2195651ee46114082428e21c29f436ccb92053daa5b35ffbe2641d06aec5d5a961d50cd95a784916ad82d298b5d93aaeaf69786d3bd2fc34701c3b5e39d74cf9cf6dd569061755f3a53bf634ca07c355f6eadb69bd8a0433fb2e08ffb661ee8faf371d4d75389ad3a0c13321b418d9100272fcba56697ced9f6858731f10d72f8dc89d5249221477c5f7d76bc5d35405cb082686741393476404aeb39c5aecfc7536dd89d027046a3d7f585f280f60fa39037381313563a4", &(0x7f0000000ac0)="330eed29df56821abff6093f22f026"}) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r8, 0x84, 0x14, &(0x7f0000000b40)={0x2, [0x7, 0xad]}, 0x8) close(r8) recvmsg(r1, &(0x7f0000001080)={&(0x7f0000000b80)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @ipv4={""/10, ""/2, @remote}}, 0x1c, &(0x7f0000000f40)=[{&(0x7f0000000bc0)=""/37, 0x25}, {&(0x7f0000000c00)=""/208, 0xd0}, {&(0x7f0000000d00)=""/42, 0x2a}, {&(0x7f0000000d40)=""/255, 0xff}, {&(0x7f0000000e40)=""/169, 0xa9}, {&(0x7f0000000f00)=""/11, 0xb}], 0x6, &(0x7f0000000fc0)=""/174, 0xae}, 0x3) freebsd11_fstatat(r1, &(0x7f00000010c0)='./file0\x00', &(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc000) setregid(r5, r9) __realpathat(r0, &(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)=""/3, 0x3, 0x0) unlink(&(0x7f0000001200)='./file0\x00') r10 = getpid() procctl$PROC_TRAPCAP_CTL(0x0, r10, 0x9, &(0x7f0000001240)=0x7fff) r11 = vfork() r12 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r13 = socket$unix(0x1, 0x1, 0x0) lio_listio(0x0, &(0x7f0000002180)=[{r8, 0x6, &(0x7f0000001280)="466530a6dbd70813f9ac7800d679eab5f49ce90be99b722375faccfd81dbbb0f9c11431cc648ec45e1053235ca4fc2b943254b6ea097ecf0258ff19ef159b7434eaabc4c65d39d077e32e6d214d8b4387f456994a339ec54bc41084ba26ef48d2bd96d0885772fb6ef64a18565d5fc623c", 0x71, [0x2, 0x8], 0x9c8e69, 0x18, 0x101, {0x4, 0x7ff, &(0x7f0000001300)="850ed9f80d7802633d1de76127ee24f68f88094b3a495fe13ad64bcff9babaff799135798e29433c39d2432cb4a55bd541c33669668e0b9317712efe8a45ba1c850de3cfb2edb880c313398014e8d9d7d82cf76a971c3d94ebd5796b8bca1f4e7d1d3ffd6dea48c0d2e520a56b40aa4f03f3ff3472a090d0803c7ca0ab44dd7cffc3cef37cb4e0eabfa3ac61df854e8d3285d0317c0ac30e537232ac75800992563ecc096b10f6daf83e247ea209e9ab7cf86e8b90c10fb76eba947bf29c3b5ac855fb4adad08ba44419bd9a6e4212db31549b930773a240c7345a04"}, {0x3, 0x1e, @sival_int=0x1c26bf0c, @ke_flags=0x80a1}}, {0xffffffffffffff9c, 0x4, &(0x7f0000001400)="f08723ce63325aa8d92179280458d8d1783a8686da097d7cd4aa6d7b110edd5d495ca713ebde2caf48800c692d9d7503306b53066937d2b467db7c6bb4382e0726f38a9806180775c6f2916db6b70ec7ae406bc4c06aa79f3b44cdc4f689a7ce3012ccea24fe73af814def5679ddbb47fd86b3a35529c0d961c0a52cf5a9e5894ac75193c9df4effed73ff74e7dcb8c725a13a88520a47d3b2159c27bfeaa3ae883dfe337e932d02c0eefafbb183d10aae7cfaf2e1020874e714966b830595e7d2c82c753490c5", 0xc7, [0xed9d0e18, 0x80000001], 0xb1, 0x2, 0x80, {0x2400000000000000, 0xad, &(0x7f0000001500)="670d5452c2e997b80ba60d2a236e925a7c19fc84e14acf046601cf3c2991c2f05d3415e1a6f158ba483c73fe9f5c823d46dd56a70dddbc7ee8bb6acedf126650d69c9c62da17c294fe7b5aeb9c2b723a51fef534f075561215b415ffeb9811097c4493ae54b85cdbad9d50b88ba60e1f4be1768714c67fb0892160668c5a14683bac82c57aa3fbd4b2fd0a34f01a3160bdd74b8fbf3072b0c66b962e9604818260111327f4135dc0b490f31d0bd2a58f9e33a82b8128f1df3821cbc73b6b1ec654"}, {0x2, 0x1e, @sival_ptr=0x60000000000, @thr={&(0x7f0000001600)="8f6978d2fa2e660f38dc7200c40229a7393ef30f1efcc462dd970500000000c4c2753f8a1faf0000f36ec4c1add406c4c2f19154fa00c4227d34849ca4860000", &(0x7f0000001640)="c9bd2845ce413c05189f1e15d9063b39ce4fca6cb155660cd7591134ac25d8d73e66b08b9c208ce40225d55c0ed37d077a78394017832d8e2ea74071d8e2695e3a5a51041425b2c8fb7369a0b7ec5e21c79d1d88f82704a494aaca6c8762d15fe2cb3c4d2fda7776f077b199ad693498b25f699176d64cd7370d42f7a4d05cb1510797524b34485690aaeb96eacc5cfd348688781568f8cab097be9723458bcd00b25cc9e4d878c2de4f5bc6a95b244e727d5433abf780b32d0335adaee69236401596936560ea5e5351ba1bb9e59c287da98e04458d1035132de244ef86c62ce21d481518b5096312d7e12f776cfe1e"}}}, {r0, 0x1, &(0x7f0000001740)="4d9bd2a5d81f93d73c2fbd9df343b0dcc780ad5f5c17a55ecac61d50e7a38417a94264cb914028a0c7370dfe30135a7020237833c1a3f669f3c899c1bea3bd1879a25d1ae1c90fddb4e607a6f03b3fed33cd0589ad95a3020a5aa33d51867e54cdec4ab9d8a699cd8bd6585df085770ad81a5c06f0eb882fa6618b3c6f273bba0dcfc0f2c6c8a43ef89bc67a33e2f5f5ae044dcb8367542a97c40887025ab10180faf301b509e88a288fecde0e577228176397", 0xb3, [0xaa4, 0x2], 0xffffffffffffffa5, 0x4, 0x1, {0x8, 0xd, &(0x7f0000001800)="d0a7bf098811c8c117f289022e82fe277e642f6e783e6c99d435d1b416c8aafcde1449d6dd0a3fd00e3ed36effef9cd06730c99868a025fd7223c65583d8d0f4ab9e7a16669185e56ddcc9831c6d141295d0f5714d09371dae"}, {0x1, 0x18, @sigval_int=0xfffffffb, @thr={&(0x7f0000001880)="c4017829d43cfed8daf30f1efac4022d3d3265af266745d1bf96c1fe27c4416571d5f40f4703660f381eeb", &(0x7f00000018c0)="3fa71d877c7add5fbf7cf0a311"}}}, {r8, 0x2, &(0x7f0000001900)="dfd5f9764563dbf371d57303f4709d69dbfd1b0cd4bf2421b97e7f6b0f215b6103d9de5ce54a3a26d39d646d54498b999c080d62badf5820d47180dc7959d68aac48ba4fffd9db2d1446f0014be92ffb7b0f3a171c793347f5cd5dbd6cd344eb81559125dde5fdc32ef853ff784f2d3f803a20004e9e3aa2c0a3", 0x7a, [0x5d, 0x100], 0x4, 0x8, 0x0, {0x2ad, 0x32, &(0x7f0000001980)="73dbd883ee1c940537d7fa03bd162484f3da58512eab5c6059e6e17e09c8f5d14bdaade41f264096dec5c99553c15ae31a66aee57b71544b2354cfe4aeb0952f2a023be4950f732dbaa9fb92eea46497ec3dc18a87d4809d11026ff8df89ab5b9937b70c8ce6e72a141d2084b8ef567d364f63221837fe406498d823e9cddcff9b87c960b21946e643045056b2de2b2869b28f516a616df457a33c9b1d03016370e841aafd006dba87b149b2c3ab51eea51cd629a14beaec1b17c3e3ef329ad2acbddc7989a672d6d6334d6d2de9d4c9b06d67df45bcf29f7c0169f0e5c079d0f65d432bd16c39de8c9c524f3a080a185b5e4c5e4c93f0407f"}, {0x1, 0x11, @sigval_ptr=0x4, @tid=r11}}, {r12, 0xfffffffffffffff9, &(0x7f0000001a80)="f0bfe2b491ca3c2369fdec1dda8ba2414bfaed5644ef3474d32ccf8dd215c9b209509cffae975d53657fcb034a5074d6b428bbfd530678e19e9109133c2749dfa1a6c99746c3f97862f488e64445dfde8fa740249498993850be6667481934b2d70cdea29caf5230cee65bfe16", 0x6d, [0x1, 0x4], 0x4, 0x8, 0x8, {0x0, 0x4, &(0x7f0000001b00)="9282afe95138c924056301911eac3af1b5c9998eac9ca5405a8984f3c1fefc0659f6ce775af8f4b694323736274c8acf1f03d7400444b2103c2b169e72fe487b59291632b4acade593b516489b098907e4f38872924f4ddfd9707b42541fed40d869a3f2fd6db25bc3660fc23d8bf8d7021eee6b6c94228c6934687e689fdbdca90ac52d9437a94da41a5ddb73e085140969884f72525aa0397f02814e8e26d5856ffb9db970afe51b105835c3cb85fdbd2b4d59a3444f038ade73e45ca72d972f02a230"}, {0x7, 0x10, @sigval_int=0x1, @ke_flags}}, {r0, 0x4, &(0x7f0000001c00)="6787fc023e679e5d9d7aaecd19570b11077ab6ddb06832", 0x17, [0x4f, 0x10001], 0x9, 0x2, 0xa1f, {0x2, 0x9f3, &(0x7f0000001c40)="2e29743fdbf998838ee90678b338d19228ab65b1a767e068b1bb76ffabec416bc02fb519686d45ffc90c465b77ad00cab114dd393afaf1345e3186b9bfed95451d7ba4df8932f6b47df02660c1887085cdb02887c2096b9d59642819acd2064df1ff007088da416dac167ceb9d7068b5e79b06429b2000c4e65872ec5c32829f0b92a860d1095cf85308bee8a627fa9f8e7cb75e562c880bf2c0eab2feba9df2611384e4f034c314d8e38897095bd16a87b006126fefe7328f9d3152d6141589"}, {0x4, 0x15, @sival_int=0x80, @thr={&(0x7f0000001d00)="c4838d7c1244c4e141edcc660f383fe067c05fb50a0fae28c4411562587d3ef3406d2c76f042f61a66430f5ee9", &(0x7f0000001d40)="cb6fd61d7546381141468f774eba1d93c47ee4f55d2e8d13b6bb0da01670"}}}, {r0, 0x1000, &(0x7f0000001d80)="6339c4ed1f091058aca472d6e939029dade6", 0x12, [0x4, 0x6], 0x2d5c, 0x6, 0x7, {0x4, 0x2, &(0x7f0000001dc0)}, {0x2, 0x12, @sigval_ptr=0x8, @spare=[0xd0a, 0x2, 0x3, 0xf6, 0x9, 0x8, 0x5, 0x7]}}, {r13, 0x9, &(0x7f0000001e00)="546458d6b2583843421a81006a45c51e3ca2b805fa34380b85ff09af7c563f17ef3f16", 0x23, [0xc58d, 0x80000000], 0x1, 0x6, 0x1b7b9c1a, {0x8, 0x5, &(0x7f0000001e40)="552ba75493995b6857a1f519ed11414ff5202c78fe5f156f03355aea9fc2872626c184382b30f376ea3614554b530c3ff816e2422e2e5157875cefc30aa0a455d1c586575890b441aa68b7b71553493dba964f121731d05baaef256f24e00d40fb749fbf05a05a0bf3f04158ce361aed960f5c3fc11d5b4ae31634aa604e3228ef6b9cab489a625571ca880945acca793eb503a4060d0927cbbce41ca6c74cb3d7c1f30920395ae51b45ec03b542a4d3f851ec550da59a0b7ded2732e92a672f46244388b013d536a42e06e55b7989321586419c038f09750daf0fc1ec4526"}, {0x2, 0x13, @sigval_ptr=0x8000, @spare=[0xffffffffffffff87, 0x2, 0x8000000000000001, 0x6, 0x7, 0x7f, 0x6, 0x8000]}}, {0xffffffffffffffff, 0x3, &(0x7f0000001f80)="862cdfffa36191d5e1c3205b30dc882359785fd3f9a94303e85ff23658a32dd2bc5c67ab09609bcc8ba047ca618a52bf867d0bd4f6796d6f4e6e3c394718401d1f839b580f776e0d849d5482f45587749806e46f01a5ca38b2648eccdd07a7cde60fce82948af027ee5bc309d7518140d1bb0017a08c6cfa73c06fa2d8c00ae4b893a0bd3cebd86f660b28baceefdf3d75732953e6bab60cdb368fca9ca14febcb20836aa689ba2b72279be667333c61a1997044f5a13ce8a200daa5209320bae0e33591af5349639a7d068c2dccdc884b12d5bef8cf9302e96ac2cb5292cd3e31bbaa20606ab51a85", 0xe9, [0x5], 0x2, 0x18, 0x88, {0x414000000000, 0xffffffffc551a076, &(0x7f0000002080)="bc4ea31730b84087a8dbe738c87b952ee349068a0f85b4ba90ce5dc632469ec05fabeed9ca995eaca3b88110de0468c3b9840e13a33f01bf9f71d1d2612d0410c68dc257c157ead1076db944f4b0d49571caaa46f25f036c9d0c4828f102bec3ed592742dcf2d26616139f9b1c9e164b4bedba2c9cafda3e8409a5460e056b4545318439df49debe73f6ed469d3fe53802607e598f0e51bda5c28845b03cc956a93ffccf4520ecd2bd40e2fbad165e6b288a6650d147fee8a84333901687639794aec3edcd928ccec9d06c91c12085cebabcd82832e8a0136617dd0e58be50a24401386d3e2b4f4611514e10040550c0e69a11da"}, {0x2, 0xe, @sigval_ptr=0x5, @spare=[0x5, 0x1400, 0x568c, 0x9, 0xe, 0x9, 0x5, 0xffffffffffffffe7]}}], 0x9, &(0x7f0000002880)={0x3, 0x13, @sigval_int=0x7, @thr={&(0x7f0000002740)="c4a17e16b7ffffffffc4631d7a49a6008f0868cc6a96000f72e00926c784be0f000080030000002e660fda3c8cc4c2f91ea59d000000c4431d5ffbfc8f09a80231c4a131d3e7", &(0x7f00000027c0)="fc85426251e2fe92c264d95c6f7360092593838373f3e78148fbf1fdcf3c11b48b4d07539f1644878d8438586ffe6d9745ccf8eb175f7305ba31a651b97833e996142ede486f82cb4ad283c9239f52215acfcdf5f5e907148438479e914158b7a9186cdeec1f07d66d3eccea66fd926ab57b9214dbcee68133558eb445b39e3eb7a430a342638fad39f58dc8dffec28fede44974f736fbeb2d5d6bcb4d93af61e853f7163be678210fb34e15c6cedf686b95966450738956"}}) 3.107660749s ago: executing program 0 (id=48): ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) kmq_timedreceive(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$DIOCRADDADDRS(r1, 0xc0184415, 0x0) r2 = kmq_open(&(0x7f00000002c0)='./file0\x00', 0x4, 0x10, &(0x7f0000000440)={0x6, 0x8, 0x2, 0x10000}) kmq_timedreceive(r2, &(0x7f0000000480)=""/131, 0x83, 0x2a4c, &(0x7f0000000540)={0x101, 0x24}) r3 = fork() mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x5) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000180)={0x15, 0x23, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x3, 0x7d86619b, [0x0, 0x9, 0xc, 0x2]}) r5 = kmq_open(&(0x7f0000000000)='./file0\x00', 0x1, 0x41, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') syz_emit_ethernet(0x63, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd602f5105001c0000fe8000000000000000000000000000bbfe8000000000000000000000000000aa32000000000000004e204e20", @ANYRES32=0x41424344, @ANYRESHEX=r3, @ANYBLOB="500000009078000064cb56250b3cf37a270406b962ec946fcfcd903b475e96d97a2dcd88c8175e04de3f6c0c4387169d477026c32dcc5f5e214bae7e0ffd00f0af", @ANYRESOCT=r4]) kmq_timedreceive(r5, &(0x7f0000000340)=""/214, 0xd6, 0x8, &(0x7f0000000080)={0x5, 0x4}) fhopen(&(0x7f0000000280)={{[0x6, 0x9]}, {0x3, 0x100, "b920fa56ba200678eb8d2f4c10ce726e"}}, 0x1) sync() open(&(0x7f0000000100)='./file0\x00', 0x200, 0x3f2) pathconf(0x0, 0x12) 2.366798727s ago: executing program 1 (id=49): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) (async) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) (async) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) (async) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000600)='\xe6\x02\xcb\xef\xe2\xda\xe9\xff\x83\xbc;\xcfJ\x82\x00\x00\x00\x00M\xa3\xc2\xac\x94\x0f', &(0x7f0000000300)=',:!@%&\\`#!\x92(\x00'], &(0x7f00000005c0)=[&(0x7f0000000640)='\t\x00\x00\x00\x00\x00\x00\x00w\x00\a\xa3\x91\xb8\xf5\x83\x8a\x1a\x01\x00\x00\x00\xaf\x1e\x8eZvp\x7f\x19\x10\x15\xca\xee\x9d\xee\x9fP\xab\xac\x85\xee#\xd0\x15Q\xc5\x99\xcb\xcf\xf0\"L\xe0\x069\xfdH1\xfe\xb3x0\x87\xcbRI\x8fx\xb9\x96j\xbd\x11\x0f]\x8e\x1d\x89\x96\xf9[\x8d\xe6\x9ci\x9f\xceH\x13\xd8=\x94\x93\xa5:U\xcf\xa8 \xf1\x964\xef\xee\xe4\xf8\xb9\xf8\xd2\x186\xf3\xa7\x19\x12]\xcb\xd0^\xf9\xb0\xd4\xca(v\v\x91I\xd5\xa4\t\x1c\x1d\x8c\xd3\x1d\x15\x11\x9d\xfcb\x81\xd9\x14\xe4p\x85\xb7 \xcb\xc9o\x83\xe0\x9d\x06\x1c.\x0e\xd7\x91:.\x88\xd8\v\xe4`\xfax\x9d\xe4+z\xb9<\xc6\x97X\x93\xca\x00\xcd\x19\\-q?2$\x1a(\x8d\xe2\xbef\x89\x8a\xe2\xe8\xb8\xc1*\x9e\xfa\x14|@nI\x135\'\xdb\x9c\xa0\xccUY\xd8\x7f\xf3\x1cc\xfc\x06\xf5`3|\xaf\xa3UA\xf9\xff\a\x00\x00\xae\xbb\t\xf7L\x947i\xcf\x16<4\xca\x98r\xc8\xdb\xfbQ\xb9]\x80R\x8e\xff\x8e', &(0x7f0000000500)='{}\'\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='$\x00']) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000180)=0xffff, 0x3ff, 0x0) r1 = accept(r0, &(0x7f0000000140)=@un=@abs={0x8}, &(0x7f00000002c0)=0x8) getsockopt$inet6_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000380)={0x0, 0x3, 0x1}, &(0x7f00000003c0)=0xc) getsockopt$inet6_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000400)={r2, 0x2}, &(0x7f0000000440)=0x8) open$dir(&(0x7f0000000000)='./file0\x00', 0x2, 0x114) (async) socketpair$unix(0x1, 0x1, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) (async) syz_emit_ethernet(0x40, 0x0) (async) bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) (async) readlink(0x0, 0x0, 0x0) (async) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$MDIOCATTACH(r3, 0xc1c06d00, &(0x7f0000000780)={0x0, 0x6, 0x4, 0x0, 0x800000008, 0x4, 0x0, 0x8001, 0x20, 0xa7, 0x0, [0x18, 0x6, 0x0, 0x3, 0x4, 0x4, 0x91e, 0xf, 0x3, 0x7, 0x5, 0x7, 0x9, 0x7, 0x8000001, 0xfffffff3, 0x9, 0xfeff3384, 0x6, 0x2, 0x401, 0x9, 0x10ce0, 0x100, 0xfffffff8, 0x7, 0x6, 0x0, 0x107, 0x5ba, 0x0, 0xffbffffa, 0x9, 0x9e9e, 0x3d5532c0, 0x8, 0xfffeffff, 0x8000, 0x2, 0x1, 0xfff, 0x14, 0x0, 0x7, 0x0, 0x3, 0x800006, 0x80000003, 0xfce, 0x2, 0xfffffff3, 0x6ddbd7a4, 0x4, 0x300, 0xb1, 0x8, 0x2000086, 0x54, 0x20, 0x3, 0x8001, 0x9, 0x7a, 0x8, 0x8, 0xa, 0x8, 0xfffffff5, 0x1000, 0x80, 0x9, 0x7, 0x20006, 0x0, 0x2, 0x9, 0x388d, 0x0, 0x3, 0xfffffffc, 0x3, 0x44000000, 0x80000001, 0xffffffff, 0x5, 0xcd, 0x10000, 0xc, 0x1, 0x8, 0x4000002, 0xe6, 0x7fffffff, 0x5, 0xc0b0, 0x80000081]}) r4 = socket$inet6(0x1c, 0x2, 0xb) connect$inet6(r4, &(0x7f0000000200)={0x1c, 0x1c, 0x1, 0x7f, @mcast2, 0x3}, 0x1c) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r5, 0x0) socket$unix(0x1, 0x2, 0x0) poll(&(0x7f00000002c0), 0x20000000000000e4, 0xfff) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) (async) freebsd10_pipe(&(0x7f0000000240)) (async) __getcwd(&(0x7f0000000000)=""/45, 0x2d) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x20) r7 = fcntl$dupfd(r6, 0x3, 0xffffffffffffffff) write(r7, &(0x7f00000004c0)="96", 0x1) (async) setsockopt(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) 2.252670821s ago: executing program 0 (id=50): r0 = open(&(0x7f0000000380)='./file0\x00', 0x80000000000206, 0x4ebfac6bbaf7949) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x60) r2 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r2, &(0x7f0000000100)=[{&(0x7f00000000c0)='\x00', 0x1}], 0x1, 0x9c83) lchflags(&(0x7f0000000400)='./file0\x00', 0x60091) copy_file_range(r2, 0x0, r1, 0x0, 0x8, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x8) writev(r3, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) copy_file_range(r0, 0x0, r3, 0x0, 0x2, 0x0) vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x9, @sigval_int, @spare=[0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) fork() setsockopt$inet_group_source_req(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={0x0, {{0x10, 0x2, 0x0, @multicast2}}, {{0x10, 0x2, 0x1, @multicast2}}}, 0x108) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) r4 = open(&(0x7f0000000480)='./file0\x00', 0x8000, 0x20) r5 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r4, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7, 0x11, r5, 0x0) mprotect(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x1) r6 = open$dir(&(0x7f00000016c0)='./file0\x00', 0xa182fdacd32160a9, 0xa00) pwritev(r6, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) lchmod(&(0x7f0000000040)='./file0\x00', 0x19e98548cfb12f68) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) msync(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1) readv(r1, 0x0, 0xffffffffffffff97) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r7, 0x0, 0x52, &(0x7f0000000140)={0x3, {{0x10, 0x2, 0x2, @loopback}}, {{0x10, 0x2, 0x3, @broadcast}}}, 0x108) open$dir(&(0x7f0000000000)='./file1\x00', 0x800, 0x0) 2.251531s ago: executing program 1 (id=51): r0 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x5) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) acct(0x0) open$dir(0x0, 0x40000400000002c2, 0xa3) fcntl$lock(0xffffffffffffffff, 0xb, 0x0) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x83) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x31, &(0x7f0000000100)=ANY=[], 0x20) unlink(&(0x7f0000000000)='./file0\x00') sendfile(r0, r2, 0xeb8, 0x8d9, 0x0, 0x0, 0x1c) syz_extract_tcp_res$synack(&(0x7f0000000040)={0x41424344, 0x41424344}, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000140)={0x41424344}, 0x1ff, 0x4) syz_emit_ethernet(0x12f, &(0x7f00000000c0)=ANY=[@ANYBLOB="90ec3f93c1875ac650ee02dd1f6b766b75d0169d216637c6042e9e7c97433eb00204a844245270dfabd3aaa0428717255b743bb3663d4fd7b97822b76d3860409be7000059ae6caa55ca0c33c9f4d8ea1174b6006ec300", @ANYRES32=r4, @ANYRES32=r4]) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344}, 0x5, 0x5) syz_emit_ethernet(0x2a9, &(0x7f0000000280)={@random="dd09f2465956", @empty, [], {@ipv6={0x86dd, {0x8, 0x6, "c7a8b3", 0x273, 0xb, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, @empty, {[@routing={0x1e, 0x2, 0x0, 0xf4, 0x0, [@local={0xfe, 0x80, '\x00', 0x0}]}, @fragment={0x47, 0x0, 0x3d, 0x0, 0x0, 0x2, 0x68}, @dstopts={0x42, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x6}]}, @dstopts={0x51, 0x3, '\x00', [@padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x4}, @pad1, @ra={0x5, 0x2, 0x4}, @padn={0x1, 0x2, [0x0, 0x0]}]}, @routing={0x67, 0x12, 0x1, 0xa, 0x0, [@mcast1, @ipv4={'\x00', '\xff\xff', @rand_addr=0x120bac49}, @mcast2, @remote={0xfe, 0x80, '\x00', 0x0}, @empty, @loopback, @empty, @rand_addr="553c42b90f12d6c9716336a2bd1f661a", @mcast2]}, @routing={0x7c, 0x2, 0x1, 0xd0, 0x0, [@empty]}, @routing={0x2e, 0xe, 0x1, 0x9, 0x0, [@loopback, @mcast1, @mcast1, @mcast2, @mcast1, @loopback, @mcast2]}, @hopopts={0x2f, 0x0, '\x00', [@pad1]}, @routing={0x1c, 0x2, 0x0, 0x3, 0x0, [@mcast1]}], @tcp={{0x0, 0x3, r4, r5, 0x1, 0x0, 0x9, 0x80, 0x6, 0x0, 0x1, {[@timestamp={0x8, 0xa, 0xfffffff8, 0x3}, @window={0x3, 0x3, 0x8}, @sack_perm={0x4, 0x2}]}}, {"89f5b275387c6d805da698875697b0ca82263a51b21f3d4c446afff8be79a9910890d94ec42cbd510088664462050b6369d6eb4d2577134e84035d0407f2e3e09b1425e320875b5eb7a09756e4694fd7069f4213da086f56f3b3f88f3b378ea406e124686885553819a69749709afba75ba84077407e5b8a6a4dd3fea4feec14aff61afc615222825a6e3178f416d8afcd14f42774937d7c6f5480f6a5c4d860f8247ccc8771c8"}}}}}}}) syz_emit_ethernet(0xd1, &(0x7f0000000180)={@random="5c317e90b9fb", @broadcast, [{[], {0x8100, 0x0, 0x0, 0x1}}], {@ipv4={0x800, {{0x15, 0x4, 0x3, 0x9, 0xbf, 0x65, 0x3, 0x66, 0x32, 0x0, @local={0xac, 0x14, 0x0}, @empty, {[@lsrr={0x83, 0xf, 0x2, [@loopback, @multicast2, @multicast1]}, @ssrr={0x89, 0x13, 0x81, [@multicast2, @remote={0xac, 0x14, 0x0}, @loopback, @multicast1]}, @end, @rr={0x7, 0x1b, 0xfa, [@multicast2, @broadcast, @remote={0xac, 0x14, 0x0}, @rand_addr=0xffffffff, @local={0xac, 0x14, 0x0}, @empty]}]}}, @tcp={{0x3, 0x1, r3, r5, 0x1, 0x0, 0x6, 0x8, 0x200, 0x0, 0x2, {[@mss={0x2, 0x4, 0x3}]}}, {"12dfcc98e87e1af7bd1bc0e103c37a17b60b29e30dd1b0ff79452eb1b1877f0e94348c994204096c853468c057158d0013d41065660a9c83ad15e250792df52d25e2d3ecf79977ce4c9c4fb6d068c524ff1824"}}}}}}) rfork(0x85000) 2.24241765s ago: executing program 3 (id=52): bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = kqueue() kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r1 = socket(0x1, 0x1, 0x0) ioctl$SMB_SENDB(r1, 0xc0106924, &(0x7f0000000080)={0x14, 0xfb, 0x0, @byte=0x5, @buf='{>', 0x0, 0x0, 0x0, 0x0}) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000f00)={0xfd7, [{0x3, [0x8, 0x6, 0x7, 0x6, 0x1, 0x0, 0xffffffff, 0x5, 0x80, 0x8, 0x500, 0x8001, 0x2000, 0x80000000, 0x7, 0x0, 0x6, 0x7, 0x2, 0x8, 0xfff, 0x10001, 0x7, 0x8, 0x4d97, 0xff, 0x101, 0x3, 0x6, 0x304, 0x6, 0x2, 0xfffffff9, 0x7, 0x7, 0xff, 0x10000, 0x2, 0x5, 0x2, 0x1, 0x3, 0x6f, 0x22df, 0x401, 0x7fffffff, 0xa7, 0xc, 0x6, 0x4, 0x9d49, 0xb, 0x8001, 0x6, 0x2, 0x1, 0x7f, 0x2, 0x6, 0x80000000, 0x2, 0x96fc, 0x200, 0x0, 0xfffffc00, 0x8, 0x0, 0x1e780, 0x50, 0x8001, 0x4, 0x9, 0x7, 0x3, 0xfffeffff, 0xee, 0x0, 0x8, 0x7fff, 0x0, 0x2, 0x5b23, 0x4, 0xffffffff, 0x1, 0xf05, 0x9, 0x1, 0x9, 0x80000001, 0x8, 0x9, 0x4, 0x7fffffff, 0x8000, 0x2, 0x8001, 0x8, 0x4, 0x3, 0x6, 0x80, 0xb3ab, 0x9]}, {0x4, [0x4, 0x3, 0x1, 0x3, 0x80000000, 0x4, 0x400, 0xeec, 0xf557, 0x8, 0x7fff, 0x8, 0x8, 0x401, 0xb, 0xa, 0xfad6, 0x8, 0x5, 0x6, 0x40, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0xc77e, 0x8, 0x81, 0xc9, 0xa4, 0xfffffff8, 0x2, 0x921, 0x7fffffff, 0x24, 0x2, 0x370c, 0xb00, 0x4, 0x52a, 0x8, 0x7, 0xff, 0x8, 0x4, 0x370a8713, 0x9, 0x6, 0x428, 0xfffffff8, 0x2, 0x7, 0x4, 0x0, 0x5, 0xffff, 0x81, 0x0, 0x8, 0x9, 0x0, 0x7, 0x3, 0x2, 0x2, 0xff, 0x1, 0x4, 0x3, 0x7, 0x2, 0x6, 0x3, 0xbb, 0xffff, 0x8, 0x4, 0x0, 0x9, 0x7, 0x703, 0x0, 0xfffffff9, 0x9, 0x6, 0x4, 0xb32, 0x4, 0x10, 0x9, 0x40, 0x3, 0x4, 0x91, 0x0, 0x0, 0x7fffffff, 0x8, 0x66f53e15, 0x1, 0x8000, 0x4]}, {0x1, [0x826, 0x1000, 0x9, 0xffff8001, 0x3, 0xffffff77, 0x6, 0x1, 0x7, 0x0, 0x9, 0x6621, 0x5, 0x1, 0x6, 0x0, 0x3, 0x44, 0x5, 0x7f, 0x2, 0x40, 0xe, 0x9, 0x1, 0xfffffff7, 0x80, 0x6, 0x7, 0xe51, 0x1ff, 0x2, 0x2, 0xf8000000, 0x40, 0x0, 0x400, 0x10000, 0x7, 0x1, 0x8, 0xc03, 0x3, 0x2, 0x122, 0x7, 0xf, 0x7, 0x31c, 0xcbc0, 0x81, 0x0, 0xffffffff, 0xd08, 0x5, 0x7, 0x1, 0x2, 0x8, 0x9, 0xff, 0x3b, 0x8, 0x23ed011b, 0x5834, 0x8, 0x7fff, 0x1, 0x4, 0x0, 0x5, 0x9, 0xaa, 0x0, 0xa, 0x4, 0x80000001, 0x0, 0x4, 0x7fff, 0x0, 0xdc5, 0x6, 0x4, 0x8, 0x8001, 0x4, 0x9, 0x9, 0x7f, 0x3, 0xd5ca, 0x7, 0x7fff, 0x1, 0x2, 0x80, 0x1d12, 0x3, 0x0, 0xfffffffc, 0xe358, 0x200, 0x5]}, {0x0, [0xfffffff6, 0xb72b, 0xa, 0x9, 0x2, 0x5, 0x9, 0x6, 0x40, 0x3fc3, 0x0, 0x3a, 0x72, 0x7ff3, 0x7, 0x2, 0xdcb, 0x81, 0x1, 0x7fffffff, 0x282d, 0x1ff, 0x10000000, 0x89, 0xffff0000, 0x7fff, 0x10, 0x2, 0x3, 0x4, 0xffffffff, 0xde, 0x3ff, 0x0, 0x6cd9, 0x101, 0x7, 0x1000, 0x2, 0x7f, 0x1, 0xe03, 0x7, 0x5, 0x3, 0x4, 0x1, 0x4, 0x1, 0x2, 0x7f, 0x8, 0xf, 0x9, 0x50, 0x5, 0x0, 0x0, 0x93, 0x1, 0x4, 0x2, 0x18, 0x7ff, 0xd, 0x4, 0x5, 0x7c8, 0x9, 0x9f, 0x7f2d, 0x8fa, 0x1, 0xfffffff9, 0x9a9d, 0x5, 0x6, 0x8, 0x2e, 0x6, 0x1, 0x7f, 0x8, 0x5, 0x0, 0x0, 0x2, 0x40, 0x9, 0x7, 0xd5e, 0x1, 0x1ff, 0x7, 0x3ff, 0x10c, 0x7fff, 0x2, 0x7, 0x7, 0x1, 0x6, 0x6, 0x38]}, {0x1ff, [0x2, 0x0, 0x2, 0x2, 0x3e, 0xe, 0x401, 0xb, 0x0, 0x31, 0xad6b, 0x0, 0x5, 0x1ff, 0x3b, 0x9, 0xd, 0x1, 0x574b, 0x9, 0x5, 0xfffffff7, 0x9, 0x3, 0x7, 0x6, 0xa41, 0x6, 0x7, 0x1, 0x3, 0xa, 0xfffffffb, 0x2, 0x5, 0xe0000000, 0x3, 0x80000000, 0x8001, 0xfffffff9, 0x3, 0x2, 0x553, 0x40, 0x6f4, 0x0, 0x6, 0xd, 0x7, 0x2, 0x2, 0x8, 0x100, 0xd, 0x7, 0xfffffff6, 0xc3, 0x6, 0x8, 0x9, 0x0, 0x2000, 0x3ae, 0x40000000, 0x4, 0xc08, 0x8, 0xffffffc0, 0x9, 0x10001, 0x10001, 0x0, 0x3, 0x200, 0x5, 0x5, 0x8, 0x3, 0x1, 0x3, 0x2, 0x5, 0x7186b6e1, 0x7, 0x4, 0x10, 0x8, 0x7, 0xffffffff, 0xffffffff, 0x85f5, 0x0, 0x1, 0x800, 0x5, 0x5, 0x5, 0x80000001, 0x5, 0x8000, 0x3, 0xffffffff, 0x8, 0x202]}, {0x7db, [0x5, 0x7, 0x7, 0x9, 0x2, 0x6, 0x80000000, 0xffffffff, 0x6, 0x4, 0x6, 0x67d7, 0x8, 0x10001, 0xfffffffa, 0x2, 0x4, 0x6, 0xfffffe01, 0x8, 0xffffff93, 0x3, 0xa37, 0x3ff, 0x8, 0x7c8, 0x5, 0x101, 0x8, 0x2, 0x1000, 0x0, 0x3ff, 0x1, 0x3, 0x6, 0x1f64d413, 0x5, 0x1, 0xfffffffc, 0xedf, 0x2, 0xc, 0x2, 0x8, 0x0, 0x7, 0x9, 0x149, 0x5, 0x2, 0x5, 0x7fff, 0x0, 0x70, 0x4, 0x2, 0x2, 0x5, 0xba38, 0x2, 0x7, 0x2, 0xfffffffa, 0x2, 0x2, 0x9, 0xdd, 0xff, 0x3, 0x401, 0x200, 0x0, 0x9ad, 0x6, 0x91dc, 0x7fffffff, 0x6, 0xf0ff, 0x4, 0x7, 0xff8, 0x8001, 0x0, 0x10000, 0xe, 0x5, 0x1000, 0x622, 0x7fffffff, 0x2e, 0x4, 0x4, 0x2, 0x5, 0x0, 0xe, 0xffffffff, 0xfffffff7, 0x9, 0x7f, 0x20d4, 0x3, 0x401]}, {0xdb6d, [0x8, 0x1, 0xffff8001, 0x6, 0x9, 0x0, 0x2, 0x6, 0xfffffff2, 0x7f, 0x8, 0x8, 0x7, 0xfffff755, 0x6, 0x9, 0x4, 0x5, 0x50f, 0x100, 0x6, 0x5, 0x3, 0x9e3, 0x7, 0xfff, 0x4, 0x7, 0x9, 0x8, 0x2, 0x0, 0xb4d, 0x2, 0x200, 0x4, 0x5, 0x9, 0x7df, 0x2, 0x7ff, 0x7, 0x1196, 0x2, 0x1afa, 0x7, 0xf, 0x80000001, 0x8, 0x4, 0x3, 0x1, 0x5, 0x2, 0x4, 0x9, 0x462, 0xf1, 0xffffffca, 0xad58, 0x66d, 0x7, 0x1, 0x1e, 0x5, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfa, 0x701, 0x81, 0xea2, 0x3, 0x7ff, 0x8, 0xb11, 0x3, 0x1000, 0x2, 0x400, 0x1ff, 0x6, 0x101, 0x6, 0xfffffffe, 0x5, 0x1, 0x81, 0x5, 0x3ff, 0x8, 0x4, 0x4, 0x2, 0x4, 0xfffffff9, 0xf, 0x573, 0xb, 0x6, 0x5, 0x7]}, {0x0, [0x6, 0x55f, 0x7fff, 0xad3, 0x4, 0x0, 0x0, 0x6b, 0x9, 0x101, 0x8, 0x3ff, 0x5, 0x40, 0x8, 0x8, 0x9, 0x0, 0x5, 0x0, 0x3, 0x81, 0xfffffffa, 0x9, 0x401, 0xda, 0x6, 0xfffffff7, 0x200, 0x2, 0xb, 0x1, 0x3, 0x2, 0xd7, 0x0, 0x805, 0xffffffff, 0x40, 0x1, 0xd, 0x8001, 0x0, 0xaca, 0x3, 0xff, 0x5c, 0x100, 0x10000, 0x1, 0xffffffff, 0xffff, 0x40, 0x0, 0x914, 0x8, 0x7, 0x8, 0x6, 0x5, 0xa0, 0x231, 0xffff, 0xf1a, 0x100, 0x6, 0x4, 0x7fffffff, 0x1000c, 0x9, 0x7fff, 0x101, 0x8000, 0x0, 0x3, 0x4, 0x9, 0xffffffff, 0x4, 0x10000, 0x0, 0x4, 0x6, 0xe45, 0x1, 0xd, 0xd7, 0x8000, 0xfffffff7, 0x6, 0x5, 0x200, 0x4, 0x5, 0x7, 0x5, 0x81, 0x8, 0x0, 0x6, 0x4, 0x8, 0xb4f, 0x9]}, {0x3, [0xfffffff5, 0x4, 0x9, 0x401, 0xd97, 0x80000001, 0x0, 0x470, 0x1, 0x6, 0x2, 0x4, 0x2f6229ce, 0x2, 0xa, 0x8, 0x3, 0x4, 0x34, 0x9, 0x0, 0x5e, 0x7fffffff, 0xd2df, 0x54, 0x8, 0x6, 0x7ff, 0x5, 0x3, 0x6, 0x0, 0xffffffff, 0xffffffff, 0x3, 0x80000000, 0x9, 0x2, 0x18, 0x8, 0xff, 0x5, 0x9, 0x4, 0xfdb, 0x0, 0x6, 0x0, 0x6, 0x8, 0x2, 0x400, 0x8, 0x0, 0x8, 0x1, 0x401, 0x2400, 0x1, 0x5, 0x7f, 0x7ff, 0x80, 0x1ff, 0x70c, 0x9, 0x4, 0xb8, 0x1d3, 0x7fff, 0x2, 0xd74b, 0x1000, 0xf, 0xff, 0x6, 0x10, 0xfff, 0x9, 0x1fe0, 0x5, 0x0, 0xffffff80, 0x0, 0xfd9, 0x1000, 0x6, 0xcb4, 0x7b9, 0x0, 0x4, 0x9, 0x6, 0x8, 0xfffffff7, 0x80000000, 0x80000000, 0x7f, 0x800, 0x2, 0x1, 0x1, 0x6, 0x7]}, {0x1, [0x2, 0x6, 0x5, 0x3ff, 0x9, 0x9, 0xfffffff6, 0x3, 0xfffffffd, 0x10000, 0xfffffe01, 0xfffffff7, 0xfffffffc, 0x7fff, 0xffffffb9, 0x32c, 0x9, 0x1, 0x50dc, 0x6, 0x1, 0x8, 0x2e, 0x8a05, 0x7, 0x3, 0xb, 0x1, 0xffff3c32, 0x8001, 0x2, 0xc3e0, 0x2, 0x6e31, 0x3, 0x2, 0x4, 0x8, 0x4, 0xd6, 0xfffffff9, 0x9, 0x9fc, 0x6, 0x81, 0xffffffc0, 0xc2ee, 0x6cb, 0x3, 0x35, 0x68, 0x6, 0xe28a, 0x7, 0xff, 0x8, 0x8, 0x1, 0x9f, 0x6, 0x8, 0x2, 0x4, 0xa4, 0x8, 0x7fff, 0x1, 0xfffff001, 0x0, 0x9, 0xa, 0x274, 0x9, 0x5, 0x9a, 0x9c99, 0x81, 0xc, 0x18, 0x7, 0x0, 0x8, 0x10, 0x7, 0x6, 0x8, 0xff, 0x6, 0x7, 0x4, 0x8, 0x2, 0xaa37, 0x8, 0x5, 0x8, 0x1f, 0x4, 0x2, 0x1, 0xd, 0x1, 0xb9, 0x4]}, {0x0, [0x0, 0x5, 0x1, 0xe, 0x8000, 0x3, 0xafc, 0x401, 0x6, 0x8, 0x0, 0x8fa, 0x7f, 0xfffffff6, 0xdf1, 0xff, 0xb4, 0xc, 0x6, 0x7ff, 0x5, 0x100, 0x10001, 0x3, 0x5, 0x101, 0xffffffff, 0xc, 0x8001, 0xc, 0x5, 0xa227, 0x5, 0x3ff, 0x1, 0x4, 0x1, 0x8, 0x2277, 0x7, 0xe9, 0x3, 0x1, 0x0, 0x2000, 0x8, 0x6, 0x1, 0x3, 0x3, 0x8, 0x5, 0x400, 0xaec, 0xfffffff7, 0x8c86, 0x9, 0x3, 0x8, 0x8, 0xe, 0xa, 0x3, 0x40, 0x10000, 0x1, 0x46, 0x1, 0x82, 0x5, 0x5, 0x7, 0x184, 0xc3f2, 0xfffffffb, 0x8, 0x3, 0x5, 0xfffffff8, 0x0, 0xa436, 0x81, 0x4, 0x6, 0x7, 0x0, 0x100000, 0x3b9, 0xb81a, 0x7, 0x1, 0x3, 0xffffffff, 0x8, 0xe, 0xffffa46a, 0x7fff, 0x0, 0x2, 0x201, 0x4, 0x1, 0x436f95d4, 0x1]}, {0x5, [0x0, 0xffffffff, 0x0, 0x5, 0x7, 0x2, 0x2, 0x7ff, 0x438, 0x2, 0x83, 0x4, 0x8, 0x10001, 0x5e54, 0x4, 0xd, 0x8, 0x4b, 0x3, 0x9, 0x7000000, 0x3, 0x8, 0x1, 0x10001, 0xf39a, 0x17, 0x5, 0xd94f, 0x3, 0x4, 0x8, 0x9, 0x6, 0x4, 0x7, 0x4, 0x2, 0x10000, 0x8, 0x4e2, 0x10, 0x0, 0xd, 0x9, 0x0, 0x1, 0x4, 0xda, 0x28, 0x10001, 0x29, 0xff, 0x7, 0x61a, 0x3, 0x6, 0x5, 0x0, 0x3, 0x6, 0x7ff, 0x3b0, 0x8, 0x3, 0x2, 0x0, 0xc34c, 0xd, 0xe1, 0x5, 0x6, 0x6, 0x8001, 0x3, 0x4, 0x8, 0x8069e, 0x4, 0xd, 0x0, 0x3, 0x2, 0x4, 0x0, 0x7fffffff, 0x5, 0x4, 0x5, 0x3, 0x5, 0x2, 0x88, 0x81, 0x6, 0x10001, 0x8, 0x7f, 0x200, 0x0, 0x3, 0x4, 0x8]}, {0x4000000, [0x80, 0x9, 0x4af, 0x4, 0x2, 0x2, 0x6, 0x7, 0xff, 0x10001, 0x7, 0x2, 0x3, 0x3, 0x9eca, 0xc9, 0x9, 0xff, 0x7f, 0xfffffff8, 0xa250, 0x6, 0x92, 0xfffff989, 0x3, 0x5, 0x1, 0x4, 0x3, 0x94, 0x1, 0xfffffff9, 0x800, 0x9, 0x2, 0xf8, 0xcca, 0xffffff01, 0x5c, 0x2, 0x10, 0x4, 0xd, 0x15f5, 0x9, 0x7f, 0x5, 0xfffffffa, 0x2, 0xe0000000, 0x8001, 0x9, 0x1, 0x8, 0xc327, 0xfffffffe, 0xea, 0x9, 0x9, 0x8000, 0x2, 0x8000, 0x8, 0x3ff, 0x5, 0x4, 0x5, 0x81d2, 0x4, 0x6, 0x40, 0x9a, 0x5, 0x0, 0x7ff, 0x6, 0x1, 0x718f, 0x3, 0x6, 0x3, 0x4, 0x8, 0x8001, 0x200, 0x802e, 0x2, 0x5, 0x10000, 0x81, 0x101, 0x1, 0xd, 0x9, 0x0, 0x0, 0x7, 0x3, 0xf57a, 0x1ff, 0xff, 0x10000001, 0x12a, 0x9]}, {0x6, [0x5, 0xfffffc01, 0x6366, 0xf, 0x4, 0x432, 0x3, 0xba6c0000, 0x0, 0x7, 0x4c000000, 0x3, 0x0, 0x3ff, 0x2, 0x4, 0xcc39, 0x7, 0x3, 0x6, 0x3, 0xb, 0x6, 0x0, 0x7ff, 0x6d0, 0x187e9fac, 0x7, 0x18, 0x3, 0x1, 0x2, 0xfffffffb, 0x1, 0x6, 0x4, 0x5, 0x4, 0x8, 0x88, 0x0, 0x80000000, 0xb, 0x4, 0x9, 0x3ff, 0x7, 0xd8b, 0x502e, 0x7, 0x7, 0x4, 0x6, 0xffffffff, 0x8, 0x1, 0x1ff, 0x97f, 0x310, 0x83, 0xcc0, 0xc, 0x169a, 0x10000, 0x43ad4fa3, 0x2, 0x9, 0x6, 0x401, 0xf, 0xffffff7f, 0x4b8a, 0x8, 0x7, 0x8ca9, 0x3, 0x9, 0xd7, 0x374, 0x8, 0x5, 0x4, 0x3, 0x5, 0x7fff, 0x7, 0x800, 0x0, 0x4, 0x10001, 0x80000001, 0x7fff, 0x7, 0xc9, 0x800, 0x9, 0x80, 0x8, 0xd2, 0x2, 0x1, 0x0, 0x8330, 0x9]}, {0x200, [0x784e2393, 0x4, 0x6, 0x9, 0xedf, 0x1, 0x3, 0x101, 0x9, 0x0, 0x101, 0x10, 0xf, 0x1, 0xc5, 0xa588, 0x0, 0xe, 0x6, 0x2, 0x0, 0x8, 0xe, 0xa, 0x8, 0x2, 0x7e, 0x0, 0x6, 0x80000000, 0x77, 0x2, 0x1000, 0x199, 0x2, 0xbf63e0, 0x0, 0xc6, 0x0, 0x400, 0x2, 0x140, 0x5, 0x6, 0x0, 0x9, 0xc7, 0x3c, 0xffffffff, 0x0, 0x5, 0x0, 0x8, 0x3, 0x2, 0x3486238e, 0x0, 0x7, 0xffffffff, 0xd93, 0x6, 0x2, 0x8, 0xfb6, 0x7, 0x5, 0x2, 0x1, 0x1, 0x80000001, 0x9, 0xc, 0x3, 0x8, 0xd6b, 0x36, 0x6, 0xb8, 0x0, 0x9, 0xc, 0x0, 0x7, 0x6, 0x69e1, 0x100, 0x4, 0xfe, 0x4800000, 0x612, 0xfffffff8, 0xbe1, 0xe, 0xffffff7f, 0x5a8, 0x8001, 0x4e8a095, 0x6, 0x9, 0xffffffff, 0x3, 0xbbe, 0x5, 0x50]}]}) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = kqueue() kevent(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x0) kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3, 0x10, r2, 0x6) ktimer_settime(0x0, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='newreno\x00', 0x8) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x52, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000100)={0x8, 0x0}) rfork(0x82010) open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) flock(r4, 0x3) r5 = open(&(0x7f0000000380)='./file0\x00', 0x205, 0x0) fcntl$lock(r5, 0x9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000300010005}) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) extattr_set_file(0x0, 0x2, &(0x7f0000000140)='\x00\x00', 0x0, 0x0) 1.886868305s ago: executing program 0 (id=53): r0 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) (async) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r1 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) (async) symlink(0x0, 0x0) (async) setuid(0xffffffffffffffff) (async) socket(0x1b, 0x3, 0x0) (async) __specialfd$inotify(0x2, 0x0, 0x0) (async) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) 1.81632067s ago: executing program 0 (id=54): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80000002, &(0x7f0000000040)="e2", 0x1, [], 0x1, 0x5, 0xfffffffc, {0x800000000, 0x7, 0x0}, {0x0, 0x8, @sival_int=0xe, @thr={0x0, 0x0}}}) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) r2 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) shmget(0x1, 0x2000, 0x82a, &(0x7f0000ffb000/0x2000)=nil) socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x1e0) ioctl$DIOCNATLOOK(r3, 0x4004667f, &(0x7f0000000600)) r4 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r4, 0xffff, 0x1001, &(0x7f0000000080)=0x101, 0x4) bind$inet6(r4, &(0x7f0000000140)={0xfffffeef, 0x1c, 0x0, 0x0, @empty, 0x4}, 0x1c) connect$inet6(r4, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r5 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) sendfile(r5, r4, 0x0, 0x400000000000, 0x0, 0x0, 0x2d) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r4, 0x6, 0x29, 0x0, 0x0) 1.426746919s ago: executing program 1 (id=55): r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2000000, 0x2) mmap(&(0x7f00007ff000/0x800000)=nil, 0x800000, 0x1, 0x12, r0, 0x5) sync() r1 = accept(0xffffffffffffffff, &(0x7f0000000040)=@un=@file={0x44, 0x0, ""/66}, &(0x7f00000000c0)=0x44) write(r1, &(0x7f0000000100)="a0a7812a8bbbb619da935e2de69b37c0a7b19a522c4d11ae0fb33a16b36d549420764c824c94fe75b01fbc4e5c0e30949dd4d3074cd191857ac185e34b4ff7ef932ef3897bbbcd6d98a46ea8a79da08b5865c9226b9d45a8c4c78fb592444b96ad8875ba44d3b2c1713dbbcb02ab4acfbbb3d4d515e0c586c69e5e578a4a837b4b438a7e671fe6594899714aa91ab66b77cbb5cc39965d6bbb82e67584da", 0x9e) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f00000001c0), 0x200000, 0x0) ioctl$BIOCSETWF32(r2, 0x8008427b, &(0x7f0000000200)={0x2, 0x3}) getfsstat(&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x928, 0x1) chown(&(0x7f0000000240)='./file0\x00', r3, 0x0) execve(&(0x7f0000000bc0)='./file0\x00', &(0x7f0000000e00)=[&(0x7f0000000c00)='/dev/bpf\x00', &(0x7f0000000c40)='+:^\x00', &(0x7f0000000c80)='/dev/bpf\x00', &(0x7f0000000cc0)=':,\x00', &(0x7f0000000d00)='[\\\x00', &(0x7f0000000d40)='/dev/bpf\x00', &(0x7f0000000d80)='\v#[\x00', &(0x7f0000000dc0)='\x00'], &(0x7f0000000f80)=[&(0x7f0000000e40)='/dev/bpf\x00', &(0x7f0000000e80)='!%}[@[\x00', &(0x7f0000000ec0)='/dev/bpf\x00', &(0x7f0000000f00)='.\x00', &(0x7f0000000f40)='/dev/bpf\x00']) symlink(&(0x7f0000000fc0)='./file0\x00', &(0x7f0000001000)='./file0\x00') r4 = __specialfd$eventfd(0x1, &(0x7f0000001040)={0xfffffff3, 0x2}, 0x8) ioctl$DIOCBEGINADDRS(r4, 0xc4704433, &(0x7f0000001080)="53a7945d1b2031105917c7a2e1b33f7f6edbeba5f9916c8d8196acd1e8450eac5b8ffe21d87678605e057574e99fc29415cd475442b38c2bba84fa8e358964aa9fbe15e0280ec5c2e7405b6fe9be56155d3323a76aa2f3404e9071d38575ac0f5fe50f1bf34825a173aafe88bbd2d08495c35c5fa94c8b527a49c5037db4b43fbde40cec8e3d1895d2a9aafc7379f420835a610945eed71f10c949df6e67123032e6fdd209075bda595d293da9b109cc99c8aa2b99ed2d74849d43bad54c7d919e41873c3dc00c5d3c90b604712d3153f3d9a405") mkdir(&(0x7f0000001180)='\x00', 0x4e) recvfrom$inet(r1, &(0x7f00000011c0)=""/25, 0x19, 0x40082, &(0x7f0000001200)={0x10, 0x2, 0x0, @broadcast}, 0x10) r5 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000001240)={0x0, 0xc8e}, &(0x7f0000001280)=0x8) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r5, 0x84, 0x8004, &(0x7f0000001300)={r6, &(0x7f00000012c0)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @empty}]}, &(0x7f0000001340)=0x10) msgget(0x2, 0x206) r7 = semget$private(0x0, 0x3, 0x100) __semctl$GETZCNT(r7, 0x0, 0x7) mlock(&(0x7f0000d3f000/0x2000)=nil, 0x2000) r8 = openat$crypto(0xffffffffffffff9c, &(0x7f0000001380), 0x400, 0x0) extattr_list_link(&(0x7f00000013c0)='./file0\x00', 0x3, &(0x7f0000001400)=""/153, 0x99) mkdirat(r4, &(0x7f00000014c0)='./file0\x00', 0x0) statfs(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)) rmdir(&(0x7f0000001e80)='./file0\x00') ioctl$UI_BEGIN_FF_UPLOAD(r4, 0xc06855c8, &(0x7f0000001ec0)={0x63595bad, 0x10, {0x54, 0xfff9, 0x5, {0x7, 0x8}, {0x8, 0x4}, @constant={0x5, {0x2, 0x400, 0x2, 0x96}}}, {0x55, 0x52e8, 0x8, {0x7, 0x200}, {0x2, 0x400}, @rumble={0x2, 0x10}}}) bind$bt_hci(r8, &(0x7f0000001f40)={0x0, 0x2}, 0x3) 1.306801665s ago: executing program 3 (id=56): kmq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x4}) sendto$unix(0xffffffffffffffff, &(0x7f0000000a00)="b10005019000e81ea8fef96ec2873fd3357ae26c", 0x14, 0x20080, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$DIOCCHANGERULE(r0, 0xcbe0441a, &(0x7f0000000040)) mkdir(&(0x7f00000001c0)='./file2\x00', 0x1f3) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x48, &(0x7f0000000200)={@multicast1, @loopback, @multicast1}, 0xc) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40, 0x10) r3 = open$dir(&(0x7f00000000c0)='.\x00', 0x4, 0x102) mkdirat(r3, &(0x7f0000000100)='./file1\x00', 0x0) r4 = open$dir(&(0x7f00000002c0)='.\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000200)='./file1\x00', r4, &(0x7f0000000140)='./file0/file0\x00') procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000040)={0x9, 0x1, 0x0, 0x24000}) socket(0x2, 0x30000001, 0x0) socket(0x1c, 0x1, 0x0) chflags(&(0x7f0000000300)='./file0\x00', 0x4) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)="b10005019000e803034808c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbd83a699a1f132e27acb5", 0x53, 0x0, 0x0, 0x0) r5 = open(0x0, 0x205, 0x0) fcntl$lock(r5, 0xc, &(0x7f0000000180)={0x4, 0x3, 0x0, 0x1000300010008, 0xffffffffffffffff}) pipe2(0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_accept_filter(0xffffffffffffffff, 0xffff, 0x1000, &(0x7f0000000080)={'accf_http\x00', "90cb54647f06bc248b79e84dba7cfcc0b007d7b67ba0c9adf843a2d1c2df52100000007ba751ffa152a7ee7423040a6aeedbf8db8c487e6e03002f86a3a3a2544f566e177f817dd151cacab7ae6358d66d755bd5e56aeca85c427b829a4a7a39209eafae79ae0a079a432c3eb62cbeb96c47e0da52cf97c8f1eeb87a2b481c05b51c04d03302dafbd9f712fd75fca578c8e003daea02de910fe49b770eb72f10320e420ec6382fc4ca19395691836f81322badfa542e7209c394b31361dc058520f8f343e93efc8ec27672524aa48d2c2d16047149cf40e65479466fdfd4924c000100"}, 0xec) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mount(&(0x7f0000000080)='cd9660\x00', 0x0, 0x80000, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) r6 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r6, &(0x7f0000000180)='./file1\x00', 0x0) renameat(r6, &(0x7f0000000380)='./file1\x00', r2, &(0x7f0000000280)='./file0\x00') 1.24672052s ago: executing program 1 (id=57): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1011, &(0x7f0000000000)=0x69, 0x4) (async, rerun: 64) socketpair(0x2, 0x5, 0x6, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) r3 = getppid() fcntl$setown(r0, 0x6, r3) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x220002, 0x5c) mkdirat(r4, &(0x7f00000000c0)='./file0\x00', 0x1) (async) getsockopt$inet6_sctp_SCTP_EVENT(r2, 0x84, 0x1e, &(0x7f0000000100)={0x0, 0x8, 0x5}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x1a, &(0x7f0000000180)={r5, 0x8}, 0x8) (async) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f00000001c0)={r5, 0xdd, "a22f203cf4ceaa079d1c589694bc5b2be883f3b6fd7f9262d7d42c04aa361518e970513e0f12a2679cb5f8eaf6d337395423cde212cb709af7f34f0cca29098a8f73586b460a37d0eb7f0db58b91cf76ca0b623c269c33b25d6f10cbbf5927bce790f75c10a3e69043f87762dd27d6855274e467a723ff0b64b36d8ac95f56a7ab3a731bf01f547d6b86a9a06e698c21baa0360161b6ad567971eaf8cb8f4fbb8c4a1005b0ca51f800f3954deb0942b747de90821ee3f3275c54aedb03e25c32a1ff3c14ae414932958a3659cf640aa53671716064672ab1bc5281d85d"}, &(0x7f00000002c0)=0xe5) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000300)={r6, 0x7ff, 0x1, [0x7]}, 0xa) (async) r7 = openat$efidev(0xffffffffffffff9c, &(0x7f0000000340), 0x1, 0x0) __cap_rights_get(0x8, r7, &(0x7f0000000380)) getsockname$unix(r1, &(0x7f00000003c0)=@abs={0x8}, &(0x7f0000000400)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xb, &(0x7f0000000440)={0x8, 0x80, 0xa20, 0xc, 0x2bc, 0x1, 0x2000000, 0xc, r5}, &(0x7f0000000480)=0x20) (async) getsockopt$inet_opts(r2, 0x0, 0x1, &(0x7f00000004c0)=""/10, &(0x7f0000000500)=0xa) (async) r9 = socket$inet_udp(0x2, 0x2, 0x0) r10 = dup2(r9, r7) (async, rerun: 32) sendto$inet6(r1, &(0x7f0000000540)="99cd3fba748c1d29244305cdf826ca059ce3784d", 0x14, 0x10c, &(0x7f0000000580)={0x1c, 0x1c, 0x1, 0x95, @loopback}, 0x1c) (async, rerun: 32) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f00000005c0)={0xd86d, 0x2ed2, 0x2, 0x4}, 0x8) (async) cap_rights_limit(r9, &(0x7f0000000600)=[0x3cd]) getsockopt$inet_sctp_SCTP_CONTEXT(r10, 0x84, 0x1a, &(0x7f0000000640)={r8, 0x4}, &(0x7f0000000680)=0x8) (async) extattr_delete_fd(r2, 0x3, &(0x7f00000006c0)='/dev/efi\x00') (async) truncate(&(0x7f0000000700)='./file0\x00', 0x7fffffffffffffff) r11 = open$dir(&(0x7f0000000740)='./file1\x00', 0x200, 0x108) (async, rerun: 64) mkdir(&(0x7f0000000780)='./file1\x00', 0x12) (rerun: 64) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r10, 0x84, 0x11, &(0x7f00000007c0)=0x9, 0x4) connectat$unix(r11, r10, &(0x7f0000000800)=@abs={0x8, 0x0, 0x0, 0x2}, 0x8) sendfile(r4, r0, 0x8000, 0x4, &(0x7f00000009c0)={&(0x7f0000000880)=[{&(0x7f0000000840)="152d1953d5c6e9347230a81027653ed9b167dc2af34d4d905c6b7f364ca71b48393b3866f5b9136b75a5aedc89b5713c7c6e", 0x32}], 0x1, &(0x7f0000000980)=[{&(0x7f00000008c0)="ebefe39182553078515da8c751cb598d53bd9dfeea6d2fe6f8a35fc308c86e67adac2bd4256b0b5df3d84402584a7eb48a02c003d6b475e9a1eadb8c1f33a7e54551520331ba16c4eb9d425db590a1012c857ee837ce9ebddcd09fb8ce5985046248bdc068dbfa4224d12e67807cd046283cd86787428b9d3edff77ec0c796101b64a186c1f19354d8cb1409", 0x8c}], 0x1}, &(0x7f0000000a00), 0x0) (async) symlink(&(0x7f0000000a40)='./file1\x00', &(0x7f0000000a80)='.\x00') 1.246324501s ago: executing program 1 (id=58): open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x19c) setreuid(0xee00, 0x0) r0 = getuid() chown(&(0x7f0000000180)='./file0\x00', r0, 0x0) cpuset_getaffinity(0x3, 0x2, 0x0, 0x8, &(0x7f0000000040)) setgid(0x0) mlock(&(0x7f000068c000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c5, 0x0, [0x7ffffffffc, 0xfffffffffffffffc, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) extattr_delete_fd(r1, 0x0, &(0x7f00000001c0)='\'\x17.)#\x00') freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) ksem_init(&(0x7f0000000100)=0x0, 0x0) ksem_post(r2) ksem_destroy(r2) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x8001, 0x400, 0x0, 0x1}, {0x0, 0xffffffffffffffff, 0x91, 0x2, 0x0, 0x10}], 0x2, 0x0, 0x0, 0x0) shmget(0x1, 0x2000, 0x42, &(0x7f00002a9000/0x2000)=nil) setuid(r0) freebsd11_statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)) madvise(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x9) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0xc00, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f00000000c0)={0x9, 0x1d, 0xffffffffffffffd8, 0x0, 0x18, &(0x7f0000000040)="70638953e90cef7e00080000000b000000000000916d99e9", 0x6, 0xfdffffff}) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x94659db2cce5c9d8, 0x0) rfork(0x96014) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x180, 0x0) 1.196868405s ago: executing program 2 (id=59): r0 = socket(0x1c, 0x3, 0x0) connect$inet6(r0, &(0x7f0000000380)={0x1c, 0x1c, 0x0, 0x4, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) (async) openat$bpf(0xffffff9c, 0x0, 0x1, 0x0) (async, rerun: 32) r1 = kqueue() (rerun: 32) kevent(r1, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) (async, rerun: 64) getpeername$unix(r0, &(0x7f00000002c0)=@abs={0x8}, &(0x7f0000000340)=0x8) (rerun: 64) socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) (async) nanosleep(&(0x7f0000000100)={0xfffffffffffffffd, 0x50}, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f00000000c0)={0x15, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0x7d86699a}) ioctl$CIOCCRYPT(r2, 0xc0306367, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x10000, &(0x7f0000000100), 0x0, 0x0, 0x0}) (async) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getpgrp(0xffffffffffffffff) (async, rerun: 32) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) (rerun: 32) r3 = __specialfd$inotify(0x2, &(0x7f00000001c0)={0x100004}, 0x4) (async) r4 = inotify_add_watch_at(0xffffffffffffff9c, 0xffffffffffffffff, &(0x7f0000000200)='./file0/file0/file0\x00', 0x62) inotify_rm_watch(r3, r4) (async) sync() (async) thr_suspend(0x0) (async) sync() mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) (async) sendmsg$unix(r0, &(0x7f0000001440)={0x0, 0x0, 0x0}, 0x0) (async) symlinkat(&(0x7f0000000080)='./file0/file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') 276.751138ms ago: executing program 1 (id=60): r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) sendmsg$inet6_sctp(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x14, 0x80}, 0x101) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, 0x0, &(0x7f0000000040)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xe, 0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x8) procctl$PROC_TRACE_CTL(0x2, 0x0, 0x7, 0xffffffffffffffff) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) r2 = open(0x0, 0x18289, 0x110) inotify_add_watch_at(r2, 0xffffffffffffffff, 0x0, 0x210000c6) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) syz_emit_ethernet(0x0, 0x0) ftruncate(r1, 0x80002) aio_suspend(0x0, 0x0, 0x0) mkdir(0x0, 0x4a) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r3, 0x6, 0x27, &(0x7f0000000140)={&(0x7f0000000080)="00b2c06df480cfe19f0da47ac0235414", 0x0, &(0x7f0000000040)="cf", 0xb, 0x10, 0x0, 0x7, 0x1, 0x0, 0x3, 0x3, "00ff03ff8e3500"}, 0x40) rfork(0x85000) openat(0xffffffffffffffff, 0x0, 0x200, 0x69) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20411, 0xffffffffffffffff, 0x0) r4 = socket(0x20, 0x5, 0x0) setsockopt$sock_int(r4, 0xffff, 0x1004, &(0x7f0000000180)=0x5, 0x4) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) chroot(0x0) 186.742058ms ago: executing program 0 (id=61): socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) sendto(r1, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) (async) dup2(r0, r1) (async) setsockopt$sock_int(r1, 0xffff, 0x1002, &(0x7f0000000340)=0xff, 0x4) (async, rerun: 32) procctl$PROC_REAP_ACQUIRE(0x0, 0x0, 0x2, 0x0) (rerun: 32) syz_emit_ethernet(0xfff, 0x0) (async, rerun: 64) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, 0x0) (async, rerun: 64) sigtimedwait(&(0x7f0000000200)={[0x6, 0x16, 0x7, 0x1]}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @sival_int, @poll}, &(0x7f0000000380)={0x3, 0xaf}) (async) openat$md(0xffffffffffffff9c, 0x0, 0x100, 0x0) (async) fork() (async) sigsuspend(0x0) fork() mknodat(0xffffffffffffffff, 0x0, 0x1000, 0x0) truncate(0x0, 0x8001) (async) open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) (async, rerun: 64) truncate(&(0x7f00000002c0)='./file0\x00', 0x1000) (rerun: 64) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0xe9) copy_file_range(r2, 0x0, r2, &(0x7f0000000180)=0xffff, 0x3ff, 0x0) (async) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x100, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) sendfile(r3, r6, 0x1, 0x4000e8030000, 0x0, 0x0, 0x1) (async) rfork(0x5000) socket$inet_tcp(0x2, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) (async) getsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000000)=""/4096, &(0x7f0000001000)=0x1000) (async) socket$inet_tcp(0x2, 0x1, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) (async, rerun: 32) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000001080)) (rerun: 32) 116.784703ms ago: executing program 2 (id=62): r0 = socket$inet(0x2, 0x1, 0x0) r1 = fhopen(&(0x7f00000000c0)={{[0x186, 0xcbab]}, {0x8, 0x9, "3502674171382fe972ba28792c173ac4"}}, 0x100) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) freebsd10_pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000000)={0x9, 0x3, 0x2}) setsockopt$sock_timeval(r2, 0xffff, 0x1005, 0x0, 0x0) listen(r0, 0x14000000) sigtimedwait(0xfffffffffffffffe, 0x0, &(0x7f0000000100)={0x9, 0x138}) setsockopt$inet6_sctp_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x10, &(0x7f0000000280)=0xfffffc00, 0x4) setsockopt$inet_mreqsrc(r0, 0x0, 0x47, &(0x7f0000000080)={@multicast1, @broadcast, @multicast2}, 0xc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x80, 0x46) aio_write(&(0x7f0000001b00)={r4, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x40000, 0x1ff], 0x0, 0x2, 0x0, {0xffffffffffffffff, 0x4, 0x0}, {0x3, 0x0, @sival_ptr=0x400, @spare=[0x1, 0x2, 0x100000, 0x33518c07, 0x8, 0x7fffffff, 0x800000000, 0xffff]}}) sendto$unix(r3, &(0x7f0000000180)="03799ac748fc7b9e56567af7c96b9ff8e54dee7ccbb2159e8b5ec51e68d498f3d3505fdf7b9a03b8ff540525bdfec5e0fa786d5cdec84ac7894d400ad73f32006550690bfac28826facb03579b07701200ed3b041adf7ffe27536a4d40ac62ec217d137b6d0a375a37826a0322c6170f9265897b050bb2adb6236fb22002852a4e04abe3e4ff6d50a6c8871e9d7645227e71c24814db446701c0656f6d06c1b096a8e11ed2cf09ae09639b95a89be2d0534b8c3f1d0a3b7441070fd384aa9496599fb5fa159bf5dc0e301f59bc6d8650afcdd767bc62056472d951d6f39a7a19e839d2a23994488e49f0bb8300f21681535d69f8", 0xf4, 0x8, 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x10000) ioctl$KDSETLED(r4, 0x20044b42) acct(0x0) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) 36.784971ms ago: executing program 2 (id=63): openat$crypto(0xffffffffffffff9c, &(0x7f0000000700), 0x100, 0x0) (async) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000700), 0x100, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, &(0x7f00000003c0)={0x0, &(0x7f00000000c0)=[@in={0x10, 0x2, 0xffffffffffffffff, @loopback}, @in={0x10, 0x2, 0xffffffffffffffff, @rand_addr}, @in={0x10, 0x2, 0xffffffffffffffff, @broadcast}]}, &(0x7f0000000440)=0x10) (async) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, &(0x7f00000003c0)={0x0, &(0x7f00000000c0)=[@in={0x10, 0x2, 0xffffffffffffffff, @loopback}, @in={0x10, 0x2, 0xffffffffffffffff, @rand_addr}, @in={0x10, 0x2, 0xffffffffffffffff, @broadcast}]}, &(0x7f0000000440)=0x10) setsockopt$inet6_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1, &(0x7f0000000140)={r1, 0xffffffff, 0x5, 0x4e}, 0x22) open(0x0, 0x1, 0x1d7) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) (async) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) chmod(&(0x7f0000000400)='./file0\x00', 0xb15c7135d99ca56b) fstat(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) chown(&(0x7f0000000240)='./file2/file1\x00', r2, r3) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) kqueue() (async) r4 = kqueue() kevent(r4, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0xc00, 0x0) (async) openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0xc00, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x188}, 0x0) connect$unix(r5, &(0x7f0000000000)=@abs={0x8, 0x1, 0x0, 0x2}, 0x8) (async) connect$unix(r5, &(0x7f0000000000)=@abs={0x8, 0x1, 0x0, 0x2}, 0x8) recvmsg(r6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0xa86a7001833bc137) r7 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BIOCSETF(r7, 0x80104267, &(0x7f00000001c0)={0x1, &(0x7f00000002c0)=[{0x94, 0x0, 0x8, 0x1}]}) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) chdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f00000004c0)='./file2\x00', 0xc0) statfs(&(0x7f0000000140)='./file0\x00', 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) (async) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x600, 0x170) unlink(&(0x7f0000000280)='./file0\x00') socket$unix(0x1, 0x2, 0x0) (async) r8 = socket$unix(0x1, 0x2, 0x0) ioctl$SMB_SENDB(r8, 0xc020697c, &(0x7f0000000100)={0x67, 0x69, 0x66, @buf="fba0", @buf="f6b6", 0xfff, 0x0, 0x0, 0x0}) (async) ioctl$SMB_SENDB(r8, 0xc020697c, &(0x7f0000000100)={0x67, 0x69, 0x66, @buf="fba0", @buf="f6b6", 0xfff, 0x0, 0x0, 0x0}) rfork(0x4) (async) rfork(0x4) 0s ago: executing program 32 (id=56): kmq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x4}) sendto$unix(0xffffffffffffffff, &(0x7f0000000a00)="b10005019000e81ea8fef96ec2873fd3357ae26c", 0x14, 0x20080, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$DIOCCHANGERULE(r0, 0xcbe0441a, &(0x7f0000000040)) mkdir(&(0x7f00000001c0)='./file2\x00', 0x1f3) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x48, &(0x7f0000000200)={@multicast1, @loopback, @multicast1}, 0xc) r2 = open(&(0x7f0000000240)='./file0\x00', 0x40, 0x10) r3 = open$dir(&(0x7f00000000c0)='.\x00', 0x4, 0x102) mkdirat(r3, &(0x7f0000000100)='./file1\x00', 0x0) r4 = open$dir(&(0x7f00000002c0)='.\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000200)='./file1\x00', r4, &(0x7f0000000140)='./file0/file0\x00') procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000040)={0x9, 0x1, 0x0, 0x24000}) socket(0x2, 0x30000001, 0x0) socket(0x1c, 0x1, 0x0) chflags(&(0x7f0000000300)='./file0\x00', 0x4) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)="b10005019000e803034808c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbd83a699a1f132e27acb5", 0x53, 0x0, 0x0, 0x0) r5 = open(0x0, 0x205, 0x0) fcntl$lock(r5, 0xc, &(0x7f0000000180)={0x4, 0x3, 0x0, 0x1000300010008, 0xffffffffffffffff}) pipe2(0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_accept_filter(0xffffffffffffffff, 0xffff, 0x1000, &(0x7f0000000080)={'accf_http\x00', "90cb54647f06bc248b79e84dba7cfcc0b007d7b67ba0c9adf843a2d1c2df52100000007ba751ffa152a7ee7423040a6aeedbf8db8c487e6e03002f86a3a3a2544f566e177f817dd151cacab7ae6358d66d755bd5e56aeca85c427b829a4a7a39209eafae79ae0a079a432c3eb62cbeb96c47e0da52cf97c8f1eeb87a2b481c05b51c04d03302dafbd9f712fd75fca578c8e003daea02de910fe49b770eb72f10320e420ec6382fc4ca19395691836f81322badfa542e7209c394b31361dc058520f8f343e93efc8ec27672524aa48d2c2d16047149cf40e65479466fdfd4924c000100"}, 0xec) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mount(&(0x7f0000000080)='cd9660\x00', 0x0, 0x80000, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) r6 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r6, &(0x7f0000000180)='./file1\x00', 0x0) renameat(r6, &(0x7f0000000380)='./file1\x00', r2, &(0x7f0000000280)='./file0\x00') kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.207' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe0054218800 Expensive callout(9) function: 0xffffffff819be3e0(0) 0.003572454 s Out of ktrace request objects. md0: truncating fractional last sector by 1 bytes Warning! syz-executor[936] uses SF_SYNC sendfile(2) flag. Please follow up to https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=287348. if_delmulti_locked: detaching ifnet instance 0xfffffe0007795000 SYZFAIL: SIGILL Connection to 10.128.1.207 closed by remote host. if_delmulti_locked: detaching ifnet instance 0xfffffe0007793800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217800 FreeBSD/amd64 (ci-freebsd-main-8.us-central1-b.c.syzkaller.internal) (ttyu0) login: if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217800 pid 781 (sh), jid 0, uid 0: exited on signal 4 (core dumped) pid 337 (dhclient), jid 0, uid 0: exited on signal 4 (core dumped) set $lines = 0 pid 742 (getty), jid 0, uid 0: exited on signal 4 (core dumped) pid 957 (syz-executor), tap1: tun/tap protocol violation, non-controlling process closed last. ifaddr cache = 0xfffffe0057f0ba80 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0054218000 tap1: link state changed to DOWN Password:if_delmulti_locked: detaching ifnet instance 0xfffffe0054218000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054218000 pid 334 (dhclient), jid 0, uid 0: exited on signal 4 (core dumped) pid 745 (getty), jid 0, uid 0: exited on signal 4 (core dumped) pid 769 (sh), jid 0, uid 0: exited on signal 4 (core dumped) pid 741 (getty), jid 0, uid 0: exited on signal 4 (core dumped) pid 744 (getty), jid 0, uid 0: exited on signal 4 (core dumped) pid 735 (sh), jid 0, uid 0: exited on signal 4 (core dumped) pid 743 (getty), jid 0, uid 0: exited on signal 4 (core dumped) pid 740 (getty), jid 0, uid 0: exited on signal 4 (core dumped) pid 739 (getty), jid 0, uid 0: exited on signal 4 (core dumped) Login incorrect login: if_delmulti_locked: detaching ifnet instance 0xfffffe0054218000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054218000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054218000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl