last executing test programs: 29.288492292s ago: executing program 1 (id=268): r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6(0x1c, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="ff070a791b4375202b5c2baf2781e604"}, 0x1c) linkat(0xffffffffffffff9c, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0) connect$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0000000000114b70380dbb00086000"}, 0x1c) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001400)={{0x0, 0x0, 0x0, 0x0, 0xa0, 0xd, 0x0, 0x6}, 0x9, 0xfaa, 0x9f, 0x2, 0x0, 0xfffffffd, 0xffffffffffffffff}) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) semget$private(0x0, 0x4000000009, 0x12) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f00000002c0)=@file={0xa, 0x1, './file0\x00'}, 0xa) open$dir(&(0x7f0000000480)='./file0\x00', 0x8201, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) ioctl$DIOCBEGINADDRS(r3, 0x8004667d, &(0x7f0000000240)="39400223") getresuid(0x0, &(0x7f00000000c0), 0x0) r4 = openat$filemon(0xffffff9c, &(0x7f00000001c0), 0x20000, 0x0) r5 = socket$bt_hci(0x24, 0x3, 0x86) getsockopt$sock_timeval(r5, 0xffff, 0x1005, &(0x7f0000000100), &(0x7f0000000180)=0x8) ioctl$FILEMON_SET_FD(r4, 0xc0045301, &(0x7f0000000200)=r2) r6 = kqueue() freebsd11_kevent(r6, &(0x7f0000000240)=[{0x480, 0xfffffffffffffff5, 0x8, 0x2, 0xd, 0x2}, {0x6, 0x0, 0xcb3d1ad58c9cc53a, 0x400, 0x4, 0x100000001}], 0x2, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x3, 0x0) getsockopt$sock_timeval(r7, 0xffff, 0x1010, &(0x7f0000000040), &(0x7f0000001840)=0x8) kqueue() r8 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6082d2f300183c00fe880000000000000000000000000001ff0200000000000000000000000000012c0000"]) ioctl$KDGETMODE(r8, 0x40046676, 0x22e00000) 29.286606511s ago: executing program 1 (id=269): r0 = socket(0x1c, 0x1, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000140)=@un=@file={0x18, 0x0, ""/22}, 0x18, &(0x7f0000000680)=[{&(0x7f0000000500)=""/130, 0x82}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/48, 0x30}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/125, 0x7d}], 0x5, &(0x7f0000000b00)=""/134, 0x86}, 0xc0001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000001380)=0x1, 0x4) setsockopt$inet_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000440)="ba", 0x1) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file2\x00', 0x3, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) mount(&(0x7f0000000340)='hammer\x00', &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') r2 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) chdir(0x0) setgroups(0x0, 0x0) r5 = fork() sigqueue(r5, 0x4f, @sival_int=0x6) getsockopt$inet_mreqn(r3, 0x0, 0x9, &(0x7f00000000c0)={@multicast1, @remote, 0x0}, &(0x7f0000000100)=0xc) setsockopt$inet_mreqn(r4, 0x0, 0x9, &(0x7f0000000300)={@multicast2, @loopback, r6}, 0xc) mkdir(&(0x7f0000000e00)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x18f) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) getgroups(0x0, &(0x7f0000001680)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0xfffffffffffffffe, 0x0, &(0x7f0000001680), 0x0) procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x4) aio_read(&(0x7f0000000180)={r3, 0xca1, &(0x7f0000000440)="abc3293d424cf53c47a3e630f6f712d41a5b17a6c52e04b942b5d7026156000a30ae201e9b237ef8c3759e96e2091840a9769ec8c6e2cd3d194172ae2b064d2ade9579201a0ccfd571c885b14e60d91793e15ce73ce28049dec398ca690744d65e022f83e8bb58a82e46388673256c58bc78c8ad97c8c5337c4c6daab1a9afc9979d8c568fd7e4b5bde517b41ee5ac0eab20c33b53200428bae183a741452f6616e070796ef42a794da02b2d7c64256ac9e8172fd826", 0xb6, [0xc7, 0x4], 0x8, 0x8, 0x40000e56, {0x0, 0x3, &(0x7f0000000740)="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"}, {0x3, 0x2, @sival_ptr=0x9, @ke_flags=0x10}}) utimensat(r3, &(0x7f0000000c00)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)={{0x9, 0x6}, {0x1, 0x3ff}}, 0x200) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) ioctl$KDGKBINFO(r3, 0x40244b65, &(0x7f0000001000)) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg$inet6_sctp(r7, &(0x7f0000000bc0)={&(0x7f00000006c0)=@in6={0x1c, 0x1c, 0x2, 0xfa5, @empty, 0x7e}, 0x1c, &(0x7f0000000640)=[{&(0x7f00000009c0)="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", 0x113}], 0x1, 0x0, 0x0, 0x108}, 0x9cd4990578ede2b7) freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x1000, 0x0) 29.281471857s ago: executing program 1 (id=271): r0 = openat(0xffffffffffffff9c, 0x0, 0x300201, 0xd0) setresgid(0xee00, 0xee01, 0x0) setresgid(0x0, 0xee01, 0x0) aio_write(&(0x7f00000002c0)={r0, 0x80000002, &(0x7f0000000080)="1f9ac49bc6b2", 0x6, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_ptr, @thr={&(0x7f0000000040)="de3cfcc4e279a75e0ec4e16ddfb934884acf0f380a873e27fc52c4e13561c10f01fbc4e2fd92540bb6c4c1f573f07cc15e0032c4c1f8518f5b6290a8", 0x0}}}) open(0x0, 0x40000, 0x46) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000180)='./file1\x00', 0x0) chdir(&(0x7f0000000040)='./file1\x00') r2 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = open$dir(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000000)='./file0\x00', 0x4) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x0, &(0x7f0000000100)) renameat(r3, &(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r2, &(0x7f0000000280)='./file0\x00') open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) socket(0x1c, 0x1, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) cap_rights_limit(r4, &(0x7f0000000340)=[0x0, 0x7ff]) r5 = vfork() procctl$PROC_TRAPCAP_STATUS(0x2, r5, 0xa, &(0x7f0000000140)) setsockopt$inet_opts(r4, 0x0, 0x1, &(0x7f0000000180)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c0400f0817a0000", 0x24) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_int(r6, 0xffff, 0x10000, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000380)={0x1c, 0x1c, 0x0, 0xfffffffe, @empty, 0x7}, 0x1c) r7 = socket$inet6(0x1c, 0x2, 0x0) setsockopt(r7, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r7, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x40, @loopback={0x4}}, 0x1c) 28.317602351s ago: executing program 1 (id=274): r0 = openat(0xffffffffffffff9c, 0x0, 0x300201, 0xd0) aio_write(&(0x7f00000002c0)={r0, 0x80000002, &(0x7f0000000080)="1f9ac49bc6b2", 0x6, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_ptr, @thr={&(0x7f0000000040)="de3cfcc4e279a75e0ec4e16ddfb934884acf0f380a873e27fc52c4e13561c10f01fbc4e2fd92540bb6c4c1f573f07cc15e0032c4c1f8518f5b6290a8", 0x0}}}) open(0x0, 0x80400000000206, 0x0) socket(0x17, 0x10000005, 0x8) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x0) chdir(&(0x7f0000000040)='./file1\x00') r2 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = open$dir(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000000)='./file0\x00', 0x4) mount(0x0, &(0x7f00000000c0)='.\x00', 0x0, &(0x7f0000000100)) renameat(r3, &(0x7f0000000480)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @local={0xac, 0x14, 0x0}}, @icmp=@mask_request}}}}) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) r4 = socket(0x1c, 0x1, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r5, 0x0, 0x1, &(0x7f0000000180)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c0400f0817a0000", 0x24) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_int(r6, 0xffff, 0x10000, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0xfffffffe, @empty, 0x7}, 0x1c) r7 = socket$inet6(0x1c, 0x2, 0x0) setsockopt(r7, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r7, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x0, @loopback={0x4}}, 0x1c) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 27.802936916s ago: executing program 1 (id=277): freebsd11_mknod(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x672cda28f543e327, 0x1) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x200, 0x120) chdir(&(0x7f0000000100)='./file0\x00') open$dir(&(0x7f0000001240)='./file1\x00', 0x40000400000002c2, 0x74) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x0) unmount(&(0x7f00000000c0)='./file0\x00', 0x180244) syz_emit_ethernet(0x46, &(0x7f0000000680)=ANY=[@ANYRESDEC, @ANYBLOB="f965690d3529ee8d312455b800f9ede99c881430273874184795d253cb654c0067f57c7e1c38a072e103f8de3abefc116460920285936379db02bb31315993515aa4c1635c212f163969373a76519f8e18f8175c6b401a9307126f900cf752c3445783ced5965cf8929e360ae0e4bbd01ca966865bd976888eaec99814fcab79a1592bd4fee6b0347d59d843da8a607a5051175bef978afed7f5fd690ccaade18e522a0e432f9abb65446a08e7d504df61ca1c2fa43ec8673f89d99f6808e3713a11082f94856d56e0366a3326012afc991a6092d8493c27287e8a401fd7d5fcae78241f4237d00e73fef41592ab6a00"/250]) open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) ktimer_create(0x4, 0x0, &(0x7f0000000100)=0x0) ktimer_settime(r1, 0x1, &(0x7f0000000240)={{0x0, 0x101}, {0x0, 0x2}}, 0x0) socket$inet(0x2, 0x3, 0x0) r2 = socket(0x10, 0x1, 0x0) recvfrom$inet(r2, &(0x7f0000000000)=""/132, 0x29, 0x43, 0x0, 0x0) r3 = socket(0x1, 0x20000000, 0x0) open$dir(&(0x7f0000000300)='./file0\x00', 0x400000, 0x8) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x801}, 0x1c) procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x9) socket$bt_rfcomm(0x24, 0x1, 0x88) sendto$inet6(0xffffffffffffffff, &(0x7f0000000600), 0x0, 0x0, 0x0, 0x0) r4 = kqueue() kevent(r4, &(0x7f0000000040)=[{0x2, 0xfffffffffffffffa, 0xb, 0x1, 0x9, 0x0, [0x7fffffffffffffff, 0x0, 0x7, 0x1040000000000000]}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x33, &(0x7f0000000180)=ANY=[@ANYBLOB="7a2339e9ed1cfdc67f9ad63e8f31bca4e7f24c52e33244395ffab9442187a18094ca84cbfcb23f7d762fcb"], 0x58) r5 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r5, 0x6, 0x2000, 0x0, 0x0) getsockopt$sock_int(r5, 0xffff, 0x4000, 0x0, 0x0) setsockopt$inet_sctp_SCTP_RECVRCVINFO(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000140)={@broadcast, @local, [{[], {0x8100, 0x1, 0x0, 0x2}}], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @broadcast, @rand_addr=0x6, @broadcast, @multicast1}}}}) socket$inet6_udp(0x1c, 0x2, 0x0) 27.801062209s ago: executing program 1 (id=279): syz_emit_ethernet(0x2e, &(0x7f0000001bc0)={@random="9f4c4662c957", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x68, 0x0, 0x1, 0x2, 0x0, @rand_addr=0x7, @multicast2}, @icmp=@generic={0x11, 0x8, 0x0, "e0dfff0102000000"}}}}}) 27.800689907s ago: executing program 32 (id=279): syz_emit_ethernet(0x2e, &(0x7f0000001bc0)={@random="9f4c4662c957", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x68, 0x0, 0x1, 0x2, 0x0, @rand_addr=0x7, @multicast2}, @icmp=@generic={0x11, 0x8, 0x0, "e0dfff0102000000"}}}}}) 12.074391684s ago: executing program 3 (id=190): r0 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = socket(0x1c, 0x1, 0x0) bind(r1, &(0x7f0000000180)=@un=@file={0x13, 0x0, './file/file0/../\x00'}, 0x13) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x110) mkdirat(r2, &(0x7f0000000180)='./file1\x00', 0x0) renameat(r2, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000280)='./file1\x00') r3 = open$dir(&(0x7f0000000580)='./file0\x00', 0xa9ea14dd067a52b, 0x20) mkdirat(r3, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x10) r4 = open$dir(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000000)='./file0\x00', 0x4) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000440)="73f957a6d8dfb300eb8832d1d6338352b53859393f74b6b909200669a6f27950e1ea8c5b7ca3809fab8c4a585ec09ac40c1dc8d795aea46476d0a84dcadfc73973d5e4c800"/78) renameat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', r4, &(0x7f0000000400)='./file0\x00') r5 = socket(0x1c, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000004c0)=0x9, 0x4) truncate(0x0, 0x3) execve(0x0, &(0x7f0000000240), 0x0) r6 = openat$ptmx(0xffffff9c, &(0x7f00000002c0), 0x2000000, 0x0) fcntl$setstatus(r6, 0x4, 0x44) fcntl$setstatus(r1, 0x4, 0x4) chmod(&(0x7f0000000180)='./file0\x00', 0x32d) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file1\x00', 0x8, 0x102) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) aio_readv(&(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000040)="04", 0x1, [], 0x1, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sigval_ptr=0x10}}) lio_listio(0x0, 0x0, 0x0, &(0x7f00000048c0)={0x3, 0x17, @sigval_int=0x3, @spare=[0x59, 0x6f1, 0xe, 0xfffffff7, 0x9, 0x5, 0x80009, 0x8]}) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0xffffffffffffff56, &(0x7f0000000380)=[{&(0x7f0000000540)="c8", 0x1}], 0x1, 0x0}, 0x80) 9.804914814s ago: executing program 3 (id=190): r0 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = socket(0x1c, 0x1, 0x0) bind(r1, &(0x7f0000000180)=@un=@file={0x13, 0x0, './file/file0/../\x00'}, 0x13) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x110) mkdirat(r2, &(0x7f0000000180)='./file1\x00', 0x0) renameat(r2, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000280)='./file1\x00') r3 = open$dir(&(0x7f0000000580)='./file0\x00', 0xa9ea14dd067a52b, 0x20) mkdirat(r3, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x10) r4 = open$dir(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000000)='./file0\x00', 0x4) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000440)="73f957a6d8dfb300eb8832d1d6338352b53859393f74b6b909200669a6f27950e1ea8c5b7ca3809fab8c4a585ec09ac40c1dc8d795aea46476d0a84dcadfc73973d5e4c800"/78) renameat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', r4, &(0x7f0000000400)='./file0\x00') r5 = socket(0x1c, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000004c0)=0x9, 0x4) truncate(0x0, 0x3) execve(0x0, &(0x7f0000000240), 0x0) r6 = openat$ptmx(0xffffff9c, &(0x7f00000002c0), 0x2000000, 0x0) fcntl$setstatus(r6, 0x4, 0x44) fcntl$setstatus(r1, 0x4, 0x4) chmod(&(0x7f0000000180)='./file0\x00', 0x32d) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file1\x00', 0x8, 0x102) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) aio_readv(&(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000040)="04", 0x1, [], 0x1, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sigval_ptr=0x10}}) lio_listio(0x0, 0x0, 0x0, &(0x7f00000048c0)={0x3, 0x17, @sigval_int=0x3, @spare=[0x59, 0x6f1, 0xe, 0xfffffff7, 0x9, 0x5, 0x80009, 0x8]}) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0xffffffffffffff56, &(0x7f0000000380)=[{&(0x7f0000000540)="c8", 0x1}], 0x1, 0x0}, 0x80) 7.437858166s ago: executing program 3 (id=190): r0 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = socket(0x1c, 0x1, 0x0) bind(r1, &(0x7f0000000180)=@un=@file={0x13, 0x0, './file/file0/../\x00'}, 0x13) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x110) mkdirat(r2, &(0x7f0000000180)='./file1\x00', 0x0) renameat(r2, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000280)='./file1\x00') r3 = open$dir(&(0x7f0000000580)='./file0\x00', 0xa9ea14dd067a52b, 0x20) mkdirat(r3, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x10) r4 = open$dir(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000000)='./file0\x00', 0x4) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000440)="73f957a6d8dfb300eb8832d1d6338352b53859393f74b6b909200669a6f27950e1ea8c5b7ca3809fab8c4a585ec09ac40c1dc8d795aea46476d0a84dcadfc73973d5e4c800"/78) renameat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', r4, &(0x7f0000000400)='./file0\x00') r5 = socket(0x1c, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000004c0)=0x9, 0x4) truncate(0x0, 0x3) execve(0x0, &(0x7f0000000240), 0x0) r6 = openat$ptmx(0xffffff9c, &(0x7f00000002c0), 0x2000000, 0x0) fcntl$setstatus(r6, 0x4, 0x44) fcntl$setstatus(r1, 0x4, 0x4) chmod(&(0x7f0000000180)='./file0\x00', 0x32d) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file1\x00', 0x8, 0x102) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) aio_readv(&(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000040)="04", 0x1, [], 0x1, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sigval_ptr=0x10}}) lio_listio(0x0, 0x0, 0x0, &(0x7f00000048c0)={0x3, 0x17, @sigval_int=0x3, @spare=[0x59, 0x6f1, 0xe, 0xfffffff7, 0x9, 0x5, 0x80009, 0x8]}) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0xffffffffffffff56, &(0x7f0000000380)=[{&(0x7f0000000540)="c8", 0x1}], 0x1, 0x0}, 0x80) 5.152077319s ago: executing program 3 (id=190): r0 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = socket(0x1c, 0x1, 0x0) bind(r1, &(0x7f0000000180)=@un=@file={0x13, 0x0, './file/file0/../\x00'}, 0x13) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x110) mkdirat(r2, &(0x7f0000000180)='./file1\x00', 0x0) renameat(r2, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000280)='./file1\x00') r3 = open$dir(&(0x7f0000000580)='./file0\x00', 0xa9ea14dd067a52b, 0x20) mkdirat(r3, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x10) r4 = open$dir(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000000)='./file0\x00', 0x4) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000440)="73f957a6d8dfb300eb8832d1d6338352b53859393f74b6b909200669a6f27950e1ea8c5b7ca3809fab8c4a585ec09ac40c1dc8d795aea46476d0a84dcadfc73973d5e4c800"/78) renameat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', r4, &(0x7f0000000400)='./file0\x00') r5 = socket(0x1c, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000004c0)=0x9, 0x4) truncate(0x0, 0x3) execve(0x0, &(0x7f0000000240), 0x0) r6 = openat$ptmx(0xffffff9c, &(0x7f00000002c0), 0x2000000, 0x0) fcntl$setstatus(r6, 0x4, 0x44) fcntl$setstatus(r1, 0x4, 0x4) chmod(&(0x7f0000000180)='./file0\x00', 0x32d) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file1\x00', 0x8, 0x102) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) aio_readv(&(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000040)="04", 0x1, [], 0x1, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sigval_ptr=0x10}}) lio_listio(0x0, 0x0, 0x0, &(0x7f00000048c0)={0x3, 0x17, @sigval_int=0x3, @spare=[0x59, 0x6f1, 0xe, 0xfffffff7, 0x9, 0x5, 0x80009, 0x8]}) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0xffffffffffffff56, &(0x7f0000000380)=[{&(0x7f0000000540)="c8", 0x1}], 0x1, 0x0}, 0x80) 3.151900429s ago: executing program 2 (id=384): r0 = socket(0x1c, 0x1, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000140)=@un=@file={0x18, 0x0, ""/22}, 0x18, &(0x7f0000000680)=[{&(0x7f0000000500)=""/130, 0x82}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/48, 0x30}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/125, 0x7d}], 0x5, &(0x7f0000000b00)=""/134, 0x86}, 0xc0001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000001380)=0x1, 0x4) listen(r1, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000440)="ba", 0x1) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file2\x00', 0x3, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) mount(&(0x7f0000000340)='hammer\x00', &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') r2 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) chdir(0x0) setgroups(0x0, 0x0) r4 = fork() sigqueue(r4, 0x4f, @sival_int=0x6) getsockopt$inet_mreqn(r3, 0x0, 0x9, &(0x7f00000000c0)={@multicast1, @remote}, &(0x7f0000000100)=0xc) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) getgroups(0x0, &(0x7f0000001680)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0xfffffffffffffffe, 0x0, &(0x7f0000001680), 0x0) procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x4) aio_read(&(0x7f0000000180)={r3, 0xca1, &(0x7f0000000440)="abc3293d424cf53c47a3e630f6f712d41a5b17a6c52e04b942b5d7026156000a30ae201e9b237ef8c3759e96e2091840a9769ec8c6e2cd3d194172ae2b064d2ade9579201a0ccfd571c885b14e60d91793e15ce73ce28049dec398ca690744d65e022f83e8bb58a82e46388673256c58bc78c8ad97c8c5337c4c6daab1a9afc9979d8c568fd7e4b5bde517b41ee5ac0eab20c33b53200428bae183a741452f6616e070796ef42a794da02b2d7c64256ac9e8172fd826", 0xb6, [0xc7, 0x4], 0x8, 0x8, 0x40000e56, {0x0, 0x3, &(0x7f0000000740)="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"}, {0x3, 0x2, @sival_ptr=0x9, @ke_flags=0x10}}) utimensat(r3, &(0x7f0000000c00)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)={{0x9, 0x6}, {0x1, 0x3ff}}, 0x200) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) ioctl$KDGKBINFO(r3, 0x40244b65, &(0x7f0000001000)) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg$inet6_sctp(r5, &(0x7f0000000bc0)={&(0x7f00000006c0)=@in6={0x1c, 0x1c, 0x2, 0xfa5, @empty, 0x7e}, 0x1c, &(0x7f0000000640)=[{&(0x7f00000009c0)="4000a3ac7229b135fbac3e706c042bb4965beb2eb43249429b2aad7eabfb877ade677ce450652d2d5041de0b99a3b3e79337a2e6bced6a833018d45b92433e46d2b0b9ccccb105a6bdb0237c3a8fda2673648962634166b7306ef69fe22e148e0a60d34e1bfd076d2e5dc6575aa51107629ea0492d9c15486b56a67018b09247ab04d442aa42a0a12ac1c4bd7be8e24b801836aa8b705d1a0979fd5c20de59d58d3ca8aa8ddc3f302455110daad00954f4094596b3e2ffbebaf0d95612efc05785c920553489bee8adb862473ad06b62bc8bdc770223a957c10a5c14ff153ef0fc34dc9eee61abe8fb43e3b6fa057c8b49ed42b57ea81029209fcdf646349e50ffbe2ff7cd6a8fcacdcb1c3af650bb36edd104", 0x113}], 0x1, 0x0, 0x0, 0x108}, 0x9cd4990578ede2b7) freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x1000, 0x0) 2.826386577s ago: executing program 4 (id=386): r0 = socket(0x1c, 0x1, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000140)=@un=@file={0x18, 0x0, ""/22}, 0x18, &(0x7f0000000680)=[{&(0x7f0000000500)=""/130, 0x82}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/48, 0x30}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/125, 0x7d}], 0x5, &(0x7f0000000b00)=""/134, 0x86}, 0xc0001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000001380)=0x1, 0x4) listen(r1, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000440)="ba", 0x1) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file2\x00', 0x3, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) mount(&(0x7f0000000340)='hammer\x00', &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) aio_read(&(0x7f0000000180)={r2, 0xca1, &(0x7f0000000440)="abc3293d424cf53c47a3e630f6f712d41a5b17a6c52e04b942b5d7026156000a30ae201e9b237ef8c3759e96e2091840a9769ec8c6e2cd3d194172ae2b064d2ade9579201a0ccfd571c885b14e60d91793e15ce73ce28049dec398ca690744d65e022f83e8bb58a82e46388673256c58bc78c8ad97c8c5337c4c6daab1a9afc9979d8c568fd7e4b5bde517b41ee5ac0eab20c33b53200428bae183a741452f6616e070796ef42a794da02b2d7c64256ac9e8172fd826", 0xb6, [0xc7, 0x4], 0x8, 0x8, 0x40000e56, {0x0, 0x3, &(0x7f0000000740)="733f84a0b16fcc79b6e1f1a21b8b5223ca863175014baefbe80eb1cb27062ead532d1aedcaf995fbf006c6c22e43246f98b19819ce8973eaaba35b969e474c76f7d79a9983c3ff11812900e0f5af0f961f6b758043948c95ee6c7639bdf4dca76dfb9af2d2a1db1862a7619bb535491430465711ea6b445ab3b1c625a08d4e0edf9503e122d14922ce26e85386216d9982a7490697ee5194b20b15123927dd1e908a0f492fdc42a34bcc9db5e08489f661c13fc2bfc68af9c435bc69ae34a144d382a9d89680a7e2eed3193f83446847a4f0d6dec445813ba714ca3ab8a1f117b6ed9626101d1074474e7f25844e13cd58d8e888e950e08b49086cb3a564e85351027c8604ee77b0663709f57d2c8326491649de0cc1797a8de89b1fb0905a065b330d6e3be1f51ea1f942199894fc2a18b60af9a50879e4250d64bf47057fd73dbd8f408d0ec65ea0c4f0c2e860fe3afb67492efa24664e688e9be73fc4be7334ee39e922bf464a49beb1fd6ddcb3fb72bdbea944cbaf149d0f3ffb90133c36c5ce46f97fca9821c8f50088e2a80a6659873bb99b30a6b5d0ae55004a8c67960bd7993d2a05308887f26fce1d50454c86446df6d828ad8d098f3374117b340aafa4046012ccf5dfe10f539450b2e23445df22a2b34bd706cf4bb14c073c412ff8b274f33b77c62c812b1b51734a7e5ddc27575548b551377f97801bc12f989aad5ed569b9eb4e92cf6ab72edd1d9ff5e55860876e7a6d30fe5bd2372dd0f0160d946546e9358198b0fb94a80740cfe98dbe5dfa8be2122972e012f04bc2364105de9c9e91af4d5037c84c979fdd8c311ad0fee2d0"}, {0x3, 0x2, @sival_ptr=0x9, @ke_flags=0x10}}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2.825663716s ago: executing program 2 (id=387): r0 = socket(0x1c, 0x1, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000140)=@un=@file={0x18, 0x0, ""/22}, 0x18, &(0x7f0000000680)=[{&(0x7f0000000500)=""/130, 0x82}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/48, 0x30}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/125, 0x7d}], 0x5, &(0x7f0000000b00)=""/134, 0x86}, 0xc0001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000001380)=0x1, 0x4) listen(r1, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000440)="ba", 0x1) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file2\x00', 0x3, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) mount(&(0x7f0000000340)='hammer\x00', &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') r2 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) chdir(0x0) setgroups(0x0, 0x0) r5 = fork() sigqueue(r5, 0x4f, @sival_int=0x6) getsockopt$inet_mreqn(r3, 0x0, 0x9, &(0x7f00000000c0)={@multicast1, @remote, 0x0}, &(0x7f0000000100)=0xc) setsockopt$inet_mreqn(r4, 0x0, 0x9, &(0x7f0000000300)={@multicast2, @loopback, r6}, 0xc) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) getgroups(0x0, &(0x7f0000001680)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0xfffffffffffffffe, 0x0, &(0x7f0000001680), 0x0) aio_read(&(0x7f0000000180)={r3, 0xca1, &(0x7f0000000440)="abc3293d424cf53c47a3e630f6f712d41a5b17a6c52e04b942b5d7026156000a30ae201e9b237ef8c3759e96e2091840a9769ec8c6e2cd3d194172ae2b064d2ade9579201a0ccfd571c885b14e60d91793e15ce73ce28049dec398ca690744d65e022f83e8bb58a82e46388673256c58bc78c8ad97c8c5337c4c6daab1a9afc9979d8c568fd7e4b5bde517b41ee5ac0eab20c33b53200428bae183a741452f6616e070796ef42a794da02b2d7c64256ac9e8172fd826", 0xb6, [0xc7, 0x4], 0x8, 0x8, 0x40000e56, {0x0, 0x3, &(0x7f0000000740)="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"}, {0x3, 0x2, @sival_ptr=0x9, @ke_flags=0x10}}) utimensat(r3, &(0x7f0000000c00)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)={{0x9, 