last executing test programs: 33.346293641s ago: executing program 0 (id=37): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x90) r0 = __specialfd$eventfd(0x1, &(0x7f0000000100)={0x9, 0x3000}, 0x8) ksem_post(0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) mkdir(0x0, 0x3d) r2 = open(&(0x7f0000000340)='./file0\x00', 0x300, 0x0) cap_rights_limit(r2, &(0x7f0000001440)=[0x20000000000000a, 0x400000000000801]) r3 = kqueue() pwrite(r3, 0x0, 0x0, 0x1) fchdir(r2) ioctl$DIOCADDSTATE(r2, 0xc0f24425, &(0x7f0000000100)="376b87352ea51d535dba3344633f13c5f7ee66a7504e39cc8fb6027edb595c9d2b9a7374384d37cbcf8ac61b6d3c04f82ddeca71d5e38743d018e943fd587573599dd633e935880e7ac55bb27fd35fe109594c58a448ae464c7e1c4312694c4526a9a375478aaea3") openat$md(0xffffff9c, &(0x7f0000000040), 0x400000, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) unlink(&(0x7f0000000040)='./file0\x00') r4 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') readlink(&(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffd7) bind$inet6(r4, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0xbc0, @loopback, 0x7}, 0x1c) connect$inet6(r4, &(0x7f0000000180)={0x1c, 0x1c, 0x0, 0xfffffffe, @rand_addr="000000003ab37a01e56188c200", 0xfffffffc}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00183aff0000000000006000000000a301000000ff02000000000000000000000000000187009078000000000000000000000000000000000e00d1ce"]) symlinkat(&(0x7f0000000000)='./file0/file0\x00', r2, &(0x7f0000000080)='./file0\x00') ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) getsockname$unix(r0, &(0x7f0000000140)=@abs={0x8}, &(0x7f0000000180)=0x8) r5 = open$dir(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0xe4) r6 = socket(0x1c, 0x1, 0x0) truncate(&(0x7f00000001c0)='./file0\x00', 0x9) getsockopt$sock_int(r6, 0xffff, 0x1002, &(0x7f00000002c0), &(0x7f0000000340)=0x4) linkat(r5, &(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000340)='./file0\x00', 0x0) 32.496070995s ago: executing program 0 (id=44): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) getsockopt$inet_sctp_SCTP_EVENT(r0, 0x84, 0x1e, &(0x7f00000000c0)={0x0, 0x4, 0x7f}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000040)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r1], 0xe) r2 = socket(0x2, 0x20000000, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x800000c, @empty}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa94eb09066dbd86dd60db834400081100fe8000000000000000000000000000bbff0200000000de4d22"]) r4 = dup2(r0, r2) r5 = open$dir(&(0x7f0000000180)='./file0\x00', 0x200, 0x15e) syz_emit_ethernet(0x2c, &(0x7f0000000580)=ANY=[@ANYBLOB="27485b5567b8ffff889078ac1400bbffffffff4e234e2200089078245a00"/44]) inotify_add_watch_at(r4, r5, &(0x7f0000000080)='./file0\x00', 0x2000a00) connect$inet6(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_opts(r6, 0x0, 0x1, &(0x7f0000000100)="73f894ea7c8a15620c6e", 0xa) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) socket(0x1c, 0x2, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) r8 = socket$inet6(0x1c, 0x10000000, 0x5) setsockopt$inet6_IPV6_RTHDR(r8, 0x29, 0x33, &(0x7f00000001c0)=ANY=[@ANYBLOB="75db893c00000000fe8000000000000000000000000000aaff3fc4e6a29270694599eb76278fe8a3f87e57b752fd90beabcf"], 0x28) bind$inet6(r7, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x800000c, @empty}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa94eb09066dbd86dd60db834400081100fe8000000000000000000000000000bbff0200000000de4d22"]) connect$inet6(0xffffffffffffffff, 0x0, 0x0) 31.616436977s ago: executing program 0 (id=50): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x3, 0x10000410, 0xffffffffffffffff, 0x3) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r1, 0x0, 0x3, &(0x7f0000000000)=0x4, 0x1c) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) sysarch$I386_SET_PKRU(0xc, &(0x7f0000000000)={0x6, 0x0, 0x72}) r2 = dup(r0) ioctl$GETFKEY(r2, 0xc0146b00, &(0x7f0000000040)={0x9, "5b881c06247c59fc6b7dbee311e741ca", 0x5}) 30.723881376s ago: executing program 0 (id=57): symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') (async) r0 = msgget$private(0x0, 0x8) msgsnd(r0, &(0x7f0000000080)=ANY=[], 0x0, 0x0) (async) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000500), 0x82, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, 0x3, 0xfdf9ff88, [0x0, 0x0, 0x20000]}) (async) ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f0000001040)={0x2, 0x2, 0x3, 0xac, &(0x7f0000001280)="1958081060055aec838e81834a0fcfc07f37a31979259b2823fbcc94620b2cb79b3bdfe867e2adf6aea8093a9e288fa66d99d1cb17e6c4957212d111814e9506a5b247202675370aaee5b60ad80b4a7597d056c11c43307ed7d06e4ab82208d1000d476a3397a4412286afe3039bfbac2df4c0ea801e14c9443713691d", 0x0, &(0x7f0000001300)="487ed14f737adefc6969ffe494a892a21159bb321fc684d926c041ec579709ad8f745e8489961b3c915d3de919ad03ef5f5a03bc0d9de5cdecc8220900c4f3491198e4f96eba173dd5a30041b504ae0b0f1f57be7e25ae5a17cf5163f3fbeb59eebed5661727344512c079ea0803a564987965efb10a917f922cbfb9528c6ddaf9f31ec71bd97d8b5c0abdbee07e01c0badfc5892d5d45db01a9c8475e35abf546b208a0e3e3cda0081c3dcaf70ecdda9c0808033f101f08c2942cc6cb2a619336e0c79cbb1a447bbf1d7ce371d7944366", &(0x7f0000001240)="219c"}) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) r2 = socket(0x1c, 0x30000003, 0xee) r3 = open(0x0, 0x0, 0x0) mkdirat(r3, 0x0, 0x0) chroot(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00') (async) rename(&(0x7f00000003c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//../file0\x00', 0x0) (async) r4 = shmget(0x3, 0x3000, 0x0, &(0x7f000077c000/0x3000)=nil) shmctl$IPC_RMID(r4, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) open$dir(&(0x7f00000028c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x4, 0x112) (async) rfork(0x10050) r6 = open$dir(&(0x7f0000001100)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r6, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) (async) rfork(0x10050) (async) unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x48000101) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) (async) getgroups(0x1, &(0x7f0000000000)=[0xffffffffffffffff]) (async) setsockopt$inet_int(r5, 0x0, 0x43, &(0x7f00000000c0)=0x2, 0x4) (async) fstatat(r2, &(0x7f00000010c0)='./file0\x00', &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xc100) fchown(0xffffffffffffffff, r7, 0x0) (async) sendto$inet(r5, 0x0, 0x0, 0x100, &(0x7f00000002c0)={0x10, 0x2, 0x2, @loopback}, 0x10) (async) syz_emit_ethernet(0x36, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaa000000000000080045000028000000000001900700000000000000ff0d00907800"/54]) 30.64586036s ago: executing program 0 (id=58): r0 = kqueue() extattr_list_fd(r0, 0x4, &(0x7f0000000000)=""/114, 0x72) r1 = socket$unix(0x1, 0x2, 0x0) freebsd11_kevent(r0, &(0x7f0000000080)=[{0x6, 0xfffffffffffffff3, 0x20, 0x40, 0x0, 0x40}, {0xa8ba, 0xfffffffffffffff5, 0x0, 0x20000000, 0x2, 0x5}, {0x7ff, 0xfffffffffffffffb, 0x60, 0x20000000, 0x1, 0x3}, {0x8, 0xe, 0x0, 0x8, 0x3, 0x4}, {0x3, 0xfffffffffffffff0, 0x4019, 0x40000000, 0xc, 0x8000}], 0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}, {}, {}, {}], 0xa, &(0x7f0000000200)={0x0, 0xeb}) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockopt$inet6_udplite(r2, 0x88, 0x4, &(0x7f0000000240), &(0x7f0000000280)=0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) setuid(0x0) aio_writev(&(0x7f00000004c0)={r1, 0x8bd5, &(0x7f0000000300)="2200817e09cfa74197183072aa340b874aa8e99f8b75d7272e3f2784901306a50474a83832db64c5f22ffdea11ffb5343d36f307732970405d0cbda03cc42c7b9841fadd5434060d3554054ed87bce1ced7999baa6ff30085ca4a96165b472190347539e373de35ca2a28801f0dd7546b2bc96456135eb8dc412aa0cd7a2a9865d6373d9325635749a7468ab500967926147f6fd1366610eff40ce99decd0c44f298a63670101c7dd30752e78c984d0c9acf85e1a0b59b", 0xb7, [0xc, 0x9], 0x2, 0x1, 0x1, {0x10001, 0xffffff7f, &(0x7f00000003c0)="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"}, {0x3, 0x19, @sigval_int=0xb, @spare=[0x5, 0x0, 0x4, 0x8, 0x7, 0xfff, 0x7b]}}) connectat$unix(r0, r3, &(0x7f0000000540)=@file={0xa, 0x1, './file0\x00'}, 0xa) fsync(r0) socket$inet6_udp(0x1c, 0x2, 0x0) thr_suspend(&(0x7f0000000580)={0x8, 0xf557}) r4 = accept4$inet(0xffffffffffffffff, &(0x7f00000005c0)={0x10, 0x2, 0xffffffffffffffff, @local}, &(0x7f0000000600)=0x10, 0x10000000) getsockname$inet(r4, &(0x7f0000000640)={0x10, 0x2, 0xffffffffffffffff, @rand_addr}, &(0x7f0000000680)=0x10) r5 = openat$kbd(0xffffff9c, &(0x7f00000006c0), 0x80, 0x0) ioctl$KDMKTONE(r5, 0x20044b08) sync() getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, &(0x7f00000007c0)={0x0, &(0x7f0000000700)=[@in={0x10}, @in6={0x1c}, @in={0x10}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}, @in={0x10, 0x2, 0xffffffffffffffff, @rand_addr}, @in={0x10, 0x2, 0xffffffffffffffff, @local}]}, &(0x7f0000000800)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRESSES(r4, 0x84, 0x8003, &(0x7f00000008c0)={r6, &(0x7f0000000840)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @ipv4={""/10, ""/2, @remote}}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @empty}, @in={0x10, 0x2, 0xffffffffffffffff, @broadcast}]}, &(0x7f0000000900)=0x8) r7 = openat$kbd(0xffffff9c, &(0x7f0000000940), 0x20000, 0x0) ioctl$KDGETMODE(r7, 0x40044b09, 0x8c) setsockopt$inet6_sctp_SCTP_RECVNXTINFO(0xffffffffffffffff, 0x84, 0x20, &(0x7f0000000980), 0x4) accept4$unix(r3, &(0x7f00000009c0)=@file={0x26, 0x0, ""/36}, &(0x7f0000000a00)=0x26, 0x28000000) freebsd11_mknod(&(0x7f0000000a40)='./file0\x00', 0xe000, 0x3) pipe2(&(0x7f0000000a80)={0xffffffffffffffff}, 0x4) ioctl$UI_SET_LEDBIT(r8, 0x20045569) r9 = accept4$inet6(r8, &(0x7f0000000ac0)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @remote}, &(0x7f0000000b00)=0x1c, 0x0) fcntl$lock(r9, 0xc, &(0x7f0000000b40)={0x1, 0x4, 0xfffffff7}) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x48, &(0x7f0000000b80)=0x7, 0x4) 29.796419834s ago: executing program 0 (id=63): r0 = msgget$private(0x0, 0x355) msgsnd(r0, &(0x7f0000000940)={0x3}, 0x8, 0x0) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) (async) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) (async) r1 = open(&(0x7f0000000840)='./file0\x00', 0x80400000000206, 0x0) write(r1, &(0x7f0000000080)="ba", 0x100000) msgrcv(r0, 0x0, 0xffffff97, 0x0, 0x1800) 29.796044385s ago: executing program 32 (id=63): r0 = msgget$private(0x0, 0x355) msgsnd(r0, &(0x7f0000000940)={0x3}, 0x8, 0x0) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) (async) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) (async) r1 = open(&(0x7f0000000840)='./file0\x00', 0x80400000000206, 0x0) write(r1, &(0x7f0000000080)="ba", 0x100000) msgrcv(r0, 0x0, 0xffffff97, 0x0, 0x1800) 11.858590268s ago: executing program 1 (id=49): r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r0, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x20104) syz_emit_ethernet(0x3e, &(0x7f0000000340)={@local, @broadcast, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0xfc, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @generic={0x82, 0x2}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1, 0x4}}}}}) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f00000000c0)={r1, 0x7}, &(0x7f0000000100)=0x8) socket(0x1c, 0x5, 0xfe) r2 = socket(0x1c, 0x1, 0x0) sysarch$AMD64_SET_PKRU(0x85, &(0x7f0000000140)={&(0x7f0000000040)="d252fa", 0x3}) select(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00001) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, 0x0, 0x0) syz_emit_ethernet(0x98, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00623aff78042000000014000001000000086500ff0200000000000000000000000000018800907800000000fe8000000000000000000020000000bb030884c814c23d9b66e0080fbd81b768b77a8b9b3780d22952c0db0042da2e39ebf0581cbc744d58fb8fbb6518711503ef1b3a7dd76eac249ac9e93a99f085440301650595abc9d90200"]) cap_fcntls_limit(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x3866) open$dir(0x0, 0x24102c0, 0x126) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xd}, 0x24) sendto$inet6(r4, 0x0, 0x0, 0x60280, &(0x7f00000000c0)={0x1c, 0x1c, 0x2, 0x8, @rand_addr="720f93f223bcc795438d3d69e16d756e"}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x80, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x8001, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) r5 = open(&(0x7f0000000200)='./file0/file0/file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) r6 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r6, 0x29, 0x31, &(0x7f0000000180)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r3, @ANYRESOCT=r6, @ANYRES32=r5, @ANYRESDEC=r2], 0x8) sendto(r6, 0x0, 0x0, 0x100, 0x0, 0x0) extattr_get_link(0x0, 0x3, 0x0, 0x0, 0x0) cpuset_setid(0x2, 0x0, 0x0) socket(0x1c, 0x1, 0x0) 9.86744628s ago: executing program 1 (id=49): r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r0, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x20104) syz_emit_ethernet(0x3e, &(0x7f0000000340)={@local, @broadcast, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0xfc, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @generic={0x82, 0x2}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1, 0x4}}}}}) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f00000000c0)={r1, 0x7}, &(0x7f0000000100)=0x8) socket(0x1c, 0x5, 0xfe) r2 = socket(0x1c, 0x1, 0x0) sysarch$AMD64_SET_PKRU(0x85, &(0x7f0000000140)={&(0x7f0000000040)="d252fa", 0x3}) select(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00001) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, 0x0, 0x0) syz_emit_ethernet(0x98, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00623aff78042000000014000001000000086500ff0200000000000000000000000000018800907800000000fe8000000000000000000020000000bb030884c814c23d9b66e0080fbd81b768b77a8b9b3780d22952c0db0042da2e39ebf0581cbc744d58fb8fbb6518711503ef1b3a7dd76eac249ac9e93a99f085440301650595abc9d90200"]) cap_fcntls_limit(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x3866) open$dir(0x0, 0x24102c0, 0x126) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xd}, 0x24) sendto$inet6(r4, 0x0, 0x0, 0x60280, &(0x7f00000000c0)={0x1c, 0x1c, 0x2, 0x8, @rand_addr="720f93f223bcc795438d3d69e16d756e"}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x80, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x8001, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) r5 = open(&(0x7f0000000200)='./file0/file0/file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) r6 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r6, 0x29, 0x31, &(0x7f0000000180)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r3, @ANYRESOCT=r6, @ANYRES32=r5, @ANYRESDEC=r2], 0x8) sendto(r6, 0x0, 0x0, 0x100, 0x0, 0x0) extattr_get_link(0x0, 0x3, 0x0, 0x0, 0x0) cpuset_setid(0x2, 0x0, 0x0) socket(0x1c, 0x1, 0x0) 7.511211767s ago: executing program 1 (id=49): r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r0, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x20104) syz_emit_ethernet(0x3e, &(0x7f0000000340)={@local, @broadcast, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0xfc, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @generic={0x82, 0x2}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1, 0x4}}}}}) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f00000000c0)={r1, 0x7}, &(0x7f0000000100)=0x8) socket(0x1c, 0x5, 0xfe) r2 = socket(0x1c, 0x1, 0x0) sysarch$AMD64_SET_PKRU(0x85, &(0x7f0000000140)={&(0x7f0000000040)="d252fa", 0x3}) select(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00001) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, 0x0, 0x0) syz_emit_ethernet(0x98, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00623aff78042000000014000001000000086500ff0200000000000000000000000000018800907800000000fe8000000000000000000020000000bb030884c814c23d9b66e0080fbd81b768b77a8b9b3780d22952c0db0042da2e39ebf0581cbc744d58fb8fbb6518711503ef1b3a7dd76eac249ac9e93a99f085440301650595abc9d90200"]) cap_fcntls_limit(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x3866) open$dir(0x0, 0x24102c0, 0x126) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xd}, 0x24) sendto$inet6(r4, 0x0, 0x0, 0x60280, &(0x7f00000000c0)={0x1c, 0x1c, 0x2, 0x8, @rand_addr="720f93f223bcc795438d3d69e16d756e"}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x80, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x8001, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) r5 = open(&(0x7f0000000200)='./file0/file0/file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) r6 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r6, 0x29, 0x31, &(0x7f0000000180)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r3, @ANYRESOCT=r6, @ANYRES32=r5, @ANYRESDEC=r2], 0x8) sendto(r6, 0x0, 0x0, 0x100, 0x0, 0x0) extattr_get_link(0x0, 0x3, 0x0, 0x0, 0x0) cpuset_setid(0x2, 0x0, 0x0) socket(0x1c, 0x1, 0x0) 5.576179999s ago: executing program 4 (id=151): r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) cpuset_getid(0x2, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000380), 0x0, 0x0}, 0x81) freebsd10_pipe(&(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x27) aio_write(0x0) truncate(0x0, 0x100000) r1 = kqueue() r2 = openat$crypto(0xffffffffffffff9c, 0x0, 0x82, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfdf9ff88, [0x0, 0x0, 0x20000, 0x9087]}) fspacectl(r1, 0x1, &(0x7f0000000100)={0x5, 0xffffffff}, 0x0, &(0x7f0000000140)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) clock_settime(0x0, 0x0) socket$unix(0x1, 0x2, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x0, 0xffffffffffffffff}}, 0x0) r4 = socket(0x1c, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x1ff, @empty, 0x5}, 0x1c) r5 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r6 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r6, r5, &(0x7f0000000280)='.\x00', 0x21000630) r7 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r7, 0x40044b09, 0x18f1) 5.57435321s ago: executing program 2 (id=152): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000600)=ANY=[]) getsockopt$inet6_int(r0, 0x29, 0x9, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 5.182771217s ago: executing program 1 (id=49): r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r0, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x20104) syz_emit_ethernet(0x3e, &(0x7f0000000340)={@local, @broadcast, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0xfc, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @generic={0x82, 0x2}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1, 0x4}}}}}) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f00000000c0)={r1, 0x7}, &(0x7f0000000100)=0x8) socket(0x1c, 0x5, 0xfe) r2 = socket(0x1c, 0x1, 0x0) sysarch$AMD64_SET_PKRU(0x85, &(0x7f0000000140)={&(0x7f0000000040)="d252fa", 0x3}) select(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00001) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, 0x0, 0x0) syz_emit_ethernet(0x98, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00623aff78042000000014000001000000086500ff0200000000000000000000000000018800907800000000fe8000000000000000000020000000bb030884c814c23d9b66e0080fbd81b768b77a8b9b3780d22952c0db0042da2e39ebf0581cbc744d58fb8fbb6518711503ef1b3a7dd76eac249ac9e93a99f085440301650595abc9d90200"]) cap_fcntls_limit(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x3866) open$dir(0x0, 0x24102c0, 0x126) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xd}, 0x24) sendto$inet6(r4, 0x0, 0x0, 0x60280, &(0x7f00000000c0)={0x1c, 0x1c, 0x2, 0x8, @rand_addr="720f93f223bcc795438d3d69e16d756e"}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x80, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x8001, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) r5 = open(&(0x7f0000000200)='./file0/file0/file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) r6 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r6, 0x29, 0x31, &(0x7f0000000180)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r3, @ANYRESOCT=r6, @ANYRES32=r5, @ANYRESDEC=r2], 0x8) sendto(r6, 0x0, 0x0, 0x100, 0x0, 0x0) extattr_get_link(0x0, 0x3, 0x0, 0x0, 0x0) cpuset_setid(0x2, 0x0, 0x0) socket(0x1c, 0x1, 0x0) 3.116378893s ago: executing program 4 (id=158): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r2 = __specialfd$eventfd(0x1, &(0x7f0000001180)={0x3, 0x4}, 0x8) r3 = kqueue() kevent(r3, &(0x7f0000000200)=[{0x3, 0xfffffffffffffffe, 0x183, 0xc0000045, 0xfffffffffffffff8, 0x0, [0x0, 0x0, 0x0, 0x4]}], 0x1, 0x0, 0x0, 0x0) writev(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)="ad026c8dfb687b1e", 0x8}], 0x1) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(r0, &(0x7f00000004c0)=@file={0xfb, 0x0, ""/249}, &(0x7f00000000c0)=0xfb) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 3.070559988s ago: executing program 2 (id=159): openat$crypto(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80400000000606, 0x48) profil(0x0, 0x0, 0x1, 0xd6) profil(0x0, 0x0, 0x40, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) ktimer_create(0x4, 0x0, &(0x7f0000000100)) ktimer_create(0x0, 0x0, &(0x7f0000000200)) ktimer_create(0x0, 0x0, &(0x7f0000000180)) ktimer_create(0x4, 0x0, &(0x7f0000000100)) ktimer_create(0xf, 0x0, &(0x7f0000000240)) ktimer_create(0x4, 0x0, &(0x7f0000000040)) ktimer_create(0x4, 0x0, &(0x7f0000000100)) ktimer_create(0x4, 0x0, &(0x7f0000000100)) ktimer_create(0x4, 0x0, &(0x7f0000000380)) ktimer_create(0x0, 0x0, &(0x7f0000000300)) ktimer_create(0x4, 0x0, &(0x7f0000000100)) ktimer_create(0x0, 0x0, &(0x7f0000000340)) ktimer_create(0x0, 0x0, &(0x7f0000000180)) ktimer_create(0x0, 0x0, &(0x7f00000001c0)) ktimer_create(0x0, 0x0, &(0x7f00000003c0)) ktimer_create(0x4, 0x0, &(0x7f0000000080)) ktimer_create(0x0, 0x0, &(0x7f00000001c0)) ktimer_create(0x0, 0x0, &(0x7f00000003c0)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) open$dir(&(0x7f0000001040)='./file0\x00', 0xd7e793f0bf7d5c60, 0xca0706ee3fd5d664) ktimer_create(0x0, 0x0, &(0x7f0000000000)) ktimer_create(0x0, 0x0, &(0x7f0000000180)) ktimer_create(0x4, 0x0, &(0x7f0000000080)) ktimer_create(0x0, 0x0, &(0x7f00000001c0)) ktimer_create(0x0, 0x0, &(0x7f00000003c0)) 3.069343692s ago: executing program 2 (id=161): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x1, 0x0) ioctl$MDIOCATTACH(0xffffffffffffff9c, 0xc1b46d00, &(0x7f0000000080)={0x5, 0x8, 0x3, 0x0, 0x8001, 0xe0, 0xfffffffe, 0x401, 0x72788a94, 0x2, 0x0, [0xd, 0x8001, 0xffffffff, 0xfffffffa, 0xbdf, 0x0, 0x7a, 0x70, 0x401, 0x2, 0x8, 0x2, 0x8, 0x1ff, 0x9, 0x4, 0xe, 0x7fffffff, 0x9, 0x101, 0x5, 0x7fffffff, 0x3, 0xd, 0xfffffffe, 0x6, 0x8, 0xfcf, 0x4, 0xc, 0x1, 0x0, 0x0, 0x9, 0x5, 0x7, 0xffffffff, 0x2, 0x7fff, 0xaa8b, 0xfffffffe, 0x1000000, 0x4, 0x400, 0x263, 0x9f, 0x1a8, 0x22, 0x8, 0x6, 0x7, 0x4eee, 0x9, 0x5, 0x2, 0xb, 0x4, 0x0, 0x1, 0x3, 0x8, 0x8a627f5, 0x1, 0x4, 0x1, 0xe7eb, 0x80, 0x0, 0xf, 0x401, 0x0, 0xff, 0xfffffffd, 0x7fff, 0x5, 0x1, 0xf5d1, 0xfffffffe, 0x7, 0x4, 0x3, 0x6, 0x6, 0x7fffffff, 0x5, 0x4, 0x1, 0x2, 0x5, 0x2, 0xa, 0xa, 0x6, 0x7, 0x101, 0x4]}) listen(0xffffffffffffffff, 0x38000000) unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x404000d0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) msync(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r1, 0x0, 0x4b, &(0x7f0000000080)=0x2, 0x4) socket(0x2, 0x1, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) __realpathat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=""/6, 0x6, 0x0) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000000)={0x0, 0x7}, &(0x7f0000000040)=0x8) 2.681171104s ago: executing program 1 (id=49): r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r0, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x20104) syz_emit_ethernet(0x3e, &(0x7f0000000340)={@local, @broadcast, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0xfc, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @generic={0x82, 0x2}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1, 0x4}}}}}) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f00000000c0)={r1, 0x7}, &(0x7f0000000100)=0x8) socket(0x1c, 0x5, 0xfe) r2 = socket(0x1c, 0x1, 0x0) sysarch$AMD64_SET_PKRU(0x85, &(0x7f0000000140)={&(0x7f0000000040)="d252fa", 0x3}) select(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00001) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, 0x0, 0x0) syz_emit_ethernet(0x98, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00623aff78042000000014000001000000086500ff0200000000000000000000000000018800907800000000fe8000000000000000000020000000bb030884c814c23d9b66e0080fbd81b768b77a8b9b3780d22952c0db0042da2e39ebf0581cbc744d58fb8fbb6518711503ef1b3a7dd76eac249ac9e93a99f085440301650595abc9d90200"]) cap_fcntls_limit(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x3866) open$dir(0x0, 0x24102c0, 0x126) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xd}, 0x24) sendto$inet6(r4, 0x0, 0x0, 0x60280, &(0x7f00000000c0)={0x1c, 0x1c, 0x2, 0x8, @rand_addr="720f93f223bcc795438d3d69e16d756e"}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x80, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x8001, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) r5 = open(&(0x7f0000000200)='./file0/file0/file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) r6 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r6, 0x29, 0x31, &(0x7f0000000180)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r3, @ANYRESOCT=r6, @ANYRES32=r5, @ANYRESDEC=r2], 0x8) sendto(r6, 0x0, 0x0, 0x100, 0x0, 0x0) extattr_get_link(0x0, 0x3, 0x0, 0x0, 0x0) cpuset_setid(0x2, 0x0, 0x0) socket(0x1c, 0x1, 0x0) 614.010486ms ago: executing program 4 (id=167): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000100)={'bbr\x00', 0xd09}, 0x24) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e51348771197a7728420aef61715d7b1c3d4b3830c921bf0817a1600000000006a89dbdf", 0x2c) sendto$inet(r0, 0x0, 0x5c, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @multicast1}, 0xffffffffffffff26) sendto$inet(r0, &(0x7f00000008c0)="017a88ca8330d4f5ef2e52a27f685a17e29022ec5ec9d67a6015a0e6a0db75dddaa395dc8ad60ffdbe68786eaaac09007680f84936d556374f9eee59c767512771d3b79351767a317387f641529ae7dcf61fd7b6719203f15cd30c4a5306811406f996883a6c71e7e9", 0x69, 0x20180, &(0x7f0000000880)={0x10, 0x2, 0x2, @broadcast}, 0x10) 613.514085ms ago: executing program 2 (id=168): sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000000)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000040)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000080)) sysarch$I386_GET_GSBASE(0x9, &(0x7f00000000c0)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000100)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000140)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000180)) sysarch$I386_GET_GSBASE(0x9, &(0x7f00000001c0)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000200)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000240)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000280)) sysarch$I386_GET_GSBASE(0x9, &(0x7f00000002c0)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000300)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000340)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000380)) sysarch$I386_GET_GSBASE(0x9, &(0x7f00000003c0)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000400)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000440)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000480)) sysarch$I386_GET_GSBASE(0x9, &(0x7f00000004c0)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000500)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000540)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000580)) sysarch$I386_GET_GSBASE(0x9, &(0x7f00000005c0)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000600)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000640)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000680)) sysarch$I386_GET_GSBASE(0x9, &(0x7f00000006c0)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000700)) sysarch$I386_GET_GSBASE(0x9, &(0x7f0000000740)) 612.878828ms ago: executing program 3 (id=169): sysarch$I386_SET_LDT(0x1, &(0x7f0000000080)={0xfffffffd, &(0x7f0000000040), 0x13}) 536.114303ms ago: executing program 4 (id=170): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = socket(0x1, 0x1, 0x0) ioctl$MDIOCATTACH(0xffffffffffffff9c, 0xc1b46d00, &(0x7f0000000080)={0x5, 0x8, 0x3, 0x0, 0x8001, 0xe0, 0xfffffffe, 0x401, 0x72788a94, 0x2, 0x0, [0xd, 0x1, 0xffffffff, 0xfffffffa, 0xbdf, 0x0, 0x7a, 0x70, 0x401, 0x2, 0x8, 0x2, 0x8, 0x1ff, 0x9, 0x4, 0xe, 0x7fffffff, 0x9, 0x101, 0x5, 0x7fffffff, 0x3, 0xd, 0xfffffffe, 0x6, 0x8, 0xfcf, 0x4, 0xc, 0x1, 0x0, 0x0, 0x9, 0x5, 0x7, 0xffffffff, 0x2, 0x7fff, 0xaa8b, 0x2, 0x1000000, 0x4, 0x400, 0x263, 0x9f, 0x1a8, 0x22, 0x8, 0x6, 0x7, 0x4eee, 0x9, 0x5, 0x2, 0xb, 0x4, 0x0, 0x1, 0x3, 0x8, 0x8a627f5, 0x1, 0x4, 0x1, 0xe7eb, 0x80, 0x80000, 0x12, 0x401, 0x0, 0xff, 0xfffffffd, 0x7fff, 0x5, 0x1, 0xf5d1, 0xfffffffe, 0x7, 0x4, 0x3, 0x6, 0x6, 0x7ffffffc, 0x5, 0x4, 0x1, 0x2, 0x5, 0x2, 0xa, 0xa, 0x6, 0x7, 0x101, 0x4]}) (async) read(r0, 0x0, 0x0) (async) r1 = socket(0x1c, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x0, @loopback}, 0x1c) (async) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x42, &(0x7f0000003640)=0x4000, 0x4) listen(r1, 0x5) r2 = socket(0x1c, 0x1, 0x0) sendto$inet6(r2, 0x0, 0x0, 0x44, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x2, @loopback, 0x801}, 0x1c) (async) r3 = accept$inet(r1, &(0x7f0000000040)={0x10, 0x2, 0xffffffffffffffff, @rand_addr}, &(0x7f0000000080)=0x10) (async, rerun: 32) r4 = socket(0x1b, 0x3, 0x0) (rerun: 32) sendto$inet6(r4, &(0x7f0000000080)="02101b00020000008e4ca277fce00d8f", 0x10, 0x0, 0x0, 0x0) (async) listen(0xffffffffffffffff, 0x38000000) (async) listen(0xffffffffffffffff, 0x38000000) (async, rerun: 64) socket(0x2, 0x1, 0x0) (rerun: 64) setreuid(0x0, 0xee01) (async) procctl$PROC_TRAPCAP_CTL(0x0, 0x0, 0x9, 0x0) (async) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) (async) extattr_set_fd(0xffffffffffffffff, 0x2, &(0x7f0000000540)='},(/\x00', 0x0, 0x0) fork() (async) fork() (async) setsockopt$inet_mreqsrc(r3, 0x0, 0x47, &(0x7f0000000240)={@rand_addr=0xe1, @rand_addr=0xe61, @remote={0xac, 0x14, 0x0}}, 0xc) 535.73334ms ago: executing program 2 (id=171): open(&(0x7f0000000480)='./file0\x00', 0x0, 0x108) r0 = __specialfd$eventfd(0x1, &(0x7f0000001480), 0x8) ioctl$DIOCIGETIFACES(r0, 0x8004667d, &(0x7f0000000140)={0x10, 0x0, 0xfffffffe, 0x0, 0xffffffff}) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) extattr_delete_link(&(0x7f0000000140)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') 534.952404ms ago: executing program 3 (id=172): r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f00000017c0)={0x10, 0x2, 0xffffffffffffffff, @local={0xac, 0x14, 0x0}}, 0x10) listen(r1, 0xbc90) listen(r0, 0xda8d) listen(r0, 0x2) 533.227998ms ago: executing program 2 (id=173): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = semget$private(0x0, 0x2, 0x180) __semctl$IPC_RMID(r0, 0x0, 0x0) (async) __semctl$GETALL(r0, 0x0, 0x6, &(0x7f00000016c0)) (async) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x43b0}, {0x2}, {0x1}, {0x6}, {0x8}], 0x5}) (async) r1 = socket(0x1c, 0x1, 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0xfffffffd, 0x20, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x40, @sival_int=0xfffffff8}}) (async) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) chflags(&(0x7f0000000300)='./file0\x00', 0x4) r2 = open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) flock(r2, 0x2) (async, rerun: 64) rename(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000180)='./file1\x00') (rerun: 64) vfork() (async, rerun: 64) lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x3, 0x8, @sigval_int, @spare=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}) (async, rerun: 64) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 486.375414ms ago: executing program 3 (id=174): r0 = socket$inet6(0x1c, 0x1, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) bind$unix(r1, &(0x7f0000000040)=@abs={0x8, 0x0, 0x0, 0x0}, 0x8) listen(r1, 0x2) connect$unix(r1, &(0x7f00000002c0)=@file={0xa, 0x0, './file0\x00'}, 0xa) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000100)={@rand_addr="db35beddcd5ac50e533ddb5360ac0bcc"}, 0x14) fork() mount(&(0x7f0000000080)='apfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4800c6, &(0x7f0000000240)="7e124e15f24957fcbf57ef9d2f0fbefc4ac07c8b194ef42a167aa2bca094c220aa49b966bc430a3d3b308c618dd2df1cddec16f1b4bc9c5439e1e896015f5b79faf4ba55ed02efcdf1e61ac07b62") syz_emit_ethernet(0x66, &(0x7f0000000100)=ANY=[@ANYBLOB="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"]) 484.852594ms ago: executing program 3 (id=175): freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) (async) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) mount(&(0x7f0000000080)='ufs\x00', &(0x7f00000000c0)='.\x00', 0x93000700, &(0x7f0000000100)) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', &(0x7f0000000080)={{0xfffffffe, 0x2710}, {0x0, 0x8}}, 0x0) sigtimedwait(&(0x7f0000001940)={[0x0, 0x6, 0x4, 0x7]}, 0x0, &(0x7f00000019c0)={0x40000005, 0x9}) (async) sigtimedwait(&(0x7f0000001940)={[0x0, 0x6, 0x4, 0x7]}, 0x0, &(0x7f00000019c0)={0x40000005, 0x9}) unmount(&(0x7f0000000000)='./file0\x00', 0x8200000) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) r0 = fork() r1 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x12) flock(r1, 0x1) (async) flock(r1, 0x1) sigqueue(r0, 0x2, @sival_ptr=0xfff) (async) sigqueue(r0, 0x2, @sival_ptr=0xfff) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) (async) r2 = socket(0x1c, 0x1, 0x0) aio_write(0x0) (async) aio_write(0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) syz_emit_ethernet(0x34, &(0x7f0000000140)=ANY=[]) recvfrom$unix(r2, &(0x7f0000000040)=""/150, 0x96, 0x40, &(0x7f0000000100)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8) 426.362299ms ago: executing program 4 (id=176): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0x1c, 0x2, 0x0) socket$bt_l2cap(0x24, 0x3, 0x87) (async) rfork(0x3000) (async) fcntl$setflags(r0, 0x2, 0x0) (async) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f0000000100)={@multicast2, @broadcast, @loopback}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x47, &(0x7f00000001c0)={@multicast2, @loopback, @multicast1}, 0xc) r2 = socket(0x0, 0x5, 0x0) (async) socket$inet6(0x1c, 0x3, 0x6) (async) r3 = socket$inet(0x2, 0x3, 0x4) sendto$inet(r3, 0x0, 0x0, 0x20185, &(0x7f00000003c0)={0x10, 0x2, 0x0, @loopback}, 0x10) (async) r4 = socket(0x1c, 0x1, 0x0) setsockopt$sock_timeval(r4, 0xffff, 0x1006, &(0x7f0000000040)={0x2777, 0xfffffff8}, 0x8) (async, rerun: 32) recvmsg(r3, &(0x7f0000001540)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f0000000400)=""/4096, 0x1000}], 0x1, 0x0}, 0x7eeb91af69955408) (async, rerun: 32) lio_listio(0x0, 0x0, 0x0, &(0x7f00000013c0)={0x3, 0x800003, @sival_int=0x5, @thr={0x0, 0x0}}) (async) extattr_get_file(&(0x7f0000000040)='./file0\x00', 0x2, &(0x7f0000000080)='\x00', &(0x7f0000000200)=""/80, 0x50) (async, rerun: 32) r5 = socket(0x1b, 0x3, 0x0) (rerun: 32) sendto$inet6(r5, &(0x7f0000000180)="02090009020003000000f9ffadc30e90", 0x10, 0x188, 0x0, 0x0) (async, rerun: 32) setsockopt$inet6_buf(r2, 0x29, 0x32, &(0x7f0000000000)="e746255f93eb83a36ba02d61df3f60abf95b9db6a783073ee8abc0fcc8a98ddd2b6fd164", 0x24) (async, rerun: 32) setpgid(0x0, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 305.17375ms ago: executing program 4 (id=177): r0 = socket(0x1c, 0x1, 0x0) bind(r0, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x1, 0x5, @mcast2, 0x1}, 0x1c) accept4(r0, &(0x7f0000000300)=@un=@abs={0x8}, &(0x7f0000000440)=0x8, 0x10000000) chflags(&(0x7f0000000300)='./file0\x00', 0x4) connect$inet6(0xffffffffffffffff, &(0x7f00000002c0)={0x1c, 0x1c, 0x3, 0x4, @loopback}, 0x1c) writev(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f00000000c0)="8fcf828db5521fff02a7958e86c998590a0773caaabae4be20ca4e92629bff07a531bc2338b3b9e944b7e65a9f1a413b5da9123622ab2ccf1e36a6674739f42884df6eb868d20140090d60238cf9624c69eca8ce5f", 0x55}], 0x1) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) cpuset_getaffinity(0x2, 0x8, 0x4, 0x0, 0x0) getpriority(0x3, 0x0) getresuid(0x0, &(0x7f0000000040)=0x0, 0x0) setresuid(0x0, 0x0, r2) openat$smbus(0xffffffffffffff9c, &(0x7f0000000000), 0x20000, 0x0) syz_emit_ethernet(0xf, &(0x7f0000000040)={@local, @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x8, @remote, @local={0xac, 0x14, 0x0}, @remote, @multicast1}}}}) clock_getres(0x281c05b888e7c46c, &(0x7f0000000300)) open$dir(0x0, 0xd6dfe06bdea017f9, 0x141) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) mkdirat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x0) shmat(0xffffffffffffffff, &(0x7f0000000000/0x3000)=nil, 0x0) msgget$private(0x0, 0x601) freebsd11_mknod(0x0, 0x2000, 0x801) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0xff8008, &(0x7f00000001c0)) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 236.391629ms ago: executing program 3 (id=178): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r0, 0x6, 0x24, &(0x7f00000005c0)='/', 0x1) rfork(0x85000) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) extattr_delete_fd(r1, 0x3, &(0x7f0000000140)='\x00') 235.295766ms ago: executing program 3 (id=179): r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x8, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x1, 0x0, 0x2000000, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x52, &(0x7f0000000200)="0d8049824a3e07f321cc2b77c5ad3b4d292b59553ff35d0b1ef099f134e3a48b97bd7fdccd706114d577dad0fd2303d6fcfb9028fc29babd0c3e831d90ee5af5133f2458a11c9b752d849e8cb289b88e936038c3de4d7c1d4371264dc2f8c9f1ecaded98f4583b1dcc491ad111d373dee434a4c4a0c9c0cc6de6c354398dad27443d4feb8c1b1defbe4bf182dadc7ddd0cfaace7ea61bc0c845e", 0x9a) setsockopt$inet6_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x4, 0x4) r3 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) unmount(&(0x7f0000000180)='./file0\x00', 0x88100208) mkdirat(r3, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, &(0x7f0000000140)) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x28, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x0, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10, 0xa3}}}}}}) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) freebsd12_shm_open(&(0x7f0000002ac0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) r6 = socket(0x1c, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r6, &(0x7f0000000040)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffb}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r6, 0x6, 0x2000, &(0x7f0000000000)={'rack\x00', 0x40001007}, 0x24) setsockopt$inet_tcp_int(r6, 0x6, 0x41f, &(0x7f0000000100)=0x30d, 0x4) r7 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) dup(r7) syz_emit_ethernet(0x2a, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffffffffffffffff0806"]) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 0s ago: executing program 1 (id=49): r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) sendmsg$unix(r0, &(0x7f0000002580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x20104) syz_emit_ethernet(0x3e, &(0x7f0000000340)={@local, @broadcast, [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0xfc, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@ra={0x94, 0x6, 0x5}, @generic={0x82, 0x2}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x8715, 0x32, 0x4, 0x1, 0x4}}}}}) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040)={0x0, 0x9}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f00000000c0)={r1, 0x7}, &(0x7f0000000100)=0x8) socket(0x1c, 0x5, 0xfe) r2 = socket(0x1c, 0x1, 0x0) sysarch$AMD64_SET_PKRU(0x85, &(0x7f0000000140)={&(0x7f0000000040)="d252fa", 0x3}) select(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00001) r3 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, 0x0, 0x0) syz_emit_ethernet(0x98, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00623aff78042000000014000001000000086500ff0200000000000000000000000000018800907800000000fe8000000000000000000020000000bb030884c814c23d9b66e0080fbd81b768b77a8b9b3780d22952c0db0042da2e39ebf0581cbc744d58fb8fbb6518711503ef1b3a7dd76eac249ac9e93a99f085440301650595abc9d90200"]) cap_fcntls_limit(0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x3866) open$dir(0x0, 0x24102c0, 0x126) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r4, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xd}, 0x24) sendto$inet6(r4, 0x0, 0x0, 0x60280, &(0x7f00000000c0)={0x1c, 0x1c, 0x2, 0x8, @rand_addr="720f93f223bcc795438d3d69e16d756e"}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x80, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x8001, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) r5 = open(&(0x7f0000000200)='./file0/file0/file0\x00', 0x611, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffe93) r6 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r6, 0x29, 0x31, &(0x7f0000000180)=ANY=[@ANYRESHEX=0x0, @ANYRES8=r3, @ANYRESOCT=r6, @ANYRES32=r5, @ANYRESDEC=r2], 0x8) sendto(r6, 0x0, 0x0, 0x100, 0x0, 0x0) extattr_get_link(0x0, 0x3, 0x0, 0x0, 0x0) cpuset_setid(0x2, 0x0, 0x0) socket(0x1c, 0x1, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.109' (ED25519) to the list of known hosts. Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 Expensive callout(9) function: 0xffffffff81afc400(0) 0.005912037 s if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe0059a55698 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1735 2nd 0xffffffff83ce5c60 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1434 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff816a2851 at witness_checkorder+0x781 #1 0xffffffff81528757 at __mtx_lock_flags+0x187 #2 0xffffffff8188cbcc at tunifioctl+0x15c #3 0xffffffff81868408 at ifhwioctl+0xef8 #4 0xffffffff8186c3cc aif_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 t ifioctl+0xd7c #5 0xffffffff816b163a at kern_ioctl+0x52a #6 0xffffffff816b101e at sys_ioctl+0x36e #7 0xffffffff82193a62 at amd64_syscall+0x4e2 #8 0xffffffff8213569b at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff816a3722 at witness_checkorder+0x1652 #1 0xffffffff81591ec9 at _sx_xlock+0x139 #2 0xffffffff8188cafa at tunifioctl+0x8a #3 0xffffffff818692d6 at ifhwioctl+0x1dc6 #4 0xffffffff8188a562 at tunioctl+0xd92 #5 0xffffffff811f99d6 at devfs_ioctl+0x266 #6 0xffffffff823584e7 at VOP_IOCTL_APV+0x87 #7 0xffffffff8180f737 at vn_ioctl+0x3c7 #8 0xffffffff811fa899 at devfs_ioctl_f+0x69 #9 0xffffffff816b163a at kern_ioctl+0x52a #10 0xffffffff816b101e at sys_ioctl+0x36e #11 0xffffffff80445f17 at freebsd32_ioctl+0x607 #12 0xffffffff823204f2 at ia32_syscall+0x4d2 #13 0xffffffff82135eff at int0x80_syscall_common+0x9c if_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873fc00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c4c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 SYZFAIL: too much cover cov=8388704 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too much cover cov=8388704 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too much cover cov=8388704 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too much cover cov=8388708 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too much cover cov=8388708 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=1 req=49 state=3 status=67 (errno 9: Bad file descriptor) if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 FreeBSD/amd64 (ci-freebsd-i386-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 show registers Password: Login incorrect login: ps Jan 1 00:17:39 ci-freebsd-i386-4 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl