last executing test programs: 1.307545365s ago: executing program 0 (id=18): freebsd11_mknod(&(0x7f0000000100)='./file0/file0\x00', 0x672cda28f543e327, 0x4) open$dir(&(0x7f0000000040)='./file0\x00', 0x110206, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x2000000, 0xa1) lseek(r0, 0xfffffffffffffffd, 0x3) r1 = socket$inet_tcp(0x2, 0x1, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) ioctl$MDIOCATTACH(r2, 0xc1c06d00, &(0x7f00000008c0)={0x0, 0x0, 0x3, 0x0, 0x1000, 0x6, 0x6, 0x0, 0x1, 0x2, 0x0, [0x4, 0xa9, 0x80000001, 0x10, 0x3, 0x0, 0x800, 0x1, 0x8001, 0x4, 0xeb0c7322, 0x8, 0x8000, 0x0, 0x7, 0x3, 0x1, 0x1, 0x0, 0x7ff, 0x1, 0x5, 0x9, 0xa, 0x4, 0x0, 0x9c078fa, 0x2, 0x400, 0xd9, 0xb, 0x0, 0x40, 0xf, 0x10000, 0x7, 0xd0f, 0x4, 0x1, 0x1, 0x1, 0x400, 0xe, 0x59b, 0x800, 0x9, 0x3, 0x9, 0x9, 0x7, 0x5, 0x0, 0x6, 0x5, 0x1, 0x4, 0x4, 0x80000000, 0x1, 0x3, 0x9, 0x3, 0x7, 0x7, 0x6, 0x9, 0x2, 0xa87e, 0x423, 0x85a8, 0x3, 0x2, 0x8, 0x9f0, 0xfff, 0xc93, 0x0, 0x0, 0x7, 0xf27, 0x64a5, 0x8, 0x1ff, 0x3, 0x7f, 0x4, 0x4, 0x4, 0x7, 0x1, 0x1, 0x7, 0x1, 0xd5, 0x5, 0xffff]}) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r1, 0x6, 0x27, &(0x7f0000000140)={&(0x7f0000000080)="00b2c06df480cfe19f0da47ac0235414", 0x0, &(0x7f0000000880)="cf", 0xb, 0x10, 0x0, 0x7, 0x1, 0x0, 0x3, 0x3, "00ff03ff8e3500"}, 0x40) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) read(r1, &(0x7f0000000d40)=""/4096, 0x1000) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) msync(&(0x7f00001f2000/0x1000)=nil, 0x1000, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x2, 0x11, r0, 0x8000000880000) ioctl$DIOCRTSTADDRS(r3, 0xc4504449, &(0x7f00000008c0)={{"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", "61eb42734479b796954ac68472be5100130aa3159599b61c14f8d5de9f7324aa", 0x813, 0x9}, &(0x7f0000000180)="1e2e93e34d6978c5ec874e49dfa4a66575405be34dd156dbc7c5039b251858b72a4389807d8401c239f114426f30181803b3edc2ee9343b5ce9f9b2b4ad3d247af6e7015427068eaaf4fe54f9375c0ab7265a95ddeaa21927df8c016abe4d296172ae08ddbf920d43c80b42037645334515bb711c93287bf3365c4489a9da649545e66295478c7be76688b3412c4a3cbb722b902d327252d69e07e1a89fbf92ff9f45559c6b402bbf330857bc05c12f1e4b122985b7873a4b33db8c80638", 0x0, 0x4, 0xfffffffffffffff3, 0x8, 0xcc6, 0x637, 0x7fff, 0xffffffc0}) sendmsg(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="100000000000000001000000070000005bc7b2ce132de94fb4843dc1353813ffafc00d9e7afffd8f05da4959e39d32f23d989a5d5eb233547b5e3c2ae2764a77ce66426ce456fb5c253d2c"], 0xfc8c}, 0x0) 1.209417689s ago: executing program 0 (id=21): chmod(&(0x7f0000000040)='.\x00', 0x35e) (async) setuid(0xffffffffffffffff) (async) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rtprio_thread(0x1, 0x0, &(0x7f0000000000)={0x2, 0xfffc}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) rmdir(&(0x7f0000000100)='./file0\x00') r0 = socket(0x1c, 0x1, 0x0) (async) freebsd11_kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x200f0, 0xffffffffffffffff, 0x0) (async) symlink(&(0x7f00000001c0)='.\x00', &(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdir(&(0x7f0000000100)='./file\x00', 0x30) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x4a) rename(&(0x7f0000000040)='./file/file0\x00', &(0x7f0000000a80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCLOCK(r1, 0x2000427a) ioctl$BIOCSTSTAMP(r1, 0x80044284, &(0x7f00000000c0)=0x2) (async) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, 0x0, 0x0) (async) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) (async) unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x404000d0) (async) freebsd11_fstat(r0, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lchown(&(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r2, r3) 1.209270313s ago: executing program 2 (id=22): syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "00fb00", 0x0, 0x2b, 0x0, @rand_addr="eee7567b28852d6d4ef8e5374c1e7b3b", @local={0xfe, 0x80, '\x00', 0x0}}}}}) syz_extract_tcp_res(&(0x7f0000000040), 0xeb, 0x5) 1.208848266s ago: executing program 2 (id=23): r0 = getpid() r1 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mmap(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x6, 0x10, r1, 0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x400, 0x0) aio_write(&(0x7f0000000240)={r2, 0x80000001, &(0x7f0000000040)="e2", 0xfeac, [0x0, 0x1ff], 0x0, 0x0, 0x8000, {0x100000000000001, 0x7, 0x0}, {0x0, 0x0, @sival_ptr=0x3ef8}}) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) ftruncate(r3, 0x80002) procctl$PROC_PDEATHSIG_STATUS(0x0, 0x0, 0xc, 0x0) shm_rename(0x0, &(0x7f0000000440)='./file0\x00', 0x2) aio_waitcomplete(&(0x7f0000000380)=0x0, &(0x7f00000003c0)={0xe, 0x7}) setrlimit(0x3, &(0x7f0000000080)={0x2795, 0x100000}) listen(r1, 0xffffff35) unlink(&(0x7f0000000080)='./file0\x00') msync(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2) setpgid(r0, r0) 1.144110461s ago: executing program 0 (id=25): r0 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r1 = semget$private(0x0, 0x4, 0x8) msgget(0x0, 0x400) socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, 0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, 0x0, 0x0) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, 0x0, 0x0) mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x3, 0x410, 0xffffffffffffffff, 0x0) mincore(&(0x7f0000156000/0xc00000)=nil, 0xc00000, 0x0) fork() r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r3, 0x0) semop(r1, &(0x7f0000000140)=[{0x0, 0x1376, 0x1000}, {0x0, 0x5, 0x1800}], 0x2) posix_fallocate(r0, 0x0, 0x50e088b7) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r5, &(0x7f0000000100)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x105, &(0x7f0000000280)={0x1, [0x0]}, 0x0) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0xa, &(0x7f0000000300)={@in6={{0x1c, 0x1c, 0x0, 0x5, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4}}, r6, 0x1ef, 0x62, 0x204, 0x8002, 0x6, 0x3}, 0x98) setsockopt$inet6_sctp_SCTP_AUTH_DELETE_KEY(r4, 0x84, 0x16, &(0x7f0000000300)={r6, 0x5}, 0x8) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000000)={@in={{0x10, 0x2, 0x0, @multicast1}}, r6, 0x0, 0x2, 0x9}, &(0x7f00000000c0)=0x90) 901.463407ms ago: executing program 0 (id=32): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0x18, &(0x7f00000000c0)={@broadcast, @local={0xac, 0x14, 0x0}}, 0x8) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2, 0x1, @rand_addr=0x400}, 0x10) setsockopt$inet_int(r0, 0x0, 0x3, &(0x7f0000000140)=0x3ff, 0x4) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x800, 0x0) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') rfork(0x3060) 857.670355ms ago: executing program 0 (id=34): syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3d, 0x1c, 0x0, 0x0, 0x8, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@generic={0xb, 0x2, 0x0, "45050aaa"}}}}}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) mount(&(0x7f0000000080), 0x0, 0x90000003, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x611, 0x48) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) 778.253066ms ago: executing program 3 (id=37): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) copy_file_range(r0, &(0x7f0000000040), r0, &(0x7f0000000080)=0x6, 0xb, 0x0) (async) setsockopt$inet6_group_source_req(r0, 0x29, 0x53, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @mcast2, 0xff}}, {{0x1c, 0x1c, 0xffffffffffffffff, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0x108) r1 = getpid() rtprio(0x1000000, r1, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x53, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x8000000, @mcast2}}, {{0x1c, 0x1c, 0x1, 0x4, @remote={0xfe, 0x80, '\x00', 0x0}}}}, 0x108) (async) lpathconf(&(0x7f0000000000)='./file0/file0\x00', 0x8) 776.666873ms ago: executing program 3 (id=38): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x1ff, @empty, 0x5}, 0x1c) listen(r0, 0xd) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) r1 = kqueue() mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket$inet6(0x1c, 0x2, 0x0) setsockopt(r2, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) kevent(r1, &(0x7f0000000000)=[{0x3, 0xffffffffffffffff, 0xc0c3, 0xc0000000, 0x0, 0x0, [0x8, 0x1ccf, 0x2, 0x9]}], 0x40000c9, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file\x00', 0x160) syz_emit_ethernet(0x5e, &(0x7f0000000040)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "510100", 0x28, 0x0, 0xff, @remote={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6, 0x0, 0x0, 0x3}], @tcp={{0x2, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x8, 0x2, 0x43, 0x0, 0x0, {[@window={0x3, 0x3, 0xf}, @sack={0x5, 0x2}, @mss={0x2, 0x4, 0xd44}]}}}}}}}}) 608.050642ms ago: executing program 3 (id=39): syz_emit_ethernet(0x3e, &(0x7f0000000480)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@dest_unreach={0x3, 0x6bd374b27f86e548, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, @multicast1}}}}}}) (async) syz_emit_ethernet(0x3e, &(0x7f0000000480)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@dest_unreach={0x3, 0x6bd374b27f86e548, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, @multicast1}}}}}}) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x2a, &(0x7f00000000c0)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x2000, 0x4, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @generic="179d64ca430bb096c6832cde18679e29dba3ef488e11ee14"}}}}) (async) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x2000, 0x4, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @generic="179d64ca430bb096c6832cde18679e29dba3ef488e11ee14"}}}}) syz_emit_ethernet(0x3a, &(0x7f00000001c0)={@random="b905f0ffffff", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x1, 0x2, 0x34, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @tcp={{0x2, 0x1, 0x41424344, 0x41424344, 0x1, 0x0, 0x5, 0x2, 0x1, 0x0, 0x4e}, {"f674e3a2"}}}}}}) ioctl$SMB_PCALL(r0, 0xc0106978, &(0x7f0000000480)={0x0, 0x0, 0x0, @byte=0x2, @word, 0x2, 0x0, 0x0, 0x0}) 606.10578ms ago: executing program 3 (id=40): syz_emit_ethernet(0x32, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffedd7890effffffffff00000000020008060020886406000008aaaaaaaaaabbaaaaaaaaaaaab6cd5a1a463bd8da9803918cce263872"]) select(0xfd47, &(0x7f0000000f80)={0x0, 0x8001, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, &(0x7f0000001000)={0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, &(0x7f0000001080)={0xcf}) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f0000000200)="4b420055bfb403f04ef800ebbbf36db0845b010700000000000100df82c0512a7c640dcdc42f35d062063b11818ebf9b61204b9b683800"/85, 0x55, 0x1, &(0x7f0000001200)={0x10, 0x2, 0x1, @broadcast}, 0x10) recvmsg(r0, &(0x7f00000003c0)={&(0x7f0000000000)=@in6={0x1c}, 0x1c, &(0x7f0000000340)=[{&(0x7f0000000040)=""/197, 0xc5}, {&(0x7f00000010c0)=""/4096, 0x1000}, {&(0x7f0000000140)=""/80, 0x50}, {&(0x7f0000000240)=""/82, 0x52}, {&(0x7f00000001c0)}, {&(0x7f00000002c0)=""/121, 0x79}], 0x6, &(0x7f00000020c0)=""/4096, 0x1000}, 0x101) 605.855697ms ago: executing program 3 (id=41): poll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x4}, {0xffffffffffffffff, 0x8}], 0x2, 0x1000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket$inet6(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000040)={0x6a, 0x1c, 0x0, 0x2, @empty, 0x2}, 0x1c) (async) bind$inet6(r0, &(0x7f0000000040)={0x6a, 0x1c, 0x0, 0x2, @empty, 0x2}, 0x1c) syz_emit_ethernet(0x52, &(0x7f0000000140)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "2f5105", 0x1c, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6, 0x0, 0x0, 0x3}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}}) socket(0x26, 0x2, 0x0) (async) r1 = socket(0x26, 0x2, 0x0) bind(r1, &(0x7f0000000040)=@in6={0x22, 0x1c, 0x3, 0x0, @mcast1}, 0xc) bind(r1, &(0x7f0000000040)=@in6={0x54, 0x1c, 0x3, 0x300, @mcast2}, 0xc) 328.120232ms ago: executing program 2 (id=42): r0 = fork() sigqueue(r0, 0x5a, @sigval_int=0x2fd51) wait4(r0, &(0x7f0000000040), 0x4, 0x0) 327.735425ms ago: executing program 2 (id=43): r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000280), 0x80000, 0x0) (async) freebsd12_shm_open(&(0x7f0000000140)='./file0\x00', 0x800, 0x68) ioctl$MDIOCATTACH(r0, 0xc1c06d00, &(0x7f00000004c0)={0x0, 0xffffffff, 0x6, 0x0, 0x9, 0x7, 0x1, 0xc, 0xea, 0x3f2, 0x0, [0xfff, 0x3, 0xd1f7, 0x5, 0x1, 0xff, 0x8, 0x4, 0x5, 0x4d29, 0x218, 0x7, 0x8, 0x7, 0xaf5, 0x0, 0xb, 0x9, 0x9, 0x7f7, 0xfffffffd, 0x6, 0x9, 0x6, 0xa, 0x3ff, 0x8, 0x0, 0x2, 0xff, 0xe, 0xffffffff, 0x40000025, 0xf9a7, 0x6, 0x6, 0x6, 0x1, 0x1ff, 0x0, 0x6, 0xc, 0x7, 0x4, 0x4, 0x7, 0x1, 0xe4d, 0x5, 0x9, 0xffffffff, 0x6, 0x5, 0x2, 0x96, 0xe4a, 0x10, 0x6, 0xff, 0xffffae06, 0x4, 0x6f0, 0x7, 0x1, 0x0, 0xf, 0x58, 0x6, 0xff, 0x1000, 0x2, 0xa, 0x5, 0x72, 0x8, 0x4, 0x800, 0xffff0516, 0xfffffb70, 0x10, 0x7, 0x0, 0x9, 0x6, 0x101, 0x4, 0x6, 0x5, 0x7fffffff, 0x8, 0x42, 0x200, 0x988, 0x0, 0x10, 0x9]}) (async) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x800, 0x0) procctl$PROC_REAP_STATUS(0x2, 0xffffffffffffffff, 0x4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0}) aio_readv(&(0x7f0000000680)={r0, 0x69bd, &(0x7f00000002c0)="cf2411a7f2b1c598cf3f21719d8583b19213192c5c5eaec8f053d95395792ae4806de16b4feacad689ec24ad705db52cadd3419a34a00561c0c704d5e642f8aeb8afd39ea1934948b1020a104e3cac1494131d758b168af2bba3c48d3c26f28cb02cabec2dc1d0ffff8fdbddf9087a1783", 0x71, [0x1, 0x5], 0x21, 0x6, 0x200, {0x8, 0x464, &(0x7f0000000340)="a9494575cdcef3d36d6f72f542e1969629e29b965f071df63e72a506a0ced7020adaf420fb464fd0629e954b15babb2d049111f2904b4951372a912d1f358c204bf0a58e69b995f78ff3334438507b2fad9367557494131fb5cabbe3c3b5ca156b58a712239004785c1ca53685798e1177ce1132a8b2a19ab6012d63234e4a83598087676446f8e4f54dd7dc4b9cd14eca72bb044fce3aec8b8f07948b9e1ea2042c8435"}, {0x4, 0x10, @sival_int=0x8, @tid=r2}}) preadv(r1, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) (async) r3 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000000)) ppoll(&(0x7f0000000040)=[{r0, 0x4}, {r1, 0x8}, {r0, 0x1}, {r3, 0x2}, {r0, 0x80}, {r0, 0x2}], 0x6, &(0x7f0000000080)={0x9, 0x7}, &(0x7f00000000c0)={[0xfffffffa, 0x80f, 0xffffff59, 0x6]}, 0x10) 327.565344ms ago: executing program 2 (id=44): open(&(0x7f0000000340)='./file0\x00', 0x300, 0x0) r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) aio_return(&(0x7f0000000200)={r0, 0x5, &(0x7f0000000000)="23e1bf2ee12a246ed2c152b1d0efe715062352937696dad6de9a11c3a5797ca75e5b7facc65c38367a29ef0c48ce85fa77faab6f6c8ed251e8d78b6a7f18129bb70759c3dba1b5d9adc17064", 0x4c, [0x5, 0x7], 0xdff, 0x18, 0x5, {0xa, 0x3, &(0x7f0000000140)="eed6c4b481a5739932189d1a2500e8c39c224942c7f21fdec82ac9fcec97cfffa89cfd7bad1e72e9a99c5a3a8ad4e862cd6c864eb0058740a2c56cb177f775c7a062a0fec5eaeee368b1f6644800caa0ce0cb4d34f60be04c119bb27cdffb09f57ab3c0709ec627a1d9b13746141863198bfa31cd84a332982829b0b6f66c08746b56446ef6122864c6184fc28662e"}, {0x4, 0x14, @sigval_int=0x8, @spare=[0x3, 0x2, 0x0, 0xc77, 0x1, 0x2, 0xc, 0xe]}}) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="556deb", 0xffffff41}], 0x1, 0xfe) 246.721372ms ago: executing program 1 (id=45): r0 = socket$inet6(0x1c, 0x3, 0x0) (async) r1 = __specialfd$eventfd(0x1, &(0x7f0000000600)={0xfde6, 0x5}, 0x8) fcntl$setstatus(r1, 0x4, 0x10040) connectat$unix(0xffffffffffffffff, r1, 0x0, 0x0) (async, rerun: 64) setsockopt$inet6_int(r0, 0x29, 0x26, &(0x7f00000001c0)=0x7, 0x4) (async, rerun: 64) syz_emit_ethernet(0x5e, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaf788a33fb3f386dd60c3200000282b00feffffff000000000000000000000002ff0200000000000000000000000000012b"]) r2 = fork() (async) aio_waitcomplete(&(0x7f0000000280)=0x0, &(0x7f00000002c0)={0x0, 0xa18}) wait4(r2, 0x0, 0x1, &(0x7f00000000c0)) procctl$PROC_TRAPCAP_CTL(0x0, r2, 0x9, &(0x7f0000000040)=0x6) (async, rerun: 64) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x0) (async, rerun: 64) recvmsg(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=""/128, 0x11}, 0x42) (async) mount(&(0x7f0000000000), 0x0, 0x0, 0x0) 188.038005ms ago: executing program 1 (id=46): faccessat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x5, 0x0) r0 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x2f, &(0x7f0000000040)=0x4, 0x4) open(&(0x7f0000000480)='./file0\x00', 0x40000, 0x9a) setsockopt(r0, 0x81b, 0xe46, &(0x7f0000000280)="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", 0x9a) bind$inet6(r0, &(0x7f0000000100)={0x45, 0x1c, 0x0, 0x9, @loopback={0x4}}, 0x1c) getfhat(0xffffffffffffffff, &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x200) open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x11a) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) setfib(0x0) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) shmat(0x0, &(0x7f0000ffc000/0x1000)=nil, 0x2000) fork() munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) sendto$inet6(r0, 0x0, 0x0, 0x20188, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x101, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r1, 0x0, 0xa, &(0x7f0000000140)={0x0, {{0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}}, {{0x10, 0x2, 0x1, @rand_addr=0xfffffffe}}}, 0x108) r2 = accept$inet(r1, &(0x7f0000000080)={0x10, 0x2, 0xffffffffffffffff, @loopback}, &(0x7f00000003c0)=0x10) getsockopt$inet_sctp_SCTP_EXPLICIT_EOR(r2, 0x84, 0x1b, &(0x7f0000000400), &(0x7f0000000440)=0x4) bindat$unix(r1, 0xffffffffffffffff, &(0x7f0000000000)=@file={0xa, 0x1, './file0\x00'}, 0xa) 186.918653ms ago: executing program 1 (id=47): openat$filemon(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) sysarch$I386_SET_LDT(0x1, &(0x7f0000000100)={0x8, 0x0}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_accept_filter(r0, 0xffff, 0x1000, &(0x7f00000001c0)={'accf_dns\x00', "385184ab0389f362d48155260378af075062f1ec8ea733bb86e980a85470e0eae19eac32eccb4e1b38b7437cfb99f7765a2f4ba438967697b4acbdd1a3ef660e53073cce0e37a58c60f3a8141f0a4097022a8a431a83c6943e9dec70d3d3b642d965bd989066843c72fec1a38ba0928072a964012ca3f91804841414b71ac27c0de35ab6802bd138ff3a58e094803cd98bc8d1d18876c69064800cafbc17732635b20b3e7a57ff78f636c791bdc8ae86eacb9cf42f09856958f434eb357f4e160addd50db1d878550fb198d377a9a51b10a08432ff9c3f3027ccb79a7931e054ecb7c2981f052d2e6e9020ced6532c59"}, 0x100) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f0000000080)={0xfffffff8, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2f, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x80000000, 0x0, 0x0, 0xfffffff0, 0x0, 0x0, 0x100000, 0x0, 0x6, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe74, 0x400]}) cpuset_setaffinity(0x3, 0x9, 0x0, 0xcf, &(0x7f00000000c0)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0xfffffffd, @loopback}, 0x1c) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r4, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_TCP_TXTLS_MODE(r2, 0x6, 0x28, &(0x7f0000000000)=0x3, 0x4) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) r5 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r5, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @empty, 0x2}, 0x1c) bind(r5, &(0x7f00000002c0)=@un=@abs={0x8, 0x0, 0x0, 0x0}, 0x8) connect$inet6(r5, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0xa, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x0, 0x3, @loopback, 0x5}}, 0x0, 0x4, 0xffff, 0x315, 0x0, 0x0, 0xff}, 0x98) __specialfd$inotify(0x2, &(0x7f00000000c0)={0x200004}, 0x4) r6 = fcntl$dupfd(r1, 0x0, r1) r7 = socket$inet_sctp(0x2, 0x1, 0x84) listen(r7, 0xfffffff6) rfork(0x85000) read(r6, &(0x7f0000000040)=""/124, 0x7c) 148.12976ms ago: executing program 1 (id=48): r0 = kqueue() select(0x40, &(0x7f0000000000)={0x9, 0x0, 0x1, 0x0, 0x0, 0x800, 0x0, 0x9}, 0x0, 0x0, 0x0) rfork(0x3000) pipe2(&(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) kevent(r0, &(0x7f0000000180)=[{0x7, 0xfffffffffffffffa, 0x75f2f472747d64a5, 0xc0000000, 0x100000000e, 0x885, [0xa14, 0x9, 0x0, 0x40000007]}], 0x1, 0x0, 0x0, 0x0) lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x7}) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) rfork(0x1000) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r2, 0x80047462, &(0x7f00000003c0)) r3 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r3, 0xffff, 0x1014, 0x0, &(0x7f0000000f00)) 97.945442ms ago: executing program 2 (id=49): rfork(0x94000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ksem_init(&(0x7f0000000000)=0x0, 0x0) ksem_getvalue(r1, &(0x7f00000053c0)) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000400)="83e06b4dad60de59a62628ab3e79337707a65060617ad7b899e44c45dd3b95e1ef2cfd6cb0174300110c51ffdad9cc4f7b82169bb78afa362a02fa9a63976edfb2600cee16cb6f4075566d2dd68ea59c1a610cbc9309b57a7fa5cd747df35b1c85ad68d69754c03630a159dbe7e46b669be9b12a", 0x74) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) rfork(0x0) rfork(0x4040) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) seteuid(0xffffffffffffffff) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000000)={0x9, 0x1, 0x0, 0x8}) mprotect(&(0x7f0000705000/0x4000)=nil, 0x4000, 0x5) thr_new(&(0x7f0000000280)={0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x2, 0x4000000000000007, 0x91c]}, 0x39) 28.032087ms ago: executing program 1 (id=50): socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000200)=0x8, 0x4) r2 = socket(0x2, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) connect$inet(r2, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) recvmsg(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f00000030c0)=[{&(0x7f0000001d40)=""/169, 0xa9}], 0x1, 0x0}, 0x40043) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r3, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) madvise(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x4) writev(r1, &(0x7f0000004580)=[{&(0x7f0000004300)="d634b458fd082e2b56da5dfe846f90ffa775a78e992099e5fea099e7e5ac9a", 0x1f}, {&(0x7f0000004340)="8827c39cca08e45befc258949dacf5dc766c9cbe96a84d51aeb60cfb1e2242e11166443e613aaae19209aeee32c6728712567ac8a8196de65c0e70eed56c0dd0342ba811240caae722f2590bd72de0e4670dd007fed58318704c717143b201c7bd7c6b8cbe99d72665793b0fb009c58bb6a741273b128fc961eda1c794a7", 0x7e}, {&(0x7f00000043c0)="d874c52ca2aa24dba8b0fc5373", 0xd}], 0x3) 24.592797ms ago: executing program 1 (id=51): socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f0000000000)=""/255, 0xff, 0x860, 0x0, 0x0) sendto(r1, &(0x7f0000000100)="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", 0x100, 0x100, 0x0, 0x34) __semctl$GETZCNT(0x0, 0x4, 0x7) 24.388619ms ago: executing program 3 (id=52): mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1100, 0x0) (async) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1100, 0x0) open(&(0x7f0000000840)='./file0\x00', 0x80400000000206, 0x0) r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$MDIOCATTACH(r0, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x0, 0x2, &(0x7f0000000040)='./file0\x00', 0x10000, 0x8, 0xa3d, 0x0, 0x0, 0x2, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xfffffffc, 0x0, 0xc, 0x0, 0x0, 0x1000004, 0x0, 0x8, 0x8, 0xfffffffe, 0xd, 0x0, 0x800, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x4, 0x4, 0xe, 0x0, 0x2, 0x0, 0x0, 0xffffffff, 0x6, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x4000000, 0x2, 0xffffffff, 0x2, 0x0, 0x0, 0x8, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x655, 0x0, 0x0, 0x0, 0x0, 0x6, 0x400, 0x2, 0x0, 0x5, 0x0, 0x0, 0x1]}) open(&(0x7f0000000280)='./file0\x00', 0x80000, 0x54) 22.252329ms ago: executing program 0 (id=53): r0 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) r1 = socket(0x26, 0x2, 0x0) setsockopt$inet6_sctp_SCTP_EVENTS(r1, 0x84, 0xc, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000000)=[{0x3, 0xffffffffffffffff, 0xc0c3, 0xc0000000, 0x0, 0x0, [0x8, 0x1ccf, 0x2, 0x9]}], 0x40000c9, 0x0, 0x0, 0x0) close(r0) mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r3, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff5, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0xfff, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x8000, 0xd, 0xa, 0x81, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x9, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x0, 0x8, 0xc, 0x8]}, {0x5c, [0x5, 0x9, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0x0, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x80008, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x6, 0x2, 0x58, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x6, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x800, 0x0, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x538, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1ff, 0x4, 0xc, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000003, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124442, 0x8, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x4, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x6df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x40, 0x225, 0x80, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x5, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0x10000, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0x2, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xfffffffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0xf14, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd1, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x44, 0xfffffff5, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x5, 0xfff, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xfffffff8, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc9, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0x3, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x10000, 0x8, 0xae, 0x7, 0x3, 0x202, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0xfffff801, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x400, 0x5, 0xfffffffc, 0xffffffff, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x8, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x5, 0x4, 0x81, 0x8, 0x2, 0x4, 0x6, 0x1, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x7, 0x8, 0x1ff, 0x7ff, 0xa, 0x0, 0x1, 0x7, 0xc0, 0xf58f, 0x1000, 0x80000000, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x6, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x1a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xfffffffb]}, {0x6, [0x10, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x1, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x6, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x2, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0xa39, 0x0, 0x0, 0x8, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0x1000, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3ff, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x3, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x8, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x5, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0x1, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x3627, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x9, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x4, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x401, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xfc, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0x4, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x0, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0x3, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x0, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff7, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x6, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x2, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x8, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0x10001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x8, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) r5 = socket$inet_tcp(0x2, 0x1, 0x0) r6 = semget$private(0x0, 0x7, 0x3c0) r7 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x40, 0x0) ioctl$BIOCSTSTAMP(r7, 0x80044284, &(0x7f0000000240)=0x3) setrlimit(0x2, &(0x7f0000000300)={0x6, 0x1000000000000000}) sigaction(0x4e, 0xffffffffffffffff, 0x0) semop(r6, &(0x7f00000001c0)=[{0x3, 0x0, 0x1000}, {0x4, 0xfffd}], 0x2) semop(r6, &(0x7f0000000000)=[{0x0, 0xa88, 0x1000}], 0x1) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r5, 0x6, 0x27, &(0x7f00000000c0)={&(0x7f0000000200)='E', &(0x7f0000000080)="139e7482c923b4fae5ec324c", 0x0, 0x19, 0x1, 0xc, 0x0, 0x0, 0x0, 0x3, 0x4, "e14b00"}, 0x40) syz_emit_ethernet(0x46, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) aio_write(0x0) __semctl$GETVAL(r6, 0x3, 0x5) aio_suspend(0x0, 0x0, &(0x7f0000000e40)={0xffffec7b, 0x1c}) fhopen(&(0x7f0000000040)={{[0x6, 0x6]}, {0x1, 0x5, "7a2489b731a1c99b8ecb612d1ab61bbd"}}, 0x100000) thr_self(&(0x7f0000000a40)=0x0) rtprio_thread(0x0, r8, &(0x7f0000000a80)={0x4, 0x18}) connectat(r4, r4, &(0x7f00000000c0)=@in={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) 0s ago: executing program 32 (id=49): rfork(0x94000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ksem_init(&(0x7f0000000000)=0x0, 0x0) ksem_getvalue(r1, &(0x7f00000053c0)) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f0000000400)="83e06b4dad60de59a62628ab3e79337707a65060617ad7b899e44c45dd3b95e1ef2cfd6cb0174300110c51ffdad9cc4f7b82169bb78afa362a02fa9a63976edfb2600cee16cb6f4075566d2dd68ea59c1a610cbc9309b57a7fa5cd747df35b1c85ad68d69754c03630a159dbe7e46b669be9b12a", 0x74) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) rfork(0x0) rfork(0x4040) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) seteuid(0xffffffffffffffff) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000000)={0x9, 0x1, 0x0, 0x8}) mprotect(&(0x7f0000705000/0x4000)=nil, 0x4000, 0x5) thr_new(&(0x7f0000000280)={0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x2, 0x4000000000000007, 0x91c]}, 0x39) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.78' (ED25519) to the list of known hosts. Out of ktrace request objects. SYZFAIL: SIGILL pc-offset:0xffffffff217d4ef1 pc:0xdeadbeef addr:0x0 code=65537 (errno 9: Bad file descriptor) if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: pid 337 (dhclient), jid 0, uid 0: exited on signal 4 (core dumped) pid 743 (getty), jid 0, uid 0: exited on signal 4 (core dumped) set $lines = 0 pid 741 (getty), jid 0, uid 0: exited on signal 4 (core dumped) pid 885 (rtsol), jid 0, uid 0: exited on signal 4 (core dumped) Password:pid 780 (sh), jid 0, uid 0: exited on signal 4 (core dumped) if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 pid 746 (getty), jid 0, uid 0: exited on signal 4 (core dumped) pid 735 (sh), jid 0, uid 0: exited on signal 4 (core dumped) pid 744 (getty), jid 0, uid 0: exited on signal 4 (core dumped) pid 740 (getty), jid 0, uid 0: exited on signal 4 (core dumped) pid 771 (sh), jid 0, uid 0: exited on signal 4 (core dumped) pid 739 (getty), jid 0, uid 0: exited on signal 4 (core dumped) pid 742 (getty), jid 0, uid 0: exited on signal 4 (core dumped) if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 Login incorrect login: show registers Password:if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl login: Password: