last executing test programs: 19.759979997s ago: executing program 1 (id=1008): r0 = kqueue() kevent(r0, &(0x7f0000000380)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x9, [0xfffffffffffffffe]}, {0x9, 0xfffffffffffffffb, 0x0, 0x80000000, 0x800000000001, 0x101, [0x1, 0x8000000000000001, 0x1, 0xa42f]}], 0x2, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x6e, 0x0, 0x0) r1 = fork() r2 = kqueue() kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)) writev(r2, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000200)="e59d7316d7e79dcbb8890ca600b794768299be123a63eab3", 0x18}, {&(0x7f0000000240)="759028e2afcb11c9a5ba5741819d1bc5d17cc6ad253233a8dc631592ba5164992e6c1109e2cf135316edf7c5a2e33d0acf60028a14416aced27d168b73e70a982bbe1d940c475c9abe2254f15c64b3ec5f4189564c97aabd5ab2b3f6e80c07403a5ee96d611da1c8d38be87521f4a979be86e41c20731995608f1cf6c07c1e0d2cf184689ab510e8a7278fb2ecc79ba91841cc03780327b50c905b2cf4971c520017becd55c0e5a3", 0xa8}, {&(0x7f0000000380)="825457c416308c742c0d8bc7800cf31432b0ba9971a3bcc4423d02522d8b56a23a3ba7005c00a0050a8f14e43c71757bc3c3d9869804bc81b9489087a4370e33648c98baf4e31ac0808342467903139a46", 0x51}], 0x4) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) procctl$PROC_PROTMAX_CTL(0x0, r1, 0xf, &(0x7f0000000100)=0x401) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x110206, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x40005aa8, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) socket(0x11, 0x3, 0x0) r3 = socket(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) mkdir(0x0, 0x82) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000000)={'bbr\x00', 0x6}, 0x24) connect$inet(r3, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r3, &(0x7f0000002580)={0x0, 0x19, &(0x7f0000000100)=[{&(0x7f0000000140)="4640c719021399600f76aac84cf9aec359d5c9ce67f6453118a67100f014e0c44ebc7bc3ef22bca56aa8f60468ba787ced0d999f926f54ab63ee1e", 0xfffffe89}], 0x1, 0x0, 0x0, 0x180}, 0x20104) rfork(0x85000) open$dir(0x0, 0x2, 0x64) kqueue() r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f00000000c0)={0x15, 0xe, 0x18, &(0x7f0000000000)="0b6fac4103f48e8d08afe5de81d4755aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d866997}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x10000, &(0x7f0000000a00), 0x0, 0x0, 0x0}) 18.000063549s ago: executing program 3 (id=1010): r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r2, 0x0) mount(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000100)="7b0e4d2905b83c68e57f9ddcd81914a45fca5ef8d87e75b7b2f6e6140066b3b3a1af3038df5091") mount(0x0, 0x0, 0x400, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x1, 0x10d) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0)}], 0x1, 0x0) truncate(0x0, 0xaa480) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x100000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000000)={0x15, 0x0, 0x20, &(0x7f0000000940)="0b6fac4103e7a00d4689e808d0d4755aedaacdd4743c7eaa2c7300d05fe86026", 0x0, 0x0, 0x40, 0x7d86699a, [0x0, 0x0, 0x0, 0x3]}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x10000, &(0x7f0000000380), 0x0, 0x0, 0x0}) r5 = fork() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) aio_mlock(&(0x7f0000000340)={r0, 0x7, &(0x7f0000000180)="760c0d96bbbc95d960054f18f45b9a70b9896f30a8a6eea3aaf8b8e5db688f0670d937ee59d90f3fc46aa1b55bb365c9c3c2cd35999b43a48bc313596c6ca7bc4472a5d06ed5bd18dd3d3c771e2bd8083f69e1b851d00c07cbc447941df4a4880b625662b748ea2d21bed58eec201f638defc87aff23cc51b8deb58b62377d944bc4bec3e75519ebc1db8967fbfa4bf740df486ccc3e1f", 0x97, [0x1, 0x10], 0x3, 0x6, 0x7be9, {0x4, 0x9, &(0x7f0000000240)="76442c35ab1342cef7481c6eb13e99513f12270dee344c5eb3b734cde32bebc54fedbe22a9f93c90093c47204d0490cc5e01779ebbe98aab7f99a7514bcb3ac41e77e8d4ac4688dda80f615e31edf5f55ede05fa7fcd168a7f813411ad43483c4a741537e57087e7c2ae00d381bcc060327bf0d3128f268b8fbe52c554013919c19fc1d64b3173d6eb9d2de1a5b2cb8fe9275ff9acf0be059c95df0417e5e4488523f492e1aceb0f1cc6153bc5172227b12fc5ec0b8169656bad55cab70aec090c2c64b3b63625d3f993b5c9b8a5834dd809cb73bd4ee17bfbb6a0295857e36bda38c4cc4d"}, {0x0, 0x12, @sival_ptr=0xef90, @tid=r5}}) bindat$unix(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) openat(r1, 0x0, 0x2000000, 0x110) open(0x0, 0x200, 0x124) 17.770417411s ago: executing program 0 (id=1011): r0 = semget$private(0x0, 0x7, 0x3c0) __semctl$GETPID(r0, 0xe3e0d8fce4d88a2c, 0x4) r1 = socket(0x11, 0x3, 0x0) r2 = kqueue() sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r3, 0x80047462, &(0x7f00000003c0)) kevent(r2, &(0x7f0000000380)=[{0x9, 0xfffffffffffffffb, 0x0, 0x80000000, 0x1, 0x101, [0x1, 0x8000000000000001, 0x1, 0xa42f]}], 0x1, 0x0, 0x0, 0x0) kqueue() openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x40005aa8, 0xffffffffffffffff) mlock(&(0x7f0000663000/0x3000)=nil, 0x3000) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f00000000c0)={0x15, 0xe, 0x18, &(0x7f0000000000)="0b6fac4103f48e8d08afe5de81d4755aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d866997}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x10000, &(0x7f0000000a00), 0x0, 0x0, 0x0}) sendto$unix(r1, &(0x7f0000000740)="b100050390000000050008000500ca900f0e08fece6ef0ffffffffffff3fd3357afaeb2c0900852e126336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f312388ba86b4f230526ee01be657aea8c5000000020000000000000f0200a371a3f800000080ef80000001000000000000000000", 0xb1, 0x20100, 0x0, 0x0) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = socket(0x11, 0x10000000000003, 0x0) setsockopt$sock_int(r6, 0xffff, 0x8000, 0x0, 0x0) sendto$unix(r6, &(0x7f0000000140)="b10005019000e80348031bc75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a371a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x0, 0x0, 0x0) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x1c) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r7, 0x84, 0x101, &(0x7f0000000380)={@in={{0x10, 0x2, 0x0, @multicast2}}, r8, 0x1, 0x4819f9df, 0x1000000, 0x8368, 0x7fffffff}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(0xffffffffffffff9c, 0x84, 0x24, &(0x7f00000002c0)={r8, @in={{0x10, 0x2, 0x3, @loopback}}, 0x7}, &(0x7f0000000080)=0x90) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x901, &(0x7f00000000c0)={r8, 0x3, 0x7, [0x1, 0x7, 0x353, 0x9, 0x5b9, 0x7fff, 0x3]}, &(0x7f0000000100)=0x16) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f00000003c0)={@in6={{0x1c, 0x1c, 0x3, 0x4, @mcast2, 0xe00d}}, 0x0}, &(0x7f0000000340)=0x88) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x0, 0xaeb, @mcast2, 0xc3af}, 0x1c, &(0x7f0000000140)=[{&(0x7f00000001c0)="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", 0xfb}], 0x1, &(0x7f0000000480)=[@sndinfo={0x1c, 0x84, 0x4, {0x3ff, 0x1220, 0x1, 0x6}}, @dstaddrv4={0x10}, @init={0x14, 0x84, 0x1, {0x8, 0xfffd, 0xfff6, 0x85}}, @authinfo={0x10, 0x84, 0x8, {0x4}}, @init={0x14, 0x84, 0x1, {0xff, 0x4, 0x800, 0x3}}, @authinfo={0x10, 0x84, 0x8, {0x6}}, @sndinfo={0x1c, 0x84, 0x4, {0x0, 0x1020, 0x401, 0x7fffffff, r9}}], 0x90, 0x8}, 0x2008c) setsockopt$sock_int(r5, 0xffff, 0x1014, &(0x7f0000000040)=0xfffffff7, 0x4) 14.732724248s ago: executing program 0 (id=1012): r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r2, 0x0) mount(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000100)="7b0e4d2905b83c68e57f9ddcd81914a45fca5ef8d87e75b7b2f6e6140066b3b3a1af3038df5091") mount(0x0, 0x0, 0x400, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x1, 0x10d) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0)}], 0x1, 0x0) truncate(0x0, 0xaa480) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x100000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000000)={0x15, 0x0, 0x20, &(0x7f0000000940)="0b6fac4103e7a00d4689e808d0d4755aedaacdd4743c7eaa2c7300d05fe86026", 0x0, 0x0, 0x40, 0x7d86699a, [0x0, 0x0, 0x0, 0x3]}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x10000, &(0x7f0000000380), 0x0, 0x0, 0x0}) r5 = fork() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) aio_mlock(&(0x7f0000000340)={r0, 0x7, &(0x7f0000000180)="760c0d96bbbc95d960054f18f45b9a70b9896f30a8a6eea3aaf8b8e5db688f0670d937ee59d90f3fc46aa1b55bb365c9c3c2cd35999b43a48bc313596c6ca7bc4472a5d06ed5bd18dd3d3c771e2bd8083f69e1b851d00c07cbc447941df4a4880b625662b748ea2d21bed58eec201f638defc87aff23cc51b8deb58b62377d944bc4bec3e75519ebc1db8967fbfa4bf740df486ccc3e1f", 0x97, [0x1, 0x10], 0x3, 0x6, 0x7be9, {0x4, 0x9, &(0x7f0000000240)="76442c35ab1342cef7481c6eb13e99513f12270dee344c5eb3b734cde32bebc54fedbe22a9f93c90093c47204d0490cc5e01779ebbe98aab7f99a7514bcb3ac41e77e8d4ac4688dda80f615e31edf5f55ede05fa7fcd168a7f813411ad43483c4a741537e57087e7c2ae00d381bcc060327bf0d3128f268b8fbe52c554013919c19fc1d64b3173d6eb9d2de1a5b2cb8fe9275ff9acf0be059c95df0417e5e4488523f492e1aceb0f1cc6153bc5172227b12fc5ec0b8169656bad55cab70aec090c2c64b3b63625d3f993b5c9b8a5834dd809cb73bd4ee17bfbb6a0295857e36bda38c4cc4d"}, {0x0, 0x12, @sival_ptr=0xef90, @tid=r5}}) bindat$unix(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) openat(r1, 0x0, 0x2000000, 0x110) open(0x0, 0x200, 0x124) 14.666915428s ago: executing program 1 (id=1013): r0 = kqueue() kevent(r0, &(0x7f0000000380)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x9, [0xfffffffffffffffe]}, {0x9, 0xfffffffffffffffb, 0x0, 0x80000000, 0x800000000001, 0x101, [0x1, 0x8000000000000001, 0x1, 0xa42f]}], 0x2, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x6e, 0x0, 0x0) r1 = fork() r2 = kqueue() kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)) writev(r2, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000200)="e59d7316d7e79dcbb8890ca600b794768299be123a63eab3", 0x18}, {&(0x7f0000000240)="759028e2afcb11c9a5ba5741819d1bc5d17cc6ad253233a8dc631592ba5164992e6c1109e2cf135316edf7c5a2e33d0acf60028a14416aced27d168b73e70a982bbe1d940c475c9abe2254f15c64b3ec5f4189564c97aabd5ab2b3f6e80c07403a5ee96d611da1c8d38be87521f4a979be86e41c20731995608f1cf6c07c1e0d2cf184689ab510e8a7278fb2ecc79ba91841cc03780327b50c905b2cf4971c520017becd55c0e5a3", 0xa8}, {&(0x7f0000000380)="825457c416308c742c0d8bc7800cf31432b0ba9971a3bcc4423d02522d8b56a23a3ba7005c00a0050a8f14e43c71757bc3c3d9869804bc81b9489087a4370e33648c98baf4e31ac0808342467903139a46", 0x51}], 0x4) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) procctl$PROC_PROTMAX_CTL(0x0, r1, 0xf, &(0x7f0000000100)=0x401) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x110206, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x40005aa8, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) socket(0x11, 0x3, 0x0) r3 = socket(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) mkdir(0x0, 0x82) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000000)={'bbr\x00', 0x6}, 0x24) connect$inet(r3, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r3, &(0x7f0000002580)={0x0, 0x19, &(0x7f0000000100)=[{&(0x7f0000000140)="4640c719021399600f76aac84cf9aec359d5c9ce67f6453118a67100f014e0c44ebc7bc3ef22bca56aa8f60468ba787ced0d999f926f54ab63ee1e", 0xfffffe89}], 0x1, 0x0, 0x0, 0x180}, 0x20104) rfork(0x85000) open$dir(0x0, 0x2, 0x64) kqueue() r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f00000000c0)={0x15, 0xe, 0x18, &(0x7f0000000000)="0b6fac4103f48e8d08afe5de81d4755aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d866997}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x10000, &(0x7f0000000a00), 0x0, 0x0, 0x0}) 14.662130462s ago: executing program 2 (id=1014): openat$crypto(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x400000, 0x1d7) mknodat(0xffffffffffffff9c, 0x0, 0x1000, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) chmod(0x0, 0xb15c7135d99ca56b) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0xc00, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f0000001240)={@multicast2, @broadcast}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f00000001c0)={@multicast2, @rand_addr=0x4}, 0xc) r2 = dup2(r1, r1) r3 = kqueue() kevent(r3, 0x0, 0x0, &(0x7f0000000940)=[{}], 0x1, 0x0) sendto(r1, &(0x7f0000000200)="f69471b0bc5e66a942979a2692bf5d84412ddda124db6bf7c319f79194fb8aa794db7482ce3e91abb35d25fb4924c1fc5551f7566ff4935d83a65079a483e6ebf3a79ea480808846ff4c346090d2765455b9e1856258b4c14602671832338058f2e0c0830f09bb7250e36a07489fb6f14562f07e528b7a8b7f6017f159bf051b25a40eace7263ab3d74a3aac73aa1fe1e1fdbb5189b757b6cee9aa9253cd6d7e8c311857bd1e386d3facb7b6", 0xac, 0x100, 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, 0x0) kqueue() r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000040)={0x17, 0x0, 0x18, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x40]}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0xffe, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000280)}) kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0xca, [0x80000000000]}], 0x1, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) accept4(r5, 0x0, &(0x7f0000000000), 0x30000000) setsockopt$sock_int(r5, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r6, 0x40000000006, &(0x7f0000000240)="a3", 0x1, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sival_ptr=0x5}}) copy_file_range(r6, &(0x7f0000000000)=0x80000001, r6, 0x0, 0x100000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) 13.109326965s ago: executing program 3 (id=1015): pwritev(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0) r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x100000}}, {{0x1c, 0x1c, 0x3, 0x246, @ipv4, 0x2}}}, 0x108) rfork(0x85000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = open(0x0, 0x18289, 0x100) link(0x0, 0x0) write(r1, &(0x7f0000000100)="b96abcf5ac7cffa09ea845315c0d85", 0xfffffe48) mkdir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1001, 0x0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000180)={0x1f, 0x1, 0x0, 0xfffffffe}) r3 = fork() sigqueue(r3, 0xf, @sigval_ptr=0x2) wait4(r3, &(0x7f0000000000), 0x2, 0x0) getsockopt$inet_tcp_TCP_TXTLS_MODE(r2, 0x6, 0x28, 0x0, &(0x7f0000000140)) lseek(r1, 0x400103, 0x1) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x50, &(0x7f00000000c0)={0xd, {{0x1c, 0x1c, 0x1, 0x8000000, @rand_addr="7d523366ff63366b8d8704c96993a4ce", 0x5}}, {{0x1c, 0x1c, 0x2, 0x246, @ipv4={'\x00', '\xff\xff', @loopback}, 0x2}}}, 0x108) rfork(0x1000) 11.344251395s ago: executing program 1 (id=1016): r0 = kqueue() kevent(r0, &(0x7f0000000380)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x9, [0xfffffffffffffffe]}, {0x9, 0xfffffffffffffffb, 0x0, 0x80000000, 0x800000000001, 0x101, [0x1, 0x8000000000000001, 0x1, 0xa42f]}], 0x2, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x6e, 0x0, 0x0) r1 = fork() r2 = kqueue() kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)) writev(r2, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000200)="e59d7316d7e79dcbb8890ca600b794768299be123a63eab3", 0x18}, {&(0x7f0000000240)="759028e2afcb11c9a5ba5741819d1bc5d17cc6ad253233a8dc631592ba5164992e6c1109e2cf135316edf7c5a2e33d0acf60028a14416aced27d168b73e70a982bbe1d940c475c9abe2254f15c64b3ec5f4189564c97aabd5ab2b3f6e80c07403a5ee96d611da1c8d38be87521f4a979be86e41c20731995608f1cf6c07c1e0d2cf184689ab510e8a7278fb2ecc79ba91841cc03780327b50c905b2cf4971c520017becd55c0e5a3", 0xa8}, {&(0x7f0000000380)="825457c416308c742c0d8bc7800cf31432b0ba9971a3bcc4423d02522d8b56a23a3ba7005c00a0050a8f14e43c71757bc3c3d9869804bc81b9489087a4370e33648c98baf4e31ac0808342467903139a46", 0x51}], 0x4) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) procctl$PROC_PROTMAX_CTL(0x0, r1, 0xf, &(0x7f0000000100)=0x401) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x110206, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x40005aa8, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) socket(0x11, 0x3, 0x0) r3 = socket(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) mkdir(0x0, 0x82) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000000)={'bbr\x00', 0x6}, 0x24) connect$inet(r3, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r3, &(0x7f0000002580)={0x0, 0x19, &(0x7f0000000100)=[{&(0x7f0000000140)="4640c719021399600f76aac84cf9aec359d5c9ce67f6453118a67100f014e0c44ebc7bc3ef22bca56aa8f60468ba787ced0d999f926f54ab63ee1e", 0xfffffe89}], 0x1, 0x0, 0x0, 0x180}, 0x20104) rfork(0x85000) mlock(&(0x7f0000663000/0x3000)=nil, 0x3000) kqueue() r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f00000000c0)={0x15, 0xe, 0x18, &(0x7f0000000000)="0b6fac4103f48e8d08afe5de81d4755aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d866997}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x10000, &(0x7f0000000a00), 0x0, 0x0, 0x0}) 11.307939418s ago: executing program 2 (id=1017): openat$crypto(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x400000, 0x1d7) mknodat(0xffffffffffffff9c, 0x0, 0x1000, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) chmod(0x0, 0xb15c7135d99ca56b) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0xc00, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f0000001240)={@multicast2, @broadcast}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f00000001c0)={@multicast2, @rand_addr=0x4}, 0xc) r2 = dup2(r1, r1) r3 = kqueue() kevent(r3, 0x0, 0x0, &(0x7f0000000940)=[{}], 0x1, 0x0) sendto(r1, &(0x7f0000000200)="f69471b0bc5e66a942979a2692bf5d84412ddda124db6bf7c319f79194fb8aa794db7482ce3e91abb35d25fb4924c1fc5551f7566ff4935d83a65079a483e6ebf3a79ea480808846ff4c346090d2765455b9e1856258b4c14602671832338058f2e0c0830f09bb7250e36a07489fb6f14562f07e528b7a8b7f6017f159bf051b25a40eace7263ab3d74a3aac73aa1fe1e1fdbb5189b757b6cee9aa9253cd6d7e8c311857bd1e386d3facb7b6", 0xac, 0x100, 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, 0x0) kqueue() r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000040)={0x17, 0x0, 0x18, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x40]}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0xffe, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000280)}) kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0xca, [0x80000000000]}], 0x1, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) accept4(r5, 0x0, &(0x7f0000000000), 0x30000000) setsockopt$sock_int(r5, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r6, 0x40000000006, &(0x7f0000000240)="a3", 0x1, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sival_ptr=0x5}}) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) 11.169370296s ago: executing program 3 (id=1018): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) connectat$unix(0xffffffffffffffff, r0, &(0x7f0000000380)=@file={0xa, 0x0, './file0\x00'}, 0xa) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) freebsd10_pipe(0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x40, 0x0) open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x30) posix_fadvise(0xffffffffffffffff, 0x0, 0x1, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) r3 = socket(0x2, 0x1, 0x0) fstatat(r3, &(0x7f0000000040)='\x00', &(0x7f0000000400), 0x4000) ioctl$MDIOCATTACH(r2, 0xc1c06d00, &(0x7f0000000780)={0x0, 0x400, 0x4, 0x0, 0x800000008, 0x4, 0x0, 0x8001, 0x20, 0xa7, 0x0, [0x18, 0x6, 0x0, 0x3, 0x4, 0x4, 0x91e, 0xf, 0x3, 0x7, 0x8, 0x7, 0x4ed, 0x7, 0x8000001, 0xfffffff3, 0x9, 0xfeff3382, 0x6, 0x2, 0x401, 0x9, 0xcde, 0x100, 0xfffffff8, 0x7, 0x6, 0x0, 0x7, 0x5ba, 0x0, 0xffbffffa, 0x9, 0x9e9e, 0x3d5532c0, 0x8, 0xfffeffff, 0x8000, 0x2, 0x1, 0xfff, 0x80, 0x0, 0x7, 0x0, 0x3, 0x800006, 0x80000003, 0xfce, 0x2, 0xfffffff3, 0x6ddbd7a4, 0x4, 0x300, 0xae, 0x8, 0x2000086, 0x54, 0x20, 0x3, 0x8001, 0x9, 0x7a, 0x8, 0x8, 0xa, 0x10001, 0xfffffff5, 0x1000, 0x80, 0x9, 0x7, 0x20006, 0x0, 0x2, 0x9, 0x388d, 0x0, 0x3, 0xfffffffc, 0x3, 0x44000000, 0x80000001, 0xffffffff, 0x5, 0xcd, 0x10000, 0xc, 0x1, 0xff, 0x4000002, 0xe6, 0x7fffffff, 0x5, 0xc0b0, 0x81]}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r4, 0x6, 0x29, 0x0, 0x0) freebsd10_pipe(0x0) close(0xffffffffffffffff) r5 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x22, 0x0, 0x0) bind$inet6(r5, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x6, @empty, 0x2}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @rand_addr="00000000080001000000001b00", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x2, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}}) ioctl$MDIOCQUERY(0xffffffffffffffff, 0xc1c06d02, 0x0) lchmod(&(0x7f0000000080)='./file0/file0\x00', 0x0) setsockopt$inet_opts(r5, 0x0, 0x200000000000c, &(0x7f0000000140)="12b5ae3390920a42dfeedf8bc3d2d3a1e93743b2bfd0c4a7a6141f8a354cfc2a4865078b4f8355b4c62f16ebf104a25d1924fb5930", 0x35) syz_emit_ethernet(0x4e, &(0x7f00000000c0)=ANY=[]) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) 9.714752986s ago: executing program 0 (id=1019): r0 = kqueue() kevent(r0, &(0x7f0000000380)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x9, [0xfffffffffffffffe]}, {0x9, 0xfffffffffffffffb, 0x0, 0x80000000, 0x800000000001, 0x101, [0x1, 0x8000000000000001, 0x1, 0xa42f]}], 0x2, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x6e, 0x0, 0x0) r1 = fork() r2 = kqueue() kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)) writev(r2, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000200)="e59d7316d7e79dcbb8890ca600b794768299be123a63eab3", 0x18}, {&(0x7f0000000240)="759028e2afcb11c9a5ba5741819d1bc5d17cc6ad253233a8dc631592ba5164992e6c1109e2cf135316edf7c5a2e33d0acf60028a14416aced27d168b73e70a982bbe1d940c475c9abe2254f15c64b3ec5f4189564c97aabd5ab2b3f6e80c07403a5ee96d611da1c8d38be87521f4a979be86e41c20731995608f1cf6c07c1e0d2cf184689ab510e8a7278fb2ecc79ba91841cc03780327b50c905b2cf4971c520017becd55c0e5a3", 0xa8}, {&(0x7f0000000380)="825457c416308c742c0d8bc7800cf31432b0ba9971a3bcc4423d02522d8b56a23a3ba7005c00a0050a8f14e43c71757bc3c3d9869804bc81b9489087a4370e33648c98baf4e31ac0808342467903139a46", 0x51}], 0x4) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) procctl$PROC_PROTMAX_CTL(0x0, r1, 0xf, &(0x7f0000000100)=0x401) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x110206, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x40005aa8, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) socket(0x11, 0x3, 0x0) r3 = socket(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) mkdir(0x0, 0x82) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000000)={'bbr\x00', 0x6}, 0x24) connect$inet(r3, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r3, &(0x7f0000002580)={0x0, 0x19, &(0x7f0000000100)=[{&(0x7f0000000140)="4640c719021399600f76aac84cf9aec359d5c9ce67f6453118a67100f014e0c44ebc7bc3ef22bca56aa8f60468ba787ced0d999f926f54ab63ee1e", 0xfffffe89}], 0x1, 0x0, 0x0, 0x180}, 0x20104) rfork(0x85000) mlock(&(0x7f0000663000/0x3000)=nil, 0x3000) kqueue() r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f00000000c0)={0x15, 0xe, 0x18, &(0x7f0000000000)="0b6fac4103f48e8d08afe5de81d4755aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d866997}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x10000, &(0x7f0000000a00), 0x0, 0x0, 0x0}) 8.554693467s ago: executing program 2 (id=1020): r0 = socket(0x2, 0x1, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x4, 0x20) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) flock(r1, 0x3) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) r2 = socket(0x1c, 0x5, 0x3) extattr_set_fd(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x6, @empty, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x2, 0x4, @loopback, 0x10001}, 0x1c) fcntl$lock(0xffffffffffffffff, 0x9, 0x0) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xd}, 0x24) sendto$inet6(r3, 0x0, 0x0, 0x60280, &(0x7f00000000c0)={0x1c, 0x1c, 0x2, 0x8, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c) r4 = socket(0x1, 0x20000000, 0xa) setsockopt$sock_int(r4, 0xffff, 0x8000, 0x0, 0x0) sendto$unix(r4, &(0x7f0000000140)="b10005019000e80348031bc75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a371a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x0, 0x0, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x1c) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0x101, &(0x7f0000000380)={@in={{0x10, 0x2, 0x0, @multicast2}}, r6, 0x1, 0x4819f9df, 0x1000000, 0x8368, 0x7fffffff}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(0xffffffffffffff9c, 0x84, 0x24, &(0x7f00000002c0)={r6, @in={{0x10, 0x2, 0x3, @loopback}}, 0x7}, &(0x7f0000000080)=0x90) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344}, 0x6edb0ba3, 0x1) syz_extract_tcp_res(&(0x7f0000000140)={0x41424344}, 0x0, 0x4) syz_emit_ethernet(0x117, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000000000000086dd6000181100e10900cb697a653e336f000000500000000000ff0100000000000000000000000000014e214e20", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="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"]) getsockopt$inet6_tcp_buf(r3, 0x6, 0x23, &(0x7f0000002680)=""/4088, &(0x7f0000000000)=0xff8) rfork(0x85000) 6.320654462s ago: executing program 3 (id=1021): openat$crypto(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x400000, 0x1d7) mknodat(0xffffffffffffff9c, 0x0, 0x1000, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) chmod(0x0, 0xb15c7135d99ca56b) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0xc00, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f0000001240)={@multicast2, @broadcast}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f00000001c0)={@multicast2, @rand_addr=0x4}, 0xc) r2 = dup2(r1, r1) r3 = kqueue() kevent(r3, 0x0, 0x0, &(0x7f0000000940)=[{}], 0x1, 0x0) sendto(r1, &(0x7f0000000200)="f69471b0bc5e66a942979a2692bf5d84412ddda124db6bf7c319f79194fb8aa794db7482ce3e91abb35d25fb4924c1fc5551f7566ff4935d83a65079a483e6ebf3a79ea480808846ff4c346090d2765455b9e1856258b4c14602671832338058f2e0c0830f09bb7250e36a07489fb6f14562f07e528b7a8b7f6017f159bf051b25a40eace7263ab3d74a3aac73aa1fe1e1fdbb5189b757b6cee9aa9253cd6d7e8c311857bd1e386d3facb7b6", 0xac, 0x100, 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, 0x0) kqueue() r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000040)={0x17, 0x0, 0x18, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x40]}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0xffe, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000280)}) kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0xca, [0x80000000000]}], 0x1, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) accept4(r5, 0x0, &(0x7f0000000000), 0x30000000) setsockopt$sock_int(r5, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r6, 0x40000000006, &(0x7f0000000240)="a3", 0x1, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sival_ptr=0x5}}) copy_file_range(r6, &(0x7f0000000000)=0x80000001, r6, 0x0, 0x100000, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) 6.297792659s ago: executing program 1 (id=1022): syz_emit_ethernet(0xe, &(0x7f0000000000)=ANY=[@ANYBLOB]) getresuid(0x0, 0x0, 0x0) setrlimit(0x7, 0x0) setreuid(0xee00, 0x0) r0 = socket$inet6_udp(0x1c, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) execve(0x0, 0x0, &(0x7f0000000280)=[&(0x7f0000000080)='\x00', &(0x7f0000000480)='\x00']) writev(r1, &(0x7f0000000280), 0x26) write(r1, &(0x7f00000004c0)="9665a44f", 0x2000) 5.935777153s ago: executing program 0 (id=1023): openat$crypto(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x400000, 0x1d7) mknodat(0xffffffffffffff9c, 0x0, 0x1000, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) chmod(0x0, 0xb15c7135d99ca56b) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0xc00, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f0000001240)={@multicast2, @broadcast}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f00000001c0)={@multicast2, @rand_addr=0x4}, 0xc) r2 = dup2(r1, r1) r3 = kqueue() kevent(r3, 0x0, 0x0, &(0x7f0000000940)=[{}], 0x1, 0x0) sendto(r1, &(0x7f0000000200)="f69471b0bc5e66a942979a2692bf5d84412ddda124db6bf7c319f79194fb8aa794db7482ce3e91abb35d25fb4924c1fc5551f7566ff4935d83a65079a483e6ebf3a79ea480808846ff4c346090d2765455b9e1856258b4c14602671832338058f2e0c0830f09bb7250e36a07489fb6f14562f07e528b7a8b7f6017f159bf051b25a40eace7263ab3d74a3aac73aa1fe1e1fdbb5189b757b6cee9aa9253cd6d7e8c311857bd1e386d3facb7b6", 0xac, 0x100, 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, 0x0) kqueue() r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000040)={0x17, 0x0, 0x18, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x40]}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0xffe, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000280)}) kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0xca, [0x80000000000]}], 0x1, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) accept4(r5, 0x0, &(0x7f0000000000), 0x30000000) setsockopt$sock_int(r5, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r6, 0x40000000006, &(0x7f0000000240)="a3", 0x1, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sival_ptr=0x5}}) copy_file_range(r6, &(0x7f0000000000)=0x80000001, r6, 0x0, 0x100000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x8) 5.837974666s ago: executing program 2 (id=1024): r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r2, 0x0) mount(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000100)="7b0e4d2905b83c68e57f9ddcd81914a45fca5ef8d87e75b7b2f6e6140066b3b3a1af3038df5091") mount(0x0, 0x0, 0x400, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x1, 0x10d) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0)}], 0x1, 0x0) truncate(0x0, 0xaa480) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x100000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000000)={0x15, 0x0, 0x20, &(0x7f0000000940)="0b6fac4103e7a00d4689e808d0d4755aedaacdd4743c7eaa2c7300d05fe86026", 0x0, 0x0, 0x40, 0x7d86699a, [0x0, 0x0, 0x0, 0x3]}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x10000, &(0x7f0000000380), 0x0, 0x0, 0x0}) r5 = fork() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) aio_mlock(&(0x7f0000000340)={r0, 0x7, &(0x7f0000000180)="760c0d96bbbc95d960054f18f45b9a70b9896f30a8a6eea3aaf8b8e5db688f0670d937ee59d90f3fc46aa1b55bb365c9c3c2cd35999b43a48bc313596c6ca7bc4472a5d06ed5bd18dd3d3c771e2bd8083f69e1b851d00c07cbc447941df4a4880b625662b748ea2d21bed58eec201f638defc87aff23cc51b8deb58b62377d944bc4bec3e75519ebc1db8967fbfa4bf740df486ccc3e1f", 0x97, [0x1, 0x10], 0x3, 0x6, 0x7be9, {0x4, 0x9, &(0x7f0000000240)="76442c35ab1342cef7481c6eb13e99513f12270dee344c5eb3b734cde32bebc54fedbe22a9f93c90093c47204d0490cc5e01779ebbe98aab7f99a7514bcb3ac41e77e8d4ac4688dda80f615e31edf5f55ede05fa7fcd168a7f813411ad43483c4a741537e57087e7c2ae00d381bcc060327bf0d3128f268b8fbe52c554013919c19fc1d64b3173d6eb9d2de1a5b2cb8fe9275ff9acf0be059c95df0417e5e4488523f492e1aceb0f1cc6153bc5172227b12fc5ec0b8169656bad55cab70aec090c2c64b3b63625d3f993b5c9b8a5834dd809cb73bd4ee17bfbb6a0295857e36bda38c4cc4d"}, {0x0, 0x12, @sival_ptr=0xef90, @tid=r5}}) bindat$unix(0xffffffffffffff9c, 0xffffffffffffffff, 0x0, 0x0) openat(r1, 0x0, 0x2000000, 0x110) open(0x0, 0x200, 0x124) 2.072817131s ago: executing program 1 (id=1025): r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r2, 0x0) mount(&(0x7f0000000140)='ntfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000100)="7b0e4d2905b83c68e57f9ddcd81914a45fca5ef8d87e75b7b2f6e6140066b3b3a1af3038df5091") mount(0x0, 0x0, 0x400, 0x0) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x1, 0x10d) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0)}], 0x1, 0x0) truncate(0x0, 0xaa480) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x100000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000000)={0x15, 0x0, 0x20, &(0x7f0000000940)="0b6fac4103e7a00d4689e808d0d4755aedaacdd4743c7eaa2c7300d05fe86026", 0x0, 0x0, 0x40, 0x7d86699a, [0x0, 0x0, 0x0, 0x3]}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000100)={0x0, 0x2, 0x0, 0x10000, &(0x7f0000000380), 0x0, 0x0, 0x0}) r5 = fork() preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) aio_mlock(&(0x7f0000000340)={r0, 0x7, &(0x7f0000000180)="760c0d96bbbc95d960054f18f45b9a70b9896f30a8a6eea3aaf8b8e5db688f0670d937ee59d90f3fc46aa1b55bb365c9c3c2cd35999b43a48bc313596c6ca7bc4472a5d06ed5bd18dd3d3c771e2bd8083f69e1b851d00c07cbc447941df4a4880b625662b748ea2d21bed58eec201f638defc87aff23cc51b8deb58b62377d944bc4bec3e75519ebc1db8967fbfa4bf740df486ccc3e1f", 0x97, [0x1, 0x10], 0x3, 0x6, 0x7be9, {0x4, 0x9, &(0x7f0000000240)="76442c35ab1342cef7481c6eb13e99513f12270dee344c5eb3b734cde32bebc54fedbe22a9f93c90093c47204d0490cc5e01779ebbe98aab7f99a7514bcb3ac41e77e8d4ac4688dda80f615e31edf5f55ede05fa7fcd168a7f813411ad43483c4a741537e57087e7c2ae00d381bcc060327bf0d3128f268b8fbe52c554013919c19fc1d64b3173d6eb9d2de1a5b2cb8fe9275ff9acf0be059c95df0417e5e4488523f492e1aceb0f1cc6153bc5172227b12fc5ec0b8169656bad55cab70aec090c2c64b3b63625d3f993b5c9b8a5834dd809cb73bd4ee17bfbb6a0295857e36bda38c4cc4d"}, {0x0, 0x12, @sival_ptr=0xef90, @tid=r5}}) socketpair$unix(0x1, 0x2, 0x0, 0x0) openat(r1, 0x0, 0x2000000, 0x110) open(0x0, 0x200, 0x124) 2.065878094s ago: executing program 0 (id=1026): openat$crypto(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) open(&(0x7f0000000280)='./file0\x00', 0x400000, 0x1d7) mknodat(0xffffffffffffff9c, 0x0, 0x1000, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) chmod(0x0, 0xb15c7135d99ca56b) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0xc00, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f0000001240)={@multicast2, @broadcast}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f00000001c0)={@multicast2, @rand_addr=0x4}, 0xc) r2 = dup2(r1, r1) r3 = kqueue() kevent(r3, 0x0, 0x0, &(0x7f0000000940)=[{}], 0x1, 0x0) sendto(r1, &(0x7f0000000200)="f69471b0bc5e66a942979a2692bf5d84412ddda124db6bf7c319f79194fb8aa794db7482ce3e91abb35d25fb4924c1fc5551f7566ff4935d83a65079a483e6ebf3a79ea480808846ff4c346090d2765455b9e1856258b4c14602671832338058f2e0c0830f09bb7250e36a07489fb6f14562f07e528b7a8b7f6017f159bf051b25a40eace7263ab3d74a3aac73aa1fe1e1fdbb5189b757b6cee9aa9253cd6d7e8c311857bd1e386d3facb7b6", 0xac, 0x100, 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, 0x0) kqueue() r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000040)={0x17, 0x0, 0x18, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x40]}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0xffe, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000280)}) kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0xca, [0x80000000000]}], 0x1, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) accept4(r5, 0x0, &(0x7f0000000000), 0x30000000) setsockopt$sock_int(r5, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r6, 0x40000000006, &(0x7f0000000240)="a3", 0x1, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sival_ptr=0x5}}) copy_file_range(r6, &(0x7f0000000000)=0x80000001, r6, 0x0, 0x100000, 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) 2.060525674s ago: executing program 3 (id=1027): procctl$PROC_REAP_STATUS(0x0, 0x0, 0x4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0}) sigqueue(r0, 0x66, @sigval_int) aio_cancel(0xffffffffffffffff, 0x0) kqueue() cpuset_getdomain(0x0, 0xfffffffffffffffa, 0xffffffffffffffff, 0x20, &(0x7f00000002c0), 0x0) r1 = socket(0x1c, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x32, &(0x7f0000000000)=ANY=[@ANYBLOB="1b14000000000000050200060c9a2eec"], 0xa8) connect$inet6(r1, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(r1, &(0x7f0000000200)="0e", 0xff66, 0x20bf0023, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000040)={'bbr\x00', 0xf}, 0x24) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(r2, 0x14040000) syz_emit_ethernet(0x3a, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000400), 0x200000, 0x0) ioctl$MDIOCATTACH(r3, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x20, 0x3, 0x0, 0x10000, 0x9, 0x3d, 0x8000000000000000, 0x0, 0x400, 0x0, [0x0, 0x4a5, 0x8ee, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x10004, 0x0, 0x0, 0xffffffff, 0x6, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0x7, 0x0, 0x3566510a, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0xfffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x653, 0x5, 0x2000, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x768]}) rfork(0x85000) syz_emit_ethernet(0x324, &(0x7f0000000b00)=ANY=[]) kqueue() socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0), 0x4) r4 = socket(0x1b, 0x3, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x188, 0x0, 0x0) r5 = socket$inet6(0x1c, 0x1, 0x0) getsockopt$inet6_int(r5, 0x29, 0x17, 0x0, &(0x7f0000000080)) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 2.057122949s ago: executing program 2 (id=1028): procctl$PROC_REAP_STATUS(0x0, 0x0, 0x4, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0}) sigqueue(r0, 0x66, @sigval_int) aio_cancel(0xffffffffffffffff, 0x0) kqueue() cpuset_getdomain(0x0, 0xfffffffffffffffa, 0xffffffffffffffff, 0x20, &(0x7f00000002c0), 0x0) r1 = socket(0x1c, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x32, &(0x7f0000000000)=ANY=[@ANYBLOB="1b14000000000000050200060c9a2eec"], 0xa8) connect$inet6(r1, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(r1, 0x0, 0x0, 0x20bf0023, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000040)={'bbr\x00', 0xf}, 0x24) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(r2, 0x14040000) syz_emit_ethernet(0x3a, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000400), 0x200000, 0x0) ioctl$MDIOCATTACH(r3, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x20, 0x3, 0x0, 0x10000, 0x9, 0x3d, 0x8000000000000000, 0x0, 0x400, 0x0, [0x0, 0x4a5, 0x8ee, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff, 0x0, 0x10004, 0x0, 0x0, 0xffffffff, 0x6, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x9, 0x7, 0x0, 0x3566510a, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0xfffffff8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x653, 0x5, 0x2000, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x768]}) rfork(0x85000) syz_emit_ethernet(0x324, &(0x7f0000000b00)=ANY=[]) kqueue() socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0), 0x4) r4 = socket(0x1b, 0x3, 0x0) sendto$inet6(r4, &(0x7f0000000180), 0x0, 0x188, 0x0, 0x0) r5 = socket$inet6(0x1c, 0x1, 0x0) getsockopt$inet6_int(r5, 0x29, 0x17, 0x0, &(0x7f0000000080)) bind$inet6(0xffffffffffffffff, 0x0, 0x0) 1.626461647s ago: executing program 3 (id=1029): r0 = kqueue() kevent(r0, &(0x7f0000000380)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x9, [0xfffffffffffffffe]}, {0x9, 0xfffffffffffffffb, 0x0, 0x80000000, 0x800000000001, 0x101, [0x1, 0x8000000000000001, 0x1, 0xa42f]}], 0x2, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x6e, 0x0, 0x0) r1 = fork() r2 = kqueue() kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)) writev(r2, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000200)="e59d7316d7e79dcbb8890ca600b794768299be123a63eab3", 0x18}, {&(0x7f0000000240)="759028e2afcb11c9a5ba5741819d1bc5d17cc6ad253233a8dc631592ba5164992e6c1109e2cf135316edf7c5a2e33d0acf60028a14416aced27d168b73e70a982bbe1d940c475c9abe2254f15c64b3ec5f4189564c97aabd5ab2b3f6e80c07403a5ee96d611da1c8d38be87521f4a979be86e41c20731995608f1cf6c07c1e0d2cf184689ab510e8a7278fb2ecc79ba91841cc03780327b50c905b2cf4971c520017becd55c0e5a3", 0xa8}, {&(0x7f0000000380)="825457c416308c742c0d8bc7800cf31432b0ba9971a3bcc4423d02522d8b56a23a3ba7005c00a0050a8f14e43c71757bc3c3d9869804bc81b9489087a4370e33648c98baf4e31ac0808342467903139a46", 0x51}], 0x4) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) procctl$PROC_PROTMAX_CTL(0x0, r1, 0xf, &(0x7f0000000100)=0x401) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x110206, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x40005aa8, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) socket(0x11, 0x3, 0x0) r3 = socket(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) mkdir(0x0, 0x82) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000000)={'bbr\x00', 0x6}, 0x24) connect$inet(r3, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r3, &(0x7f0000002580)={0x0, 0x19, &(0x7f0000000100)=[{&(0x7f0000000140)="4640c719021399600f76aac84cf9aec359d5c9ce67f6453118a67100f014e0c44ebc7bc3ef22bca56aa8f60468ba787ced0d999f926f54ab63ee1e", 0xfffffe89}], 0x1, 0x0, 0x0, 0x180}, 0x20104) rfork(0x85000) mlock(&(0x7f0000663000/0x3000)=nil, 0x3000) kqueue() r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f00000000c0)={0x15, 0xe, 0x18, &(0x7f0000000000)="0b6fac4103f48e8d08afe5de81d4755aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d866997}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x10000, &(0x7f0000000a00), 0x0, 0x0, 0x0}) 1.196245788s ago: executing program 2 (id=1030): r0 = socket(0x2, 0x1, 0x0) open$dir(&(0x7f0000000180)='./file0\x00', 0x4, 0x20) r1 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) flock(r1, 0x3) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) r2 = socket(0x1c, 0x5, 0x3) extattr_set_fd(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) bind$inet6(r2, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x6, @empty, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x2, 0x4, @loopback, 0x10001}, 0x1c) fcntl$lock(0xffffffffffffffff, 0x9, 0x0) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xd}, 0x24) sendto$inet6(r3, 0x0, 0x0, 0x60280, &(0x7f00000000c0)={0x1c, 0x1c, 0x2, 0x8, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c) r4 = socket(0x1, 0x20000000, 0xa) setsockopt$sock_int(r4, 0xffff, 0x8000, 0x0, 0x0) sendto$unix(r4, &(0x7f0000000140)="b10005019000e80348031bc75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a371a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x0, 0x0, 0x0) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x1c) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0x101, &(0x7f0000000380)={@in={{0x10, 0x2, 0x0, @multicast2}}, r6, 0x1, 0x4819f9df, 0x1000000, 0x8368, 0x7fffffff}, &(0x7f00000002c0)=0x98) getsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(0xffffffffffffff9c, 0x84, 0x24, &(0x7f00000002c0)={r6, @in={{0x10, 0x2, 0x3, @loopback}}, 0x7}, &(0x7f0000000080)=0x90) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344}, 0x6edb0ba3, 0x1) syz_extract_tcp_res(&(0x7f0000000140)={0x41424344}, 0x0, 0x4) syz_emit_ethernet(0x117, &(0x7f0000000440)=ANY=[@ANYBLOB="00000000000000000000000086dd6000181100e10900cb697a653e336f000000500000000000ff0100"/51, @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="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"]) getsockopt$inet6_tcp_buf(r3, 0x6, 0x23, &(0x7f0000002680)=""/4088, &(0x7f0000000000)=0xff8) rfork(0x85000) 296.091247ms ago: executing program 0 (id=1031): r0 = kqueue() kevent(r0, &(0x7f0000000380)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x9, [0xfffffffffffffffe]}, {0x9, 0xfffffffffffffffb, 0x0, 0x80000000, 0x800000000001, 0x101, [0x1, 0x8000000000000001, 0x1, 0xa42f]}], 0x2, 0x0, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x6e, 0x0, 0x0) r1 = fork() r2 = kqueue() kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000300)) writev(r2, &(0x7f0000000580)=[{0x0}, {&(0x7f0000000200)="e59d7316d7e79dcbb8890ca600b794768299be123a63eab3", 0x18}, {&(0x7f0000000240)="759028e2afcb11c9a5ba5741819d1bc5d17cc6ad253233a8dc631592ba5164992e6c1109e2cf135316edf7c5a2e33d0acf60028a14416aced27d168b73e70a982bbe1d940c475c9abe2254f15c64b3ec5f4189564c97aabd5ab2b3f6e80c07403a5ee96d611da1c8d38be87521f4a979be86e41c20731995608f1cf6c07c1e0d2cf184689ab510e8a7278fb2ecc79ba91841cc03780327b50c905b2cf4971c520017becd55c0e5a3", 0xa8}, {&(0x7f0000000380)="825457c416308c742c0d8bc7800cf31432b0ba9971a3bcc4423d02522d8b56a23a3ba7005c00a0050a8f14e43c71757bc3c3d9869804bc81b9489087a4370e33648c98baf4e31ac0808342467903139a46", 0x51}], 0x4) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) procctl$PROC_PROTMAX_CTL(0x0, r1, 0xf, &(0x7f0000000100)=0x401) open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x110206, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x40005aa8, 0xffffffffffffffff) setsockopt$inet_sctp_SCTP_DISABLE_FRAGMENTS(0xffffffffffffffff, 0x84, 0x9, 0x0, 0x0) socket(0x11, 0x3, 0x0) r3 = socket(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) mkdir(0x0, 0x82) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000000)={'bbr\x00', 0x6}, 0x24) connect$inet(r3, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r3, &(0x7f0000002580)={0x0, 0x19, &(0x7f0000000100)=[{&(0x7f0000000140)="4640c719021399600f76aac84cf9aec359d5c9ce67f6453118a67100f014e0c44ebc7bc3ef22bca56aa8f60468ba787ced0d999f926f54ab63ee1e", 0xfffffe89}], 0x1, 0x0, 0x0, 0x180}, 0x20104) rfork(0x85000) mlock(&(0x7f0000663000/0x3000)=nil, 0x3000) open$dir(0x0, 0x2, 0x64) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f00000000c0)={0x15, 0xe, 0x18, &(0x7f0000000000)="0b6fac4103f48e8d08afe5de81d4755aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d866997}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x10000, &(0x7f0000000a00), 0x0, 0x0, 0x0}) 0s ago: executing program 1 (id=1032): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) connectat$unix(0xffffffffffffffff, r0, &(0x7f0000000380)=@file={0xa, 0x0, './file0\x00'}, 0xa) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) freebsd10_pipe(0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x40, 0x0) open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x30) posix_fadvise(0xffffffffffffffff, 0x0, 0x1, 0x0) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) r3 = socket(0x2, 0x1, 0x0) fstatat(r3, &(0x7f0000000040)='\x00', &(0x7f0000000400), 0x4000) ioctl$MDIOCATTACH(r2, 0xc1c06d00, &(0x7f0000000780)={0x0, 0x400, 0x4, 0x0, 0x800000008, 0x4, 0x0, 0x8001, 0x20, 0xa7, 0x0, [0x18, 0x6, 0x0, 0x3, 0x4, 0x4, 0x91e, 0xf, 0x3, 0x7, 0x8, 0x7, 0x4ed, 0x7, 0x8000001, 0xfffffff3, 0x9, 0xfeff3382, 0x6, 0x2, 0x401, 0x9, 0xcde, 0x100, 0xfffffff8, 0x7, 0x6, 0x0, 0x7, 0x5ba, 0x0, 0xffbffffa, 0x9, 0x9e9e, 0x3d5532c0, 0x8, 0xfffeffff, 0x8000, 0x2, 0x1, 0xfff, 0x80, 0x0, 0x7, 0x0, 0x3, 0x800006, 0x80000003, 0xfce, 0x2, 0xfffffff3, 0x6ddbd7a4, 0x4, 0x300, 0xae, 0x8, 0x2000086, 0x54, 0x20, 0x3, 0x8001, 0x9, 0x7a, 0x8, 0x8, 0xa, 0x10001, 0xfffffff5, 0x1000, 0x80, 0x9, 0x7, 0x20006, 0x0, 0x2, 0x9, 0x388d, 0x0, 0x3, 0xfffffffc, 0x3, 0x44000000, 0x80000001, 0xffffffff, 0x5, 0xcd, 0x10000, 0xc, 0x1, 0xff, 0x4000002, 0xe6, 0x7fffffff, 0x5, 0xc0b0, 0x81]}) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r4, 0x6, 0x29, 0x0, 0x0) freebsd10_pipe(0x0) close(0xffffffffffffffff) r5 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_int(r5, 0x6, 0x22, 0x0, 0x0) bind$inet6(r5, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x6, @empty, 0x2}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x14, 0x6, 0x0, @rand_addr="00000000080001000000001b00", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x2, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}}}}}}}) ioctl$MDIOCQUERY(0xffffffffffffffff, 0xc1c06d02, 0x0) lchmod(&(0x7f0000000080)='./file0/file0\x00', 0x0) setsockopt$inet_opts(r5, 0x0, 0x200000000000c, &(0x7f0000000140)="12b5ae3390920a42dfeedf8bc3d2d3a1e93743b2bfd0c4a7a6141f8a354cfc2a4865078b4f8355b4c62f16ebf104a25d1924fb5930b735", 0x37) syz_emit_ethernet(0x4e, &(0x7f00000000c0)=ANY=[]) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.8' (ED25519) to the list of known hosts. md0: truncating fractional last sector by 8 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md1: truncating fractional last sector by 8 bytes md2: truncating fractional last sector by 8 bytes md3: truncating fractional last sector by 8 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md4: truncating fractional last sector by 8 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 Expensive callout(9) function: 0xffffffff814af9a0(0xfffffe006e94a8c0) 0.002615482 s if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md5: truncating fractional last sector by 8 bytes md6: truncating fractional last sector by 8 bytes md7: truncating fractional last sector by 8 bytes md8: truncating fractional last sector by 8 bytes md9: truncating fractional last sector by 8 bytes md10: truncating fractional last sector by 8 bytes md11: truncating fractional last sector by 8 bytes md12: truncating fractional last sector by 8 bytes md13: truncating fractional last sector by 8 bytes md14: truncating fractional last sector by 7 bytes md15: truncating fractional last sector by 8 bytes md16: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md17: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md18: truncating fractional last sector by 7 bytes md19: truncating fractional last sector by 8 bytes md20: truncating fractional last sector by 8 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054218800 md21: truncating fractional last sector by 7 bytes md22: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md23: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md24: truncating fractional last sector by 7 bytes md25: truncating fractional last sector by 7 bytes md26: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054218800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 Expensive callout(9) function: 0xffffffff81af52c0(0) 0.005268438 s if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md27: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md28: truncating fractional last sector by 7 bytes md29: truncating fractional last sector by 7 bytes md30: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md31: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md33: truncating fractional last sector by 7 bytes md34: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md35: truncating fractional last sector by 7 bytes md36: truncating fractional last sector by 7 bytes md37: truncating fractional last sector by 7 bytes md38: truncating fractional last sector by 7 bytes md39: truncating fractional last sector by 7 bytes md40: truncating fractional last sector by 7 bytes md41: truncating fractional last sector by 7 bytes md42: truncating fractional last sector by 7 bytes md43: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md44: truncating fractional last sector by 7 bytes md45: truncating fractional last sector by 7 bytes md46: truncating fractional last sector by 7 bytes md47: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054218800 md48: truncating fractional last sector by 7 bytes md49: truncating fractional last sector by 7 bytes md50: truncating fractional last sector by 7 bytes md51: truncating fractional last sector by 7 bytes md52: truncating fractional last sector by 7 bytes md53: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0054217000 md54: truncating fractional last sector by 7 bytes Out of ktrace request objects. md55: truncating fractional last sector by 7 bytes md56: truncating fractional last sector by 7 bytes md57: truncating fractional last sector by 7 bytes Jan 1 00:00:24 ci-freebsd-main-1 kernel: arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md58: truncating fractional last sector by 7 bytes Jan 1 00:00:10 ci-freebsd-main-1 kernel: arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.2.187 on tap2 md59: truncating fractional last sector by 7 bytes md60: truncating fractional last sector by 7 bytes md61: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0007795000 md62: truncating fractional last sector by 7 bytes md63: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0007795000 md64: truncating fractional last sector by 7 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0007795000 Jan 1 00:00:24 ci-freebsd-main-1 kernel: arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 if_delmulti_locked: detaching ifnet instance 0xfffffe0007795000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007795000 md65: truncating fractional last sector by 7 bytes md66: truncating fractional last sector by 7 bytes FreeBSD/amd64 (ci-freebsd-main-1.us-central1-b.c.syzkaller.internal) (ttyu0) login: if_delmulti_locked: detaching ifnet instance 0xfffffe0007795000 SYZFAIL: failed to send rpc fd=3 want=248 sent=0 n=-1 (errno 32: Broken pipe)