last executing test programs: 11.278117905s ago: executing program 0 (id=72): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff02000000"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r3, 0xffffffffffffffff, 0x0, 0x21000630) setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) open$dir(0x0, 0x200, 0x40) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r5 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r5, &(0x7f0000000240)='./file0\x00') ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 11.265956765s ago: executing program 3 (id=74): socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffff9c, 0x0, 0x0) listen(0xffffffffffffffff, 0x2000e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000d40)=""/4096, 0x1000}], 0x1) r1 = socket(0x1c, 0x1, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r2 = socket(0x1c, 0x1, 0x0) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffff9c, 0x0, 0x0, 0x60000000) getresuid(0x0, &(0x7f0000000cc0), &(0x7f0000000d00)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) sendto(r1, &(0x7f00000000c0), 0x0, 0x20008, &(0x7f0000000000)=@in={0x10, 0x2, 0x1, @rand_addr=0x80000000}, 0x10) sendto(r0, &(0x7f0000000180)="6b466c4768c480a50ba9fd6ec26a6435980a436d45a85de9b7f74ca8517e481da2e86a571ff3bd266384753794523d2b98762e79f24e06ff172c144aca28", 0x3e, 0x8, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 11.033831189s ago: executing program 1 (id=28): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r1 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1, &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) socket(0x1c, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) msgget$private(0x0, 0x261) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={{0x0, 0x2710}, {0xfffffffd, 0x8}}, 0x0) 9.311838096s ago: executing program 0 (id=75): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r4, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) open$dir(0x0, 0x200, 0x40) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 9.305624554s ago: executing program 3 (id=77): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) kevent(0xffffffffffffffff, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) r2 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r2, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r1, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 9.008816563s ago: executing program 1 (id=28): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r1 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1, &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) socket(0x1c, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) msgget$private(0x0, 0x261) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={{0x0, 0x2710}, {0xfffffffd, 0x8}}, 0x0) 7.207688158s ago: executing program 0 (id=78): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) setresuid(0xee00, 0xee01, 0xffffffffffffffff) r1 = msgget$private(0x0, 0x8) setresuid(0x0, 0x0, 0x0) msgsnd(r1, &(0x7f0000000100)={0x3}, 0x4, 0x800) msgctl$IPC_RMID(r1, 0x0) r2 = socket(0x1c, 0x3, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x47, &(0x7f0000001600)="ee32d4ce78238b07421c63af", 0xc) mkdir(&(0x7f00000006c0)='./file0\x00', 0x110) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x800000c, @empty}, 0x1c) sendmsg$inet6_sctp(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4d}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000003c0)="1367", 0x2}, {0x0}], 0x2, &(0x7f0000000180)=[@prinfo={0x14, 0x84, 0x7, {0xbc47bd86d5dc6848, 0xffffffff}}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast2}, @authinfo={0x10, 0x84, 0x8, {0x7}}, @prinfo={0x14, 0x84, 0x7, {0xf, 0x4}}, @prinfo={0x14, 0x84, 0x7, {0x1, 0x7}}, @prinfo={0x14, 0x84, 0x7, {0x3, 0x7}}], 0x7c, 0xf246885f69a951af}, 0x20080) getsockopt$inet_tcp_TCP_TXTLS_MODE(r2, 0x6, 0x28, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) fstat(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r6, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000240)={@local, @random="94ea09066dbd", [], {@ipv6={0x86dd, {0x0, 0x6, "db8344", 0x8, 0x11, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @udp={{0x2, 0x2, 0x8}}}}}}}) setegid(r5) setgid(0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 7.198145268s ago: executing program 3 (id=80): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) setresuid(0xee00, 0xee01, 0xffffffffffffffff) r1 = msgget$private(0x0, 0x8) msgsnd(r1, &(0x7f0000000100)={0x3}, 0x4, 0x800) msgctl$IPC_RMID(r1, 0x0) r2 = socket(0x1c, 0x3, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r4, 0x0, 0x47, &(0x7f0000001600)="ee32d4ce78238b07421c63af", 0xc) mkdir(&(0x7f00000006c0)='./file0\x00', 0x110) linkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x6000) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x800000c, @empty}, 0x1c) sendmsg$inet6_sctp(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4d}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000003c0)="1367", 0x2}, {0x0, 0x1b}], 0x2000000000000254, &(0x7f0000000180)=[@prinfo={0x14, 0x84, 0x7, {0xbc47bd86d5dc6848, 0xffffffff}}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast2}, @authinfo={0x0, 0x84, 0x8, {0x7}}, @prinfo={0x14, 0x84, 0x7, {0xf, 0x4}}, @prinfo={0x14, 0x84, 0x7, {0x1, 0x7}}, @prinfo={0x6, 0x84, 0x7, {0x3, 0x7}}, @init={0x14, 0x84, 0x1, {0x400, 0x8, 0x403, 0x101}}], 0x90, 0xf246885f69a951af}, 0x20080) getsockopt$inet_tcp_TCP_TXTLS_MODE(r2, 0x6, 0x28, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) fstat(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x8000008, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000240)={@local, @random="94ea09066dbd", [], {@ipv6={0x86dd, {0x0, 0x6, "db8344", 0x8, 0x11, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @udp={{0x2, 0x2, 0x8}}}}}}}) setegid(r5) setgid(0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 7.13056979s ago: executing program 2 (id=81): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, r3, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r5 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r5, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) open$dir(0x0, 0x200, 0x40) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 6.938260017s ago: executing program 1 (id=28): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r1 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1, &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) socket(0x1c, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) msgget$private(0x0, 0x261) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={{0x0, 0x2710}, {0xfffffffd, 0x8}}, 0x0) 5.017505136s ago: executing program 0 (id=82): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) socket(0x10, 0x3, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000380)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x0, 0x0, 0x0, @rand_addr, @rand_addr="1800"}}}}) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) select(0x40, &(0x7f00000000c0)={0x3, 0xcbf6, 0x5, 0x4, 0x5, 0x8, 0x8, 0xb}, &(0x7f0000000100)={0x7, 0x3, 0x101, 0x100000000, 0x3, 0xffffffffffffff01, 0x1, 0x7b}, &(0x7f00000001c0)={0x4, 0x89e, 0xcaf9, 0x2, 0x1, 0x2, 0x9, 0x557b3b08}, &(0x7f00000002c0)={0x7fff, 0x7f}) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_udp(0x1c, 0x2, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) setgid(0x0) ktimer_create(0x4, 0x0, &(0x7f0000000200)) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x2) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x1a38, 0x0) connectat$unix(0xffffffffffffff9c, 0xffffffffffffffff, &(0x7f0000000040)=@file={0xfffffffffffffe44, 0x1, './file0/file0\x00'}, 0xa) semget(0x0, 0x0, 0x38) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x10) pwritev(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x6d0a) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 5.01368026s ago: executing program 2 (id=83): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, r3, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r5 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r5, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) open$dir(0x0, 0x200, 0x40) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 4.918744816s ago: executing program 3 (id=84): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0), 0x0, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r3, 0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(0x0, 0x200, 0x0) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, r4, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 4.714169012s ago: executing program 1 (id=28): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r1 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1, &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) socket(0x1c, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) msgget$private(0x0, 0x261) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={{0x0, 0x2710}, {0xfffffffd, 0x8}}, 0x0) 2.688299761s ago: executing program 0 (id=85): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = open(0x0, 0x400000, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, r3, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r5 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r5, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) open$dir(0x0, 0x200, 0x40) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 2.679672314s ago: executing program 2 (id=86): open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x7369a0733676a8) socket$inet6_sctp(0x1c, 0x1, 0x84) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) freebsd11_mknod(&(0x7f0000000280)='./file0/file0/..\x00', 0x2000, 0x3d9f) chroot(&(0x7f0000000080)='./file0/file0/..\x00') r0 = kqueue() kevent(r0, &(0x7f0000000000)=[{0x3, 0xfffffffffffffffe, 0x80c3}], 0x1, 0x0, 0x0, 0x0) kevent(r0, &(0x7f0000000000)=[{0x3, 0xfffffffffffffffe, 0x80c3, 0x0, 0x203, 0x0, [0x0, 0x80030d5, 0x4, 0x401]}], 0x1, 0x0, 0x0, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=[&(0x7f00000000c0)='{-,\x00'], 0x0) 2.605115185s ago: executing program 3 (id=87): syz_emit_ethernet(0x5e, 0x0) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x27) __specialfd$inotify(0x2, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = open(0x0, 0x400000, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, r3, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2.55574487s ago: executing program 2 (id=88): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, r3, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r5 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r5, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, 0xffffffffffffffff, 0x60000000) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) open$dir(0x0, 0x200, 0x40) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r7 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r7, &(0x7f0000000240)='./file0\x00') ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 2.379499775s ago: executing program 1 (id=28): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r1 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1, &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) socket(0x1c, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) msgget$private(0x0, 0x261) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={{0x0, 0x2710}, {0xfffffffd, 0x8}}, 0x0) 275.519695ms ago: executing program 0 (id=89): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) setresuid(0xee00, 0xee01, 0xffffffffffffffff) r1 = msgget$private(0x0, 0x8) setresuid(0x0, 0x0, 0x0) msgsnd(r1, &(0x7f0000000100)={0x3}, 0x4, 0x800) msgctl$IPC_RMID(r1, 0x0) r2 = socket(0x1c, 0x3, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r3, 0x0, 0x47, &(0x7f0000001600)="ee32d4ce78238b07421c63af", 0xc) mkdir(&(0x7f00000006c0)='./file0\x00', 0x110) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x800000c, @empty}, 0x1c) sendmsg$inet6_sctp(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4d}, 0x1c, &(0x7f0000000380)=[{&(0x7f00000003c0)="1367", 0x2}, {0x0}], 0x2, &(0x7f0000000180)=[@prinfo={0x14, 0x84, 0x7, {0xbc47bd86d5dc6848, 0xffffffff}}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast2}, @authinfo={0x10, 0x84, 0x8, {0x7}}, @prinfo={0x14, 0x84, 0x7, {0xf, 0x4}}, @prinfo={0x14, 0x84, 0x7, {0x1, 0x7}}], 0x68, 0xf246885f69a951af}, 0x20080) getsockopt$inet_tcp_TCP_TXTLS_MODE(r2, 0x6, 0x28, &(0x7f0000000180), &(0x7f00000001c0)=0x4) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) fstat(r4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r6, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x8000008, @loopback}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000240)={@local, @random="94ea09066dbd", [], {@ipv6={0x86dd, {0x0, 0x6, "db8344", 0x8, 0x11, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @udp={{0x2, 0x2, 0x8}}}}}}}) setegid(r5) setgid(0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 272.64846ms ago: executing program 2 (id=90): acct(&(0x7f0000000140)='./file0\x00') mkdir(&(0x7f0000000000)='./file0\x00', 0x9c) 270.575392ms ago: executing program 3 (id=91): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) kqueue() r1 = socket$inet6_udp(0x1c, 0x2, 0x0) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, 0xffffffffffffffff, &(0x7f0000000280)='.\x00', 0x21000630) setsockopt$inet6_group_source_req(r1, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) open$dir(0x0, 0x200, 0x40) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r4, &(0x7f0000000240)='./file0\x00') ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 145.839669ms ago: executing program 2 (id=92): socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffff9c, 0x0, 0x0) listen(0xffffffffffffffff, 0x2000e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000d40)=""/4096, 0x1000}], 0x1) r1 = socket(0x1c, 0x1, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) r2 = socket(0x1c, 0x1, 0x0) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffff9c, 0x0, 0x0, 0x60000000) getresuid(0x0, &(0x7f0000000cc0), &(0x7f0000000d00)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) sendto(r2, 0x0, 0x0, 0x0, 0x0, 0x0) sendto(r0, 0x0, 0x0, 0x8, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 0s ago: executing program 1 (id=28): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r1 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1, &(0x7f0000000240)='./file0\x00') mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) socket(0x1c, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) msgget$private(0x0, 0x261) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000080)={{0x0, 0x2710}, {0xfffffffd, 0x8}}, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.247' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 Expensive callout(9) function: 0xffffffff81afc400(0) 0.005972479 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 SYZFAIL: invalid kcov comp type type=ffffffff821577d8 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff81e31dfd (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff81e31f2b (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff81ded117 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff820c795a (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=1 req=28 state=3 status=67 (errno 9: Bad file descriptor) if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 FreeBSD/amd64 (ci-freebsd-i386-0.us-central1-b.c.syzkaller.internal) (ttyu0) login: if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 Jan 8 10:46:59 ci-freebsd-i386-0 dhclient[1037]: Interface tap0 is down, dhclient exiting Jan 8 10:46:59 ci-freebsd-i386-0 dhclient[1037]: connection closed Jan 8 10:46:59 ci-freebsd-i386-0 dhclient[1037]: exiting. set $lines = 0 Password:if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 Login incorrect login: show registers Password: Login incorrect login: ps Jan 8 10:47:03 ci-freebsd-i386-0 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl