last executing test programs: 11.717880527s ago: executing program 2 (id=144): r0 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r1 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='.\x00', 0x21000630) r2 = socket(0x1b, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000180)="02090103020000008e4cb277fce00d8f", 0x10, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x107, &(0x7f0000000000)={0x0, 0x3, 0x3, 0x7}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x900, &(0x7f0000000100)={r4, 0x389}, &(0x7f0000000140)=0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r5 = open(&(0x7f0000000340)='./file0\x00', 0x4, 0x40) ppoll(&(0x7f0000000080)=[{r5, 0x8}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) r6 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) cap_rights_limit(r6, &(0x7f0000000140)=[0x200000000007ffd, 0x400000000000001]) openat(r6, &(0x7f0000000100)='./file0\x00', 0x2000000, 0x118) open$dir(&(0x7f0000000040)='./file0\x00', 0x40000400000002c2, 0x0) chdir(&(0x7f0000000040)='./file0\x00') sendmsg$unix(r3, &(0x7f0000002b80)={&(0x7f00000000c0)=@file={0xa, 0x1, './file0\x00'}, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x84) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 11.355498108s ago: executing program 0 (id=100): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0xfffffdc3) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) r2 = semget$private(0x0, 0x7, 0x3c0) semop(r2, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) rfork(0x85000) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca00"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457", 0x3f) extattr_get_file(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f0000000300)='(*,\'$[:\x00\xd0\xaf\x022\xa0\xb59\xdd\xe0\a\x8a:\x9e8d\x88\v\xc3g\x8eU\x96e\xf1\xb8\xa8\x96\tc3\x85\xe7K\x0fU\xc7q\xa3\x97QH\xfe\xe2G?\xb1\xe4\x16\xcc\r\x92W\xe2 n\f\x10j\xf0\xbb\xa3\x8b\nF}\f>\x80w\xe7\xcf\x05\xbf6\x02\x8e\xda\x99\x0f\x03\xa5\x1d?\xecS\x8e\x86&M\xf0\xd7\x10W', &(0x7f0000000480)=""/101, 0x65) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f00000002c0), 0x5, 0x4) 9.618901887s ago: executing program 3 (id=147): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0xfffffdc3) connect$inet6(r0, 0x0, 0x0) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x672cda28f543e327, 0x3) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) r2 = semget$private(0x0, 0x7, 0x3c0) semop(r2, &(0x7f00000001c0), 0x0) semop(r2, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r5 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r4, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca00"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457", 0x3f) extattr_get_file(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f0000000300)='(*,\'$[:\x00\xd0\xaf\x022\xa0\xb59\xdd\xe0\a\x8a:\x9e8d\x88\v\xc3g\x8eU\x96e\xf1\xb8\xa8\x96\tc3\x85\xe7K\x0fU\xc7q\xa3\x97QH\xfe\xe2G?\xb1\xe4\x16\xcc\r\x92W\xe2 n\f\x10j\xf0\xbb\xa3\x8b\nF}\f>\x80w\xe7\xcf\x05\xbf6\x02\x8e\xda\x99\x0f\x03\xa5\x1d?\xecS\x8e\x86&M\xf0\xd7\x10W', &(0x7f0000000480)=""/101, 0x65) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f00000002c0), 0x5, 0x4) 9.606045025s ago: executing program 2 (id=148): sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x100000000, 0x0, &(0x7f0000000000), 0x0) symlink(&(0x7f00000003c0)='.\x00', 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x1, 0x0) ioctl$DIOCGETSTATES(r0, 0xc0104419, &(0x7f00000003c0)) syz_emit_ethernet(0x0, 0x0) syz_emit_ethernet(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) shm_rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x1) r1 = socket(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) r3 = openat(0xffffffffffffff9c, 0x0, 0x200, 0x14) getsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x2000, 0x0, &(0x7f0000000080)) getitimer(0x2, &(0x7f0000000100)) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x1, './file0\x00'}, 0xa) setsockopt$inet6_sctp_SCTP_REUSE_PORT(r3, 0x84, 0x1c, &(0x7f0000000040)=0x222, 0x4) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='newreno\x00', 0x8) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r4, 0x29, 0x13, 0x0, 0x0) kqueue() socket$inet_udp(0x2, 0x2, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) profil(&(0x7f0000000140)="a26647e0a2d731f4255a2686fa28e914fad137ab3154f580cfd4e97c91985ab329ed6e7a780c61b877ec62ae1ca9ffcbc91fbcbd18c96dbb351120f51d03643850881fc9362f2c0373009801249c035b16b720bde18fc3c75355f83715875b6008881f811243a309443c81b0f6d4f2bdf3e2d397e881971d162cceae864a858b0a393e1283f866e1a306d1015c13e1ea4e", 0x91, 0x76, 0xab2) 9.264947153s ago: executing program 0 (id=100): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0xfffffdc3) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) r2 = semget$private(0x0, 0x7, 0x3c0) semop(r2, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) rfork(0x85000) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca00"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457", 0x3f) extattr_get_file(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f0000000300)='(*,\'$[:\x00\xd0\xaf\x022\xa0\xb59\xdd\xe0\a\x8a:\x9e8d\x88\v\xc3g\x8eU\x96e\xf1\xb8\xa8\x96\tc3\x85\xe7K\x0fU\xc7q\xa3\x97QH\xfe\xe2G?\xb1\xe4\x16\xcc\r\x92W\xe2 n\f\x10j\xf0\xbb\xa3\x8b\nF}\f>\x80w\xe7\xcf\x05\xbf6\x02\x8e\xda\x99\x0f\x03\xa5\x1d?\xecS\x8e\x86&M\xf0\xd7\x10W', &(0x7f0000000480)=""/101, 0x65) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f00000002c0), 0x5, 0x4) 7.42883611s ago: executing program 1 (id=150): mount(&(0x7f0000000200)='ext2fs\x00', 0x0, 0x10000000, &(0x7f0000000240)="55b997d04ff50d9a4f656b0511a0c77ef48d3bcfec79325311000db101948524df66e59ac33eee24530c2c18e4bf149f0c3ca19b5552a156e642706a7a62997b3d4cc25d29426ffef669505856840352f5537c1f0dd1f6969e6d90ab97178e238d027b0906edf9f0dc9f5c011c7e60d46d02c804c982480b33a9012883edbfbe29162ed7f6459b1cfc695dcd2195ae1a5adc9f81f66d78e75e4d394b61169364a993e86ee7a4de1237eb481b274291ff8bcea1bdeeae9536613ae7e9028d2a93b442d8fd477a51afd87b45dd16659c52613f176ae4eb8c827d0cf64b6c64888dda58823972efc3d2cc67c18982d60e91ca417ee80be691ebe9333d5aed6d80d726f93875c4351756232062ff08c943a1781d43bf0b1bcaff50d0d258ec580b4e470b87d89c90fdbf2987a104d7405ab6f3d9c5bbcac2fe53a5848ed0a007cf3ca05785134eff75e77d1f7febeb6999d694c7c7feb2bbcd294524dd672eeede5d129dc707b8369223024baa5265953b55feaecd4d085df3c4f7eced39e58c2a9de3f0ac7ce8ce3dc33b517f47959d") socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x3, @mcast1, 0x1}, 0x1c) getpeername(r1, &(0x7f0000000100)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, &(0x7f0000000140)=0x1c) chflags(&(0x7f00000000c0)='\x00', 0x61014) sendmsg(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000280)="962f13f83638b7bdb6392ec92b51d15da7ba30212fb74508887d0b8f7986b0ba6495e1d83c7315deb2eff93797169d96f1d7ac8ae997b5e49e31b0439a4619af68413d08da55f1b7e08c4882d34eaf8857c0927f46", 0x55}], 0x1, &(0x7f0000001600)=[{0x10, 0x3a, 0x9}], 0x10}, 0x80) getsockname$unix(r0, &(0x7f0000000040)=@abs={0x8}, &(0x7f0000000080)=0x8) 7.428537168s ago: executing program 2 (id=151): syz_emit_ethernet(0x42, &(0x7f00000001c0)={@broadcast, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x34, 0x65, 0x0, 0x0, 0x6, 0x0, @multicast2, @remote={0xac, 0x14, 0x0}, {[@noop, @lsrr={0x83, 0x3, 0x90}]}}, @icmp=@parameter_prob={0xc, 0x1, 0x0, 0xcc, 0x40, 0x0, {0x5, 0x4, 0x1, 0x6, 0x8, 0x64, 0xfffa, 0x81, 0xc, 0xfff9, @empty, @loopback}}}}}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r1, 0x0, 0x6, &(0x7f0000000080)=0x3, 0x4) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000000c0)=ANY=[@ANYBLOB="62d147000000"], 0x8) mkdir(&(0x7f0000001040)='./file0\x00', 0x1) open$dir(&(0x7f00000003c0)='./file0\x00', 0x2000000, 0x189) r2 = kqueue() kevent(r2, &(0x7f0000000280)=[{0x3, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 7.418997914s ago: executing program 3 (id=152): syz_emit_ethernet(0x42, &(0x7f00000001c0)={@broadcast, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x34, 0x65, 0x0, 0x0, 0x6, 0x0, @multicast2, @remote={0xac, 0x14, 0x0}, {[@noop, @lsrr={0x83, 0x3, 0x90}]}}, @icmp=@parameter_prob={0xc, 0x1, 0x0, 0xcc, 0x40, 0x0, {0x5, 0x4, 0x1, 0x6, 0x8, 0x64, 0xfffa, 0x81, 0xc, 0xfff9, @empty, @loopback}}}}}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x1, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd60000900052800006e1aa4058b74adad9a4e721f5b293380ff020000000000000000000000000001000105"]) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, &(0x7f0000000300)={0xfffff12e, 0x2, 0x4, 0x3, 0x0, &(0x7f00000000c0)="cdd4016473471f24be854bb00070", 0x0, 0x0}) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000000c0)=ANY=[@ANYBLOB="62d147000000"], 0x8) mkdir(&(0x7f0000001040)='./file0\x00', 0x1) open$dir(&(0x7f00000003c0)='./file0\x00', 0x2000000, 0x189) r1 = kqueue() kevent(r1, &(0x7f0000000280)=[{0x3, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 7.221786961s ago: executing program 1 (id=153): r0 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r1 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='.\x00', 0x21000630) r2 = socket(0x1b, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000180)="02090103020000008e4cb277fce00d8f", 0x10, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x107, &(0x7f0000000000)={0x0, 0x3, 0x3, 0x7}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x900, &(0x7f0000000100)={r4, 0x389}, &(0x7f0000000140)=0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r5 = __specialfd$inotify(0x2, &(0x7f0000000400), 0x4) fcntl$lock(r5, 0xd, &(0x7f0000000440)={0x1, 0x4, 0x6, 0x1059c65}) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r6 = open(&(0x7f0000000340)='./file0\x00', 0x4, 0x40) ppoll(&(0x7f0000000080)=[{r6, 0x8}], 0x1, 0x0, 0x0, 0x0) r7 = semget$private(0x0, 0x7, 0x3c0) semop(r7, 0x0, 0x0) semop(r7, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) __semctl$IPC_RMID(r7, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) r8 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) cap_rights_limit(r8, &(0x7f0000000140)=[0x200000000007ffd, 0x400000000000001]) openat(r8, &(0x7f0000000100)='./file0\x00', 0x2000000, 0x118) open$dir(&(0x7f0000000040)='./file0\x00', 0x40000400000002c2, 0x0) setreuid(0x0, 0xffffffffffffffff) chdir(&(0x7f0000000040)='./file0\x00') sendmsg$unix(r3, &(0x7f0000002b80)={&(0x7f00000000c0)=@file={0xa, 0x1, './file0\x00'}, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x84) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 7.105414153s ago: executing program 0 (id=100): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0xfffffdc3) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) r2 = semget$private(0x0, 0x7, 0x3c0) semop(r2, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) rfork(0x85000) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca00"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457", 0x3f) extattr_get_file(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f0000000300)='(*,\'$[:\x00\xd0\xaf\x022\xa0\xb59\xdd\xe0\a\x8a:\x9e8d\x88\v\xc3g\x8eU\x96e\xf1\xb8\xa8\x96\tc3\x85\xe7K\x0fU\xc7q\xa3\x97QH\xfe\xe2G?\xb1\xe4\x16\xcc\r\x92W\xe2 n\f\x10j\xf0\xbb\xa3\x8b\nF}\f>\x80w\xe7\xcf\x05\xbf6\x02\x8e\xda\x99\x0f\x03\xa5\x1d?\xecS\x8e\x86&M\xf0\xd7\x10W', &(0x7f0000000480)=""/101, 0x65) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f00000002c0), 0x5, 0x4) 5.180837892s ago: executing program 1 (id=154): r0 = open(&(0x7f00000002c0)='.\x00', 0x4, 0x8) inotify_add_watch_at(0xffffffffffffffff, r0, &(0x7f0000000280)='.\x00', 0x21000630) r1 = socket(0x1b, 0x3, 0x81) sendto$inet6(r1, &(0x7f0000000180)="02090103020000008e4cb277fce00d8f", 0x10, 0x0, 0x0, 0x0) pwritev(r1, &(0x7f00000004c0)=[{&(0x7f00000003c0)="a4404659f5e66946426944a572cea46178f6523a6857901b57619f51ed38b10527ed51c00b19c639231dc0fcbbb201d8d210eeee6462ef17a8f8d8e57a33c08364a85f13da37020e1ee0d96470fa136d6de9e5fd22db", 0x56}], 0x1, 0x31) r2 = open(&(0x7f00000002c0)='.\x00', 0x4, 0x100) r3 = socket(0x1c, 0x3, 0x0) getsockopt$sock_timeval(r3, 0xffff, 0x1010, &(0x7f0000000000), &(0x7f0000001840)=0x10) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r5 = inotify_add_watch_at(r4, r2, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000700)='./file1\x00', 0xd7848ede797c9e10, 0x0) r6 = socket(0x1b, 0x5, 0x81) sendto$inet6(r6, &(0x7f0000000180)="02090103020000008e4cb277fce00d8f", 0x10, 0x0, 0x0, 0x0) pwritev(r6, &(0x7f00000004c0)=[{&(0x7f00000003c0)="a4404659f5e66946426944a572cea46178f6523a6857901b57619f51ed38b10527ed51c00b19c639231dc0fcbbb201d8d210eeee6462ef17a8f8d8e57a33c08364a85f13da37020e1ee0d96470fa136d6de9e5fd22db124f23ab4523b6eefb22", 0x60}, {&(0x7f0000000440)="921d3cb0344b1e66025cf3a949b832ab8356a94f2b6eb5b7abf082f8731c0eebdee983a6fd301206f7d5d9324c93e5ece82fca3aec0a8564cc7fff6303f96b5c3bbc2be6b2613127a83d6c4b007bb672387c08e4cf9f30098b4a44bdf7c1fbc7ffb31e22ec26d8414acce468bff9", 0x6e}], 0x2, 0x31) inotify_rm_watch(r2, r5) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_tcp_int(r6, 0x6, 0x4, &(0x7f0000000140), &(0x7f0000000300)=0x4) r7 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setresuid(0xee00, 0xee01, 0xffffffffffffffff) getsockopt$inet6_sctp_SCTP_RTOINFO(r6, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x2, 0x10, 0x9017}, &(0x7f0000000380)=0x10) setreuid(0x0, 0xffffffffffffffff) chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x5, &(0x7f0000000000)={0x10000000000b35d, 0x92}) __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000080)=[0x199, 0xfffd]) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x2d, &(0x7f0000000100)) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x200) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) setsockopt$inet_tcp_buf(r7, 0x6, 0x25, &(0x7f00000001c0)="234ed88a2dd63702763432e3a9fb2c8daa0c826fe9fa7b1823b2d424b6850b5d07a6ed1f254865a41a5ee1053800610d1cae0ddbf0754cd30e9c9abb3c38d327fa353fe90ce3e1528aa4944024d33298ebe0624769744a69dbab1d75c8764cf666f526c386d01b0a9bae8a1988a5e85bce30ce8ad139a780be35f4b37e2ae106612857a1dd3054363c0d88090cac09f9489e700a8f3e364d2cbf2cc29eb41917983bd7100cc10804f5c42e1c2d33ae7c1af231e87112d1b2f459", 0xba) 5.174113093s ago: executing program 2 (id=155): sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x100000000, &(0x7f0000000000)={&(0x7f0000000480)=[{&(0x7f0000000300)="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", 0x17c}, {&(0x7f0000002780)="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", 0xff}, {&(0x7f0000000200)="8b6f98364a0f9dd2c63ae3104b7d529138251284519d4ad7ac176537fdbf58232dc8c443d7bbc6abefc9ce95fa521a97f33067f7a43f2f8f546b5c9ba04d9a2a0368154c73825c7d6e795124451bce7a18348cadca247f881d7cb7563a1f789a", 0x60}, {&(0x7f0000000500)="306cdf54b8a36fc88f6d74522c362ff3f1389be682a75b6debf72a40c18f9b6bca27b77e2db1d1716d73ce296858d932e410ebfa31c5e01715dee2b776f7430953e424d84cbf0f3ddf4fec1015a8fe627ad9f7ae7915d07cad7addf893c41520df60db7e6ed7b6cae9aa17e95bd94d3b3fc6bbce36700f", 0x77}], 0x4, 0x0}, &(0x7f0000000000), 0x0) r0 = semget$private(0x0, 0x7, 0x616) semop(r0, &(0x7f0000000080)=[{0x4, 0x3, 0x1800}, {0x4, 0x7041, 0x1000}], 0x2) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x42, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}, {"b76bf11d5d4ff88eab4e7d94dcf5288151f250627b0e1fb0"}}}}}}) syz_emit_ethernet(0x134, &(0x7f00000005c0)={@random="b905f0ffffff", @empty, [], {@ipv4={0x800, {{0x43, 0x4, 0x0, 0x0, 0x126, 0x0, 0x1, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast, {[@timestamp={0x44, 0x3c, 0x2, 0x0, 0x5, [{[@broadcast], 0x400}, {[@local={0xac, 0x14, 0x0}], 0x6}, {[], 0x7fff}, {[], 0x100}, {[@empty]}, {[@loopback], 0xe}, {[], 0xb0}, {[], 0xffffffff}, {[@local={0xac, 0x14, 0x0}], 0xd}]}, @ssrr={0x89, 0x13, 0x1, [@remote={0xac, 0x14, 0x0}, @empty, @multicast2, @multicast1]}, @noop, @timestamp={0x44, 0x10, 0xb, 0x1, 0xc, [{[@multicast2], 0x8000}, {[], 0x1}]}, @noop, @lsrr={0x83, 0x1f, 0x10, [@multicast1, @remote={0xac, 0x14, 0x0}, @rand_addr=0xffffffff, @broadcast, @empty, @broadcast, @broadcast]}, @timestamp={0x44, 0x50, 0xd4, 0x1, 0xa, [{[@multicast1], 0x2}, {[@multicast1]}, {[@broadcast], 0xa}, {[@local={0xac, 0x14, 0x0}], 0x1}, {[@loopback], 0xfffff044}, {[@empty], 0xeb}, {[@local={0xac, 0x14, 0x0}], 0x9}, {}, {[@remote={0xac, 0x14, 0x0}]}, {[@loopback], 0x200}]}, @ra={0x94, 0x6, 0x100}, @generic={0x0, 0xd, "a2b5d0e224f187ac4dcf7b"}, @lsrr={0x83, 0x13, 0xf9, [@local={0xac, 0x14, 0x0}, @empty, @local={0xac, 0x14, 0x0}, @local={0xac, 0x14, 0x0}]}]}}, @udp={{0x1, 0x3, 0x8}, {"e3c4fc107f71ed734b5547194172bf7adeb4"}}}}}}) openat$md(0xffffff9c, &(0x7f0000000100), 0x200, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) aio_waitcomplete(0x0, &(0x7f0000004080)={0x4272, 0xfffffff7}) r2 = socket$inet6(0x1c, 0x2, 0x0) getsockopt$sock_int(r2, 0xffff, 0x2000, &(0x7f0000000080), &(0x7f00000000c0)=0x4) sendmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[{0xb8, 0x84, 0x11f, "73f3e2e76d3e203410c8298a161c869beebc224a3bb72811c53acb2b84a1218209d5a9ec151a6a24c9cc255322d1e6c0583b03f96d170eb1dab9fc2e3f37339c9be201cfcc967044391f4c0b02915affe2fbe6ce812f04260dd223881f6787c57a55de9ff571196d5e2561f8f1c2a05c10efa8ace37d62500962342e06dfe485a6fbc5b1b663a392ff054820ed2a6e9d5b089b0082d0aad2777a4a8f321cb25625c636138c1f138930"}, {0xd8, 0x0, 0x84000000, "8a70609026284eb41b72e1e6e515f3b612818327d5a41042cb147ab577f2cc7d9135a2a17e2732719f6e1802a5d592467a725e5e158c397921975bd277d101565d010ec381056af7b6b004714bc2a538fd616a10f97124f735653ee433713c217f2ea516c939ee39ddab102bcc0a7944c46ad77371c980f5e82da720490a1fa1eb71630fa2c3912aa4f79d59db57be6058e0c3c5581667e966fd1ef19409293dffca52868ba62870e1aa78d8ff52a3a6b888553123aee94136b55514a941358eab2ed9f8470d137317"}, {0xc0, 0x11, 0x6c, "172cb4952a38dd378ec765c4bc3a37cd44a217a29bb60651588e6323e0e20296aeae940ccdabfeda81d81e31220b43cd83e034aaa3958cda48b1252cf072c3f8854e38a0017936459b153d5957bd213530227213648e5ebf53c9db2086cea998fd1c61a404cae88e14fdf8350f598f432ffd66820833b70d3721ca2489f7f187275878675d556398b4ac1107fb0cfc4174129d0a67cd752433a442f9ade6f159384e6877f1ccc18dba4a6681c0c5c8dfa1"}, {0xd0, 0x0, 0x8, "7244d65da2fa021d92c6697b02895bcc4d6b5c11c919f1678ae06f0d2794e4932be62f011117dd72e40df652a6b8beeb22ca6f7fce0a02b4ff51abde08654f7611b41a9896c82db96950de70cc3e6e6c85e3c224da645729439059bfc39f361d9bc6d21cc8a8882ada77f5ebe85b38e036a31fae792cd060d2729bbf8e33fbeb7a675e96fbadf8c1084e9009b2976d89a93cb2dc32007f7e65883fabf6b3c5bd36b2f21ce6dc09a94e86e58e76ac95e0ac8a3c742d34a409f67fa74388df05c7d4"}, {0x100, 0x1, 0x4, "733d1263680d3e8e5b1368e51cdc81b6183dd811bc2a8990d7e55eabc7d522692c1f8560723bf33e09374733ec1960f3ba3ae6603a744778db92770897d12566310a1534c6e48f9902dbf86388a3c0db9ff9bfc00b329fcd4eea99200ca0aaa9fb60728fa357b23a7b55db484a577fbfd39ba0ec924314799e70f573180ff36f70320946136a907156f6210d7d2fa9f5d8b5a46c8a7778cc4e1763227cca1cffe73480e09674c524bf6f61107f0c9ba4d42a91ed354b4d60e308d7ff39cbbaa8d2014a42ee034b4c0ab9e80968457e33961d4e84b55ed1dd1410380d46ca4cfce62d800a604e548ed2ec2e6137b2aac67179"}, {0xc0, 0x29, 0x4, "ca4fccac88a8090f2b168bb006d993f43865363697b2a1ae4007915803fa5935d9733a7308332e3eee1e35a4b274a2f6a837d5b8837cd3dff708f1c55b31e54e704d4a7d155ea0f74fab939fae2961f5af5e22913d8d3f4cecee6673ac109aabbbe79b3b34d3a83c079bc30fcdc44e9a588fecbaaade0ccea3063de39693b1d840859c7a42bc3a1d4f93a5f8031779d606cef4f57c8beac8326c5813b3d4e7aaab7e3382f2d8e78941e6407eed03ecd743"}, {0x50, 0x84, 0x1, "1e765f415c9315b3b8a5ca1b6be5bdd750e4aac20e21785cf6099ce1153772525a47b64b72058ad4677883ab416c397b9e9f8a0f9c1c4b1bd1326a1d375a1608d9"}, {0xc0, 0x85, 0xffffffff, "26ef06a00bd90e4db854699da6d0d2c0dfd3657de1418710be8b3a052c8d38f8aaba264b24ca28dff2385a306c54cdb5640db9480d2badfbbcdbd929d64f5211527ae621f62569ba0d75715569ec7086fa4bcccda700574b90889250c3f9bfacf75e5c3814ecfa6ed6a2e6b8c677154d2de5d14ad8db4e71d0aff3a5937b6cfcb5b703b2f9e10bad90d53de00711e429bb611a83ca0d64bc9c5694c249a53df48d2477b5d72c7f608b8eae95d2a4065b6b"}, {0x100, 0x29, 0x8, "cc1f698b6059d6e643541af517688cc6867af2d83645f082033c8e011772154bdf45d1c2a58eb645ba9e71441dfde18f9757298c986b961574d171bdb39790c4330ed2190defc5ac5227a741488da62a3b53aac4c118b6fed39d33c41e57763ea54292f179955689d737eb5a0d4359f80fb41e11f88a17a4e221a1e6971044a4a4c368393ad3ddd18ca378a3fbdaba5b8a123782d66f94a16aaabaa02208389bf90cd539595a45eabe6cc3fe6cc7e0269c4a574a91ace379988ff09c2f99c901c5c852caa0aaa3b5fd63f2ddf8825a55ae535e8c81b9d6f2cbec3e29a322b6fbad0772318111cc360250a9e5e171c735617e50"}, {0xc8, 0x1, 0x8002, "1d072e10ae79dd76debbcf573f3be2141cb20e8464704fbc4a220eea94f3778eb9e64bece919d72cafbbc1830a4afcd4212b11419392a21dfe333e0bc9c4a7056e93c76ede8a0c74b62d05d26750358e4f79b7d6e53faa561435c8b9a483b0c61c68e2371472fdb41e10394ff2beeec15084fe2bf533f613e7d308a629148b622ceb79280164444275434b4110f6f193b5f959c61b6b5ca5cba1c35b21cac0fb96eb46cf8fc4fe3e107a8d6002dc9e19db4d5c4a17e580efeaf9fc"}], 0x7b8}, 0x80) r3 = socket$unix(0x1, 0x5, 0x0) connect$unix(r3, &(0x7f0000000100)=@file={0xa, 0x1, './file0\x00'}, 0xa) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='hd\x00', 0x3) getsockopt$inet_sctp_SCTP_ASSOCINFO(r3, 0x84, 0x2, &(0x7f0000000140)={0x0, 0x8000, 0x6, 0x0, 0x7ff, 0xa19}, &(0x7f0000000180)=0x14) r5 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0x68, &(0x7f0000000080)={{0x1c, 0x1c, 0x1, 0x1, @loopback, 0x7fffffff}, {0x1c, 0x1c, 0x0, 0x400000, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x0, [0x8800, 0xfffffffd, 0x0, 0x6, 0x1, 0x0, 0x0, 0x5e]}, 0x5c) setsockopt$inet6_IPV6_RTHDR(r5, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) sendto$inet6(r5, &(0x7f00000002c0)="c726689ebf359c59d6045545127a41177ce9449d7a4d74648914f1ee8d4ae6e999d3f32900d7410f3cb05f3f56ff80309d480cc249ff8e7f09ba3a040f", 0x3d, 0x20009, &(0x7f00000004c0)={0x1c, 0x1c, 0x2, 0xeb, @remote={0xfe, 0x80, '\x00', 0x0}, 0x1ff}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20101, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x3ee, @rand_addr="00000000440000020000001a6f947800"}, 0x1c) getsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f00000001c0)={r4, 0x80, 0x0, 0x8}, &(0x7f0000000280)=0x10) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 5.169781004s ago: executing program 3 (id=156): openat$evdev(0xffffff9c, &(0x7f0000000000), 0x200, 0x0) r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000300)={@in6={{0x1c, 0x1c, 0x1, 0x5, @empty, 0x4}}, 0x0, 0x1ef, 0x62, 0x305, 0x22, 0x6, 0x3}, 0x98) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000100)='a', 0x1) setsockopt$inet_tcp_buf(r1, 0x6, 0x24, &(0x7f00000005c0)='/', 0x1) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) sendmsg$inet6_sctp(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x81}, 0x0) futimesat(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f00000001c0)={0xb, 0xf, 0x18, &(0x7f0000001940)="ec7b00000900ff2425c3f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x2, 0xfdffff05}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x8000, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)}) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000700), 0x800, 0x0) ioctl$MDIOCATTACH(r4, 0xc1c06d00, &(0x7f00000007c0)={0x0, 0x7, 0x0, 0x0, 0x5, 0x2, 0xfffffffc, 0x5, 0x3dc, 0x401, 0x0, [0x81, 0x8e, 0x5, 0xf79, 0x7ff, 0x4, 0x2, 0x6c, 0x181, 0x757, 0x3d4a, 0x4, 0x4, 0x6, 0x9, 0x8187, 0x6, 0x7, 0x0, 0x7f, 0x3ff, 0x4, 0xebf1, 0x5, 0x2, 0x2, 0x1, 0x1, 0x9, 0x10000, 0x10be, 0x7, 0x0, 0x5, 0xfffffffe, 0x8, 0x8, 0x51, 0x6, 0x7f, 0x0, 0x7, 0xa04, 0x5, 0x4, 0x1, 0x8, 0x1, 0x1, 0x3, 0xfffffff0, 0x2, 0x1000, 0x1, 0xc, 0x7f, 0x8, 0x7, 0x81, 0x8, 0x5, 0x5687, 0x9, 0x4, 0x3, 0xfffffff8, 0x8, 0x10001, 0x1, 0x200, 0x5, 0x1, 0x80000001, 0x6, 0xfffffffb, 0x2, 0x2, 0x5, 0x81, 0x2, 0x2b7, 0x1, 0x8, 0x5, 0x2e94, 0xdb, 0x0, 0x38b378fa, 0xb, 0xfff, 0x0, 0x7fff, 0x2, 0x2, 0x0, 0x9]}) r5 = open$dir(&(0x7f0000000700)='./file1\x00', 0xd7848ede797c9e10, 0x0) fcntl$setstatus(r5, 0x4, 0x10044) r6 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r7 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x108, &(0x7f00000000c0)={0x0, 0x8, 0x3, 0x7, 0x8000000000000000}, &(0x7f00000004c0)=0x18) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000500)={r8, 0x3}, &(0x7f0000000540)=0x8) inotify_add_watch_at(r7, r6, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000000, 0x101) renameat(0xffffffffffffffff, &(0x7f0000000200)='./file1\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00') r9 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r9, 0x0, 0x2, 0x0, 0x0) sendto$inet(r9, 0x0, 0x0, 0x100, &(0x7f0000000240)={0xfffffffffffffd2e, 0x2, 0x0, @loopback}, 0x10) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 4.884385439s ago: executing program 0 (id=100): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0xfffffdc3) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) r2 = semget$private(0x0, 0x7, 0x3c0) semop(r2, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) rfork(0x85000) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca00"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457", 0x3f) extattr_get_file(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f0000000300)='(*,\'$[:\x00\xd0\xaf\x022\xa0\xb59\xdd\xe0\a\x8a:\x9e8d\x88\v\xc3g\x8eU\x96e\xf1\xb8\xa8\x96\tc3\x85\xe7K\x0fU\xc7q\xa3\x97QH\xfe\xe2G?\xb1\xe4\x16\xcc\r\x92W\xe2 n\f\x10j\xf0\xbb\xa3\x8b\nF}\f>\x80w\xe7\xcf\x05\xbf6\x02\x8e\xda\x99\x0f\x03\xa5\x1d?\xecS\x8e\x86&M\xf0\xd7\x10W', &(0x7f0000000480)=""/101, 0x65) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f00000002c0), 0x5, 0x4) 2.869444024s ago: executing program 1 (id=157): r0 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r1 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='.\x00', 0x21000630) r2 = socket(0x1b, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000180)="02090103020000008e4cb277fce00d8f", 0x10, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x107, &(0x7f0000000000)={0x0, 0x3, 0x3, 0x7}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x900, &(0x7f0000000100)={r4, 0x389}, &(0x7f0000000140)=0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r5 = open(&(0x7f0000000340)='./file0\x00', 0x4, 0x40) ppoll(&(0x7f0000000080)=[{r5, 0x8}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) r6 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) cap_rights_limit(r6, &(0x7f0000000140)=[0x200000000007ffd, 0x400000000000001]) openat(r6, &(0x7f0000000100)='./file0\x00', 0x2000000, 0x118) open$dir(&(0x7f0000000040)='./file0\x00', 0x40000400000002c2, 0x0) chdir(&(0x7f0000000040)='./file0\x00') sendmsg$unix(r3, &(0x7f0000002b80)={&(0x7f00000000c0)=@file={0xa, 0x1, './file0\x00'}, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x84) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 2.867422301s ago: executing program 2 (id=158): syz_emit_ethernet(0x42, &(0x7f00000001c0)={@broadcast, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x34, 0x65, 0x0, 0x0, 0x6, 0x0, @multicast2, @remote={0xac, 0x14, 0x0}, {[@noop, @lsrr={0x83, 0x3, 0x90}]}}, @icmp=@parameter_prob={0xc, 0x1, 0x0, 0xcc, 0x40, 0x0, {0x5, 0x4, 0x1, 0x6, 0x8, 0x64, 0xfffa, 0x81, 0xc, 0xfff9, @empty, @loopback}}}}}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x1, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd60000900052800006e1aa4058b74adad9a4e721f5b293380ff020000000000000000000000000001000105"]) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, &(0x7f0000000300)={0xfffff12e, 0x2, 0x4, 0x3, 0x0, &(0x7f00000000c0)="cdd4016473471f24be854bb00070", 0x0, 0x0}) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000000c0)=ANY=[@ANYBLOB="62d147000000"], 0x8) mkdir(&(0x7f0000001040)='./file0\x00', 0x1) open$dir(&(0x7f00000003c0)='./file0\x00', 0x2000000, 0x189) r1 = kqueue() kevent(r1, &(0x7f0000000280)=[{0x3, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2.849662065s ago: executing program 3 (id=159): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0xfffffdc3) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) pathconf(&(0x7f0000000040)='./file0\x00', 0x8) r2 = semget$private(0x0, 0x7, 0x3c0) semop(r2, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r4, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca00"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) extattr_get_file(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f0000000300)='(*,\'$[:\x00\xd0\xaf\x022\xa0\xb59\xdd\xe0\a\x8a:\x9e8d\x88\v\xc3g\x8eU\x96e\xf1\xb8\xa8\x96\tc3\x85\xe7K\x0fU\xc7q\xa3\x97QH\xfe\xe2G?\xb1\xe4\x16\xcc\r\x92W\xe2 n\f\x10j\xf0\xbb\xa3\x8b\nF}\f>\x80w\xe7\xcf\x05\xbf6\x02\x8e\xda\x99\x0f\x03\xa5\x1d?\xecS\x8e\x86&M\xf0\xd7\x10W', &(0x7f0000000480)=""/101, 0x65) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f00000002c0), 0x5, 0x4) 2.618060714s ago: executing program 0 (id=100): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0xfffffdc3) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) r2 = semget$private(0x0, 0x7, 0x3c0) semop(r2, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) rfork(0x85000) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca00"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457", 0x3f) extattr_get_file(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f0000000300)='(*,\'$[:\x00\xd0\xaf\x022\xa0\xb59\xdd\xe0\a\x8a:\x9e8d\x88\v\xc3g\x8eU\x96e\xf1\xb8\xa8\x96\tc3\x85\xe7K\x0fU\xc7q\xa3\x97QH\xfe\xe2G?\xb1\xe4\x16\xcc\r\x92W\xe2 n\f\x10j\xf0\xbb\xa3\x8b\nF}\f>\x80w\xe7\xcf\x05\xbf6\x02\x8e\xda\x99\x0f\x03\xa5\x1d?\xecS\x8e\x86&M\xf0\xd7\x10W', &(0x7f0000000480)=""/101, 0x65) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f00000002c0), 0x5, 0x4) 505.305368ms ago: executing program 1 (id=160): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x52, &(0x7f00000002c0)={0x7ff, {{0x1c, 0x1c, 0x2, 0xfffffffc, @rand_addr="65cb30df060000000b603666ab2f3df4"}}, {{0x1c, 0x1c, 0x1, 0x0, @mcast2}}}, 0xfc) r1 = openat$md(0xffffff9c, &(0x7f0000000180), 0x4, 0x0) ioctl$MDIOCATTACH(r1, 0xc1b46d00, &(0x7f00000006c0)={0x1, 0xbc, 0x2, 0x0, 0x800, 0x0, 0x10, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0xfffffffb, 0x1000, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0x6, 0x3, 0x3, 0x0, 0x0, 0x6, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x8000007, 0x0, 0x0, 0x0, 0x4, 0x3, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x5, 0x8, 0x10000, 0x1, 0x3, 0x2000000, 0x1, 0x0, 0xfffffffc, 0x0, 0x6, 0xe, 0xe2b8, 0x2, 0x2, 0xfffffffc, 0xfc, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x7, 0x5, 0x0, 0x2, 0x0, 0xfffffffe, 0x2, 0x0, 0x39fa3cc6, 0x8, 0xe, 0x40000, 0x0, 0x0, 0x7d, 0x1a, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x4, 0x2]}) r2 = kqueue() kevent(r2, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x2, 0x7, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) __specialfd$eventfd(0x1, &(0x7f0000000100)={0xfffffe01, 0x6}, 0x8) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000200)={0xb, 0x24, 0x11, &(0x7f00000001c0)="ec7b00000900ff2425c1f0a58b519798d2", 0x0, 0x0, 0xe, 0xfdffff85, [0x0, 0x8201, 0x0, 0x6e4]}) fstatat(r3, &(0x7f0000000040)='./file0\x00', &(0x7f00000003c0), 0x200) socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt(r0, 0x3, 0x6, &(0x7f00000001c0)="88ccd703108d786e5c7254023e0397fd26a011d5da95a41e2ed552c9779341adfe67dadeda1a3966ec0c0d6e237ffab2db2bca1c1aad25cb187f", 0x3a) shmget(0x3, 0x1000, 0x200, &(0x7f0000ffd000/0x1000)=nil) open$dir(&(0x7f0000000800)='./file0\x00', 0x40000400000002c2, 0x1c0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r4, 0x0, 0x35, 0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x94659db2cce5c9d8, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x180, 0x0) sigtimedwait(&(0x7f0000001a80)={[0x6, 0x10000, 0x1, 0x1]}, 0x0, &(0x7f0000001b00)={0xffff84ed, 0x6}) r5 = kqueue() r6 = getppid() sigqueue(r6, 0x21, @sival_int=0x2) link(&(0x7f0000000280)='./file0\x00', 0x0) kevent(r5, &(0x7f0000000040), 0xa1ba, 0x0, 0x1c0, 0x0) 364.180914ms ago: executing program 2 (id=161): syz_emit_ethernet(0x42, &(0x7f00000001c0)={@broadcast, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x34, 0x65, 0x0, 0x0, 0x6, 0x0, @multicast2, @remote={0xac, 0x14, 0x0}, {[@noop, @lsrr={0x83, 0x3, 0x90}]}}, @icmp=@parameter_prob={0xc, 0x1, 0x0, 0xcc, 0x40, 0x0, {0x5, 0x4, 0x1, 0x6, 0x8, 0x64, 0xfffa, 0x81, 0xc, 0xfff9, @empty, @loopback}}}}}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r1, 0x0, 0x6, &(0x7f0000000080)=0x3, 0x4) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, &(0x7f0000000300)={0xfffff12e, 0x2, 0x4, 0x3, 0x0, &(0x7f00000000c0)="cdd4016473471f24be854bb00070", 0x0, 0x0}) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 362.426603ms ago: executing program 3 (id=162): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7ffffffd, 0x3, 0x0, 0x8000, 0x5, 0x37d, 0x0, 0x1, 0x0, 0x0, [0x0, 0x2, 0x100007ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x82a3, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x1, 0x80000, 0xfffffffe, 0x0, 0x2000e122, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0xf, 0xfffffffd, 0xdbd, 0x3ff, 0x11, 0x1, 0x0, 0xa7, 0xc37b, 0x9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x941, 0x0, 0x200001, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0xfffffffe, 0x4, 0x0, 0x8, 0x0, 0x0, 0x42, 0xffffffff, 0x80000000, 0x7, 0x1, 0x1000, 0xfffffffc, 0x2, 0x10001, 0x0, 0x0, 0x7fed, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffe, 0x6, 0x0, 0x0, 0x40004, 0xfffffffe, 0x0, 0x0, 0xffffffff, 0x0, 0xffffffff]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x200201, 0x85) r2 = kqueue() openat(r1, &(0x7f0000000380)='./file0\x00', 0x2, 0x15c) kevent(r2, &(0x7f0000000140)=[{0x4, 0xfffffffffffffffa, 0x99, 0x0, 0x0, 0x0, [0x0, 0x1, 0x0, 0x100]}], 0x1, 0x0, 0x0, 0x0) rfork(0x5040) fhopen(0x0, 0x40000) extattr_delete_fd(r1, 0x1, &(0x7f0000000100)='/dev/mdctl\x00') aio_cancel(r1, 0x0) r3 = accept4(0xffffffffffffff9c, &(0x7f0000000040)=@in={0x10, 0x2, 0xffffffffffffffff, @remote}, 0x0, 0x20000000) fchdir(r3) open(&(0x7f0000000980)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x611, 0x20) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') rename(&(0x7f00000012c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000180)='./file1\x00') open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) mkdir(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4a) r4 = socket(0x1c, 0x1, 0x0) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_int(r6, 0x0, 0x2, &(0x7f0000000200)=0x8, 0x4) msync(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2) recvmsg(r6, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)=""/191, 0xbf}], 0x1, 0x0}, 0x40043) writev(r7, &(0x7f0000004580)=[{&(0x7f0000004300)="d634b458fd082e2b56da5dfe846f90ffa775a78e992099e5fea099e7e5ac9a", 0x1f}, {&(0x7f0000004340)="8827c39cca08e45befc258949dacf5dc766c9cbe96a84d51aeb60cfb1e2242e11166443e613aaae19209aeee32c6728712567ac8a8196de65c0e70eed56c0dd0342ba811240caae722f2590bd72de0e4670dd007fed58318704c717143b201c7bd7c6b8cbe99d72665793b0fb009c58bb6a741273b128fc961eda1c794a7", 0x7e}, {&(0x7f00000043c0)="d874c52c", 0x4}], 0x3) r8 = socket$inet6(0x1c, 0x2, 0x0) sendmsg$inet6_sctp(r8, &(0x7f00000001c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0a7e323a55d965957a443f400731bb73"}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="140000002900000015"], 0x14}, 0x0) sendmsg(r5, &(0x7f0000000340)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000002900000017"], 0x1c}, 0x2008a) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 334.734771ms ago: executing program 1 (id=163): r0 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r1 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='.\x00', 0x21000630) r2 = socket(0x1b, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000180)="02090103020000008e4cb277fce00d8f", 0x10, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x107, &(0x7f0000000000)={0x0, 0x3, 0x3, 0x7}, &(0x7f0000000080)=0x18) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r3, 0x84, 0x900, &(0x7f0000000100)={r4, 0x389}, &(0x7f0000000140)=0x8) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r5 = __specialfd$inotify(0x2, &(0x7f0000000400), 0x4) fcntl$lock(r5, 0xd, &(0x7f0000000440)={0x1, 0x4, 0x6, 0x1059c65}) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r6 = open(&(0x7f0000000340)='./file0\x00', 0x4, 0x40) ppoll(&(0x7f0000000080)=[{r6, 0x8}], 0x1, 0x0, 0x0, 0x0) r7 = semget$private(0x0, 0x7, 0x3c0) semop(r7, 0x0, 0x0) semop(r7, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) __semctl$IPC_RMID(r7, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) r8 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) cap_rights_limit(r8, &(0x7f0000000140)=[0x200000000007ffd, 0x400000000000001]) openat(r8, &(0x7f0000000100)='./file0\x00', 0x2000000, 0x118) open$dir(&(0x7f0000000040)='./file0\x00', 0x40000400000002c2, 0x0) setreuid(0x0, 0xffffffffffffffff) chdir(&(0x7f0000000040)='./file0\x00') sendmsg$unix(r3, &(0x7f0000002b80)={&(0x7f00000000c0)=@file={0xa, 0x1, './file0\x00'}, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x84) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 71.73314ms ago: executing program 3 (id=164): syz_emit_ethernet(0x42, &(0x7f00000001c0)={@broadcast, @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x34, 0x65, 0x0, 0x0, 0x6, 0x0, @multicast2, @remote={0xac, 0x14, 0x0}, {[@noop, @lsrr={0x83, 0x3, 0x90}]}}, @icmp=@parameter_prob={0xc, 0x1, 0x0, 0xcc, 0x40, 0x0, {0x5, 0x4, 0x1, 0x6, 0x8, 0x64, 0xfffa, 0x81, 0xc, 0xfff9, @empty, @loopback}}}}}}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x1, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r1, 0x0, 0x6, &(0x7f0000000080)=0x3, 0x4) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc01c6367, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000000c0)=ANY=[@ANYBLOB="62d147000000"], 0x8) mkdir(&(0x7f0000001040)='./file0\x00', 0x1) open$dir(&(0x7f00000003c0)='./file0\x00', 0x2000000, 0x189) r2 = kqueue() kevent(r2, &(0x7f0000000280)=[{0x3, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) rmdir(&(0x7f0000000040)='./file0\x00') sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 0s ago: executing program 0 (id=100): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0xfffffdc3) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) r2 = semget$private(0x0, 0x7, 0x3c0) semop(r2, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) rfork(0x85000) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) r5 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca00"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) setsockopt$inet6_buf(r6, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457", 0x3f) extattr_get_file(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f0000000300)='(*,\'$[:\x00\xd0\xaf\x022\xa0\xb59\xdd\xe0\a\x8a:\x9e8d\x88\v\xc3g\x8eU\x96e\xf1\xb8\xa8\x96\tc3\x85\xe7K\x0fU\xc7q\xa3\x97QH\xfe\xe2G?\xb1\xe4\x16\xcc\r\x92W\xe2 n\f\x10j\xf0\xbb\xa3\x8b\nF}\f>\x80w\xe7\xcf\x05\xbf6\x02\x8e\xda\x99\x0f\x03\xa5\x1d?\xecS\x8e\x86&M\xf0\xd7\x10W', &(0x7f0000000480)=""/101, 0x65) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f00000002c0), 0x5, 0x4) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.172' (ED25519) to the list of known hosts. Jan 23 18:10:03 ci-freebsd-i386-4 kernel: arp: from aa:aa:aa:aa:aa:bb: addr len: new 0, i/f 6 (ignored) Jan 23 18:10:04 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.2.187 Jan 23 18:10:05 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.3.187 Jan 23 18:10:05 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 Jan 23 18:10:08 ci-freebsd-i386-4 syslogd: last message repeated 1 times Jan 23 18:10:08 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.2.187 Jan 23 18:10:10 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.0.187 md0: truncating fractional last sector by 3 bytes Jan 23 18:10:14 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.2.187 Jan 23 18:10:14 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.3.187 Jan 23 18:10:15 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 Jan 23 18:10:15 ci-freebsd-i386-4 kernel: arp: from aa:aa:aa:aa:aa:bb: addr len: new 0, i/f 6 (ignored) Jan 23 18:10:16 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.2.187 Jan 23 18:10:18 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 Jan 23 18:10:18 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.3.187 Jan 23 18:10:18 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 Jan 23 18:10:19 ci-freebsd-i386-4 kernel: arp: from aa:aa:aa:aa:aa:bb: addr len: new 0, i/f 6 (ignored) Jan 23 18:10:19 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.0.187 Jan 23 18:10:19 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.3.187 Jan 23 18:10:20 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.0.187 Jan 23 18:10:21 ci-freebsd-i386-if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 4 dhclient[988]:if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 Interface tap0 is down, dhclient exiting if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 Jan 23 18:10:21 ci-freebsd-i386-4 dhclient[988]: connection closed Jan 23 18:10:21 ci-freebsd-i386-4 dhclient[988]: exiting. if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 Jan 23 18:10:22 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 ci-freebsd-i386-if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 4 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 Expensive callout(9) function: 0xffffffff81afc400(0) 0.006197120 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 Jan 23 18:10:23 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.3.187 Jan 23 18:10:23 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 Jan 23 18:10:25 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.2.187 Jan 23 18:10:25 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 Jan 23 18:10:26 ci-freebsd-i386-4 syslogd: last message repeated 1 times Jan 23 18:10:27 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.2.187 Jan 23 18:10:27 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.3.187 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 Jan 23 18:10:30 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 Jan 23 18:10:30 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.3.187 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 Jan 23 18:10:33 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.1.187 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 Jan 23 18:10:37 ci-freebsd-i386-4 syslogd: last message repeated 1 times Jan 23 18:10:37 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.2.187 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 Jan 23 18:10:43 ci-freebsd-i386-4 syslogd: last message repeated 1 times Jan 23 18:10:43 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.3.187 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 Jan 23 18:10:48 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.2.187 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 md1: truncating fractional last sector by 3 bytes SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=0 req=100 state=3 status=67 (errno 35: Resource temporarily unavailable) if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 Jan 23 18:10:50 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 ci-freebsd-i386-if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 4 syslogd: last message repeated 1 times Jan 23 18:10:51 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.3.187 FreeBSD/amd64 (ci-freebsd-i386-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 show registers Password: Login incorrect login: ps Jan 23 18:10:56 ci-freebsd-i386-4 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl