last executing test programs: 24.630899164s ago: executing program 0 (id=430): aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) open$dir(0x0, 0x2000000, 0xa0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) ksem_open(0x0, &(0x7f00000002c0)='/dev/bpf\x00\xc7\xb2o\x98\x8e\x99\xd9\x95\xc1\xf2?D\xb0\x19\xfd\xad\xe3N\xab\x0f\xd6\xcd\xeb\x03lU\xf9\v\xdd}\xd7$2\xfc$UE#\xc2\xc2\xc9\xbe\x8f\'z\xc7\x9a\x0f\xdc]S9\xb7\xabc>\xc7\xb5\xd3\xf0^\xf8KE\xf9\xf0\xc5\x92\xee^\xf0\x03\x8b\xe1\xab<\xa1pj\xaf\xf5^\xf0\xd0}9\x93\xdc\xee\xcf *.\xce\x85\x19\x9fI\xfb$\x10\xda\x0f', 0x200, 0x20, 0x7) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, 0x0) rfork(0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x51, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x89, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0x3]}], 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x100048, 0x48) fork() r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) r2 = __specialfd$eventfd(0x1, &(0x7f0000000140)={0x7, 0x4}, 0x8) kqueue() pipe2(&(0x7f0000000080), 0x100004) readv(r2, &(0x7f0000001f80)=[{&(0x7f0000000c40)=""/4096, 0x1000}], 0x1) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) preadv(r0, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) r3 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) open$dir(&(0x7f00000001c0)='./file0\x00', 0x40000, 0x11) r4 = fcntl$dupfd(r3, 0x11, r3) ioctl$SMB_READB(r4, 0xc01c6907, &(0x7f0000000180)={0x1, 0x1d, 0x1, @buf="f3fb", @buf="83d6", 0x3, &(0x7f0000000080), 0x1, &(0x7f0000000100)=0x1, 0x1}) ioctl$SMB_READB(r3, 0xc020697a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) socket(0x1c, 0x1, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r5, 0x0, 0xc, &(0x7f0000000040)={@rand_addr=0x3, @loopback}, 0xc) 23.743640885s ago: executing program 0 (id=435): aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x5) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r1 = socket(0x1c, 0x1, 0x0) chdir(0x0) getsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f00000002c0), &(0x7f0000000340)=0x4) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) copy_file_range(r2, &(0x7f0000000000)=0x80000001, r2, 0x0, 0x100000, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) aio_waitcomplete(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) socket(0x1c, 0x1, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f0000000180)="b100050390000000050008000700ca900f0e08fece6ef0ffffffffffff3fd335095b6fb0090085b292f20ecfe36da004be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0200a371a3f80000008000800000010000000000e3000000", 0xb1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f00000002c0)={0x1f, 0x23, 0x4, &(0x7f0000000340)="142eb002", 0x13b, &(0x7f0000000580)="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", 0x8, 0x4d46b76f, [0x4, 0x0, 0x3ff, 0x7]}) socket(0x1c, 0x1, 0x0) sigprocmask(0x2, &(0x7f0000000040)={[0x14, 0x81, 0x0, 0x40000]}, 0x0) socket(0x1c, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0xd, 0x0, &(0x7f0000000140)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x9, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0xffffffffdfffffff, 0x5) 22.913959904s ago: executing program 0 (id=441): syz_emit_ethernet(0x2a, &(0x7f00000001c0)=ANY=[@ANYBLOB="9f39466257a28e5d36208c6d74f22cf37cd1bc5afab1bb92dac4cab6c957ffffffffffff08004500e9c907ae8c7c593218d79371001c006800000102907800000007ac1475c5e49f407bf6471216"]) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) readv(r0, &(0x7f0000002640)=[{&(0x7f00000011c0)=""/4096, 0x1000}], 0x1) recvfrom(r0, 0x0, 0x0, 0x83, 0x0, 0x0) socket(0x26, 0x2, 0x0) cpuset_setaffinity(0x2, 0x2, 0x0, 0x0, 0x0) aio_write(&(0x7f0000000140)={0xffffffffffffffff, 0x80000001, &(0x7f00000004c0), 0x0, [0x3, 0x10000000], 0x200000000000000, 0x8, 0x2, {0x4, 0x7, 0x0}, {0x1, 0x20000005, @sigval_int=0x18a0, @ke_flags=0x86}}) r1 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0xd2) clock_getres(0xf, &(0x7f0000004800)) rfork(0x95040) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r1, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x80, 0x8) r2 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) ktimer_create(0x0, 0x0, &(0x7f0000000100)=0x0) ktimer_settime(r3, 0x1, &(0x7f0000000240)={{0x0, 0x101}, {0x0, 0x20000002}}, 0x0) r4 = socket(0x1c, 0x3, 0x0) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000280)={0x15, 0x0, 0x34, &(0x7f00000000c0)="ec7b0000000000e72f520117bed83ab7588dbbba35ab5584208ffe19374d000000009e65b3eefcc23a8c51870353000000000000", 0x0, 0x0, 0x0, 0xfff, [0x0, 0x0, 0x0, 0xcfae]}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r6 = socket(0x2, 0x1, 0x1) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) readlinkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) sendto$unix(r1, &(0x7f0000000340)="b1000504000004000000000001000094841c13fecea10500fef96ec0c72fd3357ae30200004e3003000000acf20b7804be38164991f7c8cf5f884e297be1aa0500000051e2f0ad3ebbc257699a1f139b672f4d335c223e7d0c032bfa896443a421020000004c83c4d5372d1783cc5d20811a720fd18bfbb670c1f5a872c881ea6e2ec5890400000000008000361b4cc702fac500002021fbfa0c0f00008abfba221554f4e0e5681eea0400000000003ca47db0aeb3", 0xb5, 0x108, 0x0, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r7, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x0, 0x0, 0x46) sendto$inet(r7, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) openat(r2, &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200201, 0x0) 22.221302398s ago: executing program 0 (id=445): open$dir(&(0x7f0000000800)='./file0\x00', 0x40000400000002c2, 0x1c0) getfh(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)) openat$bpf(0xffffff9c, &(0x7f0000000280), 0x400000, 0x0) r0 = socket$inet6(0x1c, 0x3, 0x1c) sysarch$I386_SET_PKRU(0xc, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaa4c77b99cbb86dd60c6ea090000000000000100000000e01f00000000000000ff0200000000000000000000000000010001c204"]) r1 = socket(0x1, 0x5, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) setsockopt$sock_accept_filter(r0, 0xffff, 0x1000, &(0x7f0000000300)={'accf_dns\x00', "a875d6e48d76567837d52588f329c4523449f6ee0ecb9f9ab924a769000049f4f22dc80f63ba8ff3328bf98859e92b5d35c51c9e19d24a0f45a3d748090a1ee0e329f5490544ca023dd3a1d4ef21ab118e97fea24014881830e74b1599b36d0e4bc203d3a9a77ba9a8329956af78738539a307ebaab4a897740030cc2e739931b220866cd87de10e4e156e06716956693845cb5869deffbb77eda9f8347053579e17647a22630b3136e7b03491973dccd6121c3dc0dbbc5e06af66688c4e01615a02da83fc22a3fbea7cc4e91b9b3164c35c75227f36b38a6af8043f6819437021b41330cf9269bcb9b13ea30962b881"}, 0x100) mkdirat(r2, &(0x7f0000000180)='./file1\x00', 0x0) chdir(&(0x7f00000002c0)='./file0\x00') renameat(r2, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000140)='./file0\x00') mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x0, &(0x7f0000000100)) aio_read(&(0x7f0000000580)={r1, 0xcc00000000000000, &(0x7f0000000400)="03ffbc6a7fe191dd58098c31231fbe4755b02d6557d7caf5ec92b65dc79bfcd01a2bb69869d3d44dbd520743932072a229881ae7a27f58984055301b86aa40276f9137225e19f2116034775aa4905f2c5ae38befd6c793e9cf44e59531d72446932a9260c9d25ca01bf2907a6c86920ff317973bab8999815dea", 0x7a, [0xd83, 0x40], 0x81, 0x1, 0x9, {0x6, 0x539, &(0x7f0000000480)="22880fc591eeac30a19c23e1fddf526e6efbdd97855f5ebaf39393dea603bf2deac511a36b900955588c042b3572a9bb697b60bcded86ce6ca0fac474aaa59bc504670b88b3b713b33a443224e43abeb30da90e304fda6cbbb6899332c5f96b06526ebdc65072741a4025739f7f04faa6c5d11eae7954d092c466e3bcb66f0b290313795b11b4be1c1df5f53f25cf20f96ca3dedd7d1e808e387377002df790a216b651d685996f76860290a279ee467eb1c95dcec31881dd583d21a60155fbbbcae22782e8c1fe5efe52de4b70732"}, {0x3, 0x7, @sigval_ptr=0x3, @spare=[0x7, 0xf, 0x0, 0x101, 0x9, 0x7, 0x5, 0x1]}}) msgsnd(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="01000000c403867382b0e439038d97746eab66dd15f0547c17fe9f35864095dba0e0e3f76b628831473ef7e8fc2d98fa67b880c8612dd9e0907017e464ebae309eb3cf144d93285abdb5486f6c52845b8ce2bd575ed1c13fafb661cda52b39a3558bbdaeb5a4"], 0x66, 0x0) r3 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000180)=ANY=[@ANYBLOB="2e2ce38fffdda519018deb9b496bca4caf1ba4bc16687857af283897fdbb1e2a9b4c602930aa908466c2536a6f6bf31ac90f717eb4f3b88d04d2bd862d23635d9e357ab1b6877a04aeff68c709a2a3af83ffce2fefe93615da7af62aac31f6a2133432b0f1a83cc1e6"]) r4 = socket$inet(0x2, 0x20000000, 0x0) setsockopt$inet_opts(r4, 0x0, 0x200000000000c, &(0x7f0000000240)="ea00000100000000", 0xfffffffffffffe2f) setsockopt$inet_opts(r4, 0x0, 0xd, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) fhlinkat(&(0x7f0000000140)={{[0x8, 0x1faa]}, {0x7fff, 0x10ce, "96f1f6721f0a5d7d58c355cb745cfdbe"}}, 0xffffffffffffffff, 0x0) 21.973777566s ago: executing program 0 (id=447): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f00000000c0)={0x10, 0x8, 0x1, &(0x7f0000000340)="14", 0x1, &(0x7f0000000040)="fb", 0x3f000000, 0x7fffffff, [0x0, 0x1, 0x3ff, 0x2]}) 21.972305899s ago: executing program 0 (id=449): aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) socket(0x1c, 0x1, 0x0) shutdown(0xffffffffffffffff, 0x2) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) connectat$unix(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x110) lpathconf(&(0x7f0000001080)='./file0\x00', 0x11) r1 = socket(0x1, 0x5, 0xfc) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) minherit(&(0x7f00004ac000/0x3000)=nil, 0x3000, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) rmdir(0x0) cpuset(0x0) rfork(0x1000) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000001c0)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="04010000ffff000001"], 0x104}, 0x0) recvmsg(r2, &(0x7f00000000c0)={0x0, 0x4b, 0x0, 0x0, &(0x7f0000000580)=""/19, 0x19}, 0x80) freebsd10_pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r5, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[], 0x104}, 0x0) recvmsg(r4, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)=""/64, 0x40, 0x4000}, 0x81) r6 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r6, 0x0, 0x0, 0x0, &(0x7f0000000880)={0x1c, 0x1c, 0x1, 0x0, @loopback}, 0x1c) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000240), &(0x7f0000000200)=0x4) 12.800872528s ago: executing program 2 (id=469): aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x8, 0x5) socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) connectat$unix(0xffffffffffffffff, r1, &(0x7f0000000000)=@file={0xa, 0x1, './file0\x00'}, 0xa) r2 = socket(0x10, 0x1, 0x0) socket(0x3, 0x5, 0xfe) setsockopt$inet6_int(r2, 0x29, 0x2f, &(0x7f0000000040), 0x13f0f215bd19c76f) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x1c, 0x1c, 0x2, 0x0, @mcast2}, 0x1c) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN(0xffffffffffffffff, 0x6, 0x401, &(0x7f0000000000)={0x6, "fda1076645ee4a1ec4dd162f1327d0e8"}, 0x14) setrlimit(0x5, &(0x7f0000000000)={0xb, 0x4}) mlockall(0x1) mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x0) sync() sync() sync() sync() openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0x90) r3 = open(&(0x7f0000000480)='./file0\x00', 0x10000, 0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r3, 0x10000001) r4 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x400, &(0x7f0000000000)=0x7, 0x4) socket$inet_tcp(0x2, 0x1, 0x0) sync() sync() sync() r5 = socket(0x17, 0x10000000, 0x72) setsockopt$sock_int(r5, 0xffff, 0x1002, &(0x7f0000000300)=0x6, 0x4) 11.400082731s ago: executing program 1 (id=470): r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket(0x10, 0x10000000, 0x6c) select(0x40, &(0x7f0000000180)={0x9, 0x800, 0xffffffffffffacc9, 0x100, 0x4, 0x6, 0x8000, 0xfffffffffffffc01}, &(0x7f0000000240)={0x1, 0x9b, 0x8, 0x401, 0x3, 0x78d, 0x5, 0x4}, &(0x7f0000000640)={0x2, 0x7fffffffffffffff, 0x1, 0x6, 0x1, 0x5, 0xfffffffffffff000, 0xce93}, &(0x7f0000000680)={0x3, 0x3}) recvmsg(r0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) aio_write(&(0x7f00000001c0)={r0, 0xd, &(0x7f0000000140), 0x0, [0x299, 0x5], 0x3, 0x5, 0x0, {0x7, 0xfb, 0x0}, {0x4, 0x1e, @sigval_ptr=0x9}}) socket(0x2, 0x3, 0x10) symlink(&(0x7f0000000380)='./file0\x00', 0x0) r1 = socket(0x2, 0x1, 0x0) r2 = openat$md(0xffffff9c, &(0x7f0000000040), 0x4, 0x0) ioctl$MDIOCRESIZE(r2, 0xc1b46d04, &(0x7f0000000440)={0x8, 0x4000009, 0x3, 0x0, 0x7fffffffffffffff, 0xffffffe8, 0x6e7, 0xde78, 0xffffffff, 0x80, 0x0, [0x2, 0x4, 0x5, 0xb, 0x4, 0xe, 0x4, 0x2, 0x0, 0x3, 0x4, 0x3, 0x5, 0x3, 0x5, 0x2, 0x8, 0x200, 0x2, 0x5, 0x4, 0x1ff, 0x0, 0x6, 0xffff, 0x5, 0x3, 0x5, 0x8, 0x3ff, 0x4c5c, 0x2, 0xfffffff8, 0x7, 0xc, 0x0, 0xb, 0x5, 0x3, 0x0, 0x80000003, 0x1, 0x0, 0x1, 0x5, 0x10000, 0x96, 0x40, 0x7, 0x40, 0xffffffff, 0x7fff, 0x2, 0x1, 0x6, 0x4, 0x10000, 0x9, 0x2, 0x7b9c, 0xfffeffff, 0x0, 0xe053, 0x9, 0x3, 0x8, 0x23cab421, 0xb501, 0xfffffffd, 0xd, 0x7, 0x5, 0x4, 0x8, 0x5, 0x1920, 0x1348, 0x8, 0x5, 0x3, 0x9, 0x2003ff, 0x7, 0x5, 0x1, 0x6, 0xffff, 0x2, 0x3, 0x0, 0x40, 0xfffffffa, 0x2, 0x8, 0x7, 0x6]}) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x0, 0x6, @loopback, 0x290}, 0x1c, &(0x7f0000000300)=[{&(0x7f0000000900)="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", 0x770}, {0x0}], 0x2, 0x0, 0x0, 0x149}, 0x4) aio_error(&(0x7f0000000440)={r1, 0x5, &(0x7f0000000540)="7bcbe77b1bec3638d61f4f45b91c4a939426a8e8c8d093404819af63d99ef33ac85c1308e6a9eb06266c8ceaefcdb5349d05df138cf41d42f213bd827f956a0e7c53e3ce19fbf1056239a2b18527f2a0af85f68870e2a7f9afc68d5a6abc0dbd6c4a94c258e441c0d3bdd49cc841e6c5f5e4ba1d2e8464678725a8f0866ff7f8852f27c1bb8b80426c4b92f8cefa23d5c975182e4189c5d97355db45e5ffb125dad8de257e7007790a20464257634b9e95cc4c4d2e058604a3552b301950776fc8eb57d27b06cdd392174d7d22d8c582", 0xd0, [0x40, 0x9], 0x6, 0x8, 0x9, {0x20000004, 0x2, &(0x7f0000000280)="8f6f"}, {0x4, 0xb, @sival_int=0x4}}) bind(r1, &(0x7f00000002c0)=@in6={0x1c, 0x1c, 0x3, 0x5, @empty, 0xc}, 0x1c) syz_emit_ethernet(0xff, &(0x7f0000000500)=ANY=[]) r3 = socket$inet6(0x1c, 0x2, 0x0) r4 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x2e, &(0x7f0000000240)={@loopback}, 0x14) setsockopt$inet6_buf(r4, 0x29, 0x19, 0x0, 0x0) sendmsg$inet6_sctp(r3, &(0x7f00000003c0)={&(0x7f00000000c0)=@in6={0xfde3, 0x1c, 0x0, 0x3, @mcast1, 0xfffffff7}, 0x1c, 0x0}, 0x100) syz_emit_ethernet(0x3e, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffff00000000001b907800000000ffffffff04009078000004d5ac8c0f8eb2bd3784d8e12ce1c88ee50045d52002"]) r5 = socket(0x1c, 0x1, 0x0) writev(r5, 0x0, 0x0) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = dup(r6) ioctl$CIOCGSESSION2(r6, 0xc030636a, &(0x7f00000000c0)={0x10, 0x8, 0x4, &(0x7f0000000340)="142eb002", 0x1, &(0x7f0000000040)="fb", 0x0, 0x4d46b770, [0x0, 0x0, 0x3ff]}) ioctl$CIOCCRYPT(r7, 0xc01c6367, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), 0x0}) syz_emit_ethernet(0x3e, &(0x7f00000006c0)=ANY=[@ANYBLOB="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"/292]) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) mount(&(0x7f0000000400)='cd9660\x00', &(0x7f0000000040)='./file0\x00', 0x80000048, &(0x7f00000001c0)) socket(0x26, 0x2, 0x0) 11.399711634s ago: executing program 2 (id=471): r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x400, 0x24) extattr_delete_fd(r0, 0x0, &(0x7f0000000040)='\x00') socket(0x1c, 0x3, 0xfe) ppoll(0x0, 0x0, 0x0, &(0x7f0000000100)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r1 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r1, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r2 = socket(0x1c, 0x1, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) open$dir(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x10) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(&(0x7f0000000140)='ext2fs\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, &(0x7f0000000480)="329c2fea1d6d6f342f5f2f5bfc4925b3b3f925cc184d357e3ccc568388a338cc8d997ab122fcc699086356f7b5eae8aa6c52a7acbe25192c06605445300ed06c887cd09827b503fab59d65cec6011f400d5173c6212733f9ba7f997896281e41edafd2d514fbd1558ec970a5000af6d9be26ee3217b8e7b7a0776c3e8cf2149c7540f68e1fd0ed3925c89f445659525cfc1d910d44cae7941766706ecf38ff7552882c182b22451e5f46d38962f771bc16cec2af66e8d9227acad866a8a3d3e9459e1796b5125209c83b05d7f5343b613e6a7ecd5e894d417d6857f89a439e16645b3ab0") r3 = open$dir(&(0x7f0000000080)='.\x00', 0x10000, 0x0) r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f00000001c0)='./file1\x00', 0x4) renameat(r3, &(0x7f0000000040)='./file1\x00', r4, &(0x7f0000000180)='./file0\x00') unlink(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r5 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x602, 0x0) ftruncate(r5, 0x3862) lseek(r5, 0x9, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) kqueue() r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) fpathconf(r6, 0x9) socket(0x2, 0x1, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) openat$evdev(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) 9.843599247s ago: executing program 1 (id=473): aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x5) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r1 = socket(0x1c, 0x1, 0x0) chdir(0x0) getsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f00000002c0), &(0x7f0000000340)=0x4) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) copy_file_range(r2, &(0x7f0000000000)=0x80000001, r2, 0x0, 0x100000, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) aio_waitcomplete(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1c, 0x1, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f0000000180)="b100050390000000050008000700ca900f0e08fece6ef0ffffffffffff3fd335095b6fb0090085b292f20ecfe36da004be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0200a371a3f80000008000800000010000000000e3000000", 0xb1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) sigprocmask(0x2, &(0x7f0000000040)={[0x14, 0x81, 0x0, 0x40000]}, 0x0) socket(0x1c, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0xd, 0x0, &(0x7f0000000140)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x9, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0xffffffffdfffffff, 0x5) 9.84326632s ago: executing program 2 (id=474): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) socketpair(0x11, 0x4, 0x2, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DIOCNATLOOK(r1, 0x40047477, &(0x7f0000000080)) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000300)='./file0\x00', 0x4, 0x0) r4 = open$dir(&(0x7f0000000340)='./file1/../file0\x00', 0x0, 0xe5) mkdirat(r4, &(0x7f0000000180)='./file1\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') renameat(r4, &(0x7f0000000200)='./file1\x00', r4, &(0x7f0000000140)='./file0/file0\x00') open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) r5 = open$dir(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000400)='./file0\x00', r5, &(0x7f00000003c0)='./file0\x00') ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r6 = open(&(0x7f0000000040)='./file0\x00', 0x8381, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0x0) sysarch$I386_GET_FSBASE(0x7, &(0x7f0000000100)) mount(&(0x7f0000000400)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0xc0000400, &(0x7f00000001c0)) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x100, 0x0) freebsd11_fstat(r2, &(0x7f0000000040)) r7 = socket(0x1c, 0x1, 0x0) aio_waitcomplete(0x0, 0x0) r8 = socket(0x1c, 0x1, 0x0) r9 = socket(0x11, 0x10000000000003, 0x0) sendto$unix(r9, &(0x7f0000000a00)="b10005019000e80303481bc75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a3447e25f0256664739958ee71a3f800000000000000", 0xb1, 0x20080, 0x0, 0x0) ioctl$KDGETMODE(r8, 0x40046676, 0x22e00000) extattr_list_fd(r6, 0x1, &(0x7f00000000c0)=""/104, 0x68) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) 9.843005363s ago: executing program 3 (id=475): r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000480)={'freebsd\x00'}, 0x24) fhstat(&(0x7f0000000040)={{[0x5c8951ac, 0x3bea9983]}, {0x0, 0x0, "020000001a1d2402830b4fbd84a8483d"}}, 0x0) aio_write(0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) r2 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000003c0)="2559c21d803b92cf81e5ea89c0548a82554477beb8ebf946731c89850cae72710b572ddf917613038ae97efcf0621f2677701d78ea60338ce1146f653f27c73978ab53c24747ad0b5f4936da4cda08bad1115b64f68c", 0x56}], 0x1, 0x10000) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r3 = socket(0x1c, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000440)={0x9ab77e91342a4ec7, 0x1c, 0x3, 0xe6, @mcast2}, 0x1c) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0x5}, 0x1c) r4 = open$dir(&(0x7f0000000580)='./file0\x00', 0x10000, 0x5a) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) preadv(r5, &(0x7f0000000380)=[{&(0x7f0000000180)=""/184, 0xb8}], 0x1, 0x0) socket(0x1c, 0x1, 0x0) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x33) lchflags(&(0x7f0000000000)='./file0\x00', 0x40700) setresuid(0x0, 0xee01, 0xee00) setsockopt$sock_int(r1, 0xffff, 0x1019, &(0x7f0000000140)=0x6c6, 0x4) getresuid(0x0, &(0x7f00000000c0)=0x0, 0x0) getresuid(0x0, 0x0, &(0x7f0000000080)=0x0) rename(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') setresuid(r6, r7, 0xee01) kqueue() getsockopt$sock_int(r3, 0xffff, 0x1011, &(0x7f0000000280), &(0x7f00000002c0)=0x4) sendfile(r4, r3, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x6e, &(0x7f00000004c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd6001000080383a00a4d2c5424d6aa513f09721a04f2b8881fe8000000000000000000000000000aa01019078000000006000000000000000fe8000000000000000000000000000aad7ff9174e5369e9fbb2a0c6bbf926394f37d670a445a594cd851eb641c7d34b32d507b3f8e09e0168abfc9cb4595825e4e84177c6b00e5fdcf8f55052d64"]) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) socket(0x2, 0x1, 0x0) 8.242989918s ago: executing program 1 (id=476): symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') aio_waitcomplete(0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r0 = kqueue() r1 = socket(0x1c, 0x1, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)="b10005059000e803480308c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a371a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x0, 0x0, 0x0) syz_emit_ethernet(0xfef1, &(0x7f00000004c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd6036ea07005e3a00fe8000000000000000000000000000bbfe8000000000000000000000000000aa04019078fffeffff66e7027800050600af7c484adcebf51b740e67010c6c47deff020000000000000000000000000001549374d2aaad153a2b7f061aae56400bef5dd9f5624ef8fcd6688bb33928f8455331dfc6417e7c2193f391670bf6"]) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r2 = kqueue() fhlinkat(&(0x7f0000000100)={{[0x1000, 0x1]}, {0x80, 0x63, "5ac3c801bfd310d0cf47182a572bbf00"}}, r2, &(0x7f0000000200)='./file0\x00') kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) sendmsg$inet6_sctp(0xffffffffffffffff, 0x0, 0x0) r3 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000000340)='wb', 0x2}], 0x1, 0x0) r4 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r4, 0x0) open$dir(0x0, 0x40000400000002c2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) getpeername(r5, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, &(0x7f0000000280)=0x1c) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) ppoll(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) ioctl$SMB_WRITEB(0xffffffffffffffff, 0xc0086924, 0x0) shmget(0x3, 0x3000, 0x28, &(0x7f0000ffa000/0x3000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x15000588, &(0x7f0000000140)) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 8.242706918s ago: executing program 2 (id=477): symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') aio_waitcomplete(0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r0 = kqueue() r1 = socket(0x1c, 0x1, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)="b10005059000e803480308c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a371a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x0, 0x0, 0x0) syz_emit_ethernet(0xfef1, &(0x7f00000004c0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd6036ea07005e3a00fe8000000000000000000000000000bbfe8000000000000000000000000000aa04019078fffeffff66e7027800050600af7c484adcebf51b740e67010c6c47deff020000000000000000000000000001549374d2aaad153a2b7f061aae56400bef5dd9f5624ef8fcd6688bb33928f8455331dfc6417e7c2193f391670bf6"]) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r2 = kqueue() fhlinkat(&(0x7f0000000100)={{[0x1000, 0x1]}, {0x80, 0x63, "5ac3c801bfd310d0cf47182a572bbf00"}}, r2, &(0x7f0000000200)='./file0\x00') kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) sendmsg$inet6_sctp(0xffffffffffffffff, 0x0, 0x0) r3 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000000340)='wb', 0x2}], 0x1, 0x0) r4 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r4, 0x0) open$dir(0x0, 0x40000400000002c2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) getpeername(r5, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, &(0x7f0000000280)=0x1c) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) ppoll(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) ioctl$SMB_WRITEB(0xffffffffffffffff, 0xc0086924, 0x0) shmget(0x3, 0x3000, 0x28, &(0x7f0000ffa000/0x3000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x15000588, &(0x7f0000000140)) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) 8.242404501s ago: executing program 3 (id=478): aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) open$dir(0x0, 0x2000000, 0xa0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) ksem_open(0x0, &(0x7f0000000040)='/dev/bpf\x00', 0x0, 0x20, 0x7) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, 0x0) rfork(0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x51, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x89, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0x3]}], 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x100048, 0x48) fork() r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) r2 = __specialfd$eventfd(0x1, &(0x7f0000000140)={0x7, 0x4}, 0x8) r3 = kqueue() pipe2(&(0x7f0000000080), 0x100004) kevent(r3, &(0x7f0000000000)=[{0x80, 0xfffffffffffffffe, 0x80, 0x0, 0x0, 0xfffffffd, [0x5]}], 0x1, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001f80)=[{&(0x7f0000000c40)=""/4096, 0x1000}], 0x1) pwritev(r1, &(0x7f0000000080), 0x2000000000000116, 0x0) preadv(r0, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) flock(0xffffffffffffffff, 0x8) rfork(0x85000) r4 = socket(0x2, 0x1, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000000000/0x3000)=nil, 0x3000) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 6.35124099s ago: executing program 3 (id=479): open(0x0, 0x80400000000206, 0x4) aio_waitcomplete(0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) r0 = kqueue() r1 = open$dir(&(0x7f0000000340)='./file0\x00', 0x1, 0x1c) r2 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x65, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) r3 = socket(0x1, 0x20000000, 0x0) writev(r3, 0x0, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x80000, 0x0) read(r3, &(0x7f0000000180)=""/73, 0x49) futimesat(r1, &(0x7f0000000140)='./file1\x00', &(0x7f0000000240)={{0x100, 0x489c}, {0x3, 0x1000}}) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f00000000c0)={0x29, 0x1e, 0x161, &(0x7f00000006c0)="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", 0x0, 0x0, 0xfffffffe, 0x3, [0x0, 0xff, 0x4, 0x2]}) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r5, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(r5, 0x0, 0x48, &(0x7f0000000100)={@multicast1, @rand_addr=0x8, @rand_addr=0x2}, 0xc) mkdir(&(0x7f00000002c0)='./file/file0/file0\x00', 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) open(&(0x7f0000000200)='./file/file0/file0\x00', 0x200000, 0x0) dup2(r4, r0) setsockopt$inet_mreqsrc(r5, 0x0, 0x48, &(0x7f0000000180)={@multicast1, @multicast1, @multicast1}, 0xc) setsockopt$inet_mreqsrc(r5, 0x0, 0x46, &(0x7f0000000280)={@multicast1}, 0xc) r6 = socket(0x1c, 0x1, 0x0) r7 = socket(0x2, 0x3, 0x0) sendto$unix(r7, &(0x7f0000000500)="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", 0x194, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) setsockopt$inet_mreqsrc(r5, 0x0, 0x48, &(0x7f0000000400)={@multicast1, @rand_addr=0x9}, 0xc) setsockopt$inet_mreqsrc(r5, 0x0, 0x48, &(0x7f0000000080)={@empty, @local={0xac, 0x14, 0x0}}, 0xc) 4.027245615s ago: executing program 1 (id=480): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x0, 0x1fd], 0x0, 0x8, 0x0, {0x0, 0x5, 0x0}, {0x0, 0x0, @sival_int, @ke_flags=0x9fc040a3bd859cca}}) (async) aio_write(&(0x7f0000000240)={r0, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x0, 0x1fd], 0x0, 0x8, 0x0, {0x0, 0x5, 0x0}, {0x0, 0x0, @sival_int, @ke_flags=0x9fc040a3bd859cca}}) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) open(0x0, 0x80000000000206, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x4]}], 0x1, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) (async) mlockall(0x2) r4 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r4, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x406, @loopback}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000500)="182a187d094b09d5c2da5cb8b9e2629e18cc9e3f6a7690dabf8beb4abc1aa91a8f6646c64bdc3faf4d4aeece25e52ccfd49df6d49097189852e4fa84bd736151cdc165065d080000b71be2ced1dcaf7a729c730eea0600000000000000c94492ca6327e640d79c969f9b78f9235da433e80ac467889eadd506ccd40d703ae975e8fec78719d96b11828506baa1e92f506ed50ebe15e12e5d7da0b71b919682456af4c711ff34ffd5cc133a95774922c8e038fd622fc8f9", 0xb7}, {0x0}], 0x2, 0x0, 0x0, 0x149}, 0x0) (async) sendmsg$inet_sctp(r4, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x406, @loopback}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000500)="182a187d094b09d5c2da5cb8b9e2629e18cc9e3f6a7690dabf8beb4abc1aa91a8f6646c64bdc3faf4d4aeece25e52ccfd49df6d49097189852e4fa84bd736151cdc165065d080000b71be2ced1dcaf7a729c730eea0600000000000000c94492ca6327e640d79c969f9b78f9235da433e80ac467889eadd506ccd40d703ae975e8fec78719d96b11828506baa1e92f506ed50ebe15e12e5d7da0b71b919682456af4c711ff34ffd5cc133a95774922c8e038fd622fc8f9", 0xb7}, {0x0}], 0x2, 0x0, 0x0, 0x149}, 0x0) writev(r4, 0x0, 0x0) (async) writev(r4, 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) socket(0x1c, 0x1, 0x0) (async) r5 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r5, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x106, 0x0) bind$inet6(r5, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) (async) bind$inet6(r5, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r6 = socket$inet_udplite(0x2, 0x2, 0x88) truncate(&(0x7f0000000080)='./file0\x00', 0x7ffe) (async) truncate(&(0x7f0000000080)='./file0\x00', 0x7ffe) dup2(r5, r6) r7 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendfile(r7, r6, 0x17, 0x0, 0x0, 0x0, 0x14) freebsd11_fstatat(r4, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) setsockopt$inet6_group_source_req(r1, 0x29, 0x6, &(0x7f00000002c0)={0x4, {{0x1c, 0x1c, 0x3, 0x0, @mcast1, 0x1}}, {{0x1c, 0x1c, 0x1, 0x6, @loopback, 0x7ff}}}, 0xfc) (async) setsockopt$inet6_group_source_req(r1, 0x29, 0x6, &(0x7f00000002c0)={0x4, {{0x1c, 0x1c, 0x3, 0x0, @mcast1, 0x1}}, {{0x1c, 0x1c, 0x1, 0x6, @loopback, 0x7ff}}}, 0xfc) rfork(0x96014) acct(0x0) write(r3, &(0x7f0000000080)="ba", 0x100000) (async) write(r3, &(0x7f0000000080)="ba", 0x100000) 4.026949391s ago: executing program 3 (id=481): getgid() r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x400, 0x24) extattr_delete_fd(r0, 0x2, &(0x7f0000000100)='\x00\xf6\xf1\x01t\x9a%\xe4\xc6!\xfb\x05\x00'/23) socket(0x1c, 0x3, 0xfe) ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) kqueue() r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x0, 0xa9) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) setsockopt$inet6_int(r3, 0x29, 0x14, &(0x7f0000000200)=0xd, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r4 = __specialfd$eventfd(0x1, &(0x7f0000001480)={0x10000}, 0x8) ioctl$DIOCIGETIFACES(r4, 0x8004667d, &(0x7f0000000140)={0x10, 0x0, 0xfffffffe, 0x0, 0xffffffff}) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r3, 0x0) ftruncate(r3, 0x107d2) open(&(0x7f0000000040)='./file0\x00', 0x18289, 0x110) r5 = open$dir(&(0x7f00000003c0)='./file0\x00', 0x40000400000002c2, 0x0) freebsd11_mknodat(r4, &(0x7f0000000280)='./file0\x00', 0x1000, 0x3) chflags(&(0x7f0000000080)='./file0\x00', 0x160000) copy_file_range(r5, 0x0, r5, &(0x7f0000000180)=0xffff, 0x3ff, 0x0) fspacectl(r3, 0x1, &(0x7f0000000000)={0x0, 0x400000010001}, 0x0, 0x0) r6 = dup2(r1, r2) syz_emit_ethernet(0x76, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaae29c98592ca336a8765cd22dd4a740aaaaaaaa00000000000086dd60000000004004000000000008000100000000fffbffff00fe8000000082eeecbe0b0d9b78348a144adda228c1cc638d63d4ba73085d5f80efd8fd8ae7fba5f88b255d36d10581828e6a793b2910c699005b0da78e4b9c2f6adf87c71e21ef32c8350e8c202c13664bb131881834f84b645a326de03b0d05753f7fa982a5f4dff3a8dece1ed30ee3a892709ae45c6bc927676e9b6a86cde2aee4b2", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="00000400907800051312cfb6cd785aa2f81bf28815b769062b4b02045000050a00000009000007ff050a00000003000002000000"]) ioctl$KDGETMODE(r6, 0x40044b09, 0xfffffa20) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r7 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) fpathconf(r7, 0x9) socket(0x2, 0x1, 0x0) 2.053780063s ago: executing program 1 (id=482): setrlimit(0x7, &(0x7f0000000040)={0x1, 0x6}) setreuid(0xee00, 0x0) pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) open$dir(&(0x7f0000000100)='./file1\x00', 0x80204, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000025c0), 0x0, 0x81}, 0x0) r0 = socket(0x1c, 0x1, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000180), 0x80000, 0x0) r1 = socket$inet(0x2, 0x1, 0x17) syz_emit_ethernet(0x17a, &(0x7f0000000000)=ANY=[@ANYBLOB="f3a2a8908a78aaaaaaaaaabb86dd601ab5b6000000009fa70000000000000000000000000000ff020000000000000000000000000001001d0000000000000401ffc204"]) setsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000480)="b78541b49d444277ab7e72cae7f86100", 0x10) socket$inet6_sctp(0x1c, 0x1, 0x84) rfork(0x85000) socket(0x1c, 0x1, 0x0) fstatat(r0, &(0x7f0000000200)='./file1\x00', &(0x7f0000000380), 0x4100) r2 = socket(0x1c, 0x1, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r3, 0x0, 0x200000000000c, &(0x7f0000000240)="ea00070100000000", 0xc) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r4 = open$dir(&(0x7f0000000080)='.\x00', 0x100000, 0x0) renameat(r4, &(0x7f0000003d00)='./file1\x00', r4, &(0x7f0000000140)='./file1\x00') r5 = socket(0x1c, 0x1, 0x0) extattr_list_file(&(0x7f0000003b80)='./file1\x00', 0x3, &(0x7f0000000280)=""/194, 0xc2) r6 = fhopen(&(0x7f00000000c0)={{[0x7, 0x1]}, {0x1, 0x4, "1d7f5021ca9d478e1a5301e8dba4a911"}}, 0x200) ioctl$KDDISABIO(r6, 0x20004b3d) ioctl$KDGETMODE(r5, 0x40046676, 0x0) r7 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r7, &(0x7f0000000180)='./file1\x00', 0x0) chdir(&(0x7f0000000040)='./file1\x00') 2.048604765s ago: executing program 2 (id=483): r0 = socket(0x1c, 0x1, 0x0) (async) r1 = socket(0x1c, 0x1, 0x0) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) kqueue() (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r2, 0x1) writev(r2, &(0x7f0000000c00)=[{&(0x7f0000000b00)="960f3c1128793fe7599a5424997c39c8407dd1fff4", 0x15}, {&(0x7f0000000b40)="d279c40bb4ab7f7662b13116cb1ef6ecc37c9263dc427f0afc40604f324c29b06a53d70cd21eafcd4d890c3ee9f8b10bf4d2379d21b4772280abd6578457c97a", 0x40}], 0x2) readv(r3, &(0x7f0000002640)=[{&(0x7f00000011c0)=""/4096, 0x1000}], 0x1) (async) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x51, &(0x7f0000000500)={0x18b, {{0x10, 0x2, 0x1, @multicast2}}}, 0x84) r4 = kqueue() kevent(r4, &(0x7f0000000180)=[{0x0, 0xfffffffffffffff9, 0x9, 0x2, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0x9]}], 0x1, 0x0, 0x0, 0x0) (async) r5 = socket$inet6(0x1c, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000040)={0x1c, 0x1c, 0x1, 0x0, @empty, 0x7}, 0x1c) (async) r6 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) r7 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r7, r6, &(0x7f00000002c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xa1000534) (async) read(r7, &(0x7f00000000c0)=""/5, 0x18) (async) close(r6) (async) sendto$inet6(r5, &(0x7f00000000c0)="e1d466e1e771e0a6252a7cc00a8b1f368eff7cafafe64fa2c550fbaa1ef29767431e8e4169a686bd2bb019e519507dae4d6950f4c4f4f14836e3982c5fc759f1532ea2d166aabb5d446623d242d7712d48e9d26639", 0x55, 0x20101, 0x0, 0x0) (async) getgid() recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/100, 0x64}, 0x42) ioctl$KDGETMODE(r1, 0x40046676, 0x4) (async) syz_emit_ethernet(0x46, &(0x7f00000005c0)=ANY=[@ANYBLOB="aaaaaaaaaa0000380000000000049078e0000002a5ee00aa44077b3bc6b1b5000b00907800000000450000000000000000000000ac1400bbe000000200000000a5c352441abe4b7777c64459a827fbac147324d4ac13008174b8e78f35427d5e6c574820b7f8ee32d6bc90ffc227f39da8159d142f7f5c02f74a8cd56470a76c388641419076ab0252a7fdc61a3fdcfc778621f81debacef0be861a11bf3655a624de4117bccd9eb135336d304373a6f53b8d84370eb416137a1fbec9083815cbbf6dfe3c4a9e694a2f96d000000000000"]) (async) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) (async) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) (async) accept(r3, &(0x7f0000000000)=@in={0x10, 0x2, 0xffffffffffffffff, @local}, &(0x7f0000000080)=0x10) (async) aio_waitcomplete(0x0, 0x0) (async) open$dir(&(0x7f0000000800)='./file0\x00', 0x200, 0x0) execve(0x0, &(0x7f00000009c0)=[&(0x7f0000000140)='\x02', &(0x7f0000000940)='\x04!+]]\x00', &(0x7f0000000280), &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\b', &(0x7f0000000340)='\x00', &(0x7f00000001c0)=']G\'[\x01o?\x04>\x14\xf7\xb8w\xad4\x19\r\x14\xdc\xe9\x88m=\xbe\xd6\x88\xcb\x8a\x17\xaf\xbe\x8b1'], 0x0) 2.044880822s ago: executing program 3 (id=484): syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="9f4c4662c957", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x68, 0x0, 0x1, 0x2, 0x0, @rand_addr=0x4, @multicast2}, @icmp=@generic={0x11, 0x8, 0x0, "e0000001"}}}}}) 1.359497ms ago: executing program 1 (id=485): aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x5) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r1 = socket(0x1c, 0x1, 0x0) chdir(0x0) getsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f00000002c0), &(0x7f0000000340)=0x4) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) copy_file_range(r2, &(0x7f0000000000)=0x80000001, r2, 0x0, 0x100000, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) aio_waitcomplete(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket(0x1c, 0x1, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f0000000180)="b100050390000000050008000700ca900f0e08fece6ef0ffffffffffff3fd335095b6fb0090085b292f20ecfe36da004be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0200a371a3f80000008000800000010000000000e3000000", 0xb1, 0x0, 0x0, 0x0) dup(0xffffffffffffffff) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) sigprocmask(0x2, &(0x7f0000000040)={[0x14, 0x81, 0x0, 0x40000]}, 0x0) socket(0x1c, 0x3, 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0xd, 0x0, &(0x7f0000000140)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x9, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0xffffffffdfffffff, 0x5) 278.513µs ago: executing program 2 (id=486): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x5, [0xfffffffffffffff9, 0x4000000, 0x8, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) freebsd10_pipe(0x0) kqueue() r1 = socket(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) sendto(r1, &(0x7f0000000100), 0x0, 0x101, 0x0, 0x0) seteuid(0xffffffffffffffff) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r2, &(0x7f0000ffa000/0x4000)=nil, 0x0) syz_emit_ethernet(0x6e, &(0x7f00000006c0)={@local, @random="7004f5b37507", [], {@ipv6={0x86dd, {0x0, 0x6, "d90020", 0x38, 0x3a, 0x0, @rand_addr="3bcc694212fae9849cd9404e6d2ee900", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x3800, {0x0, 0x6, "06c33e", 0x0, 0x2c, 0x0, @loopback={0x9000000}, @ipv4={'\x00', '\xff\xff', @loopback}, [], "94ef0f13c9356461"}}}}}}}) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) rfork(0x3060) r3 = socket(0x1c, 0x1, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000001180)={0x10, 0x2, 0x2, @loopback=0x7f000016}, 0x10) connect$inet(r4, &(0x7f0000000040)={0x10, 0x2, 0x3, @multicast2}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x60084, 0x0, 0x0) select(0x40, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x300, 0x80000000}, 0x0, 0x0, &(0x7f00000005c0)) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 0s ago: executing program 3 (id=487): aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) open$dir(0x0, 0x2000000, 0xa0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) ksem_open(0x0, &(0x7f0000000040)='/dev/bpf\x00', 0x0, 0x20, 0x7) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x51, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x89, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0x3]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000280)={@local, @empty, [], {@ipv4={0x800, {{0xd, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x1, 0x0, @multicast2, @broadcast, {[@timestamp={0x44, 0xc, 0xf9, 0x3, 0xf, [{[@multicast2], 0x3}]}, @generic={0x44, 0x11, "16af27a18845cf78df8b33f56469d9"}]}}, @icmp=@timestamp}}}}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x100048, 0x48) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) r2 = __specialfd$eventfd(0x1, &(0x7f0000000140)={0x7, 0x4}, 0x8) r3 = kqueue() pipe2(&(0x7f0000000080), 0x100004) kevent(r3, &(0x7f0000000000)=[{0x3, 0xfffffffffffffffe, 0x407b, 0x0, 0x0, 0xfffffffd, [0x5]}], 0x1, 0x0, 0x0, 0x0) readv(r2, &(0x7f0000001f80)=[{&(0x7f0000000c40)=""/4096, 0x1000}], 0x1) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) preadv(r0, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) aio_waitcomplete(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r4, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r5 = kqueue() kevent(r5, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) bind$inet6(r6, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.251' (ED25519) to the list of known hosts. Expensive callout(9) function: 0xffffffff81a5e130(0xfffffe006dfac000) 0.004279884 s Sep 16 04:08:56 ci-freebsd-i386-2 kernel: attempted source route from 255.255.255.255 to 172.20.0.170 ip6_pcbopts: all specified options are cleared. vnode_pager_putpages: zero-length write at 0 resid 8192 0xfffffe005843ddc0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371bda0 usecount 3, writecount 3, refcount 4 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0054143e88 ref 1 pages 9 cleanbuf 2 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0054113000 (pid 950, syz-executor, tid 100410) nlink=1, effnlink=1, size=67537, extsize 0 generation=bc789f6a, uid=0, gid=0, flags=0x160000 ino 110, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 Out of ktrace request objects. Expensive callout(9) function: 0xffffffff81a5e130(0xfffffe00777b6000) 0.008982399 s ZFS filesystem version: 5 ZFS storage pool version: features support (5000) lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe0058125b08 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1688 2nd 0xffffffff83cccac0 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1387 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff81681831 at witness_checkorder+0x781 #1 0xffffffff81506877 at __mtx_lock_flags+0x187 #2 0xffffffff8186ca16 at tuninit+0x76 #3 0xffffffff8185ad64 at ether_ioctl+0x1b4 #4 0xffffffff8186b7b2 at tunifioctl+0x3c2 #5 0xffffffff819a74b4 at in_control_ioctl+0x1744 #6 0xffffffff8184a9e1 at ifioctl+0xe51 #7 0xffffffff816905da at kern_ioctl+0x4ca #8 0xffffffff8169001e at sys_ioctl+0x36e #9 0xffffffff82166702 at amd64_syscall+0x4e2 #10 0xffffffff8210b11b at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff81682702 at witness_checkorder+0x1652 #1 0xffffffff815704a9 at _sx_xlock+0x139 #2 0xffffffff8186b47a at tunifioctl+0x8a #3 0xffffffff8184762b at ifhwioctl+0x1dab #4 0xffffffff81868ee2 at tunioctl+0xd92 #5 0xffffffff811dd876 at devfs_ioctl+0x266 #6 0xffffffff82328ce7 at VOP_IOCTL_APV+0x87 #7 0xffffffff817ede47 at vn_ioctl+0x3c7 #8 0xffffffff811de739 at devfs_ioctl_f+0x69 #9 0xffffffff816905da at kern_ioctl+0x4ca #10 0xffffffff8169001e at sys_ioctl+0x36e #11 0xffffffff80442dd7 at freebsd32_ioctl+0x607 #12 0xffffffff822f0c12 at ia32_syscall+0x4d2 #13 0xffffffff8210b97f at int0x80_syscall_common+0x9c Sep 16 04:09:39 ci-freebsd-i386-2 kernel: arp: 00:00:00:00:21:00 attempts to modify permanent entry for 172.20.3.187 on tap3 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe00789afc08: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371bda0 usecount 3, writecount 3, refcount 6 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00541c31f0 ref 1 pages 32 cleanbuf 1 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe00541b4780 (pid 1276, syz-executor, tid 101078) nlink=1, effnlink=1, size=2147483650, extsize 0 generation=864ebbd, uid=0, gid=0, flags=0x4 ino 158, on dev gpt/rootfs lock order reversal: 1st 0xfffffe006e45a750 ufs (ufs, lockmgr) @ /syzkaller/managers/i386/kernel/sys/kern/vfs_subr.c:3386 2nd 0xffffffff830019c0 proctree (proctree, sx) @ /syzkaller/managers/i386/kernel/sys/kern/subr_prf.c:185 lock order proctree -> ufs established at: #0 0xffffffff81681831 at witness_checkorder+0x781 #1 0xffffffff814e8946 at lockmgr_lock_flags+0x1d6 #2 0xffffffff81dc464b at ffs_lock+0x18b #3 0xffffffff8232b5e7 at VOP_LOCK1_APV+0x57 #4 0xffffffff817f2d1e at _vn_lock+0x14e #5 0xffffffff817f35c8 at vn_close1+0x1e8 #6 0xffffffff814da23a at ktrops+0x41a #7 0xffffffff814d99ad at sys_ktrace+0xaed #8 0xffffffff822f0c12 at ia32_syscall+0x4d2 #9 0xffffffff8210b97f at int0x80_syscall_common+0x9c lock order ufs -> proctree attempted at: #0 0xffffffff81682702 at witness_checkordif_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 er+0x1652 #1 0xffffffff81572d7f at _sx_slock_int+0x13f #2 0xffffffff8163f02d at uprintf+0x14d #3 0xffffffff81df09af at ufs_rmdir+0xdf #4 0xffffffff8232a28d at VOP_RMDIR_APV+0xcd #5 0xffffffff817e781a at kern_frmdirat+0x87a #6 0xffffffff822f0c12 at ia32_syscall+0x4d2 #7 0xffffffff8210b97f at int0x80_syscall_common+0x9c if_delmulti_locked: detaching ifnet instance 0xfffffe0058574800 ip6_pcbopts: all specified options are cleared. ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe00777496e0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371bda0 usecount 6, writecount 4, refcount 4 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0054103c98 ref 1 pages 9 cleanbuf 2 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe00541d8000 (pid 1470, syz-executor, tid 101468) nlink=1, effnlink=1, size=67538, extsize 0 generation=74509abb, uid=0, gid=0, flags=0x160000 ino 189, on dev gpt/rootfs SYZFAIL: invalid kcov comp type type=ffffffff81572209 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=0 req=449 state=1 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-2.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password:if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl