last executing test programs: 31.256823735s ago: executing program 3 (id=4): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0xc085, 0x80000000, 0x0, 0x10002, [0xffffffffffffffff, 0x0, 0xf1]}, {0x0, 0xfffffffffffffffe, 0x91, 0x2, 0x0, 0x1, [0x8, 0x7]}], 0x2, 0x0, 0x0, 0x0) syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) r1 = socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r2, 0x0, 0x13, &(0x7f0000000280)=0x2, 0x4) listen(r2, 0x2000e) syz_emit_ethernet(0x3a, &(0x7f0000000100)={@random="57001000", @local, [], {@ipv4={0x800, {{0x9, 0x4, 0x0, 0x0, 0x2c, 0x65, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1, {[@ra={0x94, 0x6, 0x8c71}, @generic={0x44, 0x8, "e918c7b8a7aa"}, @noop]}}, @icmp=@generic={0x22, 0x2, 0x0, "a759442b"}}}}}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xb}, 0x24) syz_emit_ethernet(0x46, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6002000000100000517500000000000000000100000400000000fe8000000000000000000000000000aa3a000000000000008000907800000000"]) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x10, 0x1, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x200, 0x4) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, &(0x7f0000000080)={@local={0xac, 0x14, 0x0}}, 0xc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) setresuid(0xee00, 0xee01, 0xffffffffffffffff) r4 = msgget$private(0x0, 0x8) setresuid(0x0, 0x0, 0x0) msgsnd(r4, &(0x7f0000000100)={0x3}, 0x4, 0x800) msgctl$IPC_RMID(r4, 0x0) socket(0x1c, 0x3, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_udp(0x1c, 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r5, 0x0, 0x47, &(0x7f0000001600)="ee32d4ce78238b07421c63af", 0xc) 30.384810524s ago: executing program 3 (id=10): socket(0x1c, 0x1, 0x0) r0 = fhopen(&(0x7f0000000000)={{[0x2, 0x7]}, {0x0, 0x1f, "0a863a93d00fe41f90d0f5641104d0a7"}}, 0x80) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x22, &(0x7f0000000200)=0x4, 0x4) r2 = socket(0x26, 0x2, 0x0) getsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, 0x0, &(0x7f00000003c0)) (async) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r2, 0x6, 0x29, 0x0, 0xfffffffffffffeb0) freebsd11_mknod(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x672cda28f543e327, 0x3) chdir(&(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x2, 0x3, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}}, 0x0, 0x5, 0x1, 0x1000, 0x3, 0x400}, &(0x7f0000000100)=0x98) r4 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) r5 = socket$inet6_sctp(0x1c, 0x1, 0x84) r6 = dup2(r5, r5) ioctl$DIOCCHANGERULE(r6, 0x8048756c, &(0x7f00000000c0)="2806ddea760a90222d5b13103ce97870799768dca99507f0fb99cbff0d5ff893fab273ddd3") (async) openat(0xffffffffffffff9c, &(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x40000, 0x5b6f1cda357ce0c8) (async) flock(r4, 0x6) (async) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socketpair(0x0, 0x3, 0x52, &(0x7f0000000240)) setsockopt$inet_mreqsrc(r7, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0x67) (async) setsockopt$inet_mreqsrc(r7, 0x0, 0x48, &(0x7f0000000140)={@multicast1, @empty, @broadcast}, 0xc) setsockopt$inet_mreqsrc(r7, 0x0, 0x48, &(0x7f0000000180)={@multicast1, @multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(r7, 0x0, 0x48, &(0x7f0000000200)={@multicast1, @broadcast, @multicast1}, 0xc) (async) r8 = socket(0x1c, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x105, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x15, &(0x7f0000000100)={r9, 0x3}, &(0x7f0000000140)=0x8) (async) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r4, 0x84, 0xb, &(0x7f0000000140)={0xe, 0xd, 0x10, 0x1, 0x7, 0x0, 0xace, 0x7, r9}, &(0x7f0000000180)=0x20) getsockopt$inet6_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000140)={r3, 0x10000, 0x6, 0x4, 0x41b, 0xffff, 0x4, 0x800, {@in={{0x10, 0x2, 0x3, @loopback}}, r9, 0x7fffffff, 0xffffffff, 0xfffffffd, 0x9, 0x3}}, &(0x7f0000000200)=0xb0) 30.260035043s ago: executing program 3 (id=11): r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(0xffffffffffffffff, 0x84, 0x24, &(0x7f0000000000)={0x0, @in6={{0x1c, 0x1c, 0x1, 0x2, @loopback, 0xfffffffc}}, 0xff}, &(0x7f00000000c0)=0x88) setsockopt$inet_sctp_SCTP_EVENT(r0, 0x84, 0x1e, &(0x7f0000000100)={r1, 0x7, 0x9}, 0x8) syz_emit_ethernet(0x12, &(0x7f0000000140)={@remote, @remote, [], {@generic={0x803d, "ee268c9b"}}}) r2 = fhopen(&(0x7f0000000180)={{[0x1ff, 0x3ff]}, {0x9, 0x94, "d851f6645f822d6d0976ff218828c00b"}}, 0x800) kmq_timedsend(r2, &(0x7f00000001c0)="a15dc95cdb1869b57755c503e1ffcf2d41eac5750bf19b7da3a9e03f47231dada215cdcd349824c3", 0x28, 0xc, &(0x7f0000000200)={0x2, 0x1}) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r3, 0x84, 0x24, &(0x7f0000000240)={0x0, @in6={{0x1c, 0x1c, 0x2, 0xdf, @empty, 0xc1}}, 0x4}, &(0x7f0000000300)=0x88) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x10, r3, 0xfffffffb) extattr_set_file(&(0x7f0000000340)='./file0\x00', 0x1, &(0x7f0000000380)='(+\x00', &(0x7f00000003c0)="ccc9548e235a0f488735b168e992c69ff000e2037225e6ef908be1ead28ae55649215295680336e49936b1d2152eaadd18ef8d1ad511df0ca9d69dd848391ca619145c983a3cdc00763024d5aca7b340688683e4aa95fb2e12ff91322c26874f8e93d6025ec4073e7c65f11bc6179d814142a43ae243d2cdddadc3ee418f93455fda116b6fe9169cab8cfbf28a8c9d63869d779c869553f43f29be8a14e716893a52d9aa889be9cb4f065ae3d457644f1426330a31b62e61bb6c2d981bf469306869b48c3744845772416ef533bd8d6a2544c131f7bf54af29df9beb05952849e8c63497", 0xe4) r5 = getsid(0xffffffffffffffff) wait4(r5, 0x0, 0x8, &(0x7f00000004c0)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f0000000540)={r4, 0xb7, "5dd7d0d939df525db4e861a0d0d59616b712f19ce976a4f7e3fcea66cf625170b0f5ed5e03396df6f1012d55ab509fe6939c4851f3d25b309e0eba630e19649e8afcde1c444d88b9419100ad1c5861b86273f9382486e0592d42c651ab63e7d03a7173adef975e28dbcaa076315283bff654ebac0c0d92ee3ed1695e6909558a94e611d502bd84fa3ec2afc238030c62c41aac4ab5e5d506782ddf1e241b2f31933c9482d313a3d00ee81d1739587c59055d80255ac5a8"}, &(0x7f0000000600)=0xbf) listen(r0, 0xd) r7 = dup(r3) getdirentries(r7, &(0x7f0000000640)=""/238, 0xee, &(0x7f0000000740)) getsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000780)={@in6={{0x1c, 0x1c, 0x2, 0x8624, @remote={0xfe, 0x80, '\x00', 0x0}, 0x9}}, r6, 0x6, 0xa3df, 0x3, 0x0, 0x3, 0x5}, &(0x7f0000000840)=0x98) r9 = getgid() chown(&(0x7f0000000880)='./file0\x00', 0xffffffffffffffff, r9) r10 = fork() procctl$PROC_REAP_ACQUIRE(0x0, r10, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x21, &(0x7f00000008c0)={0x6, 0x0, 0x4, 0x3, r4}, &(0x7f0000000900)=0x10) setsockopt$inet6_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x26, &(0x7f0000000940)={r8, 0x9}, 0x8) accept4(r7, &(0x7f0000000980)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}, &(0x7f00000009c0)=0x1c, 0x30000000) close(r2) setregid(r9, r9) socket(0x15, 0x4, 0xd7) kqueue() symlinkat(&(0x7f0000000a00)='./file0\x00', r2, &(0x7f0000000a40)='./file0\x00') getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) 30.25421614s ago: executing program 32 (id=11): r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(0xffffffffffffffff, 0x84, 0x24, &(0x7f0000000000)={0x0, @in6={{0x1c, 0x1c, 0x1, 0x2, @loopback, 0xfffffffc}}, 0xff}, &(0x7f00000000c0)=0x88) setsockopt$inet_sctp_SCTP_EVENT(r0, 0x84, 0x1e, &(0x7f0000000100)={r1, 0x7, 0x9}, 0x8) syz_emit_ethernet(0x12, &(0x7f0000000140)={@remote, @remote, [], {@generic={0x803d, "ee268c9b"}}}) r2 = fhopen(&(0x7f0000000180)={{[0x1ff, 0x3ff]}, {0x9, 0x94, "d851f6645f822d6d0976ff218828c00b"}}, 0x800) kmq_timedsend(r2, &(0x7f00000001c0)="a15dc95cdb1869b57755c503e1ffcf2d41eac5750bf19b7da3a9e03f47231dada215cdcd349824c3", 0x28, 0xc, &(0x7f0000000200)={0x2, 0x1}) r3 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r3, 0x84, 0x24, &(0x7f0000000240)={0x0, @in6={{0x1c, 0x1c, 0x2, 0xdf, @empty, 0xc1}}, 0x4}, &(0x7f0000000300)=0x88) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x1, 0x10, r3, 0xfffffffb) extattr_set_file(&(0x7f0000000340)='./file0\x00', 0x1, &(0x7f0000000380)='(+\x00', &(0x7f00000003c0)="ccc9548e235a0f488735b168e992c69ff000e2037225e6ef908be1ead28ae55649215295680336e49936b1d2152eaadd18ef8d1ad511df0ca9d69dd848391ca619145c983a3cdc00763024d5aca7b340688683e4aa95fb2e12ff91322c26874f8e93d6025ec4073e7c65f11bc6179d814142a43ae243d2cdddadc3ee418f93455fda116b6fe9169cab8cfbf28a8c9d63869d779c869553f43f29be8a14e716893a52d9aa889be9cb4f065ae3d457644f1426330a31b62e61bb6c2d981bf469306869b48c3744845772416ef533bd8d6a2544c131f7bf54af29df9beb05952849e8c63497", 0xe4) r5 = getsid(0xffffffffffffffff) wait4(r5, 0x0, 0x8, &(0x7f00000004c0)) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f0000000540)={r4, 0xb7, "5dd7d0d939df525db4e861a0d0d59616b712f19ce976a4f7e3fcea66cf625170b0f5ed5e03396df6f1012d55ab509fe6939c4851f3d25b309e0eba630e19649e8afcde1c444d88b9419100ad1c5861b86273f9382486e0592d42c651ab63e7d03a7173adef975e28dbcaa076315283bff654ebac0c0d92ee3ed1695e6909558a94e611d502bd84fa3ec2afc238030c62c41aac4ab5e5d506782ddf1e241b2f31933c9482d313a3d00ee81d1739587c59055d80255ac5a8"}, &(0x7f0000000600)=0xbf) listen(r0, 0xd) r7 = dup(r3) getdirentries(r7, &(0x7f0000000640)=""/238, 0xee, &(0x7f0000000740)) getsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, &(0x7f0000000780)={@in6={{0x1c, 0x1c, 0x2, 0x8624, @remote={0xfe, 0x80, '\x00', 0x0}, 0x9}}, r6, 0x6, 0xa3df, 0x3, 0x0, 0x3, 0x5}, &(0x7f0000000840)=0x98) r9 = getgid() chown(&(0x7f0000000880)='./file0\x00', 0xffffffffffffffff, r9) r10 = fork() procctl$PROC_REAP_ACQUIRE(0x0, r10, 0x2, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x21, &(0x7f00000008c0)={0x6, 0x0, 0x4, 0x3, r4}, &(0x7f0000000900)=0x10) setsockopt$inet6_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x26, &(0x7f0000000940)={r8, 0x9}, 0x8) accept4(r7, &(0x7f0000000980)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}, &(0x7f00000009c0)=0x1c, 0x30000000) close(r2) setregid(r9, r9) socket(0x15, 0x4, 0xd7) kqueue() symlinkat(&(0x7f0000000a00)='./file0\x00', r2, &(0x7f0000000a40)='./file0\x00') getresuid(&(0x7f0000000a80), &(0x7f0000000ac0), &(0x7f0000000b00)) 11.391740581s ago: executing program 2 (id=9): open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x67, 0x0, 0x0, 0x1, 0x0, @broadcast, @broadcast}, @icmp=@mask_reply={0x12, 0x0, 0x0, 0x4}}}}}) r0 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f0000001480)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_set_file(&(0x7f0000001340)='./file0\x00', 0x2, &(0x7f0000001380)='[({\'\x00', 0x0, 0x0) extattr_set_file(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f0000000040)='\x8c][\xc7\\\x00', 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x3000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6000) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) r2 = dup(r1) ioctl$BIOCSETFNR(r2, 0x80084282, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x3, 0x9, 0x3, 0x1}, {0x2, 0xff, 0xe0, 0xa54}]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r3, 0xffff, 0x1019, 0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) 9.349848469s ago: executing program 2 (id=9): open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x67, 0x0, 0x0, 0x1, 0x0, @broadcast, @broadcast}, @icmp=@mask_reply={0x12, 0x0, 0x0, 0x4}}}}}) r0 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f0000001480)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_set_file(&(0x7f0000001340)='./file0\x00', 0x2, &(0x7f0000001380)='[({\'\x00', 0x0, 0x0) extattr_set_file(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f0000000040)='\x8c][\xc7\\\x00', 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x3000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6000) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) r2 = dup(r1) ioctl$BIOCSETFNR(r2, 0x80084282, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x3, 0x9, 0x3, 0x1}, {0x2, 0xff, 0xe0, 0xa54}]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r3, 0xffff, 0x1019, 0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) 7.529874447s ago: executing program 4 (id=93): mkdir(&(0x7f00000000c0)='./file0\x00', 0xb) extattr_set_link(&(0x7f0000000000)='./file0\x00', 0x2, &(0x7f00000004c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\x04\xaeQ\x02j\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1*\x1a\xb9g\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) fcntl$lock(0xffffffffffffffff, 0x16, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) r0 = socket(0x2, 0x3, 0x0) connect$inet(r0, &(0x7f0000000240)={0x10, 0x2, 0x1, @remote={0xac, 0x14, 0x0}}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000340)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0xe, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@info_request={0xf, 0x0, 0x0, 0x6, 0xe739}}}}}) chflags(&(0x7f0000000080)='./file0\x00', 0x119204) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ptmx(0xffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$DIOCGETTIMEOUT(r1, 0xc008441e, &(0x7f0000000080)={0x1, 0xff}) bind$inet6(0xffffffffffffff9c, 0x0, 0x0) listen(0xffffffffffffffff, 0x2000e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) readv(0xffffffffffffffff, &(0x7f0000000000), 0x0) r3 = socket(0x1c, 0x1, 0x0) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) freebsd11_kevent(r2, &(0x7f0000000140)=[{0xa7db, 0xfffffffffffffffb, 0x4, 0x4, 0x0, 0x6}], 0x1, &(0x7f00000003c0)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000000180)={0x8, 0xbd}) r4 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000280)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x8, 0x3a, 0x1, @empty, @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@echo_reply}}}}}) sendto(r4, 0x0, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffff9c, 0x0, 0x0, 0x60000000) getresuid(0x0, &(0x7f0000000cc0), &(0x7f0000000d00)) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) extattr_set_link(&(0x7f0000000100)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\x0e\xbbJ\xa8\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95', 0x0, 0x0) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000002c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') 7.205223189s ago: executing program 2 (id=9): open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x67, 0x0, 0x0, 0x1, 0x0, @broadcast, @broadcast}, @icmp=@mask_reply={0x12, 0x0, 0x0, 0x4}}}}}) r0 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f0000001480)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_set_file(&(0x7f0000001340)='./file0\x00', 0x2, &(0x7f0000001380)='[({\'\x00', 0x0, 0x0) extattr_set_file(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f0000000040)='\x8c][\xc7\\\x00', 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x3000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6000) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) r2 = dup(r1) ioctl$BIOCSETFNR(r2, 0x80084282, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x3, 0x9, 0x3, 0x1}, {0x2, 0xff, 0xe0, 0xa54}]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r3, 0xffff, 0x1019, 0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) 5.305297684s ago: executing program 1 (id=96): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_buf(r0, 0x0, 0x15, &(0x7f0000001080)=""/4096, &(0x7f0000000080)=0x1000) setitimer(0x1, &(0x7f0000000300)={{0x0, 0x3f}, {0x0, 0xea60}}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) r1 = open(0x0, 0x0, 0x0) mkdirat(r1, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mount(&(0x7f00000000c0)='geli\x00', &(0x7f0000000140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x10, &(0x7f0000000440)="f2881ca6db1ca81beb74b49c6e08303006b4996167e948bd21a5f3e7cbc1a91178009502e19f36e46e384111657619a291e859b083ac250af779b627f5706e90e2ce215b0c156cad4e1057153f6d5db537a425f03443589cc3e678a562b7e02f09bf6c3b6c22202b2f4e9df2dd906f746deecf3c9c091e6ce46fdc32873a7f7a4016e02a0067c1482054ea5ed5507f57520c77562d2d519e76e4c9396cec123a850a39d51673fa548c205762834a4ea647f53111c6c93c3262e4282f3b08bcfb9a93b7b80bcf49d8a5243063f276d6") chroot(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') rename(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) chmod(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) setresgid(0xee00, 0x0, 0x0) setresgid(0x0, 0x0, 0xee01) thr_self(&(0x7f0000000100)) openat$kbd(0xffffff9c, &(0x7f0000000240), 0xc58d2a66f763525b, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x20000401) 5.304366894s ago: executing program 4 (id=97): r0 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x9, &(0x7f0000000040)=0x2, 0x4) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0xffffffff, @mcast1, 0x4}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "000015", 0x8, 0x2c, 0x0, @rand_addr="e1aaa2241dc0fb00", @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x33, 0x0, 0x0, 0x1}]}}}}}) 5.303879856s ago: executing program 4 (id=98): socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) r2 = openat$crypto(0xffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f00000000c0)={0xe5a, 0x0, 0x7fff, 0x6, &(0x7f0000000040)="eaa0c48aa942afd5d01f436fd472e34fb5bb413072ffbabcf0176faa039b755ebe906c270e21f7164bac37a9300978d2a7da96d5f9df77416845d6dfc4975a6917ac009d3c50b846d94ab9cf74b150827375d1ea19ee336715e3e3dd27f9", &(0x7f0000000200)="8480c58279dc3f7abf3b32473dba8920eccef0b39c18dfd318a99f4b1d3a03be2ffcfd06fff50bc6f6380ed9c59672abfc1ce76c4e682204f8c6512490a66f7edef2bd02eb21443ab395ef56c1f310c6a4f9811d119c112fd5b396a8257f76546854ac8556f82f15a9c5a9839c452d89320edea634054fc49f22a080715874039f68e47ba5d10d8c3bf784b560921f38e0cec2823402b1aca520b72e5eaad8", &(0x7f0000000380)="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", &(0x7f0000000480)="dfbce7a1047b9aa223cbe163ea567418d892ee7c16ea8cafc331420376d213a591df5ad01fd7b241f3ce93ce3bb2bc5f6e849f619bd836c15f1b6e839e20765f40c7416f481c2a74e77e11cb05bb57b1c1837120c0b9f3b3d7618a0743a9149338ed30e3366355f1dc18f9ebe35fdaefd6aac27531f021cf0db829eccb55bbefb08bf3adc77a1398108263711b4ef6eb287720fbbc2aa112ccc81b5d87b7cfbf0485c9b319c0c87c515f5a3da220ecdaa07c295ab457ad025dc5b0c780f8c9571a1eb1ea0cfe31affa9bb48851006c3cc3a3c58aac027f51623ecbe33cc32a5e94577633d534827e80952a78553b03"}) sendto(r1, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) 4.898328294s ago: executing program 2 (id=9): open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x67, 0x0, 0x0, 0x1, 0x0, @broadcast, @broadcast}, @icmp=@mask_reply={0x12, 0x0, 0x0, 0x4}}}}}) r0 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f0000001480)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_set_file(&(0x7f0000001340)='./file0\x00', 0x2, &(0x7f0000001380)='[({\'\x00', 0x0, 0x0) extattr_set_file(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f0000000040)='\x8c][\xc7\\\x00', 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x3000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6000) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) r2 = dup(r1) ioctl$BIOCSETFNR(r2, 0x80084282, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x3, 0x9, 0x3, 0x1}, {0x2, 0xff, 0xe0, 0xa54}]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r3, 0xffff, 0x1019, 0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) 2.87883047s ago: executing program 0 (id=99): mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) r0 = socket(0x2, 0x1, 0x0) dup(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x2, &(0x7f0000000040)=0xe2, 0x4) 2.875035769s ago: executing program 1 (id=100): open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) r0 = open$dir(&(0x7f0000000200)='.\x00', 0x80000, 0x0) fcntl$dupfd(r0, 0x2, r0) mkdirat(r0, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08004500001c0067000000019078ffffffffffffff025520ed151cd33015"]) r1 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f0000001480)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_set_file(&(0x7f0000001340)='./file0\x00', 0x2, &(0x7f0000001380)='[({\'\x00', 0x0, 0x0) extattr_set_file(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f0000000040)='\x8c][\xc7\\\x00', 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x3000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6000) r2 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) r3 = dup(r2) ioctl$BIOCSETFNR(r3, 0x80084282, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x3, 0x9, 0x3, 0x1}, {0x2, 0xff, 0xe0, 0xa54}]}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r4, 0xffff, 0x1019, 0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) setsockopt$inet_sctp_SCTP_EXPLICIT_EOR(r4, 0x84, 0x1b, &(0x7f0000000140)=0x80, 0x4) mprotect(&(0x7f0000ff6000/0x4000)=nil, 0x4000, 0x1) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) 2.874445396s ago: executing program 4 (id=101): open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) r0 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0xd2) r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, r1, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r3 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r3, &(0x7f0000000240)='./file0\x00') mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) fork() 2.872768859s ago: executing program 0 (id=102): syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) r0 = socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r1, 0x0, 0x13, &(0x7f0000000280)=0x2, 0x4) listen(r1, 0x2000e) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r2 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xb}, 0x24) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) syz_emit_ethernet(0x46, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaa000000000000000100000000000000fe8000000000000000f069540f8844fb6f000000000000008000907800"/70]) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000000)={0x8000000000000001, 0x1800000000000000, 0x1, 0x9, 0x3, 0x4, 0x9}, &(0x7f00000000c0)={0x2, 0x7, 0x3, 0x6, 0x1000, 0x9, 0x5, 0xc}, &(0x7f0000000100)={0xff, 0xc60e, 0x81, 0x4, 0x2, 0x9, 0x7, 0x9}, &(0x7f0000000140)={0x5, 0x9}) r3 = socket(0x1c, 0x1, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x200, 0x4) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, &(0x7f0000000080)={@local={0xac, 0x14, 0x0}}, 0xc) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) rfork(0x85000) 2.87168909s ago: executing program 4 (id=103): r0 = openat$bpf(0xffffff9c, &(0x7f00000002c0), 0x200, 0x0) ioctl$BIOCSBLEN(r0, 0xc0044266, &(0x7f0000000300)=0x9) (async) ioctl$BIOCSETF32(r0, 0x80084267, &(0x7f0000000280)={0x8, 0x2}) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x4) (async) recvmsg(r2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0xa86a7001833bc137) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000080)={0x17, 0x0, 0x18, &(0x7f0000000000)="ec7b001ea5add1d3b00e98650f8d333b2629bb60634b02c8", 0x0, 0x0, 0xfffffffe, 0xfdffff85, [0x0, 0x0, 0x7ff, 0xfffffffc]}) (async) ioctl$CIOCCRYPT(r3, 0xc01c6367, &(0x7f0000000980)={0x0, 0x1, 0x9, 0x9, &(0x7f0000000440), 0x0, 0x0, &(0x7f00000009c0)="048c8943f04b508c73b129ee73866290958027f1a19ca8a5cb6ec897e210e703851eafa3a262924d3bb0f8f13dcf7e13f7ef9e0f113ec2278f6329d2fd72a509f56244ff403378d53a9e225e764f9358870552dd5a9f26b9b2f0b64ece2d724505732e60a3643d8edcb4e21e5ef1bd7406ea15912248223f1ca06fb3cd6078f6c01842b0e8a0f7431ec109d9f7491072f79d004c939e8d2d74cd5716f35f0e8bdaf7e77e63b3f9987a"}) (async) socketpair(0x1c, 0x4, 0x7c, &(0x7f0000000680)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r4, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) (async) sendto(r5, &(0x7f00000004c0)="43abf021", 0x4, 0x20118, 0x0, 0x0) (async) freebsd11_stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}) (async) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x6000, 0x1) (async) chflags(&(0x7f0000000640)='./file0\x00', 0x2) (async) unlink(&(0x7f0000000000)='./file0\x00') (async) ioctl$CIOCCRYPTAEAD(r3, 0xc028636d, &(0x7f0000000580)={0xff, 0x0, 0x47f, 0x1, 0x2, 0x9, &(0x7f00000001c0)="2cdfb940c2ab9b9e3c0fc8f757d817f32465744a1f5dc168b2ad7e7757e06fbd9743d8d0e57c52d42718bbb2232319830c25c8535090cedfbc7771b98c301737", &(0x7f0000000340)="05c375c8e369a974446d7b453e3dead2c7a365d32ad5e9b4c9ddc99dd3a34409329d2c846f867920c6db6287e21909ad33900dba4dab7168d1f17492a74eaf9ee57f7d33d4f58e90fd0a47e22e178cbea367752c96925d5bb39fa7ea42dc66f1e9dc2ff3dcb766942699b9cc7326b8698192160e039ff27d5a87402338466d56bd602fb668ca759d4ccf566f0dba00c329cd4903bfba4abcd36049edc53c417edf63de0300e6768790dffcd416a137612f7c68a7c15de2b287544393d33d89ba006d46", &(0x7f0000000200)="4e4a5cb9e3eb6744801729007baf92853207d6c63a83b5a5f8c658281c1a0bf1a04fb50462f6076c33689d350a3d6a5d811c8efa1ca84d1e499222c4b8ad14240231739b19621b5b7fe935360663e6d4e8779896abe214650699c2d1c90b7a1a189db08f2812ae2820c9f93385a499e2c5053a0c8c09eb", &(0x7f0000000440)="9ed1de5fb60d68ce73b783bb504fe67543f0b762ac529ddd62be9e6d640b5ed6ac73c4eb6fe4b86c1b510588859b270ba3af05ca74043b236e848b3fd467f42a0d5bf4fca11f89cd856fa64d6607c0ddfca8d9b01b95fa0653837c8b157ef6a924e244d7cecaad69ff500444a7373c9ed8106a9880202ea2e33389d637acdd97992b23b8e8", &(0x7f0000000500)="ed8bfff1f018e64dbcf6b60bcb42a39cdd1aef390e25a6935a9638f6a9ca459efa17c64c01716bedad6fb14378ebf58293c06986ba406c2c3d24ac6ab5308993c0f14b711ae8612506d23781a3f373c52f0c88598ffa14bfabe0d1a49ff69cdfcf71ad9f0779da50b8209331bd27998ff591fee5aaf101f1ae758659"}) r7 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x20) r8 = socket(0x2, 0x5, 0x0) bind$inet(r8, &(0x7f0000000040)={0xc, 0x2, 0x2}, 0x10) (async) r9 = openat(r7, &(0x7f0000000ac0)='./file0\x00', 0x80, 0x40) ioctl$CIOCFINDDEV(r9, 0xc024636c, &(0x7f0000000b00)={0x8, "dce9a368edda0e57a28e023e42131386417ff58e1cbc359bf10829f739e29956"}) (async) linkat(r7, &(0x7f0000000900)='./file0\x00', r7, &(0x7f0000000a80)='./file1\x00', 0x2000) pwritev(r7, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x11) setresuid(r6, r6, r6) (async) execve(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000700)=[&(0x7f00000006c0)='\x00'], &(0x7f0000000940)=[&(0x7f0000000740)='/dev/crypto\x00', &(0x7f0000000780)='/dev/crypto\x00', &(0x7f00000007c0), &(0x7f0000000800)='/dev/bpf\x00', &(0x7f0000000880)='[)$}{\\\x00', &(0x7f00000008c0)='/\x00', &(0x7f00000007c0)='\x00']) (async) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 2.639014947s ago: executing program 0 (id=104): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0xc085, 0x80000000, 0x0, 0x10002, [0xffffffffffffffff, 0x0, 0xf1]}, {0x0, 0xfffffffffffffffe, 0x91, 0x2, 0x0, 0x1, [0x8, 0x7]}], 0x2, 0x0, 0x0, 0x0) syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) r1 = socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r2, 0x0, 0x13, &(0x7f0000000280)=0x2, 0x4) listen(r2, 0x2000e) syz_emit_ethernet(0x3e, &(0x7f0000000100)={@random="57001000", @local, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x0, 0x30, 0x65, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1, {[@ra={0x94, 0x6, 0x8c71}, @generic={0x44, 0xc, "e918c7b8a7aa6307083a"}, @noop]}}, @icmp=@generic={0x22, 0x2, 0x0, "a759442b"}}}}}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xb}, 0x24) syz_emit_ethernet(0x46, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6002000000100000517500000000000000000100000400000000fe8000000000000000000000000000aa3a000000000000008000907800000000"]) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x10, 0x1, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x200, 0x4) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x46, &(0x7f0000000080)={@local={0xac, 0x14, 0x0}}, 0xc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) setresuid(0xee00, 0xee01, 0xffffffffffffffff) r4 = msgget$private(0x0, 0x8) setresuid(0x0, 0x0, 0x0) msgsnd(r4, &(0x7f0000000100)={0x3}, 0x4, 0x800) msgctl$IPC_RMID(r4, 0x0) socket(0x1c, 0x3, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_udp(0x1c, 0x2, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r5, 0x0, 0x47, &(0x7f0000001600)="ee32d4ce78238b07421c63af", 0xc) 2.527772989s ago: executing program 2 (id=9): open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x67, 0x0, 0x0, 0x1, 0x0, @broadcast, @broadcast}, @icmp=@mask_reply={0x12, 0x0, 0x0, 0x4}}}}}) r0 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f0000001480)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_set_file(&(0x7f0000001340)='./file0\x00', 0x2, &(0x7f0000001380)='[({\'\x00', 0x0, 0x0) extattr_set_file(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f0000000040)='\x8c][\xc7\\\x00', 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x3000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6000) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) r2 = dup(r1) ioctl$BIOCSETFNR(r2, 0x80084282, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x3, 0x9, 0x3, 0x1}, {0x2, 0xff, 0xe0, 0xa54}]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r3, 0xffff, 0x1019, 0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) 434.851029ms ago: executing program 0 (id=105): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) fcntl$getown(0xffffffffffffff9c, 0x5) (async, rerun: 64) r0 = socket(0x2, 0x1, 0x0) (async, rerun: 64) getresuid(0x0, &(0x7f0000000040)=0x0, 0x0) (async) kmq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x4, 0x0, @sival_int, @spare=[0xfffffffd, 0xe, 0x7, 0x9, 0x1, 0x8, 0x3, 0x4]}) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002900)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000a40)="fdd2c66413e85b88209a69011cd6ad49d750759bcc0ed89e4fef186e82b9d409175bb586c64a4dc2a99390534cdf5d00c8866e3e4ca1b253eda3529827d49ec3bd3e0dccfb1ef6592791134e242f7f08e887c5042b4d9ea2d18490c41f5f4ea69ab363dc2e9ff65dd1b649ff9aef321ea6a80fa78396afaa4223f7cf60b8790a083e78c6e5a7ae3539cf90a503bbe678b029948ce89b376a0eee4879201da65051549af94233b218beeaa1b5d681f255b256908bbe01d0131580a22344096f8e90c4cd2dc9f591ee92e1ac34ef420a75ebfeacc9ed66dc58f4634aca550667d156f186460041b69270352e9feca71a67e05eebef108df77837492799f14800df793556f573aa99383c4a215a90052be21c03dd9a0251bf604719b1794f3d0ebb01092ad2c529ebc27ce1d864db3ca1848471fe9b9ec8f60a838be88c9000911f434ed349d4efc76816d53dfc8ff8b5eba482f927445f31c9dd7fb67a3e088c1d8b543c99bc62073205ab3761957cab6b2822bf63f6291aeb297c9cb5d002b1a635f1fbf11c2dd9bf73eed9c5b533aba5f6dca121e67123", 0x197}], 0x1, 0x0, 0x168, 0x80}, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$DIOCCHANGERULE(r2, 0xcbe0441a, &(0x7f0000000040)) (async) setresuid(0x0, 0x0, r1) setresuid(0xee00, r1, 0xffffffffffffffff) (async, rerun: 32) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) (rerun: 32) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x1fdd, @mcast1, 0x6}, 0x1c) (async) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r4, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) (async) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 434.205857ms ago: executing program 1 (id=106): socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) extattr_list_link(&(0x7f0000000040)='./file0\x00', 0x2, 0x0, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) listen(r1, 0x1ff) getsockopt$sock_int(r1, 0xffff, 0x1011, 0x0, &(0x7f0000000080)) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000200)=0x8, 0x4) cap_rights_limit(r0, &(0x7f0000000000)=[0x9, 0x24]) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0xffffffffffffffff, 0x0) 389.84372ms ago: executing program 4 (id=107): cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r0, 0x0, 0x0, 0x100, &(0x7f0000000140)={0x10, 0x2, 0x0}, 0x10) select(0x40, &(0x7f0000000000)={0x6, 0x7, 0xffffffffffff1b17, 0xe99, 0xffffffffffff146d, 0x8, 0x1, 0xfb0}, 0x0, &(0x7f0000000080)={0x1b, 0x6, 0x4d4, 0x2, 0x641800000, 0xd22, 0xb8d7, 0x9}, 0x0) (async) select(0x40, &(0x7f0000000000)={0x6, 0x7, 0xffffffffffff1b17, 0xe99, 0xffffffffffff146d, 0x8, 0x1, 0xfb0}, 0x0, &(0x7f0000000080)={0x1b, 0x6, 0x4d4, 0x2, 0x641800000, 0xd22, 0xb8d7, 0x9}, 0x0) freebsd10_pipe(&(0x7f0000000540)) getpgrp(0x0) (async) r1 = getpgrp(0x0) procctl$PROC_REAP_RELEASE(0x2, r1, 0x3, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) open$dir(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0xe4) r3 = kqueue() kevent(r3, &(0x7f00000001c0)=[{0x3, 0xffffffffffffffff, 0x21}], 0x1, 0x0, 0x12, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0) aio_write(&(0x7f0000000180)={r2, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0xfffffffe, @sival_int=0xfffffff8}}) (async) aio_write(&(0x7f0000000180)={r2, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0xfffffffe, @sival_int=0xfffffff8}}) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) (async) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000240)={r4, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0xfffffffc, 0x6, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) (async) aio_write(&(0x7f0000000240)={r4, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0xfffffffc, 0x6, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) aio_error(&(0x7f0000000680)={0xffffffffffffffff, 0x15e, 0x0, 0x0, [0x5, 0x7], 0x8, 0x18, 0x7, {0x2, 0x8, 0x0}, {0x7, 0x5, @sival_int, @thr={0x0, 0x0}}}) mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1) (async) mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1) r5 = openat$md(0xffffff9c, &(0x7f0000000140), 0x8, 0x0) ioctl$MDIOCATTACH(r5, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x7b, 0x2, &(0x7f0000003280)='./file0/file0\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x0, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x1, 0xfffffffd, 0x2000000, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x1, 0x2, 0xfffffffc, 0xfe, 0x0, 0xfffff801, 0x0, 0x1003, 0x80, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x5, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) socket$inet6_tcp(0x1c, 0x1, 0x0) (async) r6 = socket$inet6_tcp(0x1c, 0x1, 0x0) r7 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r7, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setsockopt$inet6_tcp_buf(r6, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) (async) setsockopt$inet6_tcp_buf(r6, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) setsockopt$inet6_tcp_int(r6, 0x6, 0x48, &(0x7f0000000040)=0x40000402, 0x4) (async) setsockopt$inet6_tcp_int(r6, 0x6, 0x48, &(0x7f0000000040)=0x40000402, 0x4) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r9, r8) recvmsg(r8, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) (async) recvmsg(r8, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) 388.992514ms ago: executing program 0 (id=108): symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdir(&(0x7f0000001040)='./file0\x00', 0x1) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) r0 = kqueue() freebsd11_kevent(r0, &(0x7f0000001180)=[{0xde, 0xfffffffffffffffc, 0x4008, 0x20000000, 0x75, 0x4}, {0x4004, 0xfffffffffffffffe, 0x800e, 0x4, 0x4, 0x7fff}, {0x9, 0x8000000000000002, 0x20, 0x4, 0x5, 0x403}, {0x0, 0xfffffffffffffff5, 0x4001, 0x2, 0xd3, 0x7}, {0x1000, 0xfffffffffffffffd, 0x90, 0x8, 0x75, 0x8}, {0xfffffffb, 0xfffffffffffffffc, 0x1f887866033f40b7, 0x2, 0xffefdff2, 0x9}], 0x6, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200000, 0x133) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) pipe2(&(0x7f0000000480)={0xffffffffffffffff}, 0x0) writev(r3, &(0x7f0000002340)=[{&(0x7f00000004c0)="3c2e719e9fe467c83887bf0453b255ff131bf5999470b3562e087dfc1e51226d3deb834bd4fb66e4e04f8e33a0b0ba133ce23bb595064ffca711070003a34d6bfc5454c0e02704a27492e6c92413a7bbe1ca6d4828252698f4a42c14c6c333479d131e4d66ed8bc87f05a82b245d8df90b9a314035cf27e21552fee422ca1aa8a0201762262ae6117e36603843e73775a92c0cb6384bdf885d7e770bd6617cf4", 0xa0}, {&(0x7f0000001380)="6dff89ed6cea8a980f0ead6f80f9f75f28706e09209a9b0483bb8a795aa3c89393b58d2fe0817f442cbae0ddd088e057503910733fecb391d8da2ec2db6675d0c7f58d31ffd0f0462b9ca0fe64bd6e96bc3f26aee341652a1beb91f9c8f73b7e0358b9327d8524143d44bd8d5a9c0e06937f576b80d0be488b02c702d95bec831a23e10682aba27cc7669feebe1f18", 0x8f}, {&(0x7f0000001440)="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"/765, 0x79e262502ef1d89c}, {&(0x7f0000000700)="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", 0x164}, {&(0x7f0000002740)="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", 0xadb}], 0x5) write(r3, &(0x7f0000000000)="6dc8341d", 0x4) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, &(0x7f0000000100)='a', 0x1) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, &(0x7f00000005c0)='/', 0x1) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) acct(&(0x7f0000000080)='./file0\x00') mkdirat(r2, &(0x7f00000001c0)='./file1\x00', 0x0) renameat(r2, &(0x7f0000000200)='./file1\x00', r2, &(0x7f0000000140)='./file0/file0\x00') renameat(r1, &(0x7f0000000340)='./file0/file0\x00', r2, &(0x7f0000000380)='./file1\x00') unlinkat(r1, &(0x7f00000000c0)='./file1\x00', 0x800) 388.703677ms ago: executing program 1 (id=109): syz_emit_ethernet(0x13e, &(0x7f0000000240)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x108, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @remote={0xfe, 0x80, '\x00', 0x0}, [{0x4, 0x1d, "6392c3163493e193a1f4dd884cf6912507e1563b72fbe06691e00e67feca67ef9c70e19cb0593e8230cbe0b475da92912e694609f4ca924287f1ebab0de2b5046df96db34590d86fe1af1315b85e50f01cda31336b8369dc4b6abe3e91bed47dcfde514c0c909d8aa34252d3fbbf81252fc20907c17d07769cc0f409ab36c014de9ced957adb7a7290e30a8f7447f580873f49d96243f49893d9828c8149dee512ea2cbf3072259bae19fcc4be7275cd93cc1a18329b26c49d6d1751b0b415d93a07d7c1439b03a7fef8a4e103b7cb303b3606aeb4f6ff010adf0904fecad841f179d0c97d20"}, {0x4, 0x1, "6b92c1feae7f"}]}}}}}}) setresgid(0xee00, 0x0, 0x0) r0 = socket$inet6(0x1c, 0x3, 0x2) sendmsg$inet6_sctp(r0, &(0x7f0000000080)={&(0x7f0000000000)=@in={0x10, 0x2, 0x0, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0], 0x14, 0x10d}, 0x101) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) syz_extract_tcp_res(&(0x7f00000003c0), 0x3, 0x5af3) r2 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) cpuset_getid(0x1, 0x3, 0x0, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7, 0x11, r2, 0x0) freebsd11_lstat(&(0x7f0000000340)='./file0/file0\x00', &(0x7f00000002c0)) r3 = dup(r1) sendfile(r2, r3, 0x8, 0x0, 0x0, 0x0, 0x1) r4 = socket(0x26, 0x2, 0x0) connect$inet(r4, &(0x7f0000000040)={0x10, 0x2, 0x2, @broadcast}, 0x10) freebsd11_fstat(r0, &(0x7f00000000c0)) freebsd11_lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) __semctl$SEM_STAT(0x0, 0x1, 0xa, &(0x7f0000000240)=&(0x7f0000000200)={{0x0, 0x0, 0x0, 0x0}}) syz_extract_tcp_res(&(0x7f0000000380), 0x9, 0x7) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x2010, 0xffffffffffffffff, 0x0) minherit(&(0x7f0000ffc000/0x1000)=nil, 0x822fbf000, 0x3) setregid(r6, r5) 330.002508ms ago: executing program 1 (id=110): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000240), 0x4) (async) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, 0x0, 0x0) sendmsg(r0, &(0x7f0000000800)={&(0x7f0000000280)=@in6={0x1c, 0x1c, 0x0, 0xff, @ipv4={'\x00', '\xff\xff', @empty=0x2000000}, 0x7fff}, 0x1c, 0x0, 0x0, 0x0, 0x10}, 0x20100) open$dir(&(0x7f0000001240)='./file0\x00', 0x200, 0x21) (async) r1 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x2e, &(0x7f0000000100)={@local={0xfe, 0x80, '\x00', 0x0}}, 0x14) (async) sendto$inet6(r1, 0x0, 0x0, 0x40181, &(0x7f0000000080)={0x1c, 0x1c, 0x2, 0x201, @empty}, 0x1c) (async, rerun: 64) truncate(&(0x7f0000000040)='./file0\x00', 0x800e) (rerun: 64) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x11a) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r3) (async) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) pwritev(r5, 0x0, 0x0, 0x4d6) (async) sendfile(r2, r4, 0x0, 0x400000000000, 0x0, 0x0, 0x10) (async) rfork(0x3000) (async) r6 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r6, 0x29, 0x17, &(0x7f0000000680)=0x7fff, 0x4) (async, rerun: 32) setsockopt$inet6_int(r6, 0x29, 0x29, &(0x7f0000000280)=0x101, 0x4) (async, rerun: 32) mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x0, 0x410, r6, 0x4) 325.470469ms ago: executing program 0 (id=111): socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() procctl$PROC_REAP_ACQUIRE(0x0, r0, 0x2, 0x2) r1 = fork() mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) ppoll(0x0, 0x0, &(0x7f0000000040)={0x38, 0x80}, &(0x7f0000001940)={[0x0, 0x8, 0xb]}, 0x10) sigqueue(r1, 0x45, @sigval_ptr=0x7fffffff) wait4(r1, &(0x7f0000000000), 0x10, &(0x7f0000000040)) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000040)='.\x00', 0x80000049, &(0x7f0000000080)="6683c3e5fc05370e7c280631b8168da64cc779073c1e9cc0e62b3901a4c03d12fa296047573d034bdc49e0c338415a689fe532451e261d6e34c804fb8fc972b8558213f7cf61899cc4830c17994d17813d901b1a340b15b6a97762c439711fd4baee6de07f27e7674045c82f934c1257d8527b657901c819641630f50e58a4f6715cd6915b1f411180d1a259d84e0ae3b1ab986b94f0aeee52707c92c80231323b2be0204bedea1914079be0d08147498e41aa3039e792621226e0da2127e6347b9220761ad45b8d57cc144675d118aefb4d65715b2986d3ff28cc9887fc39395b1e03393c03232d97") 279.943335ms ago: executing program 1 (id=112): ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x3, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x8, 0x0, 0x2000000, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) symlink(&(0x7f0000000080)='.\x00', &(0x7f0000000240)='./file0\x00') chflags(&(0x7f0000000080)='./file0\x00', 0x60014) open$dir(&(0x7f00000000c0)='./file0\x00', 0x80, 0x50) setsockopt$inet6_buf(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) r0 = msgget$private(0x0, 0x3b2) msgsnd(r0, &(0x7f0000000240)=ANY=[@ANYBLOB="02"], 0x8, 0x800) r1 = kqueue() kevent(r1, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x2, 0x7, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) __semctl$SETVAL(0x0, 0xe60da157c29b8242, 0x8, 0x0) profil(0x0, 0x0, 0x1, 0xd6) madvise(&(0x7f0000fff000/0x1000)=nil, 0x82121b000, 0x3) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4, &(0x7f0000000000)=0xa, 0x4) cap_rights_limit(0xffffffffffffffff, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x3) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x14, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x27, 0x0, 0x0) msgrcv(r0, &(0x7f0000000000)={0x0, ""/67}, 0x47, 0x2, 0x1000) msgctl$IPC_RMID(r0, 0x0) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@broadcast, @broadcast, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x4, @empty, @loopback, @local, @local={0xac, 0x14, 0x0}}}}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) setreuid(0x0, 0xee01) setresuid(0x0, 0xee01, 0xee00) dup(r2) open$dir(&(0x7f00000001c0)='./file1\x00', 0x488200, 0x176) 0s ago: executing program 2 (id=9): open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x67, 0x0, 0x0, 0x1, 0x0, @broadcast, @broadcast}, @icmp=@mask_reply={0x12, 0x0, 0x0, 0x4}}}}}) r0 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f0000001480)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_set_file(&(0x7f0000001340)='./file0\x00', 0x2, &(0x7f0000001380)='[({\'\x00', 0x0, 0x0) extattr_set_file(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f0000000040)='\x8c][\xc7\\\x00', 0x0, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff9000/0x4000)=nil, 0x3000) shmat(0x0, &(0x7f0000ffd000/0x2000)=nil, 0x6000) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) r2 = dup(r1) ioctl$BIOCSETFNR(r2, 0x80084282, &(0x7f0000000240)={0x2, &(0x7f0000000200)=[{0x3, 0x9, 0x3, 0x1}, {0x2, 0xff, 0xe0, 0xa54}]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r3, 0xffff, 0x1019, 0x0, &(0x7f00000000c0)) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x20, 0x20) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.191' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 Expensive callout(9) function: 0xffffffff81afc400(0) 0.008549052 s if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 SYZFAIL: invalid kcov comp type type=ffffffff81857c49 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff81857c49 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff81857c49 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff81857c49 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=2 req=9 state=3 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-1.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 show registers Password: Login incorrect login: ps Jan 1 00:08:58 ci-freebsd-i386-1 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl