last executing test programs: 27.62740036s ago: executing program 1 (id=130): openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x2000) freebsd11_fstat(r0, &(0x7f00000000c0)) mkdir(&(0x7f0000000040)='./file2\x00', 0xc1) rename(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)='./file2/file0\x00') 27.626825339s ago: executing program 1 (id=131): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x72) pread(r0, &(0x7f0000000380)=""/4096, 0x1000, 0x7fffffff) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/197, 0xc5}], 0x1) (async) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000100)=""/197, 0xc5}], 0x1) readv(r0, &(0x7f00000015c0)=[{&(0x7f0000001400)=""/39, 0x27}], 0x1) r1 = socket(0x10, 0x1, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(r2, 0x14040000) syz_emit_ethernet(0x4e, &(0x7f0000000640)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4, 0x40, 0x67, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x2, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x10, 0xa7, 0x0, 0x4, {[@nop, @sack={0x5, 0x2}, @window={0x3, 0x3, 0x8}, @md5sig={0x13, 0x12, "f8b82f9244be4f73d423d70591af9442"}]}}}}}}}) (async) syz_emit_ethernet(0x4e, &(0x7f0000000640)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4, 0x40, 0x67, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x2, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0xb, 0x10, 0xa7, 0x0, 0x4, {[@nop, @sack={0x5, 0x2}, @window={0x3, 0x3, 0x8}, @md5sig={0x13, 0x12, "f8b82f9244be4f73d423d70591af9442"}]}}}}}}}) seteuid(0xffffffffffffffff) (async) seteuid(0xffffffffffffffff) socket$inet6_udplite(0x1c, 0x2, 0x88) (async) r3 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r3, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=ANY=[], 0x1c}, 0x0) getsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x9, 0x6, 0xb, 0x4, 0x4}, &(0x7f0000000100)=0x14) setsockopt$inet6_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000140)={r4, 0x6}, 0x8) (async) setsockopt$inet6_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000140)={r4, 0x6}, 0x8) chroot(0x0) rename(0x0, 0x0) (async) rename(0x0, 0x0) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x10, r1, 0x9) syz_emit_ethernet(0x6e, &(0x7f0000000200)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "dcffd9", 0x38, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06db3e", 0x9e0, 0x2b, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @loopback, [@hopopts={0x23}]}}}}}}}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 26.756917917s ago: executing program 1 (id=138): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) socket(0x1c, 0x2, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x800, @mcast2, 0x1}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa94eb09066dbd86dd60db834400081100fe8000000000000000000000000000bbff0200000000de4d224e2200089078000000000000000000"]) connect$inet6(0xffffffffffffffff, 0x0, 0x0) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) setgid(0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 25.882503794s ago: executing program 1 (id=141): r0 = socket(0x1c, 0x1, 0x0) r1 = openat$crypto(0xffffff9c, &(0x7f0000000000), 0x400000, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) msgget$private(0x0, 0x100) r3 = fork() sigqueue(r3, 0x51, @sigval_ptr=0x1) wait4(0x0, 0x0, 0x10, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0x68, &(0x7f0000000040)={{0x1c, 0x1c, 0x2, 0x6d1d0b5a, @loopback, 0x3}, {0x1c, 0x1c, 0x0, 0xefa, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x9}, 0x6, [0xb, 0x0, 0x5, 0x2, 0x5, 0x4, 0xf, 0x7]}, 0x5c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udplite(r4, 0x88, 0x2, &(0x7f0000001100)=0x50, 0x4) sendto$inet(r4, &(0x7f0000002580)="62cb0ea269513000aeff32ad4c450042583fb8dd613b786dc5b07d90dd3f01372a46121cba635a4fb05c05c70bb5522eb022a01e67ca4c159e0a314331aec9184b33d1d26e7c34d489", 0x49, 0x20001, &(0x7f0000002600)={0x10, 0x2, 0x0, @multicast1}, 0x10) socket(0x2, 0x1, 0x0) getsockopt$inet_mreq(r2, 0x0, 0xd, 0x0, 0x0) r5 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x400, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_MODE(r6, 0x6, 0x28, &(0x7f0000000100)=0x2, 0x4) socket$inet6(0x1c, 0x3, 0x0) ioctl$BIOCSETF(r5, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) r8 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r8, &(0x7f0000000340)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000002900000017"], 0x1c}, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffd}, 0x1c) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f00000000c0)={0x29, 0x25, 0xfffffffffffffec5, &(0x7f0000000280)="cefb2c5a4307b3dea58cb9748090074b2bbd10a0248812d2260a0327257df0c62ab5fd962aa6ba4bbc0382f90bf1069c0b84ca0ca7c0f0cff97f79f4406ed120f01445d9de560a0aa2e51657f0bb85c85dac3b683fb5e13190f670f408539299a0103f718d9b30956c17c8163422cc4d8022d808c329949c612341247b0168835014ae9bfe529f7d1a93c4c0c0487ef7d62442823199156a4acf", 0xe8, &(0x7f0000000340)="2a4d799468bd1b0aee38d5ac271115f3f02e39e6f2865c935a090f936ad6a72fe5e1ffd5825a9b71bd66a88f8c02fdfdb12bff74ce14cab17a1d7fd6310ae0e4fbad572dbbfb1869eb03812bfe14eef9b5db90ccf6b6783e355f0c4f51755ca1349af42b90552a850055ea9dffda3aeb925c29e875fd23f63d5cdf63cc58e68b83f44527bc484b5996079ac80bd10cc11666d9029e9022ef956d945212172c665953e8c6e3ca2559befcbf284c0b82d4e75ce95de7e0526ca3c3722a5dfa08396395666040c165c4c9692e9b7aeaf3cba2444e3bcb137b6edb12af55d35e2d4bb297d3550bd117bb", 0x3ff, 0x3, [0x7, 0x1, 0xbe56, 0xa]}) sendto$inet6(r0, &(0x7f0000000240)="88", 0x1, 0x4, 0x0, 0x0) setsockopt$sock_splice(r0, 0xffff, 0x1023, &(0x7f0000000000)={r0, 0x40, {0xff, 0x7ff}}, 0x20) 24.895538002s ago: executing program 1 (id=144): r0 = socket(0x26, 0x2, 0x0) r1 = openat$kbd(0xffffff9c, &(0x7f0000000080), 0x10000, 0x0) ioctl$KDGETMODE(r1, 0x40044b09, 0x0) nanosleep(&(0x7f00000000c0)={0xd37, 0x8}, 0xfffffffffffffffe) execve(0x0, 0x0, 0x0) freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x672cda28f543e327, 0x3) setgid(0xffffffffffffffff) r2 = socket$inet_tcp(0x2, 0x1, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000240)={'rack\x00'}, 0x24) setsockopt$inet_tcp_TCP_FASTOPEN(r2, 0x6, 0x469, &(0x7f00000000c0)={0x0, "f44a17b29d3b2d4600000500"}, 0x14) freebsd12_shm_open(0x0, 0x200, 0xc) setgroups(0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x7369a0733676a8) setsockopt$inet6_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000000)={0x7b, 0x4, 0x40, 0x2d, 0xb, 0x5b, 0x80, 0xb, 0x81, 0x94, 0x5}, 0xb) getsockopt$inet6_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000100), &(0x7f0000000140)=0xb) 24.526856545s ago: executing program 1 (id=148): r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000700), 0x800, 0x0) ioctl$MDIOCATTACH(r0, 0xc1c06d00, &(0x7f00000007c0)={0x0, 0x7, 0x1, 0x0, 0x5, 0x2, 0x7, 0x5, 0x3dc, 0x401, 0x0, [0x81, 0x8e, 0x5, 0xf79, 0x7ff, 0x4, 0x2, 0x6c, 0x181, 0x757, 0x3d4a, 0x4, 0x4, 0x6, 0x9, 0x808187, 0x6, 0x7, 0x0, 0xffff, 0x3ff, 0x0, 0xebf1, 0x5, 0x2, 0x2, 0x1, 0x1, 0x9, 0x10003, 0x10be, 0x7, 0x0, 0x5, 0xfffffffe, 0x8, 0x8, 0x51, 0x6, 0x7f, 0x0, 0x7, 0xa04, 0x5, 0x4, 0x1, 0x8, 0x1, 0x2, 0x3, 0xfffffff0, 0x7, 0x1000, 0x1, 0xc, 0x7f, 0x8, 0x7, 0x81, 0x8, 0x5, 0x5687, 0x9, 0x4, 0x3, 0xfffffff8, 0x8, 0x10001, 0x1, 0x200, 0x5, 0x1, 0x80000001, 0x6, 0xfffffffb, 0x2, 0x2, 0x5, 0x81, 0x2, 0x2b7, 0x1, 0x8, 0x5, 0x2e94, 0xdb, 0x0, 0x38b378fa, 0xb, 0xfff, 0x0, 0x7fff, 0x2, 0x2, 0x0, 0x9]}) 24.526618856s ago: executing program 32 (id=148): r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000700), 0x800, 0x0) ioctl$MDIOCATTACH(r0, 0xc1c06d00, &(0x7f00000007c0)={0x0, 0x7, 0x1, 0x0, 0x5, 0x2, 0x7, 0x5, 0x3dc, 0x401, 0x0, [0x81, 0x8e, 0x5, 0xf79, 0x7ff, 0x4, 0x2, 0x6c, 0x181, 0x757, 0x3d4a, 0x4, 0x4, 0x6, 0x9, 0x808187, 0x6, 0x7, 0x0, 0xffff, 0x3ff, 0x0, 0xebf1, 0x5, 0x2, 0x2, 0x1, 0x1, 0x9, 0x10003, 0x10be, 0x7, 0x0, 0x5, 0xfffffffe, 0x8, 0x8, 0x51, 0x6, 0x7f, 0x0, 0x7, 0xa04, 0x5, 0x4, 0x1, 0x8, 0x1, 0x2, 0x3, 0xfffffff0, 0x7, 0x1000, 0x1, 0xc, 0x7f, 0x8, 0x7, 0x81, 0x8, 0x5, 0x5687, 0x9, 0x4, 0x3, 0xfffffff8, 0x8, 0x10001, 0x1, 0x200, 0x5, 0x1, 0x80000001, 0x6, 0xfffffffb, 0x2, 0x2, 0x5, 0x81, 0x2, 0x2b7, 0x1, 0x8, 0x5, 0x2e94, 0xdb, 0x0, 0x38b378fa, 0xb, 0xfff, 0x0, 0x7fff, 0x2, 0x2, 0x0, 0x9]}) 9.997215726s ago: executing program 0 (id=210): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = socket(0x1c, 0x1, 0x0) (async) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) (async) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) (async) r1 = open$dir(0x0, 0x0, 0x0) (async) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) fchmod(r2, 0x8) (async) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1, &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) (async) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0xfffffffd, 0xfffffffffffffff9, 0x9, 0x5, 0xe8c5, 0x40000000, [0x0, 0x88f, 0x0, 0xfffffffffffffffe]}], 0x1, 0x0, 0x0, 0x0) faccessat(0xffffffffffffffff, &(0x7f00000022c0)='./file0\x00', 0x4, 0x4000) socket(0x17, 0x2, 0x0) (async) r4 = open(&(0x7f00000001c0)='./file0\x00', 0x80, 0xd8) kmq_timedreceive(r4, 0x0, 0x0, 0x4, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) open(&(0x7f0000000440)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x1, 0x1b9) (async) sigaction(0x9, &(0x7f0000000240)={0x0, 0x6, {[0x2, 0x4f, 0xfc5, 0x80]}}, 0x0) (async) open$dir(0x0, 0x80, 0x40) setgid(0xffffffffffffffff) (async) msgget$private(0x0, 0x261) (async) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) (async) r5 = semget(0x2, 0x9, 0x6f0) semop(r5, &(0x7f0000000300)=[{0x2, 0xfa9, 0x800}, {0x2, 0x4, 0x1800}], 0x2) (async) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={{0x0, 0x2710}, {0xfffffffd, 0x8}}, 0x0) 9.996207546s ago: executing program 0 (id=211): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) extattr_list_fd(r0, 0x3, &(0x7f00000001c0)=""/147, 0xfffffffffffffd8d) ksem_post(0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) profil(0x0, 0x0, 0x1, 0xd6) r1 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x82) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) cap_fcntls_limit(r1, 0x0) r2 = openat$ptmx(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x18289, 0x110) fcntl$dupfd(r3, 0x10, r3) write(r3, 0x0, 0x0) ioctl$DIOCGETTIMEOUT(r2, 0xc008441e, &(0x7f0000000080)={0x1, 0xff}) r4 = openat(r1, &(0x7f0000000080)='./file0\x00', 0x200, 0x22) socketpair(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom(r5, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) recvmsg(r5, &(0x7f0000003ec0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1149b) mkdir(0x0, 0x3d) socket(0x1c, 0x1, 0x0) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f0000000000)={0x3, &(0x7f0000000140)=[{0x4, 0x8, 0x0, 0x4}, {0x7, 0x0, 0x3, 0x20000004}, {0xfffe, 0x9, 0xa, 0x20003}]}) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) fcntl$lock(r6, 0xc, &(0x7f0000000140)={0x1, 0x1, 0xffff, 0x3}) r7 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r7, 0x29, 0x68, &(0x7f0000000080)={{0x1c, 0x1c, 0x1, 0x1, @loopback, 0x7fffffff}, {0x1c, 0x1c, 0x0, 0x400000, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x0, [0x8800, 0xfffffffd, 0x0, 0x6, 0x1, 0x0, 0x0, 0x5e]}, 0x5c) setsockopt$inet6_IPV6_RTHDR(r7, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) sendto$inet6(r7, 0x0, 0x0, 0x20101, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x3ee, @rand_addr="00000000000000020000001a6f947800"}, 0x1c) cap_ioctls_get(r7, &(0x7f00000000c0)=[0x0], 0x1) setsockopt$inet6_IPV6_RTHDR(r4, 0x29, 0x33, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x58) 9.75909191s ago: executing program 2 (id=122): open(&(0x7f00000003c0)='./file0/file0\x00', 0x800, 0x10) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = openat$bpf(0xffffff9c, &(0x7f0000000380), 0x1, 0x0) freebsd12_shm_open(&(0x7f0000000400)='./file0\x00', 0x200, 0x30) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x1) r3 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x40, 0x64) copy_file_range(r3, 0x0, r2, &(0x7f0000000100)=0x7fffffffffffffff, 0x1, 0x0) fchmod(r1, 0x168) r4 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x44, 0x0, &(0x7f0000000040)) syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x8], 0x2, 0x8, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int=0x8, @spare=[0x800, 0x1, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x100000000]}}) open$dir(&(0x7f0000000140)='./file1\x00', 0x4, 0xaa) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, &(0x7f0000002f00)={0x2, {{0x1c, 0x1c, 0x3, 0x8, @mcast2, 0xc}}, {{0x1c, 0x1c, 0x0, 0x400000d, @rand_addr="5d308af90759e53b2d911f2ae2462594", 0xf994}}}, 0xfc) rfork(0x16004) listen(r5, 0x0) setsockopt$sock_int(r5, 0xffff, 0x1003, 0x0, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000180)=""/139) r6 = socket(0x1c, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) r7 = socket(0x1c, 0x5, 0x0) cap_ioctls_limit(0xffffffffffffffff, &(0x7f0000000100)=[0x1, 0xa, 0x401]) setsockopt$inet_msfilter(r5, 0x0, 0x4a, &(0x7f0000000040)=ANY=[@ANYBLOB="e0000001000000000300000003000000ac1400bbc71400bb00000000"], 0x1c) syz_emit_ethernet(0x17a, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x1, 0x9}, {0xffffffff, 0x10}}) socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) 8.07201269s ago: executing program 0 (id=214): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) setregid(0xffffffffffffffff, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ioctl$SMB_SENDB(r1, 0xc020697c, &(0x7f0000000100)={0x67, 0x69, 0x2, @word=0x9, @byte=0x80, 0xd, 0x0, 0x0, 0x0}) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(r0, &(0x7f00000004c0)=@file={0xfb, 0x0, ""/249}, &(0x7f00000000c0)=0xfb) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, r4, 0x60000000) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 8.07054725s ago: executing program 3 (id=216): symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async, rerun: 32) r0 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) (async, rerun: 32) r1 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) chmod(&(0x7f0000000040)='.\x00', 0x35e) (async) setreuid(0x0, 0xee01) (async) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='.\x00', 0x21000630) mkdir(&(0x7f0000001040)='./file0\x00', 0x1) (async) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2, 0x0, @loopback}, 0x10) (async, rerun: 64) r2 = open$dir(&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000000, 0x101) (async, rerun: 64) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f00000001c0)='./file1\x00', 0x0) (async) rename(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async, rerun: 32) mlockall(0x2) (rerun: 32) setrlimit(0x6, &(0x7f0000000000)={0x7fffffff, 0x44}) (async) __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000080)=[0x199, 0xfffd]) (async, rerun: 64) renameat(r3, &(0x7f0000000200)='./file1\x00', r3, &(0x7f0000000140)='./file0/file0\x00') (rerun: 64) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) renameat(r2, &(0x7f0000000340)='./file0/file0\x00', r3, &(0x7f0000000380)='./file1\x00') (async) renameat(r2, &(0x7f0000000040)='./file1\x00', r3, &(0x7f0000000180)='./file0\x00') 7.787238457s ago: executing program 3 (id=219): sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(0x0) truncate(0x0, 0x3) kqueue() r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000500), 0x82, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(r0, 0x0, 0x200, 0x131) clock_settime(0x0, 0x0) ktimer_create(0x4, &(0x7f0000000000)={0x1, 0x8, @sival_int=0x8, @spare=[0x7, 0x9, 0xe61a, 0x2, 0x3, 0x6, 0x1, 0x3ff]}, &(0x7f0000000180)) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r2 = socket(0x1c, 0x1, 0x0) setreuid(0xee00, 0x0) r3 = fork() r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) open(&(0x7f0000000240)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x2, 0x4ebfac6bbaf7949) r5 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) mkdirat(r5, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r6 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x18) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r0, r6, &(0x7f0000000680)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x400) renameat(r4, &(0x7f0000000040)='./file0\x00', r4, &(0x7f0000000180)='./file2\x00') sigqueue(r3, 0x18, @sival_int=0xa) bind$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x1ff, @empty, 0x5}, 0x1c) r7 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r7, 0x0, 0x0, 0x80, &(0x7f0000000200)={0x10, 0x2, 0x1, @remote={0xac, 0x14, 0x0}}, 0x10) 7.678411818s ago: executing program 2 (id=122): open(&(0x7f00000003c0)='./file0/file0\x00', 0x800, 0x10) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = openat$bpf(0xffffff9c, &(0x7f0000000380), 0x1, 0x0) freebsd12_shm_open(&(0x7f0000000400)='./file0\x00', 0x200, 0x30) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x1) r3 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x40, 0x64) copy_file_range(r3, 0x0, r2, &(0x7f0000000100)=0x7fffffffffffffff, 0x1, 0x0) fchmod(r1, 0x168) r4 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x44, 0x0, &(0x7f0000000040)) syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x8], 0x2, 0x8, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int=0x8, @spare=[0x800, 0x1, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x100000000]}}) open$dir(&(0x7f0000000140)='./file1\x00', 0x4, 0xaa) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, &(0x7f0000002f00)={0x2, {{0x1c, 0x1c, 0x3, 0x8, @mcast2, 0xc}}, {{0x1c, 0x1c, 0x0, 0x400000d, @rand_addr="5d308af90759e53b2d911f2ae2462594", 0xf994}}}, 0xfc) rfork(0x16004) listen(r5, 0x0) setsockopt$sock_int(r5, 0xffff, 0x1003, 0x0, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000180)=""/139) r6 = socket(0x1c, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) r7 = socket(0x1c, 0x5, 0x0) cap_ioctls_limit(0xffffffffffffffff, &(0x7f0000000100)=[0x1, 0xa, 0x401]) setsockopt$inet_msfilter(r5, 0x0, 0x4a, &(0x7f0000000040)=ANY=[@ANYBLOB="e0000001000000000300000003000000ac1400bbc71400bb00000000"], 0x1c) syz_emit_ethernet(0x17a, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x1, 0x9}, {0xffffffff, 0x10}}) socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) 5.875024945s ago: executing program 0 (id=220): r0 = socket(0x1c, 0x1, 0x0) r1 = openat$crypto(0xffffff9c, &(0x7f00000001c0), 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) msgget$private(0x0, 0x100) r3 = fork() sigqueue(r3, 0x51, @sigval_ptr=0x1) wait4(0x0, 0x0, 0x10, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r2, 0x29, 0x68, &(0x7f0000000040)={{0x1c, 0x1c, 0x2, 0x8, @loopback, 0x3}, {0x1c, 0x1c, 0x0, 0xefa, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x9}, 0x6, [0xb, 0x0, 0x5, 0x2, 0x5, 0x4, 0xf, 0x7]}, 0x5c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udplite(r4, 0x88, 0x2, &(0x7f0000001100)=0x50, 0x4) sendto$inet(r4, &(0x7f0000002580)="62cb0ea269513000aeff32ad4c450042583fb8dd613b786dc5b07d90dd3f01372a46121cba635a4fb05c05c70bb5522eb022a01e67ca4c159e0a314331aec9184b33d1d26e7c34d489", 0x49, 0x20001, &(0x7f0000002600)={0x10, 0x2, 0x0, @multicast1}, 0x10) r5 = socket(0x2, 0x1, 0x0) getsockopt$inet_mreq(r5, 0x0, 0x9, 0x0, 0x0) r6 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x400, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_MODE(r7, 0x6, 0x28, &(0x7f0000000100)=0x2, 0x4) socket$inet6(0x1c, 0x3, 0x0) ioctl$BIOCSETF(r6, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r8 = socket(0x1c, 0x1, 0x0) r9 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r9, &(0x7f0000000340)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000002900000017"], 0x1c}, 0x0) ioctl$KDGETMODE(r8, 0x40046676, 0x22e00000) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffd}, 0x1c) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f00000000c0)={0x29, 0x26, 0x9a, &(0x7f0000000280)="cefb2c5a4307b3dea58cb9748090074b2bbd10a0248812d2260a0327257df0c62ab5fd962aa6ba4bbc0382f90bf1069c0b84ca0ca7c0f0cff97f79f4406ed120f01445d9de560a0aa2e51657f0bb85c85dac3b683fb5e13190f670f408539299a0103f718d9b30956c17c8163422cc4d8022d808c329949c612341247b0168835014ae9bfe529f7d1a93c4c0c0487ef7d62442823199156a4acf", 0xe8, &(0x7f0000000340)="2a4d799468bd1b0aee38d5ac271115f3f02e39e6f2865c935a090f936ad6a72fe5e1ffd5825a9b71bd66a88f8c02fdfdb12bff74ce14cab17a1d7fd6310ae0e4fbad572dbbfb1869eb03812bfe14eef9b5db90ccf6b6783e355f0c4f51755ca1349af42b90552a850055ea9dffda3aeb925c29e875fd23f63d5cdf63cc58e68b83f44527bc484b5996079ac80bd10cc11666d9029e9022ef956d945212172c665953e8c6e3ca2559befcbf284c0b82d4e75ce95de7e0526ca3c3722a5dfa08396395666040c165c4c9692e9b7aeaf3cba2444e3bcb137b6edb12af55d35e2d4bb297d3550bd117bb", 0x401, 0x3, [0x7, 0x1, 0xbe56, 0xa]}) sendto$inet6(r0, &(0x7f0000000240)="88", 0x1, 0x4, 0x0, 0x0) setsockopt$sock_splice(r0, 0xffff, 0x1023, &(0x7f0000000000)={r0, 0x40, {0xff, 0x7ff}}, 0x20) 5.871231259s ago: executing program 3 (id=222): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x2, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r2, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) sendmsg$unix(r1, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="10000000ffff000006"], 0x10}, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1b46d00, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x349d, 0x0, [0x10001, 0x8, 0x3, 0x0, 0x12, 0x9, 0x85, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x20000d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x200000, 0x3, 0x4, 0x0, 0xfffffffe, 0x0, 0xffffffff, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x20002, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8000, 0x9, 0x0, 0x0, 0xfe, 0xffff, 0xfffffffe, 0x0, 0x1000, 0x0, 0x9, 0x0, 0x0, 0x81000001, 0x0, 0x8, 0xb9, 0x0, 0x200, 0x0, 0xe, 0x4, 0x0, 0x9, 0x7c, 0xfffffffd, 0x3ff, 0xfffffff9, 0x0, 0x8, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90ba]}) setrlimit(0xf, &(0x7f0000000100)={0x60000000, 0x62000000}) pipe2(0x0, 0x0) r3 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3, &(0x7f0000000240)='./file0\x00') r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x7369a0733676a8) setuid(0xee01) extattr_list_fd(r4, 0x2, 0x0, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) dup(r3) r5 = socket(0x1c, 0x2, 0x0) fcntl$getown(0xffffffffffffffff, 0x5) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r5, 0x84, 0x107, &(0x7f0000000100)={0x0, 0x2, 0x2, 0x5, 0x4}, &(0x7f0000000140)=0x18) syz_emit_ethernet(0x22, &(0x7f00000005c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa080045000014fffc000000849278ffffffffac1400aa"]) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udp(0x1c, 0x2, 0x0) recvmsg(r7, &(0x7f0000000100)={0x0, 0x1b, &(0x7f0000000240)=[{&(0x7f0000000140)=""/218}, {&(0x7f00000002c0)=""/70}, {&(0x7f0000000340)=""/106}], 0x100000000000039d, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r0, 0x84, 0x24, &(0x7f0000000180)={r6, @in={{0x10, 0x2, 0x3, @rand_addr=0xc}}, 0x4dc4}, &(0x7f0000000280)=0x88) r8 = open$dir(&(0x7f0000000300)='.\x00', 0x8, 0x6a) setgid(0xffffffffffffffff) fchmod(r8, 0xf3) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 5.580942419s ago: executing program 2 (id=122): open(&(0x7f00000003c0)='./file0/file0\x00', 0x800, 0x10) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = openat$bpf(0xffffff9c, &(0x7f0000000380), 0x1, 0x0) freebsd12_shm_open(&(0x7f0000000400)='./file0\x00', 0x200, 0x30) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x1) r3 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x40, 0x64) copy_file_range(r3, 0x0, r2, &(0x7f0000000100)=0x7fffffffffffffff, 0x1, 0x0) fchmod(r1, 0x168) r4 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x44, 0x0, &(0x7f0000000040)) syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x8], 0x2, 0x8, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int=0x8, @spare=[0x800, 0x1, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x100000000]}}) open$dir(&(0x7f0000000140)='./file1\x00', 0x4, 0xaa) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, &(0x7f0000002f00)={0x2, {{0x1c, 0x1c, 0x3, 0x8, @mcast2, 0xc}}, {{0x1c, 0x1c, 0x0, 0x400000d, @rand_addr="5d308af90759e53b2d911f2ae2462594", 0xf994}}}, 0xfc) rfork(0x16004) listen(r5, 0x0) setsockopt$sock_int(r5, 0xffff, 0x1003, 0x0, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000180)=""/139) r6 = socket(0x1c, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) r7 = socket(0x1c, 0x5, 0x0) cap_ioctls_limit(0xffffffffffffffff, &(0x7f0000000100)=[0x1, 0xa, 0x401]) setsockopt$inet_msfilter(r5, 0x0, 0x4a, &(0x7f0000000040)=ANY=[@ANYBLOB="e0000001000000000300000003000000ac1400bbc71400bb00000000"], 0x1c) syz_emit_ethernet(0x17a, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x1, 0x9}, {0xffffffff, 0x10}}) socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) 3.713807694s ago: executing program 0 (id=225): truncate(&(0x7f0000000040)='./file0\x00', 0x4677) freebsd11_mknod(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x672cda28f543e327, 0x1) r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x3, 0x12, r0, 0x2000) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = socket(0x1c, 0x1, 0x0) aio_write(&(0x7f0000000240)={r2, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0x7ff, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r5 = socket(0x1b, 0x3, 0x0) getsockopt$sock_int(r5, 0xffff, 0x1003, 0x0, &(0x7f0000000080)) mlockall(0x2) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r3, 0x84, 0x901, &(0x7f0000000000)={0x0, 0x5, 0x8, [0x40, 0x4241, 0x5, 0x9, 0x0, 0xffff, 0x8000, 0x1]}, &(0x7f0000000180)=0x18) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000380)={@in6={{0x1c, 0x1c, 0x1, 0xfffffffa, @empty, 0x6}}, r6}, &(0x7f00000001c0)=0x84) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x2000) r7 = msgget$private(0x0, 0x790) mount(&(0x7f0000000580)='msdosfs\x00', 0x0, 0x0, 0x0) msgsnd(r7, &(0x7f0000000680)=ANY=[@ANYBLOB="03"], 0x400, 0x0) msgsnd(r7, &(0x7f0000000240)=ANY=[@ANYRESDEC], 0x401, 0x0) msgrcv(r7, 0x0, 0x0, 0x0, 0x1800) mlockall(0x0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000080)={@in6={{0x1c, 0x1c, 0x0, 0x78b1, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, &(0x7f0000000140)=0x84) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r1, 0x84, 0x107, &(0x7f0000000200)={r6, 0x4, 0x0, 0x9, 0x1}, &(0x7f0000000440)=0x18) freebsd11_stat(&(0x7f0000000780)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r8 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r8, 0x13c1) ioctl$PIO_DEADKEYMAP(r8, 0x20006b09, &(0x7f0000000880)={0xfffd, [{0x0, [0xdc, 0x0, 0x0, 0x3, 0x10, 0x2, 0x6f, 0x3e39, 0x9, 0x80000, 0x6, 0x400, 0x9, 0x3, 0x441, 0x8, 0x1000, 0x3, 0x6, 0x1000, 0x8, 0x40, 0xffffffff, 0x7, 0x10001, 0xe, 0x6, 0x2800, 0x5, 0xf, 0x380000, 0x1, 0xfffffffc, 0x7, 0x4, 0x1, 0xfffffff7, 0x4, 0x7, 0x67a, 0x7, 0x1, 0x2, 0x8, 0x0, 0x3, 0x8, 0x9, 0xff, 0x5, 0x7fff, 0xd5, 0x1, 0xffc, 0x9, 0x0, 0x19, 0x3, 0x6, 0x4, 0x4, 0x61e3, 0x3, 0xe7, 0x2, 0x4f, 0x7, 0x7, 0x6, 0xb67, 0x6, 0x17, 0x8, 0xf3fa, 0x81, 0x4, 0xfffffff7, 0x4, 0x23, 0x0, 0xa, 0x5, 0xffffffff, 0x4, 0x47, 0x7fffffff, 0x7, 0x4, 0x4, 0x3, 0xc63, 0x1, 0x9, 0x624, 0xe5, 0x3cd, 0x7ff, 0x5, 0x8, 0xb74, 0xf1, 0x7, 0x1000, 0x8000]}, {0x1, [0x100, 0x0, 0xa, 0x5, 0x7, 0x32b, 0x8, 0x1ff, 0x1, 0x1, 0x5, 0x0, 0xc604, 0x3, 0x7f, 0x1, 0x5, 0x469, 0xf2, 0xcb, 0x8, 0x80, 0x28000, 0x8, 0x10000, 0x1, 0x9, 0x3, 0x9, 0x5, 0xfffffff7, 0x400, 0x5, 0xba81, 0x3, 0xff, 0x6, 0x100, 0xb2, 0x8, 0x0, 0xd5e, 0x9, 0x9, 0x3, 0xa2, 0xa01, 0x3, 0x5, 0x9, 0x1, 0x5e7, 0x609, 0x3, 0x5, 0x80000001, 0xffffffff, 0x40, 0x80000000, 0x2, 0x0, 0x10, 0x52, 0x1, 0x102295d9, 0x3b14, 0x1, 0xfffffffd, 0x10001, 0x7, 0x6, 0x7, 0x3, 0x7, 0x8, 0x5, 0x84, 0x117, 0xe, 0x200000, 0x6, 0x9, 0x2, 0x2, 0x9, 0x4, 0x7fffffff, 0x3, 0x8a, 0x4, 0x1, 0x7fffffff, 0x4, 0x46fc8c79, 0x9, 0x4, 0x3, 0x2a, 0x3, 0xffffff81, 0xf0, 0xffffac5f, 0x1, 0x5]}, {0x2, [0x7fffffff, 0x2, 0x7ff, 0x7fff, 0x800, 0x8, 0x6, 0x7fffffff, 0xffffff60, 0x1000, 0x0, 0x2, 0x7a, 0x80000000, 0x1, 0xcc8, 0x5, 0x401, 0xfffffff7, 0x3, 0xb351, 0x4, 0x3ff, 0xd, 0x4, 0x1, 0x3, 0x9, 0xfffffffe, 0x15ece573, 0x1, 0x6, 0x80, 0x8, 0x68, 0x2, 0x7, 0xcfe, 0xfffffffd, 0x0, 0x9, 0x6, 0x6, 0x4a, 0x0, 0x0, 0xffffffff, 0xc, 0x2, 0x8, 0x4, 0xc, 0xca98, 0x5, 0xfcd, 0xf58b, 0x1, 0x401, 0x7, 0x0, 0x3, 0x2, 0x9, 0x1, 0xe73, 0xb3, 0x5, 0x7ff, 0x10000, 0x3, 0x80000001, 0x9, 0x0, 0x6, 0x3, 0x9, 0x3, 0x8, 0x5, 0x5789, 0x5, 0x6, 0x18e25fb5, 0xff, 0xfbec, 0x9, 0x0, 0x7, 0x6, 0x1b6d4879, 0x49a, 0xe, 0x5, 0x8, 0x10, 0x4, 0xfffff356, 0x8, 0x1, 0x4, 0x1, 0x6, 0x1]}, {0x7f, [0x3, 0x1, 0xffff997d, 0x1, 0x2, 0x7fffffff, 0x7, 0x5, 0xe047, 0x0, 0x6, 0x7, 0x2, 0x3, 0x5, 0x101, 0x62dc0df5, 0x371, 0x2, 0xef14, 0x6, 0xf4, 0x3, 0xe, 0x101, 0x5f0, 0x7fff, 0x2, 0x9, 0x5, 0xffff, 0x5, 0xac, 0x9, 0x9, 0x3, 0x5, 0x9, 0x3, 0x10001, 0xff, 0x235, 0x5c, 0xfff, 0x5, 0x17d5, 0x13, 0x1, 0x3, 0xdd, 0x7, 0x10, 0x77d, 0xfffffffb, 0x7f, 0x9868, 0x6c, 0x7, 0x9, 0x10, 0x3, 0x2, 0x0, 0x81, 0x6, 0x22e, 0x6, 0x0, 0xe, 0xf89, 0x42f1, 0x9, 0x200, 0x3, 0x80000000, 0x6, 0x2, 0x3, 0x1, 0xd, 0x7, 0x4, 0x806a, 0x1, 0x300000, 0x101, 0x10, 0x9570, 0x3, 0x1, 0x8, 0x4, 0x0, 0x12, 0x6, 0x6, 0x0, 0x26, 0x3, 0x8001, 0x109, 0x100, 0xffff, 0x40]}, {0x6, [0xd4, 0x4, 0xfff, 0x7fffffff, 0xfffffffd, 0x3, 0x66, 0x7, 0x6, 0x8000, 0x5, 0x5243, 0x3c48, 0x8, 0x1, 0x8, 0x8, 0x8, 0x5, 0x1, 0xce80, 0x5, 0x2, 0x809, 0x6, 0x10001, 0x78000000, 0x3, 0x1be000, 0xfffffff2, 0x834, 0xfff, 0x9, 0x8, 0xac, 0x7fff, 0x9, 0x1, 0xf5b9, 0x80, 0x4, 0x80, 0xbf5, 0x2, 0x4, 0x7, 0x8, 0x5e9a, 0x0, 0x6, 0xfe8, 0x3, 0x8, 0x0, 0x8, 0x931, 0xffffff00, 0x3, 0x1, 0x40, 0xebb, 0x7, 0x8000, 0xcc3, 0x81, 0x8, 0x1, 0xfff, 0x400, 0x800, 0x2, 0x15, 0xb849, 0x400, 0x3, 0xba5, 0x4, 0x401, 0x9b05, 0x8, 0x4, 0x3, 0x2, 0x8, 0x3, 0x3, 0x0, 0x80000000, 0x8, 0x1, 0x0, 0x7ff, 0x10000, 0x6a, 0xcfc, 0x9, 0xae1, 0xfffffff4, 0x8, 0xfffffffd, 0xf, 0x4, 0x7, 0x3]}, {0x0, [0x1, 0x4, 0x8, 0x8, 0x2a4, 0x8001, 0x5380, 0x10001, 0x0, 0xffffffff, 0x0, 0x2, 0x9, 0x2, 0x5, 0x1000, 0x31, 0x8, 0x3, 0x7, 0x6, 0x5, 0x7, 0x1, 0x2, 0x7, 0x9, 0x7, 0x0, 0x4, 0x1000, 0x1, 0x9, 0x5, 0x6, 0x0, 0x346c8c6d, 0x560, 0x6, 0xffffffff, 0x7fff, 0x7fffffff, 0xffffffff, 0x5, 0x4, 0x7, 0x9, 0x4, 0x7fff, 0x5, 0x7, 0x9, 0x8, 0xfffffeff, 0x7, 0x6, 0xf1, 0x8, 0x200, 0x5, 0x800, 0x1, 0x3, 0x86, 0x2, 0xfff, 0x80000000, 0x1, 0xc, 0x5, 0x7, 0x10001, 0x6, 0x6802, 0x3, 0x8, 0x5, 0x5000, 0x7, 0xd5c, 0x80000001, 0x1, 0x7, 0x98, 0x9, 0x1, 0x7, 0x9, 0x6, 0xffffff39, 0x8bdd, 0x88, 0x2, 0x7, 0x7f, 0xfffffffe, 0x0, 0xa, 0x40, 0xffffff80, 0x6, 0x1, 0x8, 0x8]}, {0x7, [0x7680, 0x5, 0x4, 0x1, 0x3, 0xd, 0xa, 0x2, 0xffff, 0x1, 0xfffffffa, 0x67f, 0x1, 0x7fffffff, 0x4, 0x8, 0xffffffff, 0x5, 0x3, 0x8001, 0xb, 0xfffffff7, 0x9, 0x8, 0x9, 0xffffff81, 0x5603, 0x60c7, 0x8, 0x8000, 0x8, 0x3, 0xd1b, 0xfffff620, 0x4, 0x6, 0x3, 0x7, 0x1, 0x5, 0xf, 0xc, 0x0, 0xffffff8c, 0x1, 0x5158, 0xffff, 0x101, 0x7, 0x7, 0x2, 0x4, 0x2, 0xc6ed, 0x6, 0x9, 0x0, 0xfffff000, 0x7, 0x80, 0x4, 0x9, 0xff, 0xe37, 0x9c, 0x8, 0x9, 0x0, 0x2, 0x5, 0x10000, 0x8, 0x8001, 0x8, 0x9, 0x9b5, 0x6, 0x1, 0x5, 0x6, 0x3, 0x9, 0x69, 0x5, 0x4, 0x8, 0x2, 0x746, 0x7, 0x3, 0x3e, 0x4, 0xf42, 0x8000, 0x0, 0x9, 0xfff, 0x2400000, 0x6, 0x7fffffff, 0x1c00000, 0x3, 0xfffffffd, 0x575]}, {0x9, [0x9759, 0xfffffffa, 0x2, 0x5, 0x6, 0x9f6, 0x6, 0xfff, 0x2, 0x3, 0x541b, 0x1, 0xffffffff, 0x3ff, 0x200, 0xbf7, 0x363c, 0x2, 0x9, 0x8, 0x0, 0x3, 0x101, 0x81, 0x1, 0x2c, 0xd, 0x4, 0x7, 0xa, 0x0, 0x5, 0x5, 0x8, 0x0, 0x101, 0x1, 0x2, 0xfffff001, 0x10000, 0x5, 0x8, 0x5, 0x9, 0x5, 0x4bdc, 0x2, 0x3, 0x63c80, 0xc266, 0x0, 0x5, 0x2, 0x9, 0x600, 0x2051, 0xc, 0x4f, 0x0, 0x4, 0x3, 0xffff, 0xef5, 0x2, 0xd, 0x3, 0x1, 0x80000001, 0x9, 0xf, 0x4, 0x3, 0xf, 0x5, 0x3, 0x70b1, 0x6, 0x8000, 0x5, 0xfffff68a, 0x9, 0x3, 0x1000, 0x5, 0xbd, 0xddda, 0x6, 0x4e72, 0x62c, 0x7ff, 0x3, 0x0, 0x3, 0x4, 0xffffffff, 0x2, 0x2, 0x8, 0x8, 0x1f70, 0x4, 0x1, 0x5ecc, 0x3]}, {0x0, [0x3, 0xffffffff, 0x12, 0x4, 0x3, 0xffff5b51, 0x800, 0x5, 0x40, 0xb374, 0x4, 0x9, 0x0, 0x8, 0xfffffffb, 0x1, 0xa5e, 0x5, 0xffff8001, 0xff, 0x4, 0x6, 0x0, 0x9e, 0xa479, 0x7, 0x10000, 0x3, 0x25c, 0x4, 0x9fb, 0x3, 0x7fffffff, 0x5, 0x10000, 0x3, 0x0, 0x10000, 0x1, 0x9, 0x8, 0x200, 0x3, 0x3b7, 0x99, 0x4, 0x5, 0xfffffffa, 0x1, 0x8, 0x7, 0x6, 0x3, 0x5, 0x26, 0x1, 0xc, 0x1, 0x9, 0x3ff, 0x7fff, 0x81, 0xff, 0x74, 0xffffffff, 0x5, 0x1, 0x0, 0x4, 0x2, 0x2000000, 0x1, 0x9e, 0x0, 0x3ff, 0x2, 0x1000, 0xb, 0xfff, 0x6fe6, 0x800000, 0x80000001, 0x2, 0x401, 0xc80, 0x4, 0xa7, 0x2, 0xfffffffd, 0x2, 0x0, 0x6ee8, 0xfffffbff, 0x1db5, 0x5f, 0xd, 0x3ff, 0x3, 0x7, 0x9, 0x8f6a, 0x7, 0xdc64, 0x70]}, {0x7f93, [0x9, 0xf, 0x4, 0x5, 0x6, 0x8, 0x80000000, 0x69c, 0xfffffff9, 0xfffffffd, 0x80000001, 0x5, 0x8, 0x37b0c325, 0x0, 0x33ec, 0xd8, 0x9, 0x0, 0x1, 0x2, 0x40, 0x8213, 0x4, 0x3, 0xb08b, 0x6b23570f, 0x9, 0x3, 0xc, 0x4, 0x3, 0xe0000, 0x940, 0x101, 0x3, 0x101, 0x0, 0x4, 0x9, 0x5, 0x8ad2, 0x5, 0x2, 0x8, 0xb543, 0x1000, 0x8, 0x0, 0x40, 0x7, 0x7, 0x182, 0x240, 0x1, 0x3, 0x40, 0x9, 0xab4, 0x8, 0xfffffffa, 0x8, 0x5, 0x8, 0x6, 0x2, 0x8, 0x5, 0x8, 0x2, 0xe8b2, 0x7, 0x6, 0x881e, 0x1, 0x44f34d61, 0x7ff, 0x80000001, 0x4, 0x10000, 0x1000, 0x400, 0x7, 0x30, 0x0, 0x1ff, 0x2, 0x80000001, 0x1000, 0x5, 0x1d16b865, 0xe, 0x4, 0xb, 0x4, 0xb6, 0xe9, 0xca, 0x1ff, 0x9, 0x1, 0x1, 0x10000, 0x6]}, {0x7b7, [0x80000001, 0x31c, 0x6, 0x0, 0xa, 0x0, 0xcb, 0xffffffff, 0x6f44, 0x6, 0xb0f1, 0x5, 0x1349, 0x3ae, 0x5, 0x7, 0xfff, 0x6, 0x6, 0x400, 0xff, 0x8, 0x6, 0x7ff, 0x1c7, 0x8, 0x1, 0xaec, 0x8, 0x6, 0x1, 0xff, 0xff, 0x1, 0x1, 0x10000, 0x5, 0xf, 0x7, 0x68c, 0x8, 0x7, 0x81, 0x40, 0x2, 0x9, 0x5, 0x6, 0x86f, 0x9, 0x15, 0x7, 0x53, 0x0, 0xfffffffe, 0x5, 0x9, 0x1000, 0x2, 0x5, 0xa02, 0x4, 0x8001, 0xfc9, 0x6, 0x8, 0x3ff, 0x9cd3, 0x0, 0x4, 0x19b, 0xfffffff7, 0x8, 0x3ff, 0x7, 0x3, 0x2, 0x1, 0x6, 0x9, 0x1, 0x4, 0x4, 0x5b59, 0xfffffff8, 0x8000, 0x6, 0x18000000, 0x6, 0x10, 0x4, 0x4, 0xffffffff, 0x3, 0x64, 0x8, 0x8a0, 0x7, 0x200, 0x7, 0x1, 0x1, 0xf]}, {0x80000000, [0x5, 0x2, 0xfffffff8, 0x3, 0x0, 0x7, 0x7, 0xb, 0x7a, 0x5, 0xa, 0x80000000, 0x1, 0x47d, 0x7d7, 0x1, 0x10001, 0x9, 0x557, 0x9, 0x2, 0x22f7, 0x8, 0xffffffbb, 0x140000, 0x4, 0xbe, 0x10000, 0x3, 0x81, 0x3, 0x9, 0x3, 0x7fffffff, 0x10000, 0x276, 0x4, 0x2, 0x3, 0x7f, 0x7, 0xce4e, 0x0, 0x423e, 0xa6d9, 0x9, 0x6106, 0x1000, 0x5, 0x81, 0xa9, 0x2, 0x0, 0x8, 0x7f, 0x401, 0x8, 0xfff, 0x3, 0x0, 0x0, 0x2, 0x5, 0x4, 0x8001, 0x0, 0x2d, 0x5, 0xfffffffd, 0x3, 0xff, 0xb4000, 0x5, 0x21, 0x3, 0x401, 0x5, 0x9, 0x80, 0x5, 0xd, 0x10000, 0xc, 0x3, 0x3, 0x1, 0x2, 0x81, 0x3, 0x2, 0xbf2e, 0x1a, 0x1, 0x80000000, 0x96d, 0x4, 0x0, 0xfffffff8, 0x0, 0x8, 0x4, 0x1908b29b, 0x5]}, {0xda, [0x1c90b4c5, 0x8, 0x4, 0xd, 0x2, 0x800, 0xfffffff9, 0x6, 0x1, 0x4, 0x1, 0x0, 0x0, 0x20, 0x2, 0x9c, 0x2, 0x0, 0x0, 0x4, 0x9, 0x1, 0x6, 0x7, 0x9, 0x2, 0x7b3, 0x8, 0x8675, 0x0, 0x8f8, 0x5, 0x8, 0x2, 0x6e, 0x5, 0x7, 0x9, 0x42c, 0x9, 0x0, 0x1e, 0x8, 0x6, 0xffffffff, 0xfffffffb, 0x3, 0xc, 0x7, 0x2, 0xfffffffd, 0x7ff, 0x10000, 0x0, 0x3, 0x81, 0x1, 0x2, 0xefaaac5, 0xc790, 0x6, 0x6, 0x3, 0x3, 0x5, 0x6, 0xfff, 0x2, 0xffff1960, 0x80000001, 0xfff, 0x8001, 0x1000, 0xb6b, 0x0, 0x8000, 0x8, 0xfffffff8, 0xbb60, 0xd, 0x9, 0x5, 0x7, 0x3, 0x6, 0x975, 0x3, 0x4, 0x7, 0x7fffffff, 0x0, 0x8958, 0x100, 0x7, 0x2, 0x6, 0x4, 0x0, 0x8e, 0x4, 0x4, 0xa, 0xfffffff3, 0x2]}, {0x200, [0x9, 0x7, 0x6, 0x9, 0x7, 0x4, 0x3, 0x6372f30f, 0xb, 0x1, 0x800, 0x2, 0x10001, 0x2, 0x5, 0x3, 0x4000000, 0x5, 0x1, 0xffffff90, 0x80, 0x4, 0x8, 0xfbc, 0x2, 0x8, 0x0, 0x7, 0xdc0, 0x3, 0x8, 0x10000, 0x0, 0x3, 0x6, 0x9, 0x5, 0x80, 0x3, 0x40, 0x3, 0x0, 0x6, 0x3, 0x5, 0xd17, 0x40, 0x5, 0x6, 0x4, 0x2, 0x4, 0x8, 0x56, 0x10001, 0x4, 0x9, 0x9, 0x3, 0x1, 0x4, 0x9, 0x2, 0xb, 0x3, 0x7ff, 0x5, 0x7fffffff, 0x0, 0x2, 0x1, 0x8, 0xb, 0xd, 0x3, 0x81, 0x1, 0x1, 0xffffff5d, 0x5, 0xb, 0x20, 0x4, 0x0, 0x2, 0xadf, 0x8, 0x7, 0x7, 0x1, 0x5, 0xb5e, 0xc, 0x6, 0x7fffffff, 0xb, 0xfff, 0xd, 0x79, 0xe7, 0x9, 0xd4, 0x1, 0x8]}, {0x1, [0x8, 0x0, 0xffff, 0x80000000, 0x5, 0x3, 0x3, 0x7, 0x3, 0x1, 0xf0c9, 0xfffffffc, 0x10000, 0x8, 0x0, 0x2, 0x40, 0xffffffff, 0x1, 0x0, 0x4, 0x1, 0x2, 0x7fffffff, 0xffffffff, 0xfffffb6d, 0x1f3, 0x1000, 0x0, 0x1ff, 0x8, 0x401, 0x7, 0x10, 0x1000, 0x80, 0x9d, 0x6, 0x7, 0x6, 0xddf, 0x0, 0x3406409d, 0x8, 0x0, 0x3, 0x7, 0x200000, 0x6, 0x4, 0xfac, 0x4, 0x7fff, 0x10000, 0x5358, 0x3, 0x732, 0x5, 0x4, 0x2, 0x9, 0x7, 0x2, 0xfffff800, 0x10001, 0xffff2238, 0x5, 0xfffffffd, 0x0, 0x2, 0xfff, 0x3ff, 0x4, 0x2, 0x2, 0x1, 0x1000, 0x6, 0x2, 0x7f, 0xfffffff7, 0x7ff, 0x5e91, 0x5, 0xffff, 0x3d, 0x10, 0x0, 0x1, 0x9, 0x2, 0x4d, 0x0, 0xfffffffa, 0xffff0001, 0xa, 0x1, 0x7f, 0x7, 0x9f5, 0x2, 0x7b1, 0x1400000, 0x101]}]}) 3.710434212s ago: executing program 3 (id=227): execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000040)='/,\'/\'!:\x00', &(0x7f0000000080)='}}\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000100)='&\x00', &(0x7f0000000140)='.(\x00', &(0x7f0000000180)='\'-]]/:\x00', &(0x7f00000001c0)='(\x00', &(0x7f0000000200)='\x00'], &(0x7f0000000300)=[&(0x7f0000000280)='\'^\x00', &(0x7f00000002c0)='\x00']) lpathconf(&(0x7f0000000340)='./file0\x00', 0xf) utimes(&(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)={{0x4, 0xfffffffc}, {0x400, 0x7}}) faccessat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x0, 0x800) r0 = fcntl$getown(0xffffffffffffff9c, 0x5) procctl$PROC_REAP_ACQUIRE(0x2, r0, 0x2, 0x0) r1 = __specialfd$eventfd(0x1, &(0x7f0000000440)={0x5, 0x6}, 0x8) futimesat(r1, &(0x7f0000000480)='./file0\x00', &(0x7f00000004c0)={{0x3, 0x5}, {0x2, 0x3}}) openat$crypto(0xffffff9c, &(0x7f0000000500), 0x200000, 0x0) extattr_get_link(&(0x7f0000000540)='./file0\x00', 0x2, &(0x7f0000000580)='\x00', &(0x7f00000005c0)=""/158, 0x9e) extattr_set_link(&(0x7f0000000680)='./file0\x00', 0x1, &(0x7f00000006c0)='.(\x00', &(0x7f0000000700)="18f809bf32078efd8bfe2342186d63686008cdba56579940db82f451535a82d1538fec23fe82bc3f248ffd9442ce469b5ead2efc3fc9e4b87d11f8a1f5ddfcb1ba4eeb6b34ea2939d8c3c8eb4bb17915c83239ed05f6836a4f8e1b5e75288ee40b216d415eec45be2e142ef94d174f0563e0e918c8dc55879e5f988d2c1d614c7642862a59f6001516ff1889c1ee1430d34291da", 0x94) ioctl$DIOCCHANGERULE(r1, 0xcb7c441a, &(0x7f00000007c0)="e07b1489f69367c51e38dbb6639e7a3e98e5968471068d6c11f2a0cbde95b0380fa9fc75315d18e7d71c772b9eef72b5bc8f4852b1541419db0ec40b6670fe656dd9d255a608818e0222493539765bb44ae3ea1aca2af958bdc65963ccfd7de0f4c4538acc27bb0a5796506eb02df916e219185c4155895109169bdca9398f62bffc1aff2076cb83e5eae3391de94cbf80568dd3ac51864fd8a40390e0373bdc01375c9e589822c59f161a2380e693c0723e552c590effe9383c2c18e5a7f2ceb4c015d0f3433e1b6daeb6ee0a2d8a2f98f5f04f9c") r2 = fhopen(&(0x7f00000008c0)={{[0x400, 0x2]}, {0x1, 0x1efc, "c2ae5857d480c763ea811ee8c82ae8be"}}, 0x100) fcntl$getflags(r2, 0x1) getpid() mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x3, &(0x7f0000000900), &(0x7f0000000940)=0x8) recvmsg(r1, &(0x7f0000002a80)={&(0x7f0000000980)=@in={0x10, 0x2, 0xffffffffffffffff, @broadcast}, 0x10, &(0x7f00000029c0)=[{&(0x7f00000009c0)=""/4096, 0x1000}, {&(0x7f00000019c0)=""/4096, 0x1000}], 0x2, &(0x7f0000002a00)=""/113, 0x71}, 0x40042) shm_rename(&(0x7f0000002ac0)='./file0\x00', &(0x7f0000002b00)='./file0\x00', 0x3) r3 = openat$ptmx(0xffffff9c, &(0x7f0000002b40), 0x200000, 0x0) ioctl$DIOCGETQSTATSV0(r3, 0xc0144432, &(0x7f0000002b80)="f660f1655edf2b5a08fbd08762d80f7d526fec0c2ca25fbdb8b5083ca3bd3f1ca9b96ad246ea5d5be81a59526eb214d503dd97867a69f7cf7efa3625c4312136a49d0b00b800d3cc1886d7558b365eec8b168ee6c33a505afd15563614c9e38a499bd85c4930aa405e880d00ec85dd739af2a77b7e158eb524c2dd504c9a5225080ffae136b6dd4b06f92d384ec3b27b8288baa50ddee8ad0d60d26c9cb20050f078a15318b9041c72b34f0fa6673520e079df4c") vfork() kmq_open(&(0x7f0000002c40)='./file0\x00', 0xa04, 0x105, &(0x7f0000002c80)={0x9, 0x14000000, 0x6, 0x510f}) getsockname$inet(r1, &(0x7f0000002cc0)={0x10, 0x2, 0xffffffffffffffff, @rand_addr}, &(0x7f0000002d00)=0x10) accept4(r1, &(0x7f0000002d40)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, &(0x7f0000002d80)=0x1c, 0x10000000) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000002dc0)={'bbr\x00', 0x7ff}, 0x24) ktimer_create(0xf, &(0x7f0000002f00)={0x1, 0x14, @sival_ptr=0x2, @thr={&(0x7f0000002e00)="660fd279c8c4c11576daf3e400d2a7feefffffc4c1d7515cbef1d19207000000660f3806bcfb8e000000c4e18dfa5fdcf74ce600a2d9000064660f2ee3", &(0x7f0000002e40)="094fcc02a87b6a7bd19d54d9e3a6a27f969ccc44f5613edd4036dfd1059104e13802e74bd2d9ee2e0185a8a1f46699f078f1b0fa8b18e8452ab5702425a4db0de2a37476de41c101304cb6a7911df507018945d5ab7ea1d9dfe1d49ce6ae49e2bc8d5fc4b58cd27f826fc15aedacaa368724c3606f4114532770ba142ee728b336d45424e129ca406d6c25e8b341c303d751b333194bd07903f4a9e31453817c81b9fc96"}}, &(0x7f0000002f40)) shm_rename(&(0x7f0000002f80)='./file0\x00', &(0x7f0000002fc0)='./file0\x00', 0x2) mincore(&(0x7f0000ff3000/0xd000)=nil, 0xd000, &(0x7f0000003000)=""/4096) setgid(0x0) 3.507155436s ago: executing program 4 (id=228): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f0000000240), 0x9, 0x4) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_waitcomplete(0x0, 0x0) bindat$unix(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000340)=@file={0x101, 0x1, './file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0x101) aio_read(&(0x7f00000001c0)={0xffffffffffffffff, 0x4000000000000000, 0x0, 0x0, [0xfffffffe, 0x8], 0x800, 0x8, 0x0, {0x8000000006, 0x3, 0x0}, {0x0, 0x100021, @sigval_int, @spare=[0x6, 0x5, 0x6, 0x6, 0xf5, 0x4, 0x5, 0x16c]}}) r2 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000080)=[{r2, 0x0, &(0x7f0000000080), 0x0, [0x9c, 0x7], 0x3, 0x6, 0x9, {0x0, 0x8, 0x0}, {0x1, 0x17, @sival_int=0x1, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0x800, 0x0, 0x0, [0x5, 0xb518], 0x2, 0x18, 0x8001, {0x8, 0x10000007, 0x0}, {0x1, 0x2, @sigval_int=0x7, @thr={0x0, 0x0}}}, {r2, 0x2, 0x0, 0x0, [0x9, 0x42], 0x5, 0x6, 0x0, {0x7f, 0x2, 0x0}, {0x3, 0x13, @sigval_int=0x3, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0xd, 0x0, 0x0, [0x0, 0xffffffdc], 0xcbbc, 0x6, 0x8057, {0x7, 0xffff8000, 0x0}, {0x1, 0xffffffff, @sigval_ptr=0xf, @thr={0x0, 0x0}}}], 0x4, 0x0) aio_cancel(0xffffffffffffffff, 0x0) r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r4 = kqueue() kevent(r4, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r5 = kqueue() freebsd11_kevent(r5, &(0x7f0000000080)=[{0x8, 0xa, 0x404c, 0x400, 0x8000, 0x1000}, {0x5, 0xfffffffffffffffa, 0x1, 0x4, 0x0, 0x6}, {0x81, 0xffffffffffffffff, 0x8001, 0x10, 0xfffffffc, 0x1}], 0x3, &(0x7f0000000480)=[{}, {}], 0x2, &(0x7f0000000100)={0xfa}) socket$inet6_udp(0x1c, 0x2, 0x0) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0x6, 0x1, 0x0) getsockname$unix(r1, &(0x7f0000000380)=@file={0xef, 0x0, ""/245}, &(0x7f00000001c0)=0xfffffe0f) setrlimit(0x8, &(0x7f0000000000)={0x9, 0x8000000000000000}) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) freebsd11_stat(&(0x7f0000000140)='./file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r3, 0xffffffffffffffff, r6) 3.186733517s ago: executing program 2 (id=122): open(&(0x7f00000003c0)='./file0/file0\x00', 0x800, 0x10) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = openat$bpf(0xffffff9c, &(0x7f0000000380), 0x1, 0x0) freebsd12_shm_open(&(0x7f0000000400)='./file0\x00', 0x200, 0x30) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x1) r3 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x40, 0x64) copy_file_range(r3, 0x0, r2, &(0x7f0000000100)=0x7fffffffffffffff, 0x1, 0x0) fchmod(r1, 0x168) r4 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x44, 0x0, &(0x7f0000000040)) syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x8], 0x2, 0x8, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int=0x8, @spare=[0x800, 0x1, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x100000000]}}) open$dir(&(0x7f0000000140)='./file1\x00', 0x4, 0xaa) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, &(0x7f0000002f00)={0x2, {{0x1c, 0x1c, 0x3, 0x8, @mcast2, 0xc}}, {{0x1c, 0x1c, 0x0, 0x400000d, @rand_addr="5d308af90759e53b2d911f2ae2462594", 0xf994}}}, 0xfc) rfork(0x16004) listen(r5, 0x0) setsockopt$sock_int(r5, 0xffff, 0x1003, 0x0, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000180)=""/139) r6 = socket(0x1c, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) r7 = socket(0x1c, 0x5, 0x0) cap_ioctls_limit(0xffffffffffffffff, &(0x7f0000000100)=[0x1, 0xa, 0x401]) setsockopt$inet_msfilter(r5, 0x0, 0x4a, &(0x7f0000000040)=ANY=[@ANYBLOB="e0000001000000000300000003000000ac1400bbc71400bb00000000"], 0x1c) syz_emit_ethernet(0x17a, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x1, 0x9}, {0xffffffff, 0x10}}) socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) 2.777082163s ago: executing program 0 (id=229): wait4(0xffffffffffffffff, 0x0, 0x10, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) freebsd10_pipe(&(0x7f0000000040)) (async) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) (async, rerun: 32) aio_write(0x0) (async, rerun: 32) truncate(0x0, 0x100000) (async) r0 = kqueue() (async) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000500), 0x82, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, 0x0) (async) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xfffffffffffffe80) (async) setsockopt$inet_mreqsrc(r2, 0x0, 0x46, &(0x7f00000001c0)={@multicast1, @rand_addr=0x3, @local={0xac, 0x14, 0x0}}, 0xc) (async) syz_emit_ethernet(0x46, &(0x7f0000000140)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x38, 0x68, 0x0, 0x0, 0x1, 0x0, @empty, @multicast1}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x11, 0x0, @multicast1, @empty=0x1c}, "b0539d6cdafafec4"}}}}}) (async) fspacectl(r0, 0x1, &(0x7f0000000100)={0x5, 0xffffffff}, 0x0, &(0x7f0000000140)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) (async) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) (async) clock_settime(0x0, 0x0) ktimer_create(0x4, &(0x7f0000000000)={0x1, 0x8, @sigval_int=0x4, @spare=[0x7, 0x9, 0xe61a, 0x2, 0x3, 0x6, 0x1, 0x3ff]}, &(0x7f0000000180)) (async, rerun: 64) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) (async, rerun: 64) r3 = socket(0x1c, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x1ff, @empty, 0x5}, 0x1c) (async) listen(r3, 0xd) (async) syz_extract_tcp_res(&(0x7f0000000080)={0x41424344, 0x41424344}, 0xffff, 0x4) syz_emit_ethernet(0xc0, &(0x7f0000000300)=ANY=[@ANYBLOB="570010000000aaaaaaaaaaaa8801000000004200a40419f200aa0005ff5907089078e0000001e0000002000ff203d9acde086b8440b219892889d43ee2ab65890897f2c6663cb80bdcac1400bbac1400aa4414162100007fff00000001ac", @ANYRES32=r4, @ANYRES32, @ANYBLOB="510400089078004000000204010004022211daa6a00806e13a6bcb017e2c373a4013129e1904ce973f3de648a3c94a16c7be831312348bf1e27de29ec12d9609a78f5f82"]) syz_extract_tcp_res$synack(&(0x7f00000000c0)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x85, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb08004b1000770000000000019078ac1400aa000000008209c2519f21a4b212440c008300000002000000080000004e204e23", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="d10300029078000602000005050a000000180000000513e31b824053063962f7a5372f9dac64ad6addc3ed97a8230b3acbd71b56628b2f8584ae3df006d75a7a637ed60310439313a674217469c28392a303212a1ae6d7e875ff7e3e4098ba32fed5ba6f7813851ae4bb974137deaed7cd995b0bf3c388082c6397b527dec4370997d8f2aad6670b93e7451774dd49f7b83201e882fcae0367ac94c13f8dbc1ee64071e8052974cd1904a7a97034df4011d4e025238aedc8b9c0f48fdb09da17495f6696f28f2e258727ba22cc5fd5e2c0ca071e4af2987e05b80ee8f5c68e89713fe5e3f7fbae045204ac2508b5f40d83d5e4bbc92691b8cb4963fa581398bb0f5339c89126eaf5858e3dc62d9148e2c68cdc2008d4d65da006803c0986dab644fefb6d019bc0699122eb92a048c3dbce48f3f934693b916ba9ce38b2d6016f1554c0af599045f71efb430676d17b5c922941d4da4ab2b5131aa1632d5e6756b0a905f7a0d28f68dce38848f50b36b964ee4a9f1d98675a91c2efabdcafd82d511b40e606cb04da8d58da39e0070ec8b330cae6b8ccd14679028ff52fbdb503f1c56718c5641ab145ee57faa41d18489c91084870764741c2e972416b0251c1a225f256ff26ef5e11f128d7a4029790bed1427bb26adff6536c54dc39302af497257a9415254d8501bf3bc73b79c8d0fa810f4fd8de44207db51b2f349310f7a028de2bf08e3cb2f8b0e75cb03243a7110067ee36a076ac7592ac88f9b3538ee87b471ccb0ed1fd5401cab237a63c97708e04b52f54166ea279a5c45350db90c0f3560f8c6792e35e4e46482179a40a753beee785d973e305f50eeb6502cc41a4a15727b3b5353e99eee8e2754f5ec4241c20018fcf34c0a68de639543dacb0e2a7f23bbe649497c9"]) (async) syz_emit_ethernet(0x52, &(0x7f0000000580)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "f1ff00", 0x1c, 0x0, 0xff, @remote={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6, 0x0, 0x0, 0x3}], @tcp={{0x1, 0x0, r5, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x43}}}}}}}) (async) open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x0) 2.776498589s ago: executing program 33 (id=229): wait4(0xffffffffffffffff, 0x0, 0x10, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) freebsd10_pipe(&(0x7f0000000040)) (async) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) (async, rerun: 32) aio_write(0x0) (async, rerun: 32) truncate(0x0, 0x100000) (async) r0 = kqueue() (async) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000500), 0x82, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, 0x0) (async) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xfffffffffffffe80) (async) setsockopt$inet_mreqsrc(r2, 0x0, 0x46, &(0x7f00000001c0)={@multicast1, @rand_addr=0x3, @local={0xac, 0x14, 0x0}}, 0xc) (async) syz_emit_ethernet(0x46, &(0x7f0000000140)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x38, 0x68, 0x0, 0x0, 0x1, 0x0, @empty, @multicast1}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x11, 0x0, @multicast1, @empty=0x1c}, "b0539d6cdafafec4"}}}}}) (async) fspacectl(r0, 0x1, &(0x7f0000000100)={0x5, 0xffffffff}, 0x0, &(0x7f0000000140)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) (async) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) (async) clock_settime(0x0, 0x0) ktimer_create(0x4, &(0x7f0000000000)={0x1, 0x8, @sigval_int=0x4, @spare=[0x7, 0x9, 0xe61a, 0x2, 0x3, 0x6, 0x1, 0x3ff]}, &(0x7f0000000180)) (async, rerun: 64) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) (async, rerun: 64) r3 = socket(0x1c, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x1ff, @empty, 0x5}, 0x1c) (async) listen(r3, 0xd) (async) syz_extract_tcp_res(&(0x7f0000000080)={0x41424344, 0x41424344}, 0xffff, 0x4) syz_emit_ethernet(0xc0, &(0x7f0000000300)=ANY=[@ANYBLOB="570010000000aaaaaaaaaaaa8801000000004200a40419f200aa0005ff5907089078e0000001e0000002000ff203d9acde086b8440b219892889d43ee2ab65890897f2c6663cb80bdcac1400bbac1400aa4414162100007fff00000001ac", @ANYRES32=r4, @ANYRES32, @ANYBLOB="510400089078004000000204010004022211daa6a00806e13a6bcb017e2c373a4013129e1904ce973f3de648a3c94a16c7be831312348bf1e27de29ec12d9609a78f5f82"]) syz_extract_tcp_res$synack(&(0x7f00000000c0)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x85, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb08004b1000770000000000019078ac1400aa000000008209c2519f21a4b212440c008300000002000000080000004e204e23", @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="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"]) (async) syz_emit_ethernet(0x52, &(0x7f0000000580)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "f1ff00", 0x1c, 0x0, 0xff, @remote={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6, 0x0, 0x0, 0x3}], @tcp={{0x1, 0x0, r5, 0x41424344, 0x0, 0x0, 0x5, 0x0, 0x43}}}}}}}) (async) open(&(0x7f00000000c0)='./file0\x00', 0x20000, 0x0) 2.637221449s ago: executing program 4 (id=230): socket(0x1c, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) socket(0x26, 0x2, 0x0) r0 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000040)=0x6, 0x1, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DIOCNATLOOK(r1, 0xc0402285, &(0x7f0000000740)="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") freebsd11_fhstatfs(&(0x7f0000000100)={{[0x5c8951ac, 0x3bea9983]}, {0x27c3, 0xf6, "09000000e4e328400000002000"}}, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) freebsd12_shm_open(&(0x7f0000000340)='./file0\x00', 0x200, 0x20) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000180)}, {&(0x7f0000000400)="08ad84a5871dde1c695ca2c3472fffc37f8dc9b52189cb806f694d311dc4666832479ee54356ba40535fa2a7be14384809d37f69f1fc89f249a1a7c763ef563affa522bde05865bb15ba2d7dbc0460e32547e374faed5d6256a6f62a0af0769f4bf43ccf96a59ec807bdba1c7f40db5763b3fb5e1d926f80572f9b9ac2112e516cb99367ff84a8396ecf0d01001354acfc4ad4485c0b53c9956130d6bcc066b34b590a785f9afce678ec482887330ecf95f794112866a16e313a8bd95e674a3ddb2da6d9c4fa23d27ae7148aac924bb5aa6d48b027670e58f7802990ef84988d570b00c3fbe70482f0fe13e8aecab7933a0beeb7baa809711baff2210ec8e7dd82d11fff5a58309101797d5956ea59fe66369ffc0a76267d5f9977a774aaa6b49994161db52f7cfd819b210967b7ca598ca9b3b71f1f27dff6b9efdc73807b414719558febb9d3e622925755ec7e61054f3918cf9d53d3cc806d4b9c83f231cc2e", 0x161}, {&(0x7f0000000380)}], 0x3) copy_file_range(r4, &(0x7f0000000000)=0x10001, r4, &(0x7f0000000040)=0x6, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0x68, &(0x7f0000000080)={{0x1c, 0x1c, 0x1, 0x1001, @loopback, 0x7ffffffc}, {0x1c, 0x1c, 0x2, 0x400000, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x0, [0x8801, 0xffffff7d, 0x0, 0x6, 0x1, 0xfffffffd, 0xfffffffb, 0x5e]}, 0x5c) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) r5 = openat$md(0xffffff9c, &(0x7f0000000140), 0x800, 0x0) ioctl$MDIOCATTACH(r5, 0xc1b46d00, &(0x7f0000000580)={0x0, 0xfffffffa, 0x0, 0x0, 0x1000ffb, 0x8, 0x6, 0x26, 0x0, 0x1, 0x0, [0x0, 0x2, 0x3, 0x0, 0x9, 0x4, 0x8, 0x0, 0x2, 0x5, 0x4, 0x0, 0x7fff, 0xa528, 0x0, 0x7, 0x0, 0x4, 0x0, 0xfffff000, 0x4, 0x9, 0x10000, 0x1, 0x0, 0x0, 0x448d, 0x1, 0xfffffff7, 0xee, 0x7, 0xffe00001, 0x7fff, 0x9, 0x9, 0x8, 0xfffffffd, 0x40, 0x7, 0x400, 0x4, 0x0, 0x80a7, 0xc381, 0x7, 0x1000, 0x7, 0x400, 0x28000, 0x7, 0x0, 0xe64, 0x80, 0x3ff, 0x1, 0x5, 0x0, 0x101, 0x11, 0x6cfd1400, 0x0, 0x7, 0x80100004, 0x9, 0x4, 0x8, 0xfffffffe, 0x4a05bb07, 0x4, 0x6, 0xfff, 0x0, 0x4, 0x6, 0x80000, 0xf8, 0x0, 0x349, 0x8, 0x3, 0x0, 0x6, 0x0, 0xc9, 0x5, 0x0, 0x800003, 0x0, 0x2, 0x10, 0x5, 0x0, 0x2000004, 0x4fabb25c]}) r6 = open(&(0x7f0000000000)='./file0\x00', 0x2000000, 0x22) r7 = kqueue() kevent(r7, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffa, 0x9, 0xffffff, 0x87, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) fork() fork() r8 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000440), 0x80, 0x0) ioctl$BIOCSETIF(r8, 0x8020426c, &(0x7f00000000c0)) ioctl$BIOCSBLEN(r8, 0xc0044266, &(0x7f0000000080)=0x10000) rfork(0x15050) rfork(0x1000) ioctl$BIOCLOCK(r6, 0x2000427a) connect$inet6(r6, &(0x7f0000000040)={0x1c, 0x1c, 0x1, 0xc2b8, @local={0xfe, 0x80, '\x00', 0x0}, 0x7}, 0x1c) fhlinkat(&(0x7f00000001c0)={{[0x7, 0x5]}, {0x40, 0x6, "1430c818010684cdd29a6400e081c5d5"}}, r2, &(0x7f0000000200)='./file1\x00') 2.587258677s ago: executing program 4 (id=231): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fchflags(r0, 0x408) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0x8, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, 0x0) ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x10000, &(0x7f00000004c0), 0x0, &(0x7f0000000040), &(0x7f0000000240)}) r2 = socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r3, 0xffff, 0x1001, &(0x7f0000000000)=0x3, 0x4) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x26, 0x0, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000140)=0xffffffff, 0x4) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0xa, &(0x7f00000001c0)={@in={{0x10, 0x2, 0x3, @loopback}}, 0x0, 0x9, 0xadc, 0x865551c4d4e95d99, 0x229, 0x6, 0x58}, &(0x7f00000000c0)=0x98) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x107, &(0x7f0000000000)={r5, 0x98c2, 0x1, 0xb, 0x525}, &(0x7f0000000040)=0x18) setsockopt$inet6_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x26, &(0x7f0000000080)={r6, 0x9}, 0x8) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) fchflags(r0, 0x408) (async) openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0x8, 0x0) (async) ioctl$CIOCGSESSION2(r1, 0xc030636a, 0x0) (async) ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x10000, &(0x7f00000004c0), 0x0, &(0x7f0000000040), &(0x7f0000000240)}) (async) socket(0x1c, 0x1, 0x0) (async) socket(0x1c, 0x1, 0x0) (async) setsockopt$sock_int(r3, 0xffff, 0x1001, &(0x7f0000000000)=0x3, 0x4) (async) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) (async) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) setsockopt$inet_tcp_buf(r4, 0x6, 0x26, 0x0, 0x0) (async) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000140)=0xffffffff, 0x4) (async) sendto$inet(r3, 0x0, 0x0, 0x0, 0x0, 0x0) (async) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0xa, &(0x7f00000001c0)={@in={{0x10, 0x2, 0x3, @loopback}}, 0x0, 0x9, 0xadc, 0x865551c4d4e95d99, 0x229, 0x6, 0x58}, &(0x7f00000000c0)=0x98) (async) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x107, &(0x7f0000000000)={r5, 0x98c2, 0x1, 0xb, 0x525}, &(0x7f0000000040)=0x18) (async) setsockopt$inet6_sctp_SCTP_PR_SUPPORTED(r3, 0x84, 0x26, &(0x7f0000000080)={r6, 0x9}, 0x8) (async) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) (async) 2.467667746s ago: executing program 3 (id=232): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r1, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @empty, 0x2}, 0x1c) connect$inet6(r1, 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, 0x0) aio_waitcomplete(0x0, 0xfffffffffffffffe) r2 = socket(0x1, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x200, &(0x7f0000000100)=0xcb72, 0x40) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') extattr_get_file(0x0, 0x3, 0x0, 0x0, 0x0) setpriority(0x1, 0x401, 0x598) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) getfhat(r3, 0x0, 0x0, 0x200) 2.466689053s ago: executing program 4 (id=233): fhopen(&(0x7f0000000000)={{[0x4, 0xff]}, {0x2, 0x8, "df6f5940e4cd74229fd88773e1ba183c"}}, 0x8) (async) r0 = fhopen(&(0x7f0000000000)={{[0x4, 0xff]}, {0x2, 0x8, "df6f5940e4cd74229fd88773e1ba183c"}}, 0x8) ioctl$DIOCRGETADDRS(r0, 0xc44c4446, &(0x7f0000000140)={{"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", "56068880bccd4ddae112b31382f6dbc809caac5b50f6d4126780c7edc72ebd18", 0x800, 0xe}, &(0x7f0000000040)="ada49a7d63b54454879c91fcfd70e8c211570d8d782dfce6541376d4ff951a9463f46d211a851be4c706acf8429f69ab0ce7bd449238677be3bf46f08eec01a14f0e49f0f555915228a5146b763ba5fe5dc329f49c2b7970dfbbecb378bb609b62a77e3fb65f6a19dd3abab872b1ca2425fcbc1ad75057a8039436c0902912768e61187a5289f9f4034e52fdde419655868186a4d58e3e328a09481b7b9e080109d984b1eb0a6ab3993eeacc1ea1921b1583856393e9247883717cbb2573f728a664f84d8cdb8fcda80e9b918d8a302d8aaf75083282", 0x8469, 0x4d, 0x0, 0x2, 0xc, 0x5, 0x16bb}) ioctl$DIOCCHANGERULE(r0, 0xcb7c441a, &(0x7f00000005c0)="47f014d470e877450c46188e48efa3e523d826a383a9d29bd81bba1eb0d970290941ab1ae083fd2cecfa22b77a4995e9b6b85b2d7dbc43a384049953ee04363ca496de2c4a9ff47099be304b0c518bcc41e3fb24ebac15ec735db216f8708e7461b4b6304de452153a7be4ec2e79f62c1cd78dcc576787fd5b05d90ff8b01f3cef05aee4") (async) ioctl$DIOCCHANGERULE(r0, 0xcb7c441a, &(0x7f00000005c0)="47f014d470e877450c46188e48efa3e523d826a383a9d29bd81bba1eb0d970290941ab1ae083fd2cecfa22b77a4995e9b6b85b2d7dbc43a384049953ee04363ca496de2c4a9ff47099be304b0c518bcc41e3fb24ebac15ec735db216f8708e7461b4b6304de452153a7be4ec2e79f62c1cd78dcc576787fd5b05d90ff8b01f3cef05aee4") ioctl$EVIOCGMTSLOTS(r0, 0xc000450a) (async) ioctl$EVIOCGMTSLOTS(r0, 0xc000450a) ioctl$DIOCGETRULESETS(r0, 0xc444443a, &(0x7f0000000680)="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") ioctl$KBADDKBD(r0, 0x80244b44, &(0x7f0000000780)={0x0, "a5e739d08989a33040baad3221594827", 0x400, 0x9, 0x6, 0x2d}) __cap_rights_get(0xe, r0, &(0x7f00000007c0)) copy_file_range(r0, &(0x7f0000000800)=0x5, r0, &(0x7f0000000840)=0x9, 0x1, 0x0) ioctl$DIOCXBEGIN(0xffffffffffffff9c, 0xc00c4451, &(0x7f0000000880)="b6fe4aedb5ca088e1605f22be9") cap_fcntls_limit(r0, 0x3) (async) cap_fcntls_limit(r0, 0x3) ioctl$DIOCRADDTABLES(r0, 0xc44c443d, &(0x7f0000000900)={{"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", "f9355029bf10a11d5a5036512f11de67566d8f8a291255768ac760b632dd4ec4", 0x8, 0x3}, &(0x7f00000008c0)="e5874e5f033ec717c4b8d0495bfb7d6d076d1f4cba6a2f49adcb8ac6c7afc00d8b9d0974c56fd38cce609a79817203c14a64132a89f733b846062f", 0x8, 0x8000, 0x7, 0x7, 0x2, 0x4, 0xe, 0x5}) r1 = dup2(r0, r0) symlinkat(&(0x7f0000000d80)='./file0\x00', r1, &(0x7f0000000dc0)='./file0\x00') kqueue() (async) kqueue() socket$inet_sctp(0x2, 0x5, 0x84) (async) r2 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$DIOCCHANGEALTQV0(r1, 0xc0ec4431, &(0x7f0000000e00)="131b82a87a1c6bf031698bfb4110") (async) ioctl$DIOCCHANGEALTQV0(r1, 0xc0ec4431, &(0x7f0000000e00)="131b82a87a1c6bf031698bfb4110") ioctl$PIO_DEADKEYMAP(r0, 0x20006b09, &(0x7f0000000e40)={0x3, [{0x10000, [0x0, 0x5, 0x8, 0x1, 0x1, 0x2, 0x5, 0x166e, 0x6765, 0x6, 0x9, 0x0, 0x7fff, 0x15ef, 0x8, 0x7, 0xb, 0xffff, 0x8, 0x8, 0x100, 0x4bbf, 0x7fff, 0xffff, 0x9, 0x4, 0x4, 0x4, 0x2, 0x8, 0x2, 0x1, 0x9, 0x7f, 0x32dc, 0x2, 0x9, 0x3, 0x8, 0x0, 0x7, 0x2, 0x5, 0x7fff, 0x8001, 0xff, 0x6, 0x1000, 0x1, 0xb, 0xe, 0x1e11d56a, 0x8, 0x8, 0x9, 0x6, 0x2, 0x1, 0x11ca, 0x8, 0xffffffff, 0x5, 0xa, 0x99, 0x684, 0x2, 0xffff, 0x3, 0x0, 0x43, 0x40, 0x6, 0x9da7, 0x10000000, 0x6, 0x6, 0xe1, 0x1000000, 0x80000000, 0x7, 0x80000000, 0x225, 0x1, 0x9e4d, 0x7, 0x6, 0x1, 0xffffffa2, 0xff, 0x0, 0x8000, 0x9a43, 0x81, 0x5, 0x28c, 0x9, 0x51a, 0x8, 0x28f2, 0x4, 0x101, 0x10001, 0x8000, 0x2]}, {0xa, [0x5, 0x1, 0x0, 0x0, 0x0, 0x6, 0x4, 0x8, 0x2, 0xf, 0x7, 0x7, 0x3, 0x3ff, 0x1, 0x9, 0x5, 0x4, 0x3, 0x0, 0x2, 0xda, 0xb, 0x8, 0xfffffffa, 0x3, 0x8001, 0x0, 0xfff, 0x10, 0x7, 0x1, 0x3, 0x3, 0xf, 0x2, 0x39, 0x6, 0x6, 0xfffffff4, 0x7fffffff, 0x0, 0xfffffff8, 0xb, 0xf481, 0x4, 0x9, 0xc840, 0x1, 0x7, 0x0, 0x9, 0x6, 0x7ff, 0x9, 0x4, 0x5, 0x3, 0x81, 0x80, 0xac0, 0x0, 0x1, 0x75, 0x2, 0x4, 0xa4d, 0x1, 0x3, 0xc0, 0x10001000, 0xfffffffc, 0x3, 0xffffffff, 0x7, 0x6, 0x3, 0x5, 0xd, 0x6, 0x4, 0xf9c0, 0x3, 0x6, 0x9, 0xb4, 0x2, 0x3, 0x0, 0x5, 0x5, 0x7, 0xfff, 0x4, 0x1000, 0x4, 0x7, 0x0, 0x9, 0x2, 0x10, 0x1, 0x7c, 0x5]}, {0xac1, [0x800, 0xe0d, 0x9, 0x2, 0xff, 0x6, 0x863, 0xfa3, 0x7f, 0x7fc5, 0x582, 0x3, 0x10000, 0x0, 0x3, 0x5, 0x0, 0xe705, 0x7f, 0x1, 0xb, 0x9, 0x2, 0x6, 0x4, 0xfff, 0x3, 0xe, 0x4, 0x671, 0x4, 0x8, 0x4, 0x7fffffff, 0x6, 0x7fffffff, 0x7ff, 0x6, 0x4, 0x3ff0, 0xa0000, 0x8, 0x9, 0x1, 0xf, 0x81, 0x7f, 0x1, 0x3, 0x497, 0x2f, 0x40, 0x1, 0x8, 0x8, 0x5, 0x1, 0x200, 0x2d22, 0x0, 0x0, 0x1ff, 0x9, 0xc9e, 0x4, 0x0, 0x1, 0x40, 0xfff, 0x9, 0x2d34, 0x3ff, 0x9, 0x1, 0xffffffff, 0x4, 0x163, 0x98, 0x9, 0x3, 0x8, 0x255, 0xc, 0x1, 0xc215, 0x3ff31247, 0x100, 0x0, 0x7, 0xfff, 0x2, 0x5, 0x9, 0x9, 0x4, 0xfa2, 0x3, 0x4, 0x4, 0x3, 0x7, 0x68b3, 0x6, 0xfffffff8]}, {0x10, [0x22b, 0x81, 0x6, 0x9, 0x800, 0x8, 0x9, 0x401, 0xb, 0x87, 0x80, 0x80000001, 0x6, 0x5, 0x2, 0xbc66, 0xe5c, 0x3, 0x8000, 0x9, 0x1, 0x4, 0x6, 0x7, 0x10000, 0xa3a, 0x56e0, 0x80000000, 0x4, 0x7, 0x1, 0x792, 0x2, 0x40, 0xd3, 0x4, 0xa, 0x7, 0x7, 0x6, 0xc489, 0x1, 0x3, 0xabb, 0x0, 0x8000, 0x380, 0x6, 0x30d, 0x3, 0x7, 0x80, 0x3ff, 0x2, 0x10001, 0x5, 0x9, 0x1, 0x7fffffff, 0x10000, 0xbb, 0x3, 0x5, 0x3, 0x9, 0xffff, 0x7f, 0x8, 0x5, 0x9, 0x8, 0x100, 0x8000, 0x7fff, 0x1, 0x4, 0x7, 0x4, 0x0, 0x8, 0x4800, 0xbf1f, 0x1114b76e, 0xfc, 0x7, 0x2000200, 0x8000, 0x4, 0x400, 0xc, 0x6, 0x5, 0x400, 0x4, 0x80000000, 0x1, 0x4, 0x80, 0x200, 0xffffff01, 0xfffffce9, 0x158, 0x101, 0x3]}, {0x5, [0x800, 0x4, 0x8000, 0x2, 0x0, 0x7fffffff, 0x56d58323, 0x2, 0x51, 0x6, 0x4, 0xff, 0x7, 0x3, 0x40, 0x969b, 0x6000, 0x3, 0x3, 0x1, 0x4, 0x9, 0x6, 0xe2c6, 0x100, 0x7, 0x3, 0x281, 0x10000, 0x2, 0x9, 0x0, 0x5, 0x7fffffff, 0xca, 0x9, 0x1, 0x100, 0x2, 0x2, 0x32, 0xec63, 0xa5a9, 0x4, 0x2, 0x4, 0x40, 0x4, 0x0, 0x8, 0x4, 0x7, 0x9, 0x9, 0x5, 0x47, 0x5, 0x7, 0xf, 0x2, 0x9, 0x1, 0x7, 0x7ff, 0x7fffffff, 0xc32, 0x7fff, 0x0, 0x4, 0xb, 0x401, 0x1, 0x2b2, 0x101, 0x1, 0x9, 0xed00, 0x7fffffff, 0x200, 0x30b, 0x3, 0x8, 0x400, 0x8, 0xfffff3e0, 0xd5, 0x9, 0x0, 0xb, 0x6, 0xb, 0xffff, 0x80, 0x7cd, 0x10, 0x6, 0x3, 0xffffffff, 0x4, 0x99b0, 0x9, 0x9, 0x83ec, 0x6]}, {0x9, [0x0, 0x770, 0xc, 0x4, 0x848d, 0x8, 0x5, 0x1, 0x5, 0x7f, 0x2, 0x4, 0x9, 0x8, 0x4, 0x9, 0xffffffff, 0x18, 0x7, 0x8a2, 0x0, 0x4, 0xa9, 0xfffff9e4, 0x0, 0x2, 0xfffffff7, 0xfffff067, 0x8001, 0x3, 0x8, 0x4, 0x5, 0x80, 0x4000, 0x9, 0x4, 0x4, 0x101, 0x4, 0x2, 0xb, 0x4bf, 0xffffffff, 0x800, 0x80000001, 0xb, 0x74, 0x9, 0x3, 0x571, 0x9, 0x8, 0x8, 0x0, 0x0, 0xfffffffc, 0x9, 0x0, 0x1, 0xfff, 0xc, 0x8, 0x100, 0x9, 0xa9b9, 0xe, 0x9, 0x40, 0xf81, 0x0, 0xff, 0x7, 0x7, 0x2, 0x2, 0x9, 0x4, 0x1, 0x3, 0x4, 0x7, 0xfffffff7, 0x80, 0xae, 0x69, 0x80000001, 0x101, 0x4c, 0xfffffffa, 0x7, 0x8000, 0x9, 0x2, 0x100, 0x4, 0x2, 0x800, 0xfff, 0xe, 0xd, 0x0, 0xfffff000, 0x80000001]}, {0x3, [0x6, 0x3, 0x0, 0x8, 0x7, 0x5, 0x4c9, 0x5, 0x7fff, 0x1, 0xd, 0xfffffffd, 0x0, 0x5, 0x100, 0x81, 0x4, 0x1000, 0x401, 0x7, 0x9, 0x9, 0x55, 0x1ff, 0x1, 0x0, 0x7, 0x8, 0x1, 0x6, 0x56c, 0x8, 0xff, 0xd, 0x4, 0x2, 0x0, 0x6, 0x7ff, 0xf08, 0x8, 0x8, 0x101, 0x0, 0x2, 0x80, 0x8, 0xe5, 0xffff673c, 0x3ff, 0x6, 0x8, 0xb4, 0x2cd2, 0x5c76, 0xfff, 0x80000000, 0x78800, 0x1, 0x8b2, 0x0, 0xff, 0xed, 0x7fffffff, 0x3, 0x80000001, 0x78, 0x7ff, 0x8, 0x0, 0x40, 0xc, 0x1000, 0xfffffffc, 0x5, 0x8, 0x6, 0xcebf, 0x5, 0x6, 0x100, 0x2, 0x4, 0x7e, 0x54f, 0x7, 0x1e5e, 0x2, 0xd, 0x8, 0x6, 0x7fffffff, 0x4, 0x3e2a, 0x2, 0x7f, 0x40, 0x1000, 0x6, 0x7fffffff, 0x5, 0x2, 0x2, 0x9]}, {0x5a0, [0x6, 0x9, 0x8c, 0xa7, 0x6, 0x1, 0xfffffe00, 0x3, 0x8, 0xffffffff, 0x1, 0xd, 0x2, 0x9, 0xef8, 0x0, 0x4, 0x4, 0x4, 0x3, 0xefa9, 0x6, 0x2, 0xe43, 0x101, 0xae9e, 0x4, 0x4, 0x10, 0x300000, 0x3, 0x7, 0x3, 0x7, 0x1, 0x4, 0x0, 0x1, 0x5, 0x1000, 0x6, 0x1ff, 0x800, 0x6, 0x7, 0xd5, 0x7, 0x1666, 0x4, 0x3, 0xb1b, 0x9, 0x2, 0x3ff, 0x1, 0x7, 0x100, 0x2, 0x0, 0x81, 0x5, 0x9, 0x80000000, 0x8, 0x7, 0x5, 0x6, 0x0, 0x8, 0xfffffffa, 0x1, 0x40, 0x6f59, 0x3, 0xf, 0x79, 0x101, 0x1000, 0x5, 0x3, 0x4, 0x3, 0xc7e, 0x8000, 0x2, 0xffff, 0x8, 0x2, 0x9, 0x1, 0x7b, 0x0, 0x0, 0xfffffffd, 0x5b2, 0xb000000, 0xd, 0x0, 0x7f, 0x5, 0xff, 0x1e, 0x9, 0x1]}, {0x10001, [0x8001, 0x3c00, 0x5, 0x2, 0x40, 0x6, 0xa871, 0x2, 0x0, 0x2, 0x3, 0x1ff, 0x3, 0x5, 0x7, 0x2, 0x3, 0x9, 0x6, 0x8, 0x8, 0x0, 0x3, 0xd9, 0x7, 0x9, 0x2, 0x3, 0x465b42d8, 0x8410, 0x7, 0x6, 0x6, 0x5, 0x7, 0xc, 0x401, 0x7, 0x68, 0x80000001, 0x3, 0x7, 0x1, 0x1, 0x80000001, 0x0, 0x1ff, 0x7, 0x4, 0x34, 0x4, 0x9, 0x7ff, 0xe6, 0x5, 0x3, 0x4, 0x4b5, 0x4, 0x1, 0x2, 0x3, 0x3cc7, 0x0, 0x5, 0x5, 0x7, 0x8001, 0x321d3bf0, 0x5, 0x3, 0x3, 0x7, 0x5, 0x18d, 0xfff, 0x7, 0x200, 0x7, 0x8, 0x4, 0x0, 0x8, 0x2, 0x2, 0x401, 0xc, 0xfee, 0x81, 0xf25a, 0x1, 0x6, 0xffffffff, 0x3, 0x0, 0x3, 0x10000, 0x1, 0x7, 0x0, 0x0, 0x4, 0x2, 0x2]}, {0x5, [0x2, 0x4, 0x35, 0x0, 0x3, 0x1, 0x8, 0x0, 0x5, 0x8, 0x0, 0x9, 0x1ff, 0x1, 0x7, 0x0, 0xf00, 0x4, 0xfffffc01, 0xee9, 0x7, 0x5, 0xd02, 0x5, 0x37a7, 0x800, 0x80000001, 0x80, 0x1, 0xfffffdca, 0x57, 0xa4ae, 0x8584, 0x48000000, 0x6, 0x884, 0x7, 0xfffff994, 0x7fff, 0x63f, 0x23b, 0x5, 0x0, 0x0, 0x0, 0x6, 0x6, 0x0, 0x7, 0x5d1000ea, 0x12, 0xb, 0x8b9c, 0x7ff, 0x5, 0x3, 0x9, 0x8, 0x6, 0x6, 0x5, 0x5, 0x7, 0x6, 0x4, 0x8, 0x6, 0x9, 0x1, 0xca27, 0xa, 0x7, 0x8, 0x12b5, 0x1, 0x8, 0x401, 0xc, 0x10001, 0x0, 0x5, 0x100, 0x7, 0x0, 0x3076, 0x8, 0x81, 0x4ecb, 0x1800000, 0x0, 0x1, 0x3, 0x2, 0x4, 0x5, 0x685c, 0xf4b, 0x62ff, 0x3, 0x993, 0x5, 0x72e, 0x401, 0x57]}, {0x80, [0x7fff, 0x1, 0x4, 0xfffffffe, 0x9, 0xf, 0x4, 0x3, 0x4, 0x2, 0x9, 0x6, 0xcc1, 0xb, 0x1000, 0x0, 0x6, 0x3, 0x4, 0x4, 0x4, 0x1, 0x9, 0x1000, 0x1, 0xf0, 0x5, 0x29bfab75, 0x10000, 0x6, 0x4, 0x2, 0x2, 0xff, 0x80000001, 0x0, 0x4, 0x7f, 0x1ff, 0x5, 0x7fff, 0x5, 0x80000000, 0x6, 0x1, 0x1, 0x2, 0xff, 0x7fffffff, 0x9, 0x4, 0x9, 0x1000, 0xf, 0x1ff, 0x1ff, 0x9, 0x380000, 0x9, 0xfffffffe, 0x9, 0xa, 0x2af1, 0x5, 0x128380e4, 0x8, 0x4000000, 0xffff0001, 0x80000001, 0x8, 0x9, 0x10001, 0x6, 0x410266c1, 0xfffeffff, 0x8, 0x58ee, 0x6, 0x1, 0x40, 0x3, 0x8, 0xff, 0xff, 0x2, 0x2, 0x1, 0x4, 0x366f, 0xae, 0xa0a, 0x9, 0x10, 0x6, 0x800, 0x7, 0x400, 0xfffffffb, 0xb, 0x8, 0x1, 0x6, 0x3, 0xffffffc5]}, {0x1000, [0x2f6a, 0x401, 0x7, 0x408c2349, 0x7fffffff, 0x0, 0x3ff, 0x2, 0x9, 0x225, 0xe, 0x0, 0x8, 0x6, 0x9, 0x3, 0xffffffff, 0x1, 0x6, 0x10, 0x1, 0x8, 0xf286, 0x3, 0x7f, 0x401, 0x6, 0x6, 0x4, 0x9, 0xfffffffa, 0x400, 0xe, 0x6, 0x80000000, 0x5, 0xd, 0x9, 0x4d3, 0xd96, 0xe, 0x9, 0x2, 0x7fff, 0xffffff00, 0x4, 0x3, 0x3, 0x30, 0x8, 0x80000001, 0x400, 0x0, 0xff, 0x8, 0x3, 0x3, 0x1, 0x5, 0x9a25, 0x146b5e0, 0x3, 0x800, 0x1, 0x9, 0x8a1e, 0x3, 0x400, 0x9865, 0x4, 0x4, 0xffff6bf4, 0x8, 0x68, 0x7, 0x5, 0xb5, 0x7ff, 0x7, 0x4, 0xfff, 0x5, 0x9, 0x1ee, 0x9, 0x0, 0x6, 0x5, 0xfffffff7, 0x4, 0x4, 0x6, 0xed, 0x0, 0x6, 0x4, 0x6, 0x4, 0x100, 0x2, 0x1, 0xf, 0x7]}, {0x715e, [0x7, 0x5, 0x2, 0x47, 0x800, 0x5, 0x9, 0xf, 0x5, 0x0, 0x5, 0x7, 0x9, 0xedcd, 0x3, 0x5, 0x9, 0x8b4c, 0x401, 0x6, 0x857, 0x1, 0xfffffff7, 0x4, 0x1, 0xfa6, 0x88, 0x4cc8, 0xffffffff, 0x2, 0x5, 0x19567dd4, 0xd, 0x400, 0x1b, 0x2, 0x1, 0x385560bd, 0x8, 0x400, 0xf, 0x8001, 0x328, 0x101, 0x0, 0x7, 0x2, 0x9, 0x7, 0x5, 0x7, 0x2f1, 0x7, 0x7, 0x2, 0x200, 0xb, 0x9, 0x24, 0x10, 0x2, 0x8000, 0x2, 0x6, 0xa, 0x9, 0x7, 0xc4b7, 0x0, 0x6, 0x0, 0x643, 0x7ff, 0x401, 0xfffff70f, 0x97f, 0xfffffffc, 0x7ff, 0x9e7, 0x5, 0x7fff, 0x3, 0xff, 0x10000, 0x5, 0x2c4, 0x8, 0x4, 0x1ad4, 0xb4e1, 0x0, 0x6, 0x1c, 0x4, 0xdd, 0x9, 0x9, 0x401, 0x8, 0x2, 0x7, 0xff, 0x9, 0xca]}, {0x2, [0x4, 0xfffffff9, 0x3, 0xbb9f, 0x905, 0x4, 0x40, 0x9, 0x7f, 0x41, 0x8, 0x6, 0x1000, 0x6, 0xfffffffb, 0xf3a, 0x101, 0x81b, 0x200, 0x7f, 0xd, 0x5, 0x2, 0x1, 0x4, 0xe4c, 0x6, 0xfff, 0x1, 0x4, 0x9, 0x101, 0x9, 0x1ff, 0xb, 0xfffffff7, 0x9, 0x3, 0xc057, 0x325ebc66, 0xf, 0x8001, 0x2, 0x9, 0x5, 0x8, 0x5, 0x5, 0x0, 0x2, 0x5, 0x8, 0x1ff, 0xf3ed, 0x7, 0x4, 0x0, 0x101, 0x0, 0x0, 0x7, 0x5, 0x200, 0x0, 0x8, 0x4175, 0xfffffffc, 0x4, 0xfff, 0x9, 0x0, 0x2, 0x4, 0x1, 0x7, 0x6, 0x8, 0x3, 0xb30, 0xffffff80, 0x59c, 0x1, 0xfffff001, 0x5, 0x5, 0xe, 0x6, 0x10001, 0x4, 0x5, 0x8, 0x0, 0x4, 0x5, 0x81, 0x3, 0xfffffffa, 0x2, 0x8, 0xefcf, 0x10001, 0xfff, 0x9, 0x7]}, {0x9, [0x3, 0xa, 0x6, 0x0, 0x40, 0x1, 0xa, 0x9, 0x0, 0xa, 0xffff, 0x6, 0x8, 0x81, 0x0, 0xc, 0x0, 0x1000, 0x1, 0x6, 0x8, 0x9, 0x1ff, 0x1, 0xffff, 0x3, 0x6, 0x8, 0x8, 0x5, 0x1, 0x80, 0x6, 0x1, 0x7, 0xc1, 0x401, 0xb14, 0x7, 0x8, 0x7, 0x7, 0xe, 0x0, 0x1ff, 0x63, 0x9, 0x0, 0xfff, 0x80000000, 0x4, 0x4, 0xe, 0x8, 0x4, 0x3, 0x10000, 0x2, 0x800, 0x9028, 0xffff, 0x0, 0xffff0654, 0x4, 0x5, 0x3, 0x1, 0xa, 0x7, 0x4, 0x5b, 0x2, 0xffffffff, 0x6, 0x1000, 0x80, 0x0, 0xd6, 0x400, 0x6, 0x10, 0x21f, 0x8, 0x0, 0x1, 0x9c0, 0xb, 0x9, 0x2, 0x8, 0x0, 0x9, 0x54b, 0xe, 0xd, 0x8, 0x3ff, 0x80000000, 0x1000, 0xcd, 0x9, 0xfffffffc, 0xfff, 0x2000000]}]}) cap_fcntls_get(r1, &(0x7f0000002700)=[0x0]) r3 = msgget(0x3, 0x10) msgrcv(r3, &(0x7f0000002740), 0x4, 0x2, 0x1000) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, &(0x7f0000002780)={@rand_addr=0x522, @multicast2, @loopback}, 0xc) (async) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, &(0x7f0000002780)={@rand_addr=0x522, @multicast2, @loopback}, 0xc) connectat$unix(r0, r0, &(0x7f00000027c0)=@abs={0x8, 0x0, 0x0, 0x2}, 0x8) ioctl$SMB_READB(r1, 0xc01c6907, &(0x7f0000002880)={0x5, 0x5, 0x6, @word=0x3, @buf="8956", 0x4, &(0x7f0000002800)=0x5, 0x1, &(0x7f0000002840)=0xff, 0x1}) (async) ioctl$SMB_READB(r1, 0xc01c6907, &(0x7f0000002880)={0x5, 0x5, 0x6, @word=0x3, @buf="8956", 0x4, &(0x7f0000002800)=0x5, 0x1, &(0x7f0000002840)=0xff, 0x1}) socket(0x1c, 0x5, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r0, 0x84, 0xd, &(0x7f00000028c0)=0x800, 0x4) r4 = socket$inet6_icmp(0x1c, 0x2, 0x3a) getsockopt$inet6_sctp_SCTP_AUTOCLOSE(r4, 0x84, 0x5, &(0x7f0000002900), &(0x7f0000002940)=0x4) getpgid(0x0) (async) r5 = getpgid(0x0) fcntl$lock(r2, 0xb, &(0x7f0000002980)={0x2, 0x4, 0x5, 0x81, r5}) __specialfd$eventfd(0x1, &(0x7f00000029c0)={0x7}, 0x8) 2.45709073s ago: executing program 2 (id=122): open(&(0x7f00000003c0)='./file0/file0\x00', 0x800, 0x10) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = openat$bpf(0xffffff9c, &(0x7f0000000380), 0x1, 0x0) freebsd12_shm_open(&(0x7f0000000400)='./file0\x00', 0x200, 0x30) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x1) r3 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x40, 0x64) copy_file_range(r3, 0x0, r2, &(0x7f0000000100)=0x7fffffffffffffff, 0x1, 0x0) fchmod(r1, 0x168) r4 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x44, 0x0, &(0x7f0000000040)) syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x8], 0x2, 0x8, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int=0x8, @spare=[0x800, 0x1, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x100000000]}}) open$dir(&(0x7f0000000140)='./file1\x00', 0x4, 0xaa) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, &(0x7f0000002f00)={0x2, {{0x1c, 0x1c, 0x3, 0x8, @mcast2, 0xc}}, {{0x1c, 0x1c, 0x0, 0x400000d, @rand_addr="5d308af90759e53b2d911f2ae2462594", 0xf994}}}, 0xfc) rfork(0x16004) listen(r5, 0x0) setsockopt$sock_int(r5, 0xffff, 0x1003, 0x0, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000180)=""/139) r6 = socket(0x1c, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) r7 = socket(0x1c, 0x5, 0x0) cap_ioctls_limit(0xffffffffffffffff, &(0x7f0000000100)=[0x1, 0xa, 0x401]) setsockopt$inet_msfilter(r5, 0x0, 0x4a, &(0x7f0000000040)=ANY=[@ANYBLOB="e0000001000000000300000003000000ac1400bbc71400bb00000000"], 0x1c) syz_emit_ethernet(0x17a, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x1, 0x9}, {0xffffffff, 0x10}}) socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) 2.417062481s ago: executing program 4 (id=234): openat$md(0xffffffffffffff9c, &(0x7f0000000700), 0x800, 0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x40000) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) munlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1, 0x1, 0x0) ioctl$MDIOCATTACH(0xffffffffffffff9c, 0xc1b46d00, &(0x7f0000000080)={0x5, 0x8, 0x3, 0x0, 0x8001, 0xe0, 0x0, 0x401, 0x72788a94, 0x2, 0x0, [0xd, 0x1, 0xffffffff, 0xfffffffa, 0xbdf, 0x0, 0x7a, 0x70, 0x401, 0x2, 0x8, 0x2, 0x8, 0x1ff, 0x0, 0x4, 0xe, 0x7fffffff, 0x9, 0x101, 0x40005, 0x7fffffff, 0x3, 0xd, 0xfffffffe, 0x6, 0x8, 0xfcf, 0x4, 0x2000c, 0x1, 0x0, 0x0, 0x9, 0x5, 0x7, 0xffffffff, 0x2, 0x7fff, 0xaa8b, 0x2, 0x1000000, 0x4, 0x400, 0x263, 0x9f, 0x1a8, 0x22, 0x8, 0x6, 0x7, 0x4eee, 0x9, 0x5, 0x2, 0xb, 0x4, 0x0, 0x1, 0x3, 0x8, 0x8a627f5, 0x1, 0x4, 0x1, 0xe7eb, 0x80, 0x80000, 0x12, 0x401, 0x0, 0xff, 0xfffffffd, 0x7fff, 0x5, 0x1, 0xf5d1, 0xfffffffe, 0x7, 0x4, 0x3, 0x6, 0x6, 0x7ffffffc, 0x5, 0x4, 0x1, 0x2, 0x5, 0x2, 0xa, 0xa, 0x6, 0x7, 0x101, 0x4]}) r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x0, @loopback}, 0x1c) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_int(r1, 0x0, 0x3, &(0x7f00000001c0)=0xffffffff, 0x4) writev(r2, 0x0, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000003640)=0x4000, 0x4) listen(r0, 0x5) r3 = socket(0x1c, 0x1, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x44, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x2, @loopback, 0x801}, 0x1c) accept$inet(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x2, 0xffffffffffffffff, @rand_addr}, &(0x7f0000000080)=0x10) listen(0xffffffffffffffff, 0x38000000) listen(0xffffffffffffffff, 0x38000000) socket(0x2, 0x1, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) extattr_list_fd(r4, 0x3, &(0x7f00000001c0)=""/147, 0xfffffffffffffd8d) ksem_post(0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) r5 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x82) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) truncate(&(0x7f0000000080)='./file0\x00', 0x1) __realpathat(r5, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0) 331.421643ms ago: executing program 5 (id=237): open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) r0 = getpid() procctl$PROC_REAP_ACQUIRE(0x0, r0, 0x2, 0x2) freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) cap_rights_limit(r2, &(0x7f0000000140)=[0x20000207fffffe0, 0x400000000000001]) cap_rights_limit(r1, &(0x7f0000000580)=[0x20000207fffffdc, 0x400000000000005]) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0xb0, &(0x7f0000000180)=ANY=[@ANYBLOB="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"]) r3 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) accept$unix(r1, &(0x7f0000000100)=@abs={0x8}, &(0x7f00000002c0)=0x8) r4 = shmget$private(0x0, 0x2000, 0xa0, &(0x7f0000ffb000/0x2000)=nil) shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x3000) shmat(r4, &(0x7f0000ffd000/0x2000)=nil, 0x6000) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r5, 0xffff, 0x1019, 0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) 329.738077ms ago: executing program 4 (id=235): mkdir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r0 = open(&(0x7f00000000c0)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) (async) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000240)='hammer2\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, &(0x7f0000000280)="d71f9bb3f98ef693cbd9ad876afbfada498cb248783acda64e9144c65e113ac27e52f72677a1049cd96aa5f6c49a487cf25864046557108b0e1421fb1846b4dca5b121c0de69161b3ef5e3a155aedc33e99aacf1caab42a9") (async) mount(&(0x7f0000000240)='hammer2\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, &(0x7f0000000280)="d71f9bb3f98ef693cbd9ad876afbfada498cb248783acda64e9144c65e113ac27e52f72677a1049cd96aa5f6c49a487cf25864046557108b0e1421fb1846b4dca5b121c0de69161b3ef5e3a155aedc33e99aacf1caab42a9") r1 = open$dir(&(0x7f0000000100)='.\x00', 0x80000, 0x1c1) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file1\x00', 0x4) (async) mkdirat(r1, &(0x7f00000001c0)='./file1\x00', 0x4) syz_emit_ethernet(0x5eb, &(0x7f0000001140)=ANY=[@ANYBLOB="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"]) renameat(r1, &(0x7f0000000040)='./file1\x00', r2, &(0x7f0000000180)='./file0\x00') __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe800000000000"]) socket(0x1c, 0x1, 0x0) (async) r3 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r4 = kqueue() kevent(r4, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}], 0x2, 0x0, 0x0, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) (async) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) r6 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r6, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r5, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) (async) r7 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) (async) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) sync() symlink(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='./file2\x00') (async) symlink(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='./file2\x00') sync() (async) sync() 328.022748ms ago: executing program 3 (id=236): syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) syz_emit_ethernet(0x42c, &(0x7f00000010c0)=ANY=[@ANYBLOB="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"]) socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, &(0x7f0000001000)={0xa, 0x0, 0x9, 0xffffffffffffffd2, 0xfffffffffffffffd, 0xca13, 0x0, 0x1}, &(0x7f0000000180)={0x80000000, 0x3}) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) select(0x40, &(0x7f0000000100)={0x5, 0xf2, 0x2, 0x7, 0x4, 0x4, 0x26c, 0x1}, &(0x7f00000001c0)={0x1ff, 0x7, 0x4, 0x4, 0xd, 0xff, 0x8, 0x9}, &(0x7f0000000280)={0x7fff, 0x1, 0x0, 0x1, 0xffffffffffffffff, 0x4, 0x4, 0x38000000000000}, &(0x7f00000002c0)={0x1, 0x4}) ioctl$SMB_READB(r0, 0xc00c6d32, &(0x7f00000000c0)={0x0, 0x0, 0x0, @word=0x6, @buf="de32", 0x0, 0x0, 0x0, 0x0}) r1 = openat$kbd(0xffffff9c, &(0x7f0000000000), 0x100000, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x0) r2 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xb}, 0x24) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) open$dir(&(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x40) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) recvmsg(r5, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x81) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x2, 0x4, 0xfb) getsockopt$inet6_sctp_SCTP_PR_SUPPORTED(r6, 0x84, 0x26, &(0x7f0000000040)={0x0, 0x1}, &(0x7f00000000c0)=0x8) setsockopt$inet6_sctp_SCTP_RESET_ASSOC(r6, 0x84, 0x902, &(0x7f0000000140)=r7, 0x4) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r8 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r8, &(0x7f0000000240)='./file0\x00') syz_emit_ethernet(0x58, &(0x7f0000000280)=ANY=[]) setuid(0xee01) setpriority(0x2, 0x0, 0x80000001) ioctl$KDGETMODE(r5, 0x40046676, 0x0) write(r3, 0x0, 0x0) shutdown(r4, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 0s ago: executing program 2 (id=122): open(&(0x7f00000003c0)='./file0/file0\x00', 0x800, 0x10) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff}) close(r0) r1 = openat$bpf(0xffffff9c, &(0x7f0000000380), 0x1, 0x0) freebsd12_shm_open(&(0x7f0000000400)='./file0\x00', 0x200, 0x30) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x1) r3 = open$dir(&(0x7f0000000300)='./file0/file0\x00', 0x40, 0x64) copy_file_range(r3, 0x0, r2, &(0x7f0000000100)=0x7fffffffffffffff, 0x1, 0x0) fchmod(r1, 0x168) r4 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(r4, 0x29, 0x44, 0x0, &(0x7f0000000040)) syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x8], 0x2, 0x8, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int=0x8, @spare=[0x800, 0x1, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0x100000000]}}) open$dir(&(0x7f0000000140)='./file1\x00', 0x4, 0xaa) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, &(0x7f0000002f00)={0x2, {{0x1c, 0x1c, 0x3, 0x8, @mcast2, 0xc}}, {{0x1c, 0x1c, 0x0, 0x400000d, @rand_addr="5d308af90759e53b2d911f2ae2462594", 0xf994}}}, 0xfc) rfork(0x16004) listen(r5, 0x0) setsockopt$sock_int(r5, 0xffff, 0x1003, 0x0, 0x0) shmctl$SHM_STAT(0xffffffffffffffff, 0xd, &(0x7f0000000180)=""/139) r6 = socket(0x1c, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) r7 = socket(0x1c, 0x5, 0x0) cap_ioctls_limit(0xffffffffffffffff, &(0x7f0000000100)=[0x1, 0xa, 0x401]) setsockopt$inet_msfilter(r5, 0x0, 0x4a, &(0x7f0000000040)=ANY=[@ANYBLOB="e0000001000000000300000003000000ac1400bbc71400bb00000000"], 0x1c) syz_emit_ethernet(0x17a, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) utimes(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)={{0x1, 0x9}, {0xffffffff, 0x10}}) socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.14' (ED25519) to the list of known hosts. lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe0059e64b18 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1735 2nd 0xffffffff83ce5c60 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1434 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff816a2851 at witness_checkorder+0x781 #1 0xffffffff81528757 at __mtx_lock_flags+0x187 #2 0xffffffff8188e096 at tuninit+0x76 #3 0xffffffff8187c2a4 at ether_ioctl+0x1b4 #4 0xffffffff8188ce32 at tunifioctl+0x3c2 #5 0xffffffff819c9d94 at in_control_ioctl+0x1744 #6 0xffffffff8186c43b at ifioctl+0xdeb #7 0xffffffff816b163a at kern_ioctl+0x52a #8 0xffffffff816b101e at sys_ioctl+0x36e #9 0xffffffff82193a62 at amd64_syscall+0x4e2 #10 0xffffffff8213569b at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff816a3722 at witness_checkorder+0x1652 #1 0xffffffff81591ec9 at _sx_xlock+0x139 #2 0xffffffff8188cafa at tunifioctl+0x8a #3 0xffffffff818692d6 at ifhwioctl+0x1dc6 #4 0xffffffff8188a562 at tunioctl+0xd92 #5 0xffffffff811f99d6 at devfs_ioctl+0x266 #6 0xffffffff823584e7 at VOP_IOCTL_APV+0x87 #7 0xffffffff8180f737 at vn_ioctl+0x3c7 #8 0xffffffff811fa899 at devfs_ioctl_f+0x69 #9 0xffffffff816b163a at kern_ioctl+0x52a #10 0xffffffff816b101e at sys_ioctl+0x36e #11 0xffffffff80445f17 at freebsd32_ioctl+0x607 #12 0xffffffff823204f2 at ia32_syscall+0x4d2 #13 0xffffffff82135eff at int0x80_syscall_common+0x9c if_delmulti_locked: detaching ifnet instance 0xfffffe00077c4c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c4c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 SYZFAIL: too much cover cov=7456540 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too much cover cov=7456540 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=2 req=122 state=3 status=67 (errno 9: Bad file descriptor) if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 FreeBSD/amd64 (ci-freebsd-i386-2.us-central1-b.c.syzkaller.internal) (ttyu0) login: if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 set $lines = 0 Password: Login incorrect login: if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 show registers Password: Login incorrect login: ps Jan 1 00:00:44 ci-freebsd-i386-2 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl