last executing test programs: 14.26264758s ago: executing program 0 (id=11): ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) open$dir(0x0, 0x200, 0x0) open$dir(&(0x7f00000000c0)='.\x00', 0x13689f7875b0fff6, 0x1de) r0 = socket(0x1c, 0x20000002, 0x0) fpathconf(r0, 0x3f) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r2 = dup2(r1, r1) ioctl$DIOCCHANGERULE(r2, 0x8048756d, &(0x7f0000000080)) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getpriority(0x0, 0xa) freebsd11_kevent(r2, &(0x7f0000000080)=[{0x5aabbaa5, 0xfffffffffffffff5, 0x40, 0x10, 0x0, 0x5}], 0x1, &(0x7f0000000180)=[{}], 0x1, &(0x7f0000000340)={0xfffffffb, 0x2}) socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) access(0x0, 0x0) setpriority(0x2, 0x7, 0x80000000) syz_emit_ethernet(0x30, &(0x7f0000000100)={@random="57001000", @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x22, 0x65, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1, {[@generic={0x44, 0x7, "e918c7b8a7"}]}}, @icmp=@generic={0x22, 0x2, 0x0, "a759"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1b, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000000)="0216010202000009000000000000004e", 0x10, 0x40000, 0x0, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) freebsd11_kevent(r4, &(0x7f0000001940)=[{0x6, 0xfffffffffffffff8, 0x4041, 0x8, 0x7, 0x7f}, {0x2, 0xfffffffffffffffb, 0x2, 0x100000008, 0x7fff, 0x1}], 0x2, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000001a40)={0x9, 0x80000000}) shmget$private(0x0, 0x2000, 0x4, &(0x7f00004fd000/0x2000)=nil) r6 = kqueue() freebsd11_kevent(r6, &(0x7f00000002c0)=[{0x1, 0xffffffffffffffff, 0x8, 0xc0000000}, {0x8000, 0xfffffffffffffffa, 0x80, 0x8, 0x200, 0x85d}, {0x3, 0xfffffffffffffffd, 0x2, 0x4, 0x800, 0xfffffffd}, {0x81, 0xfffffffffffffffc, 0x51, 0xc0000000, 0x80000000, 0x8}, {0x7, 0xfffffffffffffffa, 0x8001, 0x80, 0x44d, 0x3}], 0xccccf3e, 0x0, 0xfffffffffffffe9a, 0x0) 12.382962811s ago: executing program 2 (id=85): freebsd11_mknod(&(0x7f00000002c0)='./file0\x00', 0x1000, 0xfffffffd) r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x8, 0x800000b35d}) sigaltstack(&(0x7f0000ffc000/0x4000)=nil, 0x0) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() extattr_get_file(&(0x7f0000000340)='./file0/file1/file0\x00', 0x0, &(0x7f0000000ec0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f00000004c0)=""/155, 0x9b) syz_emit_ethernet(0x9c, &(0x7f0000000580)=ANY=[@ANYRES8=0x0, @ANYRESOCT, @ANYBLOB="ce34c3bb58f2151dab27d73c0b4dd49bd4d07983b33023e334a702a491f242344244e8b94ab927efcc6aca41f1bf4b7552ed81b3e6194c5c42daf1103eb51dbbeb42eacfc15c50b3629647c793e5c9a6ae841a44ad9d868d0deebab017977f06290bcac1ecddf1f93b426e2daeb6a4d8d743645a9b50ff99aa9187e4ea480fb608870cd59d5acf50cb8b69095ca75366115fe29fb70af9b4b44e334117f0b69236b82a30741a5d7fa3"]) clock_getres(0xa, &(0x7f0000000000)) aio_waitcomplete(0x0, 0x0) statfs(&(0x7f0000000380)='./file0/file1/file0\x00', &(0x7f0000000fc0)) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180)) execve(0x0, 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, 0xffffffffffffffff) open$dir(&(0x7f0000000300)='./file0/file1/file0\x00', 0x100, 0x176) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f0000000040)=0x3, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0xffff0000, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="fff71fdcedff000080009e000000e216", 0x3}, 0x1c) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x4) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_set_link(&(0x7f00000006c0)='./file0/file0\x00', 0x3, &(0x7f0000000700)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\xdc\x8e\xd3\xcb&\xb6\xc9:PM\x16SU\xcf\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1\xbe\xdfN\xe4\xe4\xba9\x81\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x00\x00+X\xf2R\xe1\x14\x81Q\xb4\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c\x0f\x9c\xe5\xd1\x1c]\x90\xdbTt\xe4O\xd1\xc6#\xc5}EXJ\xb5~\xa0\x87\x06\a\xc3f\xa3\xcb \xb6\xb1X\b\xba\x92', 0x0, 0x0) 11.286687181s ago: executing program 0 (id=11): ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) open$dir(0x0, 0x200, 0x0) open$dir(&(0x7f00000000c0)='.\x00', 0x13689f7875b0fff6, 0x1de) r0 = socket(0x1c, 0x20000002, 0x0) fpathconf(r0, 0x3f) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r2 = dup2(r1, r1) ioctl$DIOCCHANGERULE(r2, 0x8048756d, &(0x7f0000000080)) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getpriority(0x0, 0xa) freebsd11_kevent(r2, &(0x7f0000000080)=[{0x5aabbaa5, 0xfffffffffffffff5, 0x40, 0x10, 0x0, 0x5}], 0x1, &(0x7f0000000180)=[{}], 0x1, &(0x7f0000000340)={0xfffffffb, 0x2}) socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) access(0x0, 0x0) setpriority(0x2, 0x7, 0x80000000) syz_emit_ethernet(0x30, &(0x7f0000000100)={@random="57001000", @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x22, 0x65, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1, {[@generic={0x44, 0x7, "e918c7b8a7"}]}}, @icmp=@generic={0x22, 0x2, 0x0, "a759"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1b, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000000)="0216010202000009000000000000004e", 0x10, 0x40000, 0x0, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) freebsd11_kevent(r4, &(0x7f0000001940)=[{0x6, 0xfffffffffffffff8, 0x4041, 0x8, 0x7, 0x7f}, {0x2, 0xfffffffffffffffb, 0x2, 0x100000008, 0x7fff, 0x1}], 0x2, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000001a40)={0x9, 0x80000000}) shmget$private(0x0, 0x2000, 0x4, &(0x7f00004fd000/0x2000)=nil) r6 = kqueue() freebsd11_kevent(r6, &(0x7f00000002c0)=[{0x1, 0xffffffffffffffff, 0x8, 0xc0000000}, {0x8000, 0xfffffffffffffffa, 0x80, 0x8, 0x200, 0x85d}, {0x3, 0xfffffffffffffffd, 0x2, 0x4, 0x800, 0xfffffffd}, {0x81, 0xfffffffffffffffc, 0x51, 0xc0000000, 0x80000000, 0x8}, {0x7, 0xfffffffffffffffa, 0x8001, 0x80, 0x44d, 0x3}], 0xccccf3e, 0x0, 0xfffffffffffffe9a, 0x0) 9.335655147s ago: executing program 2 (id=87): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000180)=0xffffffff, 0x2b) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20101, &(0x7f0000000000)={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10) shutdown(0xffffffffffffffff, 0x1) r1 = fcntl$dupfd(r0, 0x11, r0) ioctl$SMB_READB(r0, 0xc020697a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) kqueue() r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000200)="b8a01439408216cceabd5301b2b836fd062a9c8f9acdcc67c117dcc42da85dfa0c3ecd9e657601dbbe85ce9c10b22d020c7d780c8deed01af76cdef5bd656bdcc7f5a9dd691f4607e9c5d6ff61f92b370094c6efda5a2f6337eec2a785de46c91e5fca3b710a4fa6d626d1e134faf08deb8e8a827f51bf9391b9599a54cbebc3fa3ff252f99da4e0535f4efbd6fd5972f87eac31c2a0a37f392021a3d4cedae8d9b5c78339a697f3", 0xa8}], 0x1, 0x0, 0x0, 0x20000}, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000080)={0x2}, 0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) dup(0xffffffffffffffff) ioctl$CRIOGET(0xffffffffffffffff, 0xc0046364, &(0x7f00000001c0)=0x456) socket(0x17, 0x4, 0x8) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 9.320137888s ago: executing program 3 (id=90): truncate(&(0x7f0000000080)='./file0\x00', 0x80008) cap_fcntls_get(0xffffffffffffffff, 0x0) sync() thr_suspend(0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_int(r0, 0x0, 0x2, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100000, 0x0) open$dir(0x0, 0x200, 0x72) rfork(0x4) truncate(&(0x7f00000003c0)='./file0\x00', 0x81) mount(&(0x7f0000000200)='ufs\x00', 0x0, 0x0, &(0x7f0000000140)) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000240)='\xb8o\xc9\xb7\xd1!7\xc0\x85\x97gB\x9f\x1b\xa70%;\xbc G\x9b$\xcd\xd9P/\xd9\xd2\xbc\xa1W3\xd0\xbc\xd3\xce\xbb'], 0x0) cpuset_getaffinity(0x3, 0x3, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x2a, 0x0, 0x20, &(0x7f0000000300)="ec7b00000900ff2425c109a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x9]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x4, 0x3fb, &(0x7f0000000800)="ff8c898646396880cbab0b53be54ed1603891091fbc12640764bec4632c2c9189535aa7b90a77e15d33ea17080b68890d2e5dc6c899b6a00669a585b883eef82b9f0221779a49bec5c39e92b43b50ecc3fa8b34696018438d5f3be24702b951687dc609137faedbc80669bd036812b86f460819b6a14c2534bee7f38e7d9755d8244727ff8c74f4af8c6cddbb5bd47a40285902fcbd0e024ea0fb5f0fa33d50d0664634c39e5f1d9e0edb2a8f43a8ddf0643a6841932d6d211e02a9d", 0x0, 0x0, &(0x7f00000005c0)="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"}) extattr_list_file(&(0x7f0000000380)='./file0\x00', 0x2, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000440)=""/49, 0x31, 0x1, &(0x7f00000001c0)=@abs={0x8, 0x0, 0x0, 0x0}, 0x8) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x6, [0x100, 0x3, 0x7]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 9.067007205s ago: executing program 0 (id=11): ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) open$dir(0x0, 0x200, 0x0) open$dir(&(0x7f00000000c0)='.\x00', 0x13689f7875b0fff6, 0x1de) r0 = socket(0x1c, 0x20000002, 0x0) fpathconf(r0, 0x3f) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r2 = dup2(r1, r1) ioctl$DIOCCHANGERULE(r2, 0x8048756d, &(0x7f0000000080)) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getpriority(0x0, 0xa) freebsd11_kevent(r2, &(0x7f0000000080)=[{0x5aabbaa5, 0xfffffffffffffff5, 0x40, 0x10, 0x0, 0x5}], 0x1, &(0x7f0000000180)=[{}], 0x1, &(0x7f0000000340)={0xfffffffb, 0x2}) socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) access(0x0, 0x0) setpriority(0x2, 0x7, 0x80000000) syz_emit_ethernet(0x30, &(0x7f0000000100)={@random="57001000", @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x22, 0x65, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1, {[@generic={0x44, 0x7, "e918c7b8a7"}]}}, @icmp=@generic={0x22, 0x2, 0x0, "a759"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1b, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000000)="0216010202000009000000000000004e", 0x10, 0x40000, 0x0, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) freebsd11_kevent(r4, &(0x7f0000001940)=[{0x6, 0xfffffffffffffff8, 0x4041, 0x8, 0x7, 0x7f}, {0x2, 0xfffffffffffffffb, 0x2, 0x100000008, 0x7fff, 0x1}], 0x2, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000001a40)={0x9, 0x80000000}) shmget$private(0x0, 0x2000, 0x4, &(0x7f00004fd000/0x2000)=nil) r6 = kqueue() freebsd11_kevent(r6, &(0x7f00000002c0)=[{0x1, 0xffffffffffffffff, 0x8, 0xc0000000}, {0x8000, 0xfffffffffffffffa, 0x80, 0x8, 0x200, 0x85d}, {0x3, 0xfffffffffffffffd, 0x2, 0x4, 0x800, 0xfffffffd}, {0x81, 0xfffffffffffffffc, 0x51, 0xc0000000, 0x80000000, 0x8}, {0x7, 0xfffffffffffffffa, 0x8001, 0x80, 0x44d, 0x3}], 0xccccf3e, 0x0, 0xfffffffffffffe9a, 0x0) 7.132455794s ago: executing program 2 (id=92): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) truncate(&(0x7f0000000340)='./file0/file0\x00', 0x4a) open$dir(&(0x7f0000000080)='./file1/file0\x00', 0x202, 0x0) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) r0 = kmq_open(&(0x7f0000000100)='./file0/file0\x00', 0x2, 0x41, &(0x7f0000000180)={0x7ff, 0x0, 0x9, 0x5}) fstat(r0, &(0x7f0000000200)) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[]) aio_waitcomplete(0x0, 0x0) statfs(&(0x7f0000000040)='./file1/file1/file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) cap_rights_limit(r2, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) execve(0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r3, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x18, 0x1c, 0x3, 0x6, @rand_addr="f2512177a85f6020da2256efa15dbb70", 0x3}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) mlockall(0x3) freebsd11_mknod(&(0x7f0000000080)='./file1\x00', 0x6000, 0x1) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3, 0x410, 0xffffffffffffffff, 0x5) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r4 = open(&(0x7f0000000300)='./file0\x00', 0x615, 0xb2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r4, 0x0) ftruncate(r4, 0x8) setuid(r1) 7.127303814s ago: executing program 3 (id=93): symlink(&(0x7f0000000080)='.\x00', &(0x7f0000000240)='./file0\x00') r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) open$dir(&(0x7f00000001c0)='./file0\x00', 0x40000, 0x11) ioctl$SMB_READB(0xffffffffffffffff, 0xc01c6907, &(0x7f0000000340)={0x8, 0x1d, 0x1, @buf="a28b", @buf, 0x3, &(0x7f0000000080), 0x1, &(0x7f0000000100)=0x1, 0x1}) ioctl$SMB_READB(r0, 0xc020697a, &(0x7f00000002c0)={0x3, 0x0, 0x0, @word=0xe2df, @word, 0x4, 0x0, 0x16, 0x0}) r1 = socket(0x1c, 0x1, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0x49, &(0x7f0000000300)={@broadcast}, 0xc) setsockopt$inet_mreqsrc(r2, 0x0, 0x49, &(0x7f0000000280)={@multicast1, @rand_addr=0x9, @multicast2}, 0xc) openat$ptmx(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = socket$inet_sctp(0x2, 0x5, 0x84) readv(r3, &(0x7f0000000100)=[{&(0x7f0000000000)=""/7, 0x7}], 0x1) listen(r3, 0xeb) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='newreno\x00', 0x8) cpuset_getaffinity(0x2, 0x4, 0x7, 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0xc4, 0x0) r4 = socket(0x1c, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty, 0x3ff}, 0x1c) connect$inet6(r4, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(r4, &(0x7f0000000200)="0e", 0x1, 0x100, 0x0, 0x0) flock(r4, 0x3) socket(0x2, 0x10000000, 0x3) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaa79ff030486dd601b8b97004d88c19e9ace00000000000000002100000002ff02000000000000000000000000000104004e"]) r5 = socket$unix(0x1, 0x2, 0x0) bind$unix(r5, &(0x7f0000000200)=@abs={0x8, 0x1, 0x0, 0x2}, 0x8) connect$unix(r5, &(0x7f00000004c0)=@file={0xa, 0x1, './file0\x00'}, 0xa) 7.059859802s ago: executing program 1 (id=94): aio_waitcomplete(0x0, 0x0) syz_emit_ethernet(0x1a, &(0x7f00000002c0)=ANY=[@ANYBLOB="aaaaaa292dcdffffeefb0000ff00"/26]) r0 = socket(0x1c, 0x1, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, 0x0, &(0x7f0000000180)) syz_emit_ethernet(0x10ed, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r2, 0x0, 0x2, &(0x7f0000000040)={@loopback}, 0xc) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r0, 0x84, 0x8003, &(0x7f0000000480)={0x0, &(0x7f0000000680)=[@in={0x10}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @local}, @in6={0x1c}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @local}]}, &(0x7f0000000340)=0x8) setsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x3, &(0x7f00000001c0)={0x7ff, 0x8001, 0x96}, 0x8) r3 = socket$unix(0x1, 0x2, 0x0) ioctl$SMB_SENDB(r3, 0xc020697c, &(0x7f0000000100)={0x67, 0x69, 0x66, @buf="fba0", @buf="feb6", 0xfff, 0x0, 0x0, 0x0}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000400), 0x0) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r0, 0x6, 0x27, &(0x7f00000003c0)={&(0x7f0000000500), &(0x7f0000000200)="0200000049", &(0x7f0000000900)="43695cccdfccc864b8385a9c89fb4ec4afcb05fe165aff7c6aa6c1c7e0023fdf0d9bb11aed21210c820bacb141d36cdd38d9de8a1bb185b82aa3e03f1eee5e39b9a9613efcb91773c854461a076e5dfe14a610bab1e860dbf871ad9eec81876d5f7f980547299f9534fb28d4dce525eadd47f96ae81ccf97ad0b297ea55ad7e610d00123d3d001231e8492b52647b60906ec8cc2dd6660d96d7e8d08f809c328cec0cdac86fad9996dfb", 0x19, 0x0, 0x5, 0x1a, 0xaa, 0x0, 0x678e2603bf350369, 0x4, "3df39200"}, 0x30) socketpair(0x1, 0x1, 0x2, 0x0) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x11, 0x3, 0x0) sendto$unix(r5, &(0x7f00000000c0)="b1000501600000903f00000009000000331c1306cfa10500fef96ecfc73fd37833e449aa0416fa4f376b36acf00b7804be381e4991f7c8cf5f882b297be1aa5323edeb51e2f0ca3ebbc257699a1f133ea7acb5d602000d7d026ba8af6300372a2102000000720fd38bfbb770c1f597d40fefea772ec5890400000000000000361b1257aea8c50000201200000004200000000000000000000000000000200000000000000000", 0xa6, 0x88, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000440), 0x5, 0xfffffff9) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) r6 = socket(0x1c, 0x1, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 6.621823518s ago: executing program 0 (id=11): ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) open$dir(0x0, 0x200, 0x0) open$dir(&(0x7f00000000c0)='.\x00', 0x13689f7875b0fff6, 0x1de) r0 = socket(0x1c, 0x20000002, 0x0) fpathconf(r0, 0x3f) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r2 = dup2(r1, r1) ioctl$DIOCCHANGERULE(r2, 0x8048756d, &(0x7f0000000080)) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getpriority(0x0, 0xa) freebsd11_kevent(r2, &(0x7f0000000080)=[{0x5aabbaa5, 0xfffffffffffffff5, 0x40, 0x10, 0x0, 0x5}], 0x1, &(0x7f0000000180)=[{}], 0x1, &(0x7f0000000340)={0xfffffffb, 0x2}) socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) access(0x0, 0x0) setpriority(0x2, 0x7, 0x80000000) syz_emit_ethernet(0x30, &(0x7f0000000100)={@random="57001000", @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x22, 0x65, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1, {[@generic={0x44, 0x7, "e918c7b8a7"}]}}, @icmp=@generic={0x22, 0x2, 0x0, "a759"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1b, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000000)="0216010202000009000000000000004e", 0x10, 0x40000, 0x0, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) freebsd11_kevent(r4, &(0x7f0000001940)=[{0x6, 0xfffffffffffffff8, 0x4041, 0x8, 0x7, 0x7f}, {0x2, 0xfffffffffffffffb, 0x2, 0x100000008, 0x7fff, 0x1}], 0x2, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000001a40)={0x9, 0x80000000}) shmget$private(0x0, 0x2000, 0x4, &(0x7f00004fd000/0x2000)=nil) r6 = kqueue() freebsd11_kevent(r6, &(0x7f00000002c0)=[{0x1, 0xffffffffffffffff, 0x8, 0xc0000000}, {0x8000, 0xfffffffffffffffa, 0x80, 0x8, 0x200, 0x85d}, {0x3, 0xfffffffffffffffd, 0x2, 0x4, 0x800, 0xfffffffd}, {0x81, 0xfffffffffffffffc, 0x51, 0xc0000000, 0x80000000, 0x8}, {0x7, 0xfffffffffffffffa, 0x8001, 0x80, 0x44d, 0x3}], 0xccccf3e, 0x0, 0xfffffffffffffe9a, 0x0) 4.568961595s ago: executing program 1 (id=95): getuid() __semctl$SETALL(0x0, 0x0, 0x9, 0x0) aio_waitcomplete(0x0, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) r0 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000d80)={0x1, 0x20, @sival_int=0x9, @spare=[0x4005, 0x5, 0x6, 0x5, 0x8, 0x7, 0xfd926ff, 0x8]}) syz_emit_ethernet(0x2e, &(0x7f0000001bc0)={@random="9f4c4662c957", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x68, 0x0, 0x1, 0x2, 0x0, @rand_addr=0x7, @multicast2}, @icmp=@generic={0x11, 0x8, 0x0, "e000000102000000"}}}}}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) setegid(0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x1, 0x88f]}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10001, [0x0, 0x0, 0x0, 0x4000]}) setsockopt$inet6_MCAST_LEAVE_GROUP(r2, 0x29, 0x51, &(0x7f0000000080)={0x4, {{0x1c, 0x1c, 0x0, 0x4, @empty, 0x3}}}, 0x80) setresuid(0xffffffffffffffff, 0xee01, 0x0) fhstat(&(0x7f0000000200)={{[0x2, 0x2]}, {0x7, 0x1, "0f00"}}, 0x0) lio_listio(0x0, 0x0, 0x0, 0x0) r3 = openat$kbd(0xffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$KDMKTONE(r3, 0x20044b08) lio_listio(0x1, &(0x7f0000000040), 0x52, &(0x7f0000000c40)={0x3, 0x1a, @sigval_int=0x110, @spare=[0x8, 0x9cff, 0x1c23, 0x9, 0x60, 0x6bf, 0xffffffca, 0x8]}) socket$inet6(0x1c, 0x3, 0x6) syz_emit_ethernet(0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 4.567176199s ago: executing program 2 (id=96): openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000300)='./file0/file0\x00', 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff02000000000000000000000000000129020000000000"]) aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180)) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r0 = socket$inet6(0x1c, 0x5, 0x7) setsockopt$inet6_int(r0, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r0, 0x0, 0x0, 0xffff0000, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="fff71fdcedff000080009e000000e216", 0x3}, 0x1c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) socket(0x1c, 0x20000000, 0x0) open$dir(&(0x7f00000002c0)='./file0\x00', 0x40000400000002c2, 0x64) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f00000021c0), 0x200000, 0x0) ioctl$BIOCSRTIMEOUT(r1, 0x8010426d, &(0x7f0000002b40)={0x100000001, 0x1}) kqueue() 4.563685202s ago: executing program 3 (id=97): socket(0x26, 0x2, 0x0) cpuset_setaffinity(0x2, 0x2, 0x0, 0x0, 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80000001, &(0x7f00000004c0), 0x0, [0x3, 0x10000000], 0x200000000000000, 0x20, 0x0, {0x4, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562ef}}) r0 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0xd2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @random="c7a2e46f05fa", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xff, 0x60, 0x0, @multicast1=0xac1401ff, @multicast1}, @icmp=@echo}}}}) socket(0x1c, 0x1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)={{0x0, 0xffffffffffffffff}, {0xffffffffffffffff, 0x10}}, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000040)={0x15, 0x0, 0x10, &(0x7f0000000100)="ec7b0000000000000001f0a5a2519798", 0x0, 0x0, 0x8, 0xfdf9ff85}) r3 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) unlink(&(0x7f0000000200)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x20, &(0x7f0000000140)=0x1, 0x4) ioctl$KDGETMODE(r0, 0x40046676, 0x3) r4 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) syz_emit_ethernet(0x7e, &(0x7f00000003c0)={@random="8f6f77edbb65", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x48, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x38, {0x0, 0x6, "06c33e", 0x0, 0x2b, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @loopback={0x300, 0xfffffffffffffffe}, [@routing={0x64, 0x2, 0x0, 0x73, 0x0, [@mcast2]}]}}}}}}}) readlinkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="b1000504000004000000000001000000331c13fecea10500fef96ec0c72fd3357ae30200004e3003000000acf20b7804be38164991f7c8cf5f882b297be1aa0500000051e2f0ad3ebbc257699a1f139b672f4d335c223e7d0c032bfa896443a42102000000720fd18bfbb670c1f5a872c881ea6e2ec5890400000000008000361b4cc702fac500002021fbfa0c0f00008abfba221554f4e0f668246c0900000008e371a3f8343712051eea040000000000", 0xb1, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) syz_emit_ethernet(0x6e, &(0x7f0000000080)={@local, @random="7004f5b37507", [], {@ipv6={0x86dd, {0x0, 0x6, "c900", 0x38, 0x3a, 0xff, @remote={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@time_exceed={0x3, 0x0, 0x0, 0xf8, '\x00', {0x0, 0x6, '\x00', 0x96, 0x6, 0xff, @local={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, [@dstopts={0x1e}]}}}}}}}) freebsd11_getfsstat(0x0, 0x0, 0x2) r5 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r5, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) 3.491557305s ago: executing program 1 (id=98): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x2}], 0x1, 0x0, 0x0, 0x0) open$dir(0x0, 0x488200, 0x176) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) open$dir(0x0, 0x1, 0x100) socket(0x1c, 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) aio_readv(&(0x7f0000000480)={r1, 0x3, &(0x7f0000000500)="44b0c8a183f77e06f935d85fc9fb879de7430532027c9af6a31ae37e7716371dc3cbd920395f1ab8692e8378b0100b5a0e8e924d5a93ec042bfa9a0550b1ba0a34d5ae29acfecb7cf02050d6fb33998c3fe98ae76df35735817cbeaa1dbf66f52911c7260350819fbe80f53bb80f406f4a9b531dd34172a5ca1cab3631d54d0e09d01275fff28b053188e435e61844978d17ab07e56a454d7e32df931e21d02fc4bdadf5488d72fdabf78873aaa69a3312706a0071b40b628a272c49fa4749747aebe3821a94301264c7b7045055fe06466efb76fc8e64e100ff378cbb6833f91ea8de02abe8", 0xe6, [0x6, 0x7e5], 0xfffffffe, 0x6, 0x8, {0x8, 0xd15, &(0x7f0000000b00)="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"}, {0x2, 0xb, @sival_int=0x105, @thr={&(0x7f0000000240)="29df8fea501286f900000037000000643a650af126ecc4e26da86f0026697cf21d00000080876a5ec4c17d2809f2a5", 0x0}}}) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) open(&(0x7f00000000c0)='./file0/file0\x00', 0x4, 0x0) sigaction(0x14, &(0x7f0000000100)={0x0, 0x6d}, 0x0) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000100)={{0x1, 0x2000008}, {0xffffff1c, 0xfffffffe}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sigaction(0x14, &(0x7f0000000100)={0x0, 0xfbffffff, {[0x4b, 0x0, 0x0, 0x7]}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) syz_emit_ethernet(0x1c9, &(0x7f0000000680)=ANY=[@ANYBLOB="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"]) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x3, 0xfffffffffffffffe, 0x80c3}], 0x1, 0x0, 0x0, 0x0) bind$bt_l2cap(0xffffffffffffffff, &(0x7f00000011c0)={0x2, 0x61, 0x6, 0x6, 0xac8a, 0x2}, 0xa) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r4, 0x80000001, &(0x7f00000004c0)='E', 0x1, [0x2], 0x46a, 0x8, 0x0, {0x200001, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562f1, @ke_flags=0xc088}}) extattr_set_link(&(0x7f0000000180)='./file0\x00', 0x3, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_delete_file(&(0x7f0000000100)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') recvmsg(r3, &(0x7f0000000640)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @ipv4={""/10, ""/2, @loopback}}, 0x1c, &(0x7f0000000280)=[{&(0x7f0000000380)=""/211}], 0x0, &(0x7f0000002700)=""/4096, 0xf64}, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sysarch$I386_CLEAR_PKRU(0x84, &(0x7f0000000080)={0x547000, 0x0, 0x6, 0x3}) thr_new(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x17, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x21) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) 3.487786234s ago: executing program 3 (id=99): freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x462, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0xa3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000"]) aio_waitcomplete(0x0, 0x0) statfs(&(0x7f00000002c0)='./file0/file1\x00', &(0x7f0000000580)) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(0xffffffffffffffff, 0x0, &(0x7f0000000180)) execve(0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x2010c, &(0x7f0000000300)={0x1c, 0x1c, 0x3, 0x1, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) openat$bpf(0xffffff9c, 0x0, 0x200, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="04010000ffff000001"], 0x104}, 0x0) rfork(0x85000) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) 2.754769574s ago: executing program 1 (id=100): syz_emit_ethernet(0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaa5aaaaaaaaaabb08004500001c0000000000019078ac1400aae00000014e054e210008907873ad72bdd9cca257cb98ec1482dd78bfcfd8bfbd28012c6cf0e8a06672618dbdbffd9c1cd79e897d5e6104f9d865265aa212cb6e13bde2dcd048823b716765c7755939a622fc5943bcf3a95482ebb502cf7bd88850b9879aaeb270a18e20dea6bc5cd65733df6b2cb8b1fb597c43f93060795fc4baa28109008f9bad5f20ab23ad352023c97238b133dba9d3b8"]) r0 = setsid() setpgid(0x0, r0) 2.754411477s ago: executing program 1 (id=101): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x22, &(0x7f0000000180)=0xffffffff, 0x2b) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20101, &(0x7f0000000000)={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10) shutdown(0xffffffffffffffff, 0x1) r1 = fcntl$dupfd(r0, 0x11, r0) ioctl$SMB_READB(r0, 0xc020697a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) kqueue() r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10, &(0x7f0000000100)=[{&(0x7f0000000200)="b8a01439408216cceabd5301b2b836fd062a9c8f9acdcc67c117dcc42da85dfa0c3ecd9e657601dbbe85ce9c10b22d020c7d780c8deed01af76cdef5bd656bdcc7f5a9dd691f4607e9c5d6ff61f92b370094c6efda5a2f6337eec2a785de46c91e5fca3b710a4fa6d626d1e134faf08deb8e8a827f51bf9391b9599a54cbebc3fa3ff252f99da4e0535f4efbd6fd5972f87eac31c2a0a37f392021a3d4cedae8d9b5c78339a697f3", 0xa8}], 0x1, 0x0, 0x0, 0x20000}, 0x0) setuid(0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000080)={0x2}, 0x1) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) dup(0xffffffffffffffff) ioctl$CRIOGET(0xffffffffffffffff, 0xc0046364, &(0x7f00000001c0)=0x456) socket(0x17, 0x4, 0x8) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 2.672022761s ago: executing program 0 (id=11): ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) open$dir(0x0, 0x200, 0x0) open$dir(&(0x7f00000000c0)='.\x00', 0x13689f7875b0fff6, 0x1de) r0 = socket(0x1c, 0x20000002, 0x0) fpathconf(r0, 0x3f) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r2 = dup2(r1, r1) ioctl$DIOCCHANGERULE(r2, 0x8048756d, &(0x7f0000000080)) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getpriority(0x0, 0xa) freebsd11_kevent(r2, &(0x7f0000000080)=[{0x5aabbaa5, 0xfffffffffffffff5, 0x40, 0x10, 0x0, 0x5}], 0x1, &(0x7f0000000180)=[{}], 0x1, &(0x7f0000000340)={0xfffffffb, 0x2}) socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) access(0x0, 0x0) setpriority(0x2, 0x7, 0x80000000) syz_emit_ethernet(0x30, &(0x7f0000000100)={@random="57001000", @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x22, 0x65, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1, {[@generic={0x44, 0x7, "e918c7b8a7"}]}}, @icmp=@generic={0x22, 0x2, 0x0, "a759"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1b, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000000)="0216010202000009000000000000004e", 0x10, 0x40000, 0x0, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) freebsd11_kevent(r4, &(0x7f0000001940)=[{0x6, 0xfffffffffffffff8, 0x4041, 0x8, 0x7, 0x7f}, {0x2, 0xfffffffffffffffb, 0x2, 0x100000008, 0x7fff, 0x1}], 0x2, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000001a40)={0x9, 0x80000000}) shmget$private(0x0, 0x2000, 0x4, &(0x7f00004fd000/0x2000)=nil) r6 = kqueue() freebsd11_kevent(r6, &(0x7f00000002c0)=[{0x1, 0xffffffffffffffff, 0x8, 0xc0000000}, {0x8000, 0xfffffffffffffffa, 0x80, 0x8, 0x200, 0x85d}, {0x3, 0xfffffffffffffffd, 0x2, 0x4, 0x800, 0xfffffffd}, {0x81, 0xfffffffffffffffc, 0x51, 0xc0000000, 0x80000000, 0x8}, {0x7, 0xfffffffffffffffa, 0x8001, 0x80, 0x44d, 0x3}], 0xccccf3e, 0x0, 0xfffffffffffffe9a, 0x0) 2.488016531s ago: executing program 2 (id=102): r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x80000, 0x0) ioctl$BIOCSRTIMEOUT32(r0, 0x8008426d, &(0x7f0000000480)={0x0, 0x4bb7}) 407.028355ms ago: executing program 1 (id=103): open$dir(&(0x7f0000000440)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x139) r0 = open$dir(&(0x7f00000016c0)='./file0\x00', 0xa182fdacd32160a9, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) bind$inet6(r1, &(0x7f00000002c0)={0x1c, 0x1c, 0x3, 0x7fffffff, @empty, 0xfffffffc}, 0x1c) listen(r1, 0x7) r2 = socket(0x1c, 0x1, 0x0) ioctl$KBADDKBD(0xffffffffffffffff, 0x80244b44, &(0x7f0000000040)={0x9, "5acda5d522ba527d2c6736fda873f95f", 0xa9, 0x5, 0x2ad, 0x6}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) sigaction(0xc, &(0x7f0000000200)={&(0x7f0000000180)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de3516cb69989999908", 0x36, {[0xfffff801, 0x50e5, 0xfdffffff, 0x5]}}, 0x0) lgetfh(0x0, 0x0) r4 = socket$inet(0x2, 0x0, 0x98) listen(r4, 0x9) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r5 = socket(0x2, 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x6) r6 = socket$inet6(0x1c, 0x2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file0\x00') unlink(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bind$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x0, @loopback, 0xffffffff}, 0x1c) connect$inet6(r6, &(0x7f0000000300)={0xffffffffffffff0b, 0x1c, 0x1, 0x4, @mcast1}, 0x1c) sendmsg(r1, &(0x7f0000002340)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x9e78, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="10000025712c7ac384d9000600000006290000"], 0x10}, 0x20004) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) connect$inet6(r2, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffefc}, 0x1c) 406.540124ms ago: executing program 2 (id=104): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) truncate(&(0x7f0000000340)='./file0/file0\x00', 0x4a) open$dir(&(0x7f0000000080)='./file1/file0\x00', 0x202, 0x0) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) r0 = kmq_open(&(0x7f0000000100)='./file0/file0\x00', 0x2, 0x41, &(0x7f0000000180)={0x7ff, 0x0, 0x9, 0x5}) fstat(r0, &(0x7f0000000200)) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[]) aio_waitcomplete(0x0, 0x0) statfs(&(0x7f0000000040)='./file1/file1/file0\x00', &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) cap_rights_limit(r2, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) getpeername$unix(0xffffffffffffff9c, 0x0, &(0x7f00000000c0)) execve(0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r3, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x18, 0x1c, 0x3, 0x6, @rand_addr="f2512177a85f6020da2256efa15dbb70", 0x3}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) mlockall(0x3) freebsd11_mknod(&(0x7f0000000080)='./file1\x00', 0x6000, 0x1) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x3, 0x410, 0xffffffffffffffff, 0x5) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r4 = open(&(0x7f0000000300)='./file0\x00', 0x615, 0xb2) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r4, 0x0) ftruncate(r4, 0x8) setuid(r1) 399.91872ms ago: executing program 3 (id=105): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80000001, &(0x7f0000000040)="e2", 0xfeac, [0x0, 0x1ff], 0x0, 0x0, 0x8000, {0x100000000000001, 0x7, 0x0}, {0x0, 0x0, @sival_ptr=0x3ef8}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) r2 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x100000, 0x0) ioctl$BIOCSETF(r2, 0x80084267, &(0x7f0000000040)={0x0, 0x0}) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) socket(0x1c, 0x3, 0xa) r3 = socket(0x1c, 0x1, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, 0x0) __cap_rights_get(0x80000008, r3, &(0x7f0000000100)) cpuset_getaffinity(0x2, 0x6, 0x4, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0xc, &(0x7f00000000c0)={@multicast1, @broadcast}, 0x8) flock(r2, 0xc) aio_fsync(0x80, &(0x7f0000000400)={0xffffffffffffffff, 0x8000df, 0x0, 0x0, [0x6, 0x3], 0x9, 0x8, 0xfffffffc, {0x932, 0x497, 0x0}, {0x0, 0x20, @sigval_int=0x9}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) openat$smbus(0xffffff9c, &(0x7f0000000040), 0x400, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) freebsd11_mknod(&(0x7f0000000040)='./file0\x00', 0x2000, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) freebsd10_pipe(&(0x7f0000000080)) r5 = socket(0x1c, 0x1, 0x0) setresuid(0x0, 0xee01, 0x0) socket(0x2, 0x1, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) mlockall(0x2) 183.091323ms ago: executing program 3 (id=106): openat$bpf(0xffffffffffffff9c, 0x0, 0x462, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000bc"]) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) ftruncate(r1, 0x107d2) sync() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000340)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x2, 0x5, 0x1ff, 0x7fff, 0x5}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000400)={0x8be2, 0x4000, 0x3, 0x9, r2}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x100, 0xc) r3 = open(&(0x7f0000000040)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f000005a000/0x3000)=nil, 0x3000, 0x1, 0x20011, r3, 0x0) open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) flock(r4, 0x3) flock(r4, 0x1) r5 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) copy_file_range(r5, 0x0, r3, &(0x7f0000000080)=0x2ffdf, 0x100f, 0x0) 0s ago: executing program 0 (id=11): ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) open$dir(0x0, 0x200, 0x0) open$dir(&(0x7f00000000c0)='.\x00', 0x13689f7875b0fff6, 0x1de) r0 = socket(0x1c, 0x20000002, 0x0) fpathconf(r0, 0x3f) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r2 = dup2(r1, r1) ioctl$DIOCCHANGERULE(r2, 0x8048756d, &(0x7f0000000080)) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getpriority(0x0, 0xa) freebsd11_kevent(r2, &(0x7f0000000080)=[{0x5aabbaa5, 0xfffffffffffffff5, 0x40, 0x10, 0x0, 0x5}], 0x1, &(0x7f0000000180)=[{}], 0x1, &(0x7f0000000340)={0xfffffffb, 0x2}) socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) access(0x0, 0x0) setpriority(0x2, 0x7, 0x80000000) syz_emit_ethernet(0x30, &(0x7f0000000100)={@random="57001000", @local, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x22, 0x65, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1, {[@generic={0x44, 0x7, "e918c7b8a7"}]}}, @icmp=@generic={0x22, 0x2, 0x0, "a759"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) r5 = socket(0x1b, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000000)="0216010202000009000000000000004e", 0x10, 0x40000, 0x0, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) freebsd11_kevent(r4, &(0x7f0000001940)=[{0x6, 0xfffffffffffffff8, 0x4041, 0x8, 0x7, 0x7f}, {0x2, 0xfffffffffffffffb, 0x2, 0x100000008, 0x7fff, 0x1}], 0x2, &(0x7f0000001980)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000001a40)={0x9, 0x80000000}) shmget$private(0x0, 0x2000, 0x4, &(0x7f00004fd000/0x2000)=nil) r6 = kqueue() freebsd11_kevent(r6, &(0x7f00000002c0)=[{0x1, 0xffffffffffffffff, 0x8, 0xc0000000}, {0x8000, 0xfffffffffffffffa, 0x80, 0x8, 0x200, 0x85d}, {0x3, 0xfffffffffffffffd, 0x2, 0x4, 0x800, 0xfffffffd}, {0x81, 0xfffffffffffffffc, 0x51, 0xc0000000, 0x80000000, 0x8}, {0x7, 0xfffffffffffffffa, 0x8001, 0x80, 0x44d, 0x3}], 0xccccf3e, 0x0, 0xfffffffffffffe9a, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.124' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d5000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d5000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d5000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d5000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d5000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d5000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 Expensive callout(9) function: 0xffffffff81af20d0(0) 0.005910181 s if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d6000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 Expensive callout(9) function: 0xffffffff819bbdd0(0) 0.022863429 s if_delmulti_locked: detaching ifnet instance 0xfffffe00077d6800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe00777f7800 if_delmulti_locked: detaching ifnet instance 0xfffffe00777f7800 if_delmulti_locked: detaching ifnet instance 0xfffffe00777f7800 if_delmulti_locked: detaching ifnet instance 0xfffffe00777f7800 if_delmulti_locked: detaching ifnet instance 0xfffffe00777f7800 if_delmulti_locked: detaching ifnet instance 0xfffffe00777f7800 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 md0: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077d7000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853f000 SYZFAIL: invalid kcov comp type type=ffffffff8230db5e (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff8169ddb3 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff8230db5e (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff8169ddb3 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff8169ddb3 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff81aa581c (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff8169ddb3 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff8169ddb3 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff8169ddb3 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=0 req=11 state=3 status=67 (errno 35: Resource temporarily unavailable) if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 FreeBSD/amd64 (ci-freebsd-i386-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 Password:if_delmulti_locked: detaching ifnet instance 0xfffffe005853e000 Login incorrect login: show registers Password: Login incorrect login: ps Nov 3 01:48:28 ci-freebsd-i386-4 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl