last executing test programs: 2m56.074785062s ago: executing program 1 (id=5): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x1, 0x0) setgroups(0x0, 0x0) setgid(0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}, 0x10) listen(r1, 0x38000000) mkdir(&(0x7f00000006c0)='./file0\x00', 0x110) chroot(&(0x7f00000000c0)='./file0\x00') chdir(&(0x7f0000000000)='./file0\x00') syz_emit_ethernet(0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) socket$inet_tcp(0x2, 0x1, 0x0) r2 = socket(0x2, 0x3, 0x0) connect$inet(r2, &(0x7f0000000080)={0x10, 0x2, 0x0, @rand_addr=0x81000}, 0x10) ioctl$DIOCGETQSTATSV0(0xffffffffffffffff, 0xc0144432, &(0x7f0000000500)="9ea70bc3710fa0bb96e6f41bd4df3ce098ac69ab2ba3dd1029171e0b034dbdaedd0142ec408b6bc89fcfddf8068b3af332386ba139d45b2df9aa3bcf") shutdown(r2, 0x1) r3 = kqueue() kevent(r3, &(0x7f0000000380)=[{0x4, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, [0x0, 0x1, 0x0, 0x3]}], 0x1, 0x0, 0xc00, 0x0) munmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000) r4 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) getresgid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) select(0x40, &(0x7f0000000180)={0x4, 0x9, 0xa, 0x4, 0x8, 0x2, 0xe, 0x2}, &(0x7f00000001c0)={0x4, 0x7cb, 0x2, 0x1, 0x8, 0x1, 0x8, 0x8}, &(0x7f0000000200)={0x4, 0x8, 0x9, 0x8000000000000000, 0x7, 0x0, 0x5, 0x8001}, &(0x7f0000000240)={0x6, 0x1}) setsockopt$inet6_group_source_req(r6, 0x29, 0xc, &(0x7f0000000080)={0x7ff, {{0x1c, 0x1c, 0x2, 0x0, @rand_addr="65cb30df060000000b603666ab2f3df4"}}, {{0x1c, 0x1c, 0x1, 0x0, @mcast2}}}, 0xfc) getsockopt$inet_tcp_TCP_RXTLS_MODE(r0, 0x6, 0x2a, &(0x7f0000000280), &(0x7f0000000300)=0x4) setsockopt$inet6_group_source_req(r6, 0x29, 0x54, &(0x7f00000003c0)={0xfffffffb, {{0x1c, 0x1c, 0x0, 0x369d1e65, @empty, 0x547}}, {{0x1c, 0x1c, 0x2, 0x0, @mcast1, 0x5f}}}, 0xfc) setsockopt$inet6_group_source_req(r6, 0x29, 0xc, &(0x7f0000000080)={0x7ff, {{0x1c, 0x1c, 0x2, 0x0, @rand_addr="65cb30df060000000b6036662f3df400"}}, {{0x1c, 0x1c, 0x1, 0x0, @mcast2}}}, 0xfc) fchownat(r4, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, r5, 0x200) 2m55.200528616s ago: executing program 1 (id=9): r0 = socket(0x1c, 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x5}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) r1 = socket$inet6(0x1c, 0x2, 0x0) sendmsg$inet6_sctp(r1, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[], 0x14, 0x10006}, 0x8d) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r2, 0x4004667f, &(0x7f0000000140)) socketpair(0x2, 0x10000000, 0xb, &(0x7f00000000c0)={0xffffffffffffffff}) accept$unix(r3, &(0x7f0000000100)=@abs={0x8}, &(0x7f0000000140)=0x8) listen(r0, 0x8) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_emit_ethernet(0xe6, &(0x7f0000000180)=ANY=[@ANYBLOB="ffffffffffff00000000000086dd60dbbc6c00b00003fe800000000000"]) r4 = socket(0x1c, 0x3, 0xfe) setsockopt$inet6_IPV6_HOPOPTS(r4, 0x29, 0x31, &(0x7f00000016c0)=ANY=[@ANYBLOB="0004000000000000040100040100c2"], 0x28) sendto$inet6(r4, 0x0, 0x0, 0x85, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) r5 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) r6 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r6, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xb}, 0x24) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x200, 0x4) select(0x0, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, &(0x7f0000000080)={@local={0xac, 0x14, 0x0}}, 0xc) sysarch$I386_SET_LDT(0x1, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) rfork(0x85000) ioctl$CIOCGSESSION2(0xffffffffffffff9c, 0xc030636a, &(0x7f0000000080)={0x1f, 0x0, 0x5b, &(0x7f0000000440)="ec7b00000900ff2425c1f0a58b5197986f60c6856a7ae6eb124fa22ef1d3e8b98fe6f060e021bc016d64a5633f61c6d463827346c331188b28de079d41708acb6f2c3d4396a4ac01b1291bb4dd862149b06bdcd74f0ee881624f56", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x6, 0x44e]}) kqueue() 2m54.978938027s ago: executing program 1 (id=12): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) mount(&(0x7f0000000200)='ext2fs\x00', 0x0, 0x10000000, &(0x7f0000000240)="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") openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x1, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r2, &(0x7f0000000180)="e1a72ee7141b3865a5b5739b070891132435152c74cbbbd8a4c27dcc845aad6376a38a2b2f0710925b67438135d0857e7a8170f41a42529881514711c730cf844bbfacccb7b7d6c6a4dc1513e119cdb860193a7f19d47915765f61310a636f3d5f2c659567c3c26a9db3953f44309719e3a407898d684c44c8ba8cde0f2cec050d98393aae36ac89c35a503505b3b9e1e0386138523a9617a3d240a3e90240f0b44680a28efc16420bb9df7d00e764dc7ee87eaaf3359b924899b6d0f2b322884f72843e163f846044adc2cc8bdc0bf294d0017eb25802841028af4cd25ec01a1384c94d3948421844166755201734deeffdc49b2ca812b3d12c93972be89c9a18c6f64aceaa2cd10f57355828b6995468c7f23771ea51856fe7d0d1c403172b7c0db0516a77bbb066408573f08b486435e00e9252eb39181a92d2294fc33a6ddd192c001f280b005920aa317962f9ac2a22e6fb01ef6c1cdc34dbfd1f0d0654b586e199479f46930db4e32483a9a579df7c98c1eb6ce9d77c3235aeae328e7b6174740c432c867e52e7a9ac4d4c74f32895e0798a1543b2ae1c10d859225b7534db88c597dea9694da30e9e3ce451ad66118035e58c5df1ab5336905ef404f3214e56263148418daaf1b45edc6c2c32be1cec9f08f0db31e289c64b0a9c992e5b1578e6327063d57c1c432484ff3e33fe4c506d3dbbfb93fbb71fae241cb6ac42d5855e8f96d95a08a6521d5702ace58223fce6c35c6bce842ea10ec3f83a4fec3f28977496c7ecc33d76c054b4b2c2feac0e6adc6b899e9d1c321c41a5d8de9eda21c3d3dc0ffcc3285c38c193c0b9b101e54dc5db3ab8f304eec67244cfdb545909fb173a5512d250d0e206b1212a8acbb255640377eb558b81687e310c1b1d6aa8c8c8fbfe453fc0b36b7e34b009fdd2688e4f96c508d09af871dc1dd0c0b3d561973161dbe78ec42ff2f126dabc8e6e5ba29a10f41fc9afd41801ac22b0dacca6e7f8a7f7faa441927bc0f50de79829d7e38e7d8d094736d0c48ac8723acbf8579ad5b47a9e8c33bfccfec37e7966bc4eca20c98807a7bcbf2d26c5eff37a7eefde6954fe064dda34209689f93495c18079932a2922f4be7645d0798bfb570761132648bdb07c47fb2deacfebcf1feebddaf0761ad815738a481e14cfc646c8fa48b21f83cdb5047152337584c7dc63764e6be690e12956bf87215e2ed97fa74cb3f7f2ad4a0f295c167d0b9937a246907be568bfc4faa22195e61ddc9d383a1d1ccc1fb3de2cdbff71f3c79642fb2cfdfab4011418d811ea032eb8a18d2229d287b75b961e287acb72d4d6c9fbe29ad163879d7eb71c6ac14f00f77b90426f08a241e0a402d3add458c1a626022d728d9153e27f742dd9ef40ae4f716e5b0c361b1015fcdff0f1e21d10ffbb9acfab72e2af196728bb9c0b18ee5938b255ef81e6a9ca33d5aab55afc1177725605fab4d46bc645aa59846b93149a7d1a83ebe7b1c1d4b8d314a91d52b1fdac491844a66a030279a039429206ca83fd46e497d5f04b544b96f558970e475d48ce1296363803adb27e84d5b3966fea21c69c61c106e5454098877b731789cd44b1fd7c8e0f1063c13178b1371f0eb75b8677cbde0511ad5583027062754999dfdb4a46a5fa8755be50fa5ef84017cba6351c1df0d0d6c3fed741344aab96ef71538f07779863f2138a2216403db6a4b11d54ec95e89ddcb05008ec4dc8002121055cf5c46ca5b9ccfa8d5515538acec2436cd53b568d5228be35e1446e745f586e41c49b85b1d51dcc7ae963bf3ae1bf6e703142a3438b00f5ecea8ffc3fc916c721b0921bf79deafc857fce5ca833284c22abe2ad7c62c1e9ebebff2b88228215445acf762f4edd0009e46da71b233777426fde7c1f7da006d4f90e90ca48fd64023362f6bad35cf353b486bed43651c34c02759f8c02b4ff59b9f54a1f681eb7881cda54310e673557fec1449115c89bb85e8fb458ce133d7974df22eef9867a7534a6cf7b2c866af78cb8818a195f25a4458e58190b2273556bb12cb69b938298936c5cb667a4272e01bb6b0ac5c8f1fadbbb6e", 0x5c4, 0x80, &(0x7f0000000040)={0x10, 0x2, 0x1}, 0x10) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x40, 0x0) shm_unlink(&(0x7f0000000000)='./file0\x00') r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x2, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffa}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0xaa) fcntl$setstatus(r4, 0x4, 0x4900bf732d83df73) mmap(&(0x7f0000029000/0x800000)=nil, 0x800000, 0x3, 0x20011, r4, 0x0) r5 = open(0x0, 0x80400000000206, 0x48) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r6, 0x29, 0x14, &(0x7f00000000c0)=0x401, 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, r5, 0x60000000) lpathconf(&(0x7f0000000080)='./file1\x00', 0x7) extattr_delete_file(&(0x7f0000000780)='./file0\x00', 0x2, &(0x7f00000007c0)='+\\E$\xec\x00') ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2m54.093208791s ago: executing program 1 (id=14): r0 = socket$inet6(0x1c, 0x2, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) socket(0x10, 0x3, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @rand_addr, @rand_addr="1800"}}}}) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) select(0x40, &(0x7f00000000c0)={0x3, 0xcbf6, 0x5, 0x4, 0x5, 0x8, 0x8, 0xb}, &(0x7f0000000100)={0x7, 0x3, 0x101, 0x100000000, 0x3, 0xffffffffffffff01, 0x1, 0x7b}, &(0x7f00000001c0)={0x4, 0x89e, 0xcaf9, 0x2, 0x1, 0x2, 0x9, 0x557b3b08}, &(0x7f00000002c0)={0x7fff, 0x7f}) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_udp(0x1c, 0x2, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) setgid(0x0) ktimer_create(0x4, 0x0, &(0x7f0000000200)=0x0) ktimer_settime(r2, 0x0, &(0x7f0000000240)={{0x0, 0x101}, {0x0, 0x20000002}}, 0x0) ktimer_settime(r2, 0x0, &(0x7f0000000080)={{0x8, 0x1}}, &(0x7f0000000180)) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) setsockopt$inet6_int(r0, 0x29, 0x2f, 0x0, 0x0) setsockopt(r0, 0x29, 0x40, 0x0, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20188, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x101, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) 2m53.190153899s ago: executing program 1 (id=17): r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_RXTLS_MODE(r0, 0x6, 0x2a, &(0x7f0000000000), &(0x7f0000000040)=0x4) (async) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r0, 0x6, 0x27, &(0x7f00000011c0)={&(0x7f0000000080)="a79c82926e9f5a305553198e5193e90466b8d0cf99cbf7ad8be5cb6ef6f1b3a659c83f59f9842eb925e5ef58a41c09bc5a506def251b79390b6589ce12a90892d782e5a41c6f51f13c8b8dc8d4e0444b4adb6af7eae5997a4e47717546b8d7834034979f27ad18761f4e4e1e1632305a98a4ff241fa420fa274d780c1979951ac3eecb83199a13f9f1700f9ab5f880df854ee838dc47109adf0fec9781247cc9cbef96e894f5c51c158f72f91a0c7f98", &(0x7f0000000140)="232eb7b3ce68ebe9a7c9f3015fc6b154caa969c6a01a858bbdb875ee4dbadb696842f7ccbe3cdda287fdb09458c9cb7bb3cfa44f6d52164d2c685cb4d1ddbc100f32657f312aa17047c0875bf1c005aeadc27203", &(0x7f00000001c0)="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", 0xb, 0xb0, 0x54, 0x1a, 0x1000, 0x0, 0x0, 0x1, "73505fe23f99e2af"}, 0x30) (async) sysarch$I386_SET_LDT(0x1, &(0x7f0000001240)={0x1, &(0x7f0000001200)=[{0x897}, {}, {0x5}], 0x3}) (async) r1 = open(&(0x7f0000001280)='./file0\x00', 0x200, 0xd8) extattr_set_link(&(0x7f00000012c0)='./file0\x00', 0x2, &(0x7f0000001300)='\x00', &(0x7f0000001340)="9a6326304bf9fa5fd5384dbdd817328e9d814581930acc63277060918b183e648d2f2257d14750d1161a02b5814084fcd9bcb8451d35915c94c140792f221b66838c6253c47f5c9c834e80ec2d04498942f672db2a83da42a5e7378cfdbbd033c892d96ea78e12fe960bcf2a1c1ef7b57a809077e22ec05134f6b5c896954b1a23d7c0aa4e423434abaface2b7aa5159f787f0a82a663675dd762cfdbb", 0x9d) (async) ioctl$PIO_DEADKEYMAP(r1, 0x20006b09, &(0x7f0000001400)={0x7f, [{0x2, [0x0, 0xfffffe01, 0x3, 0x8, 0x1e, 0x10000, 0x200, 0x10000, 0xff, 0xff, 0x1e6, 0x0, 0x1, 0x16500, 0x7ff, 0xfffffff7, 0x95, 0x340, 0x1, 0x5, 0x4, 0x5298, 0x2, 0x5, 0x10, 0x0, 0x2cdc, 0x6, 0x401, 0x6, 0x3, 0x5, 0xffff, 0xd2, 0x10000, 0x3, 0x7fff, 0x0, 0x5, 0x92, 0x5, 0x43e3, 0x40, 0x1, 0x2, 0x80010000, 0x6, 0x5, 0x7, 0xffff07f8, 0x22e, 0x8, 0x7fff, 0xd, 0x3, 0x200, 0x611a, 0x5, 0x9126, 0x1000, 0x7fff, 0x80000000, 0x7fffffff, 0x8ba, 0x7, 0x8, 0x8, 0x2, 0x8, 0x0, 0x40, 0x7, 0xb6, 0x1, 0x80, 0x4, 0xc, 0x7, 0x8, 0x0, 0x7, 0x3, 0x800, 0xed29, 0xf, 0x57, 0x2, 0x7, 0x0, 0x0, 0x6, 0x80000001, 0x5, 0x3, 0xa35, 0x810, 0x90, 0x6, 0x1, 0xc, 0x6, 0x1, 0xbf26, 0x5]}, {0x7ff, [0x1, 0x7, 0xc06, 0xf89, 0x454, 0x6, 0x0, 0x7, 0x8, 0xfffffffd, 0x5, 0x9, 0x0, 0x9, 0x3, 0x1, 0x10001, 0x8, 0x0, 0x4, 0x7, 0xff, 0xfffffff7, 0xb207, 0x7, 0xa000000, 0x2, 0x288, 0xf, 0xffff, 0x1, 0xe, 0x1, 0x3, 0x231a9339, 0x81, 0x1, 0x5, 0x400, 0xb, 0x40, 0x7fe, 0x800, 0xba45, 0x3, 0x6, 0x1, 0x10000, 0x7, 0x7, 0x3, 0x2, 0xb, 0x4, 0xd, 0x80000000, 0xff, 0xffff, 0x4a, 0x0, 0x80000001, 0x8, 0xffffff00, 0x6c, 0x7f, 0xe, 0x1, 0x42, 0xfffffff7, 0x3, 0x6, 0xdff1, 0x0, 0x80000001, 0x2, 0x3f, 0xf, 0x4, 0x6, 0x6, 0x40000, 0xe, 0x9cc, 0x6, 0x81, 0x40, 0x2, 0x1, 0xffff8000, 0x3ff, 0x80, 0x5, 0x7fffffff, 0x2, 0xffffff7f, 0x7ff, 0x2, 0x3, 0x100, 0x9, 0x100, 0x999, 0x6, 0x8001]}, {0x1, [0x9, 0x8001, 0x0, 0x18000000, 0xffffff88, 0x64f, 0x1, 0x8, 0x215, 0xffff, 0x6, 0x1, 0x7, 0x1, 0x2, 0x9c, 0x7, 0x0, 0x2, 0x7fffffff, 0x6, 0x3ff, 0x6, 0x5, 0x8001, 0x0, 0x3, 0x9, 0x2, 0x333, 0x1ff, 0x2, 0xd52, 0x0, 0x7fff, 0x5, 0xffffffff, 0xfff, 0x7, 0x4, 0x9, 0xfff, 0x7fffffff, 0x0, 0x2, 0x17, 0x1000, 0x9, 0x0, 0x3, 0x2, 0x3, 0x7, 0x6b, 0x80000001, 0x3, 0x10000, 0xb1b, 0xdb, 0x7, 0x2, 0x80000000, 0xffff, 0x10001, 0x10001, 0xaa3, 0x2, 0x3, 0x3, 0x6, 0x1, 0x5, 0x9, 0xa6c6, 0x6, 0x6, 0x2, 0x3, 0xed55, 0x4, 0x3, 0x1, 0x1f, 0x40, 0x3, 0x2, 0x2, 0x7, 0x0, 0x2, 0x10000, 0x9, 0x7, 0xb35, 0x7, 0x8, 0x7f, 0x4, 0x2, 0xe, 0x81, 0x100, 0x8f, 0xfffffffb]}, {0x1, [0x7, 0xf59, 0xadad, 0x3, 0xcdc, 0x2, 0x1, 0xfff, 0x81, 0x8, 0x0, 0x5, 0x9, 0x0, 0x3, 0xffffff80, 0x0, 0x71a09ac9, 0x8, 0x9, 0x3ff, 0x2, 0x9, 0xc5b, 0x1, 0xfffffffe, 0x0, 0x6abaf7ed, 0x0, 0x693c, 0x7, 0x8001, 0x5, 0x7, 0x8, 0x800, 0x1001, 0x5, 0xffff, 0x3, 0x1, 0x1, 0x6, 0x4, 0x40, 0x3, 0x9, 0xe9c5, 0x2, 0xa, 0x200, 0x1, 0x2, 0x7f, 0x95, 0x9, 0x4, 0x6, 0x9, 0x2, 0x180, 0x3, 0x3, 0x200, 0x7f, 0x9, 0x4, 0xffffff9c, 0x3ff, 0xc0000000, 0xe0a, 0x6, 0x6c9e108a, 0x2, 0x3f5, 0x0, 0x9, 0x3, 0x4, 0xb22, 0x3, 0x5, 0xc, 0x800, 0x7, 0x3, 0x5, 0xc, 0xffffff01, 0x6, 0x7, 0x2, 0x7f, 0x8, 0x61, 0x0, 0xb216, 0x401, 0x5, 0xfffffff8, 0x2, 0x94d, 0x80000001, 0xb]}, {0x8, [0xadd1, 0x9, 0x2, 0x0, 0x10000, 0x8, 0x80, 0x9, 0x81, 0x3, 0x2, 0x80000000, 0x9, 0x4, 0xb132000, 0x2, 0x8, 0x7, 0x1, 0x3, 0x4, 0x7, 0x8, 0x7fffffff, 0x768, 0x5, 0x918, 0x7, 0x7f, 0x0, 0x2, 0x7fff, 0xfffffffa, 0x8000, 0x80000000, 0xb6b, 0x9, 0x9b3, 0x57, 0xa2b9, 0x0, 0x5, 0x5, 0x5, 0xff, 0x0, 0x6, 0xf, 0x4, 0x7, 0x100, 0x0, 0x4925, 0x2, 0x4, 0x51b3, 0xb, 0x3, 0x2, 0x4, 0x3, 0xe63, 0x81, 0x1, 0x0, 0x8, 0x3, 0x3ff, 0x3, 0xc13e, 0x8a, 0xe, 0x6, 0x33d94b0c, 0x7e5812ef, 0x4, 0x10000000, 0x9, 0xe, 0x4, 0x4, 0x2, 0x7, 0x6, 0x3, 0xfffffffa, 0x8, 0x48, 0x5b8a, 0x4, 0xe8, 0x4, 0xb591, 0x1, 0x1, 0x2, 0x7fff, 0x3, 0x4, 0x6, 0x3, 0x7, 0x1, 0x7fffffff]}, {0x1, [0xe34, 0xb6c, 0x9, 0x4, 0xd, 0x80000000, 0x0, 0x4, 0x5, 0x5, 0x4, 0x6, 0x3, 0x7, 0x7fffffff, 0x1000, 0x4, 0x8, 0x0, 0x4, 0x7, 0x8, 0x3, 0x3ff, 0x9, 0x538, 0x7f, 0x80000000, 0x8, 0x401, 0xc, 0xfffffff9, 0x4, 0x2, 0x1, 0x2f7, 0x80000001, 0x5, 0x4, 0x5, 0x80000000, 0x7a4, 0x3, 0xe00000, 0x9, 0x2, 0x5, 0x9, 0xd8dd, 0x38000, 0x832c, 0xe0, 0x5, 0x2, 0x40, 0x5, 0xffffffff, 0x8, 0xffff2193, 0x10000, 0x9, 0xffffffff, 0x401, 0x100, 0xfffffffc, 0x8001, 0x40000000, 0x6, 0x0, 0x6, 0x0, 0xe, 0x3, 0x0, 0x9, 0x8000, 0x1, 0xfffffff7, 0x5d6, 0x6, 0x4, 0x1, 0x6, 0x47df, 0x4, 0x4dfbde10, 0xfe1, 0x80000001, 0x7ff, 0x0, 0x1ff, 0xe8, 0x3ff, 0x9, 0x19, 0xee0, 0x1, 0x2, 0x101, 0x1, 0x4, 0x5, 0x200, 0x655042dd]}, {0x1000, [0x9, 0x200, 0xb, 0x9, 0x13a1, 0xfffffffb, 0x7ff, 0x8, 0x0, 0x1, 0x9, 0x8748, 0x4, 0x9, 0x9, 0x5e18, 0x58de, 0x2, 0xffff9b93, 0x27, 0x8000, 0x6, 0x8, 0x8, 0x79, 0x454, 0x4, 0x6, 0x830, 0x0, 0x4, 0x9, 0x2, 0x3, 0x5, 0x8, 0x1, 0x5, 0x683, 0x5, 0xfffffffe, 0x6, 0x2, 0xffffff00, 0x9, 0x1, 0xffff, 0x4, 0x9, 0x1, 0x4, 0x1, 0x1ff, 0x4f, 0x888, 0x2e21, 0xa, 0x5, 0x3ff, 0x10000, 0x100, 0x2, 0x400, 0x5, 0xfffffffa, 0x10, 0xd, 0xc9dc, 0x2, 0x5, 0x5, 0x9, 0xfffffff5, 0x2, 0x9, 0xfffffffa, 0x3, 0x100, 0x2, 0x8001, 0x4, 0x2, 0x8, 0x37c00000, 0xc, 0x5, 0x3800000, 0x0, 0x3, 0x6, 0x8, 0x1, 0x5, 0xa4, 0x100, 0x33d, 0x80000000, 0x80000000, 0x9, 0x94df, 0xfffffffb, 0xfffffff7, 0x47, 0x2]}, {0xdd1, [0xfffffff9, 0x200, 0x3, 0x2, 0x20000000, 0x6, 0x88000000, 0x7, 0x7, 0x2, 0x0, 0x400, 0x9, 0x2, 0x6, 0xfffff9fa, 0x81, 0x2, 0x2, 0x6, 0x6, 0xe, 0xff, 0x6, 0xb8d, 0x5, 0x401, 0xffffffff, 0xfff, 0x80000001, 0xae, 0x9, 0x2, 0x16198610, 0xc, 0x7f, 0x81, 0x3, 0xa4, 0x8e, 0x5, 0x1, 0x4, 0x9, 0x4, 0x6, 0xf34, 0x8, 0x2, 0xd63f, 0x2, 0x0, 0x5, 0x6, 0x2, 0x7, 0x7f, 0x7, 0xffff, 0x401, 0x0, 0x0, 0x40, 0x8, 0x3, 0xabe, 0x25e3, 0xad, 0x2, 0x773, 0x6, 0x4, 0x40, 0x7, 0x8110, 0xe, 0x1, 0x9, 0x8, 0xc, 0x5, 0x8, 0x10, 0x7, 0xfff, 0xe, 0x200, 0x5, 0x4, 0x5, 0x9, 0x101, 0x1a1, 0x2, 0x3, 0x8a0, 0xd, 0x18863da7, 0x8, 0x7, 0x0, 0x80000001, 0x9f, 0x1]}, {0x400, [0x9, 0x9, 0x101, 0xfffffff6, 0x9, 0xcb, 0x7fffffff, 0x7, 0x2, 0x8, 0x2, 0x8001, 0xffffffff, 0x1, 0x1ff, 0x7, 0x0, 0x8, 0xfff, 0x8, 0x7, 0xfffffffc, 0x3, 0x1, 0x6, 0x5, 0xc69b, 0x4, 0x6, 0x6, 0x4, 0x4, 0x0, 0xd, 0xe, 0x9, 0x5, 0x8, 0x2, 0x20000, 0x7, 0xe, 0x380, 0x10000, 0x2, 0x8000, 0x4, 0xd, 0x9, 0x5, 0xffffffff, 0x2, 0x7, 0xffe, 0xf5fd, 0x4, 0x9, 0xc, 0x4, 0x8, 0x2ae09cd5, 0x0, 0x3, 0x3, 0x7fff, 0x2, 0x80000000, 0xffffffff, 0x7, 0xf, 0x4, 0xfffffffc, 0x0, 0x6, 0x6, 0x8000, 0x5, 0x38, 0x4, 0x3, 0x5, 0x3, 0x2, 0x3, 0x9, 0x5, 0x4, 0x4, 0xac36, 0x8, 0x200, 0x7fffffff, 0x2, 0x40, 0x6, 0xfffffff9, 0x865b, 0x7fffffff, 0x8, 0x9, 0x8, 0x57, 0x6, 0x5]}, {0x8, [0x10, 0x6f, 0x7, 0x72aff7a3, 0x7fffffff, 0x1, 0x8c8d, 0x9b, 0x6, 0x5, 0xb2d, 0x3, 0x8, 0x0, 0x81, 0xd7, 0x2, 0x101, 0x8, 0x7, 0x2, 0x8ff, 0x8, 0xfd, 0x7, 0x101, 0x3, 0x3141, 0x1, 0x6, 0x6, 0x1000, 0xb, 0x6, 0x7fffffff, 0x4, 0xc, 0x4, 0x4, 0x401, 0x4a, 0x4c93, 0x0, 0x80000001, 0x90f, 0x7, 0x8, 0x3, 0x3ff, 0xfffff000, 0x2, 0xe, 0x2, 0x8, 0x8, 0x10001, 0x7, 0x10001, 0x4, 0x4b, 0x2, 0xf3f, 0x10001, 0x0, 0x7, 0x818, 0x0, 0x2, 0x400, 0x6, 0x56ec, 0x400, 0x3021, 0x0, 0x5, 0x8, 0x7fffffff, 0x40000, 0x83c, 0x0, 0x313f4d99, 0x9, 0x6, 0x4, 0x462, 0x4, 0x3, 0x1, 0xf4f, 0x0, 0x4, 0x5, 0xf96, 0x7, 0x8, 0x9, 0x401, 0x1, 0x10000, 0xfffffffc, 0x9, 0x0, 0x3, 0x1]}, {0x1, [0x200, 0x0, 0x7, 0x1, 0xe85, 0x0, 0x5, 0x3a20, 0x7, 0x0, 0x7f, 0x7, 0x3, 0xfffffffe, 0x101, 0x0, 0x3, 0x5, 0xb0f7, 0x0, 0x3, 0x10, 0x7, 0x9f0, 0x82, 0x6, 0x1, 0x8, 0x7, 0x7ff, 0x8, 0x9, 0xd, 0x88, 0x80, 0x4, 0x4, 0xa, 0x100, 0xbc, 0x80000000, 0xa, 0x5, 0x0, 0x3d0, 0x4, 0x2, 0x1ff, 0x4, 0x100, 0x8, 0x7fffffff, 0x800000, 0x2, 0xfffff1f9, 0x7f, 0x2, 0x3ff, 0xfffffffd, 0x8, 0x8, 0x7, 0x1, 0x6, 0x7, 0x74, 0xd, 0x9, 0x10001, 0xdcc9, 0x7, 0x9, 0x1, 0x1, 0x23, 0xffffffff, 0x6538, 0x80000000, 0x6, 0x2000000, 0x1, 0x1, 0x1, 0x1000, 0x4, 0x2, 0x4, 0x6, 0x8, 0x4, 0x28, 0x7, 0x1, 0x96, 0xfffffeff, 0x779, 0xec45, 0x400, 0x1, 0x10, 0x7, 0x4, 0x7ff, 0x6d69]}, {0x5, [0x2, 0xe, 0x3, 0x40, 0xffffffff, 0x6ccf, 0x9, 0xb, 0x8, 0x0, 0x5, 0x7fffffff, 0x1, 0x5, 0x0, 0x8000, 0x4, 0x8, 0x8, 0x436, 0x6, 0x9, 0x6, 0x3, 0x6746, 0xf611, 0x6, 0x2, 0x6, 0x3, 0x3, 0x7fffffff, 0x7fe840a7, 0xe, 0x7, 0x6, 0x9, 0xed33, 0x4, 0xffffffff, 0x0, 0x0, 0x101, 0xffffffff, 0x6, 0x5, 0x99a, 0x3, 0x3, 0xc, 0x7ff, 0x3, 0x7, 0xffff, 0x6, 0x4, 0x1, 0x3a24, 0x5c, 0xc, 0x7fff, 0x7, 0x3, 0x4, 0x10, 0x9, 0x10, 0x7, 0xfffff073, 0x6, 0x15a80d3b, 0x80000000, 0x10, 0x7, 0x3, 0x3, 0x9, 0x1, 0x80000001, 0x10000000, 0x7fffffff, 0x4, 0x1, 0x7fff, 0x7f, 0x1, 0x4, 0xfffffff9, 0x1, 0x5, 0x4, 0xeb1, 0x3, 0x8, 0x1b15b24c, 0x6, 0x7fffffff, 0x3, 0xc, 0x7, 0x5, 0x9, 0xe6, 0x7]}, {0x6, [0x33, 0x2, 0x9, 0x0, 0x0, 0xb0d8, 0x48, 0x200, 0xff, 0x1, 0x8, 0x7, 0x1000, 0x6, 0x3ff, 0x5, 0x3, 0xfffffffa, 0xd1, 0x9, 0x10000, 0xffffffff, 0x0, 0x1, 0x50, 0x0, 0xffff0000, 0x2, 0x8, 0x200, 0x8, 0x3ff, 0x6, 0x5, 0x7fff, 0x4, 0x4e4, 0x6, 0x2, 0x1, 0x7, 0x7, 0x8, 0x5, 0x200, 0x7fff, 0x0, 0x401, 0x3116, 0xa62, 0x306, 0x2, 0x80000000, 0x0, 0x5, 0xd5, 0x1, 0x80000001, 0x0, 0x1, 0xcef, 0x6, 0x5, 0x7, 0x2, 0x1d3d, 0xe, 0x3, 0x3, 0x5, 0x4, 0x40, 0x4, 0x401, 0x100, 0x6, 0x2, 0xd7479d60, 0x6, 0x0, 0x0, 0xafde, 0x0, 0xffffffff, 0x2, 0x7, 0x80, 0x10001, 0x4, 0xffffffff, 0x0, 0x1, 0x101, 0x7, 0x9, 0x2d43, 0x7, 0x4, 0x2, 0xf, 0x2, 0x7f, 0x0, 0x200]}, {0xa, [0x1, 0x400, 0x1000, 0x8b47, 0xfffffffb, 0x4, 0x3, 0xfffffffc, 0x7, 0xfffff6e7, 0x8, 0xa5a, 0x101, 0x7622, 0x21, 0x7, 0x3, 0x5, 0x8, 0x6, 0x80, 0x80, 0x3ff, 0x1, 0x8, 0x6, 0xf, 0xf, 0x48, 0x4a2a, 0x1, 0x10, 0x5d5, 0x4, 0x0, 0x9, 0xf, 0x0, 0x7f, 0x2deb, 0x3, 0x80, 0x6, 0x7, 0xf7bc, 0x497f, 0xfc0f, 0x8, 0x2ddc, 0xfffffffa, 0x7, 0xd1d5, 0x2, 0x100, 0x5, 0x1, 0xffffff1d, 0x2, 0x3, 0x0, 0x7fffffff, 0x7f, 0x8000, 0x5, 0x100, 0x3, 0x200, 0x2, 0x7, 0x9, 0x9, 0x401, 0x1, 0x0, 0x1, 0x3, 0x5, 0x6, 0x40, 0x6, 0xaf, 0x7, 0x3, 0x2, 0x1, 0x0, 0x9767, 0x4, 0x80, 0x3, 0x8, 0x5, 0xc1c41fd, 0x1000, 0x8, 0x7, 0x1, 0x100, 0x4, 0x8, 0x5, 0x400, 0x800, 0x9]}, {0x5, [0x1, 0x2, 0x400, 0x4, 0x80000001, 0x2, 0xc18f, 0x101, 0x8, 0x2, 0x2, 0x3f012654, 0x4, 0x1, 0x9, 0x67, 0x8, 0xd, 0x2, 0x8, 0xf4b6, 0x77, 0x1, 0x2, 0x8, 0xdcb3, 0x9c2a, 0x17bf, 0x6, 0x8001, 0x1, 0xc, 0xff4389c, 0x3ff, 0x99b, 0x254, 0x7, 0x2, 0x4, 0xf5d4, 0x327, 0x7a, 0xd, 0x8, 0xfffffff8, 0x2, 0x8, 0x8, 0x800, 0x99e, 0xe27, 0x9, 0x3, 0x81, 0x3, 0x8, 0x1000, 0x4, 0x10, 0x9, 0xdda3, 0x8, 0x3db, 0x4, 0x4, 0x7, 0x1, 0x80000001, 0x1000, 0x6, 0x5, 0x70635567, 0x64, 0x80, 0x3, 0x4, 0x8cae, 0x8000, 0x7, 0x3, 0x7, 0x3, 0x100, 0x7, 0x3, 0x7, 0x6, 0xe, 0x6, 0x8, 0x4, 0x3, 0x101, 0x0, 0x1d0, 0x1, 0x3, 0x8001, 0x800, 0x0, 0x3, 0x8, 0x3b, 0x5]}]}) (async) r2 = open(&(0x7f0000002cc0)='./file0\x00', 0x40, 0x10) r3 = accept4$inet(r0, 0x0, &(0x7f0000002d00), 0x10000000) setsockopt$inet_mreqsrc(r3, 0x0, 0x46, &(0x7f0000002d40)={@broadcast, @empty, @multicast2}, 0xc) (async) getfsstat(&(0x7f0000002d80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x928, 0x1) (async, rerun: 32) r5 = vfork() (async, rerun: 32) freebsd11_fstatat(r0, &(0x7f0000003800)='./file0\x00', &(0x7f0000003840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4200) (async) freebsd11_fstatat(r3, &(0x7f00000038c0)='./file0\x00', &(0x7f0000003900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x200) getresgid(&(0x7f0000003980), &(0x7f00000039c0)=0x0, &(0x7f0000003a00)) (async) getgroups(0x1, &(0x7f0000003a40)=[0x0]) (async) fhstat(&(0x7f0000003a80)={{[0x6, 0xfffffff7]}, {0xfff8, 0x8, "491d959b05f2e884a3bebb7c8e017b1e"}}, &(0x7f0000003ac0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fhstat(&(0x7f0000003bc0)={{[0x1]}, {0x2, 0x3, "893415fd605f2c8a4c02d22ad4c7fdf5"}}, &(0x7f0000003c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 64) __semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000003d40)=&(0x7f0000003d00)={{0x0, 0x0}}) (rerun: 64) freebsd11_stat(&(0x7f0000003d80)='./file0\x00', &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 32) getresgid(&(0x7f0000003e40)=0x0, &(0x7f0000003e80), &(0x7f0000003ec0)) (async, rerun: 32) __semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000003f40)=&(0x7f0000003f00)={{0x0, 0x0}}) freebsd11_lstat(&(0x7f0000003f80)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) fstat(r0, &(0x7f0000004040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) freebsd11_lstat(&(0x7f0000004140)='./file1\x00', &(0x7f0000004180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 32) freebsd11_lstat(&(0x7f0000004200)='./file0\x00', &(0x7f0000004240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async, rerun: 32) freebsd11_stat(&(0x7f00000042c0)='.\x00', &(0x7f0000004300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) freebsd11_fstatat(r0, &(0x7f0000004380)='./file0\x00', &(0x7f00000043c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) (async) r22 = socket$bt_rfcomm(0x24, 0x1, 0x88) sendmsg$unix(r1, &(0x7f0000005080)={&(0x7f00000036c0)=@file={0xa, 0x0, './file0\x00'}, 0xa, &(0x7f00000037c0)=[{&(0x7f0000003700)="800dd17394ae51565f3a770237cb28d9f0800859496b80aad7af6841c771c49d60bdf580a367e3a81f0d525b82a0b4af8da61607d065a256f3fe0d4348f8fb158a515431a78b2f46c2b4e910439c3965121e1530322ab8ac7e84c896c823511c5da0a9e0d558e381aa5a58df0fca57d05d10907803fd5947d2cdadc68b7723d274e682fef01a6dd6dcf2261c9eb8dd959275e4ebfdc99053e5cb038052c411db07456be7", 0xa4}], 0x1, &(0x7f0000004f80)=[@cred={0x60, 0xffff, 0x3, r5, r4, r4, r6, 0x10, [r7, r8, r9, r10, 0x0, r11, r12, r13, r14, r15, r16, r17, r18, r19, r20, r21]}, @rights={0x14, 0xffff, 0x1, [r2, r22]}, @cred={0x60, 0xffff, 0x3, 0x0, r4, r4, 0x0, 0x10, [0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff]}], 0xd4, 0x80}, 0x0) 2m52.160659246s ago: executing program 1 (id=22): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) r1 = socket(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20100, &(0x7f0000000200)={0x10, 0x2, 0x2, @rand_addr=0x7ffffffe}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN(r1, 0x6, 0x401, &(0x7f0000000000)={0x7, "1c130ff5d70c44cabac4574d85cc2a7f"}, 0x14) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(0x0, 0x601, 0x0) r4 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, r4, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r3, 0x29, 0x53, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x3, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000, 0x195) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000140)={0x0, 0x101, 0xfffffff6}) sysarch$I386_GET_IOPERM(0x3, &(0x7f0000000100)) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 2m39.459189406s ago: executing program 3 (id=88): mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) syz_emit_ethernet(0x4e, &(0x7f00000001c0)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "0200", 0x18, 0x0, 0x0, @rand_addr="0000000008210ec5431100", @local={0xfe, 0x80, '\x00', 0x0}, {[@dstopts={0x3a, 0x1, '\x00', [@padn={0x1, 0x3, [0x0, 0x0, 0x0]}, @enc_lim={0x4, 0x1, 0x1}]}], @icmpv6=@echo_request}}}}}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000a80), 0x800, 0x0) r0 = openat$md(0xffffff9c, &(0x7f00000000c0), 0x4, 0x0) mmap(&(0x7f00003ad000/0x4000)=nil, 0x4000, 0x3, 0x11, r0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x7) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x18000c) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) fchmod(r3, 0x34) readv(r1, &(0x7f0000000080)=[{&(0x7f00000003c0)=""/185, 0x4000}], 0x1) writev(r2, &(0x7f0000000080), 0x1000000000000014) syz_emit_ethernet(0x66, &(0x7f0000000040)=ANY=[@ANYRES64=0x0, @ANYRESHEX=0x0]) fork() r4 = socket(0x1b, 0x3, 0x0) sendto$inet6(r4, &(0x7f0000000080)="02090100020000008e4ca277fce00d8f", 0x10, 0x20008, 0x0, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x7) sigaction(0x14, &(0x7f0000000100)={&(0x7f00000000c0)="0f0f28a0c4017c53c50f71e20b4229ec4069b50008000000080000c403896ae7d3c4a1ff1153076744c0584e00430f1812c4827d33de", 0x6d}, 0x0) r5 = kqueue() kevent(r5, &(0x7f00000001c0), 0x49249ac, 0x0, 0x0, 0x0) ioctl$DIOCGETADDRS(r2, 0xc4584435, &(0x7f0000000100)="110815924fb32b16836128a93bbdde6e885887c72fa65b378581c93a43285c760e7b7a0b31a156274a663158559397993ba943c34e3a4e81f782b49e101e20c2f10c3123f6cedda8ac7e25ff75354bc25cd0822ee5a8ad50c835dcabee31fc92dc6da5267fa08ae406779de6b4b4ef5d7f15420a159b0e84cb1d") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)) 2m38.580734335s ago: executing program 3 (id=95): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) 2m37.774245332s ago: executing program 3 (id=98): mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) (async) setlogin(0x0) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) (async) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6000) (async) fork() (async) r2 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_opts(r2, 0x0, 0x1, &(0x7f00000000c0)="44030f01000000e8c94ef76411ee54be0e1c261279c2c118c376cef3e2549c40879a18a24b6dfc500c1b36d280641dde0630aa637bcabc8bcf44e540000000bbadc4e8d0436a0de63bc438cdb27a85190eb6a0e4", 0x54) connect(r1, &(0x7f00000001c0)=@in={0x10, 0x2, 0x3, @multicast2}, 0x10) (async) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2, 0x1, @loopback}, 0x10) r3 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r4, 0x0) (async) getresuid(&(0x7f0000000000), 0x0, 0x0) (async) mkdirat(r3, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) (async) seteuid(0xffffffffffffffff) (async) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r5, &(0x7f0000000340)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1, 0x4, @rand_addr="3c6c74d2610b4ef758d3d055bfeb16be", 0xfffffffe}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000002900800015"], 0x1c}, 0x0) getsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x9, 0x6, 0xb, 0x4, 0x4}, &(0x7f0000000100)=0x14) setsockopt$inet6_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000140)={r6, 0x6}, 0x8) chroot(0x0) rename(0x0, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000000)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd60dcffd900503a003bcc3f0600000058132fa13e8be186e3fe8000000000000000000000000000aa02009078000000006006db3efffe2b00fe8000000000000000000000000000aa000000000000000000000000000000012b02007300000000fe8003000000000000000000000000aa2300000000000000"]) (async) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f0000000180)={r6, 0xffffffff}, &(0x7f0000000200)=0x8) (async) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2m37.690021646s ago: executing program 3 (id=99): ioctl$BIOCGRTIMEOUT32(0xffffffffffffffff, 0x4008426e, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg$inet6_sctp(r0, &(0x7f0000000d80)={&(0x7f0000000b40)=@in6={0x1c, 0x1c, 0x0, 0x0, @rand_addr="575623327e5f0026bd8ae91df847001a", 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000d40)=[@sndinfo={0x1c, 0x84, 0x4, {0xb83, 0x800, 0xb8}}, @dstaddrv6={0x1c, 0x84, 0xa, @rand_addr="e18c2e38dff74f7301242dd0f5b6eca8"}], 0x38, 0x20098}, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f00000002c0)={0x240c, 0x690d, 0x7fffffff}) syz_emit_ethernet(0x3e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffa5d344fe86ab9da003cdea86dd6000e90000081100fe7946440402008000000000b173b1cbfe8000000000000000000000000000aa4e214e2300089078"]) 2m37.689681319s ago: executing program 3 (id=100): r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x8, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x1, 0x0, 0x2000000, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setrlimit(0x7, &(0x7f0000000040)={0x1, 0x6}) setreuid(0xee00, 0x0) vfork() setsockopt$inet6_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x4, 0x4) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) r3 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000040)=0xa, 0x4) syz_emit_ethernet(0x1aa, &(0x7f0000000cc0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa008100000086dd602e5cea01703c0020010000000000000000000000000002ff0200000000000000000000000000012b"]) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) r4 = openat$kbd(0xffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$KDSKBSTATE(r4, 0x20044b14) r5 = socket(0x1c, 0x1, 0x0) r6 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(r6) syz_emit_ethernet(0x2a, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0806"]) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 2m36.813094372s ago: executing program 3 (id=105): r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x8, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x1, 0x0, 0x2000000, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setrlimit(0x7, &(0x7f0000000040)={0x1, 0x6}) setreuid(0xee00, 0x0) vfork() setsockopt$inet6_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x4, 0x4) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) r3 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r3, 0x29, 0x18, &(0x7f0000000040)=0xa, 0x4) syz_emit_ethernet(0x1aa, &(0x7f0000000cc0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa008100000086dd602e5cea01703c0020010000000000000000000000000002ff0200000000000000000000000000012b"]) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$kbd(0xffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$KDSKBSTATE(r4, 0x20044b14) r5 = socket(0x1c, 0x1, 0x0) r6 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup(r6) syz_emit_ethernet(0x2a, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0806"]) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 2m33.304450372s ago: executing program 0 (id=119): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x1c, 0x1, 0x0) select(0x40, &(0x7f00000000c0)={0x8, 0x2727, 0x8, 0x6, 0x18, 0x66, 0x1, 0xfffffffffffffff9}, &(0x7f0000000100)={0x0, 0x7ff, 0x2, 0x400, 0x5c6, 0x658, 0x7fffffff, 0x8000000000000000}, &(0x7f0000000140)={0x1, 0x3359, 0xfffffffffffffffc, 0x0, 0x8, 0x3e25, 0xadd6, 0x9}, 0x0) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x104}, 0x0) sendto(r2, 0x0, 0x0, 0x74dd23f279437340, 0x0, 0x0) recvmsg(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x83) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x4a, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r4, 0x0, 0x15, 0x0, 0x0) rfork(0x3000) setsockopt$inet6_group_source_req(r0, 0x29, 0x53, &(0x7f0000002f00)={0xd, {{0x1c, 0x1c, 0x3, 0x1c00, @remote={0xfe, 0x80, '\x00', 0x0}}}, {{0x1c, 0x1c, 0x3, 0x15, @mcast1, 0x3}}}, 0x108) r5 = socket$bt_l2cap(0x24, 0x3, 0x87) setsockopt$bt_l2cap(r5, 0x1609, 0x5, &(0x7f0000000000)=0x401, 0x4) 2m33.204438428s ago: executing program 0 (id=121): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x12) fpathconf(r1, 0xa) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) r2 = kqueue() kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, 0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x21000630) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) r5 = open$dir(0x0, 0x200, 0x40) shutdown(0xffffffffffffffff, 0x1) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4, &(0x7f0000000040)=0x8, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x20086, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x9, @empty, 0x7}, 0x1c) r7 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r8 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r5, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r8, &(0x7f0000000240)='./file0\x00') bind$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0x1c, 0x1c, 0x2, 0x8, @mcast2, 0x5}, 0x1c) r9 = socket(0x11, 0x3, 0x0) sendto$unix(r9, &(0x7f0000000000)="b1000504000004000000000001000000331c13fecea10500fef96ec0c72fd3357ae30200004e3003000000acf20b7804be38164991f7c8cf5f882b297be1aa0500000051e2f0ad3ebbc257699a1f139b672f4d335c223e7d0c032bfa896443a42102000000720fd18bfbb670c1f5a872c881ea6e2ec5890400000000008000361b4cc702", 0x84, 0x0, 0x0, 0x0) fspacectl(r9, 0x0, &(0x7f00000001c0)={0x1, 0x80}, 0x0, &(0x7f0000000200)) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 2m32.330621085s ago: executing program 0 (id=124): __getcwd(&(0x7f0000000100)=""/3, 0x3) (async) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) socket(0x1c, 0x1, 0x0) (async) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) (async) kqueue() __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) (async) r0 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BIOCSETFNR(r0, 0x80084282, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0xba, 0x7f, 0x3}]}) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x6, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) (async) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) (async) r3 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) (async) r4 = __specialfd$inotify(0x2, &(0x7f0000000480), 0x4) inotify_add_watch_at(r4, r3, &(0x7f0000000280)='.\x00', 0x21000630) (async) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) (async) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00') (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) (async) r5 = socket(0x10, 0x10000000, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x2, &(0x7f0000000200)=0x400, 0x4) (async) setsockopt$inet6_group_source_req(r2, 0x29, 0x52, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x1, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x400ff7fd}}, {{0x1c, 0x1c, 0x1, 0x10, @mcast2, 0x1}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) (async) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, 0xffffffffffffffff, 0x60000000) (async) open$dir(0x0, 0x40000400000002c2, 0x84) (async) open$dir(0x0, 0x200, 0x40) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x40) open$dir(&(0x7f0000000040)='./file0\x00', 0x190, 0x0) 2m31.516988494s ago: executing program 0 (id=126): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) mount(&(0x7f0000000200)='ext2fs\x00', 0x0, 0x10000000, &(0x7f0000000240)="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") openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x1, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r2, &(0x7f0000000180)="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", 0x5c9, 0x80, &(0x7f0000000040)={0x10, 0x2, 0x1}, 0x10) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x40, 0x0) shm_unlink(0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x2, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffa}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0xaa) fcntl$setstatus(r4, 0x4, 0x4900bf732d83df73) mmap(&(0x7f0000029000/0x800000)=nil, 0x800000, 0x3, 0x20011, r4, 0x0) r5 = open(0x0, 0x80400000000206, 0x48) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r6, 0x29, 0x14, &(0x7f00000000c0)=0x401, 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, r5, 0x60000000) lpathconf(&(0x7f0000000080)='./file1\x00', 0x7) extattr_delete_file(&(0x7f0000000780)='./file0\x00', 0x2, &(0x7f00000007c0)='+\\E$\xec\x00') ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2m30.682115384s ago: executing program 0 (id=130): r0 = socket(0x1c, 0x1, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000280)={0x0, 0x5}, &(0x7f00000002c0)=0x8) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) r1 = socket$inet6(0x1c, 0x2, 0x0) sendmsg$inet6_sctp(r1, &(0x7f00000001c0)={&(0x7f0000000200)=@in={0x0, 0x2, 0x1, @remote={0xac, 0x14, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=ANY=[], 0x14, 0x10006}, 0x8d) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r2, 0x4004667f, &(0x7f0000000140)) socketpair(0x2, 0x10000000, 0xb, &(0x7f00000000c0)={0xffffffffffffffff}) accept$unix(r3, &(0x7f0000000100)=@abs={0x8}, &(0x7f0000000140)=0x8) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_emit_ethernet(0xe6, &(0x7f0000000180)=ANY=[@ANYBLOB="ffffffffffff00000000000086dd60dbbc6c00b00003fe8000000000000000d800e6000000aaff0200000000000000000000000000012b158d"]) r4 = socket(0x1c, 0x3, 0xfe) setsockopt$inet6_IPV6_HOPOPTS(r4, 0x29, 0x31, &(0x7f00000016c0)=ANY=[@ANYBLOB="000400000000000004010004"], 0x28) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) r5 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r5, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xb}, 0x24) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x200, 0x4) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, &(0x7f0000000080)={@local={0xac, 0x14, 0x0}}, 0xc) sysarch$I386_SET_LDT(0x1, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) rfork(0x85000) ioctl$CIOCGSESSION2(0xffffffffffffff9c, 0xc030636a, &(0x7f0000000080)={0x1f, 0x0, 0x5b, &(0x7f0000000440)="ec7b00000900ff2425c1f0a58b5197986f60c6856a7ae6eb124fa22ef1d3e8b98fe6f060e021bc016d64a5633f61c6d463827346c331188b28de079d41708acb6f2c3d4396a4ac01b1291bb4dd862149b06bdcd74f0ee881624f56", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x6, 0x44e]}) kqueue() 2m30.566539938s ago: executing program 0 (id=131): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) kqueue() __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BIOCSETFNR(r1, 0x80084282, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6, 0xba, 0x7f, 0x3}]}) r2 = kqueue() kevent(r2, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x6, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r5 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r5, r4, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffffff, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x1, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x400ff7fd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x1}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, 0xffffffffffffffff, 0x60000000) open$dir(0x0, 0x40000400000002c2, 0x84) open$dir(0x0, 0x200, 0x40) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x40) open$dir(&(0x7f0000000040)='./file0\x00', 0x190, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 1m2.803626187s ago: executing program 2 (id=335): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) r1 = socket(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20100, &(0x7f0000000200)={0x10, 0x2, 0x2, @rand_addr=0x7ffffffe}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN(r1, 0x6, 0x401, &(0x7f0000000000)={0x7, "1c130ff5d70c44cabac4574d85cc2a7f"}, 0x14) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, 0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(0x0, 0x601, 0x0) r5 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, r5, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x53, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x3, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(0x0, 0x40000, 0x195) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000140)={0x0, 0x101, 0xfffffff6}) sysarch$I386_GET_IOPERM(0x3, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 1m1.955031255s ago: executing program 2 (id=336): r0 = socket$inet6(0x1c, 0x2, 0x0) setsockopt(r0, 0x29, 0x40, &(0x7f0000000000)="60c6ea", 0x3) bind$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x0, 0x9, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}}, 0x1c) sendto$inet6(r0, &(0x7f0000000140)="036b00bf938c0d650ef0fa5b437298cd66599b5f9fa7014612a95a07e55b441cfea2da3da65f57891d34192b438fc88e5f8780dec0f09ec02951800361f839bb11570f7baf10ba8fcb8328d50c82674f24c55df8f10bb2c001d4c12791365885bf421341e7217585e03c98ad2baac2708e943340d91ca8257d83942a9aaf4028690187dcea34c4c06bf1cedd8edaaaee58801364d7e905ff964a2d39816f2a07ba94e0", 0xa3, 0x80, &(0x7f0000000040)={0x1c, 0x1c, 0x1, 0x8, @empty, 0x6}, 0x1c) 1m1.944919279s ago: executing program 2 (id=337): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) inotify_add_watch_at(0xffffffffffffffff, r3, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r4, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000180)={0x15, 0x23, 0x0, 0x0, 0x0, 0x0, 0x5, 0x93, [0x9, 0x8, 0x3, 0x5]}) ioctl$BIOCSETF(0xffffffffffffffff, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 1m1.097626658s ago: executing program 2 (id=338): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x50, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) cpuset_getaffinity(0x1, 0x2, 0x6, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x4, 0x12c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mprotect(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x3) bind$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c, 0xffffffffffffffff, 0x8, @loopback}, 0x1c) sendto$inet6(r1, &(0x7f0000000100)="875500000000a599", 0x8, 0x108, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x9, @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, 0x45}, 0x1c) 1m0.980583506s ago: executing program 2 (id=339): getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0x1c, 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x40000, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0xe100, 0x0) pipe2(&(0x7f0000000000), 0x4) openat$bpf(0xffffff9c, &(0x7f0000000040), 0x80000, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) shmget(0x2, 0x2000, 0x82, &(0x7f0000001000/0x2000)=nil) thr_suspend(&(0x7f0000000040)={0x4, 0x1}) munmap(&(0x7f0000000000/0x4000)=nil, 0x4000) connect$inet6(r0, &(0x7f0000000300)={0x1c, 0x1c, 0x2, 0xd251, @mcast1, 0x5}, 0x1c) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r2, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) copy_file_range(r2, 0x0, r2, &(0x7f0000000040)=0x2, 0x7fffffff, 0x0) r3 = socket(0x26, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, 0x0, 0x0) setsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x5, 0x2, 0xffffff0f, 0x1c, 0x8001}, 0x14) setsockopt$sock_int(r3, 0xffff, 0x1004, 0x0, 0x0) 1m0.980302745s ago: executing program 2 (id=340): r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0x40}, 0x24) connect$inet(r0, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r0, &(0x7f0000002580)={0x0, 0x300, &(0x7f0000000200)=[{&(0x7f00000004c0)="9f5a221d47022b33ad87a5a7ef50a69fd6e0d0bd160711a706663dcc57c5aa0d7d6df3d461552173703d13f1e7c00d42335b5150efae8ff1d89a17a90610fc72c5d68ae3d788146bff68d127b9d92d862687e3fcde2313415464750025", 0x5d}], 0x1, 0x0, 0x0, 0x1}, 0x20104) 1m0.980153201s ago: executing program 32 (id=340): r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0x40}, 0x24) connect$inet(r0, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r0, &(0x7f0000002580)={0x0, 0x300, &(0x7f0000000200)=[{&(0x7f00000004c0)="9f5a221d47022b33ad87a5a7ef50a69fd6e0d0bd160711a706663dcc57c5aa0d7d6df3d461552173703d13f1e7c00d42335b5150efae8ff1d89a17a90610fc72c5d68ae3d788146bff68d127b9d92d862687e3fcde2313415464750025", 0x5d}], 0x1, 0x0, 0x0, 0x1}, 0x20104) 1.778693819s ago: executing program 4 (id=513): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) r1 = socket(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x20100, &(0x7f0000000200)={0x10, 0x2, 0x2, @rand_addr=0x7ffffffe}, 0x10) setsockopt$inet6_tcp_TCP_FASTOPEN(r1, 0x6, 0x401, &(0x7f0000000000)={0x7, "1c130ff5d70c44cabac4574d85cc2a7f"}, 0x14) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, 0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(0x0, 0x601, 0x0) r5 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, r5, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r3, 0x29, 0x53, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x3, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(0x0, 0x40000, 0x195) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(0x0, 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000140)={0x0, 0x101, 0xfffffff6}) sysarch$I386_GET_IOPERM(0x3, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 938.034882ms ago: executing program 4 (id=514): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) inotify_add_watch_at(0xffffffffffffffff, r3, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r4, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) r6 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000180)={0x15, 0x23, 0x0, 0x0, 0x0, 0x0, 0x5, 0x93, [0x9, 0x8, 0x3, 0x5]}) ioctl$BIOCSETF(r6, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 97.249218ms ago: executing program 4 (id=515): open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x0) truncate(&(0x7f0000000000)='./file0/file0\x00', 0x51) truncate(&(0x7f0000000080)='./file0\x00', 0x1) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) 551.795µs ago: executing program 4 (id=516): sysarch$I386_SET_LDT(0x1, &(0x7f0000000240)={0x3}) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x5, 0x0, 0x7}) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000001140)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) (async) fcntl$lock(r0, 0x16, &(0x7f0000000000)={0x570, 0x0, 0x80000000000000}) (async) r1 = openat$md(0xffffff9c, &(0x7f0000000040), 0x80000, 0x0) ioctl$MDIOCATTACH(r1, 0xc1b46d00, 0x0) (async) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg$inet6_sctp(r2, &(0x7f0000000480)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1, 0x6, @local={0xfe, 0x80, '\x00', 0x0}, 0x202a2fb6}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000100)='3', 0x1}], 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="1c000000840000000a000000fe0700000000000000000000000000aa1000"], 0x2c, 0x84}, 0x10101) (async) getsockopt(r2, 0x7662, 0x134, &(0x7f0000000140)=""/229, &(0x7f0000000080)=0xe5) 269.395µs ago: executing program 4 (id=517): syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="9f4c4662c957", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x68, 0x0, 0x1, 0x2, 0x0, @rand_addr=0x7, @multicast2}, @icmp=@generic={0x11, 0x8, 0x0, "e0000001"}}}}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) kevent(0xffffffffffffffff, &(0x7f0000000840)=[{0xb5, 0xfffffffffffffff9, 0x4001, 0x10, 0x0, 0x0, [0x0, 0x4, 0xe]}], 0x1, 0x0, 0x0, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="04010000ffff000001"], 0x104}, 0x0) syz_extract_tcp_res(&(0x7f0000000040), 0x100, 0x0) r2 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r3 = dup2(r2, r2) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) getsockname$unix(r0, &(0x7f00000000c0)=@abs={0x8}, &(0x7f0000000100)=0x8) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x9, [0x0, 0x0, 0x9]}) ioctl$DIOCCHANGERULE(r3, 0x8048756d, &(0x7f0000000080)="eac9f72fbe755d312bd14e1a6e1c8adaf8e3e9cf8daefbc33e8511de0f6c7513beb3df2affae") 0s ago: executing program 4 (id=518): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x12) fpathconf(r1, 0xa) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) r2 = kqueue() kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, 0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x21000630) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) r5 = open$dir(0x0, 0x200, 0x40) shutdown(0xffffffffffffffff, 0x1) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4, &(0x7f0000000040)=0x8, 0x4) sendto$inet6(r6, 0x0, 0x0, 0x20086, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x9, @empty, 0x7}, 0x1c) r7 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r8 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r5, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r8, &(0x7f0000000240)='./file0\x00') r9 = socket(0x11, 0x3, 0x0) sendto$unix(r9, &(0x7f0000000000)="b1000504000004000000000001000000331c13fecea10500fef96ec0c72fd3357ae30200004e3003000000acf20b7804be38164991f7c8cf5f882b297be1aa0500000051e2f0ad3ebbc257699a1f139b672f4d335c223e7d0c032bfa896443a42102000000720fd18bfbb670c1f5a872c881ea6e2ec5890400000000008000361b4cc702", 0x84, 0x0, 0x0, 0x0) fspacectl(r9, 0x0, &(0x7f00000001c0)={0x1, 0x80}, 0x0, &(0x7f0000000200)) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.128' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 ZFS filesystem version: 5 ZFS storage pool version: features support (5000) if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 Expensive callout(9) function: 0xffffffff819c5c50(0) 0.002648198 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c4c00 Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 Stopping cron. Waiting for PIDS: 685. Stopping sshd. Waiting for PIDS: 681. Stopping devd. Waiting for PIDS: 423panic: failed to reclaim memory cpuid = 0 time = 439 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0xc6/frame 0xfffffe0056ea5470 kdb_backtrace() at kdb_backtrace+0xd0/frame 0xfffffe0056ea55d0 vpanic() at vpanic+0x257/frame 0xfffffe0056ea5790 panic() at panic+0xb5/frame 0xfffffe0056ea5860 vm_pageout_oom() at vm_pageout_oom+0xce4/frame 0xfffffe0056ea58f0 vm_pageout_worker() at vm_pageout_worker+0xf9b/frame 0xfffffe0056ea5ea0 vm_pageout() at vm_pageout+0x2ce/frame 0xfffffe0056ea5ef0 fork_exit() at fork_exit+0xcc/frame 0xfffffe0056ea5f30 fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe0056ea5f30 --- trap 0, rip = 0, rsp = 0, rbp = 0 --- KDB: enter: panic [ thread pid 8 tid 100077 ] Stopped at kdb_enter+0x6e: movq $0,0x2587a77(%rip) db> db> set $lines = 0 db> set $maxwidth = 0 db> serialport: VM disconnected.