last executing test programs: 11.829790143s ago: executing program 3 (id=318): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000000)=ANY=[@ANYBLOB="1b14"], 0xa8) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(r0, &(0x7f0000000200)="0e", 0xff66, 0x20bf0023, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'bbr\x00', 0xf}, 0x24) aio_waitcomplete(0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) listen(r1, 0xe82) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) rfork(0x1040) rfork(0x85000) r3 = socket(0x2, 0x1, 0x0) ktimer_create(0x30f4b5a44dd8a498, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r4, 0x29, 0x23, &(0x7f0000000480)={0x3f, 0x13, '\x00', [@generic={0xc, 0x93, "60b01e33bcb72ac5692387c13723d8029957181f49eaa4853e3364785920243efd7019248e83812cfa8e27d3231301df3de30e9337bd5d9fa6a353c363609736bf53c57596a5ef7670c1ddf47cc7ff7f8d33275f3f11a4062bf46ddd15dab2cbb14a9c43e0e1f6103259fb807db12f12601b79f1b0586283db11bd8a203fb98101ae3c1777926679816c9bd06f72f53ba66a4e"}, @enc_lim={0x4, 0x1, 0x2b}]}, 0xa0) setsockopt$inet6_buf(r3, 0x29, 0x31, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = dup(r5) freebsd11_lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 11.74996974s ago: executing program 1 (id=320): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000"]) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000180)='./file1\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) execve(0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000580)="7215a382", 0x4) r4 = dup(r2) sendmsg$unix(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10}, @rights={0x10, 0xffff, 0x1, [r3]}], 0xd0}, 0x0) socket$inet6(0x1c, 0x3, 0x7) 11.136037517s ago: executing program 2 (id=321): r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="02"], 0x401, 0x0) msgsnd(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="03"], 0x8, 0x0) msgrcv(r1, &(0x7f0000000940)={0x0, ""/4096}, 0x1008, 0x2, 0x2800) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) aio_waitcomplete(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x20) r2 = socket(0x1c, 0x1, 0x0) r3 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) ioctl$BIOCSETF(r3, 0x80084267, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000540), 0x80000, 0x0) select(0x40, &(0x7f0000000600)={0x2637047b, 0xde, 0x1, 0x3, 0x9, 0x0, 0xd67b, 0x6}, &(0x7f0000000640)={0x100000001, 0x6, 0xfffffffffffffff8, 0x6891, 0x6a7, 0x9, 0x10000, 0x3}, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r4 = open$dir(&(0x7f0000000200)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) freebsd11_mknodat(r0, &(0x7f0000000280)='./file0\x00', 0x4, 0x8) sendfile(r4, r7, 0x1, 0x400000000000, 0x0, 0x0, 0x1) r8 = socket(0x1c, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r9 = open(&(0x7f0000000780)='./file0\x00', 0x8000, 0x0) flock(r9, 0x3) close(r9) execve(0x0, 0x0, 0x0) ioctl$KDGETMODE(r8, 0x40046676, 0x22e00000) 10.972585355s ago: executing program 3 (id=322): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100, 0x0) ktrace(0x0, 0x0, 0x4000011e, 0x0) setitimer(0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0x7fff, 0x8000, [0xfffffffffffffffe, 0x81, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r2 = kqueue() __semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000000)=0x3, 0x4) syz_emit_ethernet(0x22, &(0x7f00000005c0)=ANY=[@ANYRES8=r2, @ANYBLOB="094d6655753c38fe8dd2505e2f1278f24682a25e1e0297717e86e3fdc83bfa2b557614b8215f74e8f956d0537a7a4ff517106a018bc148e3e7cbbecfc7e8df5b", @ANYRESDEC=r0, @ANYBLOB="af76a90e68c4d3e417e8a0cbfd2daf26a86bc8895a0863032fd4975f7b029a31d3288ea0b4d64aa78aad077e15c74fae981569d1837f7877c93f0580197d54c0bfef7ddd55ff335c8d773f1322b333b1bf0c04f04d9f7fe542ce4a18eb2c468471f3db", @ANYBLOB="59d49c7bbdb32dffd2ba494754eadc4d097e38e5ff4a9d08ed41c702427b726f1d79967ed1a23f5717d4a969b953f83e6fe081baeba4e25b50c463f6d8a22b1a0170547608de2b6965e844148a601675b5287915fd83d326ae2b816ade30779dff6157d2c44f92a23c0223e312ffb9629c25f07dcd1206a6c77adb33a3b83d432f7e32e88a41a30b39a4524917720a059c213734629eedc19479281ac44472680ec68c9a7dff6c5829b0d6ff94c7e8769e4fc91f", @ANYBLOB="5b6cf551c9a60f03cc3c402dbb424380a9bfecdbafdbe248915984b3d6746ef14054b4c023153a6045243a5d7b45819cd3d27dc25a124e6f5db5145f5312fcf381e67eb28a5125dcab0c75caeacd420c3d8adb7d0f212a52d063989874f33a930f3a343b7b7dbb13594a5e67864e506251226532088b11ef162746f05c4fcbed7c9c817fd6a72719427ca0efce763c6678f0067f276b564b2dec8a57b2b49cb7cca7a5f6c0c5a6e4c5ab3f7fc5f6cd4dbcd7dfc74b855b862a"]) r3 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) utimensat(r4, &(0x7f00000000c0)='./file/file0/..//file0\x00', &(0x7f0000000140)={{0x100, 0x2}, {0x3f46d0a4, 0x401}}, 0x0) chdir(&(0x7f0000000400)='./file/file0/..//file0\x00') open$dir(&(0x7f0000000200)='./file/file0/..//file0\x00', 0x200, 0x3c) pathconf(0x0, 0x3c) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) fork() mkdir(&(0x7f0000000040)='./file0\x00', 0x38) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) rmdir(&(0x7f00000001c0)='./file0\x00') fstatat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x200) pathconf(&(0x7f00000002c0)='./file1/file0\x00', 0x2) 10.510039524s ago: executing program 0 (id=324): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000000)=ANY=[@ANYBLOB="1b14"], 0xa8) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(r0, &(0x7f0000000200)="0e", 0xff66, 0x20bf0023, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'bbr\x00', 0xf}, 0x24) aio_waitcomplete(0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) listen(r1, 0xe82) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) rfork(0x1040) rfork(0x85000) r3 = socket(0x2, 0x1, 0x0) ktimer_create(0x30f4b5a44dd8a498, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r4, 0x29, 0x23, &(0x7f0000000480)={0x3f, 0x13, '\x00', [@generic={0xc, 0x93, "60b01e33bcb72ac5692387c13723d8029957181f49eaa4853e3364785920243efd7019248e83812cfa8e27d3231301df3de30e9337bd5d9fa6a353c363609736bf53c57596a5ef7670c1ddf47cc7ff7f8d33275f3f11a4062bf46ddd15dab2cbb14a9c43e0e1f6103259fb807db12f12601b79f1b0586283db11bd8a203fb98101ae3c1777926679816c9bd06f72f53ba66a4e"}, @enc_lim={0x4, 0x1, 0x2b}]}, 0xa0) setsockopt$inet6_buf(r3, 0x29, 0x31, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) r5 = dup(0xffffffffffffffff) freebsd11_lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r5, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)=[@cred={0x60, 0xffff, 0x3, 0x0, r6, 0x0, 0x0, 0x10}], 0x60}, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 10.232622921s ago: executing program 2 (id=325): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000000)=ANY=[@ANYBLOB="1b14"], 0xa8) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(r0, &(0x7f0000000200)="0e", 0xff66, 0x20bf0023, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'bbr\x00', 0xf}, 0x24) aio_waitcomplete(0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) listen(r1, 0xe82) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) rfork(0x1040) rfork(0x85000) r3 = socket(0x2, 0x1, 0x0) ktimer_create(0x30f4b5a44dd8a498, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r4, 0x29, 0x23, &(0x7f0000000480)={0x3f, 0x13, '\x00', [@generic={0xc, 0x93, "60b01e33bcb72ac5692387c13723d8029957181f49eaa4853e3364785920243efd7019248e83812cfa8e27d3231301df3de30e9337bd5d9fa6a353c363609736bf53c57596a5ef7670c1ddf47cc7ff7f8d33275f3f11a4062bf46ddd15dab2cbb14a9c43e0e1f6103259fb807db12f12601b79f1b0586283db11bd8a203fb98101ae3c1777926679816c9bd06f72f53ba66a4e"}, @enc_lim={0x4, 0x1, 0x2b}]}, 0xa0) setsockopt$inet6_buf(r3, 0x29, 0x31, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = dup(r5) freebsd11_lstat(&(0x7f0000000000)='./file0\x00', 0x0) sendmsg$unix(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10}], 0x60}, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 9.943123397s ago: executing program 3 (id=326): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000"]) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) mkdirat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) execve(0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r2, 0x0, 0x2, &(0x7f0000000580)="7215a382", 0x4) r3 = dup(r1) sendmsg$unix(r3, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10}, @rights={0x10, 0xffff, 0x1, [r2]}], 0xd0}, 0x0) socket$inet6(0x1c, 0x3, 0x7) 9.638858634s ago: executing program 1 (id=327): r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="02"], 0x401, 0x0) msgsnd(r1, 0x0, 0x8, 0x0) msgrcv(r1, &(0x7f0000000940)={0x0, ""/4096}, 0x1008, 0x2, 0x2800) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) aio_waitcomplete(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x20) r2 = socket(0x1c, 0x1, 0x0) r3 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) ioctl$BIOCSETF(r3, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) openat$bpf(0xffffff9c, &(0x7f0000000540), 0x80000, 0x0) select(0x40, &(0x7f0000000600)={0x2637047b, 0xde, 0x1, 0x3, 0x9, 0x0, 0xd67b, 0x6}, &(0x7f0000000640)={0x100000001, 0x6, 0xfffffffffffffff8, 0x6891, 0x6a7, 0x9, 0x10000, 0x3}, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r4 = open$dir(&(0x7f0000000200)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) freebsd11_mknodat(r0, &(0x7f0000000280)='./file0\x00', 0x4, 0x8) sendfile(r4, r7, 0x1, 0x400000000000, 0x0, 0x0, 0x1) r8 = socket(0x1c, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r9 = open(&(0x7f0000000780)='./file0\x00', 0x8000, 0x0) flock(r9, 0x3) close(r9) execve(0x0, 0x0, 0x0) ioctl$KDGETMODE(r8, 0x40046676, 0x22e00000) 9.489986977s ago: executing program 0 (id=328): aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x5) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0xfdfffffffffffffc]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r3, r2, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) unlinkat(r2, &(0x7f0000000400)='./file0\x00', 0x2000) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r4 = inotify_add_watch_at(r3, r2, &(0x7f0000000080)='./file0\x00', 0x2000a00) inotify_rm_watch(r3, r4) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r5 = socket(0x1c, 0x1, 0x0) chdir(0x0) getsockopt$inet6_int(r5, 0x29, 0x1a, &(0x7f00000002c0), &(0x7f0000000340)=0x4) bindat(r1, r0, &(0x7f0000000180)=@in6={0x1c, 0x1c, 0x0, 0xa, @empty, 0x5}, 0x1c) openat$crypto(0xffffff9c, &(0x7f00000003c0), 0x4, 0x0) open$dir(0x0, 0x202, 0x0) semop(0x0, &(0x7f0000000040)=[{0x2, 0x7cff, 0x1800}, {0x0, 0x4, 0x1000}], 0x2) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0xd, &(0x7f0000000080)={0x10007ff, {{0x1c, 0x1c, 0x1, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}}, {{0x1c, 0x1c, 0x0, 0x0, @mcast2, 0xffffffff}}}, 0xfc) 9.308153372s ago: executing program 2 (id=329): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100, 0x0) ktrace(0x0, 0x0, 0x4000011e, 0x0) setitimer(0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0x7fff, 0x8000, [0xfffffffffffffffe, 0x81, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) kqueue() __semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000000)=0x3, 0x4) r2 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) utimensat(r3, &(0x7f00000000c0)='./file/file0/..//file0\x00', &(0x7f0000000140)={{0x100, 0x2}, {0x3f46d0a4, 0x401}}, 0x0) chdir(&(0x7f0000000400)='./file/file0/..//file0\x00') getsockopt$inet_mreqn(r2, 0x0, 0xc, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000200)='./file/file0/..//file0\x00', 0x200, 0x3c) pathconf(0x0, 0x3c) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) fork() mkdir(&(0x7f0000000040)='./file0\x00', 0x38) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) rmdir(&(0x7f00000001c0)='./file0\x00') fstatat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x200) pathconf(&(0x7f00000002c0)='./file1/file0\x00', 0x2) 8.688340728s ago: executing program 1 (id=330): aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x5) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0xfdfffffffffffffc]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r3, r2, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) unlinkat(r2, &(0x7f0000000400)='./file0\x00', 0x2000) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r4 = inotify_add_watch_at(r3, r2, &(0x7f0000000080)='./file0\x00', 0x2000a00) inotify_rm_watch(r3, r4) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r5 = socket(0x1c, 0x1, 0x0) chdir(0x0) getsockopt$inet6_int(r5, 0x29, 0x1a, &(0x7f00000002c0), &(0x7f0000000340)=0x4) bindat(r1, r0, &(0x7f0000000180)=@in6={0x1c, 0x1c, 0x0, 0xa, @empty, 0x5}, 0x1c) openat$crypto(0xffffff9c, &(0x7f00000003c0), 0x4, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) semop(0x0, &(0x7f0000000040)=[{0x2, 0x7cff, 0x1800}, {0x0, 0x4, 0x1000}], 0x2) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0xd, 0x0, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 8.526634482s ago: executing program 0 (id=331): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000000)=ANY=[@ANYBLOB="1b14"], 0xa8) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(r0, &(0x7f0000000200)="0e", 0xff66, 0x20bf0023, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'bbr\x00', 0xf}, 0x24) aio_waitcomplete(0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) listen(r1, 0xe82) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) rfork(0x1040) rfork(0x85000) r3 = socket(0x2, 0x1, 0x0) ktimer_create(0x30f4b5a44dd8a498, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r4, 0x29, 0x23, &(0x7f0000000480)={0x3f, 0x13, '\x00', [@generic={0xc, 0x93, "60b01e33bcb72ac5692387c13723d8029957181f49eaa4853e3364785920243efd7019248e83812cfa8e27d3231301df3de30e9337bd5d9fa6a353c363609736bf53c57596a5ef7670c1ddf47cc7ff7f8d33275f3f11a4062bf46ddd15dab2cbb14a9c43e0e1f6103259fb807db12f12601b79f1b0586283db11bd8a203fb98101ae3c1777926679816c9bd06f72f53ba66a4e"}, @enc_lim={0x4, 0x1, 0x2b}]}, 0xa0) setsockopt$inet6_buf(r3, 0x29, 0x31, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = dup(r5) freebsd11_lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 7.814624948s ago: executing program 2 (id=332): pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read(r1, &(0x7f0000001000)=""/223, 0xdf) writev(r0, &(0x7f0000002340)=[{&(0x7f0000000000)="3c2e719e9fe467c83887bf0453b255ff131bf5999470b3562e087dfc1e51226d3deb834bd4fb66e4e04b8e33a0b0ba133ce23bb595064ffca711b84603a34d6bfc5454c0e02704a27492e6c92413a7bbe113e877f8f8c2f8522b1e4d66ed8bc87f05a82b245d8df90b9a314035cf27e21552fee422ca1aa8a0201762262ae6117e36603843e73775a92c0cb6384bdf885d7e770bd6617cf4", 0x98}, {0x0}, {&(0x7f0000001100)="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", 0x254}, {&(0x7f0000000540)="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", 0x113}, {&(0x7f00000015c0)="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", 0xa52}], 0x5) 7.701521453s ago: executing program 1 (id=333): openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) open(0x0, 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) extattr_set_file(0x0, 0x2, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) cap_rights_limit(r2, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(r1, 0x0, &(0x7f0000000180)) r3 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x42, &(0x7f00000001c0)={@broadcast, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x34, 0x65, 0x0, 0x0, 0x6, 0x0, @multicast2, @remote={0xac, 0x14, 0x0}, {[@noop, @lsrr={0x83, 0x3, 0x90}]}}, @icmp=@parameter_prob={0xc, 0x1, 0x0, 0xcc, 0x40, 0x0, {0x5, 0x4, 0x1, 0x6, 0x8, 0x64, 0xfffa, 0x81, 0xc, 0xfff9, @empty, @loopback}}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) copy_file_range(r0, &(0x7f0000000000)=0x80000001, r0, 0x0, 0x5, 0x0) mkdir(0x0, 0x20) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x4a) extattr_delete_file(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f0000000080)='+\x00') open(&(0x7f0000000000)='./file/file0/..//file0\x00', 0x5ce5c61037f1d844, 0x100) 7.622589675s ago: executing program 2 (id=334): r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f00000008c0)=ANY=[@ANYBLOB="02"], 0x401, 0x0) msgsnd(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="03"], 0x8, 0x0) msgrcv(r1, &(0x7f0000000940)={0x0, ""/4096}, 0x1008, 0x2, 0x2800) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) aio_waitcomplete(0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x20) r2 = socket(0x1c, 0x1, 0x0) r3 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) ioctl$BIOCSETF(r3, 0x80084267, &(0x7f0000000140)={0x0, 0x0}) openat$bpf(0xffffff9c, &(0x7f0000000540), 0x80000, 0x0) select(0x40, &(0x7f0000000600)={0x2637047b, 0xde, 0x1, 0x3, 0x9, 0x0, 0xd67b, 0x6}, &(0x7f0000000640)={0x100000001, 0x6, 0xfffffffffffffff8, 0x6891, 0x6a7, 0x9, 0x10000, 0x3}, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r4 = open$dir(&(0x7f0000000200)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = fcntl$dupfd(r6, 0x0, r5) freebsd11_mknodat(r0, &(0x7f0000000280)='./file0\x00', 0x4, 0x8) sendfile(r4, r7, 0x1, 0x400000000000, 0x0, 0x0, 0x1) r8 = socket(0x1c, 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r9 = open(&(0x7f0000000780)='./file0\x00', 0x8000, 0x0) flock(r9, 0x3) close(r9) execve(0x0, 0x0, 0x0) ioctl$KDGETMODE(r8, 0x40046676, 0x22e00000) 6.862969235s ago: executing program 3 (id=335): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100, 0x0) ktrace(0x0, 0x0, 0x4000011e, 0x0) setitimer(0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0x7fff, 0x8000, [0xfffffffffffffffe, 0x81, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r2 = kqueue() __semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000000)=0x3, 0x4) syz_emit_ethernet(0x22, &(0x7f00000005c0)=ANY=[@ANYRES8=r2, @ANYBLOB="094d6655753c38fe8dd2505e2f1278f24682a25e1e0297717e86e3fdc83bfa2b557614b8215f74e8f956d0537a7a4ff517106a018bc148e3e7cbbecfc7e8df5b", @ANYRESDEC=r0, @ANYBLOB="af76a90e68c4d3e417e8a0cbfd2daf26a86bc8895a0863032fd4975f7b029a31d3288ea0b4d64aa78aad077e15c74fae981569d1837f7877c93f0580197d54c0bfef7ddd55ff335c8d773f1322b333b1bf0c04f04d9f7fe542ce4a18eb2c468471f3db", @ANYBLOB="59d49c7bbdb32dffd2ba494754eadc4d097e38e5ff4a9d08ed41c702427b726f1d79967ed1a23f5717d4a969b953f83e6fe081baeba4e25b50c463f6d8a22b1a0170547608de2b6965e844148a601675b5287915fd83d326ae2b816ade30779dff6157d2c44f92a23c0223e312ffb9629c25f07dcd1206a6c77adb33a3b83d432f7e32e88a41a30b39a4524917720a059c213734629eedc19479281ac44472680ec68c9a7dff6c5829b0d6ff94c7e8769e4fc91f", @ANYBLOB="5b6cf551c9a60f03cc3c402dbb424380a9bfecdbafdbe248915984b3d6746ef14054b4c023153a6045243a5d7b45819cd3d27dc25a124e6f5db5145f5312fcf381e67eb28a5125dcab0c75caeacd420c3d8adb7d0f212a52d063989874f33a930f3a343b7b7dbb13594a5e67864e506251226532088b11ef162746f05c4fcbed7c9c817fd6a72719427ca0efce763c6678f0067f276b564b2dec8a57b2b49cb7cca7a5f6c0c5a6e4c5ab3f7fc5f6cd4dbcd7dfc74b855b862a"]) r3 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) utimensat(r4, &(0x7f00000000c0)='./file/file0/..//file0\x00', &(0x7f0000000140)={{0x100, 0x2}, {0x3f46d0a4, 0x401}}, 0x0) chdir(&(0x7f0000000400)='./file/file0/..//file0\x00') getsockopt$inet_mreqn(r3, 0x0, 0xc, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000200)='./file/file0/..//file0\x00', 0x200, 0x3c) pathconf(0x0, 0x3c) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) fork() mkdir(&(0x7f0000000040)='./file0\x00', 0x38) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) rmdir(&(0x7f00000001c0)='./file0\x00') fstatat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x200) pathconf(&(0x7f00000002c0)='./file1/file0\x00', 0x2) 6.853221303s ago: executing program 0 (id=336): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000000)=ANY=[@ANYBLOB="1b14"], 0xa8) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(r0, &(0x7f0000000200)="0e", 0xff66, 0x20bf0023, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'bbr\x00', 0xf}, 0x24) aio_waitcomplete(0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) listen(r1, 0xe82) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) rfork(0x1040) rfork(0x85000) r3 = socket(0x2, 0x1, 0x0) ktimer_create(0x30f4b5a44dd8a498, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r4, 0x29, 0x23, &(0x7f0000000480)={0x3f, 0x13, '\x00', [@generic={0xc, 0x93, "60b01e33bcb72ac5692387c13723d8029957181f49eaa4853e3364785920243efd7019248e83812cfa8e27d3231301df3de30e9337bd5d9fa6a353c363609736bf53c57596a5ef7670c1ddf47cc7ff7f8d33275f3f11a4062bf46ddd15dab2cbb14a9c43e0e1f6103259fb807db12f12601b79f1b0586283db11bd8a203fb98101ae3c1777926679816c9bd06f72f53ba66a4e"}, @enc_lim={0x4, 0x1, 0x2b}]}, 0xa0) setsockopt$inet6_buf(r3, 0x29, 0x31, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = dup(r5) freebsd11_lstat(0x0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r6, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)=[@cred={0x60, 0xffff, 0x3, 0x0, r7, 0x0, 0x0, 0x10}], 0x60}, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 5.774564613s ago: executing program 1 (id=337): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000"]) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000180)='./file1\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) execve(0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r3, 0x0, 0x2, &(0x7f0000000580)="7215a382", 0x4) r4 = dup(r2) sendmsg$unix(r4, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000ec0)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10}, @rights={0x10, 0xffff, 0x1, [r3]}], 0xd0}, 0x0) socket$inet6(0x1c, 0x3, 0x7) 5.683433843s ago: executing program 3 (id=338): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000000)=ANY=[@ANYBLOB="1b14"], 0xa8) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(r0, &(0x7f0000000200)="0e", 0xff66, 0x20bf0023, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000040)={'bbr\x00', 0xf}, 0x24) aio_waitcomplete(0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) listen(r1, 0xe82) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) rfork(0x1040) rfork(0x85000) r3 = socket(0x2, 0x1, 0x0) ktimer_create(0x30f4b5a44dd8a498, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r4, 0x29, 0x23, &(0x7f0000000480)={0x3f, 0x13, '\x00', [@generic={0xc, 0x93, "60b01e33bcb72ac5692387c13723d8029957181f49eaa4853e3364785920243efd7019248e83812cfa8e27d3231301df3de30e9337bd5d9fa6a353c363609736bf53c57596a5ef7670c1ddf47cc7ff7f8d33275f3f11a4062bf46ddd15dab2cbb14a9c43e0e1f6103259fb807db12f12601b79f1b0586283db11bd8a203fb98101ae3c1777926679816c9bd06f72f53ba66a4e"}, @enc_lim={0x4, 0x1, 0x2b}]}, 0xa0) setsockopt$inet6_buf(r3, 0x29, 0x31, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r6 = dup(r5) freebsd11_lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)) sendmsg$unix(r6, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 5.677396025s ago: executing program 2 (id=339): aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x5) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0xfdfffffffffffffc]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r3, r2, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) unlinkat(r2, &(0x7f0000000400)='./file0\x00', 0x2000) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r4 = inotify_add_watch_at(r3, r2, &(0x7f0000000080)='./file0\x00', 0x2000a00) inotify_rm_watch(r3, r4) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r5 = socket(0x1c, 0x1, 0x0) chdir(0x0) getsockopt$inet6_int(r5, 0x29, 0x1a, &(0x7f00000002c0), &(0x7f0000000340)=0x4) bindat(r1, r0, &(0x7f0000000180)=@in6={0x1c, 0x1c, 0x0, 0xa, @empty, 0x5}, 0x1c) openat$crypto(0xffffff9c, &(0x7f00000003c0), 0x4, 0x0) open$dir(0x0, 0x202, 0x0) semop(0x0, &(0x7f0000000040)=[{0x2, 0x7cff, 0x1800}, {0x0, 0x4, 0x1000}], 0x2) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0xd, &(0x7f0000000080)={0x10007ff, {{0x1c, 0x1c, 0x1, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}}, {{0x1c, 0x1c, 0x0, 0x0, @mcast2, 0xffffffff}}}, 0xfc) 5.67549875s ago: executing program 0 (id=340): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100, 0x0) ktrace(0x0, 0x0, 0x4000011e, 0x0) setitimer(0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0x7fff, 0x8000, [0xfffffffffffffffe, 0x81, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) kqueue() __semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000000)=0x3, 0x4) r2 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) utimensat(r3, &(0x7f00000000c0)='./file/file0/..//file0\x00', &(0x7f0000000140)={{0x100, 0x2}, {0x3f46d0a4, 0x401}}, 0x0) chdir(&(0x7f0000000400)='./file/file0/..//file0\x00') getsockopt$inet_mreqn(r2, 0x0, 0xc, 0x0, &(0x7f0000000100)) open$dir(&(0x7f0000000200)='./file/file0/..//file0\x00', 0x200, 0x3c) pathconf(0x0, 0x3c) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) fork() mkdir(&(0x7f0000000040)='./file0\x00', 0x38) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) rmdir(&(0x7f00000001c0)='./file0\x00') fstatat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x200) pathconf(&(0x7f00000002c0)='./file1/file0\x00', 0x2) 4.810489329s ago: executing program 3 (id=341): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100, 0x0) ktrace(0x0, 0x0, 0x4000011e, 0x0) setitimer(0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0x7fff, 0x8000, [0xfffffffffffffffe, 0x81, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r2 = kqueue() __semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, 0x0) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000000000)=0x3, 0x4) syz_emit_ethernet(0x22, &(0x7f00000005c0)=ANY=[@ANYRES8=r2, @ANYBLOB="094d6655753c38fe8dd2505e2f1278f24682a25e1e0297717e86e3fdc83bfa2b557614b8215f74e8f956d0537a7a4ff517106a018bc148e3e7cbbecfc7e8df5b", @ANYRESDEC=r0, @ANYBLOB="af76a90e68c4d3e417e8a0cbfd2daf26a86bc8895a0863032fd4975f7b029a31d3288ea0b4d64aa78aad077e15c74fae981569d1837f7877c93f0580197d54c0bfef7ddd55ff335c8d773f1322b333b1bf0c04f04d9f7fe542ce4a18eb2c468471f3db", @ANYBLOB="59d49c7bbdb32dffd2ba494754eadc4d097e38e5ff4a9d08ed41c702427b726f1d79967ed1a23f5717d4a969b953f83e6fe081baeba4e25b50c463f6d8a22b1a0170547608de2b6965e844148a601675b5287915fd83d326ae2b816ade30779dff6157d2c44f92a23c0223e312ffb9629c25f07dcd1206a6c77adb33a3b83d432f7e32e88a41a30b39a4524917720a059c213734629eedc19479281ac44472680ec68c9a7dff6c5829b0d6ff94c7e8769e4fc91f", @ANYBLOB="5b6cf551c9a60f03cc3c402dbb424380a9bfecdbafdbe248915984b3d6746ef14054b4c023153a6045243a5d7b45819cd3d27dc25a124e6f5db5145f5312fcf381e67eb28a5125dcab0c75caeacd420c3d8adb7d0f212a52d063989874f33a930f3a343b7b7dbb13594a5e67864e506251226532088b11ef162746f05c4fcbed7c9c817fd6a72719427ca0efce763c6678f0067f276b564b2dec8a57b2b49cb7cca7a5f6c0c5a6e4c5ab3f7fc5f6cd4dbcd7dfc74b855b862a"]) r3 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) utimensat(r4, &(0x7f00000000c0)='./file/file0/..//file0\x00', &(0x7f0000000140)={{0x100, 0x2}, {0x3f46d0a4, 0x401}}, 0x0) chdir(&(0x7f0000000400)='./file/file0/..//file0\x00') getsockopt$inet_mreqn(r3, 0x0, 0xc, 0x0, &(0x7f0000000100)) pathconf(0x0, 0x3c) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) fork() mkdir(&(0x7f0000000040)='./file0\x00', 0x38) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) rmdir(&(0x7f00000001c0)='./file0\x00') fstatat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x200) pathconf(&(0x7f00000002c0)='./file1/file0\x00', 0x2) 257.892562ms ago: executing program 0 (id=342): aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x5) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0xfdfffffffffffffc]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r3, r2, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) unlinkat(r2, &(0x7f0000000400)='./file0\x00', 0x2000) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r4 = inotify_add_watch_at(r3, r2, &(0x7f0000000080)='./file0\x00', 0x2000a00) inotify_rm_watch(r3, r4) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r5 = socket(0x1c, 0x1, 0x0) chdir(0x0) getsockopt$inet6_int(r5, 0x29, 0x1a, &(0x7f00000002c0), &(0x7f0000000340)=0x4) bindat(r1, r0, &(0x7f0000000180)=@in6={0x1c, 0x1c, 0x0, 0xa, @empty, 0x5}, 0x1c) openat$crypto(0xffffff9c, &(0x7f00000003c0), 0x4, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) semop(0x0, &(0x7f0000000040)=[{0x2, 0x7cff, 0x1800}, {0x0, 0x4, 0x1000}], 0x2) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0xd, 0x0, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 0s ago: executing program 1 (id=343): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x4) connect(r1, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='\f\x00\x00\x00)\x00 \x00'], 0xc}, 0x88) r2 = socket(0x1c, 0x1, 0x0) fpathconf(0xffffffffffffffff, 0x3b) getsockname(r2, &(0x7f0000000000)=@in={0x10, 0x2, 0xffffffffffffffff, @local}, &(0x7f0000000080)=0x10) syz_emit_ethernet(0xe8, &(0x7f0000000500)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff803cd6cab2fa77f5ccf705fb396dfd166b9a3cc69d9116179dec217edf7e7162c28a3315243fef1b0e9120561d24ab4f32f8e2197d9d00298be3fa519322fb96ad40b41077bcf68670480cf4c468223e920fcfec1310bc8ef9f17c5fc920780c12f6fc1bd4a37b2b7f299f65eced82d97c54b87ec3476c34637eb7483fe97d834f4193210b68d17882526460fabb1f08ce5873531aca97442bb6154fa2f1362d3d4ce6b41798fc240de31caa8d34ce32f336314a3a85fe97"]) socket(0x1c, 0x1, 0x0) pipe2(0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN(0xffffffffffffffff, 0x6, 0x401, &(0x7f0000000140)={0x0, "747ccff61dc359f8e13c2a68a2fa9bb3"}, 0x14) undelete(&(0x7f0000000100)='./file0/file0\x00') r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r3, 0x6, 0x24, &(0x7f00000001c0)="e754d56b37195d92c5454fd6cd61734ed173d05747ab7a160be29248799822e2a93f3b3a41ecab86b8f5bb92967d59c29ccfae8e5ec9d318905b264ee927fb22bec1a2646e43f0a9cc390121c0b017e50248705e9918a96fb27cab729a60127adb4e9eab8caa32877bb7c6b0949df0409b7b4ae8b222da1e58b572884c16942cd0a08fc2cd729f2b3f39d85fe2ac995971e68f5ea782fdddead41b684bbfb1e7265d082a9718259976f93c", 0xab) setsockopt$inet_tcp_buf(r3, 0x6, 0x24, &(0x7f00000005c0), 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) open$dir(&(0x7f00000000c0)='./file0\x00', 0xd6dfe06bdea017f9, 0x141) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x4e50, 0x0) syz_emit_ethernet(0x0, 0x0) utimensat(r4, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)={{0x0, 0xffffffffffffffff}, {0x0, 0xffffffffffffffff}}, 0x4000) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000040)={0xb, 0x0, 0xf, &(0x7f0000000180)="0070c65142bfdb626a5686aaf6f3dc", 0x0, 0x0, 0x0, 0x4d46b770, [0x80, 0x60, 0x0, 0x2]}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.12' (ED25519) to the list of known hosts. Oct 23 06:34:05 ci-freebsd-i386-1 kernel: attempted source route from 224.0.0.2 to 172.20.0.187 Oct 23 06:34:07 ci-freebsd-i386-1 syslogd: last message repeated 1 times Oct 23 06:34:09 ci-freebsd-i386-1 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 Oct 23 06:35:16 ci-freebsd-i386-1 kernel: attempted source route from 224.0.0.2 to 172.20.0.187 Oct 23 06:35:21 ci-freebsd-i386-1 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 Expensive callout(9) function: 0xffffffff81498980(0xfffffe006dde6dc0) 0.002692759 s FreeBSD/amd64 (ci-freebsd-i386-1.us-central1-b.c.syzkaller.internal) (ttyu0) SYZFAIL: failed to send rpc fd=3 want=456 sent=0 n=-1 (errno 32: Broken pipe) login: if_delmulti_locked: detaching ifnet instance 0xfffffe00077f5000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f5000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f5000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f5000 Expensive callout(9) function: 0xffffffff81adf5b0(0) 0.005945424 s if_delmulti_locked: detaching ifnet instance 0xfffffe00077f5000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f5000