last executing test programs: 38.096026988s ago: executing program 3 (id=70): getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xb, &(0x7f0000000000)={0x3, 0xc, 0x400, 0x5, 0x80000001, 0x8000, 0xe74, 0x9, 0x0}, &(0x7f0000000040)=0x20) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x29, &(0x7f0000000080)={r0, 0x1}, &(0x7f00000000c0)=0x8) madvise(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3) madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) cap_enter() openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x8000, 0x0) cap_enter() r1 = accept4(0xffffffffffffffff, &(0x7f0000000140)=@un=@abs={0x8}, &(0x7f0000000180)=0x8, 0x20000000) getsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x23, &(0x7f00000001c0)={@in={{0x10, 0x2, 0x1, @multicast2}}, r0, 0x1631, 0x6, 0x9}, &(0x7f0000000280)=0x90) getsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f00000002c0)={r2, 0x6, 0x2, 0x2dc28221, 0x8, 0x5}, &(0x7f0000000300)=0x14) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x80000, 0x1) symlinkat(&(0x7f0000000340)='./file0\x00', r3, &(0x7f00000003c0)='./file0\x00') getsockopt$inet6_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x8, &(0x7f0000000400), &(0x7f0000000440)=0x4) bind$bt_rfcomm(r1, &(0x7f0000000480)={0x4, 0x1, 0x6, 0x5}, 0x4) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f0000000600)={r2, 0x8}, &(0x7f0000000640)=0x8) sendmsg$inet6_sctp(r1, &(0x7f0000000740)={&(0x7f00000004c0)=@in={0x10, 0x2, 0x1, @remote={0xac, 0x14, 0x0}}, 0x10, &(0x7f00000005c0)=[{&(0x7f0000000500)="519071278d35631c14f0a1f397418bd8196753c9a9483134aa04b2d3f9a03c4b7fbe598a9f8a46bcfefd4159cfe59d534aa8a2be3c0d1981c99ad1f704db3c7d6e1b4bb994ede23b1a833c3a72f451a246240a17f73f63c3edf8b1cd6168095c0a6bfbd15da427e3b7e692beb1b98d53b99c07a354f50686420f8d5e6dd7355206e69c8934840e8ef0da2af1f3daefde66", 0x91}], 0x1, &(0x7f0000000680)=[@prinfo={0x14, 0x84, 0x7, {0x2, 0x8}}, @dstaddrv4={0x10, 0x84, 0x9, @remote={0xac, 0x14, 0x0}}, @sndinfo={0x1c, 0x84, 0x4, {0x6, 0x2810, 0x1fea000, 0x2, r0}}, @prinfo={0x14, 0x84, 0x7, {0x2, 0x3}}, @sndrcv={0x2c, 0x84, 0x2, {0x5, 0x67a, 0x400, 0x8, 0xcc, 0x6, 0x4, 0x3, r4}}, @init={0x14, 0x84, 0x1, {0x704, 0x400, 0x1, 0x6}}, @prinfo={0x14}, @init={0x14, 0x84, 0x1, {0x7, 0x401, 0x7, 0x5}}], 0xbc, 0x40}, 0x20008) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x103, &(0x7f0000000780)={r2, 0x9c, "fcf1a8231c23c7981a0669ce3d427df37863dd7558723f78a139b24e2225ca2fa087b42bd7a4241babc33bd80d466b448c8361079d92910f747e122fd50375e29dd7ff552becab84bf6857c1abcc2ddb697c1dd14836d9d27cb77a6a5eb95e2c9b1fbcd3283a08f25728b981e114dfe13d226f07ef9c25f3430485b2a152700df6bfbe3613fd894f8c08823909e07de1442cd856cdd262d48020536d"}, &(0x7f0000000840)=0xa4) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_sctp_SCTP_CONNECT_X(r5, 0x84, 0x8007, &(0x7f00000008c0)={0x6, &(0x7f0000000880)=[@in={0x10, 0x2, 0x2, @multicast2}, @in={0x10, 0x2, 0x0, @broadcast}, @in={0x10, 0x2, 0x3, @multicast1}]}, &(0x7f0000000900)=0x10) mount(&(0x7f0000000940)='hammer2\x00', &(0x7f0000000980)='.\x00', 0x9400080, &(0x7f00000009c0)="abeeb56c1a216792b3515d4b992494910ba97d9c44a3fc3a35686cf80c13f1350abb0b9bb32e6c7b46") select(0x40, &(0x7f0000000a00)={0x7, 0xa, 0x9, 0x3, 0x6, 0x6, 0xc1, 0x7}, &(0x7f0000000a40)={0x8, 0x3, 0x8, 0x101, 0x9, 0x7fffffffffffffff, 0x2, 0x3}, &(0x7f0000000a80)={0x3, 0x6, 0x9, 0x1, 0x7fffffff, 0x64c0, 0x0, 0x8001}, &(0x7f0000000ac0)={0x5}) getitimer(0x0, &(0x7f0000000b00)) minherit(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0) getpeername$unix(r1, &(0x7f0000000b40)=@file={0x1fd, 0x0, ""/507}, &(0x7f0000000d40)=0x1fd) socketpair(0x1, 0x3, 0x4, &(0x7f0000000d80)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r6, 0x84, 0x24, &(0x7f0000000dc0)={0x0, @in={{0x10, 0x2, 0x0, @rand_addr=0x400}}, 0x7fff}, 0x90) shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ed1000/0x2000)=nil) utimensat(r3, &(0x7f0000000e80)='./file0\x00', &(0x7f0000000ec0)={{0xffff, 0x5}, {0x8000, 0x3}}, 0x2000) getsockopt$inet_sctp_SCTP_MAX_BURST(r6, 0x84, 0x19, &(0x7f0000000f00)={r4, 0x70ad}, &(0x7f0000000f40)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x900, &(0x7f0000001000), &(0x7f0000001040)=0x8) 37.956111876s ago: executing program 3 (id=71): r0 = kqueue() aio_error(0x0) mprotect(&(0x7f0000cc0000/0x1000)=nil, 0x1000, 0x40000) msync(&(0x7f0000860000/0x600000)=nil, 0x600000, 0x2) kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0) r1 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r1, 0x29, 0x46, &(0x7f0000000000)=0x10000, 0x4) syz_emit_ethernet(0x400e, &(0x7f0000000000)=ANY=[@ANYBLOB="3d57ad9544cbdb0cefffffff86dd6015f20a3a3a0000eee7567b2c0e280000004c1e7b3b0000fe80200000000000cdc00000000000aa"]) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_udp(r2, 0x11, 0x1, &(0x7f0000001500), &(0x7f0000000080)=0x4) r3 = open(&(0x7f0000000380)='./file0\x00', 0x80000000000206, 0x4ebfac6bbaf7949) setrlimit(0x8, &(0x7f0000000000)={0xfffffffffffffffb, 0xffffffffffffffff}) fcntl$lock(r3, 0x0, &(0x7f0000000180)={0x1, 0x3, 0x2000000000000201, 0x2}) getpeername$inet(r3, 0x0, &(0x7f0000000080)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) setreuid(0xee00, 0x0) setreuid(0x0, 0xffffffffffffffff) cpuset_setdomain(0x2, 0x5, 0x3ff, 0x20, &(0x7f0000000100)={[0xfffffffffffffffc, 0x5, 0x7]}, 0x3) select(0xfc61, &(0x7f0000000f80), 0x0, &(0x7f0000001000), &(0x7f0000001080)) syz_emit_ethernet(0x138, 0x0) pipe2(&(0x7f0000000000), 0x100000) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000380), 0x10000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f00000000c0)={0x29, 0x0, 0x20, &(0x7f0000000100)="0b6fac4103e7a00d4689e808d0d4755aedaacdd4743c7eaa2c7300d05fe86026", 0x0, 0x0, 0x0, 0x7d86699a}) ioctl$CIOCCRYPT(r4, 0xc0306367, 0x0) clock_settime(0x0, &(0x7f00000002c0)={0x3, 0x3}) openat$bpf(0xffffff9c, &(0x7f0000000280), 0x1, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) getpid() 35.526190533s ago: executing program 3 (id=75): setrlimit(0x4, &(0x7f0000000000)={0xefff, 0x28}) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) (async) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x51, &(0x7f0000000280)={0x9, {{0x1c, 0x1c, 0x0, 0xc79, @loopback, 0xa8b}}}, 0x88) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) getrlimit(0x2, &(0x7f0000000040)) 35.430896144s ago: executing program 3 (id=76): mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x3, 0x1010, 0xffffffffffffffff, 0x0) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1014, 0x0, 0x0) ftruncate(0xffffffffffffffff, 0x3862) r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) ioctl$BIOCSETF32(r0, 0x80084267, &(0x7f0000000040)={0x800, 0x200}) open$dir(&(0x7f0000000140)='./file0\x00', 0x40000, 0x110) setuid(0xffffffffffffffff) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x27, 0x0, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f0000000200), 0x0, 0x0, 0x0, 0x0) setuid(0xffffffffffffffff) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000003c0)="7daba3828001000b8f631031f7fa894f4c3d9443b527b0ab3f113063a98658426e581b203713fb585b578520fdccd6cc87fa26351960adcaacdfe571bc285caba74552c9471ce9621cadf3f269fa4f618d2adefb95537075c5fc3d25171dc0d543fb8b7e768b543ff220e3344870f5a22f3b5fc558c3f90e8bd412c02822cdae0000b77b3c152ebc17f7dbdad73be71950a16adbadd94e4967e8e22d93499e16bd3a8fce07b681ac8e3b80542ee2378bfc18d96bd7b0a10da7322d05584b6f3c06d8f7336f70e90f63932a73e8d841dae48affff0000fe926b4e9022b40d6d", 0xdf}], 0x1, 0x0}, 0x180) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DIOCNATLOOK(r1, 0x8008745b, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', r2, 0x0, 0x4000) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x7fffffff}) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x7, 0x11, 0xffffffffffffffff, 0x0) chmod(0x0, 0x0) rfork(0x85000) r3 = socket$unix(0x1, 0x2, 0x0) r4 = kqueue() kevent(r4, &(0x7f0000000000)=[{0x3, 0xffffffffffffffff, 0xc0c3, 0xc0000000, 0x0, 0x0, [0x8, 0x1ccf, 0x2, 0x9]}], 0x40000c9, 0x0, 0x0, 0x0) bind$unix(r2, &(0x7f0000000000)=@file={0xa, 0x1, './file0\x00'}, 0xa) sendto$unix(r3, 0x0, 0x0, 0x0, &(0x7f0000000140)=@file={0xa, 0x1, './file0\x00'}, 0xa) r5 = accept$unix(r2, &(0x7f00000001c0)=@abs={0x8}, &(0x7f0000000200)=0x8) accept$unix(r5, &(0x7f0000000100)=@abs={0x8}, &(0x7f0000000180)=0x8) r6 = socket$inet6(0x1c, 0x2, 0x0) connect$inet6(r6, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0000000000000000b8e75dce6e8bdcd8"}, 0x1c) rfork(0x7040) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) 35.015127426s ago: executing program 3 (id=78): r0 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x10000, &(0x7f0000000140)=0xb, 0x4) socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f0000000240)='./file0/file0\x00', 0x1000, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000000), 0x20b89, 0x0, 0xffff3955, 0x0) freebsd11_mknod(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x672cda28f543e327, 0x3) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x4, 0x0) mkdirat(r2, &(0x7f0000000100)='./file1\x00', 0x0) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000000)='./file0\x00', 0x0) chdir(&(0x7f0000000040)='./file0\x00') renameat(r3, &(0x7f0000000200)='./file1\x00', r3, &(0x7f0000000140)='./file0/file0\x00') __getcwd(&(0x7f0000000440)=""/79, 0xfffffffffffffdf7) r4 = kqueue() kevent(r4, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x5a, &(0x7f0000000180)={@broadcast, @local, [{[], {0x8100, 0x4, 0x0, 0x4}}], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x48, 0x0, 0x0, 0x0, 0x1, 0x0, @local={0xac, 0x14, 0x0}, @multicast1}, @icmp=@redirect={0x5, 0x3, 0x0, @remote={0xac, 0x14, 0x0}, {0xb, 0x4, 0x0, 0x1f, 0x6447, 0x64, 0x5, 0xfc, 0x70, 0xc43, @rand_addr=0x5, @rand_addr=0x8, {[@rr={0x7, 0x13, 0x0, [@multicast1, @local={0xac, 0x14, 0x0}, @multicast2, @loopback]}, @ssrr={0x89, 0x3, 0xc}]}}}}}}}) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) 32.896167194s ago: executing program 3 (id=84): open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x19c) setreuid(0xee00, 0x0) r0 = getuid() chown(&(0x7f0000000180)='./file0\x00', r0, 0x0) setgid(0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c5, 0x0, [0x7ffffffffc, 0xfffffffffffffffc, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) extattr_delete_fd(r1, 0x0, &(0x7f00000001c0)='\'\x17.)#\x00') freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) freebsd10_pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ksem_init(&(0x7f0000000100)=0x0, 0x0) ksem_post(r3) eaccess(&(0x7f0000000200)='./file1\x00', 0x1) ksem_destroy(r3) close(r2) r4 = kqueue() kevent(r4, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x8001, 0x400, 0x0, 0x1}, {0x0, 0xffffffffffffffff, 0x91, 0x2, 0x0, 0x10}], 0x2, 0x0, 0x0, 0x0) setuid(r0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x94659db2cce5c9d8, 0x0) rfork(0x96014) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x180, 0x0) 32.895542179s ago: executing program 32 (id=84): open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x19c) setreuid(0xee00, 0x0) r0 = getuid() chown(&(0x7f0000000180)='./file0\x00', r0, 0x0) setgid(0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c5, 0x0, [0x7ffffffffc, 0xfffffffffffffffc, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) extattr_delete_fd(r1, 0x0, &(0x7f00000001c0)='\'\x17.)#\x00') freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) freebsd10_pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ksem_init(&(0x7f0000000100)=0x0, 0x0) ksem_post(r3) eaccess(&(0x7f0000000200)='./file1\x00', 0x1) ksem_destroy(r3) close(r2) r4 = kqueue() kevent(r4, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x8001, 0x400, 0x0, 0x1}, {0x0, 0xffffffffffffffff, 0x91, 0x2, 0x0, 0x10}], 0x2, 0x0, 0x0, 0x0) setuid(r0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x94659db2cce5c9d8, 0x0) rfork(0x96014) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x180, 0x0) 30.616064967s ago: executing program 0 (id=101): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) freebsd11_fhstatfs(&(0x7f0000000040)={{[0xffff, 0x10000]}, {0x5, 0x100, "0128ae26e70000000000a000080500"}}, 0x0) sysarch$I386_SET_IOPERM(0x4, &(0x7f00000006c0)={0x0, 0x0, 0xfffffffc}) sysarch$I386_GET_IOPERM(0x3, &(0x7f0000000040)) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) aio_read(&(0x7f0000000400)={r1, 0x9, &(0x7f0000000240)="9d2ffe", 0x3, [0xff, 0x9], 0x6, 0x8, 0xfc59, {0x80000000, 0x5, 0x0}, {0x4, 0x6, @sival_ptr=0x5, @spare=[0x0, 0xffffffffffff8001, 0x7fffffff, 0xfffffffffffffff5, 0x8, 0xacf9, 0x2, 0x8000000000000000]}}) preadv(r1, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f00000000c0)={0x15, 0xe, 0x11, &(0x7f0000000000)="0b6fac4103f48e8d08afe5de81d4755aed", 0x0, 0x0, 0x0, 0x4}) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x200000, 0x0) (async) freebsd11_fhstatfs(&(0x7f0000000040)={{[0xffff, 0x10000]}, {0x5, 0x100, "0128ae26e70000000000a000080500"}}, 0x0) (async) sysarch$I386_SET_IOPERM(0x4, &(0x7f00000006c0)={0x0, 0x0, 0xfffffffc}) (async) sysarch$I386_GET_IOPERM(0x3, &(0x7f0000000040)) (async) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) (async) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) (async) aio_read(&(0x7f0000000400)={r1, 0x9, &(0x7f0000000240)="9d2ffe", 0x3, [0xff, 0x9], 0x6, 0x8, 0xfc59, {0x80000000, 0x5, 0x0}, {0x4, 0x6, @sival_ptr=0x5, @spare=[0x0, 0xffffffffffff8001, 0x7fffffff, 0xfffffffffffffff5, 0x8, 0xacf9, 0x2, 0x8000000000000000]}}) (async) preadv(r1, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) (async) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f00000000c0)={0x15, 0xe, 0x11, &(0x7f0000000000)="0b6fac4103f48e8d08afe5de81d4755aed", 0x0, 0x0, 0x0, 0x4}) (async) 30.574463257s ago: executing program 0 (id=102): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x7, 0xffffffffffffff00, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) socket$inet6_udplite(0x1c, 0x2, 0x88) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r1, 0x80001001, &(0x7f0000000180)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @spare=[0x0, 0x1, 0x0, 0x200000000000]}}) r2 = socket(0x1c, 0x1, 0x0) getsockname(r2, &(0x7f0000000000)=@un=@abs={0x8}, &(0x7f00000006c0)=0x8) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000004c0)='./file0\x00') ioctl$MDIOCDETACH(0xffffffffffffffff, 0xc1c06d01, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) r3 = kqueue() r4 = open(&(0x7f0000000040)='./file0\x00', 0x18289, 0x110) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r5, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) ioctl$MDIOCATTACH(r4, 0xc1c06d00, &(0x7f0000000500)={0x0, 0x6, 0x1, &(0x7f0000000200)='./file0\x00', 0x7, 0x0, 0x0, 0x0, 0xfff, 0x4, &(0x7f0000000240)='\x00', [0x6, 0x8, 0x9, 0x3, 0x4157, 0xfffffff7, 0x9, 0x2, 0x6, 0xd, 0x4, 0x1, 0x1000, 0x7, 0xfffffffd, 0x401, 0x81, 0x290, 0xc41, 0x9, 0x5, 0x5, 0x9, 0x8, 0x5, 0x652b, 0xfff, 0x1, 0x9, 0xfffff1e0, 0x6, 0x7fff, 0x3, 0x19b16107, 0x10, 0x9, 0x2, 0xe, 0x5, 0x6ce0e590, 0x8, 0x3, 0x81, 0x4, 0x7, 0x4e, 0x8, 0x9, 0x8, 0x9, 0xfffffff7, 0x9, 0x6, 0x3, 0x1000, 0x1, 0x0, 0x9, 0x0, 0x3, 0x3, 0x7f, 0x5, 0x8, 0x1000, 0x1, 0x0, 0xa0, 0x10, 0x9, 0xac, 0x1, 0xfffff695, 0x9, 0x0, 0x2, 0x4, 0x5, 0x80000000, 0x1, 0x34f, 0x7, 0xc, 0x7f, 0x0, 0x5e9, 0x80, 0x0, 0x101, 0x80000000, 0x7, 0x7, 0x6, 0x170, 0x144, 0x8]}) write(r4, &(0x7f00000004c0)="b96abcf5ac7cffa09ea845315c0d853a14", 0xffffff1c) fpathconf(r3, 0x35) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(0xffffffffffffffff, 0x14040000) syz_emit_ethernet(0x3a, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x2c, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0xa7, 0x0, 0x0, {[@window={0x3, 0x3, 0x2}]}}}}}}}) open$dir(&(0x7f0000000880)='./file0\x00', 0x8, 0x0) rmdir(&(0x7f00000002c0)='./file0\x00') socket(0x1c, 0x1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) cpuset_setaffinity(0x3, 0x2, 0xffffffffffffffff, 0x8, &(0x7f00000001c0)={[0x2]}) cpuset(&(0x7f0000000080)) recvfrom(r6, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r7, 0x6, 0x27, &(0x7f0000000140)={&(0x7f0000000080)="00b2c06df480cfe19f0da4833728dc14", 0x0, &(0x7f0000000040)="cf", 0xb, 0x10, 0x0, 0x7, 0x1, 0x0, 0x3, 0x3, "00ff03ff8e3500"}, 0x40) sendto$inet(r7, &(0x7f0000000000)="727f4c98e6e3b6d62e469a3ba2e66dba9106d9b78a10424b958051429e1dce150e1970605333c5f442aa7ab1e26f9aecabf014a76c0000e80000", 0x3a, 0x185, &(0x7f0000000280)={0x10, 0x2, 0x1, @local={0xac, 0x14, 0x0}}, 0x10) 29.08140172s ago: executing program 0 (id=119): r0 = kmq_open(&(0x7f0000000180)='./file0/../file0\x00', 0x1, 0x80, &(0x7f0000000380)={0x2, 0x1, 0xc, 0x100}) fcntl$getown(r0, 0x5) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000040)) truncate(&(0x7f0000000140)='./file0\x00', 0xb) r1 = open$dir(&(0x7f0000000700)='./file0\x00', 0x0, 0x2026d25cf6046a0) r2 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x83) readlinkat(r2, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/154, 0x9a) pwritev(r2, &(0x7f0000000080)=[{&(0x7f0000000200)="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", 0x14e}], 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x31, &(0x7f0000000100)=ANY=[@ANYBLOB="1903c2"], 0x20) sendto$inet(r3, &(0x7f0000000000)="f09a8a80eb2bed38fce7fc61d440e82c3a010a342f34ce", 0x17, 0x4, 0x0, 0x0) sendfile(r1, r3, 0xeba, 0x20000000000, 0x0, 0x0, 0x11) 28.666143755s ago: executing program 0 (id=123): r0 = open$dir(&(0x7f0000000080)='.\x00', 0x4, 0x0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) (async) chdir(&(0x7f0000000040)='./file0\x00') mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2) (async) fchdir(r0) (async) chroot(&(0x7f0000000100)='./file0/file0\x00') (async) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f00000001c0)='./file1\x00', 0x0) renameat(r2, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000140)='./file0/file0\x00') (async) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) r3 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) (async) r4 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r4, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) pwritev(r4, 0x0, 0x0, 0x71) r5 = semget$private(0x0, 0x3, 0xe0) __semctl$GETPID(r5, 0x4, 0x4) copy_file_range(r4, 0x0, r3, 0x0, 0xffffffffffffffff, 0x0) 28.266010937s ago: executing program 0 (id=134): open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f0000001480)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r1 = socket(0x1c, 0x1, 0x0) connect$inet6(r1, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x72}, 0x1c) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) r2 = socket$unix(0x1, 0x5, 0x0) connectat$unix(0xffffffffffffff9c, r2, &(0x7f0000000040)=@file={0xfffffffffffffe44, 0x1, './file0/file0\x00'}, 0xa) extattr_delete_link(&(0x7f0000000580)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00\x02=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\x95\xe8X\xb6\x17\x99\xa6\xe4\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\x9c\x14\xecRRn\ab\xe2\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6\xcf\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\x1eq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4') r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x11, 0x3, 0x0) recvmsg(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f00000018c0)=""/4099, 0x1003}], 0x1, 0x0}, 0x400c0) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @mcast1}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x32, &(0x7f0000000000)=ANY=[@ANYBLOB="1b14"], 0xa8) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(r3, &(0x7f0000000200)="0e", 0xff66, 0x20bf0023, 0x0, 0x0) setsockopt$inet_sctp_SCTP_CONNECT_X(r4, 0x84, 0x8007, &(0x7f00000001c0)={0x6, &(0x7f0000000100)=[@in={0x10, 0x2, 0x3, @rand_addr=0x2}, @in={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, @in6={0x1c, 0x1c, 0x1, 0x7fffffff, @rand_addr="ee8f8229cbcc4c990a287be8b480d044", 0x4}]}, &(0x7f0000000240)=0x10) kevent(0xffffffffffffffff, &(0x7f00000005c0)=[{0xffffffffffffffff, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0xffffffffffffffff}, {0x9, 0xfffffffffffffff5, 0x40, 0x10, 0x8000000000083, 0xff, [0x80000000000000, 0x3ff, 0x8, 0xbe]}, {0xfb, 0xfffffffffffffffc, 0x54, 0x8, 0x7, 0x0, [0x9ac, 0x57cf91be, 0x3c, 0x1000]}], 0x3, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20104, 0x0, 0x0) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r5, 0x29, 0x3e, &(0x7f0000000000)=0x3, 0x4) open$dir(&(0x7f0000000080)='.\x00', 0x40000, 0xc1) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) fcntl$lock(0xffffffffffffffff, 0x16, &(0x7f0000000140)={0x570, 0x1, 0x0, 0xfffffffffffffffc}) ioctl$CIOCGSESSION2(r6, 0xc040636a, &(0x7f0000000040)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0xffffffff, 0x401]}) ioctl$CIOCCRYPT(r6, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0x10, &(0x7f0000000280), 0x0, 0x0, &(0x7f00000002c0)}) 27.425521183s ago: executing program 0 (id=147): r0 = fork() wait4(0xffffffffffffffff, 0x0, 0x2, 0x0) sigqueue(r0, 0x11, @sival_ptr) setrlimit(0x7, &(0x7f00000001c0)={0x1}) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @mcast2}}, {{0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x8000000, @mcast2}}, {{0x1c, 0x1c, 0x1, 0x4, @local={0xfe, 0x80, '\x00', 0x0}}}}, 0x108) setsockopt$inet6_group_source_req(r1, 0x29, 0x52, &(0x7f0000000200)={0x6, {{0x1c, 0x1c, 0x3, 0x80000001, @mcast2, 0xf}}, {{0x1c, 0x1c, 0x1, 0x7, @rand_addr="2e3bd580583afb490ea98696165ed7d1", 0x7}}}, 0x108) rfork(0x85000) setreuid(0xee00, 0x0) fork() syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @random="32a88130e11d", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x4, @empty, @rand_addr=0x6, @remote, @rand_addr}}}}) setuid(0xffffffffffffffff) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r2 = kqueue() kevent(r2, &(0x7f00000001c0)=[{0x3, 0xffffffffffffffff, 0x21}], 0x1, &(0x7f0000000300)=[{}], 0x1, 0x0) kevent(r2, 0x0, 0x0, &(0x7f0000000240)=[{}], 0x1, 0x0) open$dir(0x0, 0x202, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x83) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) fcntl$lock(0xffffffffffffffff, 0xe, 0x0) fork() mprotect(&(0x7f00004db000/0x1000)=nil, 0x1000, 0x2) 22.336096416s ago: executing program 2 (id=197): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f0000000400)={0x5, {{0x1c, 0x1c, 0x1, 0x0, @mcast2, 0x4}}, {{0x1c, 0x1c, 0x1, 0x0, @loopback}}}, 0x108) (async) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x80000000, @mcast2, 0xd}}, {{0x1c, 0x1c, 0x1, 0x3, @rand_addr="b036a587f0e7192a6e60ab635cdfbaf0"}}}, 0x108) (async) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x1, 0x0, @mcast2}}, {{0x1c, 0x1c, 0x2, 0x0, @empty}}}, 0x108) (async) setsockopt$inet6_group_source_req(r1, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @mcast2}}, {{0x1c, 0x1c, 0x1, 0x0, @rand_addr="888e0547e4278d188f481b7d02b92613"}}}, 0x108) (async) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @mcast2}}, {{0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0x108) r3 = socket(0x26, 0x2, 0x0) (async) r4 = getppid() fcntl$setown(r3, 0x6, r4) (async) rfork(0x83000) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$sock_int(r5, 0xffff, 0x1011, 0x0, &(0x7f0000000040)) (async) setsockopt$inet6_group_source_req(r2, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x8000000, @mcast2}}, {{0x1c, 0x1c, 0x1, 0x4, @local={0xfe, 0x80, '\x00', 0x0}}}}, 0x108) (async) setsockopt$inet6_group_source_req(r2, 0x29, 0x52, &(0x7f0000000200)={0x5, {{0x1c, 0x1c, 0x0, 0x80000001, @mcast2, 0xf}}, {{0x1c, 0x1c, 0x1, 0x0, @rand_addr="2e3bd580583afb490ea98696165ed7d1", 0x7}}}, 0x108) rfork(0x85000) 22.244987514s ago: executing program 2 (id=200): freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = kqueue() freebsd11_mknod(0x0, 0xc000, 0x60000000) (async) kevent(r2, &(0x7f00000007c0)=[{0x80000001, 0xfffffffffffffff9, 0x1, 0x8, 0xe8c5, 0x0, [0xfffffffffffffff7, 0x0, 0x0, 0xffffffffffffffff]}, {0x8, 0xfffffffffffffffe, 0x10080, 0x200, 0xdb3a, 0x401, [0x3e56, 0x80000000004, 0x5, 0xd]}, {0x7f, 0x0, 0x8040, 0x8, 0x80, 0x6, [0xfffffffffffffff8, 0x4a56, 0x8, 0x6873180000000000]}, {0x0, 0xfffffffffffffff5, 0x0, 0x209, 0xd, 0x5, [0x0, 0x1, 0x3, 0x6]}, {0x4, 0xfffffffffffffffc, 0x0, 0x2, 0x3, 0xfffffffffffff001, [0x74033699, 0x38, 0x47, 0x1]}, {0x8, 0xfffffffffffffffe, 0x8002, 0xffffff, 0x9, 0xffffffff, [0x6, 0x7f, 0x88, 0x25]}, {0x7, 0xfffffffffffffff8, 0x8024, 0x10, 0x2, 0xf, [0x9, 0x5, 0x9, 0x6]}, {0x9, 0xfffffffffffffffc, 0xa2af689e87c1f169, 0x0, 0x2, 0x9, [0x8, 0x9e, 0x5d, 0x5]}, {0x1ff, 0xfffffffffffffffe, 0x80, 0x10, 0x1101, 0x2, [0x4, 0x8, 0x5, 0x1]}, {0x5, 0xfffffffffffffff9, 0x9, 0xc0000000, 0x7, 0x6, [0xff, 0xaf, 0x8, 0x400]}], 0xa, 0x0, 0x0, 0x0) (async) close(r1) pipe2(&(0x7f0000000000), 0x100004) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) (async) recvfrom(r0, &(0x7f0000000200)=""/255, 0xff, 0x860, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x4, &(0x7f0000000080)={0x10, 0x2, 0x1, @loopback}, 0x10) sendto(r4, &(0x7f0000000440)="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"/318, 0x13e, 0x100, 0x0, 0x0) (async) dup2(r3, r4) (async) procctl$PROC_REAP_ACQUIRE(0x0, 0x0, 0x2, 0x0) (async) open$dir(0x0, 0x40000400000002c2, 0x0) (async) __specialfd$inotify(0x2, &(0x7f0000000140)={0x4}, 0x4) (async) ktimer_create(0xe, 0x0, 0x0) (async) ktimer_delete(0x0) fork() (async) r5 = fork() procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f00000003c0)={0x13, 0x0, r5, 0x7}) (async) extattr_list_link(0x0, 0x0, 0x0, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) (async) openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0x80000, 0x0) rfork(0x85000) r6 = socket$inet6_icmp(0x1c, 0x2, 0x3a) posix_fadvise(r6, 0x39, 0xcc, 0x0) (async) open$dir(&(0x7f0000000040)='./file0\x00', 0x400248, 0xc0) (async) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x30, 0x400000000000001]) (async) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000580)=[0x20000207fffffdc, 0x400000000000005]) (async) r7 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x2, &(0x7f0000000140), 0x4) 22.146267722s ago: executing program 2 (id=201): execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000080), 0x0) poll(&(0x7f00000002c0), 0x20000000000000e4, 0xfff) r0 = socket$inet6_udp(0x1c, 0x2, 0x0) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) accept4(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @local}, &(0x7f0000000040)=0x1c, 0x10000000) r3 = fcntl$dupfd(r1, 0x3, r2) write(r3, &(0x7f00000004c0)="96", 0x1) socket$inet6_udp(0x1c, 0x2, 0x0) 21.062735352s ago: executing program 2 (id=211): mkdir(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1e3) r0 = open$dir(0x0, 0x0, 0x2) symlinkat(0x0, r0, &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) access(0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) ktimer_create(0x0, 0x0, &(0x7f00000012c0)) ktimer_create(0x0, 0x0, &(0x7f0000000500)) ktimer_create(0x0, 0x0, &(0x7f0000000380)) ktimer_create(0x0, 0x0, &(0x7f00000000c0)) ktimer_create(0x4, 0x0, &(0x7f0000000080)) ktimer_create(0x0, 0x0, &(0x7f00000012c0)) ktimer_create(0x0, 0x0, &(0x7f0000000600)) ktimer_create(0x0, 0x0, &(0x7f0000000340)) ktimer_create(0x0, &(0x7f0000000400)={0x1, 0xb, @sigval_ptr=0x9}, &(0x7f00000002c0)) rtprio(0x1, 0x0, &(0x7f0000000580)={0x2, 0x4}) r2 = openat$evdev(0xffffffffffffff9c, &(0x7f00000002c0), 0x40000, 0x0) ioctl$UI_SET_EVBIT(r2, 0x20045564) r3 = socket(0x11, 0x10000000000003, 0x0) sendto$unix(r3, &(0x7f0000000200)="b10005019000e80348031bc75786ca900f0e08fecea11ea8fef96ebd67bd002f0100fa62d416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872bab00b770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a300a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x0, 0x0, 0x0) shmctl$IPC_STAT(0x0, 0x2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x100000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000040)={0x19, 0x0, 0x18, &(0x7f0000000140)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x4, 0x80008001]}) freebsd11_lstat(0x0, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) extattr_delete_link(&(0x7f0000000580)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00\x02=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\x95\xe8X\xb6\x17\x99\xa6\xe4\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\x9c\x14\xecRRn\ab\xe2\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6\xcf\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\x1eq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4') 20.992426345s ago: executing program 2 (id=217): mount(0x0, 0x0, 0x0, 0x0) r0 = socket(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x10, 0x2, 0x1, @rand_addr=0x7ffffffe}, 0x10) sendto$inet(r0, &(0x7f0000000240), 0xfffffe60, 0x20104, &(0x7f0000000000)={0x10, 0x2, 0x0, @multicast2}, 0x10) aio_write(&(0x7f0000000480)={r0, 0x8, 0x0, 0x0, [0x9, 0x5], 0x5, 0x0, 0x100, {0x1, 0x3, 0x0}, {0x0, 0x1d, @sival_int=0xff, @thr={0x0, 0x0}}}) rename(0x0, 0x0) r1 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) chflags(&(0x7f0000000080)='./file0\x00', 0x119304) r2 = open$dir(&(0x7f00000016c0)='./file0\x00', 0xa182fdacd32160a9, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$MDIOCATTACH(r3, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x0, 0x2, &(0x7f0000000040)='./file0\x00', 0x10000, 0xb54, 0xa3d, 0x0, 0x0, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffc, 0x0, 0x9, 0x0, 0x0, 0x1000004, 0x0, 0x8, 0x8, 0xfffffffe, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x1, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4000000, 0x2, 0xffffffff, 0x2, 0x0, 0x0, 0x8, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x655, 0x0, 0x0, 0x0, 0x0, 0x206, 0x0, 0x2, 0x0, 0x4, 0x0, 0x0, 0x1]}) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) msync(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x0) 20.425907184s ago: executing program 2 (id=220): open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000180)=0xffff, 0x3ff, 0x0) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x40, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) mkdir(&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r4 = open$dir(&(0x7f0000000240)='.\x00', 0x800, 0x2) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r5 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r5, r4, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r6, 0x80000000, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x9, 0x0}, {0x0, 0x0, @sigval_ptr=0x4, @spare=[0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffe]}}) r7 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) posix_fallocate(r7, 0x0, 0x50e088b7) r8 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) fspacectl(r8, 0x1, &(0x7f0000000040)={0x3ff, 0x7ffffffffffffc00}, 0x0, 0x0) setreuid(0xee00, 0x0) setreuid(0x0, 0x0) r9 = fcntl$dupfd(r2, 0x0, r1) sendfile(r0, r9, 0x1, 0x400000000000, 0x0, 0x0, 0x1) mlockall(0x2) r10 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) getpeername(r1, &(0x7f0000000000)=@in={0x10, 0x2, 0xffffffffffffffff, @multicast2}, &(0x7f0000000080)=0x10) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r10, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) sync() 19.326080032s ago: executing program 1 (id=227): r0 = socket(0x17, 0x3, 0x1) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x29, &(0x7f00000001c0)={&(0x7f0000000200)="016261", &(0x7f0000000100)='\x00'/12, 0x0, 0x19, 0x3, 0xc, 0x1b, 0x0, 0x0, 0x3, 0x3, '\x00\x00\x00\x00\x00 \x00'}, 0x40) rfork(0x85000) r1 = open$dir(0x0, 0x1, 0x0) truncate(0x0, 0x8001) cpuset_setaffinity(0x2, 0x6, 0x9, 0x0, 0xffffffffffffffff) getsockopt$inet6_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000000040), &(0x7f00000000c0)=0x4) r2 = socket$unix(0x1, 0x5, 0x0) r3 = socket(0x11, 0x3, 0x0) bind$unix(r3, 0x0, 0x0) listen(r2, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) freebsd11_mknod(0x0, 0x1000, 0x0) rfork(0x4000) openat$ptmx(0xffffffffffffff9c, 0x0, 0x200804, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x3, 0x80010, r1, 0xfff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000000940)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x40000) setsockopt(r5, 0x0, 0x3, &(0x7f0000000100)="09001000", 0x4) socketpair(0x1, 0x1, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x860, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) execve(0x0, 0x0, 0x0) sendmsg$unix(r4, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x20) truncate(0x0, 0x8001) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, 0xffffffffffffffff, 0x2000) open(0x0, 0x200, 0xf4) mmap(&(0x7f00001d6000/0x1000)=nil, 0x1000, 0x3, 0x20011, 0xffffffffffffffff, 0x8) acct(0x0) 19.125987084s ago: executing program 1 (id=229): open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r0 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x10) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) syz_emit_ethernet(0x4e, &(0x7f00000002c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x18, 0x3a, 0xff, @empty, @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@ndisc_ns={0x87, 0x0, 0x0, @loopback, [{0x4, 0x0, "f58c"}]}}}}}}) r1 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0xd2) kevent(0xffffffffffffffff, &(0x7f0000000540)=[{0xc8, 0xfffffffffffffffe, 0x4007, 0x0, 0x1, 0x0, [0x3, 0x7fffffffffffffff]}], 0x1, 0x0, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvfrom$inet(r2, 0x0, 0x0, 0x2, 0x0, 0x20000000004d) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r1, 0x7) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00', 0x128) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) setrlimit(0x3, &(0x7f0000000040)={0x8001, 0x100000000008080}) r3 = open(0x0, 0x80000000000209, 0x0) connect$unix(r3, &(0x7f0000000200)=@abs={0x8, 0x1, 0x0, 0x3}, 0x8) r4 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x10) pwritev(r4, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x100, 0xfffffffffffffffe, 0x38) open$dir(&(0x7f0000000040)='./file0\x00', 0x800, 0x1) r6 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0xd2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r6, 0x0) r7 = fhopen(&(0x7f0000000180)={{[0x28, 0x1]}, {0x10, 0x6, "b54ca47a887657b2a1abfce43f838172"}}, 0x100000) ioctl$DIOCRGETTABLES(r7, 0xc450443f, &(0x7f00000004c0)={{"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", "1808ac4572a12b9997db7b0d9219328c463c9f020cd44c61c8ba67a506feb039", 0x4, 0x8}, &(0x7f00000001c0)="3654256b619ffceebd0da3fea5751d000881ed7805a04839af8ebef2cd9ec2ebd74abc2b111b06a3b22a4b8f798a9f2ba1605d6abecaf64730c5ff8851586c", 0xb, 0x678f, 0x5, 0xfc3, 0xffffffffffffffff, 0x1, 0x7, 0x6}) r8 = socket(0x11, 0x3, 0x0) sendto$unix(r8, &(0x7f00000000c0)="b100050160000000a80000000700000012df8106cfa10500fef96ecfc73fd3357ae36caa0416fa4f376b36acf00b7804be301e4991f7c8cf5f3fc303ebe1aa5323edeb51e2f0ca3ebbc257169ed0d44a699a1f133ea7acb5d602000d7d026ba8af6300371c2102000000720fd38bfbb770c1f5a8aec872ea772ec58904000000008d9800361b1257aba8c500002012010000de5000"/177, 0xb1, 0x0, 0x0, 0x0) freebsd11_fstat(r4, 0x0) 18.945931925s ago: executing program 1 (id=231): recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x860, 0x0, 0x0) unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x48000101) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x41581bc827cde45f, 0xffffffffffffffff, 0x3) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mount(&(0x7f0000000000)='msdosfs\x00', 0x0, 0x81df824a, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) fhlinkat(&(0x7f0000000140)={{[0x400, 0x9d8]}, {0xf352, 0xffff, "16532633b849b249dfc3b0cda20f7e0c"}}, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0x2, 0x0) read(0xffffffffffffffff, &(0x7f0000000f00)=""/154, 0x9a) write(0xffffffffffffffff, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80001001, &(0x7f0000000380)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @spare=[0x0, 0x1, 0x0, 0x200000000000]}}) r1 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_buf(r2, 0x29, 0x29, 0x0, &(0x7f0000000200)) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x52, &(0x7f00000000c0)={0x3, {{0x1c, 0x1c, 0x0, 0xffffffff, @mcast2, 0xfffffffe}}, {{0x1c, 0x1c, 0xffffffffffffffff, 0x0, @rand_addr="19fdb123c0a8a841280b53f7ac8be800"}}}, 0x108) setsockopt$inet6_group_source_req(r5, 0x29, 0x52, &(0x7f00000004c0)={0x5, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}, {{0x1c, 0x1c, 0x2, 0x4, @ipv4={'\x00', '\xff\xff', @broadcast}, 0x10000}}}, 0x108) setsockopt$inet6_group_source_req(r5, 0x29, 0x51, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0xfffffffe, @mcast2}}, {{0x1c, 0x1c, 0x1, 0x0, @ipv4={'\x00', '\xff\xff', @multicast1}}}}, 0x108) recvfrom(r3, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) sendto(r4, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x18, 0x0) bind(r4, &(0x7f0000001040)=@in={0x10, 0x2, 0x0, @loopback}, 0x10) listen(r6, 0x5) kqueue() 18.944108614s ago: executing program 1 (id=232): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r0, 0x6, 0x29, &(0x7f0000000180)={&(0x7f0000000100)="4f8da7eee57ca12cf9d86092b75d2909a64a6fe76d3c7ac04801a7e24e279bdefbbcbf6056b3063e08ee5946d15ec2c7bf36b6298de086153a922bd2047a5c446879f703d2a381495c60e00df85138a311d037c7fb7cd71d582cf4235dca7fb83e7748e0c4782f0f91d81678839536d5c342cb75b1531a7174c6", &(0x7f0000000500)="fbc4d112869ef966616d972d5d252aa9a914de5d1593d31b7109545c91301a9abe7fdcb72aac79dc7496a33d00dd26b3cfb2d9865f0e94a0178954578ab482589ba80268cabadbfe13bd98de403ab06e2acb539b991893262e21761c8c94b9d1654abb4f59e619b571f614d9555b1663971faad1556160ed75d47518e4a07f18e3b6d9db7566fb9b2e75bd8e0c3d12d8cca55b1e17d333e02c91f7bdc8ac932412f69b2e7d3d2868c5e74b6ee1adaaaf5c4f9acd4c04b78a3b8bc0a657be20aa1f2e", &(0x7f0000000080)="d30689c5c82e18762afbba980f825c1ded6f1d615fab3c5f107e9a357ba0c4d435213c1226cfddf670f37b390d01751d75ac7d0821d1daf258f6a363cec4", 0x29, 0x7a, 0xc2, 0x1b, 0x3e, 0x0, 0x0, 0x2, "138d9a422d87ee2c"}, 0x40) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c921bf0817a0000000000006a89db", 0x2b) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) listen(r2, 0xb) connect$inet(r2, &(0x7f0000000340)={0x10, 0x2, 0x3, @rand_addr=0x8b9}, 0x10) ktimer_create(0x4, 0x0, &(0x7f0000000440)=0x0) ktimer_settime(r3, 0x1, &(0x7f00000000c0)={{0x100000001, 0x6}, {0x100000000006, 0x3b9aca00}}, 0x0) r4 = __specialfd$eventfd(0x1, &(0x7f0000000000), 0x8) r5 = fcntl$getown(r4, 0x3) r6 = socket$unix(0x1, 0x2, 0x0) bind$unix(r6, &(0x7f0000000040)=@file={0xa, 0x1, './file0\x00'}, 0xa) r7 = socket$unix(0x1, 0x2, 0x0) connect$unix(r7, &(0x7f00000004c0)=@file={0xa, 0x1, './file0\x00'}, 0xa) writev(r7, 0x0, 0x0) fork() r8 = socket$unix(0x1, 0x2, 0x0) connect$unix(r8, &(0x7f00000004c0)=@file={0xa, 0x1, './file0\x00'}, 0xa) writev(r8, 0x0, 0x0) rfork(0x85000) sigqueue(r5, 0x15, @sival_ptr) 18.896200175s ago: executing program 1 (id=233): r0 = socket(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x18, &(0x7f0000000300)=0xffffffff, 0x4) bind$inet(r1, &(0x7f00000000c0)={0x10, 0x2, 0x3, @loopback}, 0x10) dup2(r0, r0) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000280)={@multicast1, @multicast2, @local={0xac, 0x14, 0x0}}, 0xc) 18.894975223s ago: executing program 1 (id=234): r0 = fork() sigqueue(r0, 0x49, @sival_int=0x8000) procctl$PROC_REAP_ACQUIRE(0x2, r0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x2, 0x1, @broadcast}, 0x10) sigsuspend(&(0x7f0000000000)={[0x8, 0xffffff10, 0x7, 0x8001]}) fork() fork() procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000080)={0x13, 0x0, 0x0, 0x7}) r2 = getppid() r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x1008, 0x0, ""/4102}, &(0x7f0000001040)=0x1008) fsync(r3) r4 = fcntl$getown(r3, 0x5) procctl$PROC_TRACE_STATUS(0x0, r4, 0x8, &(0x7f00000010c0)) procctl$PROC_REAP_KILL(0x2, r2, 0x6, &(0x7f0000000100)={0x6ab, 0x0, r4, 0x88b, r1}) 15.562788684s ago: executing program 4 (id=246): syz_emit_ethernet(0x56, &(0x7f0000000500)={@local, @random='\x00\x00\x00\x00 \x00', [], {@ipv6={0x86dd, {0x0, 0x6, "8300", 0x20, 0x2b, 0x0, @loopback={0xfeffffff00000000, 0x2}, @mcast2, {[@dstopts={0x3c, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x1}]}, @fragment={0x1f, 0x0, 0x6, 0x1, 0x0, 0x8, 0x67}], @icmpv6=@echo_reply={0x81, 0x0, 0x0, 0x3, 0x7ff}}}}}}) (async) r0 = kqueue() open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x110) __specialfd$inotify(0x2, &(0x7f0000000180)={0x100004}, 0x4) (async) kevent(0xffffffffffffffff, &(0x7f00000007c0)=[{0x4, 0xfffffffffffffffc, 0x61, 0xc0000000, 0x5, 0x8, [0x2, 0x1, 0x2, 0x1]}], 0x1, 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff9, 0x17, 0x10}], 0x29f, 0x0, 0x8001, 0x0) kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x1, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) 15.561561518s ago: executing program 4 (id=247): r0 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x5c) mkdirat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) r1 = open(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0xd2) clock_getres(0xe, &(0x7f0000001440)) mincore(&(0x7f0000f0c000/0x3000)=nil, 0x0, &(0x7f0000afaf0a)=""/246) r2 = kqueue() kevent(r2, &(0x7f00000004c0)=[{0x7, 0xffffffffffffffff, 0x1, 0xffffff, 0xfffffffffffffff9, 0x8, [0x4, 0x60f9, 0x42, 0x77ad]}], 0x1, 0x0, 0x12, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0x53, &(0x7f0000000500)={0x1, {{0x10, 0x2, 0x2, @rand_addr}}, {{0x10, 0x2, 0x2, @rand_addr=0x5}}}, 0x108) rename(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', &(0x7f0000000180)='./file0\x00') rmdir(&(0x7f0000000100)='./file0\x00') open(&(0x7f00000002c0)='.\x00', 0x0, 0x5c) (async) mkdirat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) (async) mkdirat(r0, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) (async) open(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0xd2) (async) clock_getres(0xe, &(0x7f0000001440)) (async) mincore(&(0x7f0000f0c000/0x3000)=nil, 0x0, &(0x7f0000afaf0a)=""/246) (async) kqueue() (async) kevent(r2, &(0x7f00000004c0)=[{0x7, 0xffffffffffffffff, 0x1, 0xffffff, 0xfffffffffffffff9, 0x8, [0x4, 0x60f9, 0x42, 0x77ad]}], 0x1, 0x0, 0x12, 0x0) (async) setsockopt$inet_group_source_req(r1, 0x0, 0x53, &(0x7f0000000500)={0x1, {{0x10, 0x2, 0x2, @rand_addr}}, {{0x10, 0x2, 0x2, @rand_addr=0x5}}}, 0x108) (async) rename(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', &(0x7f0000000180)='./file0\x00') (async) rmdir(&(0x7f0000000100)='./file0\x00') (async) 15.50674867s ago: executing program 4 (id=248): syz_emit_ethernet(0x4a, &(0x7f0000000040)=ANY=[]) (async) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80001001, &(0x7f0000000380)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @spare=[0x0, 0x1, 0x0, 0x200000000000]}}) (async) minherit(&(0x7f0000013000/0x4000)=nil, 0x4000, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) (async) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) (async) openat(0xffffffffffffff9c, 0x0, 0x200201, 0xc) r2 = socket(0x1c, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) (async) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x40000, 0xa) sendfile(r3, r2, 0x11, 0x80000001, &(0x7f0000000ec0)={&(0x7f0000000240)=[{&(0x7f0000000180)="10000075ca6bde4c922562692500000000c8c78937b7ea9718fffd68492e23bcf04554c09041f1d8f02d350a4f746616b2e19c6b8da02e3f8fbe395a33590004000000000000a1eae93d235f0ef6a04915e808f831049832063092d96bde0292269d7a30d7a2c7481e7f231be5731f7f012f6f5346b4c33959b1b1a9e92eb06c026cdb26b23557f2ff41a4997a0ee453ca1477b5deb3e631ba6aca9806a88693e1", 0xa1}], 0x1, 0x0}, 0x0, 0x1) (async) getsockname$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, &(0x7f0000000140)=0x1c) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0x0) (async) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r5, 0x0, 0x3a, 0x0, 0x0) (async, rerun: 64) r6 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (rerun: 64) setsockopt$inet_mreqsrc(r6, 0x0, 0x46, 0x0, 0x0) fork() (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) r7 = kqueue() kevent(r7, &(0x7f0000001d40)=[{0x3, 0xfffffffffffffffe, 0x40e1, 0x0, 0x0, 0x9, [0xfffffffffffffffc, 0x0, 0x2, 0x7]}], 0x1, 0x0, 0x0, 0x0) (async, rerun: 64) r8 = kqueue() (rerun: 64) kevent(r8, &(0x7f0000000000), 0x100f2, 0x0, 0xfc, 0x0) (async, rerun: 64) r9 = kqueue() (rerun: 64) kevent(r9, &(0x7f00000004c0)=[{0x0, 0xfffffffffffffffe, 0x17, 0x10, 0x0, 0x0, [0x0, 0x0, 0xfffffffffffffffc, 0x8000000]}, {0x1, 0xfffffffffffffffb, 0x8008, 0x10, 0xfffffffffffffffb, 0x4, [0x5b, 0x7, 0xd6c5, 0x5]}, {0xffffffffffffb550, 0xfffffffffffffffe, 0x80, 0x1000000, 0x100, 0x4, [0x8, 0x8, 0x8c, 0x2]}, {0x10000, 0xfffffffffffffffc, 0x4000, 0xc0fffff7, 0xb, 0x7, [0xfffffffffffffffc, 0x5, 0x4, 0x6]}], 0x4, 0x0, 0x0, 0x0) rfork(0x85000) 15.49646506s ago: executing program 4 (id=249): r0 = socket$inet6_sctp(0x1c, 0x4, 0x84) getsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(0xffffffffffffff9c, 0x84, 0x24, &(0x7f0000000000)={0x0, @in6={{0x1c, 0x1c, 0x3, 0x4, @local={0xfe, 0x80, '\x00', 0x0}}}, 0xb9d}, &(0x7f00000000c0)=0x90) setsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x0, 0x2, r1}, 0xc) (async) setsockopt$inet6_sctp_SCTP_BINDX_REM_ADDR(r0, 0x84, 0x8002, &(0x7f0000000140)=@in={0x10, 0x2, 0x2}, &(0x7f0000000180)=0x10) (async) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_EXPLICIT_EOR(r2, 0x84, 0x1b, &(0x7f00000001c0)=0x8, 0x4) (async) r3 = accept4$inet(r2, &(0x7f0000000200)={0x10, 0x2, 0xffffffffffffffff, @local}, &(0x7f0000000240)=0x10, 0x20000000) sendto$inet(r3, &(0x7f0000000280)="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", 0xfe, 0x1, &(0x7f0000000380)={0x10, 0x2, 0x1, @remote={0xac, 0x14, 0x0}}, 0x10) (async) getsockopt$inet6_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f00000003c0)={r1, 0x3}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r2, 0x84, 0x15, &(0x7f0000000440)={r4, 0x6}, 0x8) (async) extattr_get_fd(r3, 0x2, &(0x7f0000000480)='\'){\x00', &(0x7f00000004c0)=""/25, 0x19) ioctl$SMB_WRITEW(0xffffffffffffffff, 0x80306906, &(0x7f0000000580)={0x0, 0x6, 0xfffa, @buf="38fc", @word=0x1, 0x7, &(0x7f0000000500)=0xfd, 0x1, &(0x7f0000000540)=0x6, 0x1}) (async) bindat(r3, r3, &(0x7f00000005c0)=@un=@abs={0x8, 0x0, 0x0, 0x1}, 0x8) (async) r5 = socket$inet_icmp(0x2, 0x2, 0x1) setsockopt$inet_sctp_SCTP_BINDX_REM_ADDR(r5, 0x84, 0x8002, &(0x7f0000000600)=@in={0x10, 0x2, 0x1, @multicast2}, &(0x7f0000000640)=0x10) r6 = open$dir(&(0x7f0000000680)='./file0\x00', 0x400000, 0x186) (async) setgroups(0x0, &(0x7f00000006c0)) (async) r7 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_PARTIAL_DELIVERY_POINT(r7, 0x84, 0x11, &(0x7f0000000700)=0x5, 0x4) (async) fstatat(r3, &(0x7f0000000740)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x6000) (async) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r3, 0x84, 0xf, &(0x7f0000000880)={r1, 0x8}, &(0x7f00000008c0)=0xc) (async) r10 = dup2(r6, r7) getsockopt$inet_sctp_SCTP_ASSOCINFO(r10, 0x84, 0x2, &(0x7f0000000900)={r9, 0x7, 0x9, 0x10, 0x3, 0x9ae7}, &(0x7f0000000940)=0x14) freebsd11_fstat(r6, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setgroups(0x4, &(0x7f0000000a00)=[r12, r8, 0xffffffffffffffff, r8]) (async) r13 = openat(r10, &(0x7f0000000a40)='./file0\x00', 0x10000, 0x1) getsockopt$inet6_sctp_SCTP_PRIMARY_ADDR(r10, 0x84, 0x7, &(0x7f0000000a80)={@in6={{0x1c, 0x1c, 0x1, 0x4, @mcast2, 0x34a}}, r11}, &(0x7f0000000b40)=0x88) sendto$inet(r13, &(0x7f0000000b80)="7f0194d62addc98d2d9811ec2ed638f4d4d7cbe72d1b79c2a3066f5ab0cbdb5588c11cbb1e138d84a434e3bd34c4b90a0948237f676c1aa0b0e031717055060be3edf5edfc44f615146a2e2b4533ec298ec903c9552eb412f684687f861f190921754c86eab51a538e6663554249806aa49c8c40fb6ef8fc6ac4e8a4000de77651275c574824701da47a0fa301e7", 0x8e, 0x20084, &(0x7f0000000c40)={0x10, 0x2, 0x1, @local={0xac, 0x14, 0x0}}, 0x10) getsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(r13, 0x84, 0x22, &(0x7f0000000c80)={0x3, 0x40, r4}, &(0x7f0000000cc0)=0xc) (async) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r5, 0x84, 0x8004, &(0x7f0000000e00)={0x0, &(0x7f0000000d80)=[@in={0x10, 0x2, 0xffffffffffffffff, @rand_addr}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @empty}, @in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}]}, &(0x7f0000000e40)=0x10) 15.446094477s ago: executing program 4 (id=250): freebsd11_mknod(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x672cda28f543e327, 0x3) (async) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x4, 0x0) mkdirat(r0, &(0x7f0000000100)='./file1\x00', 0x0) (async) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) (async) chdir(&(0x7f0000000040)='./file0\x00') (async) renameat(r1, &(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000140)='./file0/file0\x00') __getcwd(&(0x7f0000000440)=""/79, 0xfffffffffffffdf7) (async) r2 = getppid() (async) freebsd11_mknod(&(0x7f0000000180)='./file1\x00', 0x40, 0x3) procctl$PROC_TRACE_CTL(0x2, r2, 0x7, &(0x7f0000000040)=0x1) (async) syz_emit_ethernet(0x66, &(0x7f0000000080)=ANY=[@ANYBLOB="e706f2ffff1f391e7dd7a2d786dd6000f80000302c03cb03000000336f000000500000ebfffffe"]) (async) r3 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r4 = dup2(r3, r3) ioctl$DIOCCHANGERULE(r4, 0x8048756d, &(0x7f0000000080)) (async) fstatfs(r0, &(0x7f00000004c0)) 15.44151872s ago: executing program 4 (id=251): r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) sendmsg$inet6_sctp(r0, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x14, 0x80}, 0x101) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, 0x0, &(0x7f0000000040)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xe, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x8) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) r2 = open(0x0, 0x18289, 0x110) inotify_add_watch_at(r2, 0xffffffffffffffff, 0x0, 0x210000c6) r3 = __specialfd$eventfd(0x1, &(0x7f0000000000)={0x80000000, 0x1}, 0x8) ioctl$SMB_PCALL(r3, 0x8004667e, &(0x7f0000002400)={0x3, 0x4, 0x2, @buf="b56e", @word=0x418, 0xfffffffd, 0x0, 0x0, 0x0}) ioctl$DIOCRGETTSTATS(r2, 0xc4504440, &(0x7f00000001c0)={{"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", "6f014cdf70dba69a28b5127356efa19c87dee39b2db5dfedddb64318b6c000d8", 0x0, 0x2d}, &(0x7f0000000000)="5e0a9691288485906357eab6c7d3d6", 0xb, 0x3ff, 0xe, 0x6, 0x7ff, 0x9b98, 0x22a, 0x1}) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) syz_emit_ethernet(0x0, 0x0) ftruncate(r1, 0x80002) aio_suspend(0x0, 0x0, 0x0) mkdir(0x0, 0x4a) openat(0xffffffffffffffff, 0x0, 0x200, 0x69) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20411, 0xffffffffffffffff, 0x0) r4 = socket(0x20, 0x5, 0x0) setsockopt$sock_int(r4, 0xffff, 0x1004, &(0x7f0000000180)=0x5, 0x4) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) chroot(0x0) 15.437990639s ago: executing program 33 (id=251): r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, 0x0, 0x0) sendmsg$inet6_sctp(r0, &(0x7f0000001840)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[], 0x14, 0x80}, 0x101) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, 0x0, &(0x7f0000000040)) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xe, 0x0, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x8) r1 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) r2 = open(0x0, 0x18289, 0x110) inotify_add_watch_at(r2, 0xffffffffffffffff, 0x0, 0x210000c6) r3 = __specialfd$eventfd(0x1, &(0x7f0000000000)={0x80000000, 0x1}, 0x8) ioctl$SMB_PCALL(r3, 0x8004667e, &(0x7f0000002400)={0x3, 0x4, 0x2, @buf="b56e", @word=0x418, 0xfffffffd, 0x0, 0x0, 0x0}) ioctl$DIOCRGETTSTATS(r2, 0xc4504440, &(0x7f00000001c0)={{"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", "6f014cdf70dba69a28b5127356efa19c87dee39b2db5dfedddb64318b6c000d8", 0x0, 0x2d}, &(0x7f0000000000)="5e0a9691288485906357eab6c7d3d6", 0xb, 0x3ff, 0xe, 0x6, 0x7ff, 0x9b98, 0x22a, 0x1}) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) syz_emit_ethernet(0x0, 0x0) ftruncate(r1, 0x80002) aio_suspend(0x0, 0x0, 0x0) mkdir(0x0, 0x4a) openat(0xffffffffffffffff, 0x0, 0x200, 0x69) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20411, 0xffffffffffffffff, 0x0) r4 = socket(0x20, 0x5, 0x0) setsockopt$sock_int(r4, 0xffff, 0x1004, &(0x7f0000000180)=0x5, 0x4) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) chroot(0x0) 3.848614606s ago: executing program 34 (id=234): r0 = fork() sigqueue(r0, 0x49, @sival_int=0x8000) procctl$PROC_REAP_ACQUIRE(0x2, r0, 0x2, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000400)={0x10, 0x2, 0x1, @broadcast}, 0x10) sigsuspend(&(0x7f0000000000)={[0x8, 0xffffff10, 0x7, 0x8001]}) fork() fork() procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000080)={0x13, 0x0, 0x0, 0x7}) r2 = getppid() r3 = accept$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x1008, 0x0, ""/4102}, &(0x7f0000001040)=0x1008) fsync(r3) r4 = fcntl$getown(r3, 0x5) procctl$PROC_TRACE_STATUS(0x0, r4, 0x8, &(0x7f00000010c0)) procctl$PROC_REAP_KILL(0x2, r2, 0x6, &(0x7f0000000100)={0x6ab, 0x0, r4, 0x88b, r1}) 3.439372239s ago: executing program 6 (id=307): r0 = fcntl$dupfd(0xffffffffffffff9c, 0x11, 0xffffffffffffff9c) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x901, &(0x7f0000000080)={0x0, 0x3b78, 0x5, [0x8001, 0x5, 0xe, 0x8, 0xff]}, &(0x7f00000000c0)=0x12) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x1d, &(0x7f0000000100)={r1, 0x1}, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r2, 0x80001001, &(0x7f0000000380)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @spare=[0x0, 0x1, 0x0, 0x200000000000]}}) r3 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r3, 0x0) minherit(&(0x7f0000013000/0x4000)=nil, 0x4000, 0x0) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 3.296147805s ago: executing program 6 (id=313): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$DIOCRADDADDRS(r0, 0xc4504443, &(0x7f0000000140)={{"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", "e04928cc687c98454ee7b874a5e9dccb943bbadcc8f44f85c0937e78b5cd74f7", 0x4, 0x6}, 0x0, 0x4, 0x3d4, 0x3, 0x0, 0x8001, 0xfffffffffffffffc, 0x5, 0x4}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) openat$evdev(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r1 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x20) lseek(r1, 0xfffffffffffffffb, 0x4) extattr_set_fd(r1, 0x1, &(0x7f0000000040)='/dev/pf\x00', &(0x7f00000005c0)="ed9ab52624a9712733e40b669a95b09d36b0ad4c7f6d0b94d8bd3d135e26f13870942e69bbeab90017247b0d25209ffd749c60d78c407eb72bd6e291b25cdcec4ee0032ca64c49e5d07441adccac821c0d04618e727b267026814c08e38dfd6b78829fe588e7dd475bcd86e57df6b65c1f3b1b38efd2991ca94ed7ea4cc85231416353b9f7999f92770bc131b1d94971986dd68f42ad3056236eaaf9d37c9ac62a0d75a497b6346c9e3c432b6043806bfcdfbf7fca1f507dc62b205cc50f57ffe5f3b77dff36b6d2fd4a52f0693d11df78e3e5ef3fe50bf7262d0be946107cd066e2d5dac13ff730c3ba65f50a58c111c169", 0xf2) r2 = open(&(0x7f0000000000)='./file0\x00', 0x202, 0x8) readv(r2, &(0x7f0000000280)=[{0x0}], 0x1) 3.295513689s ago: executing program 6 (id=314): socket$inet_sctp(0x2, 0x5, 0x84) r0 = socket(0x1, 0x20000000, 0xa) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @mcast1}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x3, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000bb4e6e23e6a065e951bb1b510000000086dd60db834400081100fe8000000000000000000000000000bbff0200"/62]) ioctl$CIOCCRYPT(r1, 0xc0306367, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x10000, &(0x7f0000000180), 0x0, 0x0, 0x0}) setsockopt$sock_int(r0, 0xffff, 0x8000, 0x0, 0x0) sendto$unix(r0, &(0x7f0000000440)="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", 0x11d, 0x0, 0x0, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x3, 0x0, 0xffffffffffffffe5}) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) openat$bpf(0xffffff9c, 0x0, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1001, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$DIOCRADDADDRS(r4, 0xc0184415, &(0x7f0000000a80)={{"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", "0920cf14d501a846a22d8eb300fbff0400000000000000001000"}, 0x0, 0x40000000009, 0x0, 0xf7b2, 0x20000002, 0x1, 0x0, 0xffffffffffffffff, 0x1}) r5 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) r6 = vfork() sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000000)={0x0, 0xd, 0xf8}) lio_listio(0x0, 0x0, 0x0, &(0x7f0000000300)={0x1, 0x9, @sigval_ptr=0x7fff, @spare=[0x0, 0x100000001, 0x7f, 0xfffffffffffffffe, 0x81, 0x8, 0x4, 0xffffffffffffffff]}) wait4(r6, 0x0, 0x4, 0x0) extattr_delete_fd(r5, 0x3, &(0x7f0000000080)='\'\x00') socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r8, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYRES16=0x0], 0x104}, 0x0) recvmsg(r7, &(0x7f0000000240)={&(0x7f0000000100)=@in={0x10, 0x2, 0xffffffffffffffff, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000280)=""/122, 0x7a}, 0x40) setgid(0x0) 2.261015184s ago: executing program 6 (id=317): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0xa, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) access(&(0x7f0000000680)='./file0\x00', 0x0) writev(r0, 0x0, 0x0) r1 = shmget$private(0x0, 0x3000, 0x102, &(0x7f0000ffa000/0x3000)=nil) shmat(r1, &(0x7f0000001000/0x3000)=nil, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r2, 0x80001001, &(0x7f0000000180)="e2", 0x1, [], 0x4, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int, @spare=[0x0, 0x1]}}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x80000000000206, 0xa3) mlockall(0x2) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x12, r3, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) munlock(&(0x7f0000ffd000/0x2000)=nil, 0x2000) rfork(0x96014) shmctl$IPC_STAT(r1, 0x2, &(0x7f0000000000)=""/14) setresuid(0x0, 0xee01, 0x0) setresuid(0x0, 0xee01, 0xee00) open$dir(0x0, 0x40000400000002c2, 0x0) r4 = open$dir(0x0, 0x0, 0x0) inotify_add_watch_at(0xffffffffffffffff, r4, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x27, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @random="c61800b000", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x0, 0x2, 0x8}}}}}}) 2.255894558s ago: executing program 6 (id=318): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80001001, &(0x7f0000000180)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @spare=[0x0, 0x1, 0x0, 0x200000000000]}}) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x200, 0x24) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r3 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x6548ef4ced78e318) copy_file_range(r3, 0x0, r2, &(0x7f0000000100)=0x2ffff, 0xd, 0x0) preadv(r1, &(0x7f00000001c0)=[{&(0x7f0000001280)=""/4096, 0x1000}], 0x1, 0x3) open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x0) posix_fallocate(r4, 0x0, 0x8) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/65, 0x41}], 0x1) pread(r2, &(0x7f0000000300)=""/64, 0x40, 0x4) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r5, 0x80000001, &(0x7f0000000300)="e2", 0x1, [0xfffffffd], 0x6, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int, @spare=[0x0, 0x0, 0x40000000]}}) r6 = open(&(0x7f0000000140)='./file0\x00', 0x2, 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r6, 0xf000000) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40, 0xc3) preadv(r7, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) fsync(r6) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) 318.691111ms ago: executing program 5 (id=324): socket$inet6_sctp(0x1c, 0x5, 0x84) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x1, 0x0, 0x7, 0x3fffffffffffff]}], 0x1, 0x0, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x3, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) r1 = __specialfd$eventfd(0x1, &(0x7f0000000000)={0x80000000, 0x1}, 0x8) ioctl$SMB_PCALL(r1, 0x8004667e, &(0x7f0000002400)={0x3, 0x4, 0x2, @buf="b56e", @word=0x418, 0xfffffffd, 0x0, 0x0, 0x0}) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r2, 0x8020690c, &(0x7f0000000080)) r3 = openat$efidev(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f0000000100)='./file0\x00', 0x80000, 0x11) fchown(r3, 0x0, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0x10000, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f0000000080)={0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdefffff, [0xaca4, 0x0, 0x2, 0x800000b4]}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000040)={0x0, 0x0, 0x70, 0x30038, &(0x7f0000000180), 0x0, 0x0, 0x0}) semop(0x0, 0x0, 0x0) __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f00000000c0)=[0x7, 0x82, 0xff, 0x2, 0x2, 0x9, 0x10]) kqueue() r5 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r5, 0x3862) bind$inet6(0xffffffffffffffff, &(0x7f0000000300)={0x1c, 0x1c, 0x0, 0x0, @loopback}, 0x1c) readv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000000040)=""/97, 0x61}], 0x1) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x0, @loopback, 0x800}, 0x1c) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, &(0x7f0000000000)={0x16, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7d86699a, [0x0, 0x0, 0x0, 0x3]}) socket$inet_icmp_raw(0x2, 0x3, 0x1) open(&(0x7f0000000080)='./file0\x00', 0x80400000000206, 0x0) r6 = openat$filemon(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) r7 = setsid() ioctl$FILEMON_SET_PID(r6, 0xc0045302, &(0x7f00000002c0)=r7) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000000)=0x5, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) 318.215439ms ago: executing program 5 (id=325): setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x8, &(0x7f0000000040)=0x1, 0x4) openat$crypto(0xffffffffffffff9c, 0x0, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) sendmsg$unix(0xffffffffffffffff, 0x0, 0xc) cpuset_setaffinity(0x3, 0x1, 0xffffffffffffffff, 0x0, 0x0) r0 = openat$md(0xffffff9c, &(0x7f00000001c0), 0x40, 0x0) freebsd11_fstatfs(r0, &(0x7f00000002c0)) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000440), 0x40, 0x0) ioctl$CIOCCRYPT(r1, 0x8002440a, &(0x7f0000000040)={0xfffffffd, 0x1, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0}) profil(&(0x7f0000000300)="4ea8337d55fb65ec5d6b466288767ab5417b55245aa62b40ea0ac261dc7319477ab45b49b6a13b4bf87d80fa11456da25d7f1e14a1e8a83e6d3461e58bbb38bd8be35f09761e0cf14004f3c23b42bcf76c34ed05bd1fac519b7e227e4d27e5dc337660300ee947c195c3a737e116164e370ed5602d9e2da93c4abfaaf8327853fec61a8e14c0709c7baacc03c8d0e9065df3d13e9a4ef027d90b87f697b6cc029177ae2224b58367fac856c787a5510d5688987af980e45259ee8ba328924adcb850ad68571e7bae269387045fe11053af0abf0d7a7e8f91673a0a91b968ff2b9450b7058f347ea029a18c8e01f98aa6ab3444323420c167ae3a2e66e20e02becbc952a2c37b7337a5b1308de8096e826d77bfd5662220df8406", 0x11a, 0x4, 0x5) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000180)=0xffff, 0x3ff, 0x0) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x1, 0xfffffffffffffffc, 0x8003, 0xffffff, 0x6, 0x6, [0x5, 0x2, 0x800, 0x6]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x40, 0x0) freebsd11_getfsstat(&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x1d8, 0x6) setreuid(r3, r3) readlink(0x0, 0x0, 0x0) setreuid(0x0, 0x0) r4 = socket$inet6(0x1c, 0x2, 0xb) connect$inet6(r4, &(0x7f0000000200)={0x1c, 0x1c, 0x1, 0x7f, @mcast2, 0x3}, 0x1c) r5 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(r2, r5, 0x1, 0x400000000000, 0x0, 0x0, 0x1) mlockall(0x2) r6 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r6, 0x0) 278.674919ms ago: executing program 5 (id=326): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x700) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$MDIOCATTACH(r1, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x0, 0x2, &(0x7f0000000040)='./file0\x00', 0x10000, 0x8, 0x3e, 0x0, 0xfffffffd, 0x0, 0x0, [0x5c02, 0xffffffec, 0x7, 0x0, 0x0, 0x80000004, 0x80, 0xfffffffe, 0x0, 0x6, 0x0, 0x292, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44bfb90b, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x58112e15, 0x0, 0x0, 0x0, 0x1, 0x0, 0x20, 0x6, 0xfffffffd, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x653, 0xb0b3, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x2, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x5]}) getfhat(r0, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x200) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$BIOCGRTIMEOUT32(r2, 0x4008426e, &(0x7f0000000040)) r3 = __specialfd$inotify(0x2, &(0x7f00000005c0)={0x100004}, 0xfffffffffffffe75) aio_fsync(0x80, &(0x7f0000000180)={r3, 0xd, &(0x7f00000000c0)="35b9eed1ac3bf5db4a5b2104c011a019c8794afb86ec369352d4bf3336a59015d1008c29023dca34388f61eb00d2a1e9e1dc2035f02f25e611ed3805cae1c94000bc7de8a5854123b5e893fa5ecad4958e581efe23c32f8debf7d53ca795057e29db0d9c1dcebb2d825435d44f004204196f83fbc24ac8c8b8c6d3772bf890df1a7d502756f30c29d2c831c501b35d1439942dd666649d0cf6fcfe3da644b5d3d2a0538ec1", 0xa5, [0x2, 0x3], 0x4, 0x4, 0x5, {0x4, 0x40, &(0x7f0000000000)="377567e8fa010d22b622e563622b2aab36370b1a82af9deb8e474b45070a791942c316fd187b9008c6861a74b64d92afef74872cc73cb2eeb17bc940164375122e67585bdfd59ee95a56b86332a911fa549fe0230f1a7a05af0e46252b6b378dae95f5ea9d4b9aa6d3151de2c6d18370aa4a46f24c6c455e21942c7f4e889ba8"}, {0x4, 0xf, @sigval_int=0x8001, @ke_flags=0x20}}) syz_emit_ethernet(0x3e, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaa003c00000500004c58053bfe8000000000000000000000000000aa0000000000000000"]) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000300)={0x5, 0x800, 0xfffffff8, 0x4, 0x0}, &(0x7f0000000340)=0x10) r5 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000440), 0x80, 0x0) ioctl$BIOCSETIF(r5, 0x8020426c, &(0x7f00000000c0)) ioctl$BIOCSETF(r5, 0x80104267, &(0x7f0000000100)={0x3, &(0x7f00000003c0)=[{0x34, 0x89, 0x2, 0x3}, {0x7, 0x7, 0xa7, 0x158}, {0x6, 0xf9, 0x8}]}) r6 = socket$unix(0x1, 0x5, 0x0) __realpathat(r6, &(0x7f0000000400)='./file0\x00', &(0x7f0000000480)=""/11, 0xb, 0x0) syz_emit_ethernet(0x138, &(0x7f0000000000)=ANY=[]) setsockopt$inet6_sctp_SCTP_EVENT(r0, 0x84, 0x1e, &(0x7f0000000380)={r4, 0x8, 0xff}, 0x8) 272.831829ms ago: executing program 5 (id=327): open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) pathconf(&(0x7f0000000140)='./file0\x00', 0x1) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r0 = open$dir(&(0x7f0000000340)='./file0\x00', 0x2000000, 0x10) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) preadv(r0, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) (async) pathconf(&(0x7f0000000140)='./file0\x00', 0x1) (async) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) (async) open$dir(&(0x7f0000000340)='./file0\x00', 0x2000000, 0x10) (async) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) (async) preadv(r0, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) (async) 262.091547ms ago: executing program 5 (id=328): open(0x0, 0x80000000000206, 0x14b) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) sigaction(0x11, &(0x7f0000000380)={0x0, 0x69, {[0xa, 0x7, 0x8000801, 0x7]}}, 0x0) aio_write(&(0x7f0000000240)={r0, 0x3ff, &(0x7f00000000c0)='w', 0x1, [0x3, 0x400], 0x200000000000000, 0x0, 0x0, {0x200006, 0x20000000007, 0x0}, {0x0, 0x11, @sigval_int=0x2e5562f1, @thr={0x0, 0x0}}}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) r2 = getsid(0xffffffffffffffff) r3 = getpgid(0x0) procctl$PROC_REAP_KILL(0x0, r2, 0x6, &(0x7f0000000100)={0xff, 0xffff9387, 0x0, 0x7810, r3}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f00000004c0)={r4, 0x0, &(0x7f0000000080)='j', 0x1, [0xfffffffe, 0xffffffff], 0x1, 0x0, 0xf, {0x1, 0xd, 0x0}, {0x0, 0x0, @sigval_ptr=0x1004, @spare=[0x9, 0x9, 0xf, 0x4, 0x100000000, 0xd24, 0x3, 0x6b]}}) mlockall(0x2) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x40000400000002c2, 0x1b02482a7d2fa373) pwritev(r5, &(0x7f0000000180)=[{&(0x7f0000000180)}], 0x1, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20411, 0xffffffffffffffff, 0x0) 0s ago: executing program 5 (id=329): r0 = getgid() (async) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) getfsstat(&(0x7f0000002840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x94d, 0x3) (async) r3 = getegid() setegid(r3) mkdir(&(0x7f0000000000)='./file0\x00', 0x10c) (async) close(0xffffffffffffffff) r4 = kqueue() kevent(r4, &(0x7f00000007c0)=[{0xfffffffffffffffd, 0xfffffffffffffff9, 0x6fd0e9ee5e208145, 0x8, 0xe8c5, 0x0, [0xfffffffffffffffc, 0x4000000000000000, 0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) (async) r5 = kqueue() kevent(r5, &(0x7f0000000000)=[{0x3, 0xffffffffffffffff, 0xc0c3, 0xc0000000, 0x0, 0x0, [0x8, 0x1ccf, 0x2, 0x9]}], 0x40000c9, 0x0, 0x0, 0x0) (async) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r6, 0x6, 0x2000, &(0x7f0000000240)={'rack\x00'}, 0x24) (async) kevent(r4, &(0x7f00000004c0)=[{0x5, 0x0, 0x4001, 0x400, 0x6, 0x3, [0x9, 0x1, 0x3, 0x3]}, {0xdc, 0xfffffffffffffffa, 0x4090, 0x2, 0x7fff, 0x5, [0xf9a0, 0x3, 0x5, 0x5]}, {0xe, 0xfffffffffffffffa, 0x40, 0x2, 0x8, 0x0, [0x1, 0xff, 0x8]}, {0x1, 0xfffffffffffffff9, 0xc8, 0x40, 0x9, 0x0, [0x1, 0xdee, 0x1, 0x6]}, {0x5, 0xfffffffffffffffe, 0x80, 0x1, 0x10001, 0x5, [0x9, 0x7, 0x1]}, {0x8, 0xfffffffffffffff9, 0x8000, 0x2, 0xc, 0xffffffff, [0xfde7, 0x8, 0x1, 0x9]}, {0x45f, 0xfffffffffffffffc, 0x4002, 0x1, 0x6, 0x3, [0xfffffffffffffffe, 0x1, 0x100000000003, 0x80000000]}], 0x7, &(0x7f0000000800)=[{}, {}, {}, {}, {}], 0x5, &(0x7f0000000200)={0x80000000, 0x9}) setsockopt$inet_tcp_TCP_FASTOPEN(r6, 0x6, 0x469, &(0x7f00000000c0)={0x1, "f44a17b29d3b2d4600000500"}, 0x14) (async) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa080046e800200000000000069078ac1400bbe0000001000000001100907800000001"]) fchownat(r1, &(0x7f0000000000)='./file0\x00', r2, r3, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000001940)={0x2, 0x1, 0xffffffffffffffff, 0x5, 0xffffffffffffffff}) (async) procctl$PROC_REAP_STATUS(0x0, 0x0, 0x4, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000001a40)={{0x0, r0, 0x0, r3, 0x8, 0x5, 0x0, 0x20d2042d}, 0x2, 0x3, 0x7ff, 0x1, 0x32, 0x6, r7, r8}) (async) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r9) (async) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x6, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0xfff, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x7, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x9, 0x7, 0xfffffffb, 0x1, 0xa001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7, 0x2, 0x0, 0x8, 0xc, 0x8]}, {0x5c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0x0, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x6, 0x2, 0x58, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x28, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x800, 0x0, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x538, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0xffffffff, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x9, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x3, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1ff, 0x4, 0x9, 0x9, 0x6]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0x2, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x9, 0x7, 0x1, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124442, 0x8, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x0, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0xffffffff, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0xfffffffc, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x3, 0xec0, 0x103, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x40, 0x225, 0x80, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8b9, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0x0, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x5, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0x10000, 0x20000004, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0x2, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x2, 0x7, 0x8, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xfffffffa, 0x3, 0x7ff, 0x420c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x20010, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x5, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x3, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd1, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff5, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x81, 0xfff, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xfffffff8, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc9, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x10000, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x2008, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x400, 0x5, 0xfffffffc, 0xffffffff, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0xa6, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x4, 0x81, 0x8, 0x2, 0x4, 0x6, 0x1, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x7, 0x8, 0x1ff, 0x801, 0xa, 0x0, 0x1, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x6, 0x8, 0x1, 0x100, 0x8, 0x20, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x1a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xfffffffb]}, {0x6, [0x10, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x80, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x1, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0xda, 0x2, 0x2, 0x5, 0x6, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0xb, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x7fff, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0xa39, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0x1000, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x0, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x8, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x4, 0x6, 0x0, 0x9, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x2, 0x401, 0x4a1, 0x5, 0x8001, 0x8, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x57a75075, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0x4, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x0, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0x3, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x1, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x0, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x43, 0xc, 0xfffffffc, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x1000080, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x5, 0x9, 0x5, 0x7, 0x9, 0xa, 0x6, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x2, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x8, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0x10001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x8, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) (async) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.229' (ED25519) to the list of known hosts. Dec 2 23:46:46 ci-freebsd-main-8 kernel: arp: aa:aa:aa:aa:aa:bb is using my IP address 172.20.0.170 on tap0! md0: truncating fractional last sector by 1736 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054218800 Dec 2 23:46:50 ci-freebsd-main-8 kernel: nd6_na_input: duplicate IP6 address fe80:5::2aa Warning! syz-executor[982] uses SF_SYNC sendfile(2) flag. Please follow up to https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=287348. Expensive callout(9) function: 0xffffffff81a79020(0xfffffe006e03e540) 0.004211176 s md1: truncating fractional last sector by 1736 bytes WARNING pid 1073 (syz-executor): ioctl sign-extension ioctl 1a000a697 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217800 WARNING pid 1179 (syz-executor): ioctl sign-extension ioctl e9b0f4db2b81eb73 vnode_pager_putpages: zero-length write at 0 resid 12288 0xfffffe006e7c11b8: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371ebc0 usecount 3, writecount 3, refcount 35 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe005872d0f8 ref 2 pages 264 cleanbuf 32 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe005877b780 (pid 1207, syz-executor, tid 100681) nlink=1, effnlink=1, size=1048576, extsize=0 generation=e93bbb5d, uid=0, gid=0, flags=0x119304 ino 133, on dev gpt/rootfs md0: truncating fractional last sector by 8 bytes Connection to 10.128.1.229 closed by remote host. vnode_pager_putpages: zero-length write at 0 resid 8192 0xfffffe006e717dc0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371ebc0 usecount 2, writecount 1, refcount 5 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00586fa5d0 ref 1 pages 24 cleanbuf 2 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe0058774000 (pid 1315, syz-executor, tid 100854) nlink=1, effnlink=1, size=697472, extsize=0 generation=a7ed96f1, uid=0, gid=0, flags=0x40009 ino 198647, on dev gpt/rootfs Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe006e75e800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e75e800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e75e800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e75e800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e75e800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e75e800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e75f800 panic: Assertion error == 0 || error == EINTR || error == ERESTART failed at /syzkaller/managers/main/kernel/sys/net/if_tuntap.c:1316 cpuid = 1 time = 17 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0xc6/frame 0xfffffe0056e81fd0 kdb_backtrace() at kdb_backtrace+0xd0/frame 0xfffffe0056e82130 vpanic() at vpanic+0x257/frame 0xfffffe0056e822f0 panic() at panic+0xb5/frame 0xfffffe0056e823b0 tundtor() at tundtor+0x9ef/frame 0xfffffe0056e82440 devfs_destroy_cdevpriv() at devfs_destroy_cdevpriv+0x183/frame 0xfffffe0056e82480 devfs_close_f() at devfs_close_f+0xb6/frame 0xfffffe0056e824c0 _fdrop() at _fdrop+0x5c/frame 0xfffffe0056e824f0 closef() at closef+0x655/frame 0xfffffe0056e826d0 fdescfree() at fdescfree+0xa5e/frame 0xfffffe0056e828b0 exit1() at exit1+0x887/frame 0xfffffe0056e82950 sigexit() at sigexit+0x213/frame 0xfffffe0056e82a70 postsig() at postsig+0x2c5/frame 0xfffffe0056e82bf0 ast_sig() at ast_sig+0x85b/frame 0xfffffe0056e82ea0 ast_handler() at ast_handler+0x2b0/frame 0xfffffe0056e82f10 ast() at ast+0x25/frame 0xfffffe0056e82f30 doreti_ast() at doreti_ast+0x1c/frame 0x826112f10 KDB: enter: panic [ thread pid 1033 tid 100179 ] Stopped at kdb_enter+0x6e: movq $0,0x258c577(%rip) db> db> set $lines = 0 db> set $maxwidth = 0 db> show registers cs 0x20 ds 0x3b es 0x3b fs 0x13 gs 0x1b ss 0x28 rax 0x12 rcx 0xfffffe0002bf1850