last executing test programs: 20.131521466s ago: executing program 3 (id=8): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r1, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffff7d, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x0, 0x0, [0x0, 0x2, 0x3, 0x0, 0x40, 0x0, 0x3ff, 0x6, 0x1, 0x401, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0xe122, 0x8000000, 0x5, 0x42f, 0xfffffffd, 0x0, 0xffffffff, 0x400000, 0xf, 0xfffffffd, 0x0, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x9, 0x0, 0x2000, 0x0, 0xffffffff, 0xfffffffe, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cdd1400, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xae, 0x0, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffffffd, 0xfffffffb]}) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffffff, 0x3, 0x0, 0x8, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, [0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xb32c, 0x4, 0x0, 0x0, 0x1, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe122, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf, 0xfffffffd, 0x0, 0x3ff, 0x11, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffe, 0x3, 0x2, 0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xa, 0x8, 0x1000, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff]}) dup2(r3, 0xffffffffffffffff) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000080)={0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0xfdffff85, [0x0, 0x1, 0x0, 0x4]}) r6 = socket(0x1c, 0x1, 0x0) r7 = semget$private(0x0, 0x7, 0x3c0) syz_emit_ethernet(0x86, &(0x7f0000000500)=ANY=[]) semop(0x0, &(0x7f00000001c0), 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000180)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @ke_flags}}) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r8 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001740)=""/4091, 0xea6}], 0x2000000000000146) __semctl$GETALL(r7, 0x0, 0x6, &(0x7f0000000100)=[0x401, 0x2, 0x3, 0xfff7, 0x5, 0xc]) pwrite(r8, 0x0, 0x0, 0x5) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) preadv(r4, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/14, 0xe}], 0x1, 0x10000) ioctl$BIOCSDIRECTION(r1, 0x80044277, &(0x7f0000000040)=0x1) select(0x40, &(0x7f0000000580)={0x9, 0xfff, 0x6, 0x9, 0xfffffffffffffffb, 0x1, 0xff, 0x5}, 0x0, &(0x7f0000000600)={0x7, 0x5, 0x0, 0xdf2f, 0xab62, 0x3, 0x8, 0x2}, &(0x7f0000000640)={0x6, 0x4}) socket(0x1c, 0x1, 0x0) 18.939565114s ago: executing program 1 (id=42): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0x17, 0x13, 0x10, &(0x7f00000000c0)="ec7b00002cfeff02000000000000007f", 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x8]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r1, 0x80000001, &(0x7f0000000040)="8523e6fae38cc91ff30aa10878b445", 0xf, [0x3], 0x200000000000000, 0x8, 0x8000000, {0x1, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0x6, @spare=[0x6, 0xffffff6f, 0x7, 0x6, 0x401, 0x1, 0x5, 0x10]}}) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') aio_waitcomplete(0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) kqueue() r2 = socket(0x1c, 0x1, 0x0) r3 = socket(0x11, 0x10000000000003, 0x0) sendto$unix(r3, &(0x7f0000000140)="b10005059000e803480308c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a371a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x6e, &(0x7f0000000500)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa88a815008100140086dd6036ea9d00233a0000000000000000000000008000000000fe8000000000000000000000000000aa04019078fffeffff66e7027800060600af7c484adcebf51b6e0e67010c6c47deff020000000000000000000000000001b47138e9c8bf517205b92c07125114"]) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) kevent(0xffffffffffffffff, &(0x7f0000000040), 0x492492492492800, 0x0, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) sendmsg$inet6_sctp(0xffffffffffffffff, 0x0, 0x0) r4 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r4, &(0x7f0000000080)=[{&(0x7f0000000340)='wb', 0x2}], 0x1, 0x0) r5 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r5, 0x0) open$dir(0x0, 0x40000400000002c2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) getpeername(r1, &(0x7f0000000380)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, &(0x7f0000000300)=0xffffff95) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) ppoll(&(0x7f00000000c0), 0x0, 0x0, 0x0, 0x0) shmget(0x3, 0x3000, 0x28, &(0x7f0000ffa000/0x3000)=nil) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r6, 0x29, 0x23, &(0x7f0000000880)=ANY=[@ANYBLOB="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"], 0x1d8) 18.372162974s ago: executing program 3 (id=8): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r1, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffff7d, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x0, 0x0, [0x0, 0x2, 0x3, 0x0, 0x40, 0x0, 0x3ff, 0x6, 0x1, 0x401, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0xe122, 0x8000000, 0x5, 0x42f, 0xfffffffd, 0x0, 0xffffffff, 0x400000, 0xf, 0xfffffffd, 0x0, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x9, 0x0, 0x2000, 0x0, 0xffffffff, 0xfffffffe, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cdd1400, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xae, 0x0, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffffffd, 0xfffffffb]}) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffffff, 0x3, 0x0, 0x8, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, [0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xb32c, 0x4, 0x0, 0x0, 0x1, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe122, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf, 0xfffffffd, 0x0, 0x3ff, 0x11, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffe, 0x3, 0x2, 0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xa, 0x8, 0x1000, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff]}) dup2(r3, 0xffffffffffffffff) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000080)={0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0xfdffff85, [0x0, 0x1, 0x0, 0x4]}) r6 = socket(0x1c, 0x1, 0x0) r7 = semget$private(0x0, 0x7, 0x3c0) syz_emit_ethernet(0x86, &(0x7f0000000500)=ANY=[]) semop(0x0, &(0x7f00000001c0), 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000180)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @ke_flags}}) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r8 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001740)=""/4091, 0xea6}], 0x2000000000000146) __semctl$GETALL(r7, 0x0, 0x6, &(0x7f0000000100)=[0x401, 0x2, 0x3, 0xfff7, 0x5, 0xc]) pwrite(r8, 0x0, 0x0, 0x5) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) preadv(r4, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/14, 0xe}], 0x1, 0x10000) ioctl$BIOCSDIRECTION(r1, 0x80044277, &(0x7f0000000040)=0x1) select(0x40, &(0x7f0000000580)={0x9, 0xfff, 0x6, 0x9, 0xfffffffffffffffb, 0x1, 0xff, 0x5}, 0x0, &(0x7f0000000600)={0x7, 0x5, 0x0, 0xdf2f, 0xab62, 0x3, 0x8, 0x2}, &(0x7f0000000640)={0x6, 0x4}) socket(0x1c, 0x1, 0x0) 17.059182426s ago: executing program 1 (id=46): r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) clock_getres(0x5, &(0x7f000000ab40)) setsockopt$inet6_int(r0, 0x29, 0x3f, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) getsockopt$inet6_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x5}, &(0x7f0000000080)=0x8) fork() wait4(0x0, 0x0, 0x4, 0x0) r1 = open$dir(&(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x10000, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, r1, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) read(r2, &(0x7f0000000080), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, 0xba) r3 = socket(0x1, 0x1, 0xfb) rfork(0x85000) openat$smbus(0xffffff9c, 0x0, 0x400000, 0x0) connect$inet(r3, 0x0, 0x0) socket(0x1c, 0x1, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000280), 0x1, 0x0) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) rfork(0x4000) faccessat(r1, &(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2, 0x200) r4 = socket(0x1c, 0x1, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f00000000c0)={0x15, 0x1d, 0x96, &(0x7f0000000580)="ec7b000009f2ff2425c11ca58b5100985325435ae9db1cb53ccc21f5416c7944eb6d366eaca9f020e0280eb7f88b1498a4c58974aaa9359977e876d54ac81f49accf466191c6ce42c1e58638907f9d74602b292fdd472eb4064c52a045e53e8a65914ff514a264e10c410304d5e77a5757a1153d36923f6e7af65bbff08a15c2a4f731706da7cd1986de3c8d317dc6cbe21c158ca791", 0x0, 0x0, 0x5, 0xfdffff84, [0xffffffea, 0x0, 0x0, 0x9]}) r5 = msgget$private(0x0, 0x790) r6 = openat$ptmx(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$DIOCNATLOOK(r6, 0xc04c4417, &(0x7f00000018c0)="f4febca985a524c09fce734c647faac456e7630877b8267451ddd602a72f6b7b8afb10210d4a2c455cfe224940e2d7619f745e83030ea7410c8983db7b942dcb3904edd967b2df9f4b341ad2afb47dafdcb2952bf34f751f6706e23c53af857d4e3dc1bf06b0224bcba0aebf76c3cb2b947d3c27311efc5531803e3e2ee9e485ba35dba82f842a7c39d0b820909bc6cb48dc9b01deb5552ee1b5899582dcbaf661e37a2a690b7739fb562c4c68ccb392aa53f107844e366ced911b156497e65f1ed05a4e7a370c9a84edfabf086203cd5ece2000bd0f644d0eee3b3be8857f33ea2cff67ac3501027c81dc4f766ebe5fdbad509863f18b9319fb8dc2ff37b770426d2cccae8a9be9a6f0cbed988df8026bceee0dfb0a7882511299eaaf77d638de4a2b1844e120155894f3a69b2ea937013264fd425373f90e13081dfa58c38691e7758af9ce67106be63d81f4d583f88782b6fc9ac3eb762ee6c6dec798bc2e2318f48269441048f7c8eea7415313dce889f11aed351866357da0ccf37b5b18e75e78d0065326352ae88533bbae5869f03c95e8bede9d56f15cabe228aedfbe6be31981dc80bc9178bfd8eacc53c3a45575f9c793c43da2a025dd968979ceba2a24c757ad4cf659f9ced2d4a56909a711af10309d0ec2d7de0d514d509aabc80fac2d538180f3f646f0f6bea0c9d643190d49774c89f9b71408787887ca0b9acc6c2a1739509e81146fd555b477302501b08b68bc742da83a7fe19a9515ba7da2fa2cb7cda103d96d11e93a50d0aec4f953cc237a65ee0cc0196e1a12d2bcdbdca8f366a26c5714ac75270ac24553bfba0e3b16525ae4c6f586863b7f9a7177f6432b3ba2be838b45a1332b5e715d121686206b3a8fb96126cecb95d7accf9ed8f8abff65197a746557c6e0aecbdcfa8d45e17bdeae9433bfadc301c7e979916dde15fc9b9d7ee88b0b2f5a97a65ebb70000e0dd152a023975bfc2c9952d012e117340077b51008434fe5535955a56338674cf976a9a127da370d01bd89efc3dced573fb5c78afca8972de2e81666f3a4abad0c09d6aed4abcf86789b5bc038269337b382c3c2f50e4055e1453b5cb6edbe73ae656fbd8c132f853aed9bd74ff65bfe059fc90eb195353fe9fd98e2184bc2fbeac731ef12c7a84dd2c0d00398f1f8ba79587c686b8e9c68e588d13298882d4156572eff70103938264179b6952ce7dae9a0ee448ab6c1741fc8779cdc46e45127461a41d59ddf8ce2a235aa3b5c429f654c5ba512f6197467c380e4d0d03cf5ee53d81389876e75c13872516ee102cfda4a46be0019fd2fb7d64be1001423dbb0bf8614accf52eaf6f353d581d465827752e19a98ec85023d7fad2eb99bd3322135901c4585e41bd8ceb56e8cc1b037534c9cdecb0f606ac9af16f2e00072d5161e521e7b5953795691c8d5d1d6be2d8a8dc568279484ba52cc5eff15ad205bcb78bf66631aebd7de5a13f587dab51621fa5cc9b65be5032aa4f643e8fe068c9b1362a0edbfe7828f83a861f2c479157c6aba283503bd67ee9c97131ca53b70060351347c740715f0af936bff04b2447aa7f6b013e0e68fed9e719fb745b74f975ece967e0a985b093482f43ed7739c1ec949f3aee78719ddb250f9a38f28651aca3b68652b64338639805bc179c4a2985aaaedc0feaf7837078c310c7d1d1822352e0db486a038ae5148c3d7433f5f7d6f43125a4e027d48675065eb08f5d0bd070b43c166b71bdaea4f4c07b146d3973baf04829d4cc5caa3abaffbd1a32c1601e1d09e79d36132b228a860be166e70b49d3baa8788ae10fcef8446d1e5cbfedc2de8008290b054a59d70e12de220d38188c8a9b2ff3e3034ff762dee27ae8cca9b84a3ee68e7c1b393ba1fd5564641639e5f4984ecc96ba6e99c069d72851e53198fd405893602495ccf3ab0ddeff3cac54642bdc9e85a2b0c4959bd7860aaea6482c34365207d8875c0951244bcee616c802cb3498159a1169b4001d25d6350b85cba573459d9adb6e8eb9c49a2bd9732a6f6029449bc586b18e4eeba1afac7591bfdf937d6bab1bd225df35806b91079b9c475fabf0126ee2509bc9566a597b019af39dae5207d118bc22da75a1c18ac1e39dada1fde5bcf201d43a734266f4f388cf0130efe3cf51991fea17e765cbfe1e99ca88b387e9328bc849ac62df7c8490bfc717ea163d17058ab545c1ee077c5d48685ce3001d3560cb45f0456639ecd4e8eced70de6a38c38de257afb29a9669403593196d7a673ba91ab6c65948219b89cfd425a337cbb72c4cbfc12e3bb402458bfdb036149727d5a0ca967b23029612d94a8436e2093240ed3995a06b31bdda9468fc473cb5ebf9b9ee0d05001593f1336d90501030960b9164fc81e79ee5f78bf22f571c0d28e260c50a50ecbaf1afe1884f94fc36a1d973235c2f0776dfbe38924742b5074681442ef6587a7f8c35cd103f4841b2dfc7d59b32fef8b5f003753b7977177b41beb93c125578012499e0e61585fb79099e1e63f8fd15c0f373b684a158b6d0197ae16c3b4a56a74678ad457dc80416b6cfbe41736710923980d7abae6f1c9bd784d7b11642a23382c8ca15fb9804edb085288f63f0668206b9b53987bb9969e5ddb0a3b7bdcf947df67658be4bf7f0631d1001b2002cf2ca1414a0e3f4ab7c38c5890c9d840ccbbc2b5091480a0d22a9f5f7bdf2aef7bdadc606cc5dd43e44e814bbd6063f68a570945900842572eeb3315e2e0446eaf4bde2bdda280ef9d09a7d23e35a2e1ae4df3e8aec26c5140fb836c15ff1b6b550d6de3e672b005991c2895f8dc1f27723bb0600406adeaece587acd13150d207d3ac0dde2aa50b1f5b2ecfdabc04e84c46b634902d644d5a6250648d505858fe7715dde8cbb9c4789b7f54fce107e8ec5a096e1223fbd2adcaf5efb5d0d42d5e2fea624ad67dcba64b2801628aafe68ab95c72f29a37f77d8beb20a8982911485d1307ab80ba89a06b1eb087ae668e3ff4107ea951d470d3279cff5a81983bbde3e388f29d0977e73b8bcc982d12e94bda2912bfeb7210ba106ee1b4aea94f06a04147843a1654f7dedffe63d143c8bdc968aa387aab80cf1d2ca6c5b88a0c5c1e5b627727dfe9cae87dde824774c68868e7db6e38d6fcaa10ce72cf51195d22d3a6b3c4b123b5c3bd558f157cb24b94b63a018c2ae1d198be2bfc2e53e2d34250e4f7f0c87a7948ac81268da181522b46e7e2e7e32ca8147f14451ea2db7ed6acbe7657869e2520e8895db5325f240718762d62e11a7d2f9533b18abed27f55e73e9293874e4c4715df37de1a577b26218bbb653e5a99f8a2c881b5927a3a458af0af2a8a0bafac98767ee2cdf0aa2391fb216804df721a3a4c05f0167fc39e763079c9bedc42726ad6b3c20e2602af256eb8dfcf1e4be254376fe3ce9f1b0ce3e8a3cca5dd3bcd335eeaf219d9cd88322de3a73dba642f003167f5a3d8abe82864bc43b433411f2cf937e2419484543c86c0ee5be65feffcba7dfaa34944f329a932e9ad828dbf37685e3ca892e519e488b0c84552f6e0631dd16e3f6c2d267117a6c7696dc61f1909e85d92496d2a4b9675ff3320a8647cc16306d110319d0a72c58567d2cab1bb52537ac18489cbca956d38c3d8de20a3549f5dd09db43174fc5da013e7b499582a2b8ea9e544ba0648429940713b31cec2b0692fec5e4fd22f6ae60b4a7af42672a23dba7ac680fcbf81dc8fd86512fdfd04ce3b25ef22396fe3ed21c9580d998e48e6f7ff6c1da7e5439cc5918a0c67598b83963c84329987b98f5d9ac4960b5599fa93b429d56956db3e049d5ac7b85306831c2a212a9b39d96362c75acf4eb0b9165c3217a0f9a70e0e18250669bc2b53b87a7d526838c4785ef8d3cd9a7bc952ab0d8c951e1c3c691e5bbe3d9e2e181d0de6f898865a2c0ceade9a49d5bf6281a3b2082af78e1c502173e93ce34bc0cfa1e79fa68c85ae0d9cdf1ceb91e25b44ab7b97989a85e5e0fe5b647dda802d22a4931ea65c727e5a1e5c799c9c76326a1c0f1c326b6b76898781e47f72c554597e717c27959ffd390b14b9bae8b2f55051ea8218a536b5164e13b45efa096b9145183851733e7217087bb4f84e9b5ab3362d5f2d079967d2c5079ef9ed414b1806b97655545b3a78caeb11d9a0ec9f38a6db1262a6bd55edf8e9f693675e8c0b2c74cdfab3c51980654ab449f33e3636d374c74eb226bda2dd43d4e1941c54a0d0961fd08dd07270cdea5a97713f70ee61df7d2c77d7f1a4487c43b622d2ebac214a29997907c0090ffc978c71fc190b36e6b380cbb33dd34aa542ca49072758247b5df0535b4a5f0454b50868dc82a210366cf4e212469c69823e0ce84b6055e7f4bf8bc243b8cf8e80e924b443de69ca3679378be52246a0715259ffba47a1aa883d42a483123df2f44703997baeb1ecc8dea7732b14fc6c2cbd1e36a916fc21621c1f2217fc3a7e20dd66194c5ce652c9a2041c08acaadae05ad59ca33bb884d4e290a104f607e5acbc3851186cd9c2ecfd305b9c9ed4b83c2743a8639c0868933a6134d6283cf94263ebbad901cac6a63a4ef67347f60f3db0c647f1420571f863ea872209aac4a79be27a23653b97d0023c7773130f365e7567ffcbcbf3859e64afc6fe908002e341d9c1786ce53fd573fe02d0e2fe0dac565e45c4029c276008de1b058ca13511001219f9c03db45692feeafa695878295b1ec594303b1c8e88d42ca78aa4953c50d987b19e0c62748adea7feadd62b4cbe8752cc60ec50c2cfff92b7f20c243aba2719623beb53b2b334d1c0d334b0db302b4f594b4f998b6e6a2c2238b1db88174e0091edc177b9fbb6a508f8fa95e29db7e6476f017a7170ff769b62ca06537df74ccf0d57c7a0074efc188d7d89c92b2efda572eb4a3e1392d059d5a9e872f60ff69db3eef3eaacdf98eaec764fada05df5266b46e2fef8ad8d688a4f71c436fe62a2a47933d0256b83eef4cfb163a08923c63c6cf40e265698b2ebdefb473815539e0372cf97000b6d1cec886af976a8374d8398590dcf27c31c504748c2f64a9d7cfad611efaebb04d8a76ae40af3942e6d9a91d4d32720ce5d6b3643d2c1cd5e3583921a9abaffab1e4cd321d8f272ab735ebf568c0d03e56708bcd2c3d92f836bd797d303429ab3d08b3db26705042e40ba5f66b1a2068f1c20d88965e49907d1fc5c85057f507d73bfa2331995009a60e7d5b63644bdfa5dd8877b7f0652fbc5b13938f3a8fbe498e1023b59ad7cb19471b7e004e3abd10f568071d1cdc5aaac575eb429e587bee45542d5a6902db90c99d4500f0acff794246b972c13baaa510cbd10850214b63913652fcb9ad3a29e5a284d1560c77079f6d97b6e9bf1a2909ffe58f23f81f33686a41a228ae079f0a76b0609f935e19558e5cacee530823817493f945bc59a0a126085f9883d3bdf816ccf74d936dd0e826c1280ec6eb894a83161d6109e94e26ca195b93ac0982a2909307f4981fe3c9f4eb662b1b3ea17589e95ca8a10d3c766166929221ef38608fff8dbe15ea04071c14fb27a1efeef7e6eb6f9af8d00f9759801e484a92e380d18ea0edaacf8081754de84f31db1396c4a494014ebbca73404d43906591e5cb101fc07f33bb3d6a5063df680c6dfec7fc56a9338b46ba543075ca2fd1c1ef6fbf0ea229412a9f69531caedf491bea7ce108d4bc6afd7f08fba4d35e4f9021953872e808479af180419b8acc2e7a2b0f521c954645de0fef680a3a79d9997147c") msgsnd(r5, 0x0, 0x401, 0x0) msgsnd(r5, &(0x7f0000001700)=ANY=[@ANYBLOB="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"], 0x88, 0x800) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 16.680283759s ago: executing program 3 (id=8): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r1, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffff7d, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x0, 0x0, [0x0, 0x2, 0x3, 0x0, 0x40, 0x0, 0x3ff, 0x6, 0x1, 0x401, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0xe122, 0x8000000, 0x5, 0x42f, 0xfffffffd, 0x0, 0xffffffff, 0x400000, 0xf, 0xfffffffd, 0x0, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x9, 0x0, 0x2000, 0x0, 0xffffffff, 0xfffffffe, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cdd1400, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xae, 0x0, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffffffd, 0xfffffffb]}) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffffff, 0x3, 0x0, 0x8, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, [0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xb32c, 0x4, 0x0, 0x0, 0x1, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe122, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf, 0xfffffffd, 0x0, 0x3ff, 0x11, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffe, 0x3, 0x2, 0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xa, 0x8, 0x1000, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff]}) dup2(r3, 0xffffffffffffffff) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000080)={0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0xfdffff85, [0x0, 0x1, 0x0, 0x4]}) r6 = socket(0x1c, 0x1, 0x0) r7 = semget$private(0x0, 0x7, 0x3c0) syz_emit_ethernet(0x86, &(0x7f0000000500)=ANY=[]) semop(0x0, &(0x7f00000001c0), 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000180)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @ke_flags}}) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r8 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001740)=""/4091, 0xea6}], 0x2000000000000146) __semctl$GETALL(r7, 0x0, 0x6, &(0x7f0000000100)=[0x401, 0x2, 0x3, 0xfff7, 0x5, 0xc]) pwrite(r8, 0x0, 0x0, 0x5) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) preadv(r4, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/14, 0xe}], 0x1, 0x10000) ioctl$BIOCSDIRECTION(r1, 0x80044277, &(0x7f0000000040)=0x1) select(0x40, &(0x7f0000000580)={0x9, 0xfff, 0x6, 0x9, 0xfffffffffffffffb, 0x1, 0xff, 0x5}, 0x0, &(0x7f0000000600)={0x7, 0x5, 0x0, 0xdf2f, 0xab62, 0x3, 0x8, 0x2}, &(0x7f0000000640)={0x6, 0x4}) socket(0x1c, 0x1, 0x0) 15.308194727s ago: executing program 1 (id=49): pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) r2 = openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000d80)={0x1, 0x20, @sigval_ptr=0xe, @spare=[0x4005, 0x5, 0x6, 0x5, 0x8, 0x7, 0xfd926ff, 0x9]}) ioctl$BIOCGETBUFMODE(r2, 0x4004427d, &(0x7f0000000200)) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) ioctl$BIOCSRSIG(r2, 0x80044273, &(0x7f0000000100)=0xf6ad) r5 = semget$private(0x0, 0x1, 0x1) __semctl$GETPID(r5, 0x2, 0x4) r6 = socket(0x91ae9151d9abd3c9, 0x20000000, 0x4) socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) syz_emit_ethernet(0x0, 0x0) setsockopt$sock_splice(r0, 0xffff, 0x1023, &(0x7f0000000040)={r6, 0x8, {0xab2, 0x3ff}}, 0x14) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r7 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r7, &(0x7f00000004c0)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3, 0x3, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2b0d}, 0x1c, &(0x7f0000000240)=[{&(0x7f00000002c0)="a1102dbe38d27c1974a9be59ee79fcf728254fe15e370d12fb6c906e7063769553623a31755e107eb69a7ce9695d6941a5c846565ca03bdb4f0801b787acd5042c4ca6654fb65a21adfecbf75c15a30d32dfef7c38d9aa2a7d0f98e5864a1ef3cbcafba1451090225c3267f7cbe1f3fcb5fba9b7a67dd4b3735f509d0ef4", 0x7e}, {&(0x7f0000000340)="f01f8f2549230a4f25c9debfb6cdc6d53279458c4f62fb6add15deb6aa5b8fbaa28d67d8a23bf946d70a513dad23e34b0ca63fbe37f0b93481433e3e8a9ec9a9b5c0d4996fdb65752b8bdbdc8a723cafa3e2bc40c786068da7e7e60c5f189c3fdabcc5d36012ff8252b0008e1f65217527cb5c577fd5d788c8399e6079c216b0784fc03872029d817f35e40f7d86b1022c2d630ff6f8a8959902d0b5bcaf5407aba2dbde5f1b98c85b91", 0xaa}, {&(0x7f0000000400)="837a64cb43b7cce49769ec5458c026ef4fbd38f27b4f4fa90caaf89c3839146ba4aafc96acde18c7a7b870e98280c3f0dbf0d0d5c54f9f671d698795d11aa1caa6775dc6f87551d3719d3c7249239ec324322d5299c9", 0x56}, {0x0}], 0x4, 0x0, 0x0, 0x149}, 0x239cc2853cea1ba9) writev(r7, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) __cap_rights_get(0x0, r8, 0x0) syz_emit_ethernet(0xb4, &(0x7f0000000700)=ANY=[@ANYBLOB="aa4c4662c957ff0effffffff0800450000a678680000010200000100020000427b00040064000724131f011affffffe0000001071f06ac1400b27f573501ff0200000000000000ff09000000470001014428014e21d29fb80d18158a38ef0a964c45155e167f836d787640c1f023789c3f3a01000000060000000000fdff000000000000000800ac1400bb000000454420e041400000e0ffffff0500000000000000007f00400144aa00c600001683c2271135becd093e0650"]) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) sendmsg(r1, &(0x7f0000000600)={&(0x7f0000000280)=@in6={0x1c, 0x1c, 0x0, 0x3, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c, 0x0, 0x0, 0x0}, 0x1) 14.810156232s ago: executing program 3 (id=8): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r1, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffff7d, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x0, 0x0, [0x0, 0x2, 0x3, 0x0, 0x40, 0x0, 0x3ff, 0x6, 0x1, 0x401, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0xe122, 0x8000000, 0x5, 0x42f, 0xfffffffd, 0x0, 0xffffffff, 0x400000, 0xf, 0xfffffffd, 0x0, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x9, 0x0, 0x2000, 0x0, 0xffffffff, 0xfffffffe, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cdd1400, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xae, 0x0, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffffffd, 0xfffffffb]}) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffffff, 0x3, 0x0, 0x8, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, [0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xb32c, 0x4, 0x0, 0x0, 0x1, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe122, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf, 0xfffffffd, 0x0, 0x3ff, 0x11, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffe, 0x3, 0x2, 0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xa, 0x8, 0x1000, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff]}) dup2(r3, 0xffffffffffffffff) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000080)={0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0xfdffff85, [0x0, 0x1, 0x0, 0x4]}) r6 = socket(0x1c, 0x1, 0x0) r7 = semget$private(0x0, 0x7, 0x3c0) syz_emit_ethernet(0x86, &(0x7f0000000500)=ANY=[]) semop(0x0, &(0x7f00000001c0), 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000180)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @ke_flags}}) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r8 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001740)=""/4091, 0xea6}], 0x2000000000000146) __semctl$GETALL(r7, 0x0, 0x6, &(0x7f0000000100)=[0x401, 0x2, 0x3, 0xfff7, 0x5, 0xc]) pwrite(r8, 0x0, 0x0, 0x5) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) preadv(r4, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/14, 0xe}], 0x1, 0x10000) ioctl$BIOCSDIRECTION(r1, 0x80044277, &(0x7f0000000040)=0x1) select(0x40, &(0x7f0000000580)={0x9, 0xfff, 0x6, 0x9, 0xfffffffffffffffb, 0x1, 0xff, 0x5}, 0x0, &(0x7f0000000600)={0x7, 0x5, 0x0, 0xdf2f, 0xab62, 0x3, 0x8, 0x2}, &(0x7f0000000640)={0x6, 0x4}) socket(0x1c, 0x1, 0x0) 13.2702275s ago: executing program 1 (id=54): aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) r0 = socket(0x2, 0x3, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000080)=@in={0x10, 0x2, 0x1, @broadcast}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x20184) openat$kbd(0xffffff9c, &(0x7f0000000040), 0x200000, 0x0) r1 = openat$kbd(0xffffff9c, &(0x7f0000000100), 0x400, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x9a25) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, 0x0, 0x0) bind$inet(r2, 0x0, 0x45) r3 = socket$inet(0x2, 0x2, 0x0) bind$inet(r3, 0x0, 0x0) ioctl$KDSETREPEAT(r1, 0x80084b66, &(0x7f00000000c0)={[0xd44, 0xb]}) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) 12.786762405s ago: executing program 3 (id=8): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r1, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffff7d, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x0, 0x0, [0x0, 0x2, 0x3, 0x0, 0x40, 0x0, 0x3ff, 0x6, 0x1, 0x401, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0xe122, 0x8000000, 0x5, 0x42f, 0xfffffffd, 0x0, 0xffffffff, 0x400000, 0xf, 0xfffffffd, 0x0, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x9, 0x0, 0x2000, 0x0, 0xffffffff, 0xfffffffe, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cdd1400, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xae, 0x0, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffffffd, 0xfffffffb]}) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffffff, 0x3, 0x0, 0x8, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, [0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xb32c, 0x4, 0x0, 0x0, 0x1, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe122, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf, 0xfffffffd, 0x0, 0x3ff, 0x11, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffe, 0x3, 0x2, 0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xa, 0x8, 0x1000, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff]}) dup2(r3, 0xffffffffffffffff) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000080)={0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0xfdffff85, [0x0, 0x1, 0x0, 0x4]}) r6 = socket(0x1c, 0x1, 0x0) r7 = semget$private(0x0, 0x7, 0x3c0) syz_emit_ethernet(0x86, &(0x7f0000000500)=ANY=[]) semop(0x0, &(0x7f00000001c0), 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000180)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @ke_flags}}) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r8 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001740)=""/4091, 0xea6}], 0x2000000000000146) __semctl$GETALL(r7, 0x0, 0x6, &(0x7f0000000100)=[0x401, 0x2, 0x3, 0xfff7, 0x5, 0xc]) pwrite(r8, 0x0, 0x0, 0x5) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) preadv(r4, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/14, 0xe}], 0x1, 0x10000) ioctl$BIOCSDIRECTION(r1, 0x80044277, &(0x7f0000000040)=0x1) select(0x40, &(0x7f0000000580)={0x9, 0xfff, 0x6, 0x9, 0xfffffffffffffffb, 0x1, 0xff, 0x5}, 0x0, &(0x7f0000000600)={0x7, 0x5, 0x0, 0xdf2f, 0xab62, 0x3, 0x8, 0x2}, &(0x7f0000000640)={0x6, 0x4}) socket(0x1c, 0x1, 0x0) 11.228938834s ago: executing program 1 (id=58): syz_emit_ethernet(0x66, &(0x7f00000009c0)=ANY=[@ANYBLOB="ffffffffffff00000000000086dd60fc0fc30030000046eca5d95f9d4ba80802bde681b7bc85fe8000000000000000000000000000aa3a000000000000008900907800000000ff01000000000000000000000000000100000000000202000000000000000001d0825688cd83adc76670f77626e0e292a5619c493efce0987c9f0c8fef9380e4c83078811977d696a0328f55b5ae920c5d21c87f582eeff5438304ffc5060b075f87226280d029b99efce0ecc842ff8e697e3127dec248cfc0fee314895c558d34bbcf68364c861b8c50a333fb4fc270d9b38c8611ad3dce356f69bf296c29"]) syz_emit_ethernet(0x106, &(0x7f0000000ac0)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000000000008808eb2a47cddb4155b250d569538ebd9e14e8929f858631aebf57b8a8cb70d3d969c3d3c5995c7a0b3347e0317dbf6d61a83c65f76e16d2400b0bc2f6ef29773156cb28b9485693ec8192c7f01dfd43a88843186f7adc4007e89fd62525bea87cf1c66b173d2e853d720329db3522f1f4a96e355d2d4d70c3919cb89225e09b7a4ed4309c7e23ab5628f58c7372e66d65caf1a75685304fdbded3ab275bb2722d135c39762785b64be35644e164560f0e62f79ed306f90c305aadf3d6edb35473d2da718ae60800000024c46f9622d7254bb01b5e42eadd92de0286cf1fbd4517d8f0bc0af77ff60f32b086d8a1e9cb74a285af1dae1fbe9b606fceee138a595010a5c6e01d068fe06ecc87cdd1faf37035420d8868668ed02a2babcfaf93cc19d4723f6d59536bcefb04268c1c0721bca2ba9825a15b745d6a"]) r0 = socket$unix(0x1, 0x2, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc00, 0x105) extattr_get_link(&(0x7f0000000040)='./file0\x00', 0x3, &(0x7f0000000100)='$*\x00', 0x0, 0x0) freebsd11_mknod(&(0x7f0000000980)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x672cda28f543e327, 0x0) getfh(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) aio_write(&(0x7f0000001b00)={r0, 0x80000001, &(0x7f0000000240)="526f4da8df81ab2125b8c000e2", 0xd, [0x40000, 0x1ff], 0x0, 0x4, 0xfffffffe, {0x0, 0x4, 0x0}, {0x0, 0x4000, @sigval_ptr=0x3, @spare=[0x4, 0x2, 0x0, 0x33518c07, 0xdca6, 0x8, 0xfffffffd, 0x51c4927]}}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) aio_waitcomplete(0x0, 0x0) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x8000, 0x0) ioctl$BIOCLOCK(r1, 0x2000427a) fork() setreuid(0xee00, 0x0) ioctl$BIOCLOCK(r1, 0x2000427a) socket(0x1c, 0x1, 0x0) r2 = open(&(0x7f0000000280)='./file0\x00', 0x8aa0, 0x31) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0xb1c, 0x0) sendmsg$inet_sctp(r2, &(0x7f0000000140)={&(0x7f0000000400)=@in6={0x1c, 0x1c, 0x3, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x4d}, 0x20000) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f00000000c0)={0x15, 0x22, 0xf6, &(0x7f0000000440)="008093564ae813bf3743dd9fc3bc944543b79cd0a5ff1e050000000000000000000033de8c50b100000000fefa314be9d8d0c2ec7ca1724036aed7779bebc4dd76d98fb2e3e51f979ef83577119377657d8d05142a0fbdfd4902e1b507d61b7eddbffcda6e1b3f6cfe9ea7f82d005dc17621c033157e8a0d40773370c98506f5d96556823dc3994e1bb7173e600b5bb8486928ac77911c3c1a4baa49d39301e54593fbdcbc8900379ad05acca5f688b51ccab95bc62f5ae0653a7008edec480de39779da58cda63fb0212c618167abc49abb0ccd30d20f6c8fdc41051d8f4d23b68226b9101833cffb8b9c2b39bec67dafa55c8c4411", 0x0, 0x0, 0x8, 0x4, [0x2, 0x4, 0x3ff]}) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd0) r4 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockopt$inet6_buf(r4, 0x29, 0x3f, 0x0, &(0x7f0000000100)) truncate(0x0, 0xaa480) ioctl$DIOCRDELTABLES(r2, 0xc44c443e, &(0x7f0000000540)={{"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", "48634d6579fac00d98a6e0c7081a37ada8ff4340cbd1aef096d494a552a636af", 0x3, 0x3}, &(0x7f00000002c0)="2bd4be35af23ca40d83bb027c56d6ee3d069c153c7a354d62c3498b76cec0246b22b73b30afe034639015113087748809f1eddbe30b9c257534df89fcceb29a6abe6d714f7743fcd57df81d29408d57457b353ec6924de3cd6c1e495f1679c594959ef33cc2071440d924a9222d1bda94f85f6941aee01c11ccc5c8752a28130fbc60b3459ca010ca0d5b35e3ea4a9d772f16d2b5a4907f730010c4177b2ba3f1d743cc920953ad5842a8eadcb8ac948c1b90ed1e468851965dcb68c1dee3a4a1f93e3535dc261dffa679021e546a2cb", 0x7, 0x9, 0xfffffffffffffff7, 0x81, 0x8000, 0xfffffffffffffff8, 0xf6, 0x5}) r5 = openat$bpf(0xffffff9c, &(0x7f0000000180), 0x40, 0x0) ioctl$BIOCLOCK(r5, 0x2000427a) r6 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r6, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) 11.009981616s ago: executing program 1 (id=60): aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) r0 = socket(0x1c, 0x1, 0x0) (async) r1 = open(0x0, 0x80000000000209, 0xfffffffffffffffc) sysarch$I386_SET_LDT(0x1, &(0x7f0000000700)={0x2, &(0x7f00000003c0)=[{0x10001}, {0x2}, {0xfffffffffffffff5}, {0x3ff}, {0x10001}], 0x5}) (async) ftruncate(r1, 0x100000) (async) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) (async) sendmsg$inet_sctp(r0, 0x0, 0x0) (async) aio_return(0x0) (async) getsockopt$inet6_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f0000000440)={r2, 0x9, 0x0, 0x4112, 0x4}, &(0x7f0000000100)=0x18) (async) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$md(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MDIOCATTACH(r3, 0xc1b46d00, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x5, 0x1, 0x4, 0x0, 0xc00, 0x3a632ebe, 0x0, [0x1, 0x2, 0x0, 0x0, 0x0, 0x800000, 0x2000, 0x0, 0x4000, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x430, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000001, 0x0, 0xfffffffc, 0x10000, 0x0, 0x0, 0x0, 0xe467, 0x1ff, 0x0, 0x8, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4000, 0x0, 0x0, 0x4, 0x0, 0x73b849a, 0x0, 0xfffffffe, 0x4000, 0x0, 0x1, 0xfffffffc, 0x0, 0xffffffff, 0x0, 0x0, 0x7, 0x6, 0x0, 0x62c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) (async) rtprio(0x1, 0x0, &(0x7f0000000140)={0x2, 0x5}) (async) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, &(0x7f00000004c0)={0x8, 0x3, 0x7, 0x8, 0x0, 0x0, &(0x7f0000000380)="cb53d53efe29b13dc3bc9f1e8c87", 0x0}) (async) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x10, &(0x7f0000000100)="ec7b0000000000000001f0a5a2519798", 0x0, 0x0, 0x0, 0xfdf9ff85, [0x0, 0x1, 0x20000]}) (async) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000580)={r2, 0x89, "f88f14bb219a5f537ea30e89f6a64c9f999d71a738f586caaf1caf1227cf9e30eedb45215068d156825f15669ab95278bc8d8502bc919fb0c963a9c6c956d43d8b45feb929dad00fcd21f1ae4b036597ae91f56f1d10d3b3ded8a11b58e96ccca91d8ba5bae3798071e10535d5fc1bf2561c81e65543ef802f8e9f5468ab066d61a88f5b1e1cc07a54"}, &(0x7f0000000400)=0x91) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r6 = fcntl$dupfd(r5, 0x11, r5) ioctl$KDGKBTYPE(r6, 0x40044b40, 0x9) (async) ioctl$SMB_READB(r5, 0xc020697a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) (async) socket(0x1c, 0x1, 0x0) ktimer_create(0x4, 0x0, &(0x7f00000001c0)=0x0) ktimer_settime(r7, 0x0, &(0x7f0000000200)={{0x1}, {0x1, 0x2a21}}, 0x0) (async) syz_emit_ethernet(0x42, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaace624d0000340800000000000000ffffffffac1400aa831f0b000000087f00000100000000ac1400aa7f000001ac1400aa0000000900"]) ktimer_settime(r7, 0x0, &(0x7f0000000340)={{0x5, 0x10001}, {0x4, 0x19f7}}, &(0x7f00000003c0)) 11.009517687s ago: executing program 32 (id=60): aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) r0 = socket(0x1c, 0x1, 0x0) (async) r1 = open(0x0, 0x80000000000209, 0xfffffffffffffffc) sysarch$I386_SET_LDT(0x1, &(0x7f0000000700)={0x2, &(0x7f00000003c0)=[{0x10001}, {0x2}, {0xfffffffffffffff5}, {0x3ff}, {0x10001}], 0x5}) (async) ftruncate(r1, 0x100000) (async) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x3, 0x0, 0x0) (async) sendmsg$inet_sctp(r0, 0x0, 0x0) (async) aio_return(0x0) (async) getsockopt$inet6_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f0000000440)={r2, 0x9, 0x0, 0x4112, 0x4}, &(0x7f0000000100)=0x18) (async) socket$inet_tcp(0x2, 0x1, 0x0) r3 = openat$md(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MDIOCATTACH(r3, 0xc1b46d00, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x5, 0x1, 0x4, 0x0, 0xc00, 0x3a632ebe, 0x0, [0x1, 0x2, 0x0, 0x0, 0x0, 0x800000, 0x2000, 0x0, 0x4000, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x430, 0x0, 0x0, 0x4, 0x0, 0x2, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x10000001, 0x0, 0xfffffffc, 0x10000, 0x0, 0x0, 0x0, 0xe467, 0x1ff, 0x0, 0x8, 0x800, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x4000, 0x0, 0x0, 0x4, 0x0, 0x73b849a, 0x0, 0xfffffffe, 0x4000, 0x0, 0x1, 0xfffffffc, 0x0, 0xffffffff, 0x0, 0x0, 0x7, 0x6, 0x0, 0x62c, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7]}) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) (async) rtprio(0x1, 0x0, &(0x7f0000000140)={0x2, 0x5}) (async) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, &(0x7f00000004c0)={0x8, 0x3, 0x7, 0x8, 0x0, 0x0, &(0x7f0000000380)="cb53d53efe29b13dc3bc9f1e8c87", 0x0}) (async) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x10, &(0x7f0000000100)="ec7b0000000000000001f0a5a2519798", 0x0, 0x0, 0x0, 0xfdf9ff85, [0x0, 0x1, 0x20000]}) (async) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000580)={r2, 0x89, "f88f14bb219a5f537ea30e89f6a64c9f999d71a738f586caaf1caf1227cf9e30eedb45215068d156825f15669ab95278bc8d8502bc919fb0c963a9c6c956d43d8b45feb929dad00fcd21f1ae4b036597ae91f56f1d10d3b3ded8a11b58e96ccca91d8ba5bae3798071e10535d5fc1bf2561c81e65543ef802f8e9f5468ab066d61a88f5b1e1cc07a54"}, &(0x7f0000000400)=0x91) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r6 = fcntl$dupfd(r5, 0x11, r5) ioctl$KDGKBTYPE(r6, 0x40044b40, 0x9) (async) ioctl$SMB_READB(r5, 0xc020697a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) (async) socket(0x1c, 0x1, 0x0) ktimer_create(0x4, 0x0, &(0x7f00000001c0)=0x0) ktimer_settime(r7, 0x0, &(0x7f0000000200)={{0x1}, {0x1, 0x2a21}}, 0x0) (async) syz_emit_ethernet(0x42, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaace624d0000340800000000000000ffffffffac1400aa831f0b000000087f00000100000000ac1400aa7f000001ac1400aa0000000900"]) ktimer_settime(r7, 0x0, &(0x7f0000000340)={{0x5, 0x10001}, {0x4, 0x19f7}}, &(0x7f00000003c0)) 10.781866971s ago: executing program 3 (id=8): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r1, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffff7d, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x0, 0x0, [0x0, 0x2, 0x3, 0x0, 0x40, 0x0, 0x3ff, 0x6, 0x1, 0x401, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0xe122, 0x8000000, 0x5, 0x42f, 0xfffffffd, 0x0, 0xffffffff, 0x400000, 0xf, 0xfffffffd, 0x0, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x9, 0x0, 0x2000, 0x0, 0xffffffff, 0xfffffffe, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cdd1400, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xae, 0x0, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffffffd, 0xfffffffb]}) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffffff, 0x3, 0x0, 0x8, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, [0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xb32c, 0x4, 0x0, 0x0, 0x1, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe122, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf, 0xfffffffd, 0x0, 0x3ff, 0x11, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffe, 0x3, 0x2, 0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xa, 0x8, 0x1000, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff]}) dup2(r3, 0xffffffffffffffff) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000080)={0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0xfdffff85, [0x0, 0x1, 0x0, 0x4]}) r6 = socket(0x1c, 0x1, 0x0) r7 = semget$private(0x0, 0x7, 0x3c0) syz_emit_ethernet(0x86, &(0x7f0000000500)=ANY=[]) semop(0x0, &(0x7f00000001c0), 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000180)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @ke_flags}}) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r8 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001740)=""/4091, 0xea6}], 0x2000000000000146) __semctl$GETALL(r7, 0x0, 0x6, &(0x7f0000000100)=[0x401, 0x2, 0x3, 0xfff7, 0x5, 0xc]) pwrite(r8, 0x0, 0x0, 0x5) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) preadv(r4, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/14, 0xe}], 0x1, 0x10000) ioctl$BIOCSDIRECTION(r1, 0x80044277, &(0x7f0000000040)=0x1) select(0x40, &(0x7f0000000580)={0x9, 0xfff, 0x6, 0x9, 0xfffffffffffffffb, 0x1, 0xff, 0x5}, 0x0, &(0x7f0000000600)={0x7, 0x5, 0x0, 0xdf2f, 0xab62, 0x3, 0x8, 0x2}, &(0x7f0000000640)={0x6, 0x4}) socket(0x1c, 0x1, 0x0) 9.047260376s ago: executing program 2 (id=63): pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) r2 = openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000d80)={0x1, 0x20, @sigval_ptr=0xe, @spare=[0x4005, 0x5, 0x6, 0x5, 0x8, 0x7, 0xfd926ff, 0x9]}) ioctl$BIOCGETBUFMODE(r2, 0x4004427d, &(0x7f0000000200)) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) ioctl$BIOCSRSIG(r2, 0x80044273, &(0x7f0000000100)=0xf6ad) r5 = semget$private(0x0, 0x1, 0x1) __semctl$GETPID(r5, 0x2, 0x4) r6 = socket(0x91ae9151d9abd3c9, 0x20000000, 0x4) socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) syz_emit_ethernet(0x0, 0x0) setsockopt$sock_splice(r0, 0xffff, 0x1023, &(0x7f0000000040)={r6, 0x8, {0xab2, 0x3ff}}, 0x14) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r7 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r7, &(0x7f00000004c0)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3, 0x3, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2b0d}, 0x1c, &(0x7f0000000240)=[{&(0x7f00000002c0)="a1102dbe38d27c1974a9be59ee79fcf728254fe15e370d12fb6c906e7063769553623a31755e107eb69a7ce9695d6941a5c846565ca03bdb4f0801b787acd5042c4ca6654fb65a21adfecbf75c15a30d32dfef7c38d9aa2a7d0f98e5864a1ef3cbcafba1451090225c3267f7cbe1f3fcb5fba9b7a67dd4b3735f509d0ef4", 0x7e}, {&(0x7f0000000340)="f01f8f2549230a4f25c9debfb6cdc6d53279458c4f62fb6add15deb6aa5b8fbaa28d67d8a23bf946d70a513dad23e34b0ca63fbe37f0b93481433e3e8a9ec9a9b5c0d4996fdb65752b8bdbdc8a723cafa3e2bc40c786068da7e7e60c5f189c3fdabcc5d36012ff8252b0008e1f65217527cb5c577fd5d788c8399e6079c216b0784fc03872029d817f35e40f7d86b1022c2d630ff6f8a8959902d0b5bcaf5407aba2dbde5f1b98c85b91", 0xaa}, {&(0x7f0000000400)="837a64cb43b7cce49769ec5458c026ef4fbd38f27b4f4fa90caaf89c3839146ba4aafc96acde18c7a7b870e98280c3f0dbf0d0d5c54f9f671d698795d11aa1caa6775dc6f87551d3719d3c7249239ec324322d5299c9", 0x56}, {0x0}], 0x4, 0x0, 0x0, 0x149}, 0x239cc2853cea1ba9) writev(r7, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) __cap_rights_get(0x0, r8, 0x0) syz_emit_ethernet(0xb4, &(0x7f0000000700)=ANY=[@ANYBLOB="aa4c4662c957ff0effffffff0800450000a678680000010200000100020000427b00040064000724131f011affffffe0000001071f06ac1400b27f573501ff0200000000000000ff09000000470001014428014e21d29fb80d18158a38ef0a964c45155e167f836d787640c1f023789c3f3a01000000060000000000fdff000000000000000800ac1400bb000000454420e041400000e0ffffff0500000000000000007f00400144aa00c600001683c2271135becd093e0650"]) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) sendmsg(r1, &(0x7f0000000600)={&(0x7f0000000280)=@in6={0x1c, 0x1c, 0x0, 0x3, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c, 0x0, 0x0, 0x0}, 0x1) 6.873501224s ago: executing program 2 (id=68): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={0xffffffffffffffff, 0x80000021, &(0x7f0000000300)="e2", 0x1, [0x4], 0x0, 0x6, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_ptr=0x2}}) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffff7d, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x1, 0x0, [0x0, 0x2, 0x3, 0x0, 0x40, 0x0, 0x3ff, 0x6, 0x1, 0x401, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0xe122, 0x8000000, 0x5, 0x42f, 0xfffffffd, 0x0, 0xffffffff, 0x400000, 0xf, 0xfffffffd, 0x0, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0x62, 0x7, 0x0, 0x9, 0x0, 0x2000, 0x0, 0xffffffff, 0xfffffffe, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cdd1400, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xae, 0x0, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x0, 0x40000, 0x0, 0xfffffffe, 0xfffffffd, 0xfffffffb]}) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffffff, 0x3, 0x0, 0x8, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, [0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xb32c, 0x4, 0x0, 0x0, 0x1, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe122, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf, 0xfffffffd, 0x0, 0x3ff, 0x11, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffe, 0x3, 0x2, 0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xa, 0x8, 0x1000, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff]}) dup2(r3, 0xffffffffffffffff) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000080)={0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0xfdffff85, [0x0, 0x1, 0x0, 0x4]}) r6 = socket(0x1c, 0x1, 0x0) r7 = semget$private(0x0, 0x7, 0x3c0) syz_emit_ethernet(0x86, &(0x7f0000000500)=ANY=[]) semop(0x0, &(0x7f00000001c0), 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000180)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @ke_flags}}) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r8 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001740)=""/4091, 0xea6}], 0x2000000000000146) __semctl$GETALL(r7, 0x0, 0x6, &(0x7f0000000100)=[0x401, 0x2, 0x3, 0xfff7, 0x5, 0xc]) pwrite(r8, 0x0, 0x0, 0x5) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) preadv(r4, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/14, 0xe}], 0x1, 0x10000) ioctl$BIOCSDIRECTION(r1, 0x80044277, &(0x7f0000000040)=0x1) select(0xff01, &(0x7f0000000580)={0x9, 0xfff, 0x6, 0x9, 0xfffffffffffffffb, 0x1, 0xff, 0x5}, &(0x7f00000005c0)={0xc, 0x93, 0x0, 0xffffffff, 0x4a3fe2a7, 0x46, 0x0, 0x7}, &(0x7f0000000600)={0x7, 0x5, 0x0, 0xdf2f, 0xab62, 0x3, 0x8, 0x2}, &(0x7f0000000640)={0x6, 0x4}) socket(0x1c, 0x1, 0x0) 6.789888027s ago: executing program 4 (id=69): vfork() aio_waitcomplete(0x0, 0x0) (async) r0 = socket(0x2, 0x5, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) (async) socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) r1 = socket(0x1c, 0x3, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x32, &(0x7f0000002a80)=ANY=[], 0x8) (async) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) minherit(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1) (async) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(r2, 0x0, 0x48, &(0x7f0000000100)={@multicast1, @rand_addr=0x8, @rand_addr=0x2}, 0xc) (async) setsockopt$inet_mreqsrc(r0, 0x0, 0x49, &(0x7f0000000180)={@multicast1, @empty, @local={0xac, 0x14, 0x0}}, 0xfffffffffffffff9) setsockopt$inet_mreqsrc(r2, 0x0, 0x48, &(0x7f0000000200)={@remote={0xac, 0x14, 0x0}, @empty, @multicast2}, 0xc) (async) setsockopt$inet_mreqsrc(r2, 0x0, 0x48, &(0x7f0000000400)={@multicast1, @rand_addr=0x9}, 0xc) (async) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) (async, rerun: 32) r3 = socket(0x17, 0x1, 0x1) (rerun: 32) sendto$unix(0xffffffffffffffff, &(0x7f00000000c0)="b1000503000000f60700005987", 0xd, 0x20080, 0x0, 0x0) (async) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f00000000c0)="b100050300000000000000000101000000000000cea1fea7fef96ecfc73fd3357ae26caa0416fa4f373f00acf00b7804be781e4991f7c8df5f882b297be1ab5b23ed00f4c807000000000000001f132e27acbdd602000d7d026ba8af63ff37282902e4fd89720fd3872babfbb770c1ffff00000f90006ee01bc43eaeacc50000fa02000000000000020208a371a3f80004000000040000000100"/164, 0xb1, 0x0, 0x0, 0xd0584fcd7f7abebc) (async) getsockopt$inet_tcp_buf(r3, 0x6, 0x41, &(0x7f00000001c0)=""/219, &(0x7f00000000c0)=0xdb) getsockopt$inet_udp(r3, 0x11, 0x1, &(0x7f00000004c0), &(0x7f0000000500)=0x4) (async) r5 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) (async) r6 = accept$inet(r3, &(0x7f0000000080)={0x10, 0x2, 0xffffffffffffffff, @remote}, &(0x7f00000002c0)=0x10) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r6, 0x6, 0x2000, &(0x7f0000000180)={'rack\x00', 0x8}, 0xfffffffffffffce5) (async) bind(r3, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0xb, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c) (async) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) 4.858372146s ago: executing program 4 (id=71): aio_waitcomplete(0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000580)=[{0x0, 0xfffffffffffffff9, 0xc0f1, 0x10, 0x8000000000000003, 0x0, [0x0, 0x80000001, 0x400]}, {0x4, 0xfffffffffffffff9, 0x1, 0x40000000, 0x8, 0x28000000, [0xf2e, 0xa000000000000000, 0xc4]}, {0x6, 0xd, 0x10, 0x80000000, 0x8, 0x0, [0x3, 0x5, 0x9, 0xa]}], 0x3, 0x0, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000140)=[{0x0, 0xfffffffffffffff5, 0x6b, 0x8, 0xbc, 0x40000000, [0x0, 0xfc, 0x2000001, 0x7]}], 0x1, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) dup(0xffffffffffffffff) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f00000003c0)={0x15, 0x27, 0x8, &(0x7f0000000200)="142e0d00a6dd0c02", 0xc1, &(0x7f0000000480)="ffa6e8cf8c97199b0d811b1d3a72a677f76785aa6471bb219766e4813c2d092ebbe0b7eeb301301a8d18e8024a07f40435fa1c01c56d44f13543044aedebe2c4fd4bd75f621c3fafdd8cec60e962e929e21a1314a7c74730af2fff2e5d5170d7d2149fb88252575af7e7e0690c27d834fddc99e02ff5c74904cbd52ea98f60e8af98285662c6ccdc30355a043ae3780863f28e4efdffeb8b8a8b02d193439b474107c0e614bcfe2b1ec7fed455a1c771c700"/193, 0x6, 0x6, [0x4, 0x0, 0x51380000, 0x20007]}) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x29, &(0x7f0000000240)={0x0, 0xc}, 0x8) setsockopt$inet_sctp_SCTP_REUSE_PORT(r0, 0x84, 0x1c, &(0x7f00000000c0)=0xfd, 0x4) ksem_init(&(0x7f0000000040)=0x0, 0x1) ksem_post(r2) ksem_destroy(r2) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1c, 0x3, 0x0) getsockopt$inet_mreqn(r4, 0x0, 0xc, 0x0, &(0x7f0000000100)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x9, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0xffffffffdfffffff, 0x5) ioctl$BIOCSHDRCMPLT(0xffffffffffffffff, 0x80044275, &(0x7f0000000380)=0x2) mount(&(0x7f0000000000)='cd9660\x00', &(0x7f0000000040)='./file0\x00', 0x4adf8208, &(0x7f00000000c0)) r5 = socket(0x2, 0x0, 0x4) sendto(r5, 0x0, 0x0, 0x180, 0x0, 0x0) recvmsg(r5, &(0x7f0000000300)={0x0, 0xfffffffffffffebe, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/99, 0x63}], 0x1, 0x0, 0x3a}, 0x400c0) r6 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7, 0x11, r6, 0x0) msync(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x2) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00002) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) 4.857652732s ago: executing program 2 (id=72): aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80000001, &(0x7f00000004c0), 0x0, [0x3, 0x10000000], 0x200000000000000, 0x20, 0x0, {0x4, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562ef}}) r0 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0xd2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000080)={0x1, 0x1, 0x2}) r1 = openat$md(0xffffff9c, &(0x7f00000001c0), 0x40, 0x0) freebsd11_fstatfs(r1, &(0x7f00000002c0)) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000440), 0x40, 0x0) ioctl$CIOCCRYPT(r2, 0x8002440a, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0}) r3 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) r5 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x31, &(0x7f0000000200)=ANY=[@ANYRESDEC], 0x28) sendto(r5, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) syz_emit_ethernet(0xfef2, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaa181130cc76aa10ab060001080006040001aaaaaaaaaabbac1400aa00"/42]) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x10, &(0x7f0000000100)="ec7b0000000000000001f0a5a2519798", 0x0, 0x0, 0x0, 0xfdf9ff85}) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) r6 = socket(0x1c, 0x1, 0x0) readlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="b1000504000004000000000001000000331c13fecea10500fef96ec0c72fd3357ae30200004e3003000000acf20b7804be38164991f7c8cf5f882b297be1aa0500000051e2f0ad3ebbc257699a1f139b672f4d335c223e7d0c032bfa896443a42102000000720fd18bfbb670c1f5a872c881ea6e2ec5890400000000008000361b4cc702fa", 0x85, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) r7 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r7, &(0x7f0000000080), 0x0, 0x0) 4.834095497s ago: executing program 2 (id=73): aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) r0 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x20, 0xd) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x200, 0x0) freebsd11_fstat(r1, &(0x7f0000000000)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r2, 0x2) sendmsg$unix(r3, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="28000000ffff000001"], 0x28, 0x3010b}, 0x0) connectat$unix(0xffffffffffffffff, r3, &(0x7f0000000000)=@file={0xa, 0x1, './file0\x00'}, 0xa) r4 = socket(0x1, 0xffffffffffffffff, 0x0) r5 = socket(0x1, 0x5, 0xfc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr}}, 0x1c) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r6, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(r6, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) syz_emit_ethernet(0x9f, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaa2f753623b7caa4aaaaaabb08004a0000910000000005019078ac1400aae0000001820ec2519f21a4b2125b7e9f091b0703040000000800907800002b1710622f9c461bcee0198a7190e67c8c395d6c64be9726cfa6ac22308f3c8bb6cceff11291fb24e53139aa43fdc353ff88333b5860316d01354c775cf146dca7c52ef74ea4c04efb5b0389d5bf1d4da56c17777f9489c3da2e114645968fe529cf4fa1ffff696906395255fb015b0f7a2dccf4a36410dd060f00000000da9de3a537d9952c0000000000000062c8e3832eaa88de251774a5befbe05d2b4f0f1cbe37"]) rmdir(&(0x7f0000000080)='./file0/file1\x00') cpuset_getid(0x1, 0x3, 0x0, 0x0) cpuset(&(0x7f0000000000)) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000240)={0x2, [0x0, 0x0]}, &(0x7f00000002c0)=0xc) r7 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r7, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r8 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r8, &(0x7f0000001480)={&(0x7f0000000040)=@in={0x10, 0x2, 0x1, @remote={0xac, 0x14, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRESOCT=r7], 0x24, 0x20180}, 0x80) 4.782295713s ago: executing program 0 (id=74): aio_waitcomplete(0x0, 0x0) (async, rerun: 32) profil(0x0, 0x0, 0x1, 0xd6) (async, rerun: 32) r0 = socket(0x1c, 0x1, 0x0) (async, rerun: 64) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) (rerun: 64) shutdown(r1, 0x2) (async, rerun: 32) sendmsg$unix(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="28000000ffff0000", @ANYRESHEX], 0x28, 0x3010b}, 0x0) (rerun: 32) connectat$unix(0xffffffffffffffff, r2, &(0x7f0000000000)=@file={0xa, 0x1, './file0\x00'}, 0xa) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1, 0x5, 0xfc) (async) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(r4, &(0x7f0000000340)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x40000000}, 0x10000003}, 0x1c) (async) setresuid(0xffffffffffffffff, 0xee01, 0x0) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r5, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) (async) rmdir(&(0x7f0000000080)='./file0/file1\x00') (async, rerun: 64) cpuset_getid(0x1, 0x3, 0x0, 0x0) (async, rerun: 64) cpuset_setid(0x4, 0x0, 0x0) (async) shmget$private(0x0, 0x1000, 0x1e0, &(0x7f0000511000/0x1000)=nil) (async) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000200)=0x18) (async) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) kqueue() socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYRES64=r0]) (async, rerun: 32) pipe2(0x0, 0xd505eb4556f41fdb) (async, rerun: 32) aio_waitcomplete(0x0, 0x0) (async) cpuset_setid(0x2, 0x0, 0x0) (async) socket(0x1c, 0x2, 0x5) 4.781887159s ago: executing program 0 (id=75): pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) r2 = openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000d80)={0x1, 0x20, @sigval_ptr=0xe, @spare=[0x4005, 0x5, 0x6, 0x5, 0x8, 0x7, 0xfd926ff, 0x9]}) ioctl$BIOCGETBUFMODE(r2, 0x4004427d, &(0x7f0000000200)) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) ioctl$BIOCSRSIG(r2, 0x80044273, &(0x7f0000000100)=0xf6ad) r5 = semget$private(0x0, 0x1, 0x1) __semctl$GETPID(r5, 0x2, 0x4) r6 = socket(0x91ae9151d9abd3c9, 0x20000000, 0x4) setsockopt$sock_int(r6, 0xffff, 0x1004, &(0x7f0000000000)=0x4, 0x4) socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) syz_emit_ethernet(0x0, 0x0) setsockopt$sock_splice(r0, 0xffff, 0x1023, &(0x7f0000000040)={r6, 0x8, {0xab2, 0x3ff}}, 0x14) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3, 0x3, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2b0d}, 0x1c, &(0x7f0000000240)=[{&(0x7f00000002c0)="a1102dbe38d27c1974a9be59ee79fcf728254fe15e370d12fb6c906e7063769553623a31755e107eb69a7ce9695d6941a5c846565ca03bdb4f0801b787acd5042c4ca6654fb65a21adfecbf75c15a30d32dfef7c38d9aa2a7d0f98e5864a1ef3cbcafba1451090225c3267f7cbe1f3fcb5fba9b7a67dd4b3735f509d0ef4", 0x7e}, {&(0x7f0000000340)="f01f8f2549230a4f25c9debfb6cdc6d53279458c4f62fb6add15deb6aa5b8fbaa28d67d8a23bf946d70a513dad23e34b0ca63fbe37f0b93481433e3e8a9ec9a9b5c0d4996fdb65752b8bdbdc8a723cafa3e2bc40c786068da7e7e60c5f189c3fdabcc5d36012ff8252b0008e1f65217527cb5c577fd5d788c8399e6079c216b0784fc03872029d817f35e40f7d86b1022c2d630ff6f8a8959902d0b5bcaf5407aba2dbde5f1b98c85b91", 0xaa}, {&(0x7f0000000400)="837a64cb43b7cce49769ec5458c026ef4fbd38f27b4f4fa90caaf89c3839146ba4aafc96acde18c7a7b870e98280c3f0dbf0d0d5c54f9f671d698795d11aa1caa6775dc6f87551d3719d3c7249239ec324322d5299c9", 0x56}, {&(0x7f0000000500)="2c0af55d77bac4223380162e16c4259e0ab8b40dc6e1a57bd6984d0ff9d803081ef89cdeb4857e31e85c7372a4f9e35a0c4ee72969011393b8e5b7a66cee5cd38caa70163759d2d95bd48f23e1baee4d3bd8bee5bb27b16356cb24358618ee95984378db84c85eceb5044e1631d662371d0df50a6e94c3f8676598719830623abb8608", 0x83}], 0x4, 0x0, 0x0, 0x149}, 0x239cc2853cea1ba9) writev(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) __cap_rights_get(0x0, r7, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) sendmsg(r1, &(0x7f0000000600)={&(0x7f0000000280)=@in6={0x1c, 0x1c, 0x0, 0x3, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c, 0x0, 0x0, 0x0}, 0x1) 2.61741401s ago: executing program 0 (id=76): pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) r2 = openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000d80)={0x1, 0x20, @sigval_ptr=0xe, @spare=[0x4005, 0x5, 0x6, 0x5, 0x8, 0x7, 0xfd926ff, 0x9]}) ioctl$BIOCGETBUFMODE(r2, 0x4004427d, &(0x7f0000000200)) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) ioctl$BIOCSRSIG(r2, 0x80044273, &(0x7f0000000100)=0xf6ad) r5 = semget$private(0x0, 0x1, 0x1) __semctl$GETPID(r5, 0x2, 0x4) r6 = socket(0x91ae9151d9abd3c9, 0x20000000, 0x4) socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) syz_emit_ethernet(0x0, 0x0) setsockopt$sock_splice(r0, 0xffff, 0x1023, &(0x7f0000000040)={r6, 0x8, {0xab2, 0x3ff}}, 0x14) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r7 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r7, &(0x7f00000004c0)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3, 0x3, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2b0d}, 0x1c, &(0x7f0000000240)=[{&(0x7f00000002c0)="a1102dbe38d27c1974a9be59ee79fcf728254fe15e370d12fb6c906e7063769553623a31755e107eb69a7ce9695d6941a5c846565ca03bdb4f0801b787acd5042c4ca6654fb65a21adfecbf75c15a30d32dfef7c38d9aa2a7d0f98e5864a1ef3cbcafba1451090225c3267f7cbe1f3fcb5fba9b7a67dd4b3735f509d0ef4", 0x7e}, {&(0x7f0000000340)="f01f8f2549230a4f25c9debfb6cdc6d53279458c4f62fb6add15deb6aa5b8fbaa28d67d8a23bf946d70a513dad23e34b0ca63fbe37f0b93481433e3e8a9ec9a9b5c0d4996fdb65752b8bdbdc8a723cafa3e2bc40c786068da7e7e60c5f189c3fdabcc5d36012ff8252b0008e1f65217527cb5c577fd5d788c8399e6079c216b0784fc03872029d817f35e40f7d86b1022c2d630ff6f8a8959902d0b5bcaf5407aba2dbde5f1b98c85b91", 0xaa}, {&(0x7f0000000400)="837a64cb43b7cce49769ec5458c026ef4fbd38f27b4f4fa90caaf89c3839146ba4aafc96acde18c7a7b870e98280c3f0dbf0d0d5c54f9f671d698795d11aa1caa6775dc6f87551d3719d3c7249239ec324322d5299c9", 0x56}, {&(0x7f0000000500)}], 0x4, 0x0, 0x0, 0x149}, 0x239cc2853cea1ba9) writev(r7, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) __cap_rights_get(0x0, r8, 0x0) syz_emit_ethernet(0xb4, &(0x7f0000000700)=ANY=[@ANYBLOB="aa4c4662c957ff0effffffff0800450000a678680000010200000100020000427b00040064000724131f011affffffe0000001071f06ac1400b27f573501ff0200000000000000ff09000000470001014428014e21d29fb80d18158a38ef0a964c45155e167f836d787640c1f023789c3f3a01000000060000000000fdff000000000000000800ac1400bb000000454420e041400000e0ffffff0500000000000000007f00400144aa00c600001683c2271135becd093e0650"]) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) sendmsg(r1, &(0x7f0000000600)={&(0x7f0000000280)=@in6={0x1c, 0x1c, 0x0, 0x3, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c, 0x0, 0x0, 0x0}, 0x1) 2.616677558s ago: executing program 4 (id=77): r0 = kqueue() kevent(r0, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) open$dir(0x0, 0x488200, 0x176) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) open$dir(0x0, 0x1, 0x100) socket(0x1c, 0x1, 0x0) socket(0x1b, 0x5, 0x5) r1 = socket(0x1c, 0x1, 0x0) aio_readv(&(0x7f0000000480)={r1, 0x3, &(0x7f0000000880)="44b0c8a183f77e06f935d85fc9fb879de7430532027c9af6a31ae37e7716371dc3cbd920395f1ab8692e8378b0100b5a0e8e924d5a93ec042bfa9a0550b1ba0a34d5ae29acfecb78f02050d6fb33998c3fe98ae76df35735817cbeaa1dbf66f52911c7260350819fbe80f53bb80f406f4a9b531dd34172a5ca1cab3631d54d", 0x7f, [0x6, 0x7e5], 0xfffffffe, 0x6, 0x8, {0x8, 0xd17, &(0x7f0000000b00)="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"}, {0x2, 0x20, @sival_int=0x5, @thr={&(0x7f0000000240)="29df8fea501286f900000037000000643a650af126ecc4e26da86f0026697cf21d00000080876a5ec4c17d2809f2a5", 0x0}}}) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) open(&(0x7f00000000c0)='./file0/file0\x00', 0x4, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_emit_ethernet(0x1c9, &(0x7f0000000900)=ANY=[@ANYBLOB="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"]) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) rfork(0x85000) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) execve(0x0, &(0x7f0000000380)=[&(0x7f00000005c0)='.(\x00'], 0x0) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x3, 0xfffffffffffffffe, 0x80c3}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x32, &(0x7f00000002c0)=ANY=[@ANYBLOB="e991374e0008060001080006040003aaaaaaaaaaaa0000000073016ce573ab00000009f0a7212b6f799eb2f992a3f8171380d41b1adee55c51650401bb1f8be24ea524eb59657c5652b76f061a3a992a19000000000000ec49c111a51fff91d0"]) r3 = socket(0x1c, 0x1, 0x0) bind$bt_l2cap(r3, &(0x7f00000011c0)={0x2, 0x61, 0x6, 0x6, 0xac8a, 0x2}, 0xa) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r4, 0x80000001, &(0x7f00000004c0)='E', 0x1, [0x2], 0x46a, 0x8, 0x0, {0x200001, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562f1, @ke_flags=0xc088}}) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_delete_file(&(0x7f0000000100)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') recvmsg(r2, &(0x7f0000000640)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @ipv4={""/10, ""/2, @loopback}}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000380)=""/211}], 0x0, &(0x7f0000002700)=""/4096, 0xf64}, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sysarch$I386_CLEAR_PKRU(0x84, &(0x7f0000000080)={0x4, 0x0, 0x6, 0x3}) thr_new(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x17, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x21) 2.61639748s ago: executing program 2 (id=78): sysarch$I386_SET_LDT(0x1, 0x0) aio_waitcomplete(0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000100)=[0x2, 0x9]) r0 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r1 = dup2(r0, r0) ioctl$DIOCCHANGERULE(r1, 0xc028756b, &(0x7f00000001c0)="0236") socket(0x1c, 0x1, 0x0) ioctl$BIOCSETF(0xffffffffffffffff, 0x80084267, &(0x7f0000000140)={0x0, 0x0}) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) chflags(&(0x7f0000000080)='./file0\x00', 0x119304) open$dir(&(0x7f0000000800)='./file0\x00', 0x40000400000002c2, 0x1c0) setreuid(0x0, 0x0) r2 = getuid() chown(&(0x7f0000000180)='./file0\x00', r2, 0x0) freebsd11_stat(&(0x7f0000000100)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, r2) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x94659db2cce5c9d8, 0x0) rfork(0x96014) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x180, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x80, 0x44) socket(0x1c, 0x1, 0x8) socket(0x1c, 0x1, 0x0) r4 = open(&(0x7f0000000000)='./file0\x00', 0x100000, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x80010, r4, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_MODE(r5, 0x6, 0x28, &(0x7f0000000100)=0x2, 0x4) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) cpuset_getaffinity(0x2, 0x6, 0x4, 0x0, 0x0) ioctl$CIOCGSESSION2(r6, 0xc030636a, &(0x7f0000000040)={0x17, 0x27, 0xe8, &(0x7f00000003c0)="72e8789fa2e77d9bcf47eaa3c96be4435162120119167dd0f6d40c85efb1f6ca9467bdb1ad2d1d7088f01aaed5ce79d8b40f0a315903055679073f1f45df6cdaaa6b127dd80f9c48d3f17523be44817326f5b0447ce696366773ea98b8ddbd23184dba12392a1346cbe936b9ed48cb3fd1d5817f8dd7dd0840ab70e131888523a99700b3b8d38097f1fb4a847c61c9fead9132c8ded197a141c1d6a0f572db98c09bc43fbcdc4ed15e42046afac1195a25bc4f984a6525b6c634f0bf63c243acf32423ca7e1904cd9d545ab10247525ce50ee97e0bec8dda65a1019bfb65afd3493c753c7f707fb0", 0x0, 0x0, 0x0, 0x7d32559c, [0x2, 0xfffff800, 0x800000, 0xf4]}) socket(0x2, 0x1, 0x0) 2.439965252s ago: executing program 4 (id=79): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$BIOCSETF(r1, 0x80084267, &(0x7f0000000040)={0x1, &(0x7f0000000080)=[{0x94, 0x9, 0x10, 0xfffffffe}]}) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x3, 0xa) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_MAXSEG(r2, 0x84, 0xe, &(0x7f0000002580)={0x0, 0x3}, 0x8) bind(r2, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) setsockopt$inet6_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000240)={0x7, 0x4d, 0xff, 0x2, 0x6, 0x0, 0xf, 0x5, 0xa8, 0x1, 0x2}, 0xb) r3 = dup(r2) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x31, &(0x7f00000001c0)=ANY=[@ANYBLOB="0003"], 0x20) sendto$inet6(r3, &(0x7f0000000a00)="d39b2845", 0x4, 0xc0, 0x0, 0x0) rfork(0x3060) r4 = socket(0x1c, 0x1, 0x0) dup(0xffffffffffffffff) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) __cap_rights_get(0x80000008, r4, &(0x7f0000000100)) listen(0xffffffffffffffff, 0x6000000) r5 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) aio_write(&(0x7f00000002c0)={r5, 0xffffffffffffffff, 0x0, 0x0, [0x0, 0x2], 0x5, 0x18, 0x5fe4, {0xfffff3ee, 0x1, 0x0}, {0x0, 0x15, @sigval_int=0x2, @spare=[0xfffffffffffffffe, 0x80000001, 0x1, 0x2, 0x5, 0x8001, 0x0, 0x5]}}) cpuset_getaffinity(0x2, 0x6, 0x4, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) freebsd11_mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x8, 0x1) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) syz_emit_ethernet(0xac, &(0x7f0000000240)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x76, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @remote={0xfe, 0x80, '\x00', 0x0}, [{0x2, 0xa, "6392c3163493e193a1f4dd884cf6912507e1563b72fbe06691e00e67feca67ef9c70e19cb0593e8230cbe0b475da92912e694609f4ca924287f1ebab0de2b5046df96db34590d86fe1af1315b85e50f01cda3133"}, {0x2, 0x1, "6b92c1feae7f"}]}}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000340)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "0600", 0x48, 0x6, 0x0, @rand_addr="0000000000000000350000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x2, 0x41424344, 0x41424344, 0x0, 0x0, 0x12, 0x0, 0x0, 0x0, 0x0, {[@timestamp={0x8, 0xa, 0x6, 0xefd1}, @mss={0x2, 0x4, 0x3}, @timestamp={0x8, 0xa, 0x2, 0x7fffffff}, @mss={0x2, 0x4, 0x8}, @sack={0x5, 0x2}, @sack_perm={0x4, 0x2}, @sack={0x5, 0x12, [0x8, 0x6, 0x400, 0x0]}, @sack={0x5, 0x2}]}}}}}}}}) 285.847769ms ago: executing program 0 (id=80): flock(0xffffffffffffffff, 0xa) r0 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x400, 0x60) symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8) eaccess(&(0x7f0000000100)='./file0\x00', 0x4) setsockopt$inet6_group_source_req(r1, 0x29, 0x55, &(0x7f0000000140)={0x80000000, {{0x1c, 0x1c, 0x1, 0x3521, @loopback, 0x400}}, {{0x1c, 0x1c, 0x3, 0x1, @empty, 0xe5c}}}, 0xfc) (async) r3 = socket(0x10, 0x3, 0x3) (async) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r4, 0xffff, 0x1001, &(0x7f0000000240)=0x1, 0x4) openat(r2, &(0x7f0000000280)='./file0/file0\x00', 0x200, 0x90) (async) r5 = kqueue() kevent(r5, &(0x7f00000002c0)=[{0x6, 0xfffffffffffffffe, 0x8004, 0x1, 0x5, 0x1, [0xd, 0x48000, 0x10002000000000, 0xa4]}, {0x7, 0xfffffffffffffffd, 0xa8, 0x0, 0xfffffffffffffffd, 0xe2d, [0xce, 0x61c8, 0xfffffffffffffff9, 0x7]}, {0xc, 0xfffffffffffffffe, 0x8, 0xc0000000, 0xc1b, 0x9, [0xa61, 0x80aa, 0x9, 0xa]}, {0x2, 0xfffffffffffffff9, 0xc0f7, 0x2, 0xbe8, 0x6, [0x10, 0xffff800000000000, 0x6, 0xe45]}, {0x2, 0xfffffffffffffffb, 0x2, 0x0, 0xc888, 0xfffffff7, [0x8000000000000000, 0x3, 0x10000, 0xc]}], 0x5, &(0x7f0000000400)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f00000005c0)={0x3, 0x8}) bindat$unix(r3, r2, &(0x7f0000000600)=@abs={0x8, 0x0, 0x0, 0x0}, 0x8) (async) r6 = shm_open2(&(0x7f0000000640)='./file0\x00', 0x200, 0x84, 0x5, &(0x7f0000000680)='\xc7{\\**}\x00') poll(&(0x7f00000006c0)=[{r0, 0x40}, {r6, 0x1}], 0x2, 0x80000001) (async) pathconf(&(0x7f0000000700)='./file0\x00', 0x7) (async) poll(&(0x7f0000000740)=[{r0, 0x100}, {r6, 0x1}, {r1, 0x4}], 0x3, 0x7) freebsd11_stat(&(0x7f0000000780)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(0x0, r7) (async) freebsd12_shm_open(&(0x7f0000000840)='./file0/file0\x00', 0x400, 0x120) getsockopt$sock_int(r4, 0xffff, 0x1016, &(0x7f0000000880), &(0x7f00000008c0)=0x4) (async, rerun: 32) r8 = open$dir(&(0x7f0000000900)='./file0\x00', 0x400, 0x24) (rerun: 32) mkdirat(r8, &(0x7f0000000940)='./file0/file0\x00', 0x1) (async) freebsd10_pipe(&(0x7f0000000980)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DIOCNATLOOK(r9, 0xc04c4417, &(0x7f00000009c0)="c809ad9bba389e58c80a86d60720d94226606656ee694fa71c36559f53e147903117dbec485f9f82ba3fb6b3f28bf2365f32fb88851d") (async) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x31, &(0x7f0000000a00)={0x22, 0x10, '\x00', [@jumbo={0xc2, 0x4, 0x6}, @enc_lim={0x4, 0x1, 0xa0}, @generic={0x6, 0x72, "7d8d7946f7306c9fcbe399d2ea84114b9ed836e81a5c0a7923823933b4895468b23ef9007fdf55e627f8f1665ab78b8ec46eba6aa8a6969ed9009869cc2e432b1ad4e64a24d9ca5099d8fdb17793634658e7bed5c8be27345f73522edaddadcb7f5b591f1b0fad84dbfe30de0c71c45f9b94"}, @ra={0x5, 0x2, 0x400}]}, 0x90) (async) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r9, 0x84, 0xb, &(0x7f0000000ac0)={0x9, 0x9, 0x2000, 0xfffffff9, 0xdbb, 0xc00, 0x1, 0x0, 0x0}, &(0x7f0000000b00)=0x20) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xb, &(0x7f0000000b40)={0xabd, 0x40, 0x4000, 0x2, 0x768feddf, 0x8, 0x9, 0x3000, r10}, &(0x7f0000000b80)=0x20) (async) r12 = socket(0x1c, 0x5, 0x4) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r12, 0x84, 0x23, &(0x7f0000000bc0)={@in6={{0x1c, 0x1c, 0x2, 0x1ff, @remote={0xfe, 0x80, '\x00', 0x0}, 0xf7c5}}, r11, 0x6, 0x6, 0x3}, &(0x7f0000000c80)=0x8c) 285.461194ms ago: executing program 4 (id=81): aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80000001, &(0x7f00000004c0), 0x0, [0x3, 0x10000000], 0x200000000000000, 0x20, 0x0, {0x4, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562ef}}) r0 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0xd2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000080)={0x1, 0x1, 0x2}) r1 = openat$md(0xffffff9c, &(0x7f00000001c0), 0x40, 0x0) freebsd11_fstatfs(r1, &(0x7f00000002c0)) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000440), 0x40, 0x0) ioctl$CIOCCRYPT(r2, 0x8002440a, &(0x7f0000000080)={0x0, 0x6, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0}) r3 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) r5 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x31, &(0x7f0000000200)=ANY=[@ANYRESDEC], 0x28) sendto(r5, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) syz_emit_ethernet(0xfef2, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaa181130cc76aa10ab060001080006040001aaaaaaaaaabbac1400aa00"/42]) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x10, &(0x7f0000000100)="ec7b0000000000000001f0a5a2519798", 0x0, 0x0, 0x0, 0xfdf9ff85}) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) r6 = socket(0x1c, 0x1, 0x0) readlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="b1000504000004000000000001000000331c13fecea10500fef96ec0c72fd3357ae30200004e3003000000acf20b7804be38164991f7c8cf5f882b297be1aa0500000051e2f0ad3ebbc257699a1f139b672f4d335c223e7d0c032bfa896443a42102000000720fd18bfbb670c1f5a872c881ea6e2ec5890400000000008000361b4cc702fa", 0x85, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) r7 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r7, &(0x7f0000000080), 0x0, 0x0) 283.387325ms ago: executing program 2 (id=82): r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r0, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r1, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffff7d, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x0, 0x0, [0x0, 0x2, 0x3, 0x0, 0x40, 0x0, 0x3ff, 0x6, 0x1, 0x401, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0xe122, 0x8000000, 0x5, 0x42f, 0xfffffffd, 0x0, 0xffffffff, 0x400000, 0xf, 0xfffffffd, 0x0, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x9, 0x0, 0x2000, 0x0, 0xffffffff, 0xfffffffe, 0x0, 0x200004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6cdd1400, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xae, 0x0, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffffffd, 0xfffffffb]}) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffffff, 0x3, 0x0, 0x8, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, [0x0, 0x2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0xb32c, 0x4, 0x0, 0x0, 0x1, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe122, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf, 0xfffffffd, 0x0, 0x3ff, 0x11, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0xfffffffe, 0x3, 0x2, 0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xa, 0x8, 0x1000, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff]}) dup2(r3, 0xffffffffffffffff) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000080)={0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0xfdffff85, [0x0, 0x1, 0x0, 0x4]}) r6 = socket(0x1c, 0x1, 0x0) r7 = semget$private(0x0, 0x7, 0x3c0) syz_emit_ethernet(0x86, &(0x7f0000000500)=ANY=[]) semop(0x0, &(0x7f00000001c0), 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, &(0x7f0000000180)="e2", 0x1, [], 0x4, 0x8, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8, @ke_flags}}) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) r8 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) readv(r1, &(0x7f0000000240)=[{&(0x7f0000001740)=""/4091, 0xea6}], 0x2000000000000146) __semctl$GETALL(r7, 0x0, 0x6, &(0x7f0000000100)=[0x401, 0x2, 0x3, 0xfff7, 0x5, 0xc]) pwrite(r8, 0x0, 0x0, 0x5) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) preadv(r4, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/14, 0xe}], 0x1, 0x10000) ioctl$BIOCSDIRECTION(r1, 0x80044277, &(0x7f0000000040)=0x1) select(0x40, &(0x7f0000000580)={0x9, 0xfff, 0x6, 0x9, 0xfffffffffffffffb, 0x1, 0xff, 0x5}, &(0x7f00000005c0)={0xc, 0x93, 0x0, 0xffffffff, 0x4a3fe2a7, 0x46, 0x0, 0x7}, &(0x7f0000000600)={0x7, 0x5, 0x0, 0xdf2f, 0xab62, 0x3, 0x8, 0x2}, &(0x7f00000000c0)={0x6, 0x4}) socket(0x1c, 0x1, 0x0) 268.191547ms ago: executing program 4 (id=83): r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x11, &(0x7f0000000000), &(0x7f0000000040)=0x4) pwrite(r0, &(0x7f0000000080)="1305a86264511fa1222444e55bcd460b18af3eda37faf3fdd51c1ae089f06a70ac6ad362d5c6dff4e8165d7aae9e2a0c43bc09e60d359d3db997a15e7478ec2526c5e75eede8637dd04132da0c29476a1fff20a436f9ccee3880f167f0f7cefb45cceb1c3df338aee964ad6ff9ff239a6a85c39eb387bcebdf0be1a518f0b75567fe91688c8f10109f51f1e4e6", 0x8d, 0x10000) extattr_delete_fd(r1, 0x2, &(0x7f0000000140)='{\x00') setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000180)=0x7, 0x4) r2 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f00000001c0)={0x5be9, 0x800, 0x7, 0x7, 0x0}, &(0x7f0000000200)=0x10) getsockopt$inet6_sctp_SCTP_DELAYED_SACK(r2, 0x84, 0xf, &(0x7f0000000240)={r3, 0xfff, 0x10}, &(0x7f0000000280)=0xc) aio_waitcomplete(&(0x7f0000000480)=&(0x7f0000000400)={r0, 0xfffffffffffffffe, &(0x7f00000002c0)="7507b4c7cca933d6c8d561ceae43dfb604e1b5258a9281ae816060b8746311a3c9fbdfb34669ce3a5911f67f4e8f8df754238c533285f4980d8c603daecee69ffe1a7a4c9e83c068a399f00485f7019309b645aa4818a4b77ca199197d019181e8e87fbd2be959631fcfead8a1960293082a0d202614a70e01eaaac60d1e062f11966d64ae9809aaf70420d6dae808ccb35508d99c0dba1b08a6918dd99a253d3276f002c78ae5", 0xa7, [0xe, 0x5], 0xa, 0x20, 0xb1, {0x1, 0x8450000, &(0x7f0000000380)="4ca1232e122c61b0e7d4810b6e26a5b60c826fc099bdd79ba82302b3216490f6e05bb90d1a70d016d4944544e97ca77e740561c4a418da14c24b6a1d71ae1d9265eef13ce291f538fb43bc958aee5e6dd463d07a5077526907140ee5de125895f43c690b51db8b5f88179b929c673dcb22e8a9f58694f00d"}, {0x4, 0x2, @sival_int=0x81, @spare=[0x3, 0x1ff, 0x3, 0x2, 0x2, 0x4, 0x2, 0xffff]}}, &(0x7f00000004c0)={0x5, 0x3}) r5 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x3, &(0x7f0000000500)={0x8, 0xc, 0x3ff, 0x6478}, 0x8) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r2, 0x84, 0x8003, &(0x7f00000005c0)={r3, &(0x7f0000000540)=[@in={0x10, 0x2, 0xffffffffffffffff, @local}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @local}, @in={0x10, 0x2, 0xffffffffffffffff, @multicast2}, @in6={0x1c}, @in={0x10, 0x2, 0xffffffffffffffff, @rand_addr}]}, &(0x7f0000000600)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xb, &(0x7f0000000640)={0x40, 0x800, 0x6320, 0x9, 0xd5, 0x7, 0x3, 0xd957, r4}, 0x20) setsockopt$inet6_int(r2, 0x29, 0x1f, &(0x7f0000000680)=0x9, 0x4) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f00000006c0)={@in6={{0x1c, 0x1c, 0x2, 0x20000, @rand_addr="edb7eeb62d8fb18207fbf86d1c0e26ea", 0x8}}, r3}, 0x84) madvise(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x6) kqueue() r8 = socket(0x0, 0x4, 0x4) r9 = open$dir(&(0x7f0000000780)='./file0\x00', 0x400000, 0x40) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r8, 0x84, 0x102, &(0x7f00000007c0)={r6, 0xe0, "b7ebb8df5f6ac79be5f9f9e85669376a2d77255a7976d015d836be627f6b26dc171c6467a7b532aa105e1509c7c925fbad06a460554b54d7eff521889f7038dbe6fd036c9221b2f4140ff1b66eaacd9900bd84d8e104861136fe29925c05583ab2a682e7ef94a475ab7d0a158521dd3b92452a5069795510d1ef8f1cd6b957f8286e823d209720cce6ecbaa40456c75ddc3753bce23b397464664960856b628a26b23273c2199fe074d05b3e965f9d3d00e3485edb642fe3d12e07d89c102dd098dc88982bc46c00c28cc60f3826e04e6c1f7098a548203ee9c34fe25203f008"}, &(0x7f00000008c0)=0xe8) setsockopt$inet6_sctp_SCTP_RTOINFO(r7, 0x84, 0x1, &(0x7f0000000900)={r10, 0x4, 0x2}, 0x10) socket$inet6_tcp(0x1c, 0x1, 0x0) inotify_add_watch_at(r9, r9, &(0x7f0000000940)='./file0\x00', 0x10000680) r11 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_RECVRCVINFO(r11, 0x84, 0x1f, &(0x7f0000000980)=0x630e, 0x4) fork() r12 = socket$unix(0x1, 0x1, 0x0) connectat$unix(r8, r12, &(0x7f00000009c0)=@file={0xa, 0x1, './file0\x00'}, 0xa) 49.990975ms ago: executing program 0 (id=84): socket(0x1c, 0x1, 0x0) (async) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) openat$bpf(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) (async) r1 = kqueue() kevent(r1, &(0x7f0000000380)=[{0x6, 0xfffffffffffffff9, 0xc001, 0x2, 0x3, 0x2, [0x400000000006, 0x9, 0x9c, 0xfc]}], 0x1, 0x0, 0xffffffffffffff22, 0x0) (async) rfork(0x3060) kqueue() (async) r2 = socket(0x1c, 0x1, 0x0) (async) r3 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) socket(0x1c, 0x1, 0x0) (async) open(0x0, 0x200, 0x102) (async) r5 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x20000, 0x165) fchflags(r5, 0x40008) (async) lchflags(0x0, 0x300810) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f00000000c0)={0x4, 0x23000000, 0x0, 0x0, 0x10000, 0x0, 0x81, 0x0, 0x2, 0x0, 0x0, [0x962b, 0x0, 0x0, 0x0, 0x10001, 0x0, 0xfffffffd, 0x0, 0x4, 0x3, 0x4, 0x0, 0xfffffffc, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0xfffffffd, 0xfffffffa, 0x0, 0x7, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x47b, 0x0, 0x6, 0x0, 0x40000, 0xfffffffc, 0x0, 0x0, 0x8, 0x0, 0x7ff, 0x7ff, 0x0, 0x4, 0x7, 0x6, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, 0x1, 0x0, 0x21000000, 0x0, 0x40, 0x0, 0x2]}) (async) getsockopt$inet_mreqn(r2, 0x0, 0x9, 0x0, &(0x7f0000000200)) setsockopt$inet_mreqn(r4, 0x0, 0x9, &(0x7f0000000140)={@empty, @multicast1}, 0xc) recvfrom$inet6(r4, &(0x7f0000000000)=""/89, 0x59, 0x41, &(0x7f0000000180)={0x1c, 0x1c, 0x1, 0x10, @empty, 0x10001}, 0x1c) (async) ioctl$BIOCSHDRCMPLT(r4, 0x80044275, &(0x7f0000000380)=0x2) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) socket$inet6(0x1c, 0x1, 0x0) (async) socket(0x1c, 0x3, 0x0) (async) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) (async) execve(0x0, &(0x7f00000000c0)=[&(0x7f0000000080)='//\x02'], 0x0) __realpathat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) (async) socket(0x1b, 0x3, 0x9) 0s ago: executing program 0 (id=85): pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) r2 = openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000d80)={0x1, 0x20, @sigval_ptr=0xe, @spare=[0x4005, 0x5, 0x6, 0x5, 0x8, 0x7, 0xfd926ff, 0x9]}) ioctl$BIOCGETBUFMODE(r2, 0x4004427d, &(0x7f0000000200)) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) ioctl$BIOCSRSIG(r2, 0x80044273, &(0x7f0000000100)=0xf6ad) r5 = semget$private(0x0, 0x1, 0x1) __semctl$GETPID(r5, 0x2, 0x4) r6 = socket(0x91ae9151d9abd3c9, 0x20000000, 0x4) setsockopt$sock_int(r6, 0xffff, 0x1004, &(0x7f0000000000)=0x4, 0x4) socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) syz_emit_ethernet(0x0, 0x0) setsockopt$sock_splice(r0, 0xffff, 0x1023, &(0x7f0000000040)={r6, 0x8, {0xab2, 0x3ff}}, 0x14) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3, 0x3, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2b0d}, 0x1c, &(0x7f0000000240)=[{&(0x7f00000002c0)="a1102dbe38d27c1974a9be59ee79fcf728254fe15e370d12fb6c906e7063769553623a31755e107eb69a7ce9695d6941a5c846565ca03bdb4f0801b787acd5042c4ca6654fb65a21adfecbf75c15a30d32dfef7c38d9aa2a7d0f98e5864a1ef3cbcafba1451090225c3267f7cbe1f3fcb5fba9b7a67dd4b3735f509d0ef4", 0x7e}, {&(0x7f0000000340)="f01f8f2549230a4f25c9debfb6cdc6d53279458c4f62fb6add15deb6aa5b8fbaa28d67d8a23bf946d70a513dad23e34b0ca63fbe37f0b93481433e3e8a9ec9a9b5c0d4996fdb65752b8bdbdc8a723cafa3e2bc40c786068da7e7e60c5f189c3fdabcc5d36012ff8252b0008e1f65217527cb5c577fd5d788c8399e6079c216b0784fc03872029d817f35e40f7d86b1022c2d630ff6f8a8959902d0b5bcaf5407aba2dbde5f1b98c85b91", 0xaa}, {&(0x7f0000000400)="837a64cb43b7cce49769ec5458c026ef4fbd38f27b4f4fa90caaf89c3839146ba4aafc96acde18c7a7b870e98280c3f0dbf0d0d5c54f9f671d698795d11aa1caa6775dc6f87551d3719d3c7249239ec324322d5299c9", 0x56}, {&(0x7f0000000500)="2c0af55d77bac4223380162e16c4259e0ab8b40dc6e1a57bd6984d0ff9d803081ef89cdeb4857e31e85c7372a4f9e35a0c4ee72969011393b8e5b7a66cee5cd38caa70163759d2d95bd48f23e1baee4d3bd8bee5bb27b16356cb24358618ee95984378db84c85eceb5044e1631d662371d0df50a6e94c3f8676598719830623abb860834a4bfd9", 0x87}], 0x4, 0x0, 0x0, 0x149}, 0x239cc2853cea1ba9) writev(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) __cap_rights_get(0x0, r7, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) sendmsg(r1, &(0x7f0000000600)={&(0x7f0000000280)=@in6={0x1c, 0x1c, 0x0, 0x3, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c, 0x0, 0x0, 0x0}, 0x1) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.244' (ED25519) to the list of known hosts. md2147483517: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe00077e8000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e8000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e8000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e8000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e8000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e8000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 Expensive callout(9) function: 0xffffffff81abac00(0) 0.004711512 s if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe006dfca6e0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83716b20 usecount 7, writecount 6, refcount 69 seqc users 0 hold count flags () flags (VIRF_PGREAD|VV_MD|VMP_LAZYLIST) v_object 0xfffffe0054130e88 ref 1 pages 536 cleanbuf 64 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe005411e000 (pid 915, syz-executor, tid 100185) nlink=1, effnlink=1, size=2147483650, extsize 0 generation=9528ff9a, uid=0, gid=0, flags=0x48008 ino 75, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe006dde3508 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1641 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 2nd 0xffffffff83cc7a40 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1340 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff81664981 at witness_checkorder+0x781 #1 0xffffffff814ea187 at __mtx_lock_flags+0x187 #2 0xffffffff8184e06c at tunifioctl+0x15c #3 0xffffffff818294fe at ifhwioctl+0xefe #4 0xffffffff8182d672 at ifioctl+0xde2 #5 0xffffffff8167372a at kern_ioctl+0x4ca #6 0xffffffff8167316e at sys_ioctl+0x36e #7 0xffffffff82145702 at amd64_syscall+0x4e2 #8 0xffffffff820ea3eb at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff81665852 at witness_checkorder+0x1652 #1 0xffffffff81553d49 at _sx_xlock+0x139 #2 0xffffffff8184df9a at tunifioctl+0x8a #3 0xffffffff8182a36d at ifhwioctl+0x1d6d if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 #4 0xffffffff8184bb88 at tif_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 unioctl+0xd38 #5 0xffffffff811c5406 at devfs_ioctl+0x266 #6 0xffffffff82307b87 at VOP_IOCTL_APV+0x87 #7 0xffffffff817d0c67 at vn_ioctl+0x3c7 #8 0xffffffff811c62c9 at devfs_ioctl_f+0x69 #9 0xffffffff8167372a at kern_ioctl+0x4ca #10 0xffffffff8167316e at sys_ioctl+0x36e #11 0xffffffff80440dd7 at freebsd32_ioctl+0x607 #12 0xffffffff822cfab2 at ia32_syscall+0x4d2 #13 0xffffffff820eac4f at int0x80_syscall_common+0x9c vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe006e4ea528: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83716b20 usecount 7, writecount 6, refcount 69 seqc users 0 hold count flags () flags (VIRF_PGREAD|VV_MD|VMP_LAZYLIST) v_object 0xfffffe0054131d90 ref 1 pages 536 cleanbuf 64 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe005412d780 (pid 945, syz-executor, tid 100214) nlink=1, effnlink=1, size=2147483650, extsize 0 generation=d496d9dc, uid=0, gid=0, flags=0x48008 ino 97, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e519000 vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe00776eac08: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83716b20 usecount 70, writecount 69, refcount 69 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0054105ba0 ref 1 pages 536 cleanbuf 64 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe005411e000 (pid 1035, syz-executor, tid 100258) nlink=1, effnlink=1, size=2147483650, extsize 0 generation=25b5e6c6, uid=0, gid=0, flags=0x48008 ino 112, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e518000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e517800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e517800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e517800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e517800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e517800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e517800 SYZFAIL: cover mmap failed (errno 12: Cannot allocate memory) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap3 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap3 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap3 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap3 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap3 (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=3 req=8 state=1 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password:Jan 1 00:00:26 ci-freebsd-i386-4 login[747]: 2 LOGIN FAILURES ON ttyu0 Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl