last executing test programs: 23.963067031s ago: executing program 1 (id=271): aio_waitcomplete(0x0, 0x0) socket(0x2, 0x1, 0x0) r0 = socket(0x1c, 0x3, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000002a80)=ANY=[], 0x8) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f0000000080)={0xb, 0xf, 0x11, &(0x7f0000000000)="ec7b00002c74cbe463732ae1db07000053", 0x0, 0x0, 0x7fff, 0xfdffef85, [0x0, 0x0, 0x0, 0x9]}) syz_emit_ethernet(0x4e, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d001a3afffe8000000000000000000000000000bbff020000d4afbaafbd00000000000000000000000187009078ff0100000000000000000000000000010e00d1ce4f0044ff3aac88962d5b370ae6137e0090aee482c674c7e900000000cd0886dd780902577d2795e405a0024b3f7629285407e0b317275df59295727612365f0d552dbf20c15d93eaa3ff280801260e29287c3cb988bc51b33ce594c25e4e3be0139d8e7e4b9dad677daac7c7d7ea12be73c9a46f5f8ad97c72cf"]) socketpair$unix(0x1, 0x5, 0x0, 0x0) socket(0x2, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000040)=@in={0xfffffffffffffd7c, 0x2, 0x3, @loopback}, 0x10, &(0x7f0000001100)=[{0x0}, {&(0x7f0000000040)}], 0x2, 0x0, 0x0, 0x149}, 0x0) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_buf(r3, 0x6, 0x24, &(0x7f0000000040)="8615da3afc659619d2bb7d26ad0f34d5660b069097f5a484ed7f6896c8020748144cbde4f0043f5b3e49", 0x2a) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_sctp_SCTP_REUSE_PORT(r4, 0x84, 0x1c, &(0x7f0000000000)=0x9, 0x4) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffffff, 0x84, 0xb, &(0x7f0000000080)={0x2, 0xfff8, 0x100, 0x356, 0x200, 0x2, 0x7, 0x4}, &(0x7f0000000140)=0xffffff85) cap_rights_limit(r4, &(0x7f00000011c0)=[0x7fffffffffffffff, 0x3]) r5 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_NODELAY(r5, 0x84, 0x4, &(0x7f0000000100), &(0x7f00000001c0)=0x4) r6 = socket(0x1c, 0x7, 0x0) setsockopt$sock_int(r6, 0xffff, 0x1018, &(0x7f0000000000)=0x101, 0x4) setsockopt$inet6_IPV6_DSTOPTS(r6, 0x29, 0x32, &(0x7f0000000400)=ANY=[], 0x8) connect$inet6(r6, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x46, &(0x7f0000000240)=ANY=[@ANYBLOB="e727dc07001f391e7dd7a2d786dd609907a600102c03cb697a653e336f000000500000000000ff02000000000000000000000000000100000018000000004e214e2300089078f2988836c4f3aba54a"]) getsockname(r2, &(0x7f00000001c0)=@in={0x10, 0x2, 0xffffffffffffffff, @multicast2}, &(0x7f0000000200)=0x10) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r7, 0x0, 0x48, &(0x7f0000000100)={@multicast1, @rand_addr=0x8, @rand_addr=0x2}, 0xc) 23.113164292s ago: executing program 1 (id=276): getgid() (async) r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x400, 0x24) extattr_delete_fd(r0, 0x0, &(0x7f0000000040)='\x00') (async) socket(0x1c, 0x3, 0xfe) (async) ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x6, 0x2]}, 0x10) (async) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) kqueue() r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) fpathconf(r1, 0x9) (async, rerun: 64) r2 = socket(0x2, 0x1, 0x0) (rerun: 64) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) openat$evdev(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) (async) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000080)={0x1f, 0x1d, 0x20, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0xffe, 0xfffffffc]}) setfib(0xff) (async) ioctl$CIOCCRYPT(r3, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x76, 0x8040, &(0x7f00000003c0)="6b8200456510b014de335b97014d6a46f4d4acae671918817e152dd4b52d8d5e479db3ab32a2c54543c51c98485113112f89749d8173800e0598749fb0f94f5118ee41268c844458d883b9f9664bdb8fc4c88bad5b1ad7827f5b501de0f13dca335a537210ebdaa4e42ee583175f3e00"/125, 0x0, 0x0, 0x0}) minherit(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3) (async) __realpathat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x20, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) (async) sendmsg$inet6_sctp(r2, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) (async) r5 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x110) rmdir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x85) (async) freebsd11_getdents(r5, &(0x7f00000000c0)=""/180, 0xb4) (async) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) (async) fork() (async) r6 = accept$inet6(0xffffffffffffff9c, &(0x7f0000001040)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, &(0x7f0000001080)=0x1c) sendto$inet6(r6, &(0x7f00000010c0)="2f16aca894c2a8c6e479e5f4aa73bfa518f1d6306da9f3ad34436df8cad9205de1371176fa569739efb6d2f12e1c59c73ba173e30b7a9ada3188d39fc869155e535178470dba9859b65ea636a7d20ae7ef83c1798f44bf8299e801bda1d451e74d32e6d33d8bfb4aa15769ae6b2d4ad96108f73201993ac7ca278a2850b75f5f53553068c4e8a96a3f5fb74b5fc1ee51d701641de3a058490c1d2f29a83039092de88faee90c617408d114ddfbbb8f7db92f7dac0d08865f95afd887533f8b160b8ac5027d34baa2d8f2ec430b075a9e536a8ffbe2658fd55fdf91730a22c54e07", 0xe1, 0x5, 0x0, 0x0) 23.111161406s ago: executing program 1 (id=278): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x100000, 0x0) ioctl$BIOCSETF(r1, 0x80084267, &(0x7f0000000040)={0x0, 0x0}) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0)}], 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x3, 0xa) r4 = socket(0x1c, 0x1, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) r5 = accept4$inet6(r2, &(0x7f0000000280)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @empty}, &(0x7f00000002c0)=0x1c, 0x10000000) sendto(r2, &(0x7f0000000300)="d9b4eeece1f1f5d978930c7779fa4ef495d1e9c1eb291928392d8c365d9eca3f03c84ddf868c38fbb0ffea5f82", 0x2d, 0x20000, &(0x7f0000000340)=@in={0x10, 0x2, 0x1, @local={0xac, 0x14, 0x0}}, 0x10) syz_emit_ethernet(0x92, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaad43106de617d0800470000840000000000069078ac1400bbac14dfaa070702e0000002004e234e2100089078d87cec6766292e4fcb87c98024398ad307d9ef6b1753709f93b4a7b624025168f510e90c9b8838986f499e80c703d8f2f21d108c6c85439c638a1fe5b534e80462de58b23cc75245dcc15ac4590410b9e48ae40ab89d04d14a5b841e8cd8d180"]) setsockopt$inet_mreq(r2, 0x0, 0xc, &(0x7f00000000c0)={@multicast1, @broadcast}, 0x8) r6 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000140)=ANY=[@ANYBLOB="c3b58b132350aaaaaaaaaabb86dd6000010000343a00f6ec06afdf466c130afc590bdb9e4ff6ff0200000000000000000000008f79f700000600ff01000000ff01000000000000000001dfa7f5ff3bcb22ddb457a19444d9d6f6d04015f6"]) aio_fsync(0x80, &(0x7f0000000400)={r6, 0x8000df, 0x0, 0x0, [0x6, 0x3], 0x9, 0x8, 0xfffffffc, {0x3, 0x497, 0x0}, {0x4, 0x20, @sigval_int=0x9}}) r7 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000080)=[{r7, 0x6689, &(0x7f0000000080), 0x0, [0x9d, 0x7], 0x5, 0x8, 0x9, {0x800, 0x8, 0x0}, {0x1, 0x200001a, @sigval_ptr=0x6, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0x0, 0x0, 0x56, [0x82], 0x6, 0x4, 0x8001, {0x4, 0x10000007, 0x0}, {0x1, 0x1, @sigval_ptr=0x9, @thr={0x0, 0x0}}}, {r5, 0xd, 0x0, 0x0, [0xfffffffc, 0xffffffdc], 0xcbbb, 0x0, 0x8056, {0x1000, 0xffff8000, 0x0}, {0x1, 0x0, @sival_int=0xec1f, @thr={0x0, 0x0}}}], 0x3, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000000c0)=ANY=[@ANYRESDEC=r3]) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) freebsd11_mknod(&(0x7f0000000040)='./file0/file0\x00', 0x80, 0x801) aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) open$dir(&(0x7f0000000800)='./file0\x00', 0x40000400000002c2, 0x1c0) setreuid(0xee00, 0x0) r8 = getuid() chown(&(0x7f0000000000)='./file0\x00', r8, 0x0) truncate(&(0x7f00000000c0)='./file0\x00', 0xfffff) execve(&(0x7f0000000380)='./file0\x00', &(0x7f0000000480)=[&(0x7f0000000080)=',\x00', &(0x7f00000003c0)=')\\-\x00'], 0x0) 23.013055141s ago: executing program 1 (id=280): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000000)="e600100000000000", 0x8) aio_waitcomplete(0x0, 0x0) munmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r1 = socket(0x1c, 0x1, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x1f, &(0x7f0000000240)=0x800, 0x4) recvmsg(r2, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/237, 0xed}, 0x41) getsockopt$inet_buf(0xffffffffffffffff, 0x0, 0x4a, 0x0, 0x0) getsockopt$inet6_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f0000000140)={0x0, 0x2}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f0000000280)={r3, 0x2, 0x3, 0xfffffbd1, 0xf1, 0x4}, &(0x7f00000002c0)=0x14) listen(0xffffffffffffffff, 0x14000000) syz_emit_ethernet(0xe2, &(0x7f0000000340)=ANY=[@ANYBLOB="ffffffffffff0000020000000800400000d40000000002069078e0000002ac1400aa01890d5765dca1024d8d75f8f3e8443031107f00000100000000000000ed80000001fffffff000000000000000030000000800000002ffffffff00000008071740e0000002ac1400aae0000002e00000020000000094086f43bc26e0bd831f08ac1400bb00000004e00000027f000001e0000001ac1400bbffffffff831700e000000100000000e0000001ac1400bb00000004891740e0000001e000000200000000ac1400bb0000000300004e204e23", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="dc254bef907a0407"]) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) r5 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x100000, 0x0) ioctl$BIOCSETF(r5, 0x80084267, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x94, 0x9, 0x10, 0xfffffffe}]}) pwritev(r4, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) socket(0x1c, 0x3, 0xa) r6 = socket(0x1c, 0x1, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) __cap_rights_get(0x80000008, r6, &(0x7f0000000100)) cpuset_getaffinity(0x2, 0x6, 0x4, 0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0xc, &(0x7f00000000c0)={@multicast1, @broadcast}, 0x8) aio_fsync(0x80, &(0x7f0000000400)={0xffffffffffffffff, 0x8000df, 0x0, 0x0, [0x6, 0x3], 0x9, 0x8, 0xfffffffc, {0x932, 0x497, 0x0}, {0x0, 0x20, @sigval_int=0x9}}) socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 22.133233519s ago: executing program 1 (id=285): r0 = shm_open2(&(0x7f0000000140)='./file1\x00', 0x2, 0x4, 0x2, &(0x7f0000000180)='/dev/smbN\x00') dup2(0xffffffffffffffff, r0) setrlimit(0x7, &(0x7f0000000040)={0x1, 0x6}) setreuid(0xee00, 0x0) munlockall() socket(0x1c, 0x1, 0x0) getpgrp(0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r1, 0x80000002, &(0x7f0000002800)="c634bfeb39b4bcb7e53e80e9da0faee087e67f05560139ac13b6b9ec7b3ff694", 0x20, [0xfffffffd, 0xe54], 0x1, 0x5, 0xfffffffa, {0x87, 0x7, 0x0}, {0x0, 0x0, @sigval_int=0x3}}) mlockall(0x2) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) r2 = fork() sigqueue(r2, 0x23, @sival_ptr=0x8) sync() setrlimit(0x1, &(0x7f00000000c0)={0x80000001, 0xe}) pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r4 = fcntl$dupfd(r3, 0x0, r3) ioctl$SMB_WRITEB(r4, 0xc0086924, &(0x7f0000000080)={0x0, 0x3, 0x0, @word=0xfc00, @word=0xfff4, 0x0, 0x0, 0x0, 0x0}) ioctl$DIOCCHANGERULE(r4, 0xcb7c441a, &(0x7f0000000000)) socket(0x1c, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r5 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x31, &(0x7f00000016c0)=ANY=[@ANYBLOB="0004000000000000040100040100c2"], 0x28) sendto(r5, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r5, 0x6, 0x2000, &(0x7f0000000180)={'freebsd\x00', 0x3}, 0x24) sendto$inet6(r5, 0x0, 0x0, 0x5, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="fee3a38e5cac1c51deba3c6b07a430a0"}, 0x1c) kqueue() 21.283053728s ago: executing program 1 (id=293): chroot(&(0x7f0000000080)='./file0\x00') r0 = socket$inet(0x2, 0x1, 0x6) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r2 = accept$unix(r1, 0x0, &(0x7f00000002c0)=0x4e) getdirentries(0xffffffffffffffff, 0x0, 0x0, 0x0) open$dir(0x0, 0x1, 0x10) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x10044) writev(0xffffffffffffffff, &(0x7f0000000340), 0x0) r3 = open(&(0x7f0000000080)='./file0\x00', 0x80, 0x0) r4 = open$dir(&(0x7f0000000340)='./file0\x00', 0x10000, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r5, 0x80000001, &(0x7f00000000c0)='w', 0x1, [0x3], 0x200000000000000, 0x6, 0x0, {0x6, 0x20000000008, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562f1, @spare=[0x3, 0x2, 0xb, 0x5, 0xa251, 0x3, 0x4]}}) open(&(0x7f0000000440)='./file0\x00', 0x40000, 0x1) r6 = open$dir(&(0x7f0000000140)='./file0\x00', 0x200, 0x24) r7 = open(&(0x7f0000000040)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) cap_fcntls_get(r2, &(0x7f0000000400)=[0x0, 0x0]) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r7, 0x0) r8 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) copy_file_range(r8, 0x0, r7, &(0x7f0000000080)=0x2ffff, 0x8, 0x0) preadv(r6, &(0x7f00000001c0)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x3) kmq_open(&(0x7f0000000380)='./file0\x00', 0x200, 0x144, &(0x7f00000003c0)={0x1000, 0x40, 0x2, 0x5}) preadv(r4, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) preadv(r3, &(0x7f0000001740)=[{&(0x7f0000000740)=""/4096, 0x400004}], 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) execve(0x0, 0x0, &(0x7f0000000300)=[&(0x7f0000000080)='\x00', &(0x7f0000000480)='\x00', &(0x7f00000000c0)='\x00', &(0x7f0000000100)='\x00', &(0x7f0000000140)='\x00', &(0x7f0000000180)='-\'%@!{$\x00', &(0x7f0000000200)='-\'%@!{$\x00', &(0x7f00000001c0)='+\x00', &(0x7f0000000280)='.@+(\x00', &(0x7f00000002c0)='-\'%@!{$\x00']) rtprio_thread(0x1, 0x0, &(0x7f0000000000)={0x2}) r9 = fork() sigqueue(r9, 0x67, @sival_int=0x6) 9.105993179s ago: executing program 0 (id=323): fhstatfs(&(0x7f0000000000)={{[0x52fb, 0x8]}, {0xa711, 0x4, "d5b3f338bc2f5d3c8044ab86e7ee0386"}}, 0x0) setrlimit(0x1, &(0x7f0000000000)={0xfffffffffffffffa, 0xfffffffffffffffe}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000001b00)={r0, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x40000, 0x1ff], 0x0, 0x2, 0x0, {0x0, 0x4, 0x0}, {0x0, 0x7, @sival_ptr=0x400, @spare=[0x1, 0x2, 0x0, 0x33518c07, 0xdca6, 0x7fffffff, 0x800000000, 0xffff]}}) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) freebsd11_mknod(0x0, 0x1000, 0x0) r2 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x56, &(0x7f0000000240)={@local, @random="e213c21b00aa", [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x20, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @mcast1, [{0x2, 0x1, "6b92c1feae7f"}]}}}}}}) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2000) syz_emit_ethernet(0x43, &(0x7f0000000300)={@remote, @local, [{[], {0x8100, 0x7, 0x1}}], {@arp={0x806, @generic={0xf, 0x8148, 0x6, 0xd, 0x3, @remote, "d924d02dc91439acbb398380fa", @remote, "164ad8d521c016fcd2a7567fdcecec68"}}}}) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r4 = socket(0x1c, 0x1, 0x0) connect$inet6(r4, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) setsockopt$inet_tcp_int(r4, 0x6, 0x80, &(0x7f0000000200)=0x4, 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r3, 0x0) socket(0x1c, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd0) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x31, &(0x7f0000001500)=ANY=[@ANYBLOB="1f0200000000000015021ab3000900c20400000007000100"], 0x18) sendto$inet6(r5, 0x0, 0x0, 0x20008, &(0x7f0000002380)={0x1c, 0x1c, 0x0, 0x5, @mcast1, 0x400}, 0x1c) r6 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) syz_emit_ethernet(0x32, &(0x7f00000002c0)={@local, @local, [{[{0x88a8, 0x0, 0x0, 0x3}], {0x8100, 0x6, 0x1}}], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @empty, @local={0xac, 0x14, 0x0}, @broadcast, @rand_addr=0x5}}}}) openat(r6, &(0x7f0000000040)='./file0\x00', 0x100, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) aio_waitcomplete(0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom(r7, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) 9.105395456s ago: executing program 2 (id=324): r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x80000, 0x611b2c1dda882c14) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x27, 0x0, 0x0) syz_emit_ethernet(0x7a, &(0x7f00000003c0)=ANY=[]) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x8, [0x0, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaafffffff7c96902ea88bba59affffff86dd60aee19d00183aff78042000000014000001000000086500ff0200000000000000018800fb2e950aed0000fe800000000000000000000000f7ffbb0000000000"]) open(0x0, 0x80000000000209, 0x0) syz_emit_ethernet(0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) fork() poll(&(0x7f0000000000)=[{r0, 0x2000}, {r1, 0x20}], 0x2, 0x10000008) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000b5e9cc02000000080045000000026a9078e0000002e00000024e439d6f63e809b15ee9f01f8c4a7456ccb512c5804bd7066c314269a70d4c7e569310988e3f7c014ca1b5e1ee5619928227df2d99974109a6cd711ae035d7cd41b43c54b201cf12c40887efcb000000000000000000020000814200000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="501000a790780406"]) r2 = shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) shmat(r2, &(0x7f0000ff7000/0x3000)=nil, 0x400c) ktimer_create(0x4, 0x0, 0x0) lio_listio(0x1, 0x0, 0x0, &(0x7f0000002c00)={0x1, 0xa, @sigval_int=0x6, @ke_flags}) sigaction(0x4a, &(0x7f0000000180)={&(0x7f0000000140)="c4c1cd63b9d0280000f364f30f8500000000f087149ec4c27958b000000000c4c2ad3f0bc4e189f96a04f30f1efcc4e26ddfab00000000f3262efb666566f3ae", 0x68, {[0x2, 0x7fff, 0xea7, 0x7fb]}}, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x8) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x2, 0x1, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000240)={@broadcast, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "417991", 0x8, 0x3a, 0xff, @empty, @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@echo_request={0x80, 0x0, 0x0, 0xb117, 0x5}}}}}}) bind$inet(r4, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f0000000180)={'freebsd\x00', 0x10}, 0x24) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x4) bind$inet6(r5, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket(0x1c, 0x1, 0x0) 9.104108158s ago: executing program 3 (id=325): r0 = openat$crypto(0xffffff9c, &(0x7f0000000000), 0x80000, 0x0) r1 = openat$kbd(0xffffff9c, &(0x7f0000000040), 0x400, 0x0) ioctl$KDGETREPEAT(r1, 0x40084b67, &(0x7f0000000080)) ioctl$KDSKBMODE(r1, 0x20044b07) r2 = kqueue() r3 = vfork() aio_readv(&(0x7f0000000200)={r2, 0x0, &(0x7f00000000c0)="d04b5859e6827674c094624e5339be5fbd2152568092b37796d48329f780571e284f31943500d231e0e785b1d4bfccc0ac87b035b79d52b9a1a262ed6a4c62dcf168124654cd0203125c10e30999fbccf75204d959518906c7af25bf4cb9d20c2fe76e66333a2aae5d64f6db567d898de1db92ba56ed82e835e4307ede34a7e33fd93fa14c113c47ffa09c506cd8870e2a4dc29033ec7b5df44e0fc3af00962762e2f105d0d48e8c3b06de8af161f9", 0xaf, [0x0, 0x401], 0x6, 0x5, 0x9, {0x80000000, 0xb82b, &(0x7f0000000180)="503dac12a5b54a5c88656dad1f2d92f1ebd408cdae0ec4f166a2d7cb94680fa286702024df09a1abedbe38e1a7ef4a400bce62ad1775289b7a28bbd1f3e490c24aade2ff136375f3f3ca7c815814aa002d66"}, {0x1, 0x0, @sival_ptr=0xe40, @tid=r3}}) r4 = openat$ptmx(0xffffff9c, &(0x7f0000000280), 0x480, 0x0) ioctl$BIOCGDIRECTION(0xffffffffffffff9c, 0x40044276, &(0x7f00000002c0)) r5 = fork() extattr_delete_fd(r4, 0x1, &(0x7f0000000300)='\x00') freebsd11_getfsstat(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x1d8, 0x0) r7 = getgid() freebsd11_lstat(&(0x7f0000000540)='./file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstatat(r0, &(0x7f0000000600)='./file0\x00', &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x200) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000740)={{r6, r7, r8, r10, 0x1, 0x1, 0x0, 0x9}, 0x7fffffff, 0xb4, 0x4, 0xf54d, 0x200, 0x0, r3, r3}) ioctl$OPIO_DEADKEYMAP(r1, 0x862a6b09, &(0x7f00000007c0)={0x3000, [{0x6, "006faacdc393aa746ce5c40535512bc0a3d3baeb726bdfb1c324fb7079463d1a2f6e851c4ae2b5736b71a48aef1b19dae09d15f17d67f7d9594579054d6fe882d6baf91973cf4c9b6723487d907e4efca7275b4e1c76f734b9efb9b9dfb4004efe822ac6b11d0998"}, {0x26, "2c41fcf52e10deae9772c8c369d14a9195f9c9b853167091980e4ce3c9b2be1295c4590c57462c1e272bb6d66692b87d7245fd214adc7258c30861b7af6bf6c6a3c8bc80213ed526ae4285c93e76d3cadd7378da324756cd7eb79aafa0320fd8efcb0fa4bf5d0162"}, {0x6, "b660a7e39cd5ab1799140ea22b5c591cf71e5afe1445aea47cf861b80396aa501645a786dd2e35376ba95ff74c6d5814bd66dd57edf1259b5f40ee92b444151d2745ab8580da7b81373444204f82e8e807eea666c43a2df57f39d351a26443b5550859e6e562f7ba"}, {0x5, "dc76a0377b7187794dc9cdc904723b233efb5a4b0af9e610e8779808c1234ad58b99d01fa9c6dcde162786280be6837c93cdb8e9149181331c9a5427c15eefbffa913372f3932ac2ba61f1003c694c3bd94730d153cb8f3c7619175a5806efad778f8a82c0a3cc8b"}, {0x9, "36c0869abc7bc73c4c227a59523a76bb438dce16698a7726920c3398de08808da9839fbe60f68708a38a48dbcffc59f96acb4c0d8f914f3a78178ce4ce80d7eba76c9fdca099ff845ff398526d462d9b48302c8bbe704bb359dff71d385576735040d095d7646218"}, {0x9, "8859fdda907401d47733cf525f5fb7f2b512b521e413b7c40019e3545c2dc2425c7f841e4cbaca7d636c09ade086d0e5e64c206efa0e1cfce6338dd3ff569dfbc612b646be76d897d40c72088208616404f91eed698c7c504a88cc111726005e5c31e2aa667b885a"}, {0x7, "7295b48a4de5c3e0c629deaa6f90bab848e301a27eeec9c3c3f565d3d03a0c073eabf9ba5133ddac6436a388c4d5a63fcfd2f678bc7cc9cd5a75d4bfea3dc3248508503c57866a7ffb09bfa059176290c792236edcab15a722a530cf411f4261b5d76bafc96e586c"}, {0x96, "6f2920fedf6f2632a1796291e41af779bca906be06c618311079a7be6b644f631b5074553565c46c4417a4fdb16f97e801e0766620186e8b41717ebbb9d3ead46db4362ac25b41f97b9c57f2d81359a1270bfb7aef02e90dcb01f94ddfe4a24c29785ceb34b75b27"}, {0x5, "0bbe3bc799f159cf0951935704f0496cf3a085b1a4b972cf845b1eb37c6ab5b3648bc98fc873437f93898c73261623e936eb06bf6d3d2e8ff6a7aee1ccddf7443e4dac78d4daab3a8d6e94f484e192d87c19631810bbc38cbccb93aa5922d39d8be08c4dfefce9f5"}, {0x92, "ebb12c3a5cfabfdcc3639d6a0ec3f5c1a83b511d3cbd8b27480fefd84562ed6f6d3ae3065047d1a43fe32a04ad5e160ae59cc51bbc49adfbcc9d089f5e8547d31291352d582565a958af3ef90dd202d9b06adc3d094fb520e7a156aad963350e7007b55a91851825"}, {0x9, "cf2a46bb3591ce099e1f745b8aceb3ca6bc6a25bc904e93a4ec45335e21cbf4fc04e4caaa2cded5d4f23f31420e54eb0c86e688d9e5cb0f20ef7a65c211484996968b98cb2d8b84c76bfc6353882d8835946d7af89416913440bfc6f09a4e614db6923611dcaa704"}, {0x8, "22516cafb8ad96f09d55e9e68cf66983ef9560064b59cee3baaab77e057f354708d658894b092571b290a018d3a188a8f4cb775518066a50977bac816bb141e38b6cfe46830f8ec6334f4d9ad2ffb3214c1a9f19a9d80ba74a7fb3fcfb261a93d3b2f63aef7c34ea"}, {0x1, "ce3d928c3eecf97f7c0be876d11c7bafaeee578d826ed890d46248562e16892ca366dd0b5d5812fe5cb87a773034eb809447343f50795daef460eeb917ed1833d471d032dfd46c42aba8a6b213b650329114852512b9eeb972eb0ebfbbdc15015cb4d0e1dcf4ce0f"}, {0x5, "d54aaf5bc5aab3074e30ab258918685c437e53725b30e47b8b3ab7f229ae49998200d24892c44a843d51ea7039ebafc7364da414ab3bb90940edf58d9f55d92c7c1b27a9072f8aa778825f25606ae29049c5107b19d81dd5959998c9b4894ebfa7471631f9064cbf"}, {0x3, "bab8661839d4f1a3824b15e12516eb62cc3108dd2cd6756cb6016c525088dbb26891d09cec05ebfd7d18420f384cb3ccc77f69cce839abd543dfa9538594113d58e94075c93ff900d8e451219b9004f899dd4ae35ba52ab63d40e27f248f4bf566300d4ffb9a2658"}]}) r11 = socket(0x17, 0x4, 0x1) setsockopt$inet6_sctp_SCTP_ADAPTATION_LAYER(r11, 0x84, 0x8, &(0x7f0000000e00)={0xfff}, 0x4) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdirat(0xffffffffffffffff, &(0x7f0000000e40)='./file0\x00', 0xc4) getpid() getsockopt$inet_sctp_SCTP_RECVNXTINFO(r11, 0x84, 0x20, &(0x7f0000000e80), &(0x7f0000000ec0)=0x4) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r11, 0x84, 0x14, &(0x7f0000000f00)={0x8, [0x1, 0x0, 0x3ff, 0x2, 0x9, 0x4, 0x8, 0x2]}, 0x14) aio_return(&(0x7f0000001f80)={r0, 0x4, &(0x7f0000000f40)="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", 0x1000, [0x2, 0x81], 0x8, 0x18, 0x6, {0x8, 0x6, &(0x7f0000001f40)="63465a2e040b15f3c04dc6500801026fed5374793365bdb47cf267fb47869e9c969bbbb82fb4ea2ee33c4f2ab3c3299d405aa4a9ad31a6ed1523f81a5173c1"}, {0x6f9ef5440ebb6d2f, 0x9, @sigval_ptr=0x8, @spare=[0x7, 0x6, 0x100, 0x200, 0x7, 0x4, 0x2, 0xa52]}}) getpgrp(r5) setregid(r7, r9) setgid(r7) freebsd11_lstat(&(0x7f0000002000)='./file0\x00', &(0x7f0000002040)) ioctl$PIO_KEYMAPENT(r1, 0x80286b0b, &(0x7f00000020c0)={0x7ff, {[0x3, 0xc, 0x6, 0x3, 0x3, 0x9, 0x6, 0x1], 0x0, 0x2}}) 7.48842259s ago: executing program 0 (id=326): open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x1100, 0xffffffffffffffff) (async) pipe2(0x0, 0xd505eb4556f41fdb) (async) aio_waitcomplete(0x0, 0x0) (async) cpuset_setid(0x2, 0x0, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) (async) r0 = socket(0x1c, 0x1, 0x0) socket(0x2, 0x1, 0x0) (async) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) (async) r1 = socket(0x1c, 0x1, 0x0) (async) setresuid(0xee01, 0xee01, 0x0) setresuid(0x0, 0xffffffffffffffff, 0x0) (async) select(0x40, &(0x7f00000000c0)={0x6, 0x3, 0x6f, 0x5, 0x20000009, 0x1ff, 0x7fff, 0x5}, &(0x7f0000000140)={0xfffffffffffffffc, 0x6, 0x0, 0x8001, 0x8000, 0x6, 0x8, 0x2}, 0x0, 0x0) (async) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x149}, 0x0) (async) writev(r2, 0x0, 0x0) (async) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) (async) aio_readv(&(0x7f0000000500)={0xffffffffffffffff, 0xfffffffffffffffb, &(0x7f0000000300)="17b48e7c346d5b87", 0x8, [0x5, 0x3], 0xb, 0x6, 0x6, {0xb4e8, 0x9, 0x0}, {0x2, 0x1e, @sival_int=0x6, @ke_flags=0x1}}) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, &(0x7f0000000040)=0x1c) (async) freebsd11_stat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000240)) (async) syz_emit_ethernet(0x95, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) (async) setsockopt(r0, 0x5, 0x7f, &(0x7f0000000340)="85dc7ccaaf11ddf25a20d5e82db21aba28215e4be39ef6e842e010793c2d455dca77c93b0833e0f877d0e2602b04f35fc352f5b084b775beb9772509a91bd64fe5e1dd8af67372ed3027f0f9b5763a9aa2a59ef289c20d0d6355b40dbf72e1ced39e75f9442ce120b93434a52e44b04b50f8d9dcdac59f183a932ef20380da0bedbb7a4522645d823e2e73f0a2adf2a63276e9300edf98ba6d9acc3b54d6108a68b17d6d10cc270f9c73e798085ccec1a0ee70a793b32f3f4b2acd842caa9b96fda5b9379473eb81bf4c6c85d9d6f5e315a027c63fd69138d6c2c2432150d809c399707d7b969066c9d42e3e", 0xec) (async) cpuset_getaffinity(0x3, 0x4, 0x2, 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) (async) r3 = socket$inet6_udplite(0x1c, 0x2, 0x88) (async) r4 = socket(0x2, 0x1, 0x0) sendto$inet(r4, 0x0, 0x0, 0x20100, &(0x7f0000000200)={0x10, 0x2, 0x2, @rand_addr=0x7ffffffe}, 0x10) (async) setsockopt$sock_splice(r4, 0xffff, 0x1023, &(0x7f0000000040)={r4, 0x400000040000}, 0x20) (async) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x2e, &(0x7f0000000040)={@local={0xfe, 0x80, '\x00', 0x0}}, 0x14) (async) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 7.486651269s ago: executing program 2 (id=327): sigaction(0x6, &(0x7f0000000200)={&(0x7f0000000340)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de3516cb69989999908", 0x35, {[0xfffff801, 0x50e5, 0xfffffffe]}}, 0x0) lio_listio(0x0, 0x0, 0x0, &(0x7f0000000a00)={0x1, 0x6, @sival_ptr, @spare=[0x101, 0x3, 0x0, 0x2e1, 0x7, 0x3, 0x5, 0x8]}) sigaction(0xe, &(0x7f0000000200)={&(0x7f0000000180)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de3516cb69989999908", 0x24, {[0xfffff801, 0x50e5, 0xfdffffff]}}, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x400000, 0x4) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) ktimer_create(0x4, 0x0, &(0x7f0000000280)=0x0) ktimer_settime(r1, 0x0, &(0x7f0000000340)={{0x1066}, {0x0, 0x404287}}, 0x0) rfork(0x1000) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) socket(0x1c, 0x1, 0x0) socket(0x11, 0x10000000000003, 0x0) aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x5) r3 = kqueue() kevent(r3, &(0x7f0000000040), 0x1, 0x0, 0xfffffffffffffed0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f0000000300)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) mount(&(0x7f0000000040)='cd9660\x00', &(0x7f0000000080)='./file0\x00', 0x40000080, &(0x7f0000000140)) r4 = socket(0x1c, 0x1, 0x0) chdir(0x0) getsockopt$inet6_int(r4, 0x29, 0x1a, &(0x7f00000002c0), &(0x7f0000000340)=0x4) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(0x0) copy_file_range(r5, &(0x7f0000000000)=0x80000001, r5, 0x0, 0x100000, 0x0) semop(0x0, &(0x7f0000000140)=[{0x0, 0x7fff, 0x1800}, {0x0, 0x8001}, {0x2, 0x4, 0x1c00}], 0x3) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) 7.485670317s ago: executing program 3 (id=328): r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket(0x10, 0x10000000, 0x6c) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) syz_emit_ethernet(0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaa00f6074d3b7447f90008004500006e080800000000000000ffffff77fc65e7ac1400aa7ea4933f396535227c18f8f412bcb27d7d", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"]) socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = socket(0x1c, 0x1, 0x0) shmat(0x0, &(0x7f00002ed000/0x1000)=nil, 0x2000) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_readv(&(0x7f0000000580)={r1, 0x0, 0x0, 0x0, [0x0, 0xffffffff], 0x7fff, 0x0, 0x3, {0xffffffff, 0xfffffffe, 0x0}, {0x1, 0x0, @sival_ptr=0xf9f, @ke_flags=0x88}}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x10001, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x100) r3 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r3, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x8000, 0x2, 0x0, 0x8000, 0x5, 0xfffffffe, 0xf, 0x0, 0x0, 0x0, [0x0, 0x2, 0x7ff, 0x0, 0xffffffff, 0x1, 0xfffffffd, 0x0, 0xf, 0xb32a, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0xfffffffe, 0x0, 0xe122, 0x0, 0xffffffff, 0x0, 0x9, 0x0, 0xbb8, 0x9, 0xf, 0xfffffffd, 0xdbd, 0x3ff, 0x11, 0xfffffffe, 0x0, 0xa7, 0xc37b, 0x7, 0x2, 0x0, 0x0, 0x0, 0x6c635637, 0x4, 0xfffffffe, 0x0, 0x200000, 0x0, 0x0, 0x20002000, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10001, 0xffffffff, 0xc, 0x7, 0x1, 0x1000, 0xffffffff, 0x1002, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0xffffffff, 0x0, 0x40000, 0xfffffffe, 0x0, 0x0, 0x9, 0x23e6, 0xffffffff]}) getfh(&(0x7f0000000200)='./file0/../file0\x00', &(0x7f0000000140)) socket$inet6_tcp(0x1c, 0x1, 0x0) chown(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x110206, 0x0) __specialfd$eventfd(0x1, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, 0x0}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r5 = socket(0x2, 0x1, 0x0) sendmsg$inet_sctp(r5, &(0x7f00000004c0)={&(0x7f0000000100)=@in={0x10, 0x2, 0x3, @rand_addr=0x80}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2000c}, 0x20005) mprotect(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x1) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 5.761610259s ago: executing program 0 (id=329): setgroups(0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x167) aio_waitcomplete(0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f00000004c0)={0x16, 0x0, 0x10, &(0x7f00000000c0)="ec7b00002cfeff02000000000000007f", 0x0, 0x0, 0x0, 0xfdffef89, [0x0, 0x0, 0x40000, 0x1]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x8000, &(0x7f0000000140), 0x0, 0x0, 0x0}) r1 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000500)=ANY=[]) r2 = kqueue() kevent(r2, &(0x7f0000000000)=[{0x3, 0xfffffffffffffffe, 0x80c3}], 0x1, 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) openat$crypto(0xffffff9c, &(0x7f0000000040), 0x40000, 0x0) fchownat(0xffffffffffffffff, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) chmod(&(0x7f0000000400)='./file0\x00', 0xb15c7135d99ca56b) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) pipe2(&(0x7f0000000480)={0xffffffffffffffff}, 0x0) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1b46d00, &(0x7f0000000100)={0x0, 0x0, 0x4, 0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4, 0x0, 0xfffffffe, 0x0, 0xffffffff, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x20002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8000, 0x9, 0x0, 0x0, 0xfe, 0xffff, 0xfffffffc, 0x0, 0x1000, 0x0, 0x9, 0x0, 0x0, 0x81000001, 0x0, 0x8, 0xb9, 0x0, 0x203, 0x0, 0xe, 0x4, 0x0, 0x10001, 0x7c, 0xfffffffd, 0x3ff, 0xfffffff9, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xfffffffe]}) setrlimit(0xf, &(0x7f0000000100)={0x60000000, 0x62000000}) writev(r3, &(0x7f0000002340), 0x0) execve(0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r4) setfib(0xffffff00) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r1, 0x84, 0x8003, &(0x7f0000000440)={0x0, &(0x7f00000005c0)=[@in6={0x1c}, @in={0x10}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @local}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @remote}]}, &(0x7f0000000500)=0x8) utimes(&(0x7f0000000580)='./file1\x00', 0x0) 5.761058712s ago: executing program 2 (id=330): open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x7369a0733676a8) symlink(&(0x7f0000000800)='./file0/file0/..\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r0 = kqueue() kevent(r0, &(0x7f0000001d40)=[{0x20000003, 0xfffffffffffffffc, 0x1, 0x10, 0x6, 0x0, [0x9, 0x0, 0x5]}], 0x1, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0/file0/..\x00', 0x80, 0x110) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, r1, &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20000410) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x49, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) bind$inet6(r4, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) chroot(&(0x7f0000000040)='./file0/file0/..\x00') socket(0x17, 0x5, 0x84) setuid(0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setstatus(r5, 0x4, 0xcc) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) freebsd10_pipe(0xfffffffffffffffe) close(0xffffffffffffffff) open$dir(&(0x7f0000000200)='./file0\x00', 0x4, 0x180) vfork() open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) rfork(0x83000) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) syz_emit_ethernet(0x69, &(0x7f0000000200)=ANY=[@ANYRES8]) 5.760722303s ago: executing program 3 (id=331): open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) (async) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r0 = socket(0x1c, 0x1, 0x0) (async) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x101) (async) r1 = socket(0x1c, 0x2, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = dup2(r3, r3) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f00000000c0)={0x0, 0x13, 0x0, 0x0, 0x1, &(0x7f0000000040)="83", 0x0, 0x4d46b76e}) (async) ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0xa3f, &(0x7f00000000c0), 0x0, 0x0, 0x0}) setsockopt$inet_int(r2, 0x0, 0x2, &(0x7f0000000040)=0x2, 0x4) ioctl$DIOCNATLOOK(0xffffffffffffffff, 0x8008745b, &(0x7f00000003c0)) r5 = socket(0x1c, 0x4, 0x0) sendmsg$inet_sctp(r5, 0x0, 0x0) (async) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x1aa, &(0x7f0000000cc0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa008100000086dd602e5cea01703c00200100"/39]) (async) eaccess(&(0x7f0000000040)='./file/file0/../\x00', 0x2) socketpair(0x0, 0x0, 0x0, 0x0) (async) statfs(&(0x7f0000000240)='./file/file0\x00', &(0x7f0000002d80)) (async) socket(0x1c, 0x1, 0x0) (async) pipe2(&(0x7f0000000140), 0x100004) (async) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) syz_emit_ethernet(0x7e, &(0x7f0000000500)=ANY=[@ANYBLOB="ffffffffffff0000000000000800455000700000000004019078ac1400bbe00000010c119078fd000000456cfffc00640000a6010000000000000000000094060000006289030783038544101ae0000000047f0000010000000689030394060000000844180281e0000002000100015304345d8000000000000006000000"]) (async) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 3.930629191s ago: executing program 0 (id=332): open(0x0, 0x0, 0x20) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) connect$inet(r0, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) getpid() rtprio_thread(0x1, 0x0, &(0x7f0000000240)={0x4, 0xe}) r1 = kqueue() getpgid(0x0) kevent(r1, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x20000000, 0xe8c5, 0x40000000, [0x0, 0x88f]}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x141) r2 = openat$md(0xffffff9c, &(0x7f0000000440), 0x0, 0x0) ioctl$MDIOCATTACH(r2, 0xc1b46d00, &(0x7f0000000500)={0x0, 0xfffffffe, 0x1, &(0x7f00000000c0)='./file0\x00', 0x800, 0x200, 0x346, 0x2000000, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0xffffffff, 0x10011, 0xfffffffc, 0xfffffffe, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, 0x6, 0x0, 0x4, 0x0, 0x200, 0x0, 0x0, 0x0, 0x100, 0x0, 0x3, 0x0, 0x0, 0x7, 0x0, 0x40000002, 0x41, 0x0, 0x9, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x84, 0x0, 0x0, 0x0, 0x7, 0xf, 0x0, 0x0, 0xfffffffd, 0x0, 0x1, 0x3, 0x3, 0x0, 0xfffffffe, 0x0, 0x100, 0x0, 0x8000, 0x2, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x3, 0x1000, 0xfffffffe, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x1ff, 0xb, 0x4, 0x800, 0x0, 0x80, 0x0, 0x1, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x7]}) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r3, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x80000, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int, @ke_flags=0xc088}}) r4 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x20a0702, 0x0) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r5, 0x0) fchflags(r4, 0x48008) sync() socket(0x1c, 0x1, 0x0) r6 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080), 0x100004) getfhat(r1, &(0x7f0000000400)='./file0\x00', &(0x7f00000003c0), 0x0) sendto$unix(r6, &(0x7f0000000200)="3d0e7377543d2e9ae850aa84c5fa2b40cf909d5f757e09c57673e09b703578daf67d4670bad916514ef99cd3b05a32d64847f8ed3b19602a28004f5f853437a980124d184fcd5999cc1d244b1e65fd5ca6afdd94644c46a9ddbed6069c5da8e3103d875f52e829c724c95a6cc1fc0c162fb0645dde6aebfd4b1c6d606c73c55f94547b6fafc08f2432aa6d02355736303353544c36a463e1", 0x98, 0x20008, &(0x7f0000000000)=@file={0xa, 0x0, './file0\x00'}, 0xa) getsockopt$inet_mreqn(r6, 0x0, 0xc, 0x0, &(0x7f0000000100)) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) semget$private(0x0, 0x2, 0x7de) 3.929916563s ago: executing program 2 (id=333): r0 = accept$inet6(0xffffffffffffff9c, &(0x7f0000000000)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, &(0x7f0000000040)=0x1c) listen(r0, 0x6) socketpair(0x1c, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r1, 0x10000, 0x5b, &(0x7f00000000c0)="7c29ae60832c144c5d054e20e502776659", 0x11) setsockopt$inet6_sctp_SCTP_NODELAY(r1, 0x84, 0x4, &(0x7f0000000100)=0x1, 0x4) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000140)={'freebsd\x00'}, 0x24) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_accept_filter(r3, 0xffff, 0x1000, &(0x7f0000000180)={'accf_dns\x00', "d6ba45578794db2a250fb5575f66c58db28fb27e1fadee39b96a40982fb899b27f57d0cb8bc48b258b09de5259dbf601d6b01c98d113f41fa37e227b1027257756d1e7f11259c20d8107780efd8849127b2ddc9a53530e80ba7340fb13b058722bb8909ba90217443c9d172bff570c4293a32d616fe7470dc1c215ded1f9d50b822aafdda926b7ba5191d726bcf9c2166ad6d2fff250c913d6361333ed34b1d7dd4b7d8401566344ceca3ccc4436fff2c0c373b67f5f5e9f0a5a8bade4d0716b273d35fe3c89ff6beaaeb4139d538860922ebaf120b49a73b79bd7d48dabfad9944aee662416108c6983370675c1913c"}, 0x100) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000280)={0x0, 0x7, 0x7, [0x8, 0x7, 0x6, 0x3, 0xeb, 0x1, 0x3]}, &(0x7f00000002c0)=0x16) connect$inet6(r1, &(0x7f0000000300)={0x1c, 0x1c, 0x3, 0xd803, @empty, 0x8}, 0x1c) freebsd10_pipe(&(0x7f0000000340)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KDGETMODE(r5, 0x40044b09, 0x7) mount(&(0x7f0000000380)='zfs\x00', &(0x7f00000003c0)='./file0\x00', 0x100000, &(0x7f0000000400)="015a8261f9689a5e4c8bc80655ab6d5d79af746e2473f22099e95793a379ec44638540b922f201f5d87909ef155b8d2a500f8025296232ceeda75b4e77defdefada328dc17126886d2df0ed9955e952063d7f48471a20be764bee002402cf95834fc54749474b362a79fa6948c8c7a554883fe8831d777361cd33298cceb2f38cc7c40fab445b3a69b86eebae2378a63db01df6b9510e31c0980ab22a01dc8bd5c96726d88f35115") setsockopt$inet6_group_source_req(r6, 0x29, 0x54, &(0x7f00000004c0)={0x43b, {{0x1c, 0x1c, 0x3, 0x5, @mcast2}}, {{0x1c, 0x1c, 0x0, 0x1, @ipv4={'\x00', '\xff\xff', @rand_addr=0x7}}}}, 0xfc) recvfrom$inet6(r1, &(0x7f00000005c0)=""/4096, 0x1000, 0x40080, 0x0, 0x0) execve(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001800)=[&(0x7f0000001600)='\x00', &(0x7f0000001640)='#^@\x00', &(0x7f0000001680)='!\x00', &(0x7f00000016c0)='$\xa2}\x00', &(0x7f0000001700)='/\',x\x00', &(0x7f0000001740)='$\x00', &(0x7f0000001780)='freebsd\x00', &(0x7f00000017c0)='\x00'], &(0x7f0000001900)=[&(0x7f0000001840)='\x00', &(0x7f0000001880)='\x7f\\$]-$\\[\x00', &(0x7f00000018c0)='\xd8,\xe6&:\x8c\x00']) recvfrom$inet6(r2, &(0x7f0000001940)=""/119, 0x77, 0x1, &(0x7f00000019c0)={0x1c, 0x1c, 0x2, 0x8, @loopback, 0x7fff}, 0x1c) aio_mlock(&(0x7f0000001b40)={r0, 0x8000000000000000, &(0x7f0000001a00)="ae5986e1c1f854b1e6454cef58a00f8980cf4df2cde6935b70e519138dadd2fd8e2f36d709a827d15ca35ad7a7e63f0fd6226150411092e40c13b96a7636a6d22c556eecfce3be4c214678c80a163aad58baf09103ac55df99d9887c651cf039b677df2c3e9e02", 0x67, [0xfffffff9, 0xf82c], 0x200, 0x0, 0x7, {0x1, 0x3, &(0x7f0000001a80)="f50affcb72761b4dc52849c86acf63671ffaca203bdb62e433283ba8a10738e2b99cb8747fea420a28491c448a3d10acfca269f2d29eeb38e4cb84dfaec11930cdf74b4a704c62971179a98031dd108d594791d2113c1a80b65cd15aef2eac93d31b8be80c011d8a09e1b77f71224271cd8e7eaf3d377a9444b2032b68eb884f3a84b4713fa2ddf784cde0b870c6478c1c52f84386d443e16681493afa1679a6a007031b818cb868ae80de44a48e3c27c3d61f0b8c161c1595f4b72d"}, {0x3, 0x3, @sival_ptr=0x8, @spare=[0xffff1db6, 0x3, 0xe, 0x5, 0x5, 0xe, 0x10000, 0x3]}}) r7 = openat$crypto(0xffffff9c, &(0x7f0000001bc0), 0x20000, 0x0) ioctl$FILEMON_SET_FD(r6, 0xc0045301, &(0x7f0000001c00)=r7) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r5, 0x84, 0x107, &(0x7f0000001c40)={r4, 0x9, 0x3, 0x4, 0x9}, &(0x7f0000001c80)=0x18) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x26, &(0x7f0000001cc0)={r8, 0x80000001}, 0x8) cpuset_getaffinity(0x3, 0x6, 0x9d, 0x8, &(0x7f0000001d00)) ioctl$OPIO_DEADKEYMAP(r6, 0x862a6b09, &(0x7f0000001d40)={0x81, [{0x9c, "c3cea6ff871f0e949c777a948de5287a1932bd069a397cb3aabbd7d5fd3e430d123d0c458c66b24063806b1666355aa6a2da8bdef3a5e5989fbde8f66df8788e060837048413e2346751404aa5399e7dcdb6c5702faa08496793ee7d94dd25d7bc30af6847dc59ed"}, {0x5, "b9f55c546692bdf55e18af329366db2371b639fc1aa728003110f6a8960435e728705c3fd1ba85ff5fb16b685cc5e89cd6ece8ec9351f4b01e15b2f4e6a57f4bbef47a48fb81f69621617cfd345dac42dc956f3865529c2104a0657901a3a3b7241e4dfe213273ba"}, {0x0, "dd013e095f6f0dd0c22eb1428246908faee31ff55777b03812bc917361a35cd4ad7af1f54561b414820fd371a34c8cc6025f861b7f716218bde694be1fcbf5d476bc9bafd93824b497753fb784bf5874db098856b5d9c84a52dc29eb484345e700e96b5ef02fc066"}, {0x7f, "2193201085316c3d4809bfbbc77b0f4a5c3475ae66249d8e1a971ae58066751240e521a8e9ba507151dc0900ac54a7d913b139e329aa732376a853aa490d0c7b2b74d2bb89d20fd68110549a37d22bf9be477ce956eed01bf316dfd7642a618a9c6f6fbbf85455f0"}, {0x3, "928bbf1323f97beae310c8c6ca21907e4a80e0895cdb8446509210d741e4d4048dcda734df80934129451c5bddd278f4c27bec672348272801526f398739497cd36187bc0a2644ae21ec4891801c79e4fbe068b4441bb18465e732f533f09e66577775f2d24506a5"}, {0x5, "a4dc3c5584791ed41e958d245678319405ee89eba0265d92fcd4fde5b5d2c40ed4f3f1b0207ea7fd18fed497cae568d908211b3f1f1acde4b8dd97a4e34295420762cfae2a1acf5865f09559288e78b21e8572875a2a1dd0dc67423f5a53f68165f2a5dfc8c24931"}, {0x80, "2ff8e69dbd396017cbb58d39b5a0e1bf2f7626f19f56640970abbcfc3be6913905b64b14e6d851421f04e99a7d10785b7be7f151d01858949a15a42fa1ee9347b7479a88b15d0d953df928140c290c4561cd9f61b9dedf44ad92a2e24479a864dcaf0e3e5bd4673d"}, {0xea, "08b3a047a62b1f20a53dc2f90f543446ba50651f51eadfe8d599ea15bcb35698a7668d1303b4fca7bf0bae1a7aad3cac63553c4d866118d3b4e52715b4fb45019cd8381a246f36a1428a803e00ca3952653501b7d18aa1212491e7c75f23a18ca137d7b47877fc62"}, {0x0, "deb245981c7455b19d69813a753b4c4fa57cfafac8af86844253e0ecc3e3d5a02e1145c04f53b2f02d3935a8d3407e170afb826ad6877d094800fc1634dddd4b8f2e70fb23562c23724e26775aada0056557292d4b1fb13e4157242a955e109cc5f38f00e7445eb1"}, {0x4, "6d9788de1dead731fb4006e754c14b238d32d5d2f62384f6cc43ce1518d497a863934c63861a5bb788d41ff18bc9b52e80022f8b2ab6f4e5ebc7cd40438f34bda396d5ac70e4fab62aba6defa28a5b8a7827f9ce3d48d158849283a2ddf699a3d0ac7d644fd8d151"}, {0xa, "c21ce73b11b8c7215e03643ae032ed9680e6861db9bc9754152f4d1ed799935fe73e7cd46803d533b3f55d2e1b0dc081f2b3d0da2541cbcee3316f70c461db72ad3879cff8ad6458495028d3dd740454472c2a4395e71e9758064156c3135f99e5eeb35f017b6ac0"}, {0x5, "e79461917d7fba9b246cace9e108ca23353490708b7a0435c2bc17d07526d3e5f600fc16326736c550d04901ff108da6f89fa9d27710e79b22c517cbe83dc3e396de43a1e08132b2d5071bce1fac8e3be48e838b03f535994d7a6c72bb07ff995bc325405b2386da"}, {0x6, "00a36ae96a0d0fc353c7b3516f2abd4457073e7ccfeab39dfd3ae87f8c04d8ffa414bb404511e60b2ee66d9a04738bb6ac09c2125a325d04e35812b86e26ed3efc9f3870fca192303f2aec01757040faedfb4231d110c3e1e2cd6f0a6bc87016bd403a31f2f9f6b0"}, {0x2, "b3abc75de90699efefd88851f20c30d93955fffdb4e4b60caf7e206665f850b5977199662a5c63152379f16abf9bedb7e7a9607fb1d5e62f1c241d5fe2e83531ad471e30fc40f70fbc5715ae80faa51554e42ab74f4fc823956ffbf9a48980161a88286276305081"}, {0x6, "f154920299cd03f380d94c62c96e2511e66512daa33c42378cbe7710ca8357ccf3285caa6a9f0d5fa4f4632e6b5b9654f6dec054c09b0850c93b1c759c93b8ef1929fd6100c6b6f66b1353bc1635686b4b079bd59bfd9abb2a1f71375033f48ee6373479063f1e25"}]}) pipe2(&(0x7f0000002380), 0x4) r9 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r9, 0x84, 0x3, &(0x7f00000023c0)={0xfff8, 0x6, 0x3, 0x7}, 0x8) syz_emit_ethernet(0xf8, &(0x7f0000002400)={@remote, @broadcast, [], {@ipv4={0x800, {{0xe, 0x4, 0x1, 0x6, 0xea, 0x68, 0x8, 0x4, 0x33, 0x0, @broadcast, @local={0xac, 0x14, 0x0}, {[@generic={0x1, 0x5, "9b7a3a"}, @rr={0x7, 0x1f, 0x1, [@loopback, @multicast2, @multicast1, @loopback, @multicast1, @empty, @broadcast]}]}}, @udp={{0x1, 0x2, 0x8}, {"a54f580d80e98cf4fef95d810f6d4c366d607b9cb152bdb7e819fc093c8863f19b1021e5eff71ddefea14fb385b5237f19889f17ed853644d13949471af582651d4077f949d54885f1563dc3f32473ddd2d5d3b0753d642d7be83d4c968893ccd182a4728f53e75ed9569b85f86c9f4281f869cc732f21dcc3c3a44fd98b26d991323308a58ce4f257328de9aa5d74d529c6f880e61c26cbaa9aca267e917a297b751f1451803ca11943"}}}}}}) getsockopt$sock_int(0xffffffffffffff9c, 0xffff, 0x0, &(0x7f0000002500), &(0x7f0000002540)=0x4) copy_file_range(r6, &(0x7f0000002580)=0xf1, r0, &(0x7f00000025c0)=0x2, 0x6, 0x0) 3.928666726s ago: executing program 3 (id=334): sigaction(0x38, &(0x7f0000000040)={&(0x7f0000000000)="66822f00c4e1781422c4e1fc2f7a3cf390660f3840570ec4c1a15e20c4e285ba05aa39d090c4c3950e33c0c4e3f917bd00000100e23ef2d5ff", 0xa, {[0x6, 0xed9, 0x0, 0xfffffff9]}}, &(0x7f00000000c0)={&(0x7f0000000080)="64642ef30fc2c50f8fe84897af5604000000d8d266660f3a619b1bec09e5ef640f38005d1d0f6e3fc4c15de4d0c4c3b5ce2136c4c1fc5b2f0f63777c"}) kmq_notify(0xffffffffffffff9c, 0x0) r0 = getppid() procctl$PROC_REAP_RELEASE(0x0, r0, 0x3, 0x0) sigaction(0x69, &(0x7f0000000180)={&(0x7f0000000100)="c4e1fa70a0000000004bc4c3656bc022c4e295bca455e8e70000c4e1d1f43f8fe978c632660f3810abb83500001c003e0f109d6bde00008fe97882b401f71fda430f18d1", 0x8, {[0x9, 0xfffffff7, 0xb52, 0x4]}}, 0xffffffffffffffff) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) fchmod(r1, 0x13) r2 = kmq_open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x20, &(0x7f0000000200)={0x4051, 0xda, 0x7, 0x1ff}) kmq_timedreceive(r2, &(0x7f0000000240)=""/7, 0x7, 0xd, &(0x7f0000000280)={0x8001, 0x7}) r3 = socket$inet6(0x1c, 0x5, 0x3) listen(r3, 0xffff) setsockopt$inet6_tcp_TCP_FASTOPEN(r3, 0x6, 0x401, &(0x7f00000002c0)={0x699, "c015643188388aff7752daf53fcfd48a"}, 0x14) freebsd11_kevent(r2, &(0x7f0000000300)=[{0x3, 0xfffffffffffffff3, 0x1a, 0x400, 0x8, 0x8}, {0x9, 0xfffffffffffffffe, 0x0, 0x2, 0x2, 0x5}, {0x8001, 0x7ffffffffffffffe, 0xc0, 0x80, 0x60a, 0x5}, {0x8, 0xfffffffffffffff5, 0x8000, 0x4, 0x0, 0x3ff}, {0x400, 0xfffffffffffffffb, 0x66a6c8f311a8009, 0x4000000a, 0x9, 0x5af}, {0x1, 0xfffffffffffffffc, 0x8044, 0x80000000, 0x4b, 0x3}, {0x8, 0xfffffffffffffff9, 0x5, 0xffffff, 0xc, 0x6}, {0xfffffffc, 0xfffffffffffffffa, 0x2005, 0xc0000000, 0x10000, 0x6}], 0x8, &(0x7f00000003c0)=[{}], 0x1, &(0x7f0000000400)={0x9, 0x4}) listen(r1, 0x401) sigqueue(r0, 0x2a, @sival_int=0x8000) freebsd10_pipe(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = accept4(r3, &(0x7f0000000480)=@un=@file={0x10a, 0x0, ""/264}, &(0x7f00000005c0)=0x10a, 0x10000000) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r6, 0x84, 0x101, &(0x7f0000000600)={@in6={{0x1c, 0x1c, 0x2, 0xc039, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}}, 0x0, 0x7ff, 0x0, 0x8001, 0x6, 0x2b1e}, &(0x7f00000006c0)=0x98) issetugid() cap_ioctls_limit(r4, &(0x7f0000000700)=[0x2, 0xfffffffe, 0x0, 0x5, 0x3]) freebsd11_stat(&(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setregid(0x0, r7) connectat$unix(r5, 0xffffffffffffff9c, &(0x7f0000000800)=@abs={0x8, 0x1, 0x0, 0x3}, 0x8) rtprio(0x1, r0, &(0x7f0000000840)={0x4, 0xc}) aio_write(&(0x7f0000000a80)={r4, 0x1ff, &(0x7f0000000880)="65a09ffce9740b3d0a25e78f76ade5b1877f1e57d3692d904fcb09d6583b6698bf71cef377468e2729bb847161dbfcb42df82612f3dbf4f9f459fc5b8d4c99b41af6563d354b70b005f30de0554b2d2ba54c87b506efe7125c31fe127dc7c23f7542337888f66d08214cb4827aac8c42e413a4f9e9ef9de414ee6842ec909ba996fe4f19962889e6d4dd6b04b766103e02f71aee51e1368045a709fd8c813c470a99afe35a53d9cdb074fdaa34489e0a1e9d25c3d0732732143cf5d97cf89f88bf431828aad0f2488c638b6c80c4b085b570775044638396b4c4c0b7f59ba7b47b671ddc78bc27826abd", 0xea, [0xb303, 0x99], 0x5, 0x0, 0x5, {0x7, 0x4, &(0x7f0000000980)="3a1306e33cb5c1c89233500afaadf1dbd75b61caf0d36254da9c6ced7adfddfd7723fa7f4328c53ee7324df92ac6b6db18f2103ee985c6a2d0cb3119eabd46004c4d97071ff7790e0c46fa09b265352c8c7dd0cbdf01811d2a7863b155acd5dfba02b3d62ae9bebe23bdc87f453d35eb993c6f9a9e56ea96beb4e39857737fd4e7676da32019f8f4f95a365101f70f2c62eeeb000a6928be1c14f42f0ff3f8825bd4dc3f8f25f5136449bba88cc2998c1c730f71ff12caf3416c5937f16d638b7dec99a95d43ac56725e0d6716cc9ee0680f5220496e140ad234e2e8"}, {0x2, 0x1e, @sigval_int=0xb, @tid=r0}}) sigaction(0x69, &(0x7f0000000b40)={&(0x7f0000000b00)="0f01051fd70000c4c239bc71a00fae79e83edbf6c4e24d0378c4c4e2a139a362810000f20f5ec7c4c1e210df660f6b32c4c1e976e0", 0x68, {[0xc877, 0xfffffbff, 0x2, 0x5]}}, 0x0) sigaction(0x70, &(0x7f0000000bc0)={&(0x7f0000000b80)="c4e1756cf4c4c16573de060f2ababf938a4fc4e3d55fdab165c0a1feefffff04c4c3c17914e300c4c1a4577200d9eef0ff4000c4c2fd2a9c1500800000", 0x24, {[0x4, 0x2, 0x4, 0x9]}}, &(0x7f0000000c40)={&(0x7f0000000c00)="c4c2193c4c48fcc4c271051579000000da18f30f1bd9c4c1e556fe6566f30fbcd20fd5b8cd8f30a2660f38012a660f3a22b6ac00000000670f113e0700"}) rename(&(0x7f0000000c80)='./file0\x00', &(0x7f0000000cc0)='./file0\x00') r8 = getpid() procctl$PROC_REAP_ACQUIRE(0x2, r8, 0x2, 0x0) 2.015648068s ago: executing program 0 (id=335): r0 = openat$kbd(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) ioctl$KDGETMODE(r0, 0x40044b09, 0x0) r1 = kqueue() chflagsat(r1, &(0x7f0000000040)='./file0\x00', 0x200, 0x400) r2 = socket$unix(0x1, 0x5, 0x0) r3 = accept(r2, &(0x7f0000000080)=@in6={0x1c}, &(0x7f00000000c0)=0x1c) syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) freebsd11_getfsstat(&(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x1d8, 0x1) r5 = getgid() fchown(r2, r4, r5) mlock(&(0x7f0000ffb000/0x3000)=nil, 0x3000) ioctl$KDMKTONE(r0, 0x20044b08) setsockopt$inet_sctp_SCTP_BINDX_REM_ADDR(r3, 0x84, 0x8002, &(0x7f0000000340)=@in6={0x1c, 0x1c, 0x3, 0x4, @mcast1, 0x3}, &(0x7f0000000380)=0x1c) getfh(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) setsockopt$inet6_sctp_SCTP_BINDX_REM_ADDR(r3, 0x84, 0x8002, &(0x7f0000000440)=@in6={0x1c, 0x1c, 0x3, 0x6, @mcast2, 0x5}, &(0x7f0000000480)=0x1c) freebsd12_shm_open(&(0x7f00000004c0)='./file0\x00', 0x200, 0x3) open$dir(&(0x7f0000000500)='./file0\x00', 0x80000, 0x1) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000840)={0x0, 0xc60}, &(0x7f0000000880)=0x8) sendmsg$inet_sctp(r3, &(0x7f0000000940)={&(0x7f0000000540)=@in={0x10, 0x2, 0x0, @multicast1}, 0x10, &(0x7f0000000800)=[{&(0x7f0000000580)="89684e5d3efb5216822ff71b970af7693827191be7d6a88628aadf1ef3ac7ec8987c2a4fa11fbdf8b84db180716db5426acb6a87f8cbf8c73b1fb1c7befa385d57a24323ad922ea12bda7858689c25845222ae000384bc760b6518128fbab53ad990645e8ac1a8ce5b6b1c074921a90bda33baf5d8c4d2c6a8a1924434d336eda315e7c1216aa1795cc8b7ef8dd24c6f649eecefdd0aa09434a3f6aad67fa3079f2624cb6b3ef2da1b998bab9dfe77bfc8d7b4733957f4958b10d3", 0xbb}, {&(0x7f0000000640)="374b1ce13c45d1fd3d49be625d69bfb28a1876c502a80a3c1c09d165bd9e0aee53e9cf5e31b07aec21f040b794d3bd5e53425087020bedb7b2662d745c81779df3735d78fd6ba6d5f551b67e7acd4a85fec16798e5e33d7136cfb77ae1c9bff82553eef26237c4ee7cce4286694bcaa1b96e272d007a62eabf82aad5e9ac03d0afef5f032c32e6f006783d82d3803a04e4b2d1ff3b16bdb5fb4989152748fbf8564f6f5a73ef4e8ce3ae80ce7766f00f71ae637d8259b8766828728fa75909edf6643791c6138bfdc92b24b9c6420b6f20cb764dd374e4b24b13e04a3d619bc15ac5f3f74570eb1e05a5d8aa", 0xec}, {&(0x7f0000000740)="ac94329474a1b04de92329b25853d3d90fdd8229fa9ff2c372509e71618db2dbc37a6371528886c84e7b0e4ba9f661b3f92e05397c39f51e3d34b20f2aaa9565eee78dc7378d69f9099158f3cce3a888921e1afd155318675edd9d21c7a837a95a5bc2dab07e778a367e1aa09386bff211e6a5b8505484ad58f6ed3e7d08cf0011bc74920982955d44fb27", 0x8b}], 0x3, &(0x7f00000008c0)=[@sndrcv={0x2c, 0x84, 0x2, {0x9, 0x4, 0x110, 0xfff, 0xb, 0xfffffff8, 0x7, 0x6, r6}}, @authinfo={0x10, 0x84, 0x8, {0x1}}, @dstaddrv4={0x10, 0x84, 0x9, @remote={0xac, 0x14, 0x0}}], 0x4c, 0x4}, 0x4) setsockopt$inet6_sctp_SCTP_CONNECT_X(r3, 0x84, 0x8007, &(0x7f00000009c0)={0x9, &(0x7f0000000980)=[@in={0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}]}, &(0x7f0000000a00)=0x8) pipe2(&(0x7f0000000a40)={0xffffffffffffffff}, 0x100004) setsockopt$inet6_udplite(r7, 0x88, 0x2, &(0x7f0000000a80)=0x8000000, 0x4) shm_open2(&(0x7f0000000ac0)='./file0\x00', 0x200, 0x99, 0x1, &(0x7f0000000b00)='[]*)&\\\x00') freebsd11_kevent(r0, &(0x7f0000000b40)=[{0x662c, 0xfffffffffffffffe, 0x20, 0x80000000, 0xb, 0xffff}, {0x6ce, 0xffffffffffffffff, 0x8002, 0x1, 0x6, 0xfffffff7}, {0x7, 0xfffffffffffffffc, 0x20, 0x208, 0xffff0000, 0xa}], 0x3, &(0x7f0000000b80)=[{}, {}, {}], 0x3, &(0x7f0000000bc0)={0x1, 0x1}) sync() fhlinkat(&(0x7f0000000c00)={{[0x1, 0x4]}, {0x7f, 0x699, "9245d6d95616df8157ada761ef4aea45"}}, r7, &(0x7f0000000c40)='./file0\x00') r8 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r8, 0x84, 0x101, &(0x7f0000000c80)={@in6={{0x1c, 0x1c, 0x2, 0x5, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x6}}, r6, 0x1, 0x4, 0xe8, 0x1, 0x5}, &(0x7f0000000d40)=0x98) getsockopt$inet6_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x108, &(0x7f0000000d80)={r6, 0x5f8, 0x0, 0x7b, 0x3}, &(0x7f0000000dc0)=0x18) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x23, &(0x7f0000000e00)={0x1c, 0x31, '\x00', [@generic={0xf9, 0x3c, "ea20f8015d39a816e335420eed158c785a85b2f2e1361c0101294a0174ecd85a046e1d7f456aee5b0acc8070397b5fc10a4e4c82640818e40fcf3c4e"}, @generic={0x2, 0x7d, "c3f885389fc7cd498e11c0d522e33d0280d45ebed4f391ffe2863d7db6583ce9e5af76cdec6a1c7f6a19d9b669ca0111fb934e1f55f028b94d18f3623bd6ff3a830b34338c82f5001f4ae1dbced40ab1b36b00c4b962f58b3aadfe82328cffcb166e9acff62ba11416fe83ce800e46994aab6566e346d5ab3c3960d109"}, @generic={0x6, 0x70, "ff2e710abcbd71ddd88e2865c8adce7ff793b1a833258a44bbafd86d5ed177c77da58af82b95adc759d59feac0caa781420d631a6d35ab1c150d90122242d1cd84d6d692e0c59e323995c0819ab7a61329a7bf384a804772b9457c55a988181d15e79dfb00bf9b1401f09cb48249ac35"}, @jumbo={0xc2, 0x4, 0x7}, @enc_lim={0x4, 0x1, 0x3d}, @ra={0x5, 0x2, 0x7}, @pad1, @pad1, @generic={0x9, 0x47, "1cbe00206fd534a636a1709512c46f0d2b1c85792fa8af8b6bd74f6460fdb9009b023e77722185f937fa7fa144e2e57702fa2bf1f21e333f67d749b176c861ebbbfb3c0a298bee"}, @pad1]}, 0x198) 2.015184511s ago: executing program 2 (id=336): r0 = open(&(0x7f00000000c0)='./file0/file0\x00', 0x80000, 0x611b2c1dda882c14) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x27, 0x0, 0x0) syz_emit_ethernet(0x7a, &(0x7f00000003c0)=ANY=[]) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x8, [0x0, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaafffffff7c96902ea88bba59affffff86dd60aee19d00183aff78042000000014000001000000086500ff0200000000000000018800fb2e950aed0000fe800000000000000000000000f7ffbb0000000000"]) open(0x0, 0x80000000000209, 0x0) syz_emit_ethernet(0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) fork() poll(&(0x7f0000000000)=[{r0, 0x2000}, {r1, 0x20}], 0x2, 0x10000008) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000b5e9cc02000000080045000000026a9078e0000002e00000024e439d6f63e809b15ee9f01f8c4a7456ccb512c5804bd7066c314269a70d4c7e569310988e3f7c014ca1b5e1ee5619928227df2d99974109a6cd711ae035d7cd41b43c54b201cf12c40887efcb000000000000000000020000814200000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="501000a790780406"]) r2 = shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) shmat(r2, &(0x7f0000ff7000/0x3000)=nil, 0x400c) ktimer_create(0x4, 0x0, 0x0) lio_listio(0x1, 0x0, 0x0, &(0x7f0000002c00)={0x1, 0xa, @sigval_int=0x6, @ke_flags}) sigaction(0x4a, &(0x7f0000000180)={&(0x7f0000000140)="c4c1cd63b9d0280000f364f30f8500000000f087149ec4c27958b000000000c4c2ad3f0bc4e189f96a04f30f1efcc4e26ddfab00000000f3262efb666566f3ae", 0x68, {[0x2, 0x7fff, 0xea7, 0x7fb]}}, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x8) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x2, 0x1, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000240)={@broadcast, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "417991", 0x8, 0x3a, 0xff, @empty, @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@echo_request={0x80, 0x0, 0x0, 0xb117, 0x5}}}}}}) bind$inet(r4, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f0000000180)={'freebsd\x00', 0x10}, 0x24) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x4) bind$inet6(r5, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0) socket(0x1c, 0x1, 0x0) 2.014694053s ago: executing program 3 (id=337): aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) socketpair$unix(0x1, 0x5, 0x0, 0x0) shutdown(0xffffffffffffffff, 0x2) sendmsg$unix(0xffffffffffffffff, &(0x7f00000003c0)={0x0, 0x52, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRES32], 0x28, 0x3010b}, 0x9) rfork(0x1010) socket(0x1c, 0x1, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) freebsd10_pipe(0x0) r0 = kqueue() kevent(r0, &(0x7f0000000000)=[{0x3, 0xfffffffffffffffe, 0xc1}], 0x1, 0x0, 0x0, 0x0) extattr_list_fd(0xffffffffffffffff, 0x2, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000340)=[{0x3, 0xfffffffffffffffe, 0x45}], 0x1, 0x0, 0x0, 0x0) rfork(0x85000) r2 = socket(0x1c, 0x1, 0x0) r3 = socket(0x1, 0x5, 0xfc) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x2}}, 0x1c) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r4, 0x29, 0x1b, &(0x7f0000000380), 0x4) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x5, &(0x7f0000000080), &(0x7f0000000300)=0x4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) mkdir(&(0x7f0000001040)='./file0\x00', 0x1) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) rmdir(&(0x7f0000000100)='./file0\x00') rmdir(&(0x7f00000002c0)='./file0/file1\x00') cpuset(&(0x7f0000000000)) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$sock_int(r5, 0xffff, 0x4000, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 1.261681ms ago: executing program 0 (id=338): r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r0, 0x3862) open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r1 = kqueue() r2 = dup(r1) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) r3 = kqueue() r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x11, 0x10000000000003, 0x0) sendto$unix(r5, &(0x7f0000000140)="b10005059000e803480308c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200", 0x9b, 0xd, 0x0, 0x0) syz_emit_ethernet(0x4e, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f00000004c0)={0xb, 0x0, 0x8, &(0x7f00000010c0)="ec7b00000900ff24", 0x0, 0x0, 0x0, 0xfdffdf85, [0x0, 0x0, 0xffc]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, 0x0) kevent(r3, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) ktimer_create(0x0, 0x0, &(0x7f00000014c0)) ktimer_create(0x0, 0x0, &(0x7f0000003100)) ktimer_create(0x0, &(0x7f0000003140)={0x0, 0xd, @sival_ptr, @spare}, &(0x7f0000003180)) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r7, 0x0, 0x1, &(0x7f00000002c0), 0x0) sendto(r7, &(0x7f0000000200)="a864735a01fc849e37ff36cf723a5e79a3a47edbb3d454c619502e2847f145f0109f8a1e7cd8e269fa06ec53984a36d42e37c59a722c5315bc0808557ea5a2267fb813a912101c8aa49da0f06b0234706ed69701321b9ea0bffff6db37ad3fb7dd61d2c4ba04a66e09f4b385e1fbb35046ffa32442ce071194a9b22197220c2f16449029aa0a385913949d3f14ed1fec949bda725a890d3ba23f597bece93850f35fb8511f1318ad581ad65c4e3d96dc3164c0f865d382fe6d59fec45ccfbeed6206355b2bfd", 0xc6, 0x0, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x1, 0x1, @rand_addr="8b7d91b6f88a54da1b2d34e5c2a2bc28", 0x80}, 0x1c) thr_suspend(&(0x7f00000000c0)={0x0, 0xfffffffc}) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 431.685µs ago: executing program 2 (id=339): ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0xffff674d, 0x2, 0x3, 0x80000000]}, 0x10) ioctl$OGIO_DEADKEYMAP(0xffffffffffffffff, 0x462a6b08, &(0x7f0000000840)) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000004c0)=ANY=[], 0x28) socketpair$unix(0x1, 0x3, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r0, &(0x7f0000000240)=@file={0xa, 0x1, './file0\x00'}, 0xa) kevent(0xffffffffffffffff, &(0x7f00000006c0)=[{0xfffbfff6, 0xfffffffffffffff9, 0x4009, 0x1, 0xcf0, 0xc, [0x0, 0x2, 0x8000009, 0x40000000000000]}, {0x40000, 0xfffffffffffffff5, 0xc01a, 0x1, 0x5, 0x688c, [0x8, 0x100, 0x4, 0x8c]}, {0x10000000, 0xfffffffffffffff8, 0x16, 0x10, 0x1, 0x3, [0x4, 0xfff, 0x7, 0xffffffffffff8001]}, {0x2, 0xfffffffffffffff8, 0x20, 0x10, 0xd3dc, 0x4, [0x2, 0x3, 0x2, 0x2]}, {0x8, 0xffffffffffffffff, 0xd2, 0x80000000, 0x30e, 0x10007, [0x8, 0x2003, 0x8, 0x5b42]}, {0x2, 0xffffffffffffffff, 0xc011, 0x100, 0x9, 0x201, [0x3, 0x8, 0x9, 0x1]}], 0x6, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) kqueue() openat(r1, &(0x7f00000002c0)='./file0\x00', 0x0, 0x6c) r2 = open$dir(&(0x7f0000000280)='./file0\x00', 0x400, 0x24) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x26, 0x2, 0x0) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0xa, &(0x7f00000001c0)={@in={{0x10, 0x2, 0x0, @multicast2}}, 0x0, 0xf469, 0x0, 0x291, 0x8, 0x3, 0x5}, 0x98) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000080)={0x29, 0x0, 0x20, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x4, 0x4, 0x1000]}) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x8, 0x6, &(0x7f00000003c0)="34245e85c161c3bb020a9e6b365466db4b4b6fdfb3676d05bc204aa5311a0dc45b4245e26349074a0bb3957d9672c5fd5fa0f0b0d59f789c9927caa2b03b34d00740653ce5a00526dec0734f56ba4a341404ba04e3e4a0dcb35034af401c76ff68bc74db8496f2bcfb8ec00f89eeba856d3b5615da151542c3a1872ba0f42c1809033c83ac949cf5e972ba7b1bff84d950fed747cff73ac7b8bd07272d20bd5ea0e6b7138dcdbba3a453fcbf41bff78dbb9f08000b5f8170ded3592c4bb4f30e", 0x0, 0x0, &(0x7f0000000340)="cbca4ae3e122c443302ffdd81c9da70df68664d9011b7fd7ab6ce481085bc937845e838ef134d2783addda6cc724bc60ea1f7d0d58ebff78f710c60a2caabfa4851cfab20f80e74249bedb480fcf557b9f006c831b7e42b411289c74210757dc478f"}) extattr_delete_fd(r2, 0x0, &(0x7f0000000040)='\x00') ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) socket(0x2, 0x1, 0x0) pipe2(&(0x7f0000000480), 0x0) setrlimit(0xa, &(0x7f0000000100)={0x60000000, 0x62000404}) r6 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3b, 0x0, 0x0) r7 = socket(0x11, 0x10000000000003, 0x0) setitimer(0x2, &(0x7f0000000180)={{0x3, 0xf423f}, {0x0, 0x2710}}, 0x0) setsockopt$sock_int(r7, 0xffff, 0x40, 0x0, 0x0) sendto$unix(r7, &(0x7f0000000140)="b10005019000e803480308c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a300a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x20000, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 0s ago: executing program 3 (id=340): setgroups(0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x167) aio_waitcomplete(0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f00000004c0)={0x16, 0x0, 0x10, &(0x7f00000000c0)="ec7b00002cfeff02000000000000007f", 0x0, 0x0, 0x0, 0xfdffef89, [0x0, 0x0, 0x40000]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x8000, &(0x7f0000000140), 0x0, 0x0, 0x0}) r1 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffff0000000000000800450000700000000000019078e0000002e00000020b01907800007e00451c000200000000006c00007f000001ac1400bb891b00ac1400bb00000000ac1400aaffffffffac1400bbac1400bb831300ac1400bb00000000ac1400aae0ffff00000000e000000200"/126]) open(&(0x7f0000000380)='./file0/file0\x00', 0x200000, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000000)=[{0x3, 0xfffffffffffffffe, 0x80c3}], 0x1, 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) openat$crypto(0xffffff9c, &(0x7f0000000040), 0x40000, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) chmod(&(0x7f0000000400)='./file0\x00', 0xb15c7135d99ca56b) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) pipe2(&(0x7f0000000480)={0xffffffffffffffff}, 0x0) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1b46d00, &(0x7f0000000100)={0x6, 0x0, 0x4, 0x0, 0x400000000800, 0x0, 0x7, 0x0, 0x0, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffff, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x20002, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x4, 0x8000, 0x9, 0x0, 0x0, 0xfe, 0xffff, 0xfffffffc, 0x0, 0x1000, 0x0, 0x9, 0x0, 0x0, 0x81000001, 0x0, 0x8, 0xb9, 0x0, 0x203, 0x0, 0xe, 0x4, 0x0, 0x10001, 0x7c, 0xfffffffd, 0x3ff, 0xfffffff9, 0x0, 0x8, 0x0, 0x0, 0x2]}) setrlimit(0xf, &(0x7f0000000100)={0x60000000, 0x62000000}) writev(r3, &(0x7f0000002340), 0x0) execve(0x0, 0x0, 0x0) r4 = socket$inet_tcp(0x2, 0x1, 0x0) dup(r4) setfib(0xffffff00) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) utimes(&(0x7f0000000100)='./file0\x00', 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.33' (ED25519) to the list of known hosts. ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0058574000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 Expensive callout(9) function: 0xffffffff81a5cc10(0xfffffe006dee6540) 0.004528818 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000 Expensive callout(9) function: 0xffffffff81ad7ae0(0) 0.005915657 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058574000 lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe0058125688 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1688 2nd 0xffffffff83cccac0 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1387 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff81681891 at witness_checkorder+0x781 #1 0xffffffff81506877 at __mtx_lock_flags+0x187 #2 0xffffffff8186b5cc at tunifioctl+0x15c #3 0xffffffff818467fe at ifhwioctl+0xefe #4 0xffffffff8184a9f2 at ifioctl+0xde2 #5 0xffffffff8169063a at kern_ioctl+0x4ca #6 0xffffffff8169007e at sys_ioctl+0x36e #7 0xffffffff82165702 at amd64_syscall+0x4e2 #8 0xffffffff82109d4b at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff81682762 at witness_checkorder+0x1652 #1 0xffffffff81570509 at _sx_xlock+0x139 #2 0xffffffff8186b4fa at tunifioctl+0x8a #3 0xffffffff818476ab at ifhwioctl+0x1dab #4 0xffffffff81868f62 at tunioctl+0xd92 #5 0xffffffff811dd876 at devfs_ioctl+0x266 #6 0xffffffff82327ce7 at VOP_IOCTL_APV+0x87 #7 0xffffffff817edec7 at vn_ioctl+0x3c7 #8 0xffffffff811de739 at devfs_ioctl_f+0x69 #9 0xffffffff8169063a at kern_ioctl+0x4ca #10 0xffffffff8169007e at sys_ioctl+0x36e #11 0xffffffff80442dd7 at freebsd32_ioctl+0x607 #12 0xffffffff822efc12 at ia32_syscall+0x4d2 #13 0xffffffff8210a5af at int0x80_syscall_common+0x9c if_delmulti_locked: detaching ifnet instance 0xfffffe0058574000 lock order reversal: 1st 0xfffffe0077948908 ufs (ufs, lockmgr) @ /syzkaller/managers/i386/kernel/sys/kern/vfs_subr.c:3386 2nd 0xffffffff830019c0 proctree (proctree, sx) @ /syzkaller/managers/i386/kernel/sys/kern/subr_prf.c:185 lock order proctree -> ufs established at: #0 0xffffffff81681891 at witness_checkorder+0x781 #1 0xffffffff814e8946 at lockmgr_lock_flags+0x1d6 #2 0xffffffff81dc327b at ffs_lock+0x18b #3 0xffffffff8232a5e7 at VOP_LOCK1_APV+0x57 #4 0xffffffff817f2d9e at _vn_lock+0x14e #5 0xffffffff817f3648 at vn_close1+0x1e8 #6 0xffffffff814da23a at ktrops+0x41a #7 0xffffffff814d99ad at sys_ktrace+0xaed #8 0xffffffff822efc12 at ia32_syscall+0x4d2 #9 0xffffffff8210a5af at int0x80_syscall_common+0x9c lock order ufs -> proctree attempted at: #0 0xffffffff81682762 at witness_checkorder+0x1652 #1 0xffffffff81572ddf at _sx_slock_int+0x13f #2 0xffffffff8163f08d at uprintf+0x14d #3 0xffffffff81def5df at ufs_rmdir+0xdf #4 0xffffffff8232928d at VOP_RMDIR_APV+0xcd #5 0xffffffff817e789a at kern_frmdirat+0x87a #6 0xffffffff822efc12 at ia32_syscall+0x4d2 #7 0xffffffff8210a5af at int0x80_syscall_common+0x9c if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 ZFS filesystem version: 5 ZFS storage pool version: features support (5000) if_delmulti_locked: detaching ifnet instance 0xfffffe0058574000 Out of ktrace request objects. vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe006de846e0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371b820 usecount 6, writecount 5, refcount 69 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0054150c98 ref 1 pages 536 cleanbuf 64 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe00541a8780 (pid 1137, syz-executor, tid 100869) nlink=1, effnlink=1, size=2147483650, extsize 0 generation=d3b9948d, uid=0, gid=0, flags=0x48008 ino 147, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 SYZFAIL: cover mmap failed (errno 12: Cannot allocate memory) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=1 req=293 state=1 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-0.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl