last executing test programs: 9.414056453s ago: executing program 0 (id=71): r0 = msgget$private(0x0, 0x7fc) msgrcv(r0, 0x0, 0x0, 0x3, 0x1000) aio_waitcomplete(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r1, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @empty, @broadcast, @local={0xac, 0x14, 0x0}}}}}) bind$inet6(r3, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) sendmsg$unix(r3, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"0b6599970e127ad54d6de5cb281e7f49179902145c4c152b91c7df3995cef04951ce546d946f159d6c05f36920069ccc9fa7343fa06abc96c7bf04113f80be09a81bd2958244999fc5233a1abe1fec1574e1f5eed6e0595df5531a8ea1ae014c1ad699810724b461547bcd75393a07ba3a442cc263e32e01078a91ad9c22b6b8c8034cf6ca8b3b5b4b2940cda8315672d261b81d3477c9112bde8ae085b828363a70f6279932a06ab20a9d18c845a2064d44cc324d6297cfd3ccb2113a9c06b87eaaa07c2ffcae960ea465154ab353368dff6b03d32e8d3e84b541c9d9011aaedd9322326687c1201d4344ea2b35b67eadf4b5faac281588c953bbdf11836e72c246564d486d1a25051eb805de8474be46d86a7a28100428b722fe29968323f3a6ca0b99886bcdc173593ff8c73a36f6a62810088e96ab0f83f02f62ae89eceba8dc55572a88785dec790eedddd4e6a19f49b207d285b7e9124b055fb56110d2584a72376aa6eccf5a718f35f3605291cae5af7799d4963ddeaffa365b91fa86a28671ee2b008909695bc542783f87a6157f7a77f2008c62b420c78891635f0d122fae6d57f89ea36dbaa00f65ea4fa8fef4913795165f26cf8f8a53e88a496ecdb987146d002d63c6fd27c929b3c2d2b4f9fb19ea665d20ea37f39115ac28dab0cf9a8d23bc4748bc211345a694cab5a4c6cdec959ec8a0fa062411f0175fb8e89b23154efbb5e2d890c1fa7524783b47f2ad1ac866365019224de7018cdc8d876c183518b15681f427bd148c47e141dcd72ed720947bafff4dc5159c8def7dea8dea62fc61f1248f3276e84358db0c96b92da5de390d3a9eec96d44497acf20738e1c1194d5b0556f8172d7d35aa286b5b5ecf8380d27e973aab2404e3a9a3601e5343e7af710343d2191b3df75d992dd6c51259e79750c96d6d05c236492fc2e715fcbc8c9f5185ef3b86a87d79d3ee071d844eb15694f7884942be6637697f9875995b4a77b4a19d04c38df04484b2fa7ceaf79c0234ed58aac3ebe06b8bd501efc6a526c1a8492b059cc36c1ffb3c68edce05ecce7327460199fdceca05269bee671f35097aaa971eed57931dacfdb5ce7178e6ca88af8ba2fb967bddf6e5e86fdc1776fd45f57f37979a54c2698df36feb63a5efdb3636f09715a7f6bed5fe0a955ee1b499f34338f14b530b9d71a088978a11eaba784b12886cb1cb9d53ec077512f95e135857f17459b956f3ca71b209d11e7512275421adb1a12851f277f5e73b514145d7d733725e3ada50cc7027e1d992bff5f37334c7a429e20675832df09ad24483cad85a4ad9a9d8e87975eee7827375b19d8a4ef0e7b84fd21e613e882b3a80b10686bd3ca210f8014f2e100e6df28756639cd360558776e60a23e8a7eb81a56b90b39a23037387810b4f79e2c6328876c911b496ff227a31", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) chroot(0x0) r4 = socket(0x2, 0x1, 0x0) setuid(0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000200)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "0400", 0x30, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0xfd, '\x00', {0x0, 0x6, "5adf00", 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1}}}}}}}) fcntl$setown(r5, 0x6, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000780)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x3fff, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x28, 0xb, 0x0, {0x18, 0x4, 0x0, 0x7, 0x5, 0x67, 0x75b, 0x8, 0x5d, 0x9, @broadcast, @loopback, {[@rr={0x7, 0x7, 0x7, [@multicast1]}, @lsrr={0x83, 0x23, 0x5, [@remote={0xac, 0x14, 0x0}, @loopback, @local={0xac, 0x14, 0x0}, @rand_addr=0x1, @empty, @multicast1, @rand_addr, @multicast1]}, @ssrr={0x89, 0xb, 0xb, [@multicast1, @multicast2]}, @rr={0x7, 0x7, 0xf, [@local={0xac, 0x14, 0x0}]}, @generic={0x85, 0x8, "b99192106ca1"}, @ra={0x94, 0x6, 0x3}]}}}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) syz_emit_ethernet(0x7e, &(0x7f0000000300)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd605f6ad900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa020090780000fe8000000000000000000000000000aa0000000000000000000000000000000164020071faff0000fe8000"/113]) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @ra={0x94, 0x6, 0x1}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1}}}}}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)={0x81, 0x2, 0x8, 0x6}, 0x8) socket(0x1c, 0x1, 0x0) 7.931235887s ago: executing program 1 (id=76): r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x401, 0x0) msgsnd(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="03"], 0x8, 0x0) msgrcv(r1, &(0x7f0000000940)={0x0, ""/4115}, 0xfffffffffffffe7f, 0x2, 0x2800) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x20) r2 = socket(0x1c, 0x1, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) r3 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7, 0x11, r3, 0x0) mlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r5, r4) r6 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendfile(r6, r4, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) ioctl$BIOCSETF(r7, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) openat$bpf(0xffffff9c, &(0x7f0000000540), 0x80000, 0x0) select(0x40, &(0x7f0000000600)={0x2637047b, 0xde, 0x1, 0x3, 0x9, 0x0, 0xd67b, 0x6}, &(0x7f0000000640)={0x4, 0x6, 0xfffffffffffffff8, 0x6891, 0x6a7, 0x9, 0x10000, 0x3}, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) open$dir(&(0x7f0000000200)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 7.449849703s ago: executing program 0 (id=77): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e5134877117c0d140c8c7da481e08f9382b3830c", 0x1c) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') aio_waitcomplete(0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r1 = kqueue() r2 = socket(0x1c, 0x1, 0x0) socket(0x11, 0x10000000000003, 0x9a) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @local, @multicast2, @local, @rand_addr=0x4}}}}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) kevent(r1, &(0x7f0000000040)=[{0x9, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) sendmsg$inet6_sctp(0xffffffffffffffff, 0x0, 0x0) r3 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400004002c2, 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000000340)='wb', 0x2}], 0x1, 0x0) r4 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r4, 0xe18) open$dir(0x0, 0x40000400000002c2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) getpeername(r5, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, &(0x7f0000000280)=0x1c) ioctl$SMB_WRITEB(0xffffffffffffffff, 0xc0086924, 0x0) shmget(0x3, 0x3000, 0x274, &(0x7f0000ffa000/0x3000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x15000588, &(0x7f0000000140)) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) freebsd10_pipe(&(0x7f0000000540)) 7.25658863s ago: executing program 2 (id=78): r0 = msgget$private(0x0, 0x7fc) msgsnd(r0, &(0x7f0000000440)=ANY=[@ANYBLOB="03fbff000000"], 0x8, 0x0) aio_waitcomplete(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r1, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @empty, @broadcast, @local={0xac, 0x14, 0x0}}}}}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) chroot(0x0) r3 = socket(0x2, 0x1, 0x0) setuid(0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000200)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "0400", 0x30, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0xfd, '\x00', {0x0, 0x6, "5adf00", 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1}}}}}}}) fcntl$setown(r4, 0x6, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000780)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x3fff, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x28, 0xb, 0x0, {0x18, 0x4, 0x0, 0x7, 0x5, 0x67, 0x75b, 0x8, 0x5d, 0x9, @broadcast, @loopback, {[@rr={0x7, 0x7, 0x7, [@multicast1]}, @lsrr={0x83, 0x23, 0x5, [@remote={0xac, 0x14, 0x0}, @loopback, @local={0xac, 0x14, 0x0}, @rand_addr=0x1, @empty, @multicast1, @rand_addr, @multicast1]}, @ssrr={0x89, 0xb, 0xb, [@multicast1, @multicast2]}, @rr={0x7, 0x7, 0xf, [@local={0xac, 0x14, 0x0}]}, @generic={0x85, 0x8, "b99192106ca1"}, @ra={0x94, 0x6, 0x3}]}}}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_emit_ethernet(0x7e, &(0x7f0000000300)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd605f6ad900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa020090780000fe8000000000000000000000000000aa0000000000000000000000000000000164020071faff0000fe8000"/113]) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @ra={0x94, 0x6, 0x1}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1}}}}}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)={0x81, 0x2, 0x8, 0x6}, 0x8) socket(0x1c, 0x1, 0x0) 7.245485075s ago: executing program 3 (id=79): msgrcv(0x0, 0x0, 0x0, 0x3, 0x1000) msgsnd(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="03fbff000000"], 0x8, 0x0) aio_waitcomplete(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r0, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @empty, @broadcast, @local={0xac, 0x14, 0x0}}}}}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) chroot(0x0) r2 = socket(0x2, 0x1, 0x0) setuid(0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000200)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "0400", 0x30, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0xfd, '\x00', {0x0, 0x6, "5adf00", 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1}}}}}}}) fcntl$setown(r3, 0x6, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000780)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x3fff, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x28, 0xb, 0x0, {0x18, 0x4, 0x0, 0x7, 0x5, 0x67, 0x75b, 0x8, 0x5d, 0x9, @broadcast, @loopback, {[@rr={0x7, 0x7, 0x7, [@multicast1]}, @lsrr={0x83, 0x23, 0x5, [@remote={0xac, 0x14, 0x0}, @loopback, @local={0xac, 0x14, 0x0}, @rand_addr=0x1, @empty, @multicast1, @rand_addr, @multicast1]}, @ssrr={0x89, 0xb, 0xb, [@multicast1, @multicast2]}, @rr={0x7, 0x7, 0xf, [@local={0xac, 0x14, 0x0}]}, @generic={0x85, 0x8, "b99192106ca1"}, @ra={0x94, 0x6, 0x3}]}}}}}}}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) syz_emit_ethernet(0x7e, &(0x7f0000000300)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd605f6ad900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa020090780000fe8000000000000000000000000000aa0000000000000000000000000000000164020071faff0000fe8000"/113]) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @ra={0x94, 0x6, 0x1}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1}}}}}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)={0x81, 0x2, 0x8, 0x6}, 0x8) socket(0x1c, 0x1, 0x0) 5.992050684s ago: executing program 2 (id=80): mount(0x0, 0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r0 = kqueue() freebsd11_mknod(0x0, 0x1000, 0x0) chmod(&(0x7f0000000280)='./file0\x00', 0x2768c724b44f58aa) open$dir(&(0x7f00000000c0)='./file1\x00', 0x80201, 0x0) kevent(r0, &(0x7f0000000040)=[{0x12dd, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, 0x0, 0x0) __semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) msgget(0x1, 0x213) msgget(0x1, 0x501) select(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f0000000740)="b100050390000000050008000700ca900f0e08fece6ef0ffffffffffff3fd3357a00000000000000006336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af080037282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0208a371a3f8000000800080000001000000000000000000", 0xb1, 0x20000, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa94ea09066dbd00000000000000000000000000bbfe8000000000000000000000000000aa4e204e220008907800"/62]) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/30, 0x1e) fcntl$setflags(r3, 0x2, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x118, &(0x7f00000002c0)=ANY=[@ANYBLOB="9958f7d20cf5647f0c8c24fc4c774a9f1da928f6e16d6687a59efc14405e758aa8613549e0de08b0babfc46a5b2d95e77ed1cca5d53ef840", @ANYRESOCT, @ANYRES8, @ANYRESDEC]) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) fork() 5.962062516s ago: executing program 1 (id=81): r0 = msgget$private(0x0, 0x7fc) msgrcv(r0, 0x0, 0x0, 0x3, 0x1000) msgsnd(r0, 0x0, 0x8, 0x0) aio_waitcomplete(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r1, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @empty, @broadcast, @local={0xac, 0x14, 0x0}}}}}) bind$inet6(r3, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) sendmsg$unix(r3, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) chroot(0x0) r4 = socket(0x2, 0x1, 0x0) setuid(0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000200)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "0400", 0x30, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0xfd, '\x00', {0x0, 0x6, "5adf00", 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1}}}}}}}) fcntl$setown(r5, 0x6, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000780)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x3fff, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x28, 0xb, 0x0, {0x18, 0x4, 0x0, 0x7, 0x5, 0x67, 0x75b, 0x8, 0x5d, 0x9, @broadcast, @loopback, {[@rr={0x7, 0x7, 0x7, [@multicast1]}, @lsrr={0x83, 0x23, 0x5, [@remote={0xac, 0x14, 0x0}, @loopback, @local={0xac, 0x14, 0x0}, @rand_addr=0x1, @empty, @multicast1, @rand_addr, @multicast1]}, @ssrr={0x89, 0xb, 0xb, [@multicast1, @multicast2]}, @rr={0x7, 0x7, 0xf, [@local={0xac, 0x14, 0x0}]}, @generic={0x85, 0x8, "b99192106ca1"}, @ra={0x94, 0x6, 0x3}]}}}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) syz_emit_ethernet(0x7e, &(0x7f0000000300)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd605f6ad900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa020090780000fe8000000000000000000000000000aa0000000000000000000000000000000164020071faff0000fe8000"/113]) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @ra={0x94, 0x6, 0x1}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1}}}}}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)={0x81, 0x2, 0x8, 0x6}, 0x8) socket(0x1c, 0x1, 0x0) 5.466369711s ago: executing program 3 (id=82): openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200201, 0x112) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) ktrace(0x0, 0x5, 0x40000424, 0xffffffffffffffff) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x106, 0x0) socket(0x2, 0x3, 0x9) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x23, 0x0, &(0x7f00000014c0)) ioctl$MDIOCQUERY(0xffffffffffffffff, 0xc1b46d02, &(0x7f0000000840)={0xb, 0x1, 0x0, &(0x7f0000000040)='./file0/file0\x00', 0xf, 0xfffe, 0x1, 0x1, 0x80000001, 0xa, &(0x7f0000000080)='!/:,\x00', [0x28, 0x3, 0x8, 0xffff, 0x6, 0x5, 0x400, 0x584, 0x400, 0x0, 0xffff186c, 0x2, 0x6, 0x8, 0xe64e, 0x1, 0x3, 0xe, 0x4, 0x9, 0xa0, 0xffff, 0x4, 0x7fff, 0x48f71abc, 0x7ff8, 0x8, 0x1000, 0x1ff, 0x7, 0x1, 0xfffffffe, 0xfdf, 0xa, 0x5, 0x3, 0x2, 0x2, 0xc7a, 0x580, 0x800, 0xd, 0x3, 0x7, 0x200020, 0x1d96, 0x7, 0x2, 0x1, 0x80000000, 0x4, 0x1, 0xffff, 0xfffffffb, 0x5, 0xee5, 0x1, 0x0, 0x8, 0x0, 0x40, 0x2000ff, 0x1c3, 0x3, 0x6, 0x8001, 0x2, 0xc704, 0x1, 0xd4b, 0x6, 0xe36, 0x6, 0x8, 0x5, 0x4, 0x0, 0x3, 0x7ffffffe, 0x6, 0x101, 0x9, 0x10, 0x3, 0x1000, 0x5a1, 0x9, 0x4, 0x9, 0x6b, 0x1, 0x6, 0x0, 0x4, 0x0, 0x4]}) socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) chdir(&(0x7f0000000400)='./file/file0/..//file0\x00') r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r3, 0x0, 0x53, &(0x7f0000000700)={0x800, {{0x10, 0x2, 0x0}}, {{0x1, 0x2, 0x3, @broadcast}}}, 0x108) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, &(0x7f0000000100)='a', 0x1) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000140)=0x3, 0x4) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, 0x0, 0x0) open$dir(0x0, 0x110206, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0xc4, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) socket$inet_udp(0x2, 0x2, 0x0) freebsd11_lstat(&(0x7f0000001500)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 4.34275221s ago: executing program 0 (id=83): r0 = socket(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x80, 0x0, 0x0) __specialfd$inotify(0x2, &(0x7f00000001c0)={0x4}, 0x4) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) r1 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r1, 0xc1b46d00, &(0x7f0000000640)={0x3, 0x7fffff7f, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x4, 0x0, [0x7f, 0x2, 0x0, 0x0, 0x40, 0x0, 0x3ff, 0x0, 0x2, 0xfffff70e, 0x5, 0x4, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x0, 0x0, 0x1, 0x1, 0x4, 0x0, 0x0, 0xe11e, 0x8000000, 0x3, 0x42f, 0xfffffffd, 0x0, 0x3, 0x3fffff, 0xf, 0xfffffffd, 0xfffffffa, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x40007, 0x0, 0xa, 0x3, 0x0, 0x9, 0x4, 0xfffffffe, 0x0, 0x200005, 0x0, 0x0, 0x0, 0x1, 0xfffffffe, 0x6cdd1400, 0x0, 0xf, 0x5, 0x9, 0x0, 0xfffff37c, 0x0, 0xae, 0x0, 0xc, 0x1, 0x4, 0x3, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x400, 0x40000, 0x0, 0x0, 0x0, 0x86]}) r2 = socket(0x2, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x4de, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa9cd7361987d486dd60ecea6604a80000fe8000000000000089750e6b000000aaff0200000000000000000000000000010020000000000000000100000093"]) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) open(0x0, 0x4, 0x0) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x3, 0xffffffffffffffff) writev(r5, 0x0, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x20011, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x70e, 0x1) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) sendmsg$inet_sctp(r3, 0x0, 0x0) fhstat(&(0x7f0000000280)={{[0x5, 0x715]}, {0x9, 0x9, "d48ec0b74449bb57a2ff96b70c4512e8"}}, &(0x7f0000000880)) writev(r3, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x3, 0xfffffffffffffff9, 0x8012, 0x4f, 0xfffffffffffffffe, 0x0, [0x3, 0x2000080000000000, 0x0, 0x9]}], 0x1, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r6 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r6, 0x0, 0x7, 0x0) poll(0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 4.24352157s ago: executing program 2 (id=84): r0 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r1 = msgget$private(0x0, 0x0) msgsnd(r1, &(0x7f0000000280)=ANY=[@ANYRES32=r0], 0x401, 0x0) msgsnd(r1, &(0x7f0000000900)=ANY=[@ANYBLOB="03"], 0x8, 0x0) msgrcv(r1, &(0x7f0000000940)={0x0, ""/4115}, 0xfffffffffffffe7f, 0x2, 0x2800) truncate(&(0x7f0000000040)='./file0\x00', 0x4677) aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x20) r2 = socket(0x1c, 0x1, 0x0) ftruncate(0xffffffffffffffff, 0x3862) r3 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7, 0x11, r3, 0x0) mlock(&(0x7f0000ffa000/0x2000)=nil, 0x2000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) r4 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) dup2(r5, r4) r6 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendfile(r6, r4, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), 0x0) ioctl$BIOCSETF(r7, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) openat$bpf(0xffffff9c, &(0x7f0000000540), 0x80000, 0x0) select(0x40, &(0x7f0000000600)={0x2637047b, 0xde, 0x1, 0x3, 0x9, 0x0, 0xd67b, 0x6}, &(0x7f0000000640)={0x4, 0x6, 0xfffffffffffffff8, 0x6891, 0x6a7, 0x9, 0x10000, 0x3}, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) open$dir(&(0x7f0000000200)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) 3.852409524s ago: executing program 3 (id=85): openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200201, 0x112) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) ktrace(0x0, 0x5, 0x40000424, 0xffffffffffffffff) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x106, 0x0) socket(0x2, 0x3, 0x9) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x23, 0x0, &(0x7f00000014c0)) ioctl$MDIOCQUERY(0xffffffffffffffff, 0xc1b46d02, &(0x7f0000000840)={0xb, 0x1, 0x0, &(0x7f0000000040)='./file0/file0\x00', 0xf, 0xfffe, 0x1, 0x1, 0x80000001, 0xa, &(0x7f0000000080)='!/:,\x00', [0x28, 0x3, 0x8, 0xffff, 0x6, 0x5, 0x400, 0x584, 0x400, 0x0, 0xffff186c, 0x2, 0x6, 0x8, 0xe64e, 0x1, 0x3, 0xe, 0x4, 0x9, 0xa0, 0xffff, 0x4, 0x7fff, 0x48f71abc, 0x7ff8, 0x8, 0x1000, 0x1ff, 0x7, 0x1, 0xfffffffe, 0xfdf, 0xa, 0x5, 0x3, 0x2, 0x2, 0xc7a, 0x580, 0x800, 0xd, 0x3, 0x7, 0x200020, 0x1d96, 0x7, 0x2, 0x1, 0x80000000, 0x4, 0x1, 0xffff, 0xfffffffb, 0x5, 0xee5, 0x1, 0x0, 0x8, 0x0, 0x40, 0x2000ff, 0x1c3, 0x3, 0x6, 0x8001, 0x2, 0xc704, 0x1, 0xd4b, 0x6, 0xe36, 0x6, 0x8, 0x5, 0x4, 0x0, 0x3, 0x7ffffffe, 0x6, 0x101, 0x9, 0x10, 0x3, 0x1000, 0x5a1, 0x9, 0x4, 0x9, 0x6b, 0x1, 0x6, 0x0, 0x4, 0x0, 0x4]}) socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) chdir(&(0x7f0000000400)='./file/file0/..//file0\x00') r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r3, 0x0, 0x53, &(0x7f0000000700)={0x800, {{0x10, 0x2, 0x0}}, {{0x1, 0x2, 0x3, @broadcast}}}, 0x108) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, &(0x7f0000000100)='a', 0x1) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000140)=0x3, 0x4) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, 0x0, 0x0) open$dir(0x0, 0x110206, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0xc4, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) socket$inet_udp(0x2, 0x2, 0x0) freebsd11_lstat(&(0x7f0000001500)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 3.850312135s ago: executing program 1 (id=86): mount(0x0, 0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r0 = kqueue() freebsd11_mknod(0x0, 0x1000, 0x0) chmod(&(0x7f0000000280)='./file0\x00', 0x2768c724b44f58aa) open$dir(&(0x7f00000000c0)='./file1\x00', 0x80201, 0x0) kevent(r0, &(0x7f0000000040)=[{0x12dd, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, 0x0, 0x0) __semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) msgget(0x1, 0x213) msgget(0x1, 0x501) select(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f0000000740)="b100050390000000050008000700ca900f0e08fece6ef0ffffffffffff3fd3357a00000000000000006336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af080037282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0208a371a3f8000000800080000001000000000000000000", 0xb1, 0x20000, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa94ea09066dbd00000000000000000000000000bbfe8000000000000000000000000000aa4e204e220008907800"/62]) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/30, 0x1e) fcntl$setflags(r3, 0x2, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) syz_emit_ethernet(0x118, &(0x7f00000002c0)=ANY=[@ANYBLOB="9958f7d20cf5647f0c8c24fc4c774a9f1da928f6e16d6687a59efc14405e758aa8613549e0de08b0babfc46a5b2d95e77ed1cca5d53ef840", @ANYRESOCT, @ANYRES8=r6, @ANYRESDEC]) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) fork() 3.443094202s ago: executing program 0 (id=87): r0 = msgget$private(0x0, 0x7fc) msgrcv(r0, 0x0, 0x0, 0x3, 0x1000) aio_waitcomplete(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r1, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @empty, @broadcast, @local={0xac, 0x14, 0x0}}}}}) bind$inet6(r3, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) sendmsg$unix(r3, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) chroot(0x0) r4 = socket(0x2, 0x1, 0x0) setuid(0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000200)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "0400", 0x30, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0xfd, '\x00', {0x0, 0x6, "5adf00", 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1}}}}}}}) fcntl$setown(r5, 0x6, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000780)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x3fff, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x28, 0xb, 0x0, {0x18, 0x4, 0x0, 0x7, 0x5, 0x67, 0x75b, 0x8, 0x5d, 0x9, @broadcast, @loopback, {[@rr={0x7, 0x7, 0x7, [@multicast1]}, @lsrr={0x83, 0x23, 0x5, [@remote={0xac, 0x14, 0x0}, @loopback, @local={0xac, 0x14, 0x0}, @rand_addr=0x1, @empty, @multicast1, @rand_addr, @multicast1]}, @ssrr={0x89, 0xb, 0xb, [@multicast1, @multicast2]}, @rr={0x7, 0x7, 0xf, [@local={0xac, 0x14, 0x0}]}, @generic={0x85, 0x8, "b99192106ca1"}, @ra={0x94, 0x6, 0x3}]}}}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) syz_emit_ethernet(0x7e, &(0x7f0000000300)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd605f6ad900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa020090780000fe8000000000000000000000000000aa0000000000000000000000000000000164020071faff0000fe8000"/113]) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @ra={0x94, 0x6, 0x1}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1}}}}}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)={0x81, 0x2, 0x8, 0x6}, 0x8) socket(0x1c, 0x1, 0x0) 3.336220165s ago: executing program 2 (id=88): r0 = socket(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x80, 0x0, 0x0) __specialfd$inotify(0x2, &(0x7f00000001c0)={0x4}, 0x4) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) r1 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r1, 0xc1b46d00, &(0x7f0000000640)={0x3, 0x7fffff7f, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x4, 0x0, [0x7f, 0x2, 0x0, 0x0, 0x40, 0x0, 0x3ff, 0x0, 0x2, 0xfffff70e, 0x5, 0x4, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x0, 0x0, 0x1, 0x1, 0x4, 0x0, 0x0, 0xe11e, 0x8000000, 0x3, 0x42f, 0xfffffffd, 0x0, 0x3, 0x3fffff, 0xf, 0xfffffffd, 0xfffffffa, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x40007, 0x0, 0xa, 0x3, 0x0, 0x9, 0x4, 0xfffffffe, 0x0, 0x200005, 0x0, 0x0, 0x0, 0x1, 0xfffffffe, 0x6cdd1400, 0x0, 0xf, 0x5, 0x9, 0x0, 0xfffff37c, 0x0, 0xae, 0x0, 0xc, 0x1, 0x4, 0x3, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x400, 0x40000, 0x0, 0x0, 0x0, 0x86]}) r2 = socket(0x2, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x4de, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa9cd7361987d486dd60ecea6604a80000fe8000000000000089750e6b000000aaff0200000000000000000000000000010020000000000000000100000093"]) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) open(0x0, 0x4, 0x0) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x3, 0xffffffffffffffff) writev(r5, 0x0, 0x0) r6 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x20011, r6, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x70e, 0x1) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) sendmsg$inet_sctp(r3, 0x0, 0x0) fhstat(&(0x7f0000000280)={{[0x5, 0x715]}, {0x9, 0x9, "d48ec0b74449bb57a2ff96b70c4512e8"}}, &(0x7f0000000880)) writev(r3, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x3, 0xfffffffffffffff9, 0x8012, 0x4f, 0xfffffffffffffffe, 0x0, [0x3, 0x2000080000000000, 0x0, 0x9]}], 0x1, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r7 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r7, 0x0, 0x7, 0x0) poll(0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 2.780990435s ago: executing program 1 (id=89): r0 = msgget$private(0x0, 0x7fc) msgrcv(r0, 0x0, 0x0, 0x3, 0x1000) aio_waitcomplete(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r1, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @empty, @broadcast, @local={0xac, 0x14, 0x0}}}}}) bind$inet6(r3, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) sendmsg$unix(r3, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) chroot(0x0) r4 = socket(0x2, 0x1, 0x0) setuid(0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000200)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "0400", 0x30, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0xfd, '\x00', {0x0, 0x6, "5adf00", 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1}}}}}}}) fcntl$setown(r5, 0x6, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000780)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x3fff, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x28, 0xb, 0x0, {0x18, 0x4, 0x0, 0x7, 0x5, 0x67, 0x75b, 0x8, 0x5d, 0x9, @broadcast, @loopback, {[@rr={0x7, 0x7, 0x7, [@multicast1]}, @lsrr={0x83, 0x23, 0x5, [@remote={0xac, 0x14, 0x0}, @loopback, @local={0xac, 0x14, 0x0}, @rand_addr=0x1, @empty, @multicast1, @rand_addr, @multicast1]}, @ssrr={0x89, 0xb, 0xb, [@multicast1, @multicast2]}, @rr={0x7, 0x7, 0xf, [@local={0xac, 0x14, 0x0}]}, @generic={0x85, 0x8, "b99192106ca1"}, @ra={0x94, 0x6, 0x3}]}}}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) syz_emit_ethernet(0x7e, &(0x7f0000000300)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd605f6ad900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa020090780000fe8000000000000000000000000000aa0000000000000000000000000000000164020071faff0000fe8000"/113]) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @ra={0x94, 0x6, 0x1}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1}}}}}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)={0x81, 0x2, 0x8, 0x6}, 0x8) socket(0x1c, 0x1, 0x0) 2.737372687s ago: executing program 3 (id=90): r0 = socket(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x80, 0x0, 0x0) __specialfd$inotify(0x2, &(0x7f00000001c0)={0x4}, 0x4) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) r1 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r1, 0xc1b46d00, &(0x7f0000000640)={0x3, 0x7fffff7f, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x4, 0x0, [0x7f, 0x2, 0x0, 0x0, 0x40, 0x0, 0x3ff, 0x0, 0x2, 0xfffff70e, 0x5, 0x4, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x0, 0x0, 0x1, 0x1, 0x4, 0x0, 0x0, 0xe11e, 0x8000000, 0x3, 0x42f, 0xfffffffd, 0x0, 0x3, 0x3fffff, 0xf, 0xfffffffd, 0xfffffffa, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x40007, 0x0, 0xa, 0x3, 0x0, 0x9, 0x4, 0xfffffffe, 0x0, 0x200005, 0x0, 0x0, 0x0, 0x1, 0xfffffffe, 0x6cdd1400, 0x0, 0xf, 0x5, 0x9, 0x0, 0xfffff37c, 0x0, 0xae, 0x0, 0xc, 0x1, 0x4, 0x3, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x400, 0x40000, 0x0, 0x0, 0x0, 0x86]}) r2 = socket(0x2, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x4de, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa9cd7361987d486dd60ecea6604a80000fe8000000000000089750e6b000000aaff0200000000000000000000000000010020000000000000000100000093"]) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) open(0x0, 0x4, 0x0) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x3, 0xffffffffffffffff) writev(r5, 0x0, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) open(&(0x7f0000000180)='./file0\x00', 0x70e, 0x1) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) sendmsg$inet_sctp(r3, 0x0, 0x0) fhstat(&(0x7f0000000280)={{[0x5, 0x715]}, {0x9, 0x9, "d48ec0b74449bb57a2ff96b70c4512e8"}}, &(0x7f0000000880)) writev(r3, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x3, 0xfffffffffffffff9, 0x8012, 0x4f, 0xfffffffffffffffe, 0x0, [0x3, 0x2000080000000000, 0x0, 0x9]}], 0x1, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r6 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r6, 0x0, 0x7, 0x0) poll(0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 2.320666809s ago: executing program 2 (id=91): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e5134877117c0d140c8c7da481e08f9382b3830c", 0x1c) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') aio_waitcomplete(0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r1 = kqueue() r2 = socket(0x1c, 0x1, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000140)="b10005059000e803480308c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a371a3f8000000000000000000010090d2c4e5187c00", 0xb1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)={@local, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @local, @multicast2, @local, @rand_addr=0x4}}}}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) kevent(r1, &(0x7f0000000040)=[{0x9, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) sendmsg$inet6_sctp(0xffffffffffffffff, 0x0, 0x0) r3 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400004002c2, 0x0) pwritev(r3, &(0x7f0000000080)=[{&(0x7f0000000340)='wb', 0x2}], 0x1, 0x0) r4 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r4, 0xe18) open$dir(0x0, 0x40000400000002c2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) getpeername(r5, &(0x7f00000000c0)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, &(0x7f0000000280)=0x1c) ioctl$SMB_WRITEB(0xffffffffffffffff, 0xc0086924, 0x0) shmget(0x3, 0x3000, 0x274, &(0x7f0000ffa000/0x3000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x15000588, &(0x7f0000000140)) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) freebsd10_pipe(&(0x7f0000000540)) 2.29396874s ago: executing program 0 (id=92): r0 = socket(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x80, 0x0, 0x0) __specialfd$inotify(0x2, &(0x7f00000001c0)={0x4}, 0x4) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) r1 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r1, 0xc1b46d00, &(0x7f0000000640)={0x3, 0x7fffff7f, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x4, 0x0, [0x7f, 0x2, 0x0, 0x0, 0x40, 0x0, 0x3ff, 0x0, 0x2, 0xfffff70e, 0x5, 0x4, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x0, 0x0, 0x1, 0x1, 0x4, 0x0, 0x0, 0xe11e, 0x8000000, 0x3, 0x42f, 0xfffffffd, 0x0, 0x3, 0x3fffff, 0xf, 0xfffffffd, 0xfffffffa, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x40007, 0x0, 0xa, 0x3, 0x0, 0x9, 0x4, 0xfffffffe, 0x0, 0x200005, 0x0, 0x0, 0x0, 0x1, 0xfffffffe, 0x6cdd1400, 0x0, 0xf, 0x5, 0x9, 0x0, 0xfffff37c, 0x0, 0xae, 0x0, 0xc, 0x1, 0x4, 0x3, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x400, 0x40000, 0x0, 0x0, 0x0, 0x86]}) r2 = socket(0x2, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x4de, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa9cd7361987d486dd60ecea6604a80000fe8000000000000089750e6b000000aaff0200000000000000000000000000010020000000000000000100000093"]) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) open(0x0, 0x4, 0x0) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x3, 0xffffffffffffffff) writev(r5, 0x0, 0x0) r6 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x20011, r6, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x70e, 0x1) sendmsg$inet_sctp(r3, 0x0, 0x0) fhstat(&(0x7f0000000280)={{[0x5, 0x715]}, {0x9, 0x9, "d48ec0b74449bb57a2ff96b70c4512e8"}}, &(0x7f0000000880)) writev(r3, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x3, 0xfffffffffffffff9, 0x8012, 0x4f, 0xfffffffffffffffe, 0x0, [0x3, 0x2000080000000000, 0x0, 0x9]}], 0x1, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r7 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r7, 0x0, 0x7, 0x0) poll(0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 1.795731765s ago: executing program 3 (id=93): msgrcv(0x0, 0x0, 0x0, 0x3, 0x1000) msgsnd(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="03fbff000000"], 0x8, 0x0) aio_waitcomplete(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r0, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@broadcast, @local, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @remote, @empty, @broadcast, @local={0xac, 0x14, 0x0}}}}}) bind$inet6(r2, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) sendmsg$unix(r2, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0x9, 0x9, 0x5, 0x9, 0x10f3, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) chroot(0x0) r3 = socket(0x2, 0x1, 0x0) setuid(0xffffffffffffffff) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000200)={@broadcast, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "0400", 0x30, 0x3a, 0x0, @empty, @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0xfd, '\x00', {0x0, 0x6, "5adf00", 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, @mcast1}}}}}}}) fcntl$setown(r4, 0x6, 0x0) syz_emit_ethernet(0x8a, &(0x7f0000000780)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x7c, 0x0, 0x3fff, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0x28, 0xb, 0x0, {0x18, 0x4, 0x0, 0x7, 0x5, 0x67, 0x75b, 0x8, 0x5d, 0x9, @broadcast, @loopback, {[@rr={0x7, 0x7, 0x7, [@multicast1]}, @lsrr={0x83, 0x23, 0x5, [@remote={0xac, 0x14, 0x0}, @loopback, @local={0xac, 0x14, 0x0}, @rand_addr=0x1, @empty, @multicast1, @rand_addr, @multicast1]}, @ssrr={0x89, 0xb, 0xb, [@multicast1, @multicast2]}, @rr={0x7, 0x7, 0xf, [@local={0xac, 0x14, 0x0}]}, @generic={0x85, 0x8, "b99192106ca1"}, @ra={0x94, 0x6, 0x3}]}}}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_emit_ethernet(0x7e, &(0x7f0000000300)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd605f6ad900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa020090780000fe8000000000000000000000000000aa0000000000000000000000000000000164020071faff0000fe8000"/113]) syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @ra={0x94, 0x6, 0x1}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1}}}}}) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, &(0x7f0000000200)={0x81, 0x2, 0x8, 0x6}, 0x8) socket(0x1c, 0x1, 0x0) 1.386483163s ago: executing program 1 (id=94): r0 = socket(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x80, 0x0, 0x0) __specialfd$inotify(0x2, &(0x7f00000001c0)={0x4}, 0x4) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) r1 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r1, 0xc1b46d00, &(0x7f0000000640)={0x3, 0x7fffff7f, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x4, 0x0, [0x7f, 0x2, 0x0, 0x0, 0x40, 0x0, 0x3ff, 0x0, 0x2, 0xfffff70e, 0x5, 0x4, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x0, 0x0, 0x1, 0x1, 0x4, 0x0, 0x0, 0xe11e, 0x8000000, 0x3, 0x42f, 0xfffffffd, 0x0, 0x3, 0x3fffff, 0xf, 0xfffffffd, 0xfffffffa, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x40007, 0x0, 0xa, 0x3, 0x0, 0x9, 0x4, 0xfffffffe, 0x0, 0x200005, 0x0, 0x0, 0x0, 0x1, 0xfffffffe, 0x6cdd1400, 0x0, 0xf, 0x5, 0x9, 0x0, 0xfffff37c, 0x0, 0xae, 0x0, 0xc, 0x1, 0x4, 0x3, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x400, 0x40000, 0x0, 0x0, 0x0, 0x86]}) r2 = socket(0x2, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x4de, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa9cd7361987d486dd60ecea6604a80000fe8000000000000089750e6b000000aaff0200000000000000000000000000010020000000000000000100000093"]) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) open(0x0, 0x4, 0x0) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) r5 = fcntl$dupfd(r4, 0x3, 0xffffffffffffffff) writev(r5, 0x0, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x20011, 0xffffffffffffffff, 0x0) open(&(0x7f0000000180)='./file0\x00', 0x70e, 0x1) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) sendmsg$inet_sctp(r3, 0x0, 0x0) fhstat(&(0x7f0000000280)={{[0x5, 0x715]}, {0x9, 0x9, "d48ec0b74449bb57a2ff96b70c4512e8"}}, &(0x7f0000000880)) writev(r3, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x3, 0xfffffffffffffff9, 0x8012, 0x4f, 0xfffffffffffffffe, 0x0, [0x3, 0x2000080000000000, 0x0, 0x9]}], 0x1, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r6 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r6, 0x0, 0x7, 0x0) poll(0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 970.282286ms ago: executing program 0 (id=95): mount(0x0, 0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r0 = kqueue() freebsd11_mknod(0x0, 0x1000, 0x0) chmod(&(0x7f0000000280)='./file0\x00', 0x2768c724b44f58aa) open$dir(&(0x7f00000000c0)='./file1\x00', 0x80201, 0x0) kevent(r0, &(0x7f0000000040)=[{0x12dd, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, 0x0, 0x0) __semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) msgget(0x1, 0x213) msgget(0x1, 0x501) select(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f0000000740)="b100050390000000050008000700ca900f0e08fece6ef0ffffffffffff3fd3357a00000000000000006336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af080037282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0208a371a3f8000000800080000001000000000000000000", 0xb1, 0x20000, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa94ea09066dbd00000000000000000000000000bbfe8000000000000000000000000000aa4e204e220008907800"/62]) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/30, 0x1e) fcntl$setflags(r3, 0x2, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) syz_emit_ethernet(0x118, &(0x7f00000002c0)=ANY=[@ANYBLOB="9958f7d20cf5647f0c8c24fc4c774a9f1da928f6e16d6687a59efc14405e758aa8613549e0de08b0babfc46a5b2d95e77ed1cca5d53ef840", @ANYRESOCT, @ANYRES8=r6, @ANYRESDEC]) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) fork() 923.214687ms ago: executing program 2 (id=96): mount(0x0, 0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r0 = kqueue() freebsd11_mknod(0x0, 0x1000, 0x0) chmod(&(0x7f0000000280)='./file0\x00', 0x2768c724b44f58aa) open$dir(&(0x7f00000000c0)='./file1\x00', 0x80201, 0x0) kevent(r0, &(0x7f0000000040)=[{0x12dd, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, 0x0, 0x0) __semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) msgget(0x1, 0x213) msgget(0x1, 0x501) select(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f0000000740)="b100050390000000050008000700ca900f0e08fece6ef0ffffffffffff3fd3357a00000000000000006336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af080037282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0208a371a3f8000000800080000001000000000000000000", 0xb1, 0x20000, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa94ea09066dbd00000000000000000000000000bbfe8000000000000000000000000000aa4e204e220008907800"/62]) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/30, 0x1e) fcntl$setflags(r3, 0x2, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x118, &(0x7f00000002c0)=ANY=[@ANYBLOB="9958f7d20cf5647f0c8c24fc4c774a9f1da928f6e16d6687a59efc14405e758aa8613549e0de08b0babfc46a5b2d95e77ed1cca5d53ef840", @ANYRESOCT, @ANYRES8, @ANYRESDEC]) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) fork() 543.811405ms ago: executing program 3 (id=97): openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x200201, 0x112) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) ktrace(0x0, 0x5, 0x40000424, 0xffffffffffffffff) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x106, 0x0) socket(0x2, 0x3, 0x9) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x10, 0xffffffffffffffff, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_tcp_buf(r1, 0x6, 0x23, 0x0, &(0x7f00000014c0)) ioctl$MDIOCQUERY(0xffffffffffffffff, 0xc1b46d02, &(0x7f0000000840)={0xb, 0x1, 0x0, &(0x7f0000000040)='./file0/file0\x00', 0xf, 0xfffe, 0x1, 0x1, 0x80000001, 0xa, &(0x7f0000000080)='!/:,\x00', [0x28, 0x3, 0x8, 0xffff, 0x6, 0x5, 0x400, 0x584, 0x400, 0x0, 0xffff186c, 0x2, 0x6, 0x8, 0xe64e, 0x1, 0x3, 0xe, 0x4, 0x9, 0xa0, 0xffff, 0x4, 0x7fff, 0x48f71abc, 0x7ff8, 0x8, 0x1000, 0x1ff, 0x7, 0x1, 0xfffffffe, 0xfdf, 0xa, 0x5, 0x3, 0x2, 0x2, 0xc7a, 0x580, 0x800, 0xd, 0x3, 0x7, 0x200020, 0x1d96, 0x7, 0x2, 0x1, 0x80000000, 0x4, 0x1, 0xffff, 0xfffffffb, 0x5, 0xee5, 0x1, 0x0, 0x8, 0x0, 0x40, 0x2000ff, 0x1c3, 0x3, 0x6, 0x8001, 0x2, 0xc704, 0x1, 0xd4b, 0x6, 0xe36, 0x6, 0x8, 0x5, 0x4, 0x0, 0x3, 0x7ffffffe, 0x6, 0x101, 0x9, 0x10, 0x3, 0x1000, 0x5a1, 0x9, 0x4, 0x9, 0x6b, 0x1, 0x6, 0x0, 0x4, 0x0, 0x4]}) socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) chdir(&(0x7f0000000400)='./file/file0/..//file0\x00') r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r3, 0x0, 0x53, &(0x7f0000000700)={0x800, {{0x10, 0x2, 0x0}}, {{0x1, 0x2, 0x3, @broadcast}}}, 0x108) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, &(0x7f0000000100)='a', 0x1) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000140)=0x3, 0x4) setsockopt$inet_tcp_buf(r4, 0x6, 0x24, 0x0, 0x0) open$dir(0x0, 0x110206, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0xc4, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) socket$inet_udp(0x2, 0x2, 0x0) freebsd11_lstat(&(0x7f0000001500)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 0s ago: executing program 1 (id=98): mount(0x0, 0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r0 = kqueue() freebsd11_mknod(0x0, 0x1000, 0x0) chmod(&(0x7f0000000280)='./file0\x00', 0x2768c724b44f58aa) open$dir(&(0x7f00000000c0)='./file1\x00', 0x80201, 0x0) kevent(r0, &(0x7f0000000040)=[{0x12dd, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, 0x0, 0x0) __semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f00000001c0)=0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) msgget(0x1, 0x213) msgget(0x1, 0x501) select(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x11, 0x3, 0x0) sendto$unix(r4, &(0x7f0000000740)="b100050390000000050008000700ca900f0e08fece6ef0ffffffffffff3fd3357a00000000000000006336acf00b7804be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af080037282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0208a371a3f8000000800080000001000000000000000000", 0xb1, 0x20000, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa94ea09066dbd00000000000000000000000000bbfe8000000000000000000000000000aa4e204e220008907800"/62]) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/30, 0x1e) fcntl$setflags(r3, 0x2, 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x100004) syz_emit_ethernet(0x118, &(0x7f00000002c0)=ANY=[@ANYBLOB="9958f7d20cf5647f0c8c24fc4c774a9f1da928f6e16d6687a59efc14405e758aa8613549e0de08b0babfc46a5b2d95e77ed1cca5d53ef840", @ANYRESOCT, @ANYRES8=r6, @ANYRESDEC]) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) fork() kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.101' (ED25519) to the list of known hosts. Expensive callout(9) function: 0xffffffff8147c320(0xfffffe006ddaa500) 0.004603084 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e9000 Stopping cron. Stopping sshd. Out of ktrace request objects. Expensive callout(9) function: 0xffffffff81a3fea0(0xfffffe006e4de540) 0.005419695 s serialport: VM disconnected.