0x6}, {0x1, 0x3ff}}, 0x200) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) ioctl$KDGKBINFO(r3, 0x40244b65, &(0x7f0000001000)) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg$inet6_sctp(r7, &(0x7f0000000bc0)={&(0x7f00000006c0)=@in6={0x1c, 0x1c, 0x2, 0xfa5, @empty, 0x7e}, 0x1c, &(0x7f0000000640)=[{&(0x7f00000009c0)="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", 0x113}], 0x1, 0x0, 0x0, 0x108}, 0x9cd4990578ede2b7) freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x1000, 0x0) 2.737287097s ago: executing program 4 (id=388): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f00000000c0)={0x10, 0x18, 0x1, &(0x7f0000000000)="04", 0x0, 0x0, 0x8, 0x4d46b770, [0x0, 0x9, 0x402]}) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f0000000100)=ANY=[], 0x28) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) rfork(0x96014) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) madvise(&(0x7f00009d6000/0x600000)=nil, 0x600000, 0x4) ioctl$CIOCGSESSION2(r7, 0xc030636a, &(0x7f0000001f80)={0x0, 0x18, 0x0, 0x0, 0x20, &(0x7f0000001e80)="4ad9eb55e039e2a179da4a9f3629fb786173a6e25945c1f92ebe6edc03a069e0", 0x0, 0x559edd83, [0x0, 0x1, 0x0, 0x4]}) r8 = socket$inet6(0x1c, 0x3, 0x2) setsockopt$inet6_IPV6_PKTINFO(r8, 0x29, 0x2e, &(0x7f00000005c0)={@ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}}, 0x14) setsockopt$inet6_buf(r8, 0x29, 0x19, 0x0, 0x0) getgroups(0x5, &(0x7f0000001240)=[0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]) sendmsg$unix(r6, &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYRES64=r12, @ANYRES32=r4, @ANYRESHEX, @ANYBLOB="60000000ffff000003000000827ee86e03f4d338656ab623647f26306c8cc9615baece155d0d5fcb75245dba1a42ace1bf2af5890c584c52a84900bf27ecefab2e774c3e69be", @ANYRES32=0x0, @ANYRES64=r10, @ANYRES32=0x0, @ANYRESHEX=r11, @ANYRES32=r5, @ANYRES16, @ANYRES32=r4, @ANYRES32=r3, @ANYRES32=r9, @ANYRES8, @ANYRESOCT=r1, @ANYRES8, @ANYBLOB="31de5176a9ef194e49a3ad44d135", @ANYRESHEX, @ANYRESHEX=r5, @ANYRES32=r12, @ANYRES32=r2, @ANYRES32, @ANYRES64, @ANYRES32=0x0], 0x74, 0x20080}, 0x88) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004cc0)}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) flock(r13, 0x8) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) kqueue() fcntl$getown(0xffffffffffffff9c, 0x5) r14 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000dc0)='./file0\x00', r14, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) 2.701972629s ago: executing program 3 (id=190): r0 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = socket(0x1c, 0x1, 0x0) bind(r1, &(0x7f0000000180)=@un=@file={0x13, 0x0, './file/file0/../\x00'}, 0x13) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x110) mkdirat(r2, &(0x7f0000000180)='./file1\x00', 0x0) renameat(r2, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000280)='./file1\x00') r3 = open$dir(&(0x7f0000000580)='./file0\x00', 0xa9ea14dd067a52b, 0x20) mkdirat(r3, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x10) r4 = open$dir(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000000)='./file0\x00', 0x4) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000440)="73f957a6d8dfb300eb8832d1d6338352b53859393f74b6b909200669a6f27950e1ea8c5b7ca3809fab8c4a585ec09ac40c1dc8d795aea46476d0a84dcadfc73973d5e4c800"/78) renameat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', r4, &(0x7f0000000400)='./file0\x00') r5 = socket(0x1c, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000004c0)=0x9, 0x4) truncate(0x0, 0x3) execve(0x0, &(0x7f0000000240), 0x0) r6 = openat$ptmx(0xffffff9c, &(0x7f00000002c0), 0x2000000, 0x0) fcntl$setstatus(r6, 0x4, 0x44) fcntl$setstatus(r1, 0x4, 0x4) chmod(&(0x7f0000000180)='./file0\x00', 0x32d) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file1\x00', 0x8, 0x102) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) aio_readv(&(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000040)="04", 0x1, [], 0x1, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sigval_ptr=0x10}}) lio_listio(0x0, 0x0, 0x0, &(0x7f00000048c0)={0x3, 0x17, @sigval_int=0x3, @spare=[0x59, 0x6f1, 0xe, 0xfffffff7, 0x9, 0x5, 0x80009, 0x8]}) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0xffffffffffffff56, &(0x7f0000000380)=[{&(0x7f0000000540)="c8", 0x1}], 0x1, 0x0}, 0x80) 2.68918916s ago: executing program 0 (id=389): socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) r0 = open$dir(&(0x7f0000001200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x25) mkdirat(r0, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000dc0)='./file0\x00', r1, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f0000000100)='.\x00', 0x0, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000a80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) link(&(0x7f0000000940)='./file0\x00', &(0x7f0000000d40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') symlink(&(0x7f0000000ac0)='./file0\x00', 0x0) rename(&(0x7f0000001300)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) rename(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x3) r2 = socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x0, 0x6, @loopback, 0x290}, 0x1c, &(0x7f0000000280)=[{0x0}, {0x0}, {&(0x7f0000000140)}, {0x0}, {&(0x7f0000000500)="b311e2ad42fa6094f47c211826ef52f550a7cc8540dfb028234578a8815100d578d78987758840d0d0fc7185bbee2303be8763c9ae55c670b3de77a6cdbcca15d14c689b18517d5e6f52ce3d894bedaef4d0aab5e721394cab1ed38327a881f7a83e00167ae590fce65b6960b61f48101f040c01138d02b1e25b9d266deaf1c2a5df867f633c849535fd892cb7d04df578f64a9e708ad10e0000dda737e87040a795", 0xa2}], 0x5, 0x0, 0x0, 0x149}, 0x4) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffffff959de19359ffffffff08060001080006040001ffffffffffffac1400bbaaaaaaaaaaaae0000001"]) setsockopt$inet_mreqsrc(r4, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback, @multicast1}, 0xc) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) aio_readv(&(0x7f0000000480)={r2, 0x3, &(0x7f0000000880)="44b0c8a183f77e06f935d85fc9fb879de7430532027c9af6a31ae37e7716371dc3cbd920395f1ab8692e8378b0100b5a0e8e924d5a93ec042bfa9a0550b1ba", 0x3f, [0x6, 0x7e5], 0xfffffffe, 0x6, 0x8, {0x8, 0x4, &(0x7f0000001440)="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"}, {0x2, 0x13, @sival_int=0x5, @thr={0x0, 0x0}}}) chflags(&(0x7f0000000100)='./file1\x00', 0x40088) setsockopt(r2, 0x0, 0x1, &(0x7f00000000c0)="6de61e9a4490146163ef7771858c88a83b515ab5d0495363ec97cafa5f1458e2929ab62ddd311de17fb9ce1bb27f15ec0dd7", 0x32) socketpair$unix(0x1, 0x2, 0x0, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = openat(0xffffffffffffffff, &(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0xd2) ioctl$KDENABIO(r5, 0x20004b3c) 2.676105293s ago: executing program 2 (id=390): r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6(0x1c, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="ff070a791b4375202b5c2baf2781e604"}, 0x1c) open$dir(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0) connect$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0000000000114b70380dbb00086000"}, 0x1c) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001400)={{0x0, 0x0, 0x0, 0x0, 0xa0, 0xd, 0x0, 0x6}, 0x9, 0xfaa, 0x9f, 0x2, 0x0, 0xfffffffd, 0xffffffffffffffff}) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) semget$private(0x0, 0x4000000009, 0x12) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f00000002c0)=@file={0xa, 0x1, './file0\x00'}, 0xa) open$dir(&(0x7f0000000480)='./file0\x00', 0x8201, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) ioctl$DIOCBEGINADDRS(r3, 0x8004667d, &(0x7f0000000240)="39400223") getresuid(0x0, &(0x7f00000000c0), 0x0) r4 = openat$filemon(0xffffff9c, &(0x7f00000001c0), 0x20000, 0x0) r5 = socket$bt_hci(0x24, 0x3, 0x86) getsockopt$sock_timeval(r5, 0xffff, 0x1005, &(0x7f0000000100), &(0x7f0000000180)=0x8) ioctl$FILEMON_SET_FD(r4, 0xc0045301, &(0x7f0000000200)=r2) r6 = kqueue() freebsd11_kevent(r6, &(0x7f0000000240)=[{0x480, 0xfffffffffffffff5, 0x8, 0x2, 0xd, 0x2}, {0x6, 0x0, 0xcb3d1ad58c9cc53a, 0x400, 0x4, 0x100000001}], 0x2, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x3, 0x0) getsockopt$sock_timeval(r7, 0xffff, 0x1010, &(0x7f0000000040), &(0x7f0000001840)=0x8) kqueue() r8 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6082d2f300183c00fe880000000000000000000000000001ff0200000000000000000000000000012c0000"]) ioctl$KDGETMODE(r8, 0x40046676, 0x22e00000) 2.585316005s ago: executing program 0 (id=391): r0 = openat(0xffffffffffffff9c, 0x0, 0x300201, 0xd0) aio_write(&(0x7f00000002c0)={r0, 0x80000002, &(0x7f0000000080)="1f9ac49bc6b2", 0x6, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_ptr, @thr={&(0x7f0000000040)="de3cfcc4e279a75e0ec4e16ddfb934884acf0f380a873e27fc52c4e13561c10f01fbc4e2fd92540bb6c4c1f573f07cc15e0032c4c1f8518f5b6290a8", 0x0}}}) open(0x0, 0x80400000000206, 0x0) socket(0x17, 0x10000005, 0x8) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000180)='./file0\x00', 0x0) chdir(&(0x7f0000000040)='./file1\x00') r2 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r3 = open$dir(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000000)='./file0\x00', 0x4) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x0, &(0x7f0000000100)) renameat(r3, &(0x7f0000000480)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @local={0xac, 0x14, 0x0}}, @icmp=@mask_request}}}}) open$dir(0x0, 0x10000, 0x0) r4 = socket(0x1c, 0x1, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r5, 0x0, 0x1, &(0x7f0000000180)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c0400f0817a0000", 0x24) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_int(r6, 0xffff, 0x10000, 0x0, 0x0) bind$inet6(r6, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0xfffffffe, @empty, 0x7}, 0x1c) r7 = socket$inet6(0x1c, 0x2, 0x0) setsockopt(r7, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r7, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x0, @loopback={0x4}}, 0x1c) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 510.114852ms ago: executing program 0 (id=392): r0 = socket(0x1c, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x1b2) r1 = socket(0x1c, 0x1, 0x0) readv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f0000000380)=""/250}], 0x1080) select(0x40, &(0x7f0000000000)={0x9, 0x3ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, &(0x7f0000000380)={0xffb, 0x0, 0x6, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000080)=0xb, 0x4) bind$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x0, @loopback}, 0x1c) r3 = socket(0x1c, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x0, @empty}, 0x1c) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) chdir(&(0x7f0000000400)='./file/file0/..//file0\x00') getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x9, 0x0, &(0x7f0000000340)) madvise(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x9) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x9, &(0x7f0000000140)={@multicast2, @loopback}, 0xc) r5 = socket(0x26, 0x2, 0x0) sendto(r5, 0x0, 0x0, 0x1, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x15, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) fork() 508.189991ms ago: executing program 4 (id=393): r0 = socket(0x1c, 0x1, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000140)=@un=@file={0x18, 0x0, ""/22}, 0x18, 0x0, 0x0, &(0x7f0000000b00)=""/134, 0x86}, 0xc0001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000001380)=0x1, 0x4) listen(r1, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000440)="ba", 0x1) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file2\x00', 0x3, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) mount(&(0x7f0000000340)='hammer\x00', &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') r2 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) chdir(0x0) setgroups(0x0, 0x0) r5 = fork() sigqueue(r5, 0x4f, @sival_int=0x6) getsockopt$inet_mreqn(r3, 0x0, 0x9, &(0x7f00000000c0)={@multicast1, @remote, 0x0}, &(0x7f0000000100)=0xc) setsockopt$inet_mreqn(r4, 0x0, 0x9, &(0x7f0000000300)={@multicast2, @loopback, r6}, 0xc) mkdir(&(0x7f0000000e00)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x18f) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) getgroups(0x0, &(0x7f0000001680)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0xfffffffffffffffe, 0x0, &(0x7f0000001680), 0x0) procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x4) aio_read(&(0x7f0000000180)={r3, 0xca1, &(0x7f0000000440)="abc3293d424cf53c47a3e630f6f712d41a5b17a6c52e04b942b5d7026156000a30ae201e9b237ef8c3759e96e2091840a9769ec8c6e2cd3d194172ae2b064d2ade9579201a0ccfd571c885b14e60d91793e15ce73ce28049dec398ca690744d65e022f83e8bb58a82e46388673256c58bc78c8ad97c8c5337c4c6daab1a9afc9979d8c568fd7e4b5bde517b41ee5ac0eab20c33b53200428bae183a741452f6616e070796ef42a794da02b2d7c64256ac9e8172fd826", 0xb6, [0xc7, 0x4], 0x8, 0x8, 0x40000e56, {0x0, 0x3, &(0x7f0000000740)="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"}, {0x3, 0x2, @sival_ptr=0x9, @ke_flags=0x10}}) utimensat(r3, &(0x7f0000000c00)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)={{0x9, 0x6}, {0x1, 0x3ff}}, 0x200) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) ioctl$KDGKBINFO(r3, 0x40244b65, &(0x7f0000001000)) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg$inet6_sctp(r7, &(0x7f0000000bc0)={&(0x7f00000006c0)=@in6={0x1c, 0x1c, 0x2, 0xfa5, @empty, 0x7e}, 0x1c, &(0x7f0000000640)=[{&(0x7f00000009c0)="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", 0x113}], 0x1, 0x0, 0x0, 0x108}, 0x9cd4990578ede2b7) freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x1000, 0x0) 505.624738ms ago: executing program 2 (id=394): r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6(0x1c, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="ff070a791b4375202b5c2baf2781e604"}, 0x1c) open$dir(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0) connect$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0000000000114b70380dbb00086000"}, 0x1c) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001400)={{0x0, 0x0, 0x0, 0x0, 0xa0, 0xd, 0x0, 0x6}, 0x9, 0xfaa, 0x9f, 0x2, 0x0, 0xfffffffd, 0xffffffffffffffff}) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f00000002c0)=@file={0xa, 0x1, './file0\x00'}, 0xa) open$dir(&(0x7f0000000480)='./file0\x00', 0x8201, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) ioctl$DIOCBEGINADDRS(r3, 0x8004667d, &(0x7f0000000240)="39400223") getresuid(0x0, &(0x7f00000000c0), 0x0) r4 = openat$filemon(0xffffff9c, &(0x7f00000001c0), 0x20000, 0x0) r5 = socket$bt_hci(0x24, 0x3, 0x86) getsockopt$sock_timeval(r5, 0xffff, 0x1005, &(0x7f0000000100), &(0x7f0000000180)=0x8) ioctl$FILEMON_SET_FD(r4, 0xc0045301, &(0x7f0000000200)=r2) r6 = kqueue() freebsd11_kevent(r6, &(0x7f0000000240)=[{0x480, 0xfffffffffffffff5, 0x8, 0x2, 0xd, 0x2}, {0x6, 0x0, 0xcb3d1ad58c9cc53a, 0x400, 0x4, 0x100000001}], 0x2, 0x0, 0x0, 0x0) socket(0x1c, 0x3, 0x0) kqueue() r7 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6082d2f300183c00fe880000000000000000000000000001ff0200000000000000000000000000012c0000"]) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) 386.053793ms ago: executing program 0 (id=395): r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6(0x1c, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="ff070a791b4375202b5c2baf2781e604"}, 0x1c) open$dir(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0) connect$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0000000000114b70380dbb00086000"}, 0x1c) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001400)={{0x0, 0x0, 0x0, 0x0, 0xa0, 0xd, 0x0, 0x6}, 0x9, 0xfaa, 0x9f, 0x2, 0x0, 0xfffffffd, 0xffffffffffffffff}) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f00000002c0)=@file={0xa, 0x1, './file0\x00'}, 0xa) open$dir(&(0x7f0000000480)='./file0\x00', 0x8201, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) ioctl$DIOCBEGINADDRS(r3, 0x8004667d, &(0x7f0000000240)="39400223") getresuid(0x0, &(0x7f00000000c0), 0x0) r4 = openat$filemon(0xffffff9c, &(0x7f00000001c0), 0x20000, 0x0) r5 = socket$bt_hci(0x24, 0x3, 0x86) getsockopt$sock_timeval(r5, 0xffff, 0x1005, &(0x7f0000000100), &(0x7f0000000180)=0x8) ioctl$FILEMON_SET_FD(r4, 0xc0045301, &(0x7f0000000200)=r2) r6 = kqueue() freebsd11_kevent(r6, &(0x7f0000000240)=[{0x480, 0xfffffffffffffff5, 0x8, 0x2, 0xd, 0x2}, {0x6, 0x0, 0xcb3d1ad58c9cc53a, 0x400, 0x4, 0x100000001}], 0x2, 0x0, 0x0, 0x0) socket(0x1c, 0x3, 0x0) kqueue() r7 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6082d2f300183c00fe880000000000000000000000000001ff0200000000000000000000000000012c0000"]) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) 381.667476ms ago: executing program 4 (id=396): r0 = socket(0x1c, 0x1, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000140)=@un=@file={0x18, 0x0, ""/22}, 0x18, &(0x7f0000000680)=[{&(0x7f0000000500)=""/130, 0x82}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/48, 0x30}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/125, 0x7d}], 0x5, &(0x7f0000000b00)=""/134, 0x86}, 0xc0001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000001380)=0x1, 0x4) listen(r1, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000440)="ba", 0x1) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file2\x00', 0x3, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) mount(&(0x7f0000000340)='hammer\x00', &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') r2 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) chdir(0x0) setgroups(0x0, 0x0) r5 = fork() sigqueue(r5, 0x4f, @sival_int=0x6) setsockopt$inet_mreqn(r4, 0x0, 0x9, &(0x7f0000000300)={@multicast2, @loopback}, 0xc) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) getgroups(0x0, &(0x7f0000001680)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0xfffffffffffffffe, 0x0, &(0x7f0000001680), 0x0) procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x4) aio_read(&(0x7f0000000180)={r3, 0xca1, &(0x7f0000000440)="abc3293d424cf53c47a3e630f6f712d41a5b17a6c52e04b942b5d7026156000a30ae201e9b237ef8c3759e96e2091840a9769ec8c6e2cd3d194172ae2b064d2ade9579201a0ccfd571c885b14e60d91793e15ce73ce28049dec398ca690744d65e022f83e8bb58a82e46388673256c58bc78c8ad97c8c5337c4c6daab1a9afc9979d8c568fd7e4b5bde517b41ee5ac0eab20c33b53200428bae183a741452f6616e070796ef42a794da02b2d7c64256ac9e8172fd826", 0xb6, [0xc7, 0x4], 0x8, 0x8, 0x40000e56, {0x0, 0x3, &(0x7f0000000740)="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"}, {0x3, 0x2, @sival_ptr=0x9, @ke_flags=0x10}}) utimensat(r3, &(0x7f0000000c00)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)={{0x9, 0x6}, {0x1, 0x3ff}}, 0x200) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) ioctl$KDGKBINFO(r3, 0x40244b65, &(0x7f0000001000)) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg$inet6_sctp(r6, &(0x7f0000000bc0)={&(0x7f00000006c0)=@in6={0x1c, 0x1c, 0x2, 0xfa5, @empty, 0x7e}, 0x1c, &(0x7f0000000640)=[{&(0x7f00000009c0)="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", 0x113}], 0x1, 0x0, 0x0, 0x108}, 0x9cd4990578ede2b7) freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x1000, 0x0) 311.755183ms ago: executing program 2 (id=397): r0 = socket(0x1c, 0x1, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000140)=@un=@file={0x18, 0x0, ""/22}, 0x18, &(0x7f0000000680)=[{&(0x7f0000000500)=""/130, 0x82}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/48, 0x30}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/125, 0x7d}], 0x5, &(0x7f0000000b00)=""/134, 0x86}, 0xc0001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000001380)=0x1, 0x4) listen(r1, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000440)="ba", 0x1) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file2\x00', 0x3, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) mount(&(0x7f0000000340)='hammer\x00', &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') socket(0x1c, 0x1, 0x0) aio_read(&(0x7f0000000180)={0xffffffffffffffff, 0xca1, &(0x7f0000000440)="abc3293d424cf53c47a3e630f6f712d41a5b17a6c52e04b942b5d7026156000a30ae201e9b237ef8c3759e96e2091840a9769ec8c6e2cd3d194172ae2b064d2ade9579201a0ccfd571c885b14e60d91793e15ce73ce28049dec398ca690744d65e022f83e8bb58a82e46388673256c58bc78c8ad97c8c5337c4c6daab1a9afc9979d8c568fd7e4b5bde517b41ee5ac0eab20c33b53200428bae183a741452f6616e070796ef42a794da02b2d7c64256ac9e8172fd826", 0xb6, [0xc7, 0x4], 0x8, 0x8, 0x40000e56, {0x0, 0x3, &(0x7f0000000740)="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"}, {0x3, 0x2, @sival_ptr=0x9, @ke_flags=0x10}}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 286.359194ms ago: executing program 4 (id=398): r0 = socket(0x1c, 0x1, 0x0) recvmsg(r0, &(0x7f0000000700)={&(0x7f0000000140)=@un=@file={0x18, 0x0, ""/22}, 0x18, &(0x7f0000000680)=[{&(0x7f0000000500)=""/130, 0x82}, {&(0x7f00000016c0)=""/4096, 0x1000}, {&(0x7f0000000380)=""/48, 0x30}, {&(0x7f00000026c0)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/125, 0x7d}], 0x5, &(0x7f0000000b00)=""/134, 0x86}, 0xc0001) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000001380)=0x1, 0x4) listen(r1, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000440)="ba", 0x1) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file2\x00', 0x3, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) mount(&(0x7f0000000340)='hammer\x00', &(0x7f0000000080)='./file1\x00', 0x0, &(0x7f0000000140)) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') r2 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) chdir(0x0) setgroups(0x0, 0x0) r5 = fork() sigqueue(r5, 0x4f, @sival_int=0x6) getsockopt$inet_mreqn(r3, 0x0, 0x9, &(0x7f00000000c0)={@multicast1, @remote, 0x0}, &(0x7f0000000100)=0xc) setsockopt$inet_mreqn(r4, 0x0, 0x9, &(0x7f0000000300)={@multicast2, @loopback, r6}, 0xc) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) getgroups(0x0, &(0x7f0000001680)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0xfffffffffffffffe, 0x0, &(0x7f0000001680), 0x0) aio_read(&(0x7f0000000180)={r3, 0xca1, &(0x7f0000000440)="abc3293d424cf53c47a3e630f6f712d41a5b17a6c52e04b942b5d7026156000a30ae201e9b237ef8c3759e96e2091840a9769ec8c6e2cd3d194172ae2b064d2ade9579201a0ccfd571c885b14e60d91793e15ce73ce28049dec398ca690744d65e022f83e8bb58a82e46388673256c58bc78c8ad97c8c5337c4c6daab1a9afc9979d8c568fd7e4b5bde517b41ee5ac0eab20c33b53200428bae183a741452f6616e070796ef42a794da02b2d7c64256ac9e8172fd826", 0xb6, [0xc7, 0x4], 0x8, 0x8, 0x40000e56, {0x0, 0x3, &(0x7f0000000740)="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"}, {0x3, 0x2, @sival_ptr=0x9, @ke_flags=0x10}}) utimensat(r3, &(0x7f0000000c00)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000000)={{0x9, 0x6}, {0x1, 0x3ff}}, 0x200) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) ioctl$KDGKBINFO(r3, 0x40244b65, &(0x7f0000001000)) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg$inet6_sctp(r7, &(0x7f0000000bc0)={&(0x7f00000006c0)=@in6={0x1c, 0x1c, 0x2, 0xfa5, @empty, 0x7e}, 0x1c, &(0x7f0000000640)=[{&(0x7f00000009c0)="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", 0x113}], 0x1, 0x0, 0x0, 0x108}, 0x9cd4990578ede2b7) freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x1000, 0x0) 250.853031ms ago: executing program 2 (id=399): r0 = socket(0x1c, 0x10000000, 0x0) r1 = socket(0x1c, 0x1, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x40000400000002c2, 0x0) extattr_set_file(&(0x7f0000000000)='./file0\x00', 0x2, &(0x7f0000000080)='^\x00', 0x0, 0x0) extattr_get_file(&(0x7f0000000280)='./file0\x00', 0x2, &(0x7f0000000300)='^\x00', &(0x7f0000000340)=""/213, 0xd5) r2 = socket(0x1c, 0x1, 0x0) r3 = open$dir(0x0, 0x40, 0x39) bind$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty, 0x4}, 0x1c) poll(&(0x7f0000000340)=[{r0, 0x4}, {r3, 0x100}, {0xffffffffffffffff, 0x2000}, {0xffffffffffffffff, 0x4}, {r3, 0x1}, {r2, 0x20}, {r3, 0x40}], 0x7, 0x1) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x1b, 0x3, 0x0) syz_emit_ethernet(0x480, &(0x7f00000005c0)={@random="4b8f3a6f6f98", @random="7bd88fa2834c", [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x44a, 0x3a, 0xff, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@echo_request={0x80, 0x0, 0x0, 0x400, 0x7, "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"}}}}}}) shutdown(0xffffffffffffffff, 0x1) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r5, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x10001}, 0x20, &(0x7f0000000d00)=[{&(0x7f0000000500)="9681faf8ecd94df56d71dc08694a141f85382298820f22a28c532857f6c9a072247543c9bb16c8549502a88eacb9b9afacc115c631b834ff597d4e0b654035744bb7d442a842f78e3cd30c6b3bfe140766f1275d873526f963def7113f9e9121271ae202dbbab0853dcece383f733bdc442dffe0e04c8fd2c40f62425e3b5c04084b93", 0x83}, {0x0}, {&(0x7f0000000380)="76d601fcd4b287537af486456176985c4ab1c3b74bba9a4d22451e8510fb3fda0312d47ab4ad67f789062938195e0163a059b25e507987767a0751a3af6a555c4d57d49655699dcb2f2513446cc83b5e63499de98fa2f3e81cf16c1f229eb7f89a0d468dffe57e87cfde885809060bd0a2b54cdd76f8306a353bfe0f8e0dd888b39880405cd08ecc78a958aaefe9b6c3d6378a4e0d12b3e32a8904910a52546912db421b05290cbda9e95402434d44f3c4c77d100226c07908c50fb180ee9b596aebe5c15169a1"}, {&(0x7f00000000c0)="8515bd13753abae3b78e5c00ad1e55569a6e500ecc8aad1883f1ccc5ea214b6efc486bdf6f33a0f5cf070bf740e1dc44219e40e381fbe3edd5b56586"}, {&(0x7f0000000b40)="6281c488ce05e158118227315dd10baf83493905bfb2684b12289f6ede2c55c554d49dbbeea9096e9f0f53fe7376fef8461e7babe83d48a39c6996a02c11c38025d453a53873770eb53c797903024ed5270019bf9e348135f7ca8c094a64500e8b33341eabb600f07daa22fed8205dc16a89b57ff815fbb9199aa3adc8463b9178ef18d6a35c95a3f5ca3f630bf1c0deb4050b53344a29adae9e341851b07460"}, {&(0x7f0000000c00)="8b9094cd727bbea6f009fd434a7a68436429558b6f71baab6bc8367eca4e0d656e2d6a3eaec4c893589fee0f9ffdda7ca5389c7ef3e54c5e5d5427b7ab2e8ad35e63587b17cadbda756afafc584c41606e7243b2e06c8dff29b3ec092063a6ff976fb663a06d396e4feadbc0cc6720b56c4b9b9fa8df2a45397059ddee786971ee0b1d976fb70565a0c4de33ffa62630e81ccdfdf6d0f3243c3ca5d35ca63cc705625fdb96eb984ecc3395c66cd788d7387700e94e10b1102b01567c425b6c"}, {&(0x7f00000002c0)="fa7f33f8af1647a49787962c1044305d85ba12c5f75fcf66d0aa63eaa3a214805bb6546b78eb1d343fc143e21b9e822b00a9ed788b20a901d620e6f1f871d48f92ae724a972ed70b3acd65cc96025e42882edbb909bd8b6e"}, {&(0x7f0000000cc0)="d3d3714a70faf841bc4f30a49c336cbac85e9b7347b51dd72e052563e76c67b8f7"}], 0x2, 0x0, 0x0, 0x149}, 0x20001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) sendmsg$unix(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000a40)=ANY=[@ANYRES8=r4, @ANYRES32, @ANYBLOB="1deca64e4bcea43c85fb35603ac229c035faa1efdff0251a8f311ff01b1e4411ef7d281fd33c69c5d7efeed124045fa2a82dc5e524e2d78a51a50c6b49c3d1ab6e629c82cd62787e034f86f554627b59781c85d5cf6851bb31f5d9737da3fb913f0cd8df147f54223441d47ff6b8e2efd728cd", @ANYBLOB="285421360bb4e4a0b2c3b527b2a4877825aa05d41658f9a1d5562a9b95fd8e8fc877daab6597f3e58569bcc13f7b6f938818be6abef2cb080c2d7100975fa293826f2e9c9b24cb4abfd8eb9ca29cf9833518cb0e4c142d3f7781e34d47d82abddd", @ANYRESOCT=r5], 0x28}, 0x80) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x1) aio_write(&(0x7f0000000240)={r6, 0x80000001, &(0x7f00000004c0)='E', 0x1, [0x3], 0x200000000000000, 0x8, 0x0, {0x1, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562f1, @ke_flags=0xc088}}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, 0xffffffffffffffff, 0x0) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x100, 0x31) preadv(r7, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) r8 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r8, 0x0) connect(r5, &(0x7f0000000080)=@un=@abs={0x8, 0x0, 0x0, 0x2}, 0x8) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) socket$inet6(0x1c, 0x3, 0x0) sysarch$I386_SET_PKRU(0xc, 0x0) 167.93586ms ago: executing program 0 (id=400): r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6(0x1c, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="ff070a791b4375202b5c2baf2781e604"}, 0x1c) open$dir(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0) connect$inet6(r1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001400)={{0x0, 0x0, 0x0, 0x0, 0xa0, 0xd, 0x0, 0x6}, 0x9, 0xfaa, 0x9f, 0x2, 0x0, 0xfffffffd, 0xffffffffffffffff}) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) semget$private(0x0, 0x4000000009, 0x12) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f00000002c0)=@file={0xa, 0x1, './file0\x00'}, 0xa) open$dir(&(0x7f0000000480)='./file0\x00', 0x8201, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) ioctl$DIOCBEGINADDRS(r3, 0x8004667d, &(0x7f0000000240)="39400223") getresuid(0x0, &(0x7f00000000c0), 0x0) r4 = openat$filemon(0xffffff9c, &(0x7f00000001c0), 0x20000, 0x0) r5 = socket$bt_hci(0x24, 0x3, 0x86) getsockopt$sock_timeval(r5, 0xffff, 0x1005, &(0x7f0000000100), &(0x7f0000000180)=0x8) ioctl$FILEMON_SET_FD(r4, 0xc0045301, &(0x7f0000000200)=r2) r6 = kqueue() freebsd11_kevent(r6, &(0x7f0000000240)=[{0x480, 0xfffffffffffffff5, 0x8, 0x2, 0xd, 0x2}, {0x6, 0x0, 0xcb3d1ad58c9cc53a, 0x400, 0x4, 0x100000001}], 0x2, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x3, 0x0) getsockopt$sock_timeval(r7, 0xffff, 0x1010, &(0x7f0000000040), &(0x7f0000001840)=0x8) kqueue() r8 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6082d2f300183c00fe880000000000000000000000000001ff0200000000000000000000000000012c0000"]) ioctl$KDGETMODE(r8, 0x40046676, 0x22e00000) 132.047307ms ago: executing program 4 (id=401): r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_group_source_req(r0, 0x0, 0x55, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) msgget(0x1, 0x643) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x2, @rand_addr=0x8}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x20100) dup(0xffffffffffffffff) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f00000000c0)={0x10, 0x20, 0x1, &(0x7f0000000000)='\x00', 0x6a, &(0x7f0000000100)="f186b2390c01ec3a32974c80ca3e80decba79d63bb23666a03b16ae9280c8fef859644ded8a3579ede81abee51b3db2a02a402f6783c69d03043d803f8a79ddc0081ab99885925416ead3af7a8364ab442f4876287d75d9317f7a7948a3ae3bf13dfff85dd9c67ed84d2", 0x0, 0x4d46b770, [0x0, 0x0, 0x400]}) ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f00000003c0)={0x40, 0x3, 0x80, 0xb, 0x0, 0x0, &(0x7f0000000500)="511c9b8ab4242fb44e7e0d7ff71520fe576eac586cff398790fc204656b9ba7a7bcad902adf6d7cae7268aab496d824c0000000004000006a19b399824328d08047cc334d1f6e5389e32b4c3e03ec309a8387cba5e2a5bb100000000000000", 0x0}) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) cpuset_getaffinity(0x3, 0x2, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) writev(r4, &(0x7f0000000200)=[{&(0x7f0000000100)="19", 0x3a4e1e905c56cdb7}], 0x1) readv(r3, &(0x7f0000000240)=[{&(0x7f0000004080)=""/4109, 0x100d}], 0x1) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) r6 = socket(0x1c, 0x1, 0x0) r7 = socket(0x1, 0x1, 0x0) setsockopt$sock_int(r7, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) connect$inet6(r7, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0x1000000}, 0x1c) ppoll(&(0x7f0000000000)=[{r5, 0x4}, {r7, 0x2000}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x100}], 0x4, 0x0, 0x0, 0x0) sendto$inet(r7, &(0x7f0000000580)="3c035f752db359384ff210c490e5fc336ad3ab5ad0a63e30e93f1330f40f497c0416bff9597b42ced3448846c6bdf9edb0ea3c3e2e8da81e882a272360bf9d4a55ffb426f7c622e304f44b3a8c55656809dcaa5bbe8479f92d28b6d1ef62148738f581a829bbf519b67ebf0e2b3b9dacfc90442e5b39a7fc8066216fe9094899ca2801e1f00b4d074f340ec153fb03feae5463cb09d7543a7e04c4d921f1c4c3ee", 0xa1, 0x0, 0x0, 0x0) aio_readv(&(0x7f0000000480)={r6, 0x3, &(0x7f0000000340)="44b0c8a183f77e06f935d85fc9fb879de7430532027c9af6b31ae37e7716371dc3cbd920395f35b8692e8378b0100b5a0e", 0x31, [0x6, 0x7e5], 0xfffffffe, 0x6, 0x8, {0x8, 0xd17, &(0x7f0000000b00)="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"}, {0x2, 0x20, @sival_int=0x5, @thr={&(0x7f0000000240)="29df8fea501286f900000037000000643a650af126ecc4e26da86f0026697cf21d00000080876a5ec4c17d2809f2a5", &(0x7f0000000280)="fba84ec2b96debb7cfff3a1d2d427a6bb36118e2d265233fb43f63883ec1864ee575c382147f28cf9464d2103644038da0d23f16179517b0b38b437066ac0a86cce7b7e741a2a8e1509ed23155b6432f6cefd6ccbfd6c369ef0989495dcd"}}}) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) socketpair(0x1, 0x2, 0x85, &(0x7f0000002ec0)={0xffffffffffffffff}) sendmsg$inet_sctp(r8, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, &(0x7f0000003080)=[@authinfo={0x10, 0x84, 0x8, {0x3}}], 0x10, 0x20000}, 0x80) syz_emit_ethernet(0x2e, &(0x7f0000000000)=ANY=[@ANYBLOB="9f4c4662c957ffff48fd2ea8d5e65ac2502b4fdb5078ffffffff080045000020006800000102907800000007e000000211089078e000000102000000"]) 80.839446ms ago: executing program 3 (id=190): r0 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r1 = socket(0x1c, 0x1, 0x0) bind(r1, &(0x7f0000000180)=@un=@file={0x13, 0x0, './file/file0/../\x00'}, 0x13) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x0, 0x110) mkdirat(r2, &(0x7f0000000180)='./file1\x00', 0x0) renameat(r2, &(0x7f0000000200)='./file0\x00', r2, &(0x7f0000000280)='./file1\x00') r3 = open$dir(&(0x7f0000000580)='./file0\x00', 0xa9ea14dd067a52b, 0x20) mkdirat(r3, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x10) r4 = open$dir(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000000)='./file0\x00', 0x4) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f0000000340)='./file0\x00', 0x0, &(0x7f0000000440)="73f957a6d8dfb300eb8832d1d6338352b53859393f74b6b909200669a6f27950e1ea8c5b7ca3809fab8c4a585ec09ac40c1dc8d795aea46476d0a84dcadfc73973d5e4c800"/78) renameat(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', r4, &(0x7f0000000400)='./file0\x00') r5 = socket(0x1c, 0x5, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0xb, &(0x7f00000004c0)=0x9, 0x4) truncate(0x0, 0x3) execve(0x0, &(0x7f0000000240), 0x0) r6 = openat$ptmx(0xffffff9c, &(0x7f00000002c0), 0x2000000, 0x0) fcntl$setstatus(r6, 0x4, 0x44) fcntl$setstatus(r1, 0x4, 0x4) chmod(&(0x7f0000000180)='./file0\x00', 0x32d) openat(0xffffffffffffff9c, &(0x7f000000c380)='./file1\x00', 0x8, 0x102) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) aio_readv(&(0x7f0000000140)={0xffffffffffffffff, 0x0, &(0x7f0000000040)="04", 0x1, [], 0x1, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sigval_ptr=0x10}}) lio_listio(0x0, 0x0, 0x0, &(0x7f00000048c0)={0x3, 0x17, @sigval_int=0x3, @spare=[0x59, 0x6f1, 0xe, 0xfffffff7, 0x9, 0x5, 0x80009, 0x8]}) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0xffffffffffffff56, &(0x7f0000000380)=[{&(0x7f0000000540)="c8", 0x1}], 0x1, 0x0}, 0x80) 0s ago: executing program 0 (id=402): socket(0x1c, 0x1, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r2 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000dc0)='./file0\x00', r2, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r3 = open$dir(&(0x7f0000000100)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000a80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) link(&(0x7f0000000940)='./file0\x00', &(0x7f0000000d40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') symlink(&(0x7f0000000ac0)='./file0\x00', &(0x7f0000000e40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000600)='./file0\x00', &(0x7f0000000f40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r5, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x0}, 0x10, &(0x7f0000000280)=[{0x0}, {0x0}, {&(0x7f0000000140)}, {0x0}, {&(0x7f0000000500)="b311e2ad42fa6094f47c211826ef52f550a7cc8540dfb028234578a8815100d578d78987758840d0d0fc7185bbee2303be8763c9ae55c670b3de77a6cdbcca15d14c689b18517d5e6f52ce3d894bedaef4d0aab5e721394cab1ed38327a881f7a83e00167ae590fce65b6960b61f48101f040c01138d02b1e25b9d266deaf1c2a5df867f633c849535fd892cb7d04df578f64a9e708ad10e0000dda737e87040a795", 0xa2}], 0x5, 0x0, 0x0, 0x149}, 0x4) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffffffffffff0100000001080006040001ffffffffffffbb6645d2b7c251e455acfa4c4917aa201fbef37474ef7c19fac128b0a82b0a07e00bbd34faffe8e451f92e00fe346b6540578dd9438dbffafcf2bd77f7d5c72eacbf2159041e2532803ffcbcb82de4b30000000006eb874a68f87d986adf6b8d6362fc935443e3d0261b44334d4fc41c157aa76c3f89a4483f5a8580935fbdf61797ef5e9cb94fc1bbb7460c76bcc24ab5316e8b848555cd55181d243e3dbedb0e85bb342a24e4b67c9c2330b2a4265facedb0d395d71f4c432518e9d349ad0e69a97584e581dbf8b86c20aa252cc6cad80eab6001cba86f23"]) setsockopt$inet_mreqsrc(r6, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback, @multicast1}, 0xc) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) aio_readv(&(0x7f0000000480)={r4, 0x3, &(0x7f0000000880)="44b0c8a183f77e06f935d85fc9fb879de7430532027c9af6a31ae37e7716371dc3cbd920395f1ab8692e8378b0100b5a0e8e924d5a93ec042bfa9a0550b1ba", 0x3f, [0x6, 0x7e5], 0xfffffffe, 0x6, 0x8, {0x8, 0xd17, &(0x7f0000000b00)="c3cbbbd7b6661209a0378c369defd9cd44b7a85a7cf5a426b7d0bb97056621af7e7dad94ef95aedaa56bdbf7c914bd1828debb211719478cf50fc320fdc7f8bfd10b4c691e1d3b7ca6fdb778805acc3e157aca8194d7441e37163ca0a989e1d03b15379efd0f85029dc5fa3a91087e6f7164026574e241ad01cc1517c4d6c94143bec47fc1609a2503f6d2f850eed66e6f6e78b42a5be523e1cddef26dc7fd5628060dce3c59a169cf1fdbdf1565a300d4ce4f69c78846f338b203ba93487347795d4e45814d967ef8589844a9c39adc5398520b86594cb99b0edf630793e7ccca92a21c5d051e562ed77bced1b2ac7c6e264aed91a67d0077dadb42af97c537f1eb9f7f6bc048b5341b25b042145a270760f4e91fac993ce542fc1ae1c12f3494074913fe4d0bc9c15b6a079080db4c018bee8d1e89267ae4dfca41772cd6c49dddb8aeb199b34442a8177e6282e7ffc3c4936dc38c27bd19e63a79c87662e145b747d2c71f320869de3459645718e9fb2c8d078a55470e6d5718d00d55b5fa3ca21c48da633a99c4ca491635a3492175642f35b83250386ab4bf737b476cdd68a446d87e26e3820b25d210f4ea62f40943ea8c455291be2d9bf8fc18749b5b6a0252c719d793a002c74551e3d352e2b33fa55e71b357bfe329c81cbe63e9c7b68f185a1e7075821abbb7feb4502da1309c794972d90602d8631b5576319e6026d25a28a9f370213197575b14f4fe21acf5f71d7b682ae477e37c74c5310c490bc8f5400d9e7211deda9d20150debb58997369cfa64f516e7f1af980ec27dd9e9be8b2d6c81f9185e44b67f8f809671af4bb1095ea23bc0a881c3c610d02eaaca7e9b4ad3d696c7f5a51dd869a244a799ed12c4c76c46ead9247539bf85079766a9c17c9c3830ed7a484fe2e5cb6eded8f7c4346122ef30a888ea47dd2e621a2dc2ce4e52f4aff736222d3fce488582573225dab0c2451a9947c57c9ad6bb9d0940e1e79ccb542e8427d6890497e40cc06c68c7a95a85956d17de0927ad1595a177bf66be0bd95bb6b521190a94d158352f4443b603935750f8ad24c5b2a655a73e6bb5a31342d522b34330bb1932732f753b21b1efe7a8d33452eaa4883c777efa3b796a12e7223d0f272637600e5fe25dd47b9a59570d1fbe3da5b4fdd9b5472bb494a219bb24ee62bf814aba3eebff33ab1dd3ea8171f33a86651655b8885c4fca1cc9a65770dcce3106db6bf7350bbf67bbf76d127c09f1c0fe9999d6d9aee3011112d2360746432c06ba9bd109225536df05c2b214cc4489c60ebc8f0cbb90a675ce156632d8c0074dc9c42d25dfc12f92db7ab1c8dd719cf6b6312acb3a9f04edfae2cbaef8cda029d3b2bfb7ca96476b3ce4dac1859df8e4dfb99120aeddb4422ae3f44a5fb72d14ac70ce8bfad0ad77990f44431076299d60777139fc7c07c26a99869e7c2209a20f27a6b09892cbb10734d26f711aaf5ba557759c76813d55f94590e96f198635bef66befb72459ac2cc2d2cb4c062ce6892127c5effab8f2eb0fdc72c9d6bcf1f6e19e0952c174276da81b93870ab836b3e91a65be5a5c5510430bb3084b959b5a1576647d546c4685f48bce545942f738e8b402fe00ff74596a7ef156a711d50b844e5f70e57ffb7507e91df8f6dc3ac83774bbc7ae82a361ffdb115982c41847a42d3f576c9a04170ad50fb39c86181df76ff8a47b0b03687142a76efb490598fbd8c3b84c63cc5940cda5d36e1a8aafdb4926608b12e4a46dd25409d47fddaf4d986a18731216641a139cd249fe0b420f8bfc4dc91f006b48067b663db5f8e5e6fac96c2257b785afb420e6419fa379cac5b0f07a7a687c5c62579648a4b3f389633509de48e7af7fdafe014e22ade3d38c0c67778a18b8051d88816e1f377b5b7a5df4333e6ff67f662d6b77fb81a49c374648bd76173bb07e3e46cb3a7450e55c4adbfa7c0e45f7ecdfe85a353923968df45fb8cdd6586c17c8de7b807a5746489760d27c9aceb0789eaf934cc6d3e43a958b25792215302bd87fb87726f5072374ef72cb568de371cf4bdfe8db6dff2c8a8e228964ab6f7ab2dee5a26283152d7ab70b3602707aed4c982ef9e39f6fd486a6b95d759f8f4813e9ff74c2fb81e46c7b976b18a757819e99939b8d9a3f5a53fbbee8e02bcb4cec5cd997c8d070356abd7d5bfa7a1d10e4ec02346b290fb134687110519a515eacee866b735638828f4638e6b64c571ee8f48e2c836d85a91212be2073cba3c939b52f62ce1eb25e87dd14ee2327fc492efeaa0b80aeec9577dafcf6a8097d1ee350741a0ba94b4dd0d9136e7e4c0e20f058f526e0cbc582d3cb184f7653d5e15cf86e90f3308f864519b865f9992a3763cf0a62099c7e0c379119c568aaab2341756b8542a772ee8d57004ce7ca31c3b3e238ee2a10106ce2cf4bc8dc9a9896791ae07b43f0e464aadefb680e58373ece0b20dcdb4a38182c7bb7808f6def6c44f3aa040568edcf446c26b5d37d88ac400ac53a3cfa703dab1afe3acc188368da215dabe332c77fb1c096c300ea01da0088e3f1b4c03f68d9e6c880c46cbdc47edf3508cc6601d36a81cb3d6a9267f6321bf5e71b4e9f5fe21b581d8a241eac28bd746cdcd105efc18524d4858ddf409c83b43ba4deaaaeac50fd145a6c2e77af6bb4a3f166a9b6019a31b37b57bd9d0425ef1893d66efb3d4b537bebdbaf65b638fca81a6a2ffb8cb114fffff52ed3e3aa1b1b73c7bc9cedbca3d01dfeb7b3b8d1ee41dd6516dc006bd088bbe710d98eb870ed2adf"}, {0x2, 0x20, @sival_int=0x5, @thr={0x0, 0x0}}}) chflags(&(0x7f0000000100)='./file1\x00', 0x40088) setsockopt(r4, 0x0, 0x1, &(0x7f00000000c0)="6de61c9a4490146163ef7771858c88a83b515ab5d0495363ec", 0x78) socketpair$unix(0x1, 0x2, 0x0, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) r7 = openat(0xffffffffffffffff, &(0x7f0000000240)='./file1\x00', 0x40000, 0x40) ioctl$KDENABIO(r7, 0x20004b3c) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.155' (ED25519) to the list of known hosts. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4800 ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077dc3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe007a223800 if_delmulti_locked: detaching ifnet instance 0xfffffe007a223800 if_delmulti_locked: detaching ifnet instance 0xfffffe007a223800 if_delmulti_locked: detaching ifnet instance 0xfffffe007a223800 if_delmulti_locked: detaching ifnet instance 0xfffffe007a223800 if_delmulti_locked: detaching ifnet instance 0xfffffe007a223800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe007a223000 if_delmulti_locked: detaching ifnet instance 0xfffffe007a223000 if_delmulti_locked: detaching ifnet instance 0xfffffe007a223000 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe007a223000 if_delmulti_locked: detaching ifnet instance 0xfffffe007a223000 if_delmulti_locked: detaching ifnet instance 0xfffffe007a223000 SYZFAIL: too much cover cov=1864135 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 proc=3 req=190 state=3 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2000 show registers Password: Login incorrect login: ps Jan 1 00:00:22 ci-freebsd-i386-3 login[748]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect