last executing test programs: 24.567950242s ago: executing program 2 (id=213): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x80008) cap_fcntls_get(0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f0000000480)) sync() thr_suspend(0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000180), 0x100000, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x72) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x188, &(0x7f0000002dc0)={0x10, 0x2, 0x1, @broadcast}, 0x10) rfork(0x4) truncate(&(0x7f00000003c0)='./file0\x00', 0x81) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000240)='\xb8o\xc9\xb7\xd1!7\xc0\x85\x97gB\x9f\x1b\xa70%;\xbc G\x9b$\xcd\xd9P/\xd9\xd2\xbc\xa1W3\xd0\xbc\xd3\xce\xbb'], 0x0) r1 = socket(0x1c, 0x1, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0xc2ff8094, &(0x7f0000000700)="c61124e7641c53169d4389ffe377e7eb98ba25d252f7a313e4681e7054de4738b2fcb4bbd2a7c50e162a9351d65ca47ea9959741250e1c159102c24fee7a5a06b8e0273daa92cc964380847aab5910faf82f4b50fbb292da6f49ce27f5864e53d95245928b6db47a4cde7dd97f9c143bd9bb8f2a727400000000000000005e7934e98d5ee26898cf1d83c60b0826779faa289e90dbad39a97869d9bc4c09e20afe616f34efdea6673011f36136a3a92ce0f4e0ae4792cb5c88cc82b45cb5581af41635a76293aec844253d889902fa32ea3c9537b64b16aa1ffa66d7678287411764") r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x2a, 0x0, 0x10, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x9]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x9, 0x3fb, &(0x7f0000002ec0), 0x0, 0x0, &(0x7f00000005c0)="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"}) open(&(0x7f0000000180)='./file0\x00', 0x400000, 0x61) extattr_list_file(&(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x2e, &(0x7f0000000b40)=ANY=[@ANYBLOB="ffff0200000072bff483f25f8100100008060001080006040009000000000000ac1400aa00000500000000000000"]) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000440)=""/49, 0x31, 0x1, &(0x7f00000001c0)=@abs={0x8, 0x0, 0x0, 0x0}, 0x8) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x6, [0x100, 0x3, 0x7]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) mount(&(0x7f0000000000)='hfsp\x00', &(0x7f0000000040)='./file0\x00', 0x13000409, &(0x7f0000000500)="8048a68afadc72b061042f751a69303eabbb18246f076dcc89edc25b69613850de94") rmdir(0x0) 23.720976884s ago: executing program 2 (id=219): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x80008) cap_fcntls_get(0xffffffffffffffff, 0x0) getrusage(0x1, &(0x7f0000000480)) sync() thr_suspend(0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000180), 0x100000, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x200, 0x72) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x188, &(0x7f0000002dc0)={0x10, 0x2, 0x1, @broadcast}, 0x10) rfork(0x4) truncate(&(0x7f00000003c0)='./file0\x00', 0x81) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000240)='\xb8o\xc9\xb7\xd1!7\xc0\x85\x97gB\x9f\x1b\xa70%;\xbc G\x9b$\xcd\xd9P/\xd9\xd2\xbc\xa1W3\xd0\xbc\xd3\xce\xbb'], 0x0) r1 = socket(0x1c, 0x1, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0xc2ff8094, &(0x7f0000000700)="c61124e7641c53169d4389ffe377e7eb98ba25d252f7a313e4681e7054de4738b2fcb4bbd2a7c50e162a9351d65ca47ea9959741250e1c159102c24fee7a5a06b8e0273daa92cc964380847aab5910faf82f4b50fbb292da6f49ce27f5864e53d95245928b6db47a4cde7dd97f9c143bd9bb8f2a727400000000000000005e7934e98d5ee26898cf1d83c60b0826779faa289e90dbad39a97869d9bc4c09e20afe616f34efdea6673011f36136a3a92ce0f4e0ae4792cb5c88cc82b45cb5581af41635a76293aec844253d889902fa32ea3c95") r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x2a, 0x0, 0x10, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x9]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x9, 0x3fb, &(0x7f0000002ec0), 0x0, 0x0, &(0x7f00000005c0)="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"}) open(&(0x7f0000000180)='./file0\x00', 0x400000, 0x61) extattr_list_file(&(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x2e, &(0x7f0000000b40)=ANY=[@ANYBLOB="ffff0200000072bff483f25f8100100008060001080006040009000000000000ac1400aa00000500000000000000"]) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000440)=""/49, 0x31, 0x1, &(0x7f00000001c0)=@abs={0x8, 0x0, 0x0, 0x0}, 0x8) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x6, [0x100, 0x3, 0x7]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) mount(&(0x7f0000000000)='hfsp\x00', &(0x7f0000000040)='./file0\x00', 0x13000409, &(0x7f0000000500)="8048a68afadc72b061042f751a69303eabbb18246f076dcc89edc25b69613850de94") rmdir(0x0) 22.693861052s ago: executing program 2 (id=223): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socketpair(0x11, 0x4, 0x2, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r0, 0x40047477, &(0x7f0000000080)) syz_emit_ethernet(0x7e, &(0x7f00000003c0)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x48, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x2b, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @loopback, [@routing={0x64, 0x2, 0x0, 0x73, 0x0, [@loopback={0x7e}]}]}}}}}}}) r1 = dup(0xffffffffffffffff) sendmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[@rights={0x10, 0xffff, 0x1, [r1]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10, [0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]}], 0x70}, 0x0) rfork(0x85000) 22.530082017s ago: executing program 2 (id=225): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) socketpair(0x11, 0x4, 0x2, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r1, 0x40047477, 0x0) r2 = socket(0x1c, 0x1, 0x0) aio_readv(&(0x7f0000000480)={r2, 0x3, 0x0, 0x0, [0x6, 0x7e5], 0xfffffffe, 0x6, 0x8, {0x8, 0xd1b, 0x0}, {0x1, 0x9, @sival_int=0x5, @thr={0x0, 0x0}}}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) aio_fsync(0x80, &(0x7f0000000400)={r3, 0x8000df, 0x0, 0x0, [0x6, 0x3], 0xc, 0x8, 0xfffffff8, {0x932, 0x2, 0x0}, {0x1, 0x22, @sigval_int=0x9, @thr={0x0, 0x0}}}) aio_fsync(0x80, &(0x7f0000000e00)={r3, 0x8000, 0x0, 0x0, [0x101, 0xfffc], 0x84, 0x6, 0x2, {0x5, 0x7fffffff, 0x0}, {0x4, 0x18, @sigval_ptr=0x7}}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r4 = open(&(0x7f0000000040)='./file0\x00', 0x8381, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0x0) mount(&(0x7f0000000400)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0x42500400, &(0x7f00000001c0)) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x100, 0x0) freebsd11_fstat(r0, &(0x7f0000000040)) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) setreuid(0xee00, 0x0) r5 = getuid() r6 = getuid() chown(&(0x7f0000000040)='./file0\x00', r6, 0xffffffffffffffff) setreuid(0xee00, r5) chmod(&(0x7f0000000080)='./file0\x00', 0x2ea) r7 = socket(0x1c, 0x1, 0x0) extattr_list_fd(r4, 0x1, &(0x7f00000000c0)=""/104, 0x68) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) 21.663833433s ago: executing program 2 (id=229): open$dir(0x0, 0x150000, 0x1cc) aio_return(&(0x7f0000000180)={0xffffffffffffffff, 0x10000, 0x0, 0x0, [0x14800], 0xed79, 0x2, 0x9, {0x0, 0x4, 0x0}, {0x0, 0x0, @sival_int=0x3}}) aio_waitcomplete(0x0, 0x0) openat$evdev(0xffffff9c, &(0x7f0000000180), 0x400, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f00000001c0)={0xb, 0x24, 0x10, &(0x7f0000000140)="ec7b00000900ff2425c3f0a58b519798", 0x0, 0x0, 0x0, 0xfdffff05}) r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x1, 0x0, 0x0) socketpair(0x2, 0x1, 0x2, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0xc, &(0x7f0000000080)={0x203, {{0x1c, 0x1c, 0x3, 0x1000, @loopback, 0x8}}, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="3f12c0d81c479be15ccb830030bc5ee7"}}}, 0xfc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb5219f1000b913f1, 0x0) chmod(&(0x7f0000000040)='.\x00', 0x35e) open(&(0x7f0000000200)='./bus\x00', 0x50244, 0xb20243712bafb344) rename(&(0x7f0000000000)='./bus\x00', &(0x7f0000000100)='./file0\x00') sendto(0xffffffffffffffff, &(0x7f0000000300)="3159e299fe344ec5a47954632ee7db5c95c41eeaff3d4e3047996a96c79f62178861829e54e3eed0e876043df55a057f456f1ffaf7ee5145199f0601020000000000000000", 0x45, 0x100, 0x0, 0x0) r5 = socket$inet(0x2, 0x1, 0xbe) setsockopt$inet_opts(r5, 0x0, 0x1, &(0x7f00000002c0), 0x0) r6 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r6, &(0x7f00000002c0)="8645504c", 0x4, 0x0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x4, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) shutdown(r5, 0x0) syz_emit_ethernet(0x0, 0x0) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0xd, 0x0, 0x0) setsockopt$inet6_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x14, &(0x7f0000000240)={0x1, [0x5]}, 0x6) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 20.793518856s ago: executing program 2 (id=240): aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) open$dir(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) r0 = socket(0x1c, 0x1, 0x0) fpathconf(r0, 0x3f) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r2 = dup2(r1, r1) r3 = open$dir(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000, 0x108) renameat(r3, &(0x7f00000000c0)='./file0\x00', r3, &(0x7f0000000180)='./file1\x00') ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 10.626053238s ago: executing program 0 (id=255): r0 = open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r1 = socket(0x1c, 0x1, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x101) r2 = socket(0x1c, 0x2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x2, &(0x7f0000000040)=0x2, 0x4) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000600)="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", 0x1}], 0x200000000000023a, 0x0}, 0x0) freebsd10_pipe(0x0) ioctl$DIOCNATLOOK(0xffffffffffffffff, 0x8008745b, &(0x7f00000003c0)="28a7c7f9812306") r4 = socket(0x1c, 0x4, 0x0) sendmsg$inet_sctp(r4, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x6, @rand_addr="b2c17ab39ea2e0835304dcb6f79a3ada", 0xfffffffc}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x10145}, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x1aa, &(0x7f0000000cc0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa008100000086dd602e5cea01703c0020010000000000000000000000000002ff0200000000000000000000000000012b0a01"]) eaccess(&(0x7f0000000040)='./file/file0/../\x00', 0x2) socketpair(0x0, 0x0, 0x0, 0x0) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000d00)) ioctl$EFIIOC_VAR_NEXT(0xffffffffffffffff, 0xc0244505, 0x0) r6 = semget$private(0x0, 0x7, 0x3c4) semop(r6, 0x0, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) freebsd11_fhstatfs(0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 9.11116073s ago: executing program 0 (id=258): r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f00000002c0)=@un=@abs={0x8, 0x0, 0x0, 0x2}, 0x8) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) (async) r1 = kqueue() kqueue() open$dir(0x0, 0x80201, 0x0) (async) kevent(r1, &(0x7f0000000040)=[{0x12dd, 0xfffffffffffffff9, 0x9, 0x8, 0x2, 0x5, [0x293, 0x0, 0x0, 0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) (async) r2 = socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r3, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x1, @loopback}, 0x10, 0x0, 0x0, 0x0, 0xfffffe31, 0x10145}, 0x180) (async) r4 = socket(0x1c, 0x1, 0x0) listen(r4, 0x5) (async) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x3, 0x0, 0xffffffffffffffe5}) (async) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r5, 0x4004667f, 0x0) __semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=0x0) r6 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r6, &(0x7f0000001140)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) r7 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) mount(&(0x7f00000000c0)='ext2fs\x00', &(0x7f0000000140)='./file0\x00', 0x20200000, &(0x7f0000000200)="1a7c2f0e64f6db147e01c83598fa20661b3b23e1c03f915b963fd4860119385e9cf0fbfdbe75a212b3265591774d2aeb51d0854bd53427b68c336140113b509bb42e0a2f4bbb65baa97fa1f42c1189b5de84d7ccb82bdd8d13b44c1efbb6587a401ed2d41dffcc6d8e9805d9b21def23dba1b89fb65d25135698f0da63086cd53c6b2d5a2f27e1531390ebf7d7cdea5582debd576a4db44bae4e8934070ad2d53f01e071173e4f562213") msgget(0x1, 0x501) clock_nanosleep(0xe, 0x1, &(0x7f0000000300)={0xd, 0x81}, &(0x7f0000000340)) (async) select(0x0, 0x0, 0x0, 0x0, 0x0) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/30, 0x1e) fcntl$setflags(r7, 0x2, 0x1) msgget$private(0x0, 0x10) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) (async) socket(0x1c, 0x1, 0x0) (async) syz_emit_ethernet(0x118, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) (async) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 9.11070221s ago: executing program 1 (id=259): r0 = open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r1 = socket(0x1c, 0x1, 0x0) mkdir(0x0, 0x0) mkdir(0x0, 0x101) r2 = socket(0x1c, 0x2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x2, &(0x7f0000000040)=0x2, 0x4) sendmsg(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000600)="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", 0x1}], 0x200000000000023a, 0x0}, 0x0) freebsd10_pipe(0x0) ioctl$DIOCNATLOOK(0xffffffffffffffff, 0x8008745b, &(0x7f00000003c0)="28a7c7f9812306") r4 = socket(0x1c, 0x4, 0x0) sendmsg$inet_sctp(r4, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x6, @rand_addr="b2c17ab39ea2e0835304dcb6f79a3ada", 0xfffffffc}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x10145}, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x1aa, &(0x7f0000000cc0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa008100000086dd602e5cea01703c0020010000000000000000000000000002ff0200000000000000000000000000012b0a01"]) eaccess(&(0x7f0000000040)='./file/file0/../\x00', 0x2) socketpair(0x0, 0x0, 0x0, 0x0) statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000d00)) ioctl$EFIIOC_VAR_NEXT(0xffffffffffffffff, 0xc0244505, 0x0) r6 = semget$private(0x0, 0x7, 0x3c4) semop(r6, 0x0, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) freebsd11_fhstatfs(0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) sendmsg$inet_sctp(r1, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 9.110470752s ago: executing program 3 (id=260): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1b8) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) getsockopt$inet_buf(r2, 0x0, 0x6e, &(0x7f00000000c0)=""/251, &(0x7f0000000040)=0xfb) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) r3 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0x68, &(0x7f00000001c0)={{0x1c, 0x1c, 0x1, 0x801, @loopback, 0x7ffffffe}, {0x1c, 0x1c, 0x2, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x0, [0x3, 0xfffffffd, 0x3, 0xa, 0x1, 0x0, 0xbe33, 0x5e]}, 0x5c) mprotect(&(0x7f00006b7000/0x1000)=nil, 0x1000, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) chdir(0x0) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r4 = open(&(0x7f0000000480)='./file1\x00', 0x8000, 0x102) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r4, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) 7.482444574s ago: executing program 1 (id=261): r0 = socket(0x1c, 0x1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004cc0), 0x0, 0x20180}, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) chflags(&(0x7f0000000300)='./file0\x00', 0x130103) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[]) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) cap_fcntls_get(r0, &(0x7f0000000200)=[0x0, 0x0, 0x0]) r2 = socket(0x1c, 0x1, 0x0) getsockopt$inet_tcp_TCP_TXTLS_MODE(r2, 0x6, 0x28, &(0x7f0000000040), &(0x7f0000000180)=0x4) r3 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) r5 = openat$kbd(0xffffff9c, &(0x7f0000000140), 0x1, 0x0) ioctl$KDGETMODE(r5, 0x40044b09, 0x1) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x40000) getsockopt$inet_mreqn(r3, 0x0, 0xc, &(0x7f00000000c0)={@multicast1, @remote}, &(0x7f0000000100)=0xc) r6 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r6, 0xffff, 0x1008, &(0x7f0000000300)=0x6, 0x4) sendto(r6, 0x0, 0x0, 0x0, &(0x7f0000000340)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) r7 = socket(0x11, 0x3, 0x0) sendto$unix(r7, &(0x7f0000000740)="b100050390000000050008000700ca900f0e08fecea11ea8fef968f3c73fd3357afdeb2c0900852e126336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0200a371a3f80000feffffffffffff010000000000000000", 0xb1, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) dup2(r2, r4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = dup(r8) sendmsg$inet_sctp(r9, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x3, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x20}, 0x2008c) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 7.477375457s ago: executing program 3 (id=262): r0 = socket(0x1c, 0x1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000004cc0), 0x0, 0x20180}, 0x0) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) chflags(&(0x7f0000000300)='./file0\x00', 0x130103) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[]) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) cap_fcntls_get(r0, &(0x7f0000000200)=[0x0, 0x0, 0x0]) r2 = socket(0x1c, 0x1, 0x0) getsockopt$inet_tcp_TCP_TXTLS_MODE(r2, 0x6, 0x28, &(0x7f0000000040), &(0x7f0000000180)=0x4) r3 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) r5 = openat$kbd(0xffffff9c, &(0x7f0000000140), 0x1, 0x0) ioctl$KDGETMODE(r5, 0x40044b09, 0x1) madvise(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x8) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x40000) getsockopt$inet_mreqn(r3, 0x0, 0xc, &(0x7f00000000c0)={@multicast1, @remote}, &(0x7f0000000100)=0xc) r6 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r6, 0xffff, 0x1008, &(0x7f0000000300)=0x6, 0x4) sendto(r6, 0x0, 0x0, 0x0, &(0x7f0000000340)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) r7 = socket(0x11, 0x3, 0x0) sendto$unix(r7, &(0x7f0000000740)="b100050390000000050008000700ca900f0e08fecea11ea8fef968f3c73fd3357afdeb2c0900852e126336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0200a371a3f80000feffffffffffff010000000000000000", 0xb1, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) dup2(r2, r4) r8 = socket$inet_udplite(0x2, 0x2, 0x88) r9 = dup(r8) sendmsg$inet_sctp(r9, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x3, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x20}, 0x2008c) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 5.595228209s ago: executing program 0 (id=263): aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) mkdirat(0xffffffffffffff9c, 0x0, 0xc0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x80, 0x50) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) freebsd11_mknodat(r2, &(0x7f00000001c0)='./file0\x00', 0x60a3, 0x0) __realpathat(r2, 0x0, &(0x7f00000000c0)=""/12, 0xc, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES32=r1], 0x28, 0x3010b}, 0x9) connectat$unix(r2, r1, &(0x7f0000000000)=@abs={0x8, 0x0, 0x0, 0x0}, 0x8) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1, 0x5, 0xfc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, &(0x7f00000001c0), 0x4) vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sigval_int, @spare}) wait4(0x0, 0x0, 0x8, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) mkdir(&(0x7f0000001040)='./file0\x00', 0x1) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) wait4(0x0, &(0x7f0000000080), 0x1d, &(0x7f0000000300)) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000240), &(0x7f00000003c0)=0x4) 5.589019421s ago: executing program 1 (id=264): aio_waitcomplete(0x0, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) open$dir(0x0, 0x40000400000002c2, 0x1c0) chown(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8089, 0x1, 0xe8c8, 0x0, [0x46, 0x6, 0x10001, 0x480]}], 0x1, 0x0, 0x0, 0x0) ioctl$BIOCSTSTAMP(0xffffffffffffffff, 0x80044284, &(0x7f0000000000)=0x8) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x20000, 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$DIOCRADDADDRS(r1, 0xc0184415, &(0x7f0000000a80)={{"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", "0920cf14d501a846a22d8eb300fbff04000000f845ad1176a15f99ffffffffff", 0x1}, 0x0, 0x5, 0x0, 0x6, 0x8000000020000004, 0xb, 0x0, 0xd446}) socket(0x1c, 0x1, 0x0) socket$inet(0x2, 0x1, 0x0) openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) mkdir(0x0, 0x51) r2 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) kevent(0xffffffffffffffff, &(0x7f0000000200)=[{0x3, 0xffffffffffffffff, 0x1, 0x20000000, 0x0, 0x0, [0x0, 0x9]}], 0x1, 0x0, 0x0, 0x0) mkdirat(r2, &(0x7f0000000000)='./file0\x00', 0x0) mkdirat(r2, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) rename(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', &(0x7f0000000180)='./file0\x00') r3 = socket(0x17, 0x10000000, 0x6) openat$bpf(0xffffff9c, 0x0, 0x200000, 0x0) r4 = accept$unix(r3, &(0x7f0000000080)=@abs={0x8}, &(0x7f00000001c0)=0x8) sendmsg$unix(r4, &(0x7f0000000580)={&(0x7f0000000240)=@file={0x50, 0x1, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00'}, 0x50, &(0x7f0000000300)=[{&(0x7f00000003c0)="75221178eafd1a6970eb6650caeeb29f67a54c99226e19f6909ab6dff3dba4cff43d4fc2bb77aba046d7de1c82ed99f08e7be1bd10f60bdc09f86f85bc30919f33f7a2f7311026c502dce06b", 0x4c}, {&(0x7f00000004c0)="b7f5ceed65cf5bb8ab912a3992d5e3172f9c16f35c462601d43561119e8433eb8306cabf77e1a0adc2b1a93531b5104e5c3c8494dcdaa6b64c77179703988c8688fa55420faa6acfb8a8eeb74ac8550a111c48625362bf0178bd5eca729f04e427e1994c72ba43763462cb8b664abf3a3fb272596ac628b6cdc223cf79fc7bc7c40e139b69a98e4218280e6eca45c256a1ccc3405a054022895da2ad332c9023ac29", 0xa2}], 0x2, 0x0, 0x0, 0x1}, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0xa0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) 5.579058044s ago: executing program 3 (id=265): open(&(0x7f0000000140)='./file0\x00', 0x78e, 0x0) r0 = getpid() ktrace(&(0x7f0000000280)='./file0\x00', 0x0, 0x4000011e, r0) ppoll(0x0, 0x0, 0x0, 0x0, 0xffffffffffffff48) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x20) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(&(0x7f00000002c0)='./file0\x00', 0x2) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() r1 = socket(0x1, 0x2, 0xfe) ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x31, &(0x7f0000000300)=ANY=[@ANYBLOB="01cf7c38750d3e0bc6aee0430fca4e309fb7273b50b24a9a073c0dc6356aff99d63fed6a3d75cf2cd4cce67857a62d719f24e8424339093d52ef33cfe9db2faaf3623a24da4cd0ac47afbdc384668946f6ae232a878598cca1b2754b64702c55920a30d65e99be43e166b21d98fffbf5b50c9544bf9a19c6abb3e75f62f622660482aadddbf3c34ecc43f5a7733efb8eb199adc7cee7e348d6a3f65ddcc0bdfa46363208f6dbf59e6df24dcdaecd1d34d88ca28f8a5a7050d41989274ced"], 0x28) kqueue() r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) fpathconf(r2, 0x9) socket(0x1c, 0x1, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) freebsd11_getfsstat(&(0x7f00000003c0), 0x1d8, 0x1) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$DIOCGETSTATES(r4, 0xc0106663, &(0x7f0000000740)="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") openat$evdev(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000080)={0x0, 0x37, 0x10, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0x0, 0xf5ffff85, [0x0, 0x0, 0xffe, 0xdffffffc]}) setresgid(0xee00, 0x0, 0x0) 3.942664837s ago: executing program 0 (id=266): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) bind$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r2, 0x29, 0x32, &(0x7f0000000240)={0x4b}, 0x8) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000000)={'bbr\x00', 0x7ff}, 0x24) connect$inet6(r2, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r3 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r3, 0xffff, 0x10, &(0x7f0000000140)=0x1, 0x4) sendmsg$inet_sctp(r3, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x20004) r4 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r5 = dup2(r4, r4) syz_emit_ethernet(0x5e, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r6 = socket$inet6(0x1c, 0x2, 0x0) bind$inet6(r6, &(0x7f00000001c0)={0x1c, 0x1c, 0x1, 0x19, @loopback, 0x5}, 0x1c) setsockopt$inet6_int(r6, 0x29, 0x3b, &(0x7f0000000000), 0x4) connect$inet6(r6, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0000000000114b70380dbb00086000"}, 0x1c) ioctl$SMB_READW(r5, 0xc01c6908, &(0x7f00000002c0)={0x9, 0xd, 0x0, @word=0x2, @word=0x2, 0xd, &(0x7f0000000100)=0x86, 0x1, &(0x7f0000000280)=0x6, 0x1}) sendto$inet6(r6, &(0x7f0000000000)="cc745f3a792edb87fc541f06324c57e9326a57d2a2c7ae04af62be1c97cd6352ddd86d85a3856de9b3a4e6b01a7439cb88b2", 0x32, 0x108, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x1, @rand_addr="791755a3a250d0a442569146a3ab7eec", 0x5}, 0x1c) syz_emit_ethernet(0x56, &(0x7f0000000080)={@broadcast, @random="56815f16eb8a", [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x20, 0x3a, 0xff, @rand_addr="78042000000014000005000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @remote={0xfe, 0x80, '\x00', 0x0}, [{0x1f, 0x1, "650595abc9d9"}]}}}}}}) 3.939602996s ago: executing program 1 (id=267): mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0) mkdir(0x0, 0x0) clock_gettime(0xf, &(0x7f0000000340)) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) setrlimit(0x7, &(0x7f0000000040)={0x2, 0x7}) minherit(&(0x7f0000ffc000/0x1000)=nil, 0x822fbf000, 0x3) setreuid(0xee00, 0x0) fork() 3.934853373s ago: executing program 3 (id=268): r0 = semget$private(0x0, 0x7, 0x3c4) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, 0x0, 0x0) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x100, 0x0, &(0x7f0000000180)) syz_emit_ethernet(0x10ed, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"]) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x1, 0x9cf, @empty, 0x6}, 0x1c, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x149}, 0x9) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r1, &(0x7f0000000440)="05575313000000000000000000b8597050dc305aa7d3c672778fefba9ad3ad5815eace1b1ee8597369ba03d293aa768331a5012b2072d3b0b5ec137d87982223397976f5a3da52da7d3cff38552caae33e7c0fe883e13b041b3317754bacbb2d3780dc0fada9afbe8b20e133bfe60bd664b985dbefa876d291a7a95f16fbd2b56c3e48ff0e", 0x85, 0x20114, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, &(0x7f0000000240)={0x0, &(0x7f00000002c0)=[@in={0x10, 0x2, 0xffffffffffffffff, @local}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in={0x10, 0x2, 0xffffffffffffffff, @remote}]}, &(0x7f0000000340)=0x8) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x27, &(0x7f00000003c0)={&(0x7f0000000500)="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", &(0x7f0000000200)="995197", &(0x7f0000000380), 0x19, 0x136, 0x3, 0x1a, 0x0, 0x0, 0x678e2603bf350369, 0x4, "631100ce9d2012a9"}, 0x30) socketpair(0x1, 0x1, 0x2, 0x0) r2 = socket(0x1c, 0x1, 0x0) socket(0x11, 0x3, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) r4 = msgget$private(0x0, 0x79c) r5 = semget(0x0, 0x1, 0x281) semop(r5, &(0x7f0000000000)=[{0x0, 0x107, 0x1000}], 0x1) msgsnd(r4, &(0x7f0000000100)=ANY=[], 0x12f, 0x800) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r6 = socket(0x1c, 0x1, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) r7 = kqueue() kevent(r7, &(0x7f0000000240)=[{0x6, 0xfffffffffffffff9, 0x1, 0x10, 0x2, 0x503, [0x2, 0xfffffffffffffff9, 0x8000000000000001, 0x6]}], 0x1, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) semop(r0, &(0x7f0000000180)=[{0x0, 0x2, 0x1800}, {0x4, 0xfff, 0x800}, {0x0, 0x4000, 0x1000}, {0x0, 0xd3d, 0x800}, {0x3, 0x8}, {0x2, 0x3ff, 0x1800}], 0x6) __semctl$SETALL(r0, 0x0, 0x9, &(0x7f0000000000)=[0x4, 0x2, 0x2, 0x9a, 0x2, 0xffff, 0x4, 0x1, 0x8000, 0x7ff]) socket$inet_tcp(0x2, 0x1, 0x0) 2.026950881s ago: executing program 0 (id=269): aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) mkdirat(0xffffffffffffff9c, 0x0, 0xc0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x80, 0x50) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) freebsd11_mknodat(r2, &(0x7f00000001c0)='./file0\x00', 0x60a3, 0x0) __realpathat(r2, 0x0, &(0x7f00000000c0)=""/12, 0xc, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES32=r1], 0x28, 0x3010b}, 0x9) connectat$unix(r2, r1, &(0x7f0000000000)=@abs={0x8, 0x0, 0x0, 0x0}, 0x8) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1, 0x5, 0xfc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, &(0x7f00000001c0), 0x4) vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sigval_int, @spare}) wait4(0x0, 0x0, 0x8, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) mkdir(&(0x7f0000001040)='./file0\x00', 0x1) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) wait4(0x0, &(0x7f0000000080), 0x1d, &(0x7f0000000300)) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000240), &(0x7f00000003c0)=0x4) 2.026399367s ago: executing program 1 (id=270): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) socketpair(0x11, 0x4, 0x2, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r1, 0x40047477, &(0x7f0000000080)) socket(0x1c, 0x1, 0x0) aio_readv(0x0) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) aio_fsync(0x80, &(0x7f0000000400)={r2, 0x8000df, 0x0, 0x0, [0x6, 0x3], 0xc, 0x8, 0xfffffff8, {0x932, 0x2, 0x0}, {0x1, 0x22, @sigval_int=0x9, @thr={0x0, 0x0}}}) aio_fsync(0x80, &(0x7f0000000e00)={r2, 0x8000, 0x0, 0x0, [0x101, 0xfffc], 0x84, 0x6, 0x2, {0x5, 0x7fffffff, 0x0}, {0x4, 0x18, @sigval_ptr=0x7}}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r3 = open(&(0x7f0000000040)='./file0\x00', 0x8381, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0x0) mount(&(0x7f0000000400)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0x42500400, &(0x7f00000001c0)) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x100, 0x0) freebsd11_fstat(r0, &(0x7f0000000040)) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) setreuid(0xee00, 0x0) r4 = getuid() r5 = getuid() chown(&(0x7f0000000040)='./file0\x00', r5, 0xffffffffffffffff) setreuid(0xee00, r4) chmod(&(0x7f0000000080)='./file0\x00', 0x2ea) r6 = socket(0x1c, 0x1, 0x0) extattr_list_fd(r3, 0x1, &(0x7f00000000c0)=""/104, 0x68) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 2.025203761s ago: executing program 3 (id=271): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) socketpair(0x11, 0x4, 0x2, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r1, 0x40047477, &(0x7f0000000080)) syz_emit_ethernet(0x7e, &(0x7f00000003c0)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x48, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x2b, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @loopback, [@routing={0x64, 0x2, 0x0, 0x73, 0x0, [@loopback={0x7e}]}]}}}}}}}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000580)="7215a382", 0x4) r4 = dup(r2) sendmsg$unix(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[@rights={0x10, 0xffff, 0x1, [r4]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10, [0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]}], 0x70}, 0x0) aio_waitcomplete(0x0, &(0x7f0000000200)={0x80000000}) syz_emit_ethernet(0xa6, &(0x7f0000000140)={@empty, @random="975638aa306f", [{[], {0x8100, 0x4, 0x0, 0x1}}], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x5, 0x94, 0x68, 0x9ad1, 0x5, 0x22, 0x0, @rand_addr=0x4, @multicast2, {[@rr={0x7, 0xb, 0xc4, [@remote={0xac, 0x14, 0x0}, @empty]}]}}, @udp={{0x3, 0x1, 0x8}, {"5aa0427321ff533116a65cc3cefc8ee7466c2b54ab47ba2b300f78d518e78383013b28b264abe85c1b5db1a8060beb4155509ae022ad298203f647d2ce7a5af21c7648153b4d62c1646ab1423a919e91c58ef9cf2bc4f665c3c7e600a170fac53ecdaa31fa586e1d14085e0f"}}}}}}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0x0) mount(&(0x7f0000000400)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0xc0000400, 0x0) syz_emit_ethernet(0x400e, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "15f2ff", 0x3a3a, 0x0, 0x0, @rand_addr="eee7567b2c0e280000004c1e7b3b00", @local={0xfe, 0x80, '\x00', 0x0}}}}}) syz_emit_ethernet(0x56, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaa4c77b99cbb86dd60c6ea090000"]) r5 = openat$crypto(0xffffff9c, 0x0, 0x100, 0x0) freebsd11_fstat(r5, &(0x7f0000000040)) r6 = socket(0x1c, 0x1, 0x0) extattr_list_fd(0xffffffffffffffff, 0x1, &(0x7f00000000c0)=""/104, 0x68) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 3.697089ms ago: executing program 0 (id=272): aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) mkdirat(0xffffffffffffff9c, 0x0, 0xc0) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x80, 0x50) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) freebsd11_mknodat(r2, &(0x7f00000001c0)='./file0\x00', 0x60a3, 0x0) __realpathat(r2, 0x0, &(0x7f00000000c0)=""/12, 0xc, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYRES32=r1], 0x28, 0x3010b}, 0x9) connectat$unix(r2, r1, &(0x7f0000000000)=@abs={0x8, 0x0, 0x0, 0x0}, 0x8) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1, 0x5, 0xfc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x42, &(0x7f00000001c0), 0x4) vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sigval_int, @spare}) wait4(0x0, 0x0, 0x8, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) mkdir(&(0x7f0000001040)='./file0\x00', 0x1) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) wait4(0x0, &(0x7f0000000080), 0x1d, &(0x7f0000000300)) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000240), &(0x7f00000003c0)=0x4) 1.209623ms ago: executing program 1 (id=273): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000009c0)=[@rights={0x10, 0xffff, 0x1, [r1]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10, [0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff]}], 0x70}, 0x0) rfork(0x85000) 0s ago: executing program 3 (id=274): aio_write(0x0) r0 = open(0x0, 0x200000, 0xd2) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x1010, r0, 0x0) open$dir(0x0, 0x8, 0x56) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080), 0x0, 0x0) socket(0x1c, 0x1, 0x4) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x0, 0x6, @loopback, 0x290}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x4) socket$inet6(0x1c, 0x2, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000400)=ANY=[@ANYBLOB="570010000000ffffffffffff08004500001c0065000001029078ac1400aae000000112029078e0000001f62bf06ff9cb1a5a7adf353c0c41a023f03a667230c8e4afd957acd709968ec84e5a913e2e2d5fc6b585a4628b0b50b5e8a6c26729fb09000000000000000f6a9617021bd01f6329b4f304ea65a5de13d312a00dfabefc3a1efafa57205417240bfd1f61cf3d2ff650cc50d0a8d3ddce05b074aaa76f0b"]) r3 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x46, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x46, &(0x7f0000000080)={@multicast1, @multicast2, @local={0xac, 0x14, 0x0}}, 0xc) r4 = socket$inet(0x2, 0x3, 0x0) dup2(r3, r4) setsockopt$inet_mreqsrc(r4, 0x0, 0x49, &(0x7f0000000080)={@multicast1, @multicast2, @local={0xac, 0x14, 0x0}}, 0xc) r5 = socket(0x1c, 0x1, 0x0) extattr_list_file(&(0x7f0000000180)='./file0\x00', 0x1, &(0x7f00000001c0)=""/195, 0xc3) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r6, 0x6, 0x29, &(0x7f00000001c0)={&(0x7f0000000100)="01", 0x0, 0x0, 0x19, 0x1, 0x0, 0x1a, 0xfffffffffffffef4, 0x11, 0x3, 0x3}, 0x40) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x0, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_int(r7, 0xffff, 0x1, &(0x7f0000001080), &(0x7f0000000340)=0x4) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) setsockopt$inet_mreqsrc(r3, 0x0, 0x46, &(0x7f0000000080)={@multicast1, @multicast2, @local={0xac, 0x14, 0x0}}, 0xc) bind$inet(r4, &(0x7f0000000100)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.46' (ED25519) to the list of known hosts. md0: truncating fractional last sector by 16 bytes Oct 13 04:34:35 ci-freebsd-i386-1 kernel: arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.170 on tap0 md1: truncating fractional last sector by 16 bytes md2: truncating fractional last sector by 16 bytes md3: truncating fractional last sector by 129 bytes md4: truncating fractional last sector by 16 bytes SYZFAIL: too much cover cov=1864135 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=2 req=240 state=1 status=67 (errno 35: Resource temporarily unavailable) FreeBSD/amd64 (ci-freebsd-i386-1.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl