last executing test programs: 11.768603011s ago: executing program 0 (id=7): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) r0 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0, 0x0) thr_new(&(0x7f00000002c0)={&(0x7f0000000040)="c4e11b7d2c186664643ef2adc4e2daf5e5c4e21d8c5902f30f16da817800090000008fc82087b647d300003df30faef3f2fe8f04000000660f71d33d", 0x800, &(0x7f00000000c0), 0x0, &(0x7f0000000700)="93808a9254bbf714a786e39f565453089f85ffad9f22a1af9c6b028784a62ed02a83316a10b8d9cb98dd76fb9f9162a6a25c29ff5980dfd46a4cc5c78b5d51c5ed6d6273e41a66b1fede04ff61cc31be4968e449d988c91510f82c07d5382baf78dcd3e180d88b9c6f0ac15d15e19e4b8c7c2dc21d620036b375b6acbc6b8d5720a861355acac9d23fd247d94c9d5c0dbf11d16d9485f6ee8e6230ef77ddecfeb4f6dfcc0db3b644e9084734b514951abea17856fa15ec7774f7faf5be8a0be6ebdbae8dc00d165c88162f24d81e119522493e3fb1fd3f8e7fc898eada54bcaceb066c9b9f555c9ea4977c97db1352eb48ddc8846bd9874b08a29a5e2c20a8fee73ef15e7b756ee4b43d11f1f9dc13b7de2ba142b9c705e387cb1699d51fd597a2ad0bb7f6dee6f811a4b9c376758cc2e3f66665f72bc682c408522bdfd1b4b8732505891d34274dd299252dbadf6ace9baa3da5311804cf6ca769bc1c053a3566ea63df9985e3566011903f66af4693f65d27d91cc11c75c4f44863dfed925320f17d93673c3bb71b9ad9b82ebb93d8539d8fa7c91bdfc822192adf9ff885ec0a982fe7d51cd289d06244c215acf46ba27a1893be7f5f9da9983ae5", 0x1bc, &(0x7f0000000100), &(0x7f0000000240), 0x0, &(0x7f0000000200)={0x2, 0x1f}, [0x2, 0x102, 0x4]}, 0x3c) mount(&(0x7f0000000000)='zfs\x00', &(0x7f0000000040)='./file1\x00', 0x1500101, &(0x7f00000001c0)) r1 = socket(0x10, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x13, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r1], 0x8) futimesat(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00002) msgget$private(0x0, 0x261) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000240)={r4, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x7], 0xfffffffd, 0x8, 0x9, {0x9, 0x6, 0x0}, {0x0, 0x5, @sival_int=0x40000008}}) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, r5, 0x60000000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) copy_file_range(r5, 0x0, 0xffffffffffffffff, &(0x7f0000000140)=0x87a4, 0x5, 0x0) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_timeval(r6, 0xffff, 0x1005, 0x0, 0x0) 9.624217615s ago: executing program 0 (id=7): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) r0 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0, 0x0) thr_new(&(0x7f00000002c0)={&(0x7f0000000040)="c4e11b7d2c186664643ef2adc4e2daf5e5c4e21d8c5902f30f16da817800090000008fc82087b647d300003df30faef3f2fe8f04000000660f71d33d", 0x800, &(0x7f00000000c0), 0x0, &(0x7f0000000700)="93808a9254bbf714a786e39f565453089f85ffad9f22a1af9c6b028784a62ed02a83316a10b8d9cb98dd76fb9f9162a6a25c29ff5980dfd46a4cc5c78b5d51c5ed6d6273e41a66b1fede04ff61cc31be4968e449d988c91510f82c07d5382baf78dcd3e180d88b9c6f0ac15d15e19e4b8c7c2dc21d620036b375b6acbc6b8d5720a861355acac9d23fd247d94c9d5c0dbf11d16d9485f6ee8e6230ef77ddecfeb4f6dfcc0db3b644e9084734b514951abea17856fa15ec7774f7faf5be8a0be6ebdbae8dc00d165c88162f24d81e119522493e3fb1fd3f8e7fc898eada54bcaceb066c9b9f555c9ea4977c97db1352eb48ddc8846bd9874b08a29a5e2c20a8fee73ef15e7b756ee4b43d11f1f9dc13b7de2ba142b9c705e387cb1699d51fd597a2ad0bb7f6dee6f811a4b9c376758cc2e3f66665f72bc682c408522bdfd1b4b8732505891d34274dd299252dbadf6ace9baa3da5311804cf6ca769bc1c053a3566ea63df9985e3566011903f66af4693f65d27d91cc11c75c4f44863dfed925320f17d93673c3bb71b9ad9b82ebb93d8539d8fa7c91bdfc822192adf9ff885ec0a982fe7d51cd289d06244c215acf46ba27a1893be7f5f9da9983ae5", 0x1bc, &(0x7f0000000100), &(0x7f0000000240), 0x0, &(0x7f0000000200)={0x2, 0x1f}, [0x2, 0x102, 0x4]}, 0x3c) mount(&(0x7f0000000000)='zfs\x00', &(0x7f0000000040)='./file1\x00', 0x1500101, &(0x7f00000001c0)) r1 = socket(0x10, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x13, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r1], 0x8) futimesat(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00002) msgget$private(0x0, 0x261) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000240)={r4, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x7], 0xfffffffd, 0x8, 0x9, {0x9, 0x6, 0x0}, {0x0, 0x5, @sival_int=0x40000008}}) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, r5, 0x60000000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) copy_file_range(r5, 0x0, 0xffffffffffffffff, &(0x7f0000000140)=0x87a4, 0x5, 0x0) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_timeval(r6, 0xffff, 0x1005, 0x0, 0x0) 7.654998552s ago: executing program 1 (id=145): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f00000000c0)={0x17, 0x21, 0x10, &(0x7f0000000000)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0x26, 0xfdffff85, [0x0, 0x0, 0x1b580, 0x6e4]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000340)={0x0, 0x1, 0x0, 0xd60, &(0x7f0000000380), 0x0, 0x0, 0x0}) open$dir(&(0x7f0000000800)='./file0\x00', 0x80, 0x1c0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x94659db2cce5c9d8, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x180, 0x0) 7.604892075s ago: executing program 1 (id=148): open(&(0x7f0000000840)='./file0\x00', 0x80400000000206, 0x0) unlink(&(0x7f0000001f80)='.\x00') r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x800, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x5, 0x5, 0x2}, {0x87, 0x8, 0x3, 0x8}, {0x6, 0xfe, 0x5, 0x241c}]}) syz_emit_ethernet(0x22, &(0x7f0000000100)=ANY=[]) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) acct(0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000000180)={[0xffffffffffffff68]}, 0x8) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x1010, r1, 0x1) mkdir(&(0x7f0000002640)='./file0\x00', 0x2) pathconf(&(0x7f0000002680)='./file0\x00', 0x6) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) symlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file1\x00') linkat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000280)='./file0\x00', 0x0) open$dir(&(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x40) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) select(0x40, &(0x7f0000000000)={0xbd, 0xc, 0x503a660b, 0xcc, 0x3, 0x6, 0x5, 0x9}, &(0x7f0000000040)={0x7, 0x6, 0x8001, 0xff, 0x9, 0x7, 0x7f, 0x10}, &(0x7f00000000c0)={0x6, 0x0, 0x7, 0x7fffffff, 0x4, 0x9, 0x2b1, 0xfffffffffffffff7}, &(0x7f0000000100)={0x9, 0x95}) aio_waitcomplete(0x0, &(0x7f0000000540)={0x0, 0xfff}) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r2 = openat$md(0xffffff9c, &(0x7f0000000140), 0x800, 0x0) ioctl$MDIOCATTACH(r2, 0xc1b46d00, &(0x7f0000000580)={0x0, 0xfffffffe, 0x0, 0x0, 0xffe, 0x8, 0x6, 0x2, 0x0, 0x1, 0x0, [0x0, 0x2, 0x3, 0x0, 0x9, 0x4, 0x3ff, 0x0, 0x2, 0x5, 0x4, 0x0, 0x7e02, 0xa528, 0x7, 0xfffffffc, 0x0, 0x4, 0x0, 0xfffff000, 0x0, 0x9, 0x6, 0x1, 0x3, 0x0, 0x448d, 0xe122, 0xfffffff7, 0xee, 0x7, 0xffe00001, 0x4, 0x9, 0x9, 0x8, 0xfffffffd, 0x40, 0x7, 0x400, 0x14, 0x2, 0x80a7, 0xc381, 0x7, 0x1000, 0x7, 0x400, 0x28000, 0x7, 0x0, 0xfff, 0x80, 0x3ff, 0x1, 0x5, 0x0, 0x100, 0x11, 0x6cfd1403, 0x0, 0x7, 0x80100004, 0x9, 0x4, 0x8, 0xfffffffe, 0x4a05bb09, 0x4, 0x7, 0x4, 0x0, 0x0, 0x4, 0x80000, 0xf8, 0xa, 0x349, 0x0, 0x3, 0x0, 0x6, 0x0, 0xc9, 0x5, 0x0, 0x800003, 0x0, 0x2, 0x10, 0x5, 0x0, 0x4, 0x4fabb25c]}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r3, &(0x7f0000000240)=@file={0xa, 0x1, './file0\x00'}, 0xa) socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x3ee, @rand_addr="0000fa0b0e000000000000004000"}, 0x1c) 7.337273011s ago: executing program 0 (id=7): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) r0 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0, 0x0) thr_new(&(0x7f00000002c0)={&(0x7f0000000040)="c4e11b7d2c186664643ef2adc4e2daf5e5c4e21d8c5902f30f16da817800090000008fc82087b647d300003df30faef3f2fe8f04000000660f71d33d", 0x800, &(0x7f00000000c0), 0x0, &(0x7f0000000700)="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", 0x1bc, &(0x7f0000000100), &(0x7f0000000240), 0x0, &(0x7f0000000200)={0x2, 0x1f}, [0x2, 0x102, 0x4]}, 0x3c) mount(&(0x7f0000000000)='zfs\x00', &(0x7f0000000040)='./file1\x00', 0x1500101, &(0x7f00000001c0)) r1 = socket(0x10, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x13, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r1], 0x8) futimesat(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00002) msgget$private(0x0, 0x261) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000240)={r4, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x7], 0xfffffffd, 0x8, 0x9, {0x9, 0x6, 0x0}, {0x0, 0x5, @sival_int=0x40000008}}) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, r5, 0x60000000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) copy_file_range(r5, 0x0, 0xffffffffffffffff, &(0x7f0000000140)=0x87a4, 0x5, 0x0) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_timeval(r6, 0xffff, 0x1005, 0x0, 0x0) 5.401421584s ago: executing program 1 (id=150): open(&(0x7f0000000040)='./file1\x00', 0x18289, 0x110) 5.334939112s ago: executing program 1 (id=153): r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f00000005c0)={0x0, 0xffcc, &(0x7f0000000180), 0x0, 0x0}, 0x20000) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ktimer_create(0x4, 0x0, 0x0) lio_listio(0x0, 0x0, 0x0, &(0x7f0000002c00)={0x1, 0x13, @sigval_int=0x5, @ke_flags=0x8018}) ioctl$DIOCNATLOOK(r1, 0x40047477, &(0x7f0000000080)) socket$inet6(0x1c, 0x20000000, 0x80) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r3, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="1000"], 0x10}, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 5.244204377s ago: executing program 3 (id=155): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) msgget$private(0x0, 0x8) r1 = msgget(0x3, 0x42) r2 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f0000000040)=0xa, 0x4) syz_emit_ethernet(0x1aa, &(0x7f0000000cc0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa008100000086dd602e5cea01703c0020010000000000000000000000000002ff0200"]) msgsnd(r1, &(0x7f0000000000)=ANY=[@ANYRESHEX=r1, @ANYRES32=r1], 0x4, 0x800) msgget(0x1, 0x0) getitimer(0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r3 = getppid() procctl$PROC_REAP_RELEASE(0x0, r3, 0x3, 0x0) mount(&(0x7f0000000040)='hfsp\x00', &(0x7f0000000080)='./file0\x00', 0x1c000000, &(0x7f00000000c0)="b880525cc02315bd21f8bfd365f56937770321821fc874c02114d64bf7d1a4eb65a9ef4c436dca84da7dea6cdc1d6182b77bfcdba29e44caacc028998a6257aea97d5a254282c85d35fc23b629808448bf114522de71f895ee9a98f0eede280b393594b2e0c44f12c7aa78eb5fcf1bd01f683dc6cb04407801f2ac7357e9ffa46629b0a66f716649e4b57091e90b6fa64a0bb58cf98ab2274b2571e32c054b09b73efc4edf951d13d25d0b58df55f9929e79a291e4d6a674fe208e24c5d8cd2a978202deb66d0740126507afcce4bf8d53f698228246c319dbdc078bac26a2280200"/241) r4 = socket(0x1c, 0x1, 0x0) sendto(r4, 0x0, 0x0, 0x20008, 0x0, 0x0) sync() ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 5.084958232s ago: executing program 2 (id=157): r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x60000000) r2 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r2, 0x29, 0x1a, &(0x7f0000000080), 0x4) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="3c0000000600000009000000a6bea2c54ee07b816636f9c336b1ee33c6babd5ebd098f6562a8928d7835e0b1f545947d2883a57d247eb72bf83d22cad800000000000000080000005abea7a6d157c84eee170e8b148bbde521e491ff230386de21d4fcac433d13393c073f438d25ef889630ce5af3c03a9a02599e69b2a1e891d06922661c1d35d8408e4ad90f954f03e8cf18366b9530d0a204f0ff126a597ab8a31eac61ababfd053fcda7753eb07a948b2e7b8d4e0e23e6e9dd111191bc69c2ec3fa2241e4621f86e54f62ebe751a3ea22c2bacd10c66d685b6a70c987b5de663bd3a145c77d21edba118b920ced29e52e6f84845c1491c161fefad9c2e31a5332e6a2032784702aa40e7ed662c7947070d99a40000003a0000000200000068842e59facb31b354387c194390ca388a7ee4b90d44f632fa2b8c5c117235acf902441377fa5464fb5a632b7fd9875d5efb8dd688fca19ef34cf3474e34c7d465935a7ea879324aba9a84998444f395e008204568c2878724785daa4bc06edb22359a0724db1449da0a4b04562d4b5edf398af59ede9adc1672fcfb807048f0a4bd278f182759e3b828af114a2acdf330998233c4d0eb95c8"], 0x280}, 0x88) 5.082288809s ago: executing program 2 (id=158): r0 = socket$inet(0x2, 0x2, 0x0) clock_nanosleep(0xf, 0x0, &(0x7f0000000000)={0x3, 0x5}, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000a, &(0x7f0000000000)="ea", 0x1) setsockopt$inet_opts(r0, 0x0, 0x200000000000b, &(0x7f0000000740)="f67da92ac8b218a2bcbada4a2c0b0b809304505537332f0b6a45d085724ec6f92e4a513f2bd855dc0200000031d2262e1388275268a9c4042888ddf9a4c4cfe869087457b4937d50de91655e1373b7a23114a0eaebd4f741d2f18386839a23f61172a865e6911d2e1fd049f049d549cc7d0e4f440567f63c2b56aa68fe64c6e2925450b4dde1071763940dff5f90afb31ce55e3687ddcea4307b4eb9732766a3c0", 0x77) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r1, 0x4000000000a, &(0x7f0000000240)="a3", 0x1, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x1a, @sival_ptr=0x6}}) copy_file_range(r1, &(0x7f0000000040)=0x40000000000, r1, 0x0, 0xd, 0x0) fchmod(r1, 0x100) r2 = socket(0x1, 0x1, 0x0) setgroups(0x0, &(0x7f0000000000)) setgid(0x0) r3 = socket$inet(0x2, 0x1, 0x0) fhstat(&(0x7f0000000040)={{[0x5c8951ac, 0x3bea9983]}, {0x0, 0x0, "3d0000009b1557d800"}}, 0x0) bind$inet(r3, &(0x7f0000000000)={0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}, 0x10) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r5, 0x1) r6 = openat$crypto(0xffffff9c, &(0x7f00000000c0), 0x80, 0x0) sendmsg$unix(r5, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="47de1835a10985c70e7161be6b295e3c4ee5c948684490e1fdeb8d25864e9ce349d9853f84bac83f97a7aa300c7831e0ccbec4e1cc603a82e92a6e1ba1d3ee"], 0x10, 0x405}, 0xa) rfork(0x4010) socketpair$unix(0x1, 0x1, 0x0, 0x0) syz_emit_ethernet(0x76, &(0x7f0000000280)=ANY=[@ANYBLOB="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"]) listen(r3, 0x38000000) syz_emit_ethernet(0x3a, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004520002c0000000005069078000001ffac1400aa4e214e23", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="60120aea8f78001f563e6c224dc42bc02549d4d4938a4f80211c045f94fdb583749dafe244f6650b4efd64ef36a6f1bffda0e204def7f87dd3cc2994ed96756db14e1d7da3caffb6c87a1a9c736175341443b44e9c0635016b71fe265db642610d7dca369ea6b6245e57ed6ae2b3dadb2176ba95708b0245f2be617087fc2201c94154dfeb230c1bd1ba4a10fce4d939a6658bbf5b3dd1731ab1f804850d9e19cab7de60e91cb4a8bff670653ee72dff73c475d764e543aa764a5be095e6fe7a1011d92ed812157f65ef9604d9d54629dbc36aeb792b6bfc5cb33f5eeab9b4338cfbf944296a4f40f5bf93145fe26b2575d18fd7b3698a80ab97cc57c7e129b922845bb4fd27fa025eb3650389483d0f7faaf94b94146aead67cf2dcba9946c11217677a75bc3309446f7007c3276a0c3e4b4a6073d790ab643ed379cbbd75b1e9b0c806a7e7d82ea97b5500000000000000fbfb12e387094ed48c18"]) r7 = open$dir(&(0x7f0000000100)='.\x00', 0x0, 0x6) getdirentries(r7, &(0x7f0000000040)=""/23, 0x17, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) syz_emit_ethernet(0xe6, &(0x7f0000000800)=ANY=[@ANYRESHEX, @ANYRES8=r2, @ANYRES64=r4, @ANYRES64=r6, @ANYRES32, @ANYRES64=r4, @ANYRES16, @ANYRES16=0x0, @ANYRES32, @ANYRESOCT=r1, @ANYBLOB="b0c1c15e8330e1bd8f223438b039ae7bf13c4e960f2699b8dae3048239a5eeca57f219e45e0c4b74846b285d6a469023ed3b238b134b7d301ffcc9072dcb2f37cb84", @ANYRES8=r1, @ANYRES8]) socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) 4.936914307s ago: executing program 0 (id=7): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) r0 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0, 0x0) thr_new(&(0x7f00000002c0)={&(0x7f0000000040)="c4e11b7d2c186664643ef2adc4e2daf5e5c4e21d8c5902f30f16da817800090000008fc82087b647d300003df30faef3f2fe8f04000000660f71d33d", 0x800, &(0x7f00000000c0), 0x0, &(0x7f0000000700)="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", 0x1bc, &(0x7f0000000100), &(0x7f0000000240), 0x0, &(0x7f0000000200)={0x2, 0x1f}, [0x2, 0x102, 0x4]}, 0x3c) mount(&(0x7f0000000000)='zfs\x00', &(0x7f0000000040)='./file1\x00', 0x1500101, &(0x7f00000001c0)) r1 = socket(0x10, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x13, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r1], 0x8) futimesat(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00002) msgget$private(0x0, 0x261) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000240)={r4, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x7], 0xfffffffd, 0x8, 0x9, {0x9, 0x6, 0x0}, {0x0, 0x5, @sival_int=0x40000008}}) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, r5, 0x60000000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) copy_file_range(r5, 0x0, 0xffffffffffffffff, &(0x7f0000000140)=0x87a4, 0x5, 0x0) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_timeval(r6, 0xffff, 0x1005, 0x0, 0x0) 2.912189583s ago: executing program 1 (id=159): r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f0000000080)={{0x1c, 0x1c, 0x1, 0x5, @loopback, 0x7fffffff}, {0x1c, 0x1c, 0x0, 0x400000, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x0, [0x8800, 0xfffffffd, 0xfffffffc, 0x6, 0x1, 0x0, 0x0, 0x5e]}, 0x5c) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) shmctl$SHM_INFO(0xffffffffffffffff, 0xe, &(0x7f0000000100)=""/231) cpuset_getid(0x2, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) sendto$inet6(r0, 0x0, 0x0, 0x20101, &(0x7f0000000080)={0x1c, 0x1c, 0x2, 0x3ee, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00@\x00@\x00'}, 0x1c) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x80, 0x0) cap_enter() socket$inet_icmp_raw(0x2, 0x3, 0x1) open$dir(&(0x7f0000000300)='./file0\x00', 0x200, 0x0) r1 = shmget$private(0x0, 0x3000, 0x124, &(0x7f00005c8000/0x3000)=nil) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r2, 0x84, 0x902, &(0x7f0000000040), 0x4) shmat(r1, &(0x7f0000052000/0x2000)=nil, 0x96dba8100d9a68bd) shmat(r1, &(0x7f000078e000/0x1000)=nil, 0x7000) shmdt(0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x4, 0x8e33cb7e2cd20cc8, 0x0) syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) r3 = socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) r4 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r4, 0x2000e) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) connect$inet6(r5, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x3, @mcast1, 0x1}, 0x1c) sendmsg(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)="962f13f83638b7bdb6392ec92b51d15da7ba30212fb74508887d0b8f7986b0ba6495e1d83c7315deb2eff93797169d96f1d7ac8ae997b5e49e31b0439a4619af68413d08da55f1b7e08c4882d34eaf88", 0x50}], 0x1, &(0x7f0000001600)=[{0xc, 0x3a, 0x9}], 0xc}, 0x80) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r6 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r6, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xb}, 0x24) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x10000, &(0x7f0000000100)=0x5, 0x4) syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x28, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x0, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0xa3}}}}}}) 2.908560792s ago: executing program 2 (id=160): r0 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80, &(0x7f0000000000)=0x7, 0x4) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x4) sendto(r1, 0x0, 0x0, 0x9, &(0x7f00000004c0)=@in6={0x1c, 0x1c, 0x0, 0x0, @loopback}, 0x1c) connect$inet(r0, &(0x7f0000000080)={0x10, 0x2, 0x3, @loopback}, 0x10) 2.908166433s ago: executing program 3 (id=161): chflags(&(0x7f0000000300)='./file0\x00', 0x4) (async) freebsd11_mknod(&(0x7f00000000c0)='./file1\x00', 0x1000, 0x0) (async) pathconf(&(0x7f0000000040)='./file1\x00', 0x41) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0x1c, 0x1c, 0x3, 0x4, @loopback}, 0x1c) r0 = socket$inet(0x2, 0x2, 0x0) select(0x40, &(0x7f0000000040)={0x9}, 0x0, 0x0, 0x0) (async) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2, 0x1, @loopback}, 0x10) (async, rerun: 64) r1 = open(&(0x7f0000000080)='./file0\x00', 0x18289, 0x190) (rerun: 64) fspacectl(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) (async, rerun: 32) truncate(&(0x7f00000001c0)='./file0\x00', 0x3) (async, rerun: 32) ftruncate(r1, 0x10000) (async) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000000c0)="8fcf828db5521fff02a7958e86c998590a0773caaabae4be20ca4e92629bff07a531bc2338b3b9c944b7e65a9f1a413b5da9123622ab2ccf1e36a6674739f42884df6eb868d20140090d60238cf9624c69eca8ce5f", 0x55}], 0x1) syz_emit_ethernet(0x22, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa06004500001400670000002e9078ffffffffffffffff"]) (async) kqueue() (async) r2 = socket$unix(0x1, 0x5, 0x0) (async) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0xc, &(0x7f0000000080)={0x7ff, {{0x1c, 0x1c, 0x2, 0x0, @rand_addr="65cb30df060000000b603666ab2f3df4"}}, {{0x1c, 0x1c, 0x1, 0x0, @mcast2}}}, 0xfc) (async) setsockopt$inet6_group_source_req(r3, 0x29, 0xc, &(0x7f0000000080)={0x7ff, {{0x1c, 0x1c, 0x1, 0x0, @rand_addr="4ce030df040000000b6032622f3df400"}}, {{0x1c, 0x1c, 0x1, 0x0, @empty}}}, 0xfc) (async) sendmsg$unix(r2, &(0x7f0000002680)={0x0, 0xffffffb7, 0x0, 0x0, 0x0, 0x0, 0x10080}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) syz_emit_ethernet(0x10c, &(0x7f0000000140)=ANY=[@ANYBLOB="ce9756ffff432129586cd53e92263a3b686ce3c3cbbb1b4f5d9e4e6b029984ca515792bfcc1ae7f16dc52a3d87e4ae4b72526b8df82ae97a2004ea22c65b5f69b23c22b019143cc1599f7f2bbff3b0b75312333eb84ea5820b51132e8f4ab44a5e49be5c772e0896987ba8b6b96dc036c26ad81db0218ac39010db455746a9201c4f8223e703cc5ed39a999fa2bdbf3a7341844266e9d81dd4f2cc3f90d09e43f8297fd8bea82488bad0b078f77e8f8a2aeaf803d4780581ac980f4370d7d97440636258f59e13432845ea48232dbf71d0643d9a6d0bca2e492f041d325ecfb47f1dc014ce40903848858656"]) r4 = socket(0x1c, 0x1, 0x0) (async) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) (async) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) (async) getresuid(0x0, &(0x7f0000000040)=0x0, 0x0) setresuid(0x0, 0x0, r5) (async) freebsd11_mknod(0x0, 0x2000, 0x801) (async, rerun: 32) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0xff8008, &(0x7f00000001c0)) (async, rerun: 32) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) (async, rerun: 64) socket(0x11, 0x3, 0x0) (rerun: 64) 2.814959083s ago: executing program 3 (id=162): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffa, 0x9, 0xffffff, 0x87, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) fspacectl(r0, 0x1, &(0x7f0000000100)={0x5, 0xffffffff}, 0x0, &(0x7f0000000140)) clock_getres(0x281c05b888e7c46c, &(0x7f0000000300)) open$dir(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1ff, 0xc8) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x17, 0x4, 0xc1) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r2 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r2, &(0x7f0000000240)='./file0\x00') freebsd12_shm_open(0x0, 0x9d12cdcdb3c991b4, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) mlock(&(0x7f0000ff2000/0xe000)=nil, 0xe000) 2.764353481s ago: executing program 2 (id=163): getrusage(0x1, &(0x7f0000000000)) r0 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x100000, 0x0) ioctl$BIOCSETF(r0, 0x80084267, &(0x7f0000000100)={0x3, &(0x7f00000000c0)=[{0x1, 0x7, 0xfd, 0xeb5}, {0x7f, 0xe, 0xf7, 0x8}, {0x101, 0x8, 0x2, 0xc}]}) r1 = socket$inet6_icmp(0x1c, 0x2, 0x3a) listen(r1, 0x2) aio_readv(&(0x7f0000000200)={r0, 0x8, &(0x7f0000000140)="38fa0c480b15100600c5db8aeb1ae9bdc48f51bd2b2b0633149f72206752fdf368b0cc37", 0x24, [0x6, 0x4], 0x2f, 0x4, 0x5, {0x80000001, 0x6, &(0x7f0000000180)="ed7b56cb20cf8b04bb0bb67d9657d04a851f821a1911413d19a8946e709b8ec2ec170a16171a8bdaf40c7b4baec57c05b632c9e57ad8c523f42c129fb8aa06eb6dc949087ef849f7e73088df4552c11838c922a34a1f90a4999e8ba99fd295733a28af8728a0a5ff9b665f"}, {0x3, 0x6, @sigval_ptr=0x4, @ke_flags=0xb0}}) setsockopt$inet_sctp_SCTP_BINDX_ADD_ADDR(0xffffffffffffff9c, 0x84, 0x8001, &(0x7f0000000280)=@in={0x10, 0x2, 0x1, @loopback}, &(0x7f00000002c0)=0x10) ioctl$BIOCSETFNR(r0, 0x80084282, &(0x7f0000000340)={0x4, &(0x7f0000000300)=[{0x9f7e, 0x1, 0x93, 0x4}, {0x80, 0xd8, 0x4}, {0x0, 0x0, 0x8, 0x9}, {0x45a6, 0x51, 0x7, 0x2}]}) mkdir(&(0x7f0000000380)='./file0\x00', 0x69) r2 = kqueue() __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f00000003c0)=[0x6, 0x6, 0x8, 0xbec]) ioctl$BIOCSETFNR(r0, 0x80084282, &(0x7f0000000440)={0x3, &(0x7f0000000400)=[{0x4c, 0x70, 0x81, 0x1}, {0x3, 0x10, 0x9}, {0x6, 0x5, 0xd, 0x17}]}) r3 = openat$kbd(0xffffff9c, &(0x7f0000000480), 0x400000, 0x0) ioctl$PIO_DEADKEYMAP(r3, 0x20006b09, &(0x7f00000004c0)={0x80, [{0x10, [0xb85, 0x10001, 0xa8cb, 0x7, 0x8, 0x10000, 0x5, 0x6c1d8105, 0x2de, 0x3, 0xe1a, 0x6, 0xff, 0x3, 0xffffffff, 0x9, 0x4, 0x8, 0x3, 0x2, 0x3, 0x2, 0x9, 0x3, 0x6, 0xad, 0x8001, 0xb, 0x7, 0x6, 0x5, 0x65af0cda, 0xffffffd4, 0x1, 0x7, 0x200, 0x4, 0x2, 0x89, 0x2, 0x200, 0x6, 0xf, 0xf, 0xfffffffd, 0xd0c4, 0x6, 0x4, 0x5, 0x400, 0xdef3, 0x6, 0x0, 0xffff, 0x7, 0x400, 0xb3c, 0x5, 0xa2ce, 0x5, 0xfc, 0x54fa71d0, 0xc937, 0x6b, 0x5, 0x6, 0x3, 0x1, 0x9, 0x6, 0x80000000, 0x0, 0x7b9b, 0x24969972, 0x4, 0x77e8a7bd, 0x1, 0x7, 0x1, 0xfff, 0x2, 0x101, 0x7, 0x4, 0x0, 0x9, 0x2, 0x80000001, 0xdc41, 0xdbb, 0x6, 0x2, 0xe3, 0x1, 0x2, 0x100, 0xfe7, 0x100, 0xfffffffc, 0x8, 0xfffffff7, 0x1, 0x8, 0x3]}, {0x5a3da63e, [0x1, 0xfffffffb, 0x3ff, 0xeb1b, 0x8, 0x6, 0x8, 0x7, 0x80, 0x5, 0x6, 0x0, 0x8, 0x3, 0x20fb, 0x8, 0x7, 0x6, 0x1b93, 0x2, 0x1ff, 0x401, 0xfffffffe, 0x200, 0xfffffffc, 0x2, 0xd7, 0xc000, 0x6, 0xc0, 0x3ff, 0x10, 0x4, 0x5, 0x126, 0x4, 0x401, 0x81, 0x0, 0x5, 0x0, 0xdc, 0x40, 0x8001, 0x4f95, 0x7fffffff, 0x10, 0xffff7fff, 0x1, 0x9b4e, 0x6, 0x2, 0x1, 0x0, 0x3e29, 0x1, 0x1ff, 0x6eb7, 0x7fff, 0x8, 0xd2ac, 0x0, 0x5, 0x3, 0x8, 0x1, 0x2, 0x4080000, 0x9, 0x10, 0x4, 0x6, 0xa00, 0xff, 0x5, 0x6, 0x7, 0x1000, 0xfff, 0x3, 0x0, 0x9, 0x9, 0x0, 0x2341, 0x2, 0x5, 0x4, 0xffffffff, 0x0, 0xfffffff9, 0x22a, 0x7ff, 0x5, 0x9, 0x7, 0x8f1, 0x5, 0x6, 0x8, 0x7, 0x7, 0x31, 0x3]}, {0x1, [0x5, 0x6, 0x7, 0x6, 0x5, 0x200, 0x4, 0x6, 0xb, 0xfffffffd, 0x9, 0x200, 0x9ae, 0xfffffff8, 0x6, 0x40, 0x5, 0x716, 0x6, 0x57, 0x1, 0xffffffff, 0xb, 0xffffffff, 0x0, 0x0, 0x0, 0x9, 0x13, 0x9, 0x4b0, 0x80000000, 0x401, 0x2f7a812f, 0xee9f, 0x5, 0x80000000, 0x0, 0x3, 0x4, 0x2, 0x1, 0xb, 0x4, 0x8, 0x0, 0x1, 0x3f43655c, 0xffff, 0x5, 0x5, 0x7, 0x0, 0xc, 0x8, 0x4, 0x6, 0x0, 0x5, 0x8, 0xffffffff, 0xbeeb, 0xfff, 0x6, 0x1, 0x5, 0xa, 0x7, 0x7, 0x5, 0xa, 0x5, 0x3, 0x4, 0x9, 0x69, 0x2, 0x6, 0x42, 0x5, 0x1, 0xffffffff, 0xffff6498, 0x9, 0x0, 0x2, 0x2, 0x33ec563a, 0x586, 0x374, 0x55, 0x3, 0xa, 0xf, 0x4, 0x715, 0xfffffd7e, 0x141d, 0xa89e, 0x2, 0x6, 0xfff, 0x6, 0x3]}, {0x8, [0x5, 0xfffff801, 0x0, 0x7fff, 0x32, 0x5, 0x0, 0x7f, 0x7fffffff, 0x8001, 0x0, 0xcb24, 0x1, 0x6, 0x6, 0x2, 0x1, 0xd, 0x3, 0x2, 0x3, 0x6, 0x5c44, 0x0, 0x7, 0x1, 0x9, 0x2, 0x6, 0x315, 0x3, 0x3, 0xb64, 0x8, 0x5, 0x973, 0x1, 0x7, 0x2, 0x6, 0x100, 0x6, 0x1ff, 0x986, 0x1, 0x0, 0xb, 0x8, 0x6, 0x4d6b, 0x80000000, 0x10, 0x4, 0x10000, 0xfffffff1, 0x6fb, 0x4, 0x6, 0x4, 0x3, 0x9000, 0x3, 0x6, 0x10, 0x8000, 0x3, 0x5, 0xffff, 0x7, 0x401, 0x4c, 0x2d8, 0x8, 0x2, 0x7, 0x40, 0x7, 0xf, 0xffffffb3, 0x1, 0x6, 0x2, 0x6ad8, 0xcf09, 0x2, 0x8e05bbe4, 0x8, 0x1, 0xe0, 0x1ff, 0x6, 0x0, 0x0, 0x8a6b, 0x6, 0xfffffffe, 0x100, 0x6, 0x1, 0x3, 0xa, 0x6, 0x0, 0x7]}, {0x4, [0x7, 0x9, 0x1, 0x45c, 0x6, 0x0, 0x6, 0x0, 0x100, 0x0, 0x8, 0x6614dd7a, 0x5, 0x8, 0x0, 0x1000, 0x5, 0x2, 0x8000, 0x6, 0x10000, 0x80, 0x3, 0x81, 0xffffec99, 0x2, 0x7, 0xffff, 0x8, 0xfffffff9, 0x4, 0xde4, 0x100, 0x9, 0x3, 0x4, 0xf, 0x1, 0x352, 0x4, 0x2, 0xfffffffb, 0x8, 0x3, 0x4, 0xf, 0x2, 0x3, 0x3, 0xa, 0x7, 0x6, 0xfffffffc, 0x4, 0x80000001, 0x2, 0x3, 0x8, 0x4, 0x8001, 0x0, 0xf674, 0x7f, 0x9, 0x6, 0x3, 0xff, 0x28c4, 0x5, 0xfffffff7, 0x9, 0x6, 0x5950, 0xa, 0x7fff, 0xfff, 0x80, 0x8000000, 0x446, 0xeee, 0x0, 0x81, 0x800, 0x10000, 0x7, 0xa, 0x6, 0x0, 0x8001, 0x6, 0x9, 0x81, 0xffffff00, 0x1, 0x5, 0x0, 0x200, 0x0, 0x5, 0x2cf, 0x8, 0x8, 0x0, 0x7fffffff]}, {0x7, [0x1, 0xffffffff, 0x9081, 0x3, 0xac0, 0xabba, 0x2, 0x7, 0x10001, 0x77, 0x2, 0x1000, 0x11, 0x7, 0xfffffff9, 0x0, 0x3, 0x9, 0x40, 0x80000001, 0x5, 0x7fff, 0x4f0caec5, 0x8, 0x1362, 0x8001, 0xfffffff8, 0x3, 0x3ff, 0x8, 0x3, 0xfff, 0x1, 0x1, 0x60000000, 0x3, 0x2, 0x7fffffff, 0x7ff, 0x1ff, 0x5, 0x10001, 0x29, 0x7, 0x2a1, 0x17, 0x200, 0x5, 0x3, 0x10, 0x0, 0xfffff001, 0x100, 0x9, 0xb3cb, 0x190, 0x7f, 0x8, 0x8cc, 0x8, 0xc, 0x9, 0x8, 0x9, 0xfffffff9, 0x200, 0x7, 0x7, 0x3000, 0x8000800, 0x2, 0x1, 0x2, 0x218be08d, 0x4, 0x87f, 0xfffff308, 0x7, 0x4, 0x35, 0x7646, 0x5, 0x80a, 0x9, 0xd6e, 0x3, 0xcf0, 0x10000, 0x8, 0x81, 0x1, 0x0, 0x5, 0x6, 0x10001, 0x2, 0x7, 0x7, 0x2, 0x1, 0x1000, 0x6d, 0x1, 0x3]}, {0xda, [0x33, 0x34, 0xd, 0x1, 0x200, 0x82, 0x0, 0x8, 0x4, 0x8, 0x9, 0x4, 0x1501, 0x3, 0x8001, 0x0, 0x5a412adf, 0x9, 0x39c, 0xff, 0xfffffffb, 0x80, 0xb, 0x2, 0x8, 0x80, 0xd2, 0xcf, 0x5, 0x401, 0x401, 0x3ff, 0xc, 0xff, 0x5, 0xcf2, 0x7, 0x2, 0x9e, 0x3, 0x7, 0x3, 0x1df, 0x98, 0xfffff84f, 0x2, 0x8, 0x8, 0x7f, 0x80000000, 0x4, 0xfffffffb, 0x1, 0xeea, 0xa38, 0x5, 0x200, 0x80000000, 0x400, 0x8, 0x9, 0x0, 0x8, 0xd95d, 0xfffffffe, 0xfffffff8, 0xfffffff7, 0x1, 0x981, 0x7fffffff, 0x7, 0x66f, 0x400, 0xa18, 0xffff0000, 0x800, 0x3, 0x3, 0x9cf0, 0xd, 0x6, 0xffff, 0x5, 0xfffffffc, 0x1, 0x8, 0x1, 0x6, 0x6, 0x5, 0x10001, 0x8, 0x8913, 0x3, 0x3, 0x9, 0x5, 0x5, 0x8, 0xbd2, 0x284, 0x5, 0x6581cc62]}, {0xfffffff3, [0x6, 0x200, 0x6, 0x8, 0x22c, 0xe, 0x3, 0x4, 0x2, 0x1, 0x4, 0x3, 0xfffffff8, 0x5, 0x5, 0x10000, 0x3, 0x5, 0x7, 0x0, 0x100, 0x0, 0x1, 0xf, 0x2, 0x79, 0x7fff, 0x3, 0xfff, 0x7, 0x2c, 0x671c3b95, 0x2, 0xe176, 0x80000000, 0x5, 0x5, 0x9, 0x3, 0x6, 0x9930, 0xffff, 0x6, 0x1, 0x96f4, 0x10001, 0x13a5, 0x3, 0xfffffffd, 0x4, 0x40, 0x4, 0x4, 0x1, 0xc36, 0x6, 0x0, 0x3, 0x2, 0x4c9, 0x4, 0x1, 0x6, 0x6, 0x401, 0x5, 0x4, 0x6, 0x1, 0x6, 0x2, 0x1, 0x3, 0xffff, 0x5, 0x4e9, 0xfffff000, 0x8fd, 0x15d7, 0x8b85, 0xfffffff7, 0x1, 0x2, 0x9, 0x5, 0x8, 0x1, 0x9538, 0x4, 0xffffffff, 0x8, 0x80, 0x80000001, 0x7f, 0xd, 0x405383b2, 0xc00, 0x5, 0x51d7, 0x5, 0x3, 0xe, 0xa, 0x8]}, {0x7, [0x5, 0xb, 0x3, 0x5, 0xfffffffd, 0x0, 0x8, 0x235, 0xf, 0x5, 0x1, 0x8, 0xfffffffd, 0x7fff, 0x8, 0x0, 0xfffffff9, 0x3, 0x7, 0x81, 0xfffffffd, 0x0, 0x5, 0x0, 0x153, 0x7, 0xffffffff, 0x6, 0x3, 0xffffffff, 0x5, 0x6, 0xd, 0x1, 0x8001, 0x3, 0x99, 0x0, 0x2ede, 0x2, 0x7, 0x7, 0x9d46, 0x2, 0x7, 0x7fff, 0x1, 0x5, 0x8, 0xb, 0x4, 0x0, 0xf5, 0x1, 0x5, 0xd, 0x8, 0x0, 0x10000, 0x0, 0x4, 0x2, 0x9, 0xffffffff, 0x4, 0x2, 0x401, 0x7fffffff, 0x1, 0x4, 0x9, 0x5, 0x1, 0x0, 0x2, 0x800000, 0x5, 0xc412, 0x1, 0x1ff, 0x100, 0xfffffffc, 0x7, 0x0, 0x2, 0x1ff, 0x7a, 0x0, 0x6b5b, 0xd, 0x2, 0x7f, 0x7, 0x81, 0x1, 0x1, 0x8001, 0x2, 0x5, 0x4, 0xd, 0x2, 0x4, 0x7ff]}, {0x4, [0xfffffffe, 0x937, 0x10000, 0x101, 0x5, 0x101, 0x8, 0x4, 0xfffffc91, 0x1, 0xb, 0x7, 0x7fff, 0x3ff, 0x1, 0x2, 0x8, 0x8001, 0x251, 0x2, 0x3, 0x6, 0x0, 0xc75, 0x2, 0x3d, 0x9, 0x86, 0x6, 0xdee, 0x9558, 0x40000000, 0x7f, 0x2, 0x81, 0x80000000, 0x7, 0x0, 0xffffff01, 0x9, 0xfffffff7, 0x3d7, 0x3, 0x4, 0x7, 0x4, 0x5, 0x0, 0x200, 0x3, 0x5, 0x0, 0x3, 0xe5, 0x1, 0x0, 0x0, 0x5, 0x75, 0x401, 0x7056, 0x10000, 0x7b, 0x400, 0x5, 0x7, 0x0, 0x4e1c, 0x2, 0x70c0, 0x6, 0xfff, 0x101, 0x3, 0x98b, 0x4, 0xd, 0x5, 0x7, 0x5, 0x0, 0x0, 0x6, 0x7, 0xec89, 0x10000, 0x2, 0xffff725e, 0x6, 0x80000000, 0x73, 0x2, 0x8, 0x1b, 0x8, 0x8001, 0xc61, 0x6, 0x1, 0x8, 0xd, 0x1, 0x5, 0x6]}, {0x4, [0x0, 0x800, 0x4, 0x0, 0x4, 0x60, 0xfffffffa, 0x1, 0x7, 0x2, 0xa, 0x7, 0x800, 0x7, 0x8, 0x4, 0x6, 0x80000000, 0x2, 0x4, 0x2, 0x3, 0x0, 0x6, 0x1000, 0x8001, 0xe2, 0x0, 0x401, 0x2, 0xc, 0x3, 0x8, 0x3, 0x8, 0x6, 0x8, 0x3, 0xd1b, 0x99e, 0x7, 0x559aab50, 0x9, 0x0, 0x9, 0xc2, 0x3, 0x1, 0xfffffff9, 0x7, 0x1ff, 0x5, 0x9, 0xfffffff0, 0xb, 0x400, 0x3, 0x6, 0x6, 0xa, 0x101, 0x99d, 0x8cc, 0x2, 0x1, 0x4, 0x8, 0x4, 0xa, 0xffff15c8, 0x9, 0x1, 0xfffffffc, 0x6e, 0x6, 0x5, 0x0, 0x5, 0x80000000, 0x7f, 0x2, 0x4, 0x5, 0xe, 0x7fffffff, 0xfffffff7, 0x63a, 0x0, 0x0, 0xffffffff, 0x7631, 0x7fff, 0x3119, 0x7, 0xfffff801, 0x81, 0x2, 0x10, 0x800, 0x0, 0xc0000, 0x7, 0x1, 0xffff]}, {0xa5d6, [0xf, 0xfff, 0x3, 0x4, 0x4, 0xfffffeff, 0x27c, 0xa, 0x8001, 0x8add, 0x5, 0xd9, 0x7, 0x391b5fa4, 0x9, 0xffffffff, 0xa8, 0x4, 0x3b, 0x6, 0x2, 0x76, 0x80, 0xffffffff, 0xffffffff, 0x4, 0x7, 0x5e, 0x6, 0x72, 0x80, 0x2, 0x8, 0xfd, 0x5, 0xf92, 0x51d, 0xfffffffc, 0x5, 0x31db, 0x9, 0x3, 0xf7, 0x9, 0x5f46, 0x1a2, 0x3, 0x476ad8e2, 0x6, 0x7, 0x8001, 0x5, 0x5, 0x2880, 0x0, 0x217, 0x9, 0x5, 0xae4, 0x1, 0xfffffffa, 0x8000, 0x49, 0x6, 0x2, 0x8, 0xfff, 0x5333, 0x5, 0x7, 0xec, 0x8, 0xd31, 0xfffffffa, 0x7fffffff, 0x200, 0x8000, 0xffff, 0x6, 0x9, 0x3ff, 0x1000, 0x5, 0xf8cd, 0x6, 0x6, 0x8001, 0x7, 0x1ff, 0x6, 0x6, 0x0, 0x1, 0xa, 0x19, 0x7, 0x7b3, 0x0, 0x3, 0x0, 0xfffeffff, 0x100, 0x6, 0xc]}, {0xfffffffc, [0x8, 0x2020000, 0xd80e, 0xa2, 0x7, 0x5ca, 0x81, 0x1, 0x9, 0x7, 0xa1, 0x6, 0x7, 0x7, 0xdb3, 0x9, 0x5, 0x81f, 0x9, 0x3, 0x4, 0x3, 0x7fffffff, 0x401, 0x5, 0x2, 0x9, 0x8, 0xb, 0xfffffffa, 0x3, 0x80000001, 0x6, 0x81, 0x6, 0x1, 0x1, 0x1, 0x6f, 0x6, 0x7, 0x0, 0xffffffff, 0x1, 0xb23a, 0x9, 0x6, 0x4, 0xfffff801, 0x8, 0x3, 0x0, 0xc2, 0x40, 0x3, 0x3, 0x10000, 0x10, 0xffffff4b, 0x9, 0x8, 0xc3c, 0x7, 0xb, 0x2, 0xa3, 0x7fff, 0x1ff, 0x9, 0xc, 0x80000001, 0x6, 0x25231246, 0x401, 0x10001, 0x6, 0x7, 0x100, 0xffff7fff, 0x5, 0xfffffffa, 0x4, 0x9, 0x80, 0x3, 0x0, 0x3, 0x4, 0xfffffff6, 0x3923, 0x3ff, 0x7fffffff, 0x5, 0xfffffffc, 0x8, 0x614, 0x6, 0x2, 0x5, 0x3, 0xb6, 0xffffffff, 0x5a0, 0x20000000]}, {0xfffffff9, [0x6, 0x380000, 0x7f, 0xe, 0x7, 0x2, 0x80, 0x4, 0x8, 0x4, 0x8, 0x0, 0x7, 0x5c44, 0x82, 0x5, 0xf, 0x2, 0x0, 0x7, 0x9, 0x7c95, 0x1, 0x400, 0x4, 0xd, 0x9, 0x2, 0x7, 0x4, 0x5, 0x100, 0x80000001, 0x8, 0x8, 0x0, 0x8, 0x7, 0x7, 0x40, 0x1000, 0x9, 0x96e, 0x80000001, 0x7, 0x2, 0x66c4, 0x2, 0x2, 0x4, 0x39, 0x3, 0x7, 0x10000, 0x0, 0x3, 0x6, 0x6, 0x3, 0x1, 0x5, 0x4, 0x8, 0x7, 0x8, 0x7, 0x10, 0x3, 0x100, 0xddfe, 0x4, 0x7, 0xfffffff8, 0x9, 0x6, 0x2, 0x7, 0x7fffffff, 0x67d8883b, 0x8e, 0x1, 0x1ff, 0x6, 0x7, 0x1, 0xfffffbff, 0x400, 0x5, 0x8, 0x26, 0x57, 0x6, 0xa4e, 0x5, 0x500000, 0x6, 0x8, 0x4, 0x0, 0x0, 0x6, 0x8, 0x1, 0x6c]}, {0x3, [0x8, 0x62c, 0x67, 0xfffffff9, 0x8000, 0x7, 0xffff8000, 0x3, 0x8, 0x1000, 0x5, 0x2, 0x584d, 0x8, 0x5, 0xd, 0x2, 0x2, 0xc, 0x88e, 0x4, 0x6, 0x6, 0x4, 0xffff, 0x3401, 0x9, 0x80, 0x8, 0x8, 0x9, 0x81, 0x7, 0x6, 0x6, 0x8, 0x1, 0x3, 0x6, 0x7, 0x19e6, 0x3c79, 0x8000, 0x2, 0xc43b, 0x3, 0x80000001, 0x0, 0xfff, 0x2, 0xfff, 0x8, 0x10000, 0xfffffff2, 0x0, 0x80000000, 0x45, 0x5, 0x5, 0x8000, 0x0, 0x80, 0x1, 0x5db5, 0xfffffffc, 0x4, 0x9, 0x8a3, 0x3ff, 0x4, 0x93ed, 0xf8, 0x3, 0x0, 0x1, 0x6, 0x1, 0xffff2be3, 0x0, 0x4, 0x200, 0xfffffff9, 0x2, 0xaf0, 0x1ff800, 0x1, 0x3, 0x1, 0x80000000, 0xd, 0x3, 0x5, 0x2, 0x722a, 0x6, 0x70a, 0x1, 0x7bd, 0x7, 0xd, 0xd, 0x4, 0x5, 0xfffffff7]}]}) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r1, 0x84, 0x15, &(0x7f0000001d80)={0x0, 0x193}, &(0x7f0000001dc0)=0x8) getsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000001e00)={@in6={{0x1c, 0x1c, 0x2, 0x1, @mcast1, 0x8000}}, r4, 0x80000001, 0x7, 0x1, 0x6, 0x0, 0x2}, &(0x7f0000001ec0)=0x98) r6 = open$dir(&(0x7f0000001f00)='./file0\x00', 0x100000, 0x188) r7 = fhopen(&(0x7f0000001f80)={{[0x6, 0xfffffff8]}, {0x0, 0x8, "fb4d22f65d3ad3590b0bb5c159532d93"}}, 0x1) renameat(r6, &(0x7f0000001f40)='./file0\x00', r7, &(0x7f0000001fc0)='./file0/file0\x00') ioctl$UI_SET_MSCBIT(r7, 0x20045568) getsockopt$inet6_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x26, &(0x7f0000002000)={r4, 0x7ff}, &(0x7f0000002040)=0x8) setsockopt$inet6_sctp_SCTP_PRIMARY_ADDR(r7, 0x84, 0x7, &(0x7f0000002080)={@in={{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}, r5}, 0x84) posix_fadvise(r3, 0x8001, 0x3, 0x4) r9 = openat$ptmx(0xffffff9c, &(0x7f0000002140), 0x40, 0x0) ioctl$DIOCADDSTATE(r9, 0xc0f24425, &(0x7f0000002180)="b3b5fcce49b186c3c08e7001b526eba282494c17bc9b5b5f022569897a61484369eb35a9b8a87b71a5d233bb2ae1599ee1677741dc7477fa8c4d397e57c9d2c1abb6c0a99644e833b743ab37ce23ccb545ff5d9acc271e2dbec8b637f5384cc808c0aedba7118115faac94c00e0586ff4b076bc98d1a43bf95a2fee702f60b41e4d05ddd89e3d957725058fe822d756f9726ff6abfd8ad97a83054494dd739497b52bb986ca742800f3c0c2e69db904c30728ce3f331f1b639285ab074b1b65e1aa6f0a1af6f04379cd6") ioctl$DIOCRDELTABLES(r9, 0xc44c443e, &(0x7f0000002340)={{"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", "4bef93cc3468318f18ef855f24de3683e05f447d3acdb2e9ee7e7b8e771f0d5f", 0x8, 0x1}, &(0x7f0000002280)="82b2ad82ab7f24f4e73a5cc46f96e6855c7289a97f50d1d584382531f124bd29007934ce3237f154c0d8f0f6160317fc32bac5da46d5fbda3cc09d2aa6e4dd941cb41a7be85cc8bc2d3e62da405191cca6c929c8d6ad0ae916afa57247d4dd0b9f89afaedcb787600912cb901aa0886268be62f8e611b209af509a6d1f486d08da9cb9f3c0cf1f1aaeadbc5695de80074879f298fbc3e690fd22256eed7da3fdff373e0e7cf32634af08bb10315df269962e6f", 0x8000000000000000, 0x100000001, 0xdc, 0x0, 0xf, 0xeb, 0x7, 0x9}) fcntl$setflags(r2, 0x2, 0x1) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x901, &(0x7f00000027c0)={r8, 0x2, 0x2, [0x6, 0x101]}, &(0x7f0000002800)=0xc) r10 = dup2(r2, r6) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r10, 0x84, 0x26, &(0x7f0000002840)={r4, 0x5}, &(0x7f0000002880)=0x8) 2.715031183s ago: executing program 2 (id=164): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0x8, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, 0x0) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x10000, &(0x7f00000004c0), 0x0, &(0x7f0000000040), &(0x7f0000000240)}) r1 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 2.606451006s ago: executing program 0 (id=7): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) r0 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0, 0x0) thr_new(&(0x7f00000002c0)={&(0x7f0000000040)="c4e11b7d2c186664643ef2adc4e2daf5e5c4e21d8c5902f30f16da817800090000008fc82087b647d300003df30faef3f2fe8f04000000660f71d33d", 0x800, &(0x7f00000000c0), 0x0, &(0x7f0000000700)="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", 0x1bc, &(0x7f0000000100), &(0x7f0000000240), 0x0, &(0x7f0000000200)={0x2, 0x1f}, [0x2, 0x102, 0x4]}, 0x3c) mount(&(0x7f0000000000)='zfs\x00', &(0x7f0000000040)='./file1\x00', 0x1500101, &(0x7f00000001c0)) r1 = socket(0x10, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x13, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r1], 0x8) futimesat(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00002) msgget$private(0x0, 0x261) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000240)={r4, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x7], 0xfffffffd, 0x8, 0x9, {0x9, 0x6, 0x0}, {0x0, 0x5, @sival_int=0x40000008}}) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, r5, 0x60000000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) copy_file_range(r5, 0x0, 0xffffffffffffffff, &(0x7f0000000140)=0x87a4, 0x5, 0x0) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_timeval(r6, 0xffff, 0x1005, 0x0, 0x0) 467.26002ms ago: executing program 1 (id=165): r0 = socket$inet6(0x1c, 0x3, 0x6) sendto$inet6(r0, &(0x7f0000000180)="69cd5de75bd11cbe1faf7620167034e6cfadb1fa74da8b1d1fcefb581882a0a2eda163234a887335a2007e80f285985a930dfb3c32ccf5405fb78bb3bca0c79d1bbad476b576a1f10172e9c428ebfba40a4c9c056fa4", 0x56, 0x4, &(0x7f0000000100)={0x1c, 0x1c, 0x2, 0x2, @loopback, 0x7fff}, 0x1c) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x4, 0x410, r0, 0x0) setlogin(0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) r3 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r4 = dup2(r3, r3) ioctl$DIOCCHANGERULE(r4, 0x8048756c, &(0x7f0000000080)="761b65ef9921753862f74b25b942c107000000996ab7060d4dfec41dcb0b97c8e2101c99f953") mkdirat(r2, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) seteuid(0xffffffffffffffff) setsockopt$inet_mreqsrc(r1, 0x0, 0x47, &(0x7f0000000040)={@local={0xac, 0x14, 0x0}, @empty, @loopback}, 0xc) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) ioctl$DIOCGETSTATES(r5, 0xc0106663, &(0x7f0000000040)) r6 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r6, &(0x7f0000000340)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000002900000015"], 0x1c}, 0x0) getsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x9, 0x6, 0xb, 0x4, 0x4}, &(0x7f0000000100)=0x14) r8 = kqueue() kevent(r8, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0xfffffffd, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x7f7884acbfff, 0x4) setsockopt$inet6_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000140)={r7, 0x6}, 0x8) chroot(0x0) ioctl$DIOCGETTIMEOUT(r2, 0xc008441e, &(0x7f0000000200)={0x6, 0x7}) rename(0x0, 0x0) syz_emit_ethernet(0x86, &(0x7f0000000000)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff04dd60dcffd900503a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa02009078000000006006db3efffe2b00fe8000000000000000000000000000aa000000000000000000000000000000012b02007300000000fe8000000000000000000000000000aa2300000000000000"]) syz_emit_ethernet(0x36, &(0x7f0000001300)={@local, @broadcast, [], {@ipv6={0x86dd, {0x6, 0x6, "ba9ee0", 0x0, 0x45, 0x1, @local={0xfe, 0x80, '\x00', 0x0}, @ipv4={'\x00', '\xff\xff', @rand_addr=0x7}}}}}) r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r9, 0x0, 0x0, 0x180, &(0x7f0000001280)={0x10, 0x2, 0x3, @broadcast}, 0x10) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 374.888038ms ago: executing program 2 (id=166): mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r1 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x2f, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000180)={0x1c, 0x1c, 0x1, 0x0, @empty}, 0x1c) sendto$inet(r0, 0x0, 0x0, 0x99ba4dd790122092, 0x0, 0x0) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000540)={@in={{0x10, 0x2, 0x0, @rand_addr=0x8}}, 0x0}, &(0x7f0000000600)=0x84) sendmsg$inet6_sctp(r3, &(0x7f0000000700)={&(0x7f00000003c0)=@in6={0x1c, 0x1c, 0x1, 0x3, @local={0xfe, 0x80, '\x00', 0x0}, 0x93}, 0x1c, &(0x7f0000000400)=[{&(0x7f00000004c0)="d7dfc4ba9f008c2756a846ae7913f301354dabb08eb1ebf0f1d7e1380f9e663b08fce328c9ade13f5ffe6ad04cc6cd40943adbcafdf50932da92f0abac758efc8c81592f61d8e63831d7091fa17534c011a3", 0x52}], 0x1, &(0x7f0000000640)=ANY=[@ANYBLOB="14000000840000000700000001000000010000002c00000084000000220000000100100000020000fcffffff0700000001000000008004000000", @ANYRES32=r4, @ANYBLOB="10000000840000000800000006000000100000008400000009000000ac1400bb140000008400000001000000060010000e001d0d1400000084000000010000000900fe00750c0500"], 0x88, 0x1}, 0x10c) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) lseek(r5, 0x0, 0x39d42ff5ff956efe) ftruncate(r2, 0x3866) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) r6 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) copy_file_range(r6, 0x0, r6, &(0x7f0000000180)=0xa8000, 0x3ff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) r8 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) __getcwd(&(0x7f0000000240)=""/68, 0x44) r9 = socket(0x2, 0x1, 0x0) bind$inet(r9, &(0x7f00000001c0)={0x10, 0x2, 0x2, @broadcast}, 0x10) connect$inet(r9, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) sendto(r9, &(0x7f0000000440)="6583", 0x2, 0x20001, 0x0, 0x0) recvfrom$unix(r9, 0x0, 0x0, 0x43, 0x0, 0x0) ioctl$CIOCGSESSION2(r8, 0xc030636a, &(0x7f0000000200)={0x19, 0xf, 0xf2, &(0x7f00000002c0)="7afe564fc2b863fbad320668237616506c866d8b16ca4c6852a9d49f54cc0b3c5c7dd1a4a40a3e24b6e712eb30c818b5a8c2fdc5a792603859e406fbab2a1579c931402fb8875c9edaaabe099d46200ade3bcd7011b3bd06b21c23ab5097e8b6cce0fd4041a01f3e18625c5e6ce4a42e089a6ec6b451e77007780fab076a4d426ddcfd0efd7b81a93f25fc39384407c146f0ce57d9c609ca0f1a985525ad359c9b0576f9b444168dcd53810764e2541059928364f045f6cfdddadee98bd1ae07c35e4d53ebf40ced3330e460f5554763436e8f1fbf1cd0d688dcb08da5d8abf83fac54459d79447bfa69ed53f3f085c9740a", 0x92, &(0x7f0000000100)="0c0edd34865a8c6dfe70662475efccd9d4201861dd90b91471b8a53f99174a81bc3162248657567bf897648ce4d1817b1411bb52a46a4465a3c6d671c197e20687dc9497f848cba99042ae6d6d0040fb55c01e7e5ff20c0ba0c9d6f43534c4a0d6a4300882c9f851b79b901d38f757faa64a7adfc280a5a53418b3425c1235a3938594c77f19d97a4762da0b16118e723ca9", 0xe1a9, 0x8, [0x2, 0x5, 0x4ee3]}) getsockopt$inet_opts(r8, 0x0, 0x0, &(0x7f0000000000)=""/80, &(0x7f0000000080)=0x50) mprotect(&(0x7f00003da000/0x3000)=nil, 0x3000, 0x0) 371.450028ms ago: executing program 3 (id=167): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) sigaltstack(&(0x7f0000fff000/0x1000)=nil, 0x0) madvise(&(0x7f0000d97000/0x2000)=nil, 0x2000, 0x5) mkdir(&(0x7f00000001c0)='\x00', 0x6) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r0 = socket(0x2, 0x3, 0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x100, &(0x7f0000000340)=0x7fff, 0x4) getsockopt$inet_tcp_int(r1, 0x6, 0x100, 0x0, &(0x7f00000007c0)) connect$inet(r0, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) cap_rights_limit(0xffffffffffffffff, 0x0) getsockopt$inet6_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000000)={0x0, 0x47aa}, &(0x7f0000000040)=0x8) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r0, 0x84, 0x6, &(0x7f0000000100)={@in6={{0x1c, 0x1c, 0x1, 0x4, @rand_addr="3c4a8b2c9eaa39255f87be6c3835dd81", 0x80}}, r2}, 0x84) 305.016732ms ago: executing program 3 (id=168): open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x0) (async) freebsd11_lstat(&(0x7f0000000000)='./file1\x00', &(0x7f0000000100)) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') 135.052873ms ago: executing program 3 (id=169): setuid(0xee01) mount(&(0x7f0000000000), 0x0, 0xc4000584, 0x0) (async) open$dir(&(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x40) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x60) (async) r1 = open$dir(0x0, 0x0, 0x0) connect$unix(r0, &(0x7f0000000000)=@abs={0x8, 0x0, 0x0, 0x0}, 0x8) (async) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r1, &(0x7f0000000240)='./file0\x00') (async) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 0s ago: executing program 0 (id=7): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) syz_extract_tcp_res(&(0x7f00000000c0), 0x101, 0xe) r0 = open$dir(0x0, 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r0, 0x0) thr_new(&(0x7f00000002c0)={&(0x7f0000000040)="c4e11b7d2c186664643ef2adc4e2daf5e5c4e21d8c5902f30f16da817800090000008fc82087b647d300003df30faef3f2fe8f04000000660f71d33d", 0x800, &(0x7f00000000c0), 0x0, &(0x7f0000000700)="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", 0x1bc, &(0x7f0000000100), &(0x7f0000000240), 0x0, &(0x7f0000000200)={0x2, 0x1f}, [0x2, 0x102, 0x4]}, 0x3c) mount(&(0x7f0000000000)='zfs\x00', &(0x7f0000000040)='./file1\x00', 0x1500101, &(0x7f00000001c0)) r1 = socket(0x10, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) open$dir(0x0, 0x8, 0x16b) setgid(0xffffffffffffffff) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r3, 0x84, 0x13, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r1], 0x8) futimesat(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00002) msgget$private(0x0, 0x261) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000240)={r4, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x7], 0xfffffffd, 0x8, 0x9, {0x9, 0x6, 0x0}, {0x0, 0x5, @sival_int=0x40000008}}) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, r5, 0x60000000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) copy_file_range(r5, 0x0, 0xffffffffffffffff, &(0x7f0000000140)=0x87a4, 0x5, 0x0) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_timeval(r6, 0xffff, 0x1005, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.19' (ED25519) to the list of known hosts. Jan 20 19:31:36 ci-freebsd-i386-0 kernel: arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 md0: truncating fractional last sector by 1 bytes Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 ZFS filesystem version: 5 ZFS storage pool version: features support (5000) if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 Jan 20 19:31:41 ci-freebsd-i386-0 dhclient[812]: Interface tap0 is down, dhclienif_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 t exiting if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 Jan 20 19:31:41 ci-freebsd-i386-0 dhclient[812]: connection closed Jan 20 19:31:41 ci-freebsd-i386-0 dhclient[812]: exiting. if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 Expensive callout(9) function: 0xffffffff81b06f50(0xfffffe006df79a80) 0.002221725 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 Expensive callout(9) function: 0xffffffff81afc400(0) 0.005943372 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 SYZFAIL: too much cover cov=603985798 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=0 req=7 state=3 status=67 (errno 9: Bad file descriptor) if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 FreeBSD/amd64 (ci-freebsd-i386-0.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 show registers Password: Login incorrect login: ps Jan 20 19:32:17 ci-freebsd-i386-0 login[749]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl