last executing test programs: 12.330337823s ago: executing program 3 (id=21): r0 = socket$unix(0x1, 0x2, 0x0) connect$unix(r0, &(0x7f00000004c0)=@file={0xa, 0x1, './file0\x00'}, 0x4) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r1 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x602, 0x0) r2 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x1) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x12, r2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ftruncate(r1, 0x80000001003864) write(r1, &(0x7f0000000080)="0095743d9f438929966646495da8e88bd6aa04f42a5f8ca82c97370470006f63d1ced0b08f0506f3d526c0d96ccdbbb91deca2e6c20e623ea0588ee91abc50ee2a75065484166464941540589917f9cda2666520e333424d1a39240c7e18fcd0c737f3f1db2661f1b51da36d6eae97f73426d0bfa092a46113fe6d70218f047a0587c0b3", 0x2b7bd7d216c1e05f) rfork(0x3060) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0x46, 0x0, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x46, &(0x7f00000001c0)={@multicast2, @rand_addr=0x4}, 0xc) r4 = dup2(r3, r3) r5 = kqueue() kevent(r5, &(0x7f0000000200)=[{0x2, 0xfffffffffffffffe, 0xc0a1, 0x8, 0x8000, 0x2, [0x7, 0x8, 0x3, 0x3]}], 0x1, &(0x7f0000000940)=[{}], 0x1, &(0x7f0000000280)={0x9, 0x4}) sendto(r3, 0x0, 0x0, 0x100, 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000140)={0x15, 0x8, 0x0, 0x0, 0x17, &(0x7f0000000040)="d024da87ec8bd0d834c727977133b4375d5f72b0af6100", 0x8, 0x1000, [0x9, 0x2, 0x6, 0x1e19]}) r6 = kqueue() ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, &(0x7f0000000040)={0x17, 0x0, 0x12, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7db", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x40]}) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0xffe, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000280)}) kevent(r6, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) accept4(r7, 0x0, &(0x7f0000000000), 0x30000000) setsockopt$sock_int(r7, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80000001, &(0x7f0000000300), 0x0, [0x0, 0xc9], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x10, @sival_int, @spare=[0x0, 0x0, 0x8000]}}) r8 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(0x0) copy_file_range(r8, &(0x7f0000000000)=0x80000001, r8, 0x0, 0x100000, 0x0) 11.219122099s ago: executing program 3 (id=25): r0 = fhopen(&(0x7f0000000040)={{[0x9, 0x400]}, {0x0, 0x6, "2603beffb5ffe894e6ac714455cb26c7"}}, 0x160000) getsockopt$inet_tcp_TCP_TXTLS_MODE(r0, 0x6, 0x28, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = kqueue() freebsd11_fstatat(r1, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x4200) kevent(r1, &(0x7f0000000180)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x27, &(0x7f0000002500)={@local, @random="75f43672decc", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x19, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2}, @icmp=@generic={0xd, 0x40, 0x0, "bc"}}}}}) r2 = fork() sigqueue(r2, 0x11, @sival_int=0x8000) getpriority(0x1, 0x0) r3 = socket(0x26, 0x2, 0x0) r4 = socket(0x26, 0x2, 0x0) bind(r4, &(0x7f0000000040)=@in6={0x22, 0x1c, 0x3, 0x300, @mcast1}, 0xc) bind(r3, &(0x7f0000000040)=@in6={0x22, 0x1c, 0x3, 0x0, @mcast1}, 0xc) r5 = socket(0x26, 0x2, 0x0) bind(r5, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) fcntl$dupfd(0xffffffffffffff9c, 0x0, r1) execve(&(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)=[0x0], 0x0) 10.866154598s ago: executing program 3 (id=26): open$dir(&(0x7f0000000040)='./file1\x00', 0x4000040000100ac2, 0x100) pathconf(&(0x7f0000000180)='./file1\x00', 0x29) r0 = socket$unix(0x1, 0x2, 0x0) ioctl$SMB_SENDB(r0, 0xc020697c, &(0x7f0000000100)={0x67, 0x69, 0x66, @buf="fba0", @buf="f6b6", 0xfff, 0x0, 0x0, 0x0}) open$dir(&(0x7f0000000000)='./file1\x00', 0x4, 0x5a) 10.598809894s ago: executing program 3 (id=28): open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x64) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getuid() setresuid(r1, r1, 0x0) __semctl$SEM_STAT(0xffffffffffffffff, 0x3, 0xa, &(0x7f0000000600)=0x0) fstatat(r0, &(0x7f0000000640)='./file1\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4200) setresuid(r1, 0x0, r2) r3 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) r4 = open$dir(&(0x7f0000000100)='.\x00', 0x80000, 0x1c1) r5 = open$dir(0x0, 0x0, 0x0) mkdirat(r5, 0x0, 0x4) renameat(r4, &(0x7f0000000040)='./file1\x00', r5, &(0x7f0000000180)='./file0\x00') sync() pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r6 = socket(0x1c, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0xbc0, @loopback, 0x7}, 0x1c) r7 = socket$unix(0x1, 0x2, 0x0) bind$unix(r7, 0x0, 0x0) aio_cancel(r4, &(0x7f0000000500)={0xffffffffffffffff, 0x8001, 0x0, 0x0, [0x5a, 0x40], 0x1, 0x2, 0x6, {0x5, 0x4fa9, 0x0}, {0x3, 0x14, @sigval_int=0x3, @thr={&(0x7f00000003c0)="f20f2cd842787c410f8a000000002647d12ac4e2ad3c2d00000000c402fd1d8096000000c461a81430c4617910c7c461f97e0d2a000000c4017458a4cd1d6f70b6", &(0x7f0000000440)="2d5db92d33300ed4feae4109aeef48da5e019b10c4812ccb313a1ba9a3799f331a886979dd8fef43e268beb895bea4be2f7d89b2adb8661f11310b2badbf499c012d1f247a4a91c83abab86e8adac703919e05824906752f27e70b7ebb6eecf11a41f3b1bc693102e36e90c54c3c94045075f2f519ecda01421148708d3088b0f2e6041df989"}}}) connect$inet6(r6, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) sendfile(r0, r6, 0x4, 0x0, 0x0, 0x0, 0x0) rfork(0x3000) 10.36679754s ago: executing program 3 (id=32): r0 = semget$private(0x0, 0x4000000009, 0x82) semop(r0, &(0x7f0000000140)=[{0x2, 0x401, 0xe5ce97ab354d96be}, {0x0, 0xfffa}, {0x4, 0x146, 0x1000}, {0x0, 0x7f}], 0x4) semop(r0, &(0x7f0000000000), 0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) aio_write(&(0x7f0000000140)={r1, 0x800, 0x0, 0x0, [0x40], 0x2, 0x0, 0x1, {0x0, 0x0, 0x0}, {0x0, 0xfffffffe, @sival_ptr=0x239bfffffffffe, @thr={0x0, 0x0}}}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000040)={@multicast1}, 0xc) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) freebsd11_mknod(&(0x7f0000000080)='./file1\x00', 0x6000, 0x1) openat$bpf(0xffffffffffffff9c, 0x0, 0x200, 0x0) r2 = kqueue() r3 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r3, &(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xe080, 0x3) open$dir(&(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x400000, 0x30) kevent(r2, &(0x7f0000000140)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x800000, [0x0, 0x2, 0x7, 0x3ffffffffffffd]}, {0x401, 0xfffffffffffffff9, 0x4080, 0x1, 0x0, 0xd, [0xb, 0x7fffffffffffffff, 0x6f9, 0x8000000000000000]}], 0x34, 0x0, 0x0, 0x0) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x14, &(0x7f0000000000)=ANY=[@ANYBLOB="080000000600040000000801000000000800ff00"], 0x14) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r5, 0x6, 0x29, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x3, "2e090000ffffffe0"}, 0x40) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) openat$smbus(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r6 = shm_open2(&(0x7f0000000000)='./file0\x00', 0x200, 0x140, 0x5, 0x0) ioctl$FIOSSHMLPGCNF(r6, 0x80306664, &(0x7f0000000040)={0x6, 0x4}) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r7 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r7, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r8 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r8, 0x8, &(0x7f0000000240)="a4", 0x1, [0xfffffffc, 0xfffffffe], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sigval_ptr=0x5}}) 9.421600258s ago: executing program 3 (id=36): r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, &(0x7f00000001c0)=[&(0x7f0000000200)='.)(#./:+\\}@{[\x00\x90\x8f}8\tC\x8bH\xee)jj\x0f8l\tc\xfax\xfb8\x13]\x13\x82\xeb\x9f\x90\x97y^x\xf0\xb22\x8b5[\xba\x17\xff\f\x93J,}\xac8Xm\x8a\xd5'], 0x0) socket$inet6(0x1c, 0x2, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x50, 0x0) r2 = kqueue() freebsd11_kevent(r2, &(0x7f0000000000)=[{}], 0x6a81, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x50, &(0x7f0000000380)={0x6, {{0x1c, 0x1c, 0x1, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x55, &(0x7f0000000180)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}}, 0x108) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r4 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) ioctl$MDIOCRESIZE(r4, 0xc1c06d04, &(0x7f0000000600)={0x2, 0x10, 0x1, &(0x7f0000000100)='./file0\x00', 0x0, 0x500, 0x2, 0x1, 0x9, 0x4, &(0x7f00000002c0)='0', [0x5, 0x0, 0x5, 0x8, 0x8, 0x5, 0x7, 0x18, 0xd, 0xfff, 0x5, 0xc, 0x401, 0x8, 0x4cd2, 0x14, 0x80, 0xd3, 0x3, 0x3, 0x7, 0x2, 0xffffffc0, 0x5, 0x5119a04d, 0xef83, 0x7fffffff, 0x4, 0x0, 0x7, 0x4, 0xf7a8, 0x37a0d465, 0x4, 0x7, 0x1, 0x9, 0x4, 0x5a41, 0x2, 0x2, 0x1, 0x4, 0x7, 0x7, 0x400, 0x921, 0x8000000, 0xffff4389, 0xfffff5bc, 0x800, 0x2, 0x7, 0x1, 0x8, 0xffffff80, 0x2, 0x2, 0xfffffff7, 0x0, 0x8, 0x369, 0x4, 0xfff, 0xba6, 0x4, 0x2, 0x9, 0xfffffff9, 0x7, 0x7, 0x6, 0x2, 0x9, 0x8001, 0x4, 0x32b, 0x8, 0x1, 0x0, 0x5, 0x400, 0xfffffffc, 0x3, 0xd7, 0xed6, 0xa360, 0x2, 0x4, 0x1, 0xffffffff, 0x7, 0x6, 0x7, 0x47763849, 0xbb]}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3, 0x7, @loopback, 0x6}, 0x1c, 0x0}, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) cpuset_setdomain(0x1, 0x3, 0x1ff, 0x20, &(0x7f0000000040)={[0x1]}, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x1) socket$inet6(0x1c, 0x2, 0x0) sigaction(0x14, &(0x7f0000000000)={0x0, 0x1f, {[0x0, 0x0, 0x80000001, 0xc]}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r5, 0x0, 0x9, 0x0, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x9, &(0x7f0000000040)={@multicast1, @loopback}, &(0x7f00000001c0)=0xc) socket$inet6_sctp(0x1c, 0x5, 0x84) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) sendto$inet6(r0, &(0x7f00000001c0)="04b922c72e14abbe", 0x8, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0xe61e, @empty, 0x3}, 0x1c) 9.215108105s ago: executing program 32 (id=36): r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, &(0x7f00000001c0)=[&(0x7f0000000200)='.)(#./:+\\}@{[\x00\x90\x8f}8\tC\x8bH\xee)jj\x0f8l\tc\xfax\xfb8\x13]\x13\x82\xeb\x9f\x90\x97y^x\xf0\xb22\x8b5[\xba\x17\xff\f\x93J,}\xac8Xm\x8a\xd5'], 0x0) socket$inet6(0x1c, 0x2, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x50, 0x0) r2 = kqueue() freebsd11_kevent(r2, &(0x7f0000000000)=[{}], 0x6a81, 0x0, 0x0, 0x0) r3 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x50, &(0x7f0000000380)={0x6, {{0x1c, 0x1c, 0x1, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x55, &(0x7f0000000180)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}}, 0x108) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r4 = openat$md(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) ioctl$MDIOCRESIZE(r4, 0xc1c06d04, &(0x7f0000000600)={0x2, 0x10, 0x1, &(0x7f0000000100)='./file0\x00', 0x0, 0x500, 0x2, 0x1, 0x9, 0x4, &(0x7f00000002c0)='0', [0x5, 0x0, 0x5, 0x8, 0x8, 0x5, 0x7, 0x18, 0xd, 0xfff, 0x5, 0xc, 0x401, 0x8, 0x4cd2, 0x14, 0x80, 0xd3, 0x3, 0x3, 0x7, 0x2, 0xffffffc0, 0x5, 0x5119a04d, 0xef83, 0x7fffffff, 0x4, 0x0, 0x7, 0x4, 0xf7a8, 0x37a0d465, 0x4, 0x7, 0x1, 0x9, 0x4, 0x5a41, 0x2, 0x2, 0x1, 0x4, 0x7, 0x7, 0x400, 0x921, 0x8000000, 0xffff4389, 0xfffff5bc, 0x800, 0x2, 0x7, 0x1, 0x8, 0xffffff80, 0x2, 0x2, 0xfffffff7, 0x0, 0x8, 0x369, 0x4, 0xfff, 0xba6, 0x4, 0x2, 0x9, 0xfffffff9, 0x7, 0x7, 0x6, 0x2, 0x9, 0x8001, 0x4, 0x32b, 0x8, 0x1, 0x0, 0x5, 0x400, 0xfffffffc, 0x3, 0xd7, 0xed6, 0xa360, 0x2, 0x4, 0x1, 0xffffffff, 0x7, 0x6, 0x7, 0x47763849, 0xbb]}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3, 0x7, @loopback, 0x6}, 0x1c, 0x0}, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) cpuset_setdomain(0x1, 0x3, 0x1ff, 0x20, &(0x7f0000000040)={[0x1]}, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x1) socket$inet6(0x1c, 0x2, 0x0) sigaction(0x14, &(0x7f0000000000)={0x0, 0x1f, {[0x0, 0x0, 0x80000001, 0xc]}}, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r5, 0x0, 0x9, 0x0, 0x0) getsockopt$inet_mreqn(r5, 0x0, 0x9, &(0x7f0000000040)={@multicast1, @loopback}, &(0x7f00000001c0)=0xc) socket$inet6_sctp(0x1c, 0x5, 0x84) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) sendto$inet6(r0, &(0x7f00000001c0)="04b922c72e14abbe", 0x8, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0xe61e, @empty, 0x3}, 0x1c) 5.822355042s ago: executing program 0 (id=52): r0 = openat$evdev(0xffffffffffffff9c, &(0x7f0000000200), 0x40000, 0x0) ioctl$EVIOCSABS(r0, 0x4018454b, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x1000009, 0x10000, 0x7, 0x8}) open$dir(&(0x7f0000000000)='./file0\x00', 0x400004000011830a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) getsockopt$inet6_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r2, 0x84, 0x24, &(0x7f0000000140)={0x0, @in={{0x10, 0x2, 0x2, @loopback}}, 0x7f}, &(0x7f0000000300)=0x90) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffffffff"]) ioctl$DIOCGETSTATES(r4, 0xc0106663, &(0x7f0000000040)) setsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r3, 0x84, 0x24, 0x0, 0x0) r5 = socket$inet_sctp(0x2, 0x1, 0x84) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x8, 0x0) ioctl$CIOCGSESSION2(r6, 0xc040636a, &(0x7f0000000440)={0x28, 0x0, 0x18, &(0x7f00000000c0)="3c9e89526b1700b07f82ee18e15b4e73e47f022de5aa3505", 0x0, 0x0, 0x0, 0x2, [0x5cbdca8b, 0x2, 0xff, 0xc]}) r7 = fcntl$dupfd(r6, 0x11, r5) ioctl$CIOCCRYPT(r7, 0xc0306367, &(0x7f0000000300)={0x0, 0x1, 0x40, 0x8204, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r3, 0x0) setsockopt$sock_accept_filter(r1, 0xffff, 0x1000, &(0x7f00000004c0)={'accf_data\x00', "044791a0c1f000188bdcd809663d210600000000000000683b7cc0673e11a7c824293af5ce0665cc3143766bfe1283f6e2e4b135702c67b60cfb9e1ed93563c4267a7820b3f1f058d6876247cb64563d7a06f4f45dd9d2d0223f3309446fddb43e282ca55738404bf83e18e8f62b4373d173ab82716d59ff761b5e483329e26bb5cf43d2531d8aeb768aabe7931dceed0e37530d842320059692985295405448ad57dc5fd6eb3282b485bbc9e08552ed0a4f0d387840fb3fafcc1b285753b66f145bbbff9717be06e66404c67391f01417375dcf66ab61b044f3152069d81d33b924ce324f9200"}, 0x100) __specialfd$inotify(0x2, &(0x7f0000000100)={0x4}, 0x4) thr_new(&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001180), 0x0, 0x7, 0x0, [0xfffffffffffffffd, 0xffffffff]}, 0x68) 5.818935595s ago: executing program 1 (id=53): r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, &(0x7f0000001500)={0x1f, 0x2, '\x00', [@ra={0x5, 0x2, 0x1ab2}, @pad1, @jumbo={0xc2, 0x4, 0x7}, @enc_lim={0x4, 0x1, 0x8}]}, 0x18) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_buf(r2, 0x29, 0xe, 0x0, 0x0) procctl$PROC_SPROTECT(0x2, 0x0, 0x1, &(0x7f00000000c0)=0x21) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x4) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) pwritev(r3, 0x0, 0x0, 0x8000000000000000) setitimer(0x1, &(0x7f0000000000)={{0x3}, {0x0, 0x10000000c}}, 0x0) r4 = getppid() setpgid(0x0, r4) fcntl$lock(r3, 0xc, &(0x7f00000002c0)={0x1, 0x3, 0x1, 0x9, r4}) r5 = kqueue() r6 = socket(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f0000000180)={0x10, 0x2, 0x0, @loopback}, 0x10) setresuid(0x0, 0xee01, 0x0) r7 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r7, 0x29, 0x1b, &(0x7f0000000080), 0x4) bind$inet6(r7, &(0x7f0000000100)={0x1c, 0x1c, 0x0, 0x1, @empty, 0x800}, 0x1c) kevent(r5, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f00000003c0)=[{r5, 0x100}, {r2, 0x2000}, {r3, 0x100}], 0x0, &(0x7f0000000440)={0x200000077359406}, &(0x7f0000000400)={[0xfffffffffffffffd, 0x0, 0x2]}, 0xfffffe08) r8 = socket(0x1, 0x2, 0xff) fhstatfs(&(0x7f0000000140)={{[0x1, 0x8]}, {0x24, 0xffff, "0285f7ed1a9a4a51e8d414e43a2c4c8c"}}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) __semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000240)=&(0x7f0000000200)={{0x0, 0x0, 0x0}}) freebsd11_statfs(&(0x7f0000000280)='./file0\x00', &(0x7f0000000dc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) setresuid(r9, r10, r11) fcntl$lock(r8, 0x16, &(0x7f0000000080)={0x570}) sendto$inet6(r0, &(0x7f0000002340)="d791f39c6bb4dcb7", 0x8, 0x8, &(0x7f0000002380)={0x1c, 0x1c, 0x0, 0x5, @loopback}, 0x1c) getpriority(0x2, 0xff) 5.817764237s ago: executing program 2 (id=54): open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x64) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getuid() setresuid(r1, r1, 0x0) __semctl$SEM_STAT(0xffffffffffffffff, 0x3, 0xa, &(0x7f0000000600)=0x0) fstatat(r0, &(0x7f0000000640)='./file1\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4200) setresuid(r1, 0x0, r2) r3 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) r4 = open$dir(&(0x7f0000000100)='.\x00', 0x80000, 0x1c1) r5 = open$dir(0x0, 0x0, 0x0) mkdirat(r5, 0x0, 0x4) renameat(r4, &(0x7f0000000040)='./file1\x00', r5, &(0x7f0000000180)='./file0\x00') sync() pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r6 = socket(0x1c, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0xbc0, @loopback, 0x7}, 0x1c) r7 = socket$unix(0x1, 0x2, 0x0) bind$unix(r7, 0x0, 0x0) aio_cancel(r4, 0x0) connect$inet6(r6, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) sendfile(r0, r6, 0x4, 0x0, 0x0, 0x0, 0x0) rfork(0x3000) 4.949070311s ago: executing program 0 (id=55): mkdirat(0xffffffffffffff9c, &(0x7f0000001940)='./file2aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mkdir(&(0x7f0000000040)='./file2\x00', 0xc1) open(&(0x7f0000000140)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x110) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mount(&(0x7f0000000080)='cd9660\x00', &(0x7f00000000c0)='.\x00', 0x0, &(0x7f0000000100)) symlinkat(&(0x7f0000000dc0)='./file0\x00', r0, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a80)='./file0\x00') sync() sync() fork() mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sigsuspend(&(0x7f0000000140)={[0xff, 0x8001, 0x7b, 0x9]}) open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) flock(r1, 0x3) r2 = socket(0x11, 0x3, 0x0) sendto$unix(r2, &(0x7f0000000740)="b100050390000000030008000700ca900f0e08fecea11ea8fef968f3c73fd3357aa0eb2c0900852e126336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0200a371a3f80000feffffffffffff010000000000000000", 0xb1, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x205, 0x0) fcntl$lock(r3, 0x9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000300010005}) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) syz_emit_ethernet(0x66, &(0x7f00000025c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x30, 0x3a, 0xff, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x3, 0x0, 0x6, '\x00', {0x5, 0x6, "ad526c", 0x8d9, 0x15, 0x1, @empty, @rand_addr="bf7be6b9fa06f549927f5637d5bf4695"}}}}}}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r4 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r4, 0x29, 0xa, &(0x7f0000000080), 0x4) 4.945852547s ago: executing program 1 (id=56): openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140), 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) aio_fsync(0x80, &(0x7f0000000400)={r0, 0x8000df, 0x0, 0x0, [0x6, 0x3], 0x9, 0x8, 0xfffffffc, {0x932, 0x497, 0x0}, {0x0, 0x21, @sigval_int=0x9}}) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) 4.891401378s ago: executing program 2 (id=57): openat$evdev(0xffffffffffffff9c, &(0x7f0000000040), 0x100, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') r0 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r0, 0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0x13000225) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r1, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x0, 0x1ff], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int, @ke_flags=0x9fc040a3bd859cca}}) open(0x0, 0x80000000000206, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r4, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x406, @loopback}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000500)="182a187d094b09d5c2da5cb8b9e2629e18cc9e3f6a7690dabf8beb4abc1aa91a8f6646c64bdc3faf4d4aeece25e52ccfd49df6d49097189852e4fa84bd736151cdc165065d080000b71be2ced1dcaf7a729c730eea0600000000000000c94492ca6327e640d79c969f9b78f9235da433e80ac467889eadd506ccd40d703ae975e8fec78719d96b11828506baa1e92f506ed50ebe15e12e5d7da0b71b919682456af4c711ff34ffd5cc133a95774922c8e038fd622f", 0xb5}, {0x0}], 0x2, 0x0, 0x0, 0x149}, 0x0) writev(r4, 0x0, 0x0) open(0x0, 0x80000000000209, 0x0) r5 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r5, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x106, 0x0) bind$inet6(r5, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x1, @empty}, 0x1c) getlogin(&(0x7f00000005c0)=""/193, 0xc1) r6 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r5, r6) r7 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendfile(r7, r6, 0x17, 0x0, 0x0, 0x0, 0x14) freebsd11_fstatat(r4, 0x0, &(0x7f00000000c0), 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r3, 0x0) write(r3, &(0x7f0000000080)="ba", 0x100000) unlink(&(0x7f0000000040)='./file0\x00') 3.875406833s ago: executing program 0 (id=58): open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r0 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) copy_file_range(r1, 0x0, r1, &(0x7f0000000080)=0x7, 0x0, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0xd2) freebsd12_shm_open(&(0x7f00000002c0)='./file0\x00', 0xa00, 0x7c) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x40000400000002c2, 0x0) close(r4) renameat(r4, &(0x7f0000002680)='./file0\x00', r4, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r3, 0x0) r5 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) ioctl$MDIOCATTACH(r2, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x0, 0x0, &(0x7f0000000040)='./file1\x00', 0x10000, 0x8, 0x3e, 0x0, 0x0, 0x0, 0x0, [0x4000, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x653, 0x0, 0x9, 0xfffffffe, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4]}) socket$inet(0x2, 0x2, 0x0) r6 = kqueue() kevent(r6, &(0x7f0000000000), 0x20b89, 0x0, 0xffff3955, 0x0) fork() connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x1c, 0x1c, 0x0, 0x0, @empty, 0xffffffcb}, 0x1c) r7 = fork() posix_fadvise(r6, 0x631b, 0x3, 0x5) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000018c0), 0x800, 0x0) r9 = getpgid(r7) procctl$PROC_NO_NEW_PRIVS_CTL(0x0, r9, 0x13, &(0x7f0000000140)=0xf2e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) ioctl$DIOCCHANGEALTQV1(r8, 0xc1304431, &(0x7f0000000040)="988ebf4bd31008787a9b2ef8b716c8a7a52468651ee7c8a84047eef4c9eeefa91684889052afdaf9f303f2e35c3ddcb8cbc4b6863f4ea2772fb99e10526dacbac573181fc8c2dbd8d66b112c2940c9a75e0f07ef852d8204f7cf396b9ada976206c553111abfab11") mlock(&(0x7f0000477000/0x1000)=nil, 0x1000) 3.874744361s ago: executing program 1 (id=59): shm_open2(&(0x7f0000000100)='./file0\x00', 0x200, 0xe8, 0x1, &(0x7f0000000140)='\x00') r0 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x2, &(0x7f0000000080)=0x20000, 0x4) socket(0x1c, 0x5, 0x0) execve(0x0, &(0x7f00000001c0)=[&(0x7f0000000200)='.)(#./:+\\}@{[\x00\x90\x8f}8\tC\x8bH\xee)jj\x0f8l\tc\xfax\xfb8\x13]\x13\x82\xeb\x9f\x90\x97y^x\xf0\xb22\x8b5[\xba\x17\xff\f\x93J,}\xac8Xm\x8a\xd5'], 0x0) r1 = socket$inet6(0x1c, 0x2, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x50, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1012, &(0x7f0000000080)=0x8449, 0x4) r3 = kqueue() freebsd11_kevent(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x8002, 0xc0000000}], 0x1, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x50, &(0x7f0000000380)={0x6, {{0x1c, 0x1c, 0x1, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}}, 0x108) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) ioctl$DIOCSETLIMIT(0xffffffffffffffff, 0xc0084428, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000640)=0x4, 0x4) r5 = openat$md(0xffffff9c, &(0x7f00000001c0), 0x40, 0x0) freebsd11_fstatfs(r5, &(0x7f00000002c0)) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) ioctl$MDIOCDETACH(r5, 0xc1c06d01, &(0x7f0000000680)={0x8, 0xd2, 0x0, 0x0, 0x1, 0x5, 0x5, 0x4, 0xb60, 0x2, 0x0, [0x9, 0x7, 0xdd4, 0x400, 0x1, 0x1, 0x6, 0x7, 0x2c, 0x3, 0x3, 0xfd, 0x9, 0x9, 0x9, 0x4, 0x10, 0xffffffff, 0xc, 0xba, 0xf25e, 0xfffffffe, 0xc, 0x7ff, 0x5, 0x5, 0x2, 0x7, 0x4, 0x3, 0x81, 0x4, 0x1, 0xfffffffb, 0x8, 0x1, 0x401, 0x8, 0x1, 0x0, 0x6, 0x8000, 0x81, 0x2, 0x2, 0x57eaa6a4, 0x10000, 0x8, 0xfffffff7, 0x0, 0x3, 0xdb37432, 0x1, 0xe7, 0x0, 0x7, 0xe00c, 0x9, 0x5, 0xf74, 0x3, 0xfffffe, 0x6, 0x3, 0x33f9, 0x8, 0x9, 0x1100, 0x85cf, 0x9, 0x8001, 0x7, 0x2, 0x7, 0x9, 0xf64, 0x1000, 0x3ff, 0x0, 0x1, 0x8002, 0x1, 0x31b, 0x2, 0xffffffff, 0x7fffffff, 0x8, 0x81, 0x3f, 0x2, 0xfffffffc, 0x200, 0x80, 0x100, 0x8b2b, 0x5a]}) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000440), 0x40, 0x0) ktimer_create(0x0, 0x0, 0x0) ioctl$CIOCCRYPT(r6, 0x8002440b, &(0x7f0000000640)={0x0, 0x1, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0}) chdir(&(0x7f0000000280)='./file0\x00') r7 = msgget$private(0x0, 0x0) msgsnd(r7, &(0x7f00000008c0)=ANY=[@ANYBLOB="0000003ed03d6fd0748fe462cbff80d76370f89fc9362e08a9f2bda951949f7db8017c5e2e3674f83abc54433afa0a3529a37744ab7af2a0df19dc618a35c5616e5fa408d53085e59a1a929783433ca8fd5e4846e59233e6a2c02dfb95595044bca2fdc5b33d1335b3e0c2e11a2fe773d9d33b8feec196eb3855fff7d9e4327d87c983ab4eea63f2351b5a1be9fafaf4851116"], 0x8, 0x800) 3.874107328s ago: executing program 2 (id=60): r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x1faab4d3944d37a6) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x40, 0x0) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) freebsd11_getdents(r1, &(0x7f0000000d40)=""/61, 0x3d) pwritev(r0, &(0x7f0000000540)=[{&(0x7f0000000800)="583582e76ca7e01336c837d948e1fd01f2d0e74c5afebf3159b4b720b5eba960217d1d9f7c2814251e952d77426dc2866cf2f2129f6258fa9cd93397dd1ce2f056422f9c09004d47a0209e9cb64e828732955d6329baa1de838519f40b7e1b4a42e77c9ae1ce823812cc280a084b9e3f03df4b775c8006208cecf1da0d2e6b3d6f27c2d0965c793d571782c80a9ba7e1fe8c3a3936d33165cf6b6a78c114ffd0680671fc9cca9964976311342a5e93", 0xaf}, {&(0x7f0000000700)="3102f4d063adc1b07bc7e774bb1a0b07a5df55c6e71bac4b74f3e9524022d68a57db704785eae1e5d9c1e3e1f732238ca7029c481641e47802eb72f0272fb4750052b2a953ab0edbde6c54af032eb50ff9742cf5427b10471a1a99c8759b14bf264ebdf55cfb616405cea0530f397a066b5d0771a569fd77e9e75be3cae4cde54040efe305578bcfb39fd216233686028941182d82a2c86d9d7eccf95fc642c4931ae5b611b8847c1b6e366f422ab09829419c45ade8fda7173d16c73f41aa8131f7ec03aff183c6eeaca4cc8331b90e79697ce87db9fc0bf4c125896e8b", 0xde}], 0x2, 0xfffffffffffffffc) r2 = socket(0x1c, 0x1, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$sock_int(r3, 0xffff, 0x10, &(0x7f0000000080)=0xb6, 0x4) connect$inet(r3, &(0x7f0000000500)={0x10, 0x2, 0x3, @loopback}, 0x10) bind$inet6(r2, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) r4 = open$dir(&(0x7f0000000200)='./file0\x00', 0x800, 0x0) syz_emit_ethernet(0x13e, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) symlinkat(&(0x7f00000005c0)='\x00', r4, &(0x7f0000000bc0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') symlinkat(&(0x7f0000000140)='./file0\x00', r4, &(0x7f0000000600)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a80)='./file0\x00') bindat(r0, r2, &(0x7f0000000040)=@un=@abs={0x8, 0x0, 0x0, 0x1}, 0x8) r5 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x2, 0x0, @local, 0x1}, 0x1c) extattr_set_fd(0xffffffffffffffff, 0x2, &(0x7f00000001c0)='\x04', &(0x7f00000008c0)="318cf7621faac617dd2d0dc4b8607a99cbec1636fa47adbe31d7f142cbbbdf52eaa6ce44c10943a844ccaf9af92b73567e3c717c30bff5513fb637caad4cc0c036723f063c42d422e72b657bcfd72d4a247143af9524b7ceae61b1255d21e951a5d8a6b96d1daeb4df23daea69f7844755666d6d01ede287610f7799d3be24c86d3da3f0b3a5e700000000009e158dcaa52430d9d9e038eb26e3f12fa8423043a867cf3a3dfb99ac86ce954f102fd8e40f387500"/190, 0xbe) setsockopt$inet6_int(r5, 0x29, 0x2a, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) __realpathat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', &(0x7f0000000240), 0x0, 0x0) extattr_list_link(&(0x7f0000000240)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x7, 0x0, 0x0) setrlimit(0x0, &(0x7f0000000580)={0x3174e8000000000f, 0x6}) kevent(0xffffffffffffffff, &(0x7f0000000040), 0x7fffffff, 0x0, 0xfffffffb, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r6, 0x8008745b, &(0x7f00000003c0)="28a7c7f98123061e161b6b12c23cc0a40148f8e05690192e34341bddc9ba95d2b36fe4cec62aeac2ecb2b57b78") connect$inet(0xffffffffffffffff, 0x0, 0x0) fork() 2.74998726s ago: executing program 0 (id=61): unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x48000101) fork() mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80000002, &(0x7f0000000040)="e2", 0x1, [], 0x1, 0x5, 0xfffffffc, {0x800000000, 0x7, 0x0}, {0x0, 0x8, @sival_int=0xe, @thr={0x0, 0x0}}}) mount(&(0x7f00000027c0)='hfsp\x00', &(0x7f0000000080)='./file0\x00', 0x10000000, 0x0) r1 = kqueue() getpgid(0x0) aio_error(0x0) mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x0) mprotect(&(0x7f0000cc0000/0x1000)=nil, 0x1000, 0x40000) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) msync(&(0x7f0000860000/0x600000)=nil, 0x600000, 0x2) kevent(r1, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0) syz_emit_ethernet(0x138, &(0x7f0000000000)=ANY=[]) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100000) ioctl$PIO_DEADKEYMAP(r2, 0x20006b09, &(0x7f0000000f00)={0xfd7, [{0x3, [0x8, 0x6, 0x7, 0x6, 0x1, 0x0, 0xffffffff, 0x5, 0x80, 0x8, 0x500, 0x8001, 0x2000, 0x80000000, 0x7, 0x0, 0x6, 0x7, 0x2, 0x8, 0xfff, 0x10001, 0x1000, 0x8, 0x4d97, 0xff, 0x101, 0x8000003, 0x6, 0x304, 0x6, 0x2, 0xfffffff9, 0x7, 0x7, 0xff, 0x10000, 0x2, 0x5, 0x2, 0x1, 0x3, 0x6f, 0x22df, 0x401, 0x7fffffff, 0xa7, 0xc, 0x6, 0x4, 0x9d49, 0xb, 0x8001, 0x6, 0x2, 0xfffffff7, 0x7f, 0x2, 0x6, 0x80000000, 0x2, 0x96fc, 0x200, 0x0, 0xfffffc00, 0x8, 0x0, 0x1e780, 0x50, 0x8001, 0x4, 0x9, 0x7, 0xffffffff, 0xfffeffff, 0xee, 0x0, 0x8, 0x7fff, 0x0, 0x2, 0x5b23, 0x4, 0xffffffff, 0x5, 0xf05, 0x9, 0xffffffff, 0x9, 0x80000001, 0x8, 0x9, 0x4, 0x7fffffff, 0x8000, 0x2, 0x8001, 0x8, 0x4, 0x3, 0x6, 0x80, 0xb3ab, 0x9]}, {0x4, [0x4, 0x3, 0x1, 0x3, 0x80000000, 0x4, 0x400, 0xeec, 0xf557, 0x8, 0x7fff, 0x9, 0x8, 0x401, 0xb, 0xa, 0xfad6, 0x8, 0x5, 0x6, 0x40, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0xc77e, 0x8, 0x81, 0xc9, 0xa4, 0xfffffff8, 0x2, 0x921, 0x7fffffff, 0x24, 0x2, 0x370c, 0xb00, 0x4, 0x52a, 0x8, 0x7, 0xff, 0x8, 0x4, 0x370a8713, 0x9, 0x6, 0x428, 0xfffffff8, 0x2, 0x7, 0x4, 0x0, 0x5, 0xffff, 0x81, 0x0, 0x8, 0x9, 0x0, 0x7, 0x3, 0x2, 0x4, 0xff, 0x1, 0x4, 0x3, 0x7, 0x2, 0x6, 0x6, 0xbb, 0xffff, 0x8, 0x4, 0x0, 0x9, 0x7, 0x703, 0x0, 0xfffffff9, 0x9, 0x6, 0x4, 0xb32, 0x4, 0x10, 0x9, 0x40, 0x3, 0x4, 0x91, 0x0, 0x0, 0x7fffffff, 0x8, 0x66f53e15, 0x1, 0x8000, 0x4]}, {0x1, [0x826, 0x1000, 0x9, 0xffff8001, 0x3, 0xffffff77, 0x6, 0x1, 0x7, 0xd, 0x9, 0x6621, 0x5, 0x1, 0x6, 0x0, 0x3, 0x44, 0x5, 0x42, 0x2, 0x40, 0xe, 0x10001, 0xd0, 0xfffffff7, 0x80, 0x6, 0x7, 0xe51, 0x1ff, 0x2, 0x2, 0xf8000000, 0x40, 0x0, 0x400, 0x10000, 0x7, 0x1, 0x8, 0xc03, 0x3, 0x2, 0x122, 0x7, 0xf, 0x7, 0x31c, 0xcbc0, 0x81, 0x0, 0xffffffff, 0xd08, 0x5, 0x7, 0x1, 0x2, 0x8, 0x6d, 0xfb, 0x3b, 0x8, 0x8, 0x5834, 0x8, 0x7fff, 0x1, 0x4, 0x0, 0x5, 0x9, 0xaa, 0x0, 0xa, 0x4, 0x80000001, 0x0, 0x4, 0x7fff, 0x0, 0xdc5, 0x6, 0x4, 0x8, 0x8001, 0x4, 0x9, 0x9, 0x7f, 0x3, 0xd5ca, 0x7, 0x7fff, 0x1, 0x2, 0x80, 0x1d12, 0x3, 0x0, 0xfffffffc, 0xe358, 0x200, 0x5]}, {0x0, [0xfffffff6, 0xb729, 0xa, 0x9, 0x2, 0x5, 0x9, 0x6, 0x40, 0x3fc4, 0x0, 0x3a, 0x72, 0x7ff3, 0x7, 0x2, 0xdcb, 0x81, 0x1, 0x7fffffff, 0x282d, 0x1ff, 0x10000000, 0x89, 0xffff0000, 0x7fff, 0x10, 0x2, 0x2, 0x4, 0xffffffff, 0xde, 0x3ff, 0x0, 0x6cd9, 0x101, 0x7, 0x1000, 0x2, 0x7f, 0x400001, 0xe03, 0x7, 0x5, 0x3, 0x2, 0x1, 0x4, 0x1, 0x2, 0x7f, 0x8, 0xf, 0x9, 0x50, 0x5, 0x0, 0x0, 0x93, 0x1, 0x4, 0x2, 0x18, 0x7ff, 0xd, 0x4, 0x5, 0x7c8, 0x9, 0x9f, 0x7f2d, 0x8fa, 0x1, 0xfffffff9, 0x9a9d, 0x5, 0x6, 0x8, 0x2e, 0x6, 0x1, 0x7f, 0x8, 0x5, 0x0, 0x0, 0x2, 0x40, 0x9, 0x7, 0xd5e, 0x1, 0x1ff, 0x7, 0x3ff, 0x10c, 0x7fff, 0x2, 0x7, 0x7, 0x1, 0x6, 0x3, 0x38]}, {0x1ff, [0x2, 0x0, 0x2, 0x2, 0x3e, 0xe, 0x401, 0xb, 0x0, 0x31, 0xad6b, 0x0, 0x5, 0x1ff, 0x3b, 0x9, 0xd, 0x1, 0x574b, 0x9, 0x5, 0xfffffff7, 0x9, 0x3, 0x7, 0x6, 0xa41, 0x6, 0x7, 0x0, 0x3, 0xa, 0xfffffffb, 0x2, 0x5, 0xe0000000, 0x3, 0x80000000, 0x8001, 0xfffffff9, 0x3, 0x9, 0x553, 0x40, 0x6f4, 0x0, 0x6, 0xd, 0x7, 0x2, 0x2, 0x8, 0x100, 0xd, 0x7, 0xfffffff6, 0xc3, 0x6, 0x8, 0x9, 0x0, 0x2000, 0x3ae, 0x40000000, 0x4, 0xc08, 0x8, 0x1002, 0x9, 0x10001, 0x10001, 0x0, 0x3, 0x200, 0x5, 0x5, 0x8, 0x3, 0x1, 0x3, 0x2, 0x5, 0x7186b6e1, 0x7, 0x4, 0x10, 0x8, 0x7, 0xffffffff, 0xffffffff, 0x85f5, 0xa88e0, 0x1, 0x800, 0x5, 0x5, 0x5, 0x80000001, 0x5, 0x8000, 0x3, 0xffffffff, 0x8, 0x1ff]}, {0x7db, [0x1, 0x7, 0x7, 0x9, 0x2, 0x6, 0x80000000, 0xffffffff, 0x6, 0x4, 0x6, 0x67d7, 0x8, 0x10001, 0xfffffffa, 0x2, 0x4, 0x6, 0xfffffe01, 0x8, 0xffffff93, 0x3, 0xa37, 0x3ff, 0x8, 0x7c8, 0x5, 0xfe, 0x8, 0x2, 0x1000, 0x0, 0x3ff, 0x1, 0x3, 0x6, 0x1f64d413, 0x5, 0x1, 0xfffffffc, 0xedf, 0x2, 0xc, 0x2, 0x8, 0x0, 0x7, 0x9, 0x149, 0x5, 0x2, 0x5, 0x7fff, 0x0, 0x70, 0x4, 0x2, 0x2, 0x5, 0xba38, 0x2, 0x7, 0x2, 0x401, 0x2, 0x2, 0x9, 0xdd, 0xff, 0x3, 0x401, 0x200, 0x0, 0x9ad, 0x6, 0x91dc, 0x7fffffff, 0x6, 0xf0ff, 0x4, 0x20007, 0xff8, 0x8001, 0x0, 0x10000, 0xe, 0x7d, 0x1000, 0x622, 0x7fffffff, 0x2e, 0x4, 0x4, 0x2, 0x5, 0x0, 0xe, 0xffffffff, 0xfffffff7, 0x6, 0x7f, 0x20d4, 0x3, 0x401]}, {0xdb6d, [0x8, 0x1, 0xffff8001, 0x6, 0x9, 0x0, 0x2, 0x6, 0xfffffff2, 0x7f, 0x8, 0x8, 0x7, 0xfffff755, 0x6, 0x9, 0x4, 0x5, 0x50f, 0x100, 0x6, 0x5, 0x3, 0x9e3, 0x7, 0xfff, 0x4, 0x7, 0x9, 0x8, 0x2, 0x0, 0xb4d, 0x2, 0x200, 0x4, 0x5, 0x9, 0x7df, 0x2, 0x7ff, 0x7, 0x1196, 0x2, 0x1afa, 0x7, 0xf, 0x80000001, 0x8, 0x4, 0x3, 0x1, 0x5, 0x2, 0x4, 0x9, 0x462, 0xf1, 0xffffffca, 0xad58, 0x66d, 0x7, 0x1, 0x1e, 0x5, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfa, 0x701, 0x81, 0x2, 0x3, 0x7ff, 0x8, 0xb11, 0x3, 0x1000, 0x2, 0x400, 0x1ff, 0x6, 0x101, 0x6, 0xfffffffe, 0x5, 0x1, 0x81, 0x5, 0x3ff, 0x8, 0x4, 0x4, 0x2, 0x4, 0xfffffff9, 0xf, 0x573, 0x200, 0x6, 0x5, 0x7]}, {0x0, [0x6, 0x55f, 0x7fff, 0xad3, 0x4, 0x0, 0x0, 0x6b, 0x9, 0x101, 0x8, 0x3ff, 0x5, 0x40, 0x8, 0x8, 0x9, 0x0, 0x5, 0x0, 0x3, 0x81, 0xfffffffa, 0x9, 0x401, 0xda, 0x6, 0xfffffff7, 0x200, 0x2, 0xb, 0x1, 0x3, 0x2, 0xd7, 0x0, 0x805, 0xffffffff, 0x40, 0x1, 0xd, 0x8001, 0x0, 0xaca, 0x3, 0xff, 0x5c, 0x100, 0x10000, 0x1, 0xffffffff, 0xffff, 0x40, 0x0, 0x914, 0x8, 0x7, 0x8, 0x6, 0x5, 0xa0, 0x231, 0xffff, 0xf1a, 0x100, 0x6, 0x4, 0x7fffffff, 0xc, 0x9, 0x7fff, 0x3, 0x8000, 0x0, 0x8003, 0x4, 0x9, 0xffffffff, 0x4, 0x10000, 0x0, 0x4, 0x6, 0xe45, 0x1, 0xd, 0xd7, 0x8000, 0xfffffff7, 0x6, 0x5, 0x200, 0x4, 0x5, 0x7, 0x5, 0x81, 0x8, 0x0, 0x6, 0x4, 0x8, 0xb4f, 0x9]}, {0x3, [0xfffffff5, 0x4, 0x9, 0x401, 0xd97, 0x80000001, 0x0, 0x470, 0x1, 0x6, 0x2, 0x4, 0x2f6229ce, 0x2, 0xa, 0x8, 0x7f, 0x4, 0x34, 0x9, 0x0, 0x5e, 0x7fffffff, 0xd2df, 0x54, 0x8, 0x6, 0x7ff, 0x5, 0x3, 0x6, 0x0, 0xffffffff, 0xffffffff, 0x3, 0x80000000, 0x9, 0x2, 0x18, 0x8, 0xff, 0x5, 0x9, 0x4, 0xfdb, 0x0, 0x6, 0x0, 0x6, 0x8, 0x2, 0x400, 0x8, 0x0, 0x8, 0x1, 0x401, 0x2400, 0x1, 0x5, 0x7f, 0x7ff, 0x80, 0xed, 0x70c, 0x9, 0x4, 0xb8, 0x1d3, 0x7fff, 0x2, 0xd74a, 0x1000, 0x8000, 0xff, 0x6, 0x10, 0xfff, 0x9, 0x1fe0, 0x5, 0x0, 0xffffff80, 0x0, 0xfd9, 0x1000, 0x6, 0xcb4, 0x7b9, 0x6, 0x4, 0x9, 0x4, 0x8, 0xfffffff7, 0x80000000, 0x80000000, 0x7f, 0x800, 0x2, 0x1, 0x1, 0x6, 0x7]}, {0x1, [0x2, 0x6, 0x5, 0x3ff, 0x9, 0x9, 0xfffffff6, 0x3, 0xfffffffd, 0x10000, 0xfffffe01, 0xfffffff7, 0xfffffffc, 0x7fff, 0xffffffb9, 0x32c, 0x9, 0x1, 0x50dc, 0x6, 0x8, 0x8, 0x2e, 0x8a05, 0x7, 0x3, 0xb, 0x1, 0xffff3c32, 0x8001, 0x2, 0xc3e0, 0x2, 0x6e31, 0x3, 0x2, 0x4, 0x8, 0x4, 0xd6, 0xfffffff9, 0x9, 0x9fc, 0x6, 0x81, 0xffffffc0, 0xc2ee, 0x6cb, 0x3, 0x35, 0x68, 0x6, 0xe28a, 0x101, 0xff, 0x8, 0x8, 0x1, 0x9f, 0x6, 0x8, 0x2, 0x4, 0xa4, 0x27, 0x7fff, 0x1, 0xfffff001, 0x0, 0x9, 0xa, 0x274, 0x9, 0x5, 0x9a, 0x9c99, 0x40081, 0xc, 0x18, 0x7, 0x0, 0x8, 0x10, 0x7, 0x6, 0x0, 0xff, 0x6, 0x7, 0x3, 0x8, 0x2, 0xaa37, 0x8, 0x5, 0x8, 0x1f, 0x4, 0x2, 0x1, 0xd, 0x100, 0xb9, 0x4]}, {0x0, [0x0, 0x5, 0x1, 0xe, 0x8000, 0x3, 0xafc, 0x401, 0x6, 0x8, 0x0, 0x8fa, 0x7f, 0xfffffff6, 0x120000, 0xff, 0xb4, 0xc, 0x6, 0x7ff, 0x5, 0x100, 0x10001, 0x3, 0x8d, 0x101, 0xffffffff, 0xc, 0x8001, 0xc, 0x800, 0xa227, 0x5, 0x3ff, 0x1, 0x4, 0x1, 0x8, 0x2277, 0x7, 0xe9, 0x3, 0x1, 0x0, 0x2000, 0x8, 0x6, 0x1, 0x3, 0x3, 0x8, 0x5, 0x400, 0xaec, 0xfffffff7, 0x8c86, 0x9, 0x6, 0x8, 0x8, 0xe, 0xa, 0x3, 0x3e, 0x10000, 0x1, 0x46, 0x1, 0x82, 0x5, 0x5, 0x7, 0x1a4, 0xc3f2, 0xfffffffb, 0x8, 0x3, 0x5, 0xfffffff8, 0x0, 0xa436, 0x81, 0x84, 0x6, 0x7, 0x0, 0x0, 0x3b9, 0xb81a, 0x7, 0x1, 0x3, 0xffffffff, 0x8, 0xe, 0xffffa46a, 0x7fff, 0x0, 0x2, 0x201, 0x4, 0x1, 0x436f95d4, 0x1]}, {0x5, [0x0, 0xffffffff, 0x0, 0x5, 0x7, 0x2, 0x2, 0x7ff, 0x438, 0x2, 0x83, 0x4, 0x8, 0x10001, 0x5e54, 0x4, 0xd, 0x8, 0x4b, 0x3, 0x9, 0x7040000, 0x3, 0x8, 0x1, 0x10001, 0xf39a, 0x17, 0x5, 0xd94f, 0x87a9f2b, 0x4, 0x8, 0x9, 0x6, 0x4, 0x7, 0x4, 0x2, 0x10000, 0x8, 0x4e2, 0x10, 0x0, 0xd, 0x9, 0x0, 0x1, 0x4, 0xda, 0x28, 0x10001, 0x29, 0xff, 0x7, 0x61a, 0x3, 0x20006, 0x5, 0x0, 0x3, 0x6, 0x7ff, 0x3b0, 0x8, 0x3, 0x2, 0x0, 0xc34c, 0xd, 0xe1, 0x5, 0x6, 0x6, 0x8001, 0x3, 0x4, 0x8, 0x69e, 0x4, 0xd, 0x0, 0x3, 0x2, 0x4, 0x0, 0x7fffffff, 0x5, 0x4, 0x5, 0x3, 0x5, 0x2, 0x88, 0x81, 0x6, 0x10001, 0x8, 0x7f, 0x200, 0x4, 0x3, 0x4, 0x8]}, {0x4000000, [0x80, 0x9, 0x0, 0x4, 0x2, 0x2, 0x6, 0x7, 0xff, 0x10001, 0x7, 0x2, 0x3, 0x3, 0x9eca, 0xc9, 0x9, 0xff, 0x7f, 0xfffffff8, 0xa250, 0x6, 0x92, 0xfffff989, 0x3, 0x5, 0x4, 0x4, 0x3, 0x94, 0x1, 0xfffffff9, 0x800, 0x9, 0x2, 0xf8, 0xcca, 0xffffff01, 0x5c, 0x2, 0x10, 0x4, 0xd, 0x15f5, 0x9, 0x7f, 0x5, 0xfffffffa, 0x2, 0xe0000000, 0x8001, 0x0, 0x1, 0x8, 0xc327, 0xfffffffe, 0xea, 0x9, 0x9, 0x8000, 0x2, 0x8000, 0x8, 0x3ff, 0x5, 0x4, 0x5, 0x81d2, 0x4, 0x6, 0x40, 0x9a, 0x5, 0x0, 0x7ff, 0x6, 0x1, 0x718f, 0x3, 0x6, 0x3, 0x4, 0x8, 0x8001, 0x200, 0x802e, 0x2, 0x5, 0x10000, 0x8, 0x101, 0x1, 0xd, 0x9, 0x0, 0x0, 0x7, 0x3, 0xf57a, 0x1ff, 0xff, 0x1, 0x12a, 0x9]}, {0x6, [0x9, 0xfffffc01, 0x6366, 0xf, 0x4, 0x432, 0x3, 0xba6c0000, 0x0, 0x7, 0x4c000000, 0x3, 0x0, 0x3ff, 0x2, 0x4, 0xcc39, 0x473, 0x3, 0x6, 0x3, 0xb, 0x6, 0x0, 0x7ff, 0x6d0, 0x187e9fae, 0x7, 0x18, 0x3, 0x1, 0x2, 0xfffffffb, 0x1, 0x6, 0x4, 0x5, 0x4, 0x8, 0x88, 0x0, 0x80000000, 0xb, 0x4, 0x9, 0x3ff, 0x7, 0xd8b, 0x502e, 0x7, 0x7, 0xffffffff, 0x6, 0xffffffff, 0x8, 0x1, 0x1ff, 0x97f, 0x310, 0x3, 0xcc0, 0x5, 0x169a, 0x10000, 0x43ad4fa3, 0x2, 0x9, 0x6, 0x401, 0xf, 0xffffff7f, 0x720, 0x3, 0x7, 0x8ca9, 0x3, 0x9, 0xd7, 0x374, 0x8, 0x5, 0x4, 0x3, 0x5, 0x7fff, 0x7, 0x800, 0x0, 0x4, 0x10001, 0x80000001, 0x7fff, 0x8, 0xc9, 0x800, 0x9, 0x80, 0x8, 0xd2, 0x2, 0x1, 0x0, 0x8330, 0x9]}, {0x200, [0x784e2393, 0x4, 0x6, 0x9, 0xedf, 0x1, 0x3, 0x101, 0x9, 0x0, 0x101, 0x10, 0xf, 0x1, 0xc5, 0xa588, 0x0, 0xe, 0x6, 0x2, 0x0, 0x8, 0xe, 0xa, 0x8, 0x2, 0x7e, 0x0, 0x6, 0x80000000, 0x77, 0x2, 0x1000, 0x199, 0x2, 0xbf63e0, 0x0, 0xc6, 0x0, 0x400, 0x2, 0x140, 0x5, 0x6, 0x0, 0x9, 0xc7, 0x3c, 0xffffffff, 0x0, 0x5, 0x0, 0x8, 0x3, 0x2, 0x3486238e, 0x0, 0x7, 0xffffffff, 0xd93, 0x6, 0x2, 0x8, 0xfb6, 0x7, 0x5, 0x2, 0x1, 0x1, 0x80000001, 0x9, 0xc, 0x3, 0x8, 0xd6b, 0x2b3a, 0x6, 0xb8, 0xffffffff, 0x9, 0xc, 0x0, 0x7, 0x6, 0x69e1, 0x100, 0x4, 0xfe, 0x4800000, 0x612, 0xfffffff8, 0xbe2, 0xe, 0xffffff7f, 0x5a8, 0x8001, 0x4e8a095, 0x6, 0x9, 0xffffffff, 0x3, 0xbbe, 0x5, 0x50]}]}) clock_getres(0xf, &(0x7f0000000ac0)) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000380), 0x10000, 0x0) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f00000000c0)={0x29, 0x0, 0x20, &(0x7f0000000100)="0b6fac4103e7a00d4689e808d0d4755aedaacdd4743c7eaa2c7300d05fe86026", 0x0, 0x0, 0x0, 0x7d86699a}) ioctl$CIOCCRYPT(r3, 0xc0306367, &(0x7f0000000640)={0x0, 0x1, 0x0, 0x8060, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000400)}) clock_settime(0x0, &(0x7f00000002c0)={0x3, 0x3}) sendmsg$unix(0xffffffffffffffff, 0x0, 0x20104) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, 0xffffffffffffffff, 0x0) procctl$PROC_REAP_KILL(0x0, 0xffffffffffffffff, 0x6, 0x0) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) copy_file_range(r4, 0x0, r4, &(0x7f0000000080)=0x81706, 0x3, 0x0) aio_write(&(0x7f0000000340)={0xffffffffffffffff, 0x80000001, &(0x7f0000000300), 0x0, [0x9, 0x2], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x4}}) 2.749212808s ago: executing program 1 (id=62): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = dup(r1) ioctl$MDIOCATTACH(r2, 0xc1b46d00, &(0x7f0000000280)={0x97d, 0x8, 0x3, &(0x7f00000000c0)='./file0\x00', 0x1, 0x81, 0x1, 0x6, 0xab6, 0x5755, &(0x7f0000000100)='\xc5/{\x00', [0x0, 0x9, 0xfffffff4, 0x7, 0x6, 0xff, 0xb, 0xa9, 0x9, 0xad, 0x9, 0x3ff, 0x0, 0x3, 0x5, 0x1, 0x5, 0x0, 0x400, 0x5, 0x364b, 0x5, 0x3ff, 0x9b, 0x0, 0x34, 0x5, 0x5, 0x7fffffff, 0x6, 0x4c, 0x0, 0x7, 0x5, 0x3, 0xffff3319, 0xc3ae, 0xe05, 0xe43, 0x9, 0x6, 0x4, 0xa, 0x10000, 0xfefffff7, 0x0, 0x100e, 0x2, 0x7a8, 0x4, 0x20000000, 0x311b, 0x6, 0x6, 0x6, 0x7, 0x1, 0x6, 0x800, 0x4, 0x6, 0x8001, 0x8000, 0x8, 0x200, 0x6, 0xed, 0x1, 0x7, 0xfffffff9, 0x6, 0x3, 0x5, 0x7, 0x4, 0x1, 0x5, 0x3, 0x3, 0xc81, 0x44c, 0x0, 0x72b, 0x8, 0x20, 0x9, 0xa9a5, 0x0, 0x7, 0x90, 0x2, 0x1, 0x0, 0x8000000, 0x7, 0x9d92]}) ioctl$DIOCCHANGERULE(0xffffffffffffffff, 0xcbe0441a, &(0x7f00000000c0)) fstat(0xffffffffffffffff, &(0x7f0000000440)) socket(0x1c, 0x1, 0x0) r3 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="fff71fdcedff000080009e000000e216", 0x3}, 0x1c) openat$smbus(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r4 = shm_open2(&(0x7f0000000000)='./file0\x00', 0x200, 0x140, 0x5, 0x0) ioctl$FIOSSHMLPGCNF(r4, 0x80306664, &(0x7f0000000040)={0x6, 0x4}) 2.747273977s ago: executing program 2 (id=63): r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) r1 = vfork() procctl$PROC_REAP_ACQUIRE(0x0, 0x0, 0x2, 0x0) r2 = fork() lio_listio(0x0, 0x0, 0x0, &(0x7f0000000300)={0x1, 0x9, @sival_ptr=0x8, @tid=r1}) setpgid(r2, r1) connect$inet(r0, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) sendto$unix(r0, &(0x7f0000000200)='8', 0x1, 0x201, 0x0, 0x0) recvmsg(r0, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x40001) 1.525048814s ago: executing program 0 (id=64): r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000080), 0x4) bind$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x0, 0xffffffff, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0xffffffff}, 0x1c) r1 = socket$inet6(0x1c, 0x1, 0x0) setsockopt(r1, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x0, @loopback={0x4}}, 0x1c) r2 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000080)=0xb, 0x4) bind$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x600, @empty}, 0x1c) 1.519834728s ago: executing program 1 (id=65): open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) flock(r0, 0x3) r1 = socket(0x11, 0x3, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) r2 = open(&(0x7f0000000380)='./file0\x00', 0x205, 0x0) fcntl$lock(r2, 0x9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000300010005}) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) syz_emit_ethernet(0x66, &(0x7f00000025c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x30, 0x3a, 0xff, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x3, 0x0, 0x6, '\x00', {0x5, 0x6, "ad526c", 0x8d9, 0x15, 0x1, @empty, @rand_addr="bf7be6b9fa06f549927f5637d5bf4695"}}}}}}}) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) extattr_set_file(0x0, 0x2, &(0x7f0000000140)='\x00\x00', 0x0, 0x0) open(&(0x7f0000000200)='./file/file0\x00', 0x4, 0x0) mkdir(0x0, 0x0) r3 = open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) flock(r2, 0x3) socket$inet(0x2, 0x2, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x4, 0x400) r4 = dup2(r3, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r4, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x2, 0x3, 0x8}, 0x10) open(&(0x7f00000001c0)='./file0\x00', 0x2f9, 0x0) rfork(0x85000) 1.518588812s ago: executing program 2 (id=66): r0 = __specialfd$eventfd(0x1, &(0x7f0000000040)={0x400, 0x1}, 0x8) openat(r0, &(0x7f0000000080)='./file0\x00', 0x800, 0x102) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r1, 0x0, 0x9, &(0x7f00000000c0)={@local={0xac, 0x14, 0x0}, @loopback}, 0xc) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000003640), 0x4) getsockopt$inet_mreqn(r1, 0x0, 0x9, 0x0, &(0x7f0000000080)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r4 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r4, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) fork() mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_sctp_SCTP_RECVRCVINFO(r5, 0x84, 0x1f, &(0x7f0000000100)=0xfc47, 0x4) openat$md(0xffffffffffffff9c, &(0x7f00000002c0), 0x400, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) posix_fallocate(r3, 0xff00, 0x8) 13.07646ms ago: executing program 0 (id=67): shm_open2(&(0x7f0000000100)='./file0\x00', 0x200, 0xe8, 0x1, &(0x7f0000000140)='\x00') r0 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x2, &(0x7f0000000080)=0x20000, 0x4) socket(0x1c, 0x5, 0x0) execve(0x0, &(0x7f00000001c0)=[&(0x7f0000000200)='.)(#./:+\\}@{[\x00\x90\x8f}8\tC\x8bH\xee)jj\x0f8l\tc\xfax\xfb8\x13]\x13\x82\xeb\x9f\x90\x97y^x\xf0\xb22\x8b5[\xba\x17\xff\f\x93J,}\xac8Xm\x8a\xd5'], 0x0) r1 = socket$inet6(0x1c, 0x2, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x50, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1012, &(0x7f0000000080)=0x8449, 0x4) r3 = kqueue() freebsd11_kevent(r3, &(0x7f0000000000)=[{0x0, 0x0, 0x8002, 0xc0000000}], 0x1, 0x0, 0x0, 0x0) r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r4, 0x29, 0x50, &(0x7f0000000380)={0x6, {{0x1c, 0x1c, 0x1, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}}, 0x108) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) ioctl$DIOCSETLIMIT(0xffffffffffffffff, 0xc0084428, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000640)=0x4, 0x4) r5 = openat$md(0xffffff9c, &(0x7f00000001c0), 0x40, 0x0) freebsd11_fstatfs(r5, &(0x7f00000002c0)) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) ioctl$MDIOCDETACH(r5, 0xc1c06d01, &(0x7f0000000680)={0x8, 0xd2, 0x0, 0x0, 0x1, 0x5, 0x5, 0x4, 0xb60, 0x2, 0x0, [0x9, 0x7, 0xdd4, 0x400, 0x1, 0x1, 0x6, 0x7, 0x2c, 0x3, 0x3, 0xfd, 0x9, 0x9, 0x9, 0x4, 0x10, 0xffffffff, 0xc, 0xba, 0xf25e, 0xfffffffe, 0xc, 0x7ff, 0x5, 0x5, 0x2, 0x7, 0x4, 0x3, 0x81, 0x4, 0x1, 0xfffffffb, 0x8, 0x1, 0x401, 0x8, 0x1, 0x0, 0x6, 0x8000, 0x81, 0x2, 0x2, 0x57eaa6a4, 0x10000, 0x8, 0xfffffff7, 0x0, 0x3, 0xdb37432, 0x1, 0xe7, 0x0, 0x7, 0xe00c, 0x9, 0x5, 0xf74, 0x3, 0xfffffe, 0x6, 0x3, 0x33f9, 0x8, 0x9, 0x1100, 0x85cf, 0x9, 0x8001, 0x7, 0x2, 0x7, 0x9, 0xf64, 0x1000, 0x3ff, 0x0, 0x1, 0x8002, 0x1, 0x31b, 0x2, 0xffffffff, 0x7fffffff, 0x8, 0x81, 0x3f, 0x2, 0xfffffffc, 0x200, 0x80, 0x100, 0x8b2b, 0x5a]}) ktimer_create(0x0, 0x0, 0x0) ioctl$CIOCCRYPT(0xffffffffffffffff, 0x8002440b, &(0x7f0000000640)={0x0, 0x1, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0}) chdir(&(0x7f0000000280)='./file0\x00') r6 = msgget$private(0x0, 0x0) msgsnd(r6, &(0x7f00000008c0)=ANY=[@ANYBLOB="0000003ed03d6fd0748fe462cbff80d76370f89fc9362e08a9f2bda951949f7db8017c5e2e3674f83abc54433afa0a3529a37744ab7af2a0df19dc618a35c5616e5fa408d53085e59a1a929783433ca8fd5e4846e59233e6a2c02dfb95595044bca2fdc5b33d1335b3e0c2e11a2fe773d9d33b8feec196eb3855fff7d9e4327d87c983ab4eea63f2351b5a1be9fafaf4851116"], 0x8, 0x800) msgsnd(r6, &(0x7f0000000840)=ANY=[@ANYBLOB="01000000067cfcf25a28acf0acb208b8b04a082bf4115ea896d38b57ba7350ef6c3ebd695eaee6a6480206dce1f236d3ec0371563a1ec1cf3712f9d27fec9de35a0502568721953caebf3066f7b9536062efdbaf662d43982314853ec0476b17b9f2bd5b00e3f1ac630921d699e0c5f7b83e3dcd49"], 0x8, 0x0) 5.415502ms ago: executing program 1 (id=68): openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r0 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) pwritev(r0, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) aio_fsync(0x80, &(0x7f0000000400)={r1, 0x8000df, 0x0, 0x0, [0x6, 0x3], 0x9, 0x8, 0xfffffffc, {0x932, 0x497, 0x0}, {0x0, 0x21, @sigval_int=0x9}}) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) 0s ago: executing program 2 (id=69): open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r0 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) flock(r0, 0x3) procctl$PROC_REAP_KILL(0x0, 0x0, 0xfffffff, 0x0) r1 = socket(0x11, 0x3, 0x0) openat(0xffffffffffffffff, 0x0, 0x400, 0x100) open(0x0, 0x0, 0xe) setreuid(0xee00, 0x0) r2 = kqueue() kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f00000002c0)={0x1e, 0x1, 0xffffffffffffffff, 0x8}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) r3 = open(&(0x7f0000000380)='./file0\x00', 0x205, 0x0) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r4, 0x29, 0x18, 0x0, 0x0) fcntl$lock(r3, 0x9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000300010005}) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) syz_emit_ethernet(0x66, &(0x7f00000025c0)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x30, 0x3a, 0xff, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x3, 0x0, 0x6, '\x00', {0x5, 0x6, "ad526c", 0x8d9, 0x15, 0x1, @empty, @rand_addr="bf7be6b9fa06f549927f5637d5bf4695"}}}}}}}) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) extattr_set_file(&(0x7f0000000000)='./file0\x00', 0x2, &(0x7f0000000140)='\x00\x00', 0x0, 0x0) open(&(0x7f0000000200)='./file/file0\x00', 0x4, 0x0) mkdir(0x0, 0x0) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x200, 0x0) flock(r3, 0x3) socket$inet(0x2, 0x2, 0x0) faccessat(0xffffffffffffffff, 0x0, 0x4, 0x400) r6 = dup2(r5, r0) setsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x1, &(0x7f00000002c0)={0x0, 0x2, 0x3, 0x8}, 0x10) open(&(0x7f00000001c0)='./file0\x00', 0x2f9, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.150' (ED25519) to the list of known hosts. lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe00596a6b08 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/main/kernel/sys/net/if_tuntap.c:1688 2nd 0xffffffff83cccac0 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/main/kernel/sys/net/if_tuntap.c:1387 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff81681891 at witness_checkorder+0x781 #1 0xffffffff81506877 at __mtx_lock_flags+0x187 #2 0xffffffff8186b5cc at tunifioctl+0x15c #3 0xffffffff818467fe at ifhwioctl+0xefe #4 0xffffffff8184a9f2 at ifioctl+0xde2 #5 0xffffffff8169063a at kern_ioctl+0x4ca #6 0xffffffff8169007e at sys_ioctl+0x36e #7 0xffffffff82165702 at amd64_syscall+0x4e2 #8 0xffffffff82109d4b at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff81682762 at witness_checkorder+0x1652 #1 0xffffffff81570509 at _sx_xlock+0x139 #2 0xffffffff8186b4fa at tunifioctl+0x8a #3 0xffffffff818476ab at ifhwioctl+0x1dab #4 0xffffffff81868f62 at tunioctl+0xd92 #5 0xffffffff811dd876 at devfs_ioctl+0x266 #6 0xffffffff82327ce7 at VOP_IOCTL_APV+0x87 #7 0xffffffff817edec7 at vn_ioctl+0x3c7 #8 0xffffffff811de739 at devfs_ioctl_f+0x69 #9 0xffffffff8169063a at kern_ioctl+0x4ca #10 0xffffffff8169007e at sys_ioctl+0x36e #11 0xffffffff82165702 at amd64_syscall+0x4e2 #12 0xffffffff82109d4b at fast_syscall_common+0xf8 Connection to 10.128.0.150 closed by remote host. Warning! syz-executor[882] uses SF_SYNC sendfile(2) flag. Please follow up to https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=287348. pid 894 (syz-executor), tap3: tun/tap protocol violation, non-controlling process closed last. ifaddr cache = 0xfffffe006b6dc180 is deleted tap3: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0058574800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058574800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058574800 pid 939 (syz-executor), tap0: tun/tap protocol violation, non-controlling process closed last. pid 1171 (syz-executor), tap1: tun/tap protocol violation, non-controlling process closed last. ifaddr cache = 0xfffffe006de20c00 is deleted ifaddr cache = 0xfffffe006e4d3000 is deleted tap0: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46000 tap1: link state changed to DOWN pid 1040 (syz-executor), tap2: tun/tap protocol violation, non-controlling process closed last. ifaddr cache = 0xfffffe006e4d2c00 is deleted tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 Waiting (max 60 seconds) for system process `vnlru' to stop... done Waiting (max 60 seconds) for system process `syncer' to stop... Syncing disks, vnodes remaining... 14 0 done All buffers synced. Uptime: 1m0s if_delmulti_locked: detaching ifnet instance 0xfffffe0058574800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058574800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058574800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a45800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46000 acpi0: Powering system off serialport: VM disconnected.