last executing test programs: 11.516193007s ago: executing program 1 (id=26): ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x1, 0x0, 0x2000000, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x43b0}, {0x2}, {0x1}, {0x6}, {0x8}], 0x5}) r1 = socket(0x1c, 0x1, 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0xfffffffd, 0x20, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x40, @sival_int=0xfffffff8}}) r2 = vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sigval_int, @spare}) wait4(r2, &(0x7f0000000200), 0x10, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x5, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = dup(r4) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000180)={0x10, 0x12, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4d46b76e, [0x0, 0x400009, 0x3ff]}) syz_emit_ethernet(0x3b8, &(0x7f0000000680)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x382, 0x0, 0x0, @rand_addr="eee21f0000003c00000500004c58053b", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x0, 0x6, '\x00', [@pad1, @ra={0x5, 0x2, 0xcfe}, @enc_lim, @generic={0x3, 0x29, "defcbfd2493d61a279d61ee11e68365c4f4b148566bae4a2c65b92e84483895e1471413fa708f18e0d"}]}, @hopopts={0x2b, 0x66, '\x00', [@generic={0xa, 0x24, "4336d904e3b4734a81099c6ac4c14a1ee2db7aea68a60184063a1827af1f8d2e21fb3995"}, @ra, @generic={0x4, 0xbd, "3b0ddcb4642d4cb82f6f6f2b9e63c2678da83b5cffbad8388d8f394db481ba956851525fac19b219718c7527c48f79fd6ea7bfe7976badc10d74a95edaddc55a86a57bd79d882400f76321010d67dc56e74103d3beb4fb131d954595df7760ed3e8ce1d706a18913f09af6acf8769855549556d83fd0040cc53fb26333bdf4e7293ee23bd6853ea249035b3d73b44af20e46846cecc998014c3b5bad8171acf5a79616308df5da66d0d198c91e71302ab17339974ae5147b5cc8df2868"}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x19, 0x22f, "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"}, @ra={0x5, 0x2, 0x4836}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x9}]}], @generic="3ae9"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 9.519755516s ago: executing program 1 (id=26): ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x1, 0x0, 0x2000000, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x43b0}, {0x2}, {0x1}, {0x6}, {0x8}], 0x5}) r1 = socket(0x1c, 0x1, 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0xfffffffd, 0x20, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x40, @sival_int=0xfffffff8}}) r2 = vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sigval_int, @spare}) wait4(r2, &(0x7f0000000200), 0x10, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x5, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = dup(r4) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000180)={0x10, 0x12, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4d46b76e, [0x0, 0x400009, 0x3ff]}) syz_emit_ethernet(0x3b8, &(0x7f0000000680)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x382, 0x0, 0x0, @rand_addr="eee21f0000003c00000500004c58053b", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x0, 0x6, '\x00', [@pad1, @ra={0x5, 0x2, 0xcfe}, @enc_lim, @generic={0x3, 0x29, "defcbfd2493d61a279d61ee11e68365c4f4b148566bae4a2c65b92e84483895e1471413fa708f18e0d"}]}, @hopopts={0x2b, 0x66, '\x00', [@generic={0xa, 0x24, "4336d904e3b4734a81099c6ac4c14a1ee2db7aea68a60184063a1827af1f8d2e21fb3995"}, @ra, @generic={0x4, 0xbd, "3b0ddcb4642d4cb82f6f6f2b9e63c2678da83b5cffbad8388d8f394db481ba956851525fac19b219718c7527c48f79fd6ea7bfe7976badc10d74a95edaddc55a86a57bd79d882400f76321010d67dc56e74103d3beb4fb131d954595df7760ed3e8ce1d706a18913f09af6acf8769855549556d83fd0040cc53fb26333bdf4e7293ee23bd6853ea249035b3d73b44af20e46846cecc998014c3b5bad8171acf5a79616308df5da66d0d198c91e71302ab17339974ae5147b5cc8df2868"}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x19, 0x22f, "26983c13857aeb63d1bb37004a3a20fb28ac932c4de272c83c7c972f525b38814cc8b148a4e2191af89015bb3827f51e5683363f16740b97b6386cf36a434b4927bc2981516ca8843ec76d9ee581b2bb84092547826ecdd153fd06fe7b33eab72110dc7391f4c1475d055df491a182f120ad15064ae024575ea637bb0f96cfa61a0aab8daaa15e683d92a09da8a8c65569b97b677f073ba0bbbfa6ca51c4e10ee6c633261682c745c464e5a9b1dd9e6feb8876895ea7aab6c45a349faa8344b757eb5b77e889aeb26267b0717c17befa48d97ea4f781cb122938df374ba19eb6ff1df7a053876f91ffbd3211fb157ef780b8574c922b634730c7be00e2ace7eae470cda6c7b6996da4f1c887db39aa122df24de2bc939896cb7db1882b386d30656c732365e84e7812f2c3eb44ae3c4ec773df26ebdb7c6d94592e6577f373935c7e4ecaafa423f9e91337124a8b624dbd0f8eff75ce78a3ff9975eec0706f395737e70f2cec5cbe2e8ce90a4583732e974ef87fe716043c9c8321d53e8adb83659a72888faf4f589bd7848581584ebcc444538f4ae6af3b1ca1c0ed56d7183580081c3ecf0cb076fdbb797f03df541a5b9a48eebb7ed419a4717d98c322691396af18ef87cc4e699e5cc6e160b8f7ed1532c821d26f2e298afff0d571737adffb55415bfbdfc2cee5e7ecda4b6937e34cdf94588e92135168055ebc25ecaf74a4792fefa1e7c0b91f7097c20ca8ec9a4e172ec28ef1f47ca97b770729243c054fa1a698d4cad91c02b84649897873"}, @ra={0x5, 0x2, 0x4836}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x9}]}], @generic="3ae9"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 7.735854592s ago: executing program 3 (id=133): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$bpf(0xffffff9c, &(0x7f00000000c0), 0x200000, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000000)=[{0x3, 0xffffffffffffffff, 0xc0c3, 0xc0000000, 0x0, 0x6, [0x8, 0x1ccf, 0x1, 0x1000000000009]}], 0x1, 0x0, 0x0, 0x0) close(r0) r2 = socket(0x1, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) fstatfs(r3, 0x0) ioctl$MDIOCATTACH(0xffffffffffffff9c, 0xc1b46d00, &(0x7f0000000080)={0x5, 0x8, 0x3, &(0x7f0000000000)='./file0\x00', 0x8001, 0xe0, 0xfffffffe, 0x401, 0x72788a94, 0x2, &(0x7f0000000040)='\'}\'^(/\x00', [0xd, 0x8001, 0xffffffff, 0xfffffffa, 0xbdf, 0x0, 0x7a, 0x70, 0x401, 0x2, 0x8, 0x2, 0x8, 0x1ff, 0x9, 0x4, 0xe, 0x7fffffff, 0x9, 0x101, 0x5, 0x7fffffff, 0x3, 0xd, 0xfffffffe, 0x6, 0x8, 0xfcf, 0x4, 0xc, 0x1, 0x0, 0x0, 0x9, 0x5, 0x7, 0xffffffff, 0x2, 0x7fff, 0xaa8b, 0x2, 0x1000000, 0x4, 0x400, 0x263, 0x9f, 0x1a8, 0x22, 0x8, 0x6, 0x7, 0x4eee, 0x9, 0x5, 0x2, 0xb, 0x4, 0x0, 0x1, 0x3, 0x8, 0x8a627f5, 0x1, 0x4, 0x1, 0xe7eb, 0x80, 0x0, 0xf, 0x401, 0x0, 0xff, 0xfffffffd, 0x7fff, 0x5, 0x1, 0xf5d1, 0xfffffffe, 0x7, 0x4, 0x3, 0x6, 0x6, 0x7fffffff, 0x5, 0x4, 0x1, 0x2, 0x5, 0x2, 0xa, 0xa, 0x6, 0x7, 0x101, 0x4]}) bind$inet(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x38000000) r4 = socket(0x2, 0x1, 0x0) connect$inet(r4, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) connect$inet6(r4, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}, 0x1c) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 7.315176687s ago: executing program 1 (id=26): ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x1, 0x0, 0x2000000, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x43b0}, {0x2}, {0x1}, {0x6}, {0x8}], 0x5}) r1 = socket(0x1c, 0x1, 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0xfffffffd, 0x20, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x40, @sival_int=0xfffffff8}}) r2 = vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sigval_int, @spare}) wait4(r2, &(0x7f0000000200), 0x10, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x5, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = dup(r4) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000180)={0x10, 0x12, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4d46b76e, [0x0, 0x400009, 0x3ff]}) syz_emit_ethernet(0x3b8, &(0x7f0000000680)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x382, 0x0, 0x0, @rand_addr="eee21f0000003c00000500004c58053b", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x0, 0x6, '\x00', [@pad1, @ra={0x5, 0x2, 0xcfe}, @enc_lim, @generic={0x3, 0x29, "defcbfd2493d61a279d61ee11e68365c4f4b148566bae4a2c65b92e84483895e1471413fa708f18e0d"}]}, @hopopts={0x2b, 0x66, '\x00', [@generic={0xa, 0x24, "4336d904e3b4734a81099c6ac4c14a1ee2db7aea68a60184063a1827af1f8d2e21fb3995"}, @ra, @generic={0x4, 0xbd, "3b0ddcb4642d4cb82f6f6f2b9e63c2678da83b5cffbad8388d8f394db481ba956851525fac19b219718c7527c48f79fd6ea7bfe7976badc10d74a95edaddc55a86a57bd79d882400f76321010d67dc56e74103d3beb4fb131d954595df7760ed3e8ce1d706a18913f09af6acf8769855549556d83fd0040cc53fb26333bdf4e7293ee23bd6853ea249035b3d73b44af20e46846cecc998014c3b5bad8171acf5a79616308df5da66d0d198c91e71302ab17339974ae5147b5cc8df2868"}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x19, 0x22f, "26983c13857aeb63d1bb37004a3a20fb28ac932c4de272c83c7c972f525b38814cc8b148a4e2191af89015bb3827f51e5683363f16740b97b6386cf36a434b4927bc2981516ca8843ec76d9ee581b2bb84092547826ecdd153fd06fe7b33eab72110dc7391f4c1475d055df491a182f120ad15064ae024575ea637bb0f96cfa61a0aab8daaa15e683d92a09da8a8c65569b97b677f073ba0bbbfa6ca51c4e10ee6c633261682c745c464e5a9b1dd9e6feb8876895ea7aab6c45a349faa8344b757eb5b77e889aeb26267b0717c17befa48d97ea4f781cb122938df374ba19eb6ff1df7a053876f91ffbd3211fb157ef780b8574c922b634730c7be00e2ace7eae470cda6c7b6996da4f1c887db39aa122df24de2bc939896cb7db1882b386d30656c732365e84e7812f2c3eb44ae3c4ec773df26ebdb7c6d94592e6577f373935c7e4ecaafa423f9e91337124a8b624dbd0f8eff75ce78a3ff9975eec0706f395737e70f2cec5cbe2e8ce90a4583732e974ef87fe716043c9c8321d53e8adb83659a72888faf4f589bd7848581584ebcc444538f4ae6af3b1ca1c0ed56d7183580081c3ecf0cb076fdbb797f03df541a5b9a48eebb7ed419a4717d98c322691396af18ef87cc4e699e5cc6e160b8f7ed1532c821d26f2e298afff0d571737adffb55415bfbdfc2cee5e7ecda4b6937e34cdf94588e92135168055ebc25ecaf74a4792fefa1e7c0b91f7097c20ca8ec9a4e172ec28ef1f47ca97b770729243c054fa1a698d4cad91c02b84649897873"}, @ra={0x5, 0x2, 0x4836}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x9}]}], @generic="3ae9"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 5.457149713s ago: executing program 2 (id=137): r0 = socket$inet6(0x1c, 0x3, 0x6) setlogin(0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) r1 = socket(0x1c, 0x1, 0x0) r2 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x102) (async, rerun: 32) r3 = socket(0x26, 0x2, 0x0) (async, rerun: 32) r4 = openat$filemon(0xffffff9c, &(0x7f0000000000), 0x100142, 0x0) ioctl$FILEMON_SET_FD(r4, 0xc0045301, &(0x7f0000000040)=r3) mkdirat(r2, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) (async, rerun: 64) seteuid(0xffffffffffffffff) (async, rerun: 64) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendmsg(r5, &(0x7f0000000340)={&(0x7f0000000180)=@un=@file={0x50, 0x1, '\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00'}, 0x50, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYRESHEX=r2], 0x1c}, 0x0) (async) getsockopt$inet6_sctp_SCTP_ASSOCINFO(r1, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x9, 0x6, 0xb, 0x4, 0x4}, &(0x7f0000000100)=0x14) setsockopt$inet6_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f0000000140)={r6, 0x6}, 0x8) (async, rerun: 64) rename(0x0, 0x0) (async, rerun: 64) setlogin(&(0x7f0000000400)="ef22b3258334f9849c879c7e7c4a436a31bfa49f6adb243b55d5e1e6d438a00b6975264ee75f489d917736d7f0f472f3cf1f337e7b95fda2db619ce43357f8c5f9be170daa286af01a1399e3dbc0fc6bff694d375f06bb573d64bbbf1d1790bb575d00b56ab796d87dd7e6895169bb1f9a03fb510016a21fd061743f9725d1381630de3f52b6c2705e82fdc8ba0111068dfcb15ac95ffe1ff90d97dc84f6f16f182818995157a84f992bfafde68ca0fa307002c801b3160b37a08ea2c77bdd72648c1a0cd64e07e21976c0bdb8738542e0812a5b4eceff6865d9df64136069566a1de3058009e05f067e4a667fd75fac24ca41c9027880") (async) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r7, 0x29, 0x4b, &(0x7f00000001c0)=0xc, 0x4) (async) r8 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_int(r8, 0x29, 0x1b, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x86, &(0x7f0000000000)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "dcffd9", 0x50, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06db3e", 0x0, 0x2b, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @loopback, [@routing={0x2b, 0x2, 0x0, 0x73, 0x0, [@local={0xfe, 0x80, '\x00', 0x0}]}, @hopopts={0x23}]}}}}}}}) (async) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) (async) setsockopt$inet6_int(r0, 0x29, 0x3d, &(0x7f0000000140), 0x4) (async) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) r9 = getpgrp(0x0) ktrace(&(0x7f0000000500)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x4, 0x4000c844, r9) (async) ppoll(&(0x7f0000000240)=[{r7, 0x40}, {r3, 0x40}, {r4, 0x40}, {r4, 0x80}, {r1, 0x140}, {r0, 0x20}], 0x6, &(0x7f0000000280)={0x8, 0x8}, &(0x7f0000000300)={[0xf, 0x1, 0xa, 0x2]}, 0x10) sendto$inet6(r0, 0x0, 0x0, 0x20001, &(0x7f00000000c0)={0x1c, 0x1c, 0x0, 0x52c, @mcast2, 0x4}, 0x1c) 5.455801537s ago: executing program 3 (id=138): ktimer_create(0x4, 0x0, &(0x7f0000000100)=0x0) ktimer_settime(r0, 0x1, &(0x7f0000000180)={{0x0, 0x101}, {0x0, 0x20000002}}, 0x0) r1 = __specialfd$inotify(0x2, 0x0, 0x0) fstatat(r1, &(0x7f0000000040)='./file0\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x200) setresuid(0xee00, r2, 0xffffffffffffffff) r3 = socket(0x26, 0x2, 0x0) setsockopt$sock_int(r3, 0xffff, 0x1002, 0x0, 0x0) setresuid(r2, r2, 0xffffffffffffffff) r4 = msgget$private(0x0, 0x8) setresuid(0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffffffffffffffff8806000108000604000400000000000021000001aaaaaaaaaaaaac1400aa"]) msgsnd(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="03b492cbed8eb89ceed74a50ed8e00000009b6479d5fb667a113e0567e400000000000000066bfa393faa6175ed7465b1293b1e178a8424cc1cdb26dc9b478738e7ca0e9a8ed1310b673456fc99f77657724051f17b822efa0be5b49f1f4109f50494e1dd9fc922c1373c32f0db796cb1f7dd08855f70e6e98d05dc9539a0d578f823424939962d19b67efade3201592124b1bc10497cfc5acf61f22"], 0x4, 0x800) msgctl$IPC_RMID(r4, 0x0) ktimer_settime(r0, 0x1, &(0x7f0000000140)={{0x8001, 0x80006}, {0x80, 0x5}}, &(0x7f0000000000)) sigtimedwait(&(0x7f0000001a80)={[0x6, 0x10000, 0x1, 0x1]}, 0x0, &(0x7f0000001b00)={0xffff84ed, 0x6}) r5 = semget(0x3, 0x2, 0x0) r6 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x7369a0733676a8) preadv(r6, 0x0, 0x0, 0xb) r7 = fork() procctl$PROC_ASLR_CTL(0x2, r7, 0xd, &(0x7f0000000080)=0xffff) __semctl$IPC_RMID(r5, 0x0, 0x0) 5.402889044s ago: executing program 3 (id=139): setsockopt$sock_accept_filter(0xffffffffffffff9c, 0xffff, 0x1000, &(0x7f00000002c0)={'accf_http\x00', "14509c85ff1abeff76fdcdf9b8a2f640dcf2fa34369ef47cece8d7c327b77d722484aba93379b332ac3e21b5fb24f93a04746871180cea5ef0d551f220fe5d28aac9fe03e2bb226919a3673fbab3c32379cecc420434878d2bc49a17b122067bdf10c0b62b5b294aa4a80db8ec7542b0601a05d8c29261edba65e617c291405fa50e09343c855ad3423a9a5f75e0af7892ef0c9cafd2b776122d1e0985525a489d9d785c9c7d0bc62ed21e95a6be04d7701d3cb40f2d57697463bbaeb916797058abb34bf30183ebab3f79713fd3ec685890442973e209235f3cff9d0958b1a070e5be659f73171d05f7961ac4db00ef"}, 0x100) r0 = socket(0x11, 0x10000000000003, 0x8) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f0000000000)=0x20000000, 0x5f) getsockopt$inet_sctp_SCTP_EVENT(r0, 0x84, 0x1e, &(0x7f0000000040)={0x0, 0xe}, &(0x7f0000000080)=0x8) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000200)={r1, 0x0, 0x7f, "48a0ee38fea620ee2793de02027309852a7ada7b7653725109bdb33860a735004b8fec3a776284996920a06b8af529c57563d95508ed3017b93c1e6bffccfeb7f35022d33429ea206dd1d90c2f59b39a19f383c616571785369ba244ac77b1065c1562f1f65200bd4572c4187476c0c51196f3a396287582dd3492d8cd5d25"}, 0x87) syz_emit_ethernet(0x86, &(0x7f00000000c0)=ANY=[@ANYBLOB="8f6f77ede755ffffffffffff86dd605f6ad900503a003bcc3f0600000058132fa13a8be186e3fe8000000000000080e00000000000aa02009078000000386006c33e00002b39eecd41000000000000000000000000aa000000000000000000000000000000013c02007b00000000e1ff0000000000000000ffff7f0000011100000000000000430c082479666db56cf4f933b70889112527b2f6d9d55117e77b590e754e7c5ddf57de2a843c934cc77730713c5ad461be1374692cd5bc96b11e8c2229786b08608d450cfc61e6d7ac6634bcba1af195e96ea019ba3711e69aa5d77d4994d9c0088ecbdf55780896e49dbb6721e83dcc958bfe0ab08f5dab1b800633aa3ad752ecc056c59d8b36703d3faa96b91e1f669432f342586ecbe21d8e941440"]) 5.401470365s ago: executing program 3 (id=140): dup2(0xffffffffffffffff, 0xffffffffffffffff) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_buf(r0, 0x0, 0x69, 0x0, 0x0) r1 = open(&(0x7f0000000200)='./file0\x00', 0x800, 0x2) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x1a38, 0x0) connectat$unix(0xffffffffffffff9c, 0xffffffffffffffff, &(0x7f0000000040)=@file={0xfffffffffffffe44, 0x1, './file0/file0\x00'}, 0xa) r2 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) clock_getres(0x1, &(0x7f0000000040)) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r4 = kqueue() freebsd11_kevent(r4, &(0x7f0000000440)=[{0xff, 0xfffffffffffffff5, 0x8, 0x40, 0x6, 0x71}, {0x21, 0xfffffffffffffff5, 0x4008, 0x20000000, 0x4, 0x6}, {0x20003, 0xffffffffffffffff, 0x0, 0xffffff, 0x10001, 0x7fff}, {0x9, 0xfffffffffffffffd, 0x20, 0x200, 0x5, 0x5}, {0x5, 0xfffffffffffffff3, 0x4020, 0xffffff, 0x8001, 0x7}, {0x4, 0xfffffffffffffffc, 0x3b, 0x0, 0x100, 0x9}, {0x10006, 0xfffffffffffffffc, 0x8a, 0x1, 0xffffffef, 0xf}], 0x7, 0x0, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000500)=[{0x1, 0xfffffffffffffffa, 0x31, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) flock(r1, 0xa) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x53, &(0x7f00000000c0)={0xfffffffd, {{0x1c, 0x1c, 0x0, 0x4, @remote={0xfe, 0x80, '\x00', 0x0}, 0xffffd}}, {{0x1c, 0x1c, 0x0, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) aio_write(&(0x7f0000000240)={r3, 0x80001001, &(0x7f00000001c0)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x20, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x4, @sival_ptr=0x7, @spare=[0x6, 0x6a, 0x7, 0x9, 0x1, 0x6, 0x8000]}}) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x3, 0x20011, 0xffffffffffffffff, 0x60000000) mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1) r5 = socket$inet(0x2, 0x4, 0xc0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) undelete(&(0x7f0000000000)='./file0/file0\x00') bind$inet(r5, &(0x7f0000000040)={0x10, 0x2, 0x3, @remote={0xac, 0x14, 0x0}}, 0x10) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x5, 0x1010, 0xffffffffffffffff, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x110206, 0x71) setuid(0xee01) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f0000000900)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"\xa8$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xf7Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00}\xef\x05\xea\x93\xceC\xa2\x80\xca\xafbM\xf7\xd4\xf0L\xc9~\xe5\xf6\xe7\x923\xf9\x05v\xf3\xf0\xf1\x13\x9f\x03\xb0\xd9|*?\xdf\xcdA\x9d\x00\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) 5.362909485s ago: executing program 2 (id=141): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r1 = fork() r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$setown(r2, 0x6, r1) setpgid(r1, r1) r3 = getppid() r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ioctl$SMB_READB(r4, 0x801c697b, &(0x7f00000000c0)={0x0, 0x0, 0x0, @word=0x6, @buf="de32", 0x0, 0x0, 0x0, 0x0}) open(&(0x7f0000000180)='./file0\x00', 0x200, 0x5a) setpgid(0x0, r3) aio_write(&(0x7f0000000340)={r0, 0x80000001, &(0x7f0000000300)="e2", 0x1, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x5, 0x7, 0x0}, {0x0, 0x0, @sival_int, @spare=[0x9, 0x9, 0xf, 0x2, 0x100000000, 0xd24, 0x10000, 0x6b]}}) r5 = open(&(0x7f0000000480)='./file0\x00', 0x400, 0x102) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r5, 0x0) getresuid(&(0x7f0000000040), &(0x7f00000000c0), &(0x7f0000000100)) mount(&(0x7f0000000080)='ufs\x00', &(0x7f0000000140)='./file0\x00', 0x40, &(0x7f0000000100)) 5.309914453s ago: executing program 2 (id=142): socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x400, 0x0, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) r1 = openat$md(0xffffff9c, &(0x7f0000000040), 0x80000, 0x0) setrlimit(0x9, &(0x7f0000000300)={0x401, 0x401}) socket(0x11, 0x3, 0x0) ioctl$MDIOCATTACH(r1, 0xc1b46d01, &(0x7f00000012c0)={0x0, 0x0, 0x2, 0x0, 0x800, 0x8, 0x20000b, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x200, 0x0, 0xe, 0xfffffffc, 0x0, 0x3, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffff, 0xfffffffd, 0x0, 0x6, 0x2000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, 0x0, 0x3, 0x4, 0xfffffffc, 0x0, 0x0, 0xfffffff9, 0x368, 0xe, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x2]}) (async) ioctl$MDIOCATTACH(r1, 0xc1b46d01, &(0x7f00000012c0)={0x0, 0x0, 0x2, 0x0, 0x800, 0x8, 0x20000b, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x5, 0x0, 0x2, 0x0, 0x200, 0x0, 0xe, 0xfffffffc, 0x0, 0x3, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffff, 0xfffffffd, 0x0, 0x6, 0x2000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0x8, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x1, 0x0, 0x3, 0x4, 0xfffffffc, 0x0, 0x0, 0xfffffff9, 0x368, 0xe, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0xfffffff9, 0x0, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x2]}) syz_emit_ethernet(0x66, &(0x7f0000000140)={@random="c3b58b132350", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "000100", 0x30, 0x3a, 0x0, @rand_addr="f6ec06afdf466c130afc590bdb9e4ff6", @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x4, 0x0, 0xe, '\x00', {0x0, 0x6, "8f79f7", 0x0, 0x6, 0x0, @mcast1, @rand_addr="dfa7f5ff3bcb22ddb457a19444d9d6f6"}}}}}}}) (async) syz_emit_ethernet(0x66, &(0x7f0000000140)={@random="c3b58b132350", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "000100", 0x30, 0x3a, 0x0, @rand_addr="f6ec06afdf466c130afc590bdb9e4ff6", @mcast2, {[], @icmpv6=@dest_unreach={0x1, 0x4, 0x0, 0xe, '\x00', {0x0, 0x6, "8f79f7", 0x0, 0x6, 0x0, @mcast1, @rand_addr="dfa7f5ff3bcb22ddb457a19444d9d6f6"}}}}}}}) r2 = socket$inet_tcp(0x2, 0x1, 0x0) listen(r2, 0x0) setsockopt$sock_int(r2, 0xffff, 0x1002, &(0x7f0000000200)=0x1008, 0x4) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) kqueue() (async) r4 = kqueue() recvmsg(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/42, 0x2a}, {&(0x7f0000000280)=""/48, 0x30}], 0x2, &(0x7f0000001c40)=""/4096, 0x1000}, 0x40043) (async) recvmsg(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/42, 0x2a}, {&(0x7f0000000280)=""/48, 0x30}], 0x2, &(0x7f0000001c40)=""/4096, 0x1000}, 0x40043) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) freebsd11_fstatfs(r5, &(0x7f0000000080)) r6 = socket$unix(0x1, 0x5, 0x0) listen(r6, 0x2) (async) listen(r6, 0x2) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) unmount(&(0x7f0000000200)='./file1\x00', 0x0) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0xd, &(0x7f0000000080)={0x1007ff, {{0x1c, 0x1c, 0x2, 0x0, @rand_addr="65cbb6bf060000000b603666ab2f3df4", 0x7f}}, {{0x1c, 0x1c, 0x1, 0x0, @mcast2}}}, 0xfc) (async) setsockopt$inet6_group_source_req(r7, 0x29, 0xd, &(0x7f0000000080)={0x1007ff, {{0x1c, 0x1c, 0x2, 0x0, @rand_addr="65cbb6bf060000000b603666ab2f3df4", 0x7f}}, {{0x1c, 0x1c, 0x1, 0x0, @mcast2}}}, 0xfc) kevent(r4, &(0x7f0000000380)=[{0x4, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, [0x0, 0x1, 0x0, 0x3]}], 0x1, 0x0, 0xc00, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) (async) socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000001000)) (async) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xa, 0x0, &(0x7f0000001000)) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) 4.985618287s ago: executing program 1 (id=26): ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x1, 0x0, 0x2000000, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x43b0}, {0x2}, {0x1}, {0x6}, {0x8}], 0x5}) r1 = socket(0x1c, 0x1, 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0xfffffffd, 0x20, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x40, @sival_int=0xfffffff8}}) r2 = vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sigval_int, @spare}) wait4(r2, &(0x7f0000000200), 0x10, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x5, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = dup(r4) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000180)={0x10, 0x12, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4d46b76e, [0x0, 0x400009, 0x3ff]}) syz_emit_ethernet(0x3b8, &(0x7f0000000680)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x382, 0x0, 0x0, @rand_addr="eee21f0000003c00000500004c58053b", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x0, 0x6, '\x00', [@pad1, @ra={0x5, 0x2, 0xcfe}, @enc_lim, @generic={0x3, 0x29, "defcbfd2493d61a279d61ee11e68365c4f4b148566bae4a2c65b92e84483895e1471413fa708f18e0d"}]}, @hopopts={0x2b, 0x66, '\x00', [@generic={0xa, 0x24, "4336d904e3b4734a81099c6ac4c14a1ee2db7aea68a60184063a1827af1f8d2e21fb3995"}, @ra, @generic={0x4, 0xbd, "3b0ddcb4642d4cb82f6f6f2b9e63c2678da83b5cffbad8388d8f394db481ba956851525fac19b219718c7527c48f79fd6ea7bfe7976badc10d74a95edaddc55a86a57bd79d882400f76321010d67dc56e74103d3beb4fb131d954595df7760ed3e8ce1d706a18913f09af6acf8769855549556d83fd0040cc53fb26333bdf4e7293ee23bd6853ea249035b3d73b44af20e46846cecc998014c3b5bad8171acf5a79616308df5da66d0d198c91e71302ab17339974ae5147b5cc8df2868"}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x19, 0x22f, "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"}, @ra={0x5, 0x2, 0x4836}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x9}]}], @generic="3ae9"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 4.942427115s ago: executing program 2 (id=144): r0 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r1 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='.\x00', 0x21000630) r2 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r3 = __specialfd$inotify(0x2, &(0x7f0000000300), 0x4) write(0xffffffffffffffff, &(0x7f0000000100)="b9", 0x1) openat$md(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) link(&(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='./file0\x00') inotify_add_watch_at(r3, r2, &(0x7f0000000280)='.\x00', 0x21000630) rfork(0x85000) 3.000311825s ago: executing program 2 (id=146): mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x2010, 0xffffffffffffffff, 0x0) fork() openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) socket(0x2, 0x1, 0x0) __semctl$GETNCNT(0x0, 0x4, 0x3) openat$md(0xffffff9c, 0x0, 0x8, 0x0) setuid(0xffffffffffffffff) r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff08004700003800002dc66531b7091a0900bbffffffff9406000000054402050290787f0000014525000900660009bd2500057f000001040000000000004323d833"]) setsockopt$inet6_tcp_buf(r0, 0x6, 0x24, &(0x7f0000000240)="36bed52bdf41e775352884add0bc05097be32710e6426c4dfc12af2503c72c1ab56772e54f49f11c2841de70e36250", 0x2f) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r1, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) mmap(&(0x7f00002ec000/0x4000)=nil, 0x4000, 0x2, 0x1010, 0xffffffffffffffff, 0x0) sendto(r2, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) r3 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_opts(r3, 0x0, 0x64, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0x8, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, 0x0) setresgid(0xee00, 0xee01, 0x0) setresgid(0x0, 0xee01, 0x0) kqueue() ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x10000, &(0x7f00000004c0), 0x0, &(0x7f0000000040), &(0x7f0000000240)}) r5 = socket(0x1c, 0x1, 0x0) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) r6 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) copy_file_range(r6, 0x0, r6, &(0x7f0000000180)=0xaa480, 0x3ff, 0x0) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 2.999026573s ago: executing program 3 (id=147): syz_emit_ethernet(0x6e, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086ddd800a2182ab760a3cdba00383a00fe8000000000000000000000000000aaff0200000000000000000000000000010200907800000004616bb851ffff2cff000000000000002d0000000000000001000000000000002d0000000000000001e49189298059121a"]) syz_emit_ethernet(0xe6, &(0x7f0000000740)=ANY=[]) r0 = socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001080)={0x3, 0x990}) socket$inet_sctp(0x2, 0x1, 0x84) ioctl$KDGETMODE(r0, 0x40046676, 0x7) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xb}, 0x24) syz_emit_ethernet(0x46, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaa0600aaaaaaaaaaaabb86dd600200000010000000000000000000000100000000000000fe8000000000020000000000000000aa000000000000000000000000000000f6"]) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x2000000, 0x0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) r3 = kqueue() kevent(r3, &(0x7f0000000380)=[{0x4, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, [0x0, 0x1, 0x0, 0x3]}], 0x1, 0x0, 0xc00, 0x0) extattr_set_fd(r2, 0x1, &(0x7f0000000040)=':$&{\x00', 0x0, 0x0) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg(r4, 0x0, 0x81) freebsd10_pipe(&(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x80, 0x27) aio_write(0x0) truncate(0x0, 0x100000) r5 = kqueue() r6 = openat$crypto(0xffffffffffffff9c, 0x0, 0x82, 0x0) ioctl$CIOCGSESSION2(r6, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0xfdf9ff88, [0x0, 0x0, 0x20000, 0x9087]}) fspacectl(r5, 0x1, &(0x7f0000000100)={0x5, 0xffffffff}, 0x0, &(0x7f0000000140)) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x10000000, 0x40) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) clock_settime(0x0, 0x0) socket$unix(0x1, 0x2, 0x0) 2.712779869s ago: executing program 0 (id=149): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getgroups(0x3, &(0x7f00000001c0)=[0x0, 0xffffffffffffffff, 0x0]) setregid(0xffffffffffffffff, r1) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000200)={0x10, 0x0, 0x8, &(0x7f0000000140)="ec7b00000900ff24", 0x0, 0x0, 0x0, 0xfdffff05, [0x0, 0x0, 0x0, 0x8]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x10000, &(0x7f0000000140), 0x0, 0x0, 0x0}) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) setgid(r1) fstatat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f00000002c0), 0x200) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000040)={0xb, 0x0, 0x11, &(0x7f0000000080)="ec34072300000000000000000000ff0000", 0x0, 0x0, 0x3, 0xfdffff05, [0x1, 0x0, 0x0, 0x80]}) aio_read(&(0x7f0000000140)={r2, 0x0, &(0x7f0000000000)="f35bc973ee2cd8ee04d18bd6c4c41934ccfa5e2063ced2c16f54e0741c6ee8d0c9", 0x21, [0x3, 0xb], 0x1, 0x98b44701027422ee, 0x1, {0xd, 0x1, &(0x7f0000000100)="76a2d8a130cafa180a6b"}, {0x3, 0x11, @sival_ptr=0x7, @ke_flags=0x25}}) 2.711135757s ago: executing program 0 (id=150): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) aio_write(&(0x7f00000000c0)={r0, 0x6, &(0x7f0000000000)="24ee210a346ade2f289c262ec1", 0xd, [0x77797059, 0x8], 0x31, 0xa, 0x2, {0x4, 0x2, &(0x7f0000000040)="35debbea10e918bd341267b1a68f0cac0ca47cc7d9db668742a95756e91457cb0061f2d5a48565dd76a432babbd6e12188a53d581225927797b321a0212308cbf5a89f5e05e76deeac929061ec5ad7d544b1cf7a278f261f40e60def"}, {0x2, 0x12, @sigval_ptr=0x1ff, @spare=[0x7, 0xa, 0x5b441a82, 0x2, 0x7, 0xc, 0x1, 0x7fffffff]}}) (async) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x7) (async) bind(r0, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0x0, 0xfffffffb, @mcast2, 0xd}, 0x1c) (async) openat$crypto(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) (async) sysarch$I386_SET_LDT(0x1, &(0x7f0000000200)={0x1, &(0x7f00000001c0)=[{0x4}, {0x100000000}], 0x2}) (async) shmget(0x1, 0xa000, 0x0, &(0x7f0000ff3000/0xa000)=nil) r1 = accept4(r0, &(0x7f0000000240)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @empty}, &(0x7f0000000280)=0x1c, 0x10000000) setsockopt$bt_l2cap(r1, 0x1609, 0x3, &(0x7f00000002c0)=0x6, 0x4) r2 = openat$smbus(0xffffff9c, &(0x7f0000000300), 0x1, 0x0) ioctl$SMB_SENDB(r2, 0x801c6903, &(0x7f00000003c0)={0xc, 0x6, 0x6, @word=0x5, @byte=0x6, 0xfffffffb, &(0x7f0000000340)=0x5, 0x1, &(0x7f0000000380)=0x2, 0x1}) (async) r3 = socket(0x1c, 0x20000000, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x33, &(0x7f0000000400)={0x27, 0xa, 0x0, 0x5, 0x0, [@ipv4, @ipv4={'\x00', '\xff\xff', @rand_addr=0x8}, @empty, @mcast1, @empty]}, 0x58) (async) r4 = dup2(r1, r0) ioctl$KDGETMODE(r4, 0x40044b09, 0x3) (async) r5 = socket$inet_sctp(0x2, 0x5, 0x84) (async) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x21, &(0x7f0000000480)={0x800, 0x1010, 0x5e5e, 0x2, 0x0}, &(0x7f00000004c0)=0x10) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x901, &(0x7f0000000500)={r6, 0x4, 0x1, [0x5]}, &(0x7f0000000540)=0xa) (async) bind$inet6(r0, &(0x7f0000000580)={0x1c, 0x1c, 0x1, 0xfffeffff, @empty, 0xffff}, 0x1c) (async) getsockopt$inet_sctp_SCTP_REUSE_PORT(r1, 0x84, 0x1c, &(0x7f00000005c0), &(0x7f0000000600)=0x4) (async) sysarch$I386_GET_LDT(0x0, &(0x7f0000000680)={0x0, &(0x7f0000000640)=[{0xb0}, {0x3}, {0x8}], 0x3}) (async) getsockopt$inet6_udp(r4, 0x11, 0x1, &(0x7f00000006c0), &(0x7f0000000700)=0x4) ioctl$KDGETMODE(r4, 0x40044b09, 0x3) (async) fcntl$setflags(r0, 0x2, 0x0) (async) fchdir(r2) socket$inet_udplite(0x2, 0x2, 0x88) (async) socket(0x1c, 0x1, 0x3) (async) sysarch$I386_GET_LDT(0x0, &(0x7f0000000780)={0x0, &(0x7f0000000740)=[{0x6}, {0xc7}, {0x7}, {0xe00000000000000}, {}, {0x5}], 0x6}) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r1, 0x84, 0x903, &(0x7f00000007c0)={r7, 0x9, 0x40}, 0x8) (async) ioctl$DIOCCHANGERULE(r4, 0xcb7c441a, &(0x7f0000000800)="b6a9f669a91e92e44175c9a89e8c0249d59d7ddd063f78c20f6c1e259ab6599b4a6def31c30c2474bfb15cff765d2f78cdd8c98d17516254f06bc57500e947c60885cbcd2bf1f30a2b5a6484d0a1ef926f9602e1dd9b3863ad859e5ad1") 2.602719421s ago: executing program 0 (id=151): socket(0x1c, 0x1, 0x0) (async) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) (async) r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x1fd, @mcast2, 0x401}, 0x7e) listen(r0, 0x6) (async) listen(r0, 0x6) socketpair(0x1, 0x5, 0x0, &(0x7f0000000780)) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000180)=[{0x9, 0xfffffffffffffff9, 0xb, 0x80000000, 0xe8c1, 0x9, [0xfffffffffffffffe, 0x0, 0x0, 0x400000000000104]}, {0x8, 0x9, 0x90, 0x2, 0x8e, 0xfffffffe, [0x3, 0xad1, 0x9, 0xfffdfffffffff43a]}, {0x401, 0xfffffffffffffffd, 0x8090, 0x2, 0x6, 0x8, [0x71, 0x2, 0x462, 0x20000000000008]}, {0x1, 0xfffffffffffffffe, 0x90, 0x20, 0x101, 0x3ff, [0x40, 0x7ff, 0x5, 0x6]}], 0x4, 0x0, 0x0, 0x0) setgroups(0x0, 0x0) (async) setgroups(0x0, 0x0) syz_emit_ethernet(0x5e, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd6000000000280000fe8000000000000000000000000000aaff020000000000000000000000000001890085fc7a2bbe1ee345907800000000ff020000000000000000000000000001ff01000000000000"]) open(&(0x7f00000002c0)='./file0/file0\x00', 0x2, 0x119) r2 = openat$bpf(0xffffff9c, 0x0, 0x4, 0x0) ioctl$BIOCLOCK(r2, 0x2000427a) ioctl$BIOCLOCK(r2, 0x2000427a) (async) ioctl$BIOCLOCK(r2, 0x2000427a) r3 = socket$inet6(0x1c, 0x2, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_buf(r3, 0x6, 0x25, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xe, 0x0, 0x0) getsockname(r3, 0x0, 0x0) (async) getsockname(r3, 0x0, 0x0) setsockopt$sock_accept_filter(0xffffffffffffffff, 0xffff, 0x1000, &(0x7f0000000080)={'accf_http\x00', "90cb54647f06bc248b79e84dba7c7ba0c9adf843a2d1c2df5210000000000051ffa152a7ee7423040a00000aa0f079ffffefff002f86a3a3a2544f566e177f816fd151caca04000000d66d755bd5e56aeca85c427b829a4a9b39209eafae79ae0a079a432c3eb62cbeb96c47c6008a67dfd1f1eeb87a2b481c05b51c04d03302dafbd9f712fd75fca178c8e003daea15de9170187d8e0ec6382fc4ca1a395691836f81322badfa542e7209c394b31341dc058520f8f343e93efc8ed27672524aa48d2c2d16047149cf40e65479466fdfd400"}, 0x100) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mount(&(0x7f0000000080)='cd9660\x00', 0x0, 0x80000, 0x0) (async) mount(&(0x7f0000000080)='cd9660\x00', 0x0, 0x80000, 0x0) cpuset_getaffinity(0x3, 0x3, 0xc, 0x0, 0x0) (async) cpuset_getaffinity(0x3, 0x3, 0xc, 0x0, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x4074, 0x0) (async) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x4074, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x110206, 0x0) (async) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0x110206, 0x0) fcntl$lock(r4, 0x16, &(0x7f0000001d00)={0x570, 0x0, 0x40000000}) setresuid(0xffffffffffffffff, 0xee01, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) syz_emit_ethernet(0x2a, &(0x7f0000000180)=ANY=[]) 2.552694048s ago: executing program 0 (id=152): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r1 = socket(0x1c, 0x3, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) listen(r1, 0x4) accept(r1, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) connect$inet(r2, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) rfork(0x3000) aio_write(&(0x7f0000000240)={r0, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sigval_ptr=0x1}}) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x4) shmget(0x0, 0x2000, 0x80, &(0x7f00001df000/0x2000)=nil) freebsd11_stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) getegid() r4 = getuid() setuid(r4) freebsd11_stat(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)) r5 = socket(0x2, 0x2, 0x0) fcntl$setstatus(r5, 0x4, 0x4d523ac07cc2cfe4) r6 = getpgrp(0x0) r7 = socket(0x1c, 0x1, 0x0) r8 = socket(0x1c, 0x1, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r8, 0x84, 0x105, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r8, 0x84, 0x15, &(0x7f0000000100)={r9, 0x3}, &(0x7f0000000140)=0x8) getsockopt$inet6_sctp_SCTP_PR_SUPPORTED(r7, 0x84, 0x26, &(0x7f00000001c0)={r9, 0xf}, &(0x7f0000000200)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000340)={r9, 0xfffffff9}, 0x8) fcntl$setown(r5, 0x6, r6) fcntl$getown(r0, 0x5) r10 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r10, 0xc030636a, &(0x7f00000002c0)={0x1f, 0x25, 0x10, &(0x7f0000000140)="ec7b000009060000000000000051be2d", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x3ff80000, 0x4]}) ioctl$CIOCCRYPT(r10, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x8, 0x401, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000001c0)}) 2.547524698s ago: executing program 0 (id=153): open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) truncate(&(0x7f0000000040)='./file0\x00', 0xb) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x11a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x0) rfork(0x85000) fcntl$lock(r2, 0x13, 0x0) r3 = fcntl$dupfd(r1, 0x0, r1) sendfile(r0, r3, 0x0, 0x400000000000, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0, 0x0) execve(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000080)=')\xac!#\x00'], 0x0) 2.494541485s ago: executing program 1 (id=26): ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x1, 0x0, 0x2000000, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x43b0}, {0x2}, {0x1}, {0x6}, {0x8}], 0x5}) r1 = socket(0x1c, 0x1, 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0xfffffffd, 0x20, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x40, @sival_int=0xfffffff8}}) r2 = vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sigval_int, @spare}) wait4(r2, &(0x7f0000000200), 0x10, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x5, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = dup(r4) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000180)={0x10, 0x12, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4d46b76e, [0x0, 0x400009, 0x3ff]}) syz_emit_ethernet(0x3b8, &(0x7f0000000680)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x382, 0x0, 0x0, @rand_addr="eee21f0000003c00000500004c58053b", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x0, 0x6, '\x00', [@pad1, @ra={0x5, 0x2, 0xcfe}, @enc_lim, @generic={0x3, 0x29, "defcbfd2493d61a279d61ee11e68365c4f4b148566bae4a2c65b92e84483895e1471413fa708f18e0d"}]}, @hopopts={0x2b, 0x66, '\x00', [@generic={0xa, 0x24, "4336d904e3b4734a81099c6ac4c14a1ee2db7aea68a60184063a1827af1f8d2e21fb3995"}, @ra, @generic={0x4, 0xbd, "3b0ddcb4642d4cb82f6f6f2b9e63c2678da83b5cffbad8388d8f394db481ba956851525fac19b219718c7527c48f79fd6ea7bfe7976badc10d74a95edaddc55a86a57bd79d882400f76321010d67dc56e74103d3beb4fb131d954595df7760ed3e8ce1d706a18913f09af6acf8769855549556d83fd0040cc53fb26333bdf4e7293ee23bd6853ea249035b3d73b44af20e46846cecc998014c3b5bad8171acf5a79616308df5da66d0d198c91e71302ab17339974ae5147b5cc8df2868"}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x19, 0x22f, "26983c13857aeb63d1bb37004a3a20fb28ac932c4de272c83c7c972f525b38814cc8b148a4e2191af89015bb3827f51e5683363f16740b97b6386cf36a434b4927bc2981516ca8843ec76d9ee581b2bb84092547826ecdd153fd06fe7b33eab72110dc7391f4c1475d055df491a182f120ad15064ae024575ea637bb0f96cfa61a0aab8daaa15e683d92a09da8a8c65569b97b677f073ba0bbbfa6ca51c4e10ee6c633261682c745c464e5a9b1dd9e6feb8876895ea7aab6c45a349faa8344b757eb5b77e889aeb26267b0717c17befa48d97ea4f781cb122938df374ba19eb6ff1df7a053876f91ffbd3211fb157ef780b8574c922b634730c7be00e2ace7eae470cda6c7b6996da4f1c887db39aa122df24de2bc939896cb7db1882b386d30656c732365e84e7812f2c3eb44ae3c4ec773df26ebdb7c6d94592e6577f373935c7e4ecaafa423f9e91337124a8b624dbd0f8eff75ce78a3ff9975eec0706f395737e70f2cec5cbe2e8ce90a4583732e974ef87fe716043c9c8321d53e8adb83659a72888faf4f589bd7848581584ebcc444538f4ae6af3b1ca1c0ed56d7183580081c3ecf0cb076fdbb797f03df541a5b9a48eebb7ed419a4717d98c322691396af18ef87cc4e699e5cc6e160b8f7ed1532c821d26f2e298afff0d571737adffb55415bfbdfc2cee5e7ecda4b6937e34cdf94588e92135168055ebc25ecaf74a4792fefa1e7c0b91f7097c20ca8ec9a4e172ec28ef1f47ca97b770729243c054fa1a698d4cad91c02b84649897873"}, @ra={0x5, 0x2, 0x4836}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x9}]}], @generic="3ae9"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 348.203375ms ago: executing program 0 (id=154): r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x8, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x7fff, 0x0, 0x1fffffc, 0x0, 0x3, 0x0, 0x3, 0x0, 0x6, 0x0, 0x7b, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0xff, 0x0, 0xdef9, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x2, 0x8, 0xfffffffd, 0x1, 0x0, 0x3, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0xfffffffe, 0x1003, 0x0, 0x0, 0x4003, 0x0, 0x20003, 0x0, 0x0, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x1000, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r1, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setsockopt$inet6_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) setsockopt$inet6_tcp_int(r1, 0x6, 0x48, &(0x7f0000000040)=0x40000402, 0x4) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0xc085, 0x80000000, 0x0, 0x10002, [0x0, 0x0, 0xf1]}, {0x0, 0xfffffffffffffffe, 0x91, 0x2, 0x0, 0x10, [0x8]}], 0x2, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) ioctl$CIOCGSESSION2(r6, 0xc030636a, &(0x7f00000000c0)={0x10, 0x24, 0x1, &(0x7f0000000340)="14", 0x0, 0x0, 0x0, 0x4d46b770, [0x0, 0x7, 0x3ff, 0x7]}) dup2(r5, r4) recvmsg(r4, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x80) fcntl$getown(r0, 0x5) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 347.076845ms ago: executing program 2 (id=155): r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x8, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x3, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x1, 0x0, 0xf, 0xfffffffc, 0xeaea, 0x3, 0x4, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x2, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x4000001, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x21, 0x0, 0x2000000, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x9, 0x8000, 0x6, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0x8000000, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x10, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x0, 0x1ccb, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r2, 0x0, 0x20000) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) copy_file_range(r4, 0x0, r4, 0x0, 0xfffffffffffffffe, 0x0) extattr_delete_link(0x0, 0x1, 0x0) r5 = socket(0x1c, 0x1, 0x0) recvfrom(r3, &(0x7f0000000380)=""/174, 0xae, 0x80, &(0x7f0000000080)=@in={0x10, 0x2, 0x1, @local={0xac, 0x14, 0x0}}, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) bindat$unix(0xffffffffffffff9c, r6, &(0x7f0000000240)=@file={0x3e, 0x1, './file0\x00'}, 0xa) undelete(&(0x7f0000001a40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setsockopt$inet6_buf(r5, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setsockopt$inet6_tcp_buf(r1, 0x6, 0x24, &(0x7f0000000080), 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x22, &(0x7f0000000040)=0x4, 0x4) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x740) extattr_set_link(&(0x7f0000000140)='./file0\x00', 0x1, &(0x7f00000006c0)='\x90\xcf\xa3\xc3\x18\xc3\x12\x852\x0e\xd0?\x03\xde\x99+\x00-=\\&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xf8\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\x10O\xe9de\x93\xe7\xfe\xc8p^`\xca\xff\xbf\xe2HW\xdbk\xf7aFs\xdc\xf9$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xd6\xcat\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1:\x81Q\xc0\xfb\x0f\xc8\b\xa2\xecq\x94\xcf&\xd4\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8', 0x0, 0xfffffffffffffe16) r8 = freebsd12_shm_open(0x0, 0x200, 0x74) r9 = accept4$unix(r8, &(0x7f0000000280)=@file={0x56, 0x0, ""/84}, &(0x7f0000000000)=0x56, 0xa58476621646f3e7) bindat$unix(r7, r9, &(0x7f0000000a00)=@file={0xffc, 0x1, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}, 0xffc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r10 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x46, &(0x7f00000001c0)=ANY=[@ANYBLOB="ffffffffffff0000000000000800450000380068000000019078ac1400bbe00000010c009078000000004500fffc0000000000110000e00000010000ef1bb0539d6cdafafec4"]) ioctl$KDGETMODE(r10, 0x40046676, 0x22e00000) 344.710076ms ago: executing program 3 (id=156): unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x48000101) fork() setfib(0xffffff00) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sigprocmask(0x2, &(0x7f0000000000)={[0x4000000f, 0x1, 0x7, 0x9]}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) r0 = open$dir(&(0x7f0000000300)='./file0\x00', 0x200, 0x0) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f0000000080)={0x3, &(0x7f0000000140)=[{0x4, 0x8, 0x0, 0x333}, {0x7, 0x0, 0x6, 0x20000001}, {0xfffe, 0x9, 0x6, 0x1}]}) fcntl$lock(r0, 0xc, &(0x7f0000000140)={0x1, 0x1, 0x0, 0x6}) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) select(0x40, &(0x7f0000001940)={0x9, 0x2, 0x82, 0xeff, 0x2, 0x4, 0x5, 0x9}, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x26, 0x2, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x2, 0x0) r3 = socket$inet6(0x1c, 0x2, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x6000, 0x1) extattr_get_file(&(0x7f0000004440)='./file0\x00', 0x3, &(0x7f0000004480)='[)\x00', 0x0, 0x0) sendmsg$inet6_sctp(r3, &(0x7f00000001c0)={&(0x7f0000000180)=@in6={0x1c, 0x1c, 0x3, 0x3, @loopback, 0x99f}, 0x1c, 0x0, 0x0, &(0x7f0000001980)=ANY=[@ANYRESHEX=r2, @ANYRES64=r3], 0x14}, 0x20105) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x1, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0xfff, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x9, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x0, 0x8, 0xc, 0x8]}, {0x4005c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0x0, 0x4, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x7f33c58a, 0x2, 0x58, 0x2, 0xff, 0xfffffeff, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x8000009, 0x6, 0xc95, 0x6, 0x8, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x5, 0x0, 0xff8, 0x9, 0x1, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x13, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x5, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x3, 0x6, 0x6, 0x2, 0x800, 0x7f, 0xff, 0x6, 0x7, 0x3, 0xe, 0x201, 0xdd, 0x2, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x342d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x95, 0x3d104cc0, 0x52, 0x8, 0x1, 0x7, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x6, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0xffffffe2, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1ff, 0x2, 0x9, 0x9, 0x39]}, {0x43, [0x7, 0x0, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xae1, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x800, 0x4f124442, 0x7, 0x0, 0x2, 0x3, 0x190, 0x5, 0x8, 0x1, 0x800, 0x9, 0x9, 0x3, 0x20000007, 0x5, 0x7, 0x8, 0xb, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x200009, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0x10ebf, 0x100, 0x3, 0x6, 0x8, 0x2, 0x0, 0x6, 0x6, 0x8, 0x1, 0x0, 0x5, 0x1d90, 0x2, 0x4, 0x3b, 0x3, 0x42, 0x225, 0x81, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x25, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x1, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0x3, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0x10000, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x10000007]}, {0x3, [0x7, 0x2, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x6, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0x8, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x2008, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xffffdffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc00, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x12, 0x4ab464c, 0x5, 0x0, 0x10, 0x82, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x8, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x2, 0xc, 0x9, 0x263, 0xabd4, 0x3, 0x2, 0xa, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0xfe, 0x4, 0xfffffff8, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x3, 0x3, 0x5, 0x8, 0x1, 0x7, 0x52, 0x3, 0x80, 0xe5, 0x401, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xfffffff8, 0x4, 0x8001, 0x1, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc8, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x1, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x400000, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x95e, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x402, 0x5, 0xfffffffc, 0x0, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x9, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7b, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x7, 0x81, 0x8, 0x2, 0x4, 0x6, 0x2, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x1360004, 0x8, 0x40001ff, 0x7ff, 0xa, 0x0, 0xfffffffd, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x4, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x41a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xdc]}, {0x6, [0x3, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x5, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x5, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x3, 0x4, 0x5, 0xeff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc4, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xffffffff, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x1, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0x12, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xffff7ffe, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0x1000, 0x9, 0x6, 0x40, 0x1, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x80, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x3, 0x0, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xffffffff, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x43, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xf8b5, 0x4, 0x9, 0xf, 0x2ab, 0x4, 0x4]}, {0x0, [0x4, 0x400, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10001, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf731, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x204, 0x14, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x1000008, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x4, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x9d8b, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x6, 0x6, 0x0, 0x7, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x401, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x6, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0x8, 0xb0, 0x1000, 0x8, 0xfff, 0x8008, 0x6, 0xc, 0x4a, 0x9, 0x71, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x4, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0xe0, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x1, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0xc, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x5, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x3, 0x3fd, 0x3, 0x8, 0x3, 0x7, 0xf2, 0x1add, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0xb, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0x10001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x6, 0x7, 0x6, 0x54, 0x9, 0x0, 0x3]}]}) ioctl$DIOCCHANGERULE(r4, 0xcbe0441a, &(0x7f0000000040)) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) freebsd11_stat(&(0x7f0000000740)='./file0\x00', &(0x7f00000006c0)) cpuset_getid(0x1, 0x2, 0xffff, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_timeval(r5, 0xffff, 0x1006, &(0x7f0000000600)={0x7}, 0x10) fstatfs(r3, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) setuid(r6) getsockopt$sock_timeval(r5, 0xffff, 0x1006, &(0x7f0000000b00), &(0x7f0000000b40)=0x18) sendmsg$inet6_sctp(r2, &(0x7f00000005c0)={&(0x7f0000000040)=@in={0x10, 0x2, 0x1, @loopback}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000240)="c9976eb407bfc9ecdcba7b36afcf76cce5e3c5066b49bd18741672585d2554c7e4375829f40d3c08be7b09bed02defb395df837e82d896fb2a55f29c0f554a4bb8379a02351e7768b4fdf896166e6a4c609968f1592caab21f9ddefd0f71486937c00962cc5a65d841aa36dc3de6b20448e030e2af4b6f34f1e1cb3ef35c03b8cd39777802c1e7a70eacc6a7318f0b78aff7418732e82c827fdc295c4f4d5e2570d97da9f8e7abf181808a413a580783124c80cc515902ff2c128e6ff6de59c7e7946800b5be3fb0d3a38bace6839ee10c15d148e6c39ab28fdf7be3053d861c2715", 0xe2}, {&(0x7f0000000340)="b978beaeea1cbd80c33bc751babf3f0a6a360404af0f4d9ec1d00f3357efcc8f7127ff7425875877ed54cbe6ff7f02a27e0997e73b537f8007f0754fbca06cbb9097edf990979114", 0x48}, {&(0x7f00000003c0)="1a417ed7d0d8421ea38363503294db46aa689b48a20dcc44cf560123417f3df5503b2fc167f770002c0b23", 0x2b}, {&(0x7f0000000400)="b1493cbcc1721a8131d99d4d9c82b3e729f04a22b89ef3c7976aae2d6a6f5e2359ee4e59fa4e5f157e447ab0ef3bb82e8bde29dbf27cb52f5de86fdca788e17e0a7fcf2fda4d561e699c6b3570c8605f0ce368d9", 0x54}, {&(0x7f0000000480)="2cb6720bf4711e36a89e8a5879907b44ed38b37c4bd0e7281f2e195fba6f5e816db75ec3c1c1b0231671efcd75b49d86bcf61c6cb0d6c9852d1c6b41c352249fbc2854eca5b3189692aa0ebed60b63aba40b25e196891bffc842485091dd89be8f6d2c3bf25908e015db06b0bcc28cc983b8e5eb3a2f2443cdc578527156ef3a06f86f3644e60b081eaf8dffa72c386fc8bf1b28d0201e850bdc409c4c93f58334cbe57fcbd1f25b9962068dbfef368030e44dbba841d2e44221962d02c32dbcd799a5ef0fa6f9a708ae0d28a24cadac30cf55e6b7eb3b9d4ed6eecdd2d77d27f610a89a6c4cfe9102794315c3dd289b2d9711e56872bdf64bca6b18", 0xfc}], 0x5, 0x0, 0x0, 0x100}, 0x5) 0s ago: executing program 1 (id=26): ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, &(0x7f0000003280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x800, 0x0, 0xf, 0x1ffffff, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x1002, 0x2, 0x0, 0x0, 0xe, 0xfffffffc, 0xeaea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x800000, 0x0, 0x80000001, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x8, 0xfffffffd, 0x1, 0x0, 0x2000000, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0xe, 0x8000, 0x2, 0x2, 0xfffffffc, 0xfe, 0x0, 0x0, 0x0, 0x1003, 0x0, 0x0, 0x4001, 0x0, 0x3, 0x0, 0xfffffffc, 0x0, 0x0, 0x39fa3cc6, 0x368, 0xe, 0x40000, 0x0, 0x0, 0x7d, 0x0, 0x0, 0x9c3, 0x0, 0x0, 0x4, 0x0, 0x8, 0x0, 0x0, 0x2]}) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x23, &(0x7f00000009c0)='r', 0x1) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x24, &(0x7f0000000080)="f4", 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x74) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x6, &(0x7f0000000000)=[{0x43b0}, {0x2}, {0x1}, {0x6}, {0x8}], 0x5}) r1 = socket(0x1c, 0x1, 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80001001, 0x0, 0x0, [0x0, 0x2ecc], 0xfffffffd, 0x20, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x40, @sival_int=0xfffffff8}}) r2 = vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sigval_int, @spare}) wait4(r2, &(0x7f0000000200), 0x10, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x5, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r5 = dup(r4) ioctl$CIOCGSESSION2(r5, 0xc030636a, &(0x7f0000000180)={0x10, 0x12, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x4d46b76e, [0x0, 0x400009, 0x3ff]}) syz_emit_ethernet(0x3b8, &(0x7f0000000680)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x382, 0x0, 0x0, @rand_addr="eee21f0000003c00000500004c58053b", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x0, 0x6, '\x00', [@pad1, @ra={0x5, 0x2, 0xcfe}, @enc_lim, @generic={0x3, 0x29, "defcbfd2493d61a279d61ee11e68365c4f4b148566bae4a2c65b92e84483895e1471413fa708f18e0d"}]}, @hopopts={0x2b, 0x66, '\x00', [@generic={0xa, 0x24, "4336d904e3b4734a81099c6ac4c14a1ee2db7aea68a60184063a1827af1f8d2e21fb3995"}, @ra, @generic={0x4, 0xbd, "3b0ddcb4642d4cb82f6f6f2b9e63c2678da83b5cffbad8388d8f394db481ba956851525fac19b219718c7527c48f79fd6ea7bfe7976badc10d74a95edaddc55a86a57bd79d882400f76321010d67dc56e74103d3beb4fb131d954595df7760ed3e8ce1d706a18913f09af6acf8769855549556d83fd0040cc53fb26333bdf4e7293ee23bd6853ea249035b3d73b44af20e46846cecc998014c3b5bad8171acf5a79616308df5da66d0d198c91e71302ab17339974ae5147b5cc8df2868"}, @padn={0x1, 0x7, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x19, 0x22f, "26983c13857aeb63d1bb37004a3a20fb28ac932c4de272c83c7c972f525b38814cc8b148a4e2191af89015bb3827f51e5683363f16740b97b6386cf36a434b4927bc2981516ca8843ec76d9ee581b2bb84092547826ecdd153fd06fe7b33eab72110dc7391f4c1475d055df491a182f120ad15064ae024575ea637bb0f96cfa61a0aab8daaa15e683d92a09da8a8c65569b97b677f073ba0bbbfa6ca51c4e10ee6c633261682c745c464e5a9b1dd9e6feb8876895ea7aab6c45a349faa8344b757eb5b77e889aeb26267b0717c17befa48d97ea4f781cb122938df374ba19eb6ff1df7a053876f91ffbd3211fb157ef780b8574c922b634730c7be00e2ace7eae470cda6c7b6996da4f1c887db39aa122df24de2bc939896cb7db1882b386d30656c732365e84e7812f2c3eb44ae3c4ec773df26ebdb7c6d94592e6577f373935c7e4ecaafa423f9e91337124a8b624dbd0f8eff75ce78a3ff9975eec0706f395737e70f2cec5cbe2e8ce90a4583732e974ef87fe716043c9c8321d53e8adb83659a72888faf4f589bd7848581584ebcc444538f4ae6af3b1ca1c0ed56d7183580081c3ecf0cb076fdbb797f03df541a5b9a48eebb7ed419a4717d98c322691396af18ef87cc4e699e5cc6e160b8f7ed1532c821d26f2e298afff0d571737adffb55415bfbdfc2cee5e7ecda4b6937e34cdf94588e92135168055ebc25ecaf74a4792fefa1e7c0b91f7097c20ca8ec9a4e172ec28ef1f47ca97b770729243c054fa1a698d4cad91c02b84649897873"}, @ra={0x5, 0x2, 0x4836}, @padn={0x1, 0x4, [0x0, 0x0, 0x0, 0x0]}, @ra={0x5, 0x2, 0x9}]}], @generic="3ae9"}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.217' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 Jan 21 10:01:57 ci-freebsd-i386-2 dhclient[986]: send_packet: Network is down if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 Jan 21 10:01:58 ci-freebsd-i386-2 syslogd: last message repeated 1 times Jan 21 10:01:58 ci-freebsd-i386-2 dhclient[986]: receive_packet failed on tap1: Device not configured Jan 21 10:01:58 ci-freebsd-i386-2 dhclient[986]: ioctl(SIOCGIFFLAGS) on tap1: Operation not permitted Jan 21 10:01:58 ci-freebsd-i386-2 dhclient[986]: Interface tap1 no longer appears valid. Jan 21 10:01:58 ci-freebsd-i386-2 dhclient[986]: No live interfaces to poll on - exiting. Jan 21 10:01:58 ci-freebsd-i386-2 dhclient[986]: exiting. Jan 21 10:01:58 ci-freebsd-i386-2 dhclient[986]: connection closed Jan 21 10:01:58 ci-freebsd-i386-2 dhclient[986]: exiting. if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47800 Expensive callout(9) function: 0xffffffff81afc400(0) 0.005900048 s if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 Jan 21 10:02:08 ci-freebsd-i386-2 kernel: pid 1159 (syz-executor), jid 0, uid 0, was killed: exceeded maximum CPU limit if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 Jan 21 10:02:11 ci-freebsd-i386-2 kernel: arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.2.187 on tap2 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 lock order reversal: 1st 0xfffffe00543e1c78 ufs (ufs, lockmgr) @ /syzkaller/managers/i386/kernel/sys/kern/vfs_mount.c:2264 2nd 0xfffffe00543e2228 devfs (devfs, lockmgr) @ /syzkaller/managers/i386/kernel/sys/kern/vfs_subr.c:3395 lock order ufs -> devfs attempted at: #0 0xffffffff816a3722 at witness_checkorder+0x1652 #1 0xffffffff8150e135 at lockmgr_xlock+0xa5 #2 0xffffffff8235ade7 at VOP_LOCK1_APV+0x57 #3 0xffffffff8181463e at _vn_lock+0x14e #4 0xffffffff817d4f8f at vget_finish+0x10f #5 0xffffffff811f3513 at devfs_allocv+0x183 #6 0xffffffff811f24d7 at devfs_root+0xb7 #7 0xffffffff817e2ca9 at vfs_cache_root_fallback+0x1a9 #8 0xffffffff817d7936 at vflush+0x1a6 #9 0xffffffff811f2319 at devfs_unmount+0x69 #10 0xffffffff817bee72 at dounmount+0xf22 #11 0xffffffff817bde18 at kern_unmount+0x648 #12 0xffffffff823204f2 at ia32_syscall+0x4d2 #13 0xffffffff82135eff at int0x80_syscall_common+0x9c if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 SYZFAIL: too much cover cov=7456540 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too much cover cov=7456540 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too much cover cov=7456540 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=1 req=26 state=3 status=67 (errno 9: Bad file descriptor) if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077e47c00 FreeBSD/amd64 (ci-freebsd-i386-2.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Jan 21 10:02:27 ci-freebsd-i386-2 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl