last executing test programs: 4m8.007335951s ago: executing program 2 (id=802): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) shmdt(r1) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000000ac5, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r3 = getpid() fcntl$lock(r2, 0xe, &(0x7f0000000040)={0x3, 0x0, 0xffffffffffffffff, 0x100000006, r3}) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = getpid() fcntl$lock(r4, 0xe, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100040000004e, r5}) openat$md(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "db8344", 0x8, 0x11, 0x0, @rand_addr="fc000000200000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @udp={{0x0, 0x2, 0x8}}}}}}}) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r6 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x47, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, 0xffffffffffffffff) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 4m6.789803313s ago: executing program 2 (id=817): r0 = kqueue() kqueue() connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x3, @rand_addr=0xff}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20104, 0x0, 0x0) freebsd11_fstatfs(0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) setresuid(0x0, 0x0, 0xffffffffffffffff) setregid(0x0, 0x0) r1 = fork() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 0x10, 0x9, 0x0, 0xaec}, 0x1, 0x7, 0x5, 0x3, r1, 0xffffffffffffffff, 0x1}) syz_emit_ethernet(0x5db, &(0x7f00000005c0)={@random="4b8f3a6f6f98", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x5a5, 0x3a, 0x3eda8841f6300bf7, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@echo_request={0x80, 0x0, 0x0, 0x400, 0x7, "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"}}}}}}) kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) aio_fsync(0x4fb6c9497fdf3192, &(0x7f00000001c0)={0xffffffffffffffff, 0xfff, 0x0, 0x0, [0xc, 0x2], 0xa, 0x8, 0x2, {0x92, 0xbac7, 0x0}, {0x4, 0xc, @sival_int=0x32bc3360, @spare=[0x5, 0x1, 0xffff, 0x8, 0x5be4d9a9, 0x100000000, 0x7, 0x6]}}) syz_emit_ethernet(0x6e, &(0x7f0000000200)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "000015", 0x38, 0x2c, 0xff, @mcast1, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x6, {0x7, 0x6, "18deb3", 0x0, 0x71, 0x1, @loopback, @empty, [@hopopts={0x70}]}}}}}}}) 4m6.693618309s ago: executing program 2 (id=810): ktrace(0x0, 0x5, 0x40000424, 0xffffffffffffffff) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) openat$bpf(0xffffff9c, 0x0, 0x400000, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r2 = socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) cpuset_getdomain(0x3, 0x6, 0xff, 0x20, &(0x7f00000000c0), 0x0) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x18, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @local={0xfe, 0x80, '\x00', 0x0}}}}}}}) setsockopt$inet6_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) procctl$PROC_SPROTECT(0x2, 0x0, 0x1, &(0x7f0000000040)=0x11) 4m5.135293867s ago: executing program 2 (id=816): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r0, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) mlockall(0x2) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x80) open(0x0, 0x80000000000206, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @random="00000200", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x2, 0x6, 0x0, @multicast2, @multicast2}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x10, 0xa7, 0x0, 0x406, {[@sack_perm={0x4, 0x2}, @generic={0x2, 0x2}, @nop]}}}}}}}) mount(&(0x7f0000000080)='cd9660\x00', &(0x7f00000000c0)='.\x00', 0x0, &(0x7f0000000100)) 4m4.604827019s ago: executing program 2 (id=820): r0 = kqueue() kqueue() connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x3, @rand_addr=0xff}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20104, 0x0, 0x0) freebsd11_fstatfs(0xffffffffffffffff, 0x0) getgroups(0x0, 0x0) setresuid(0x0, 0x0, 0xffffffffffffffff) setregid(0x0, 0x0) r1 = fork() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0x0, 0x10, 0x9, 0x0, 0xaec}, 0x1, 0x7, 0x5, 0x3, r1, 0xffffffffffffffff, 0x1}) syz_emit_ethernet(0x5db, &(0x7f00000005c0)={@random="4b8f3a6f6f98", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x5a5, 0x3a, 0x3eda8841f6300bf7, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@echo_request={0x80, 0x0, 0x0, 0x400, 0x7, "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"}}}}}}) kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) aio_fsync(0x4fb6c9497fdf3192, &(0x7f00000001c0)={0xffffffffffffffff, 0xfff, 0x0, 0x0, [0xc, 0x2], 0xa, 0x8, 0x2, {0x92, 0xbac7, 0x0}, {0x4, 0xc, @sival_int=0x32bc3360, @spare=[0x5, 0x1, 0xffff, 0x8, 0x5be4d9a9, 0x100000000, 0x7, 0x6]}}) syz_emit_ethernet(0x6e, &(0x7f0000000200)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "000015", 0x38, 0x2c, 0xff, @mcast1, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x6, {0x7, 0x6, "18deb3", 0x0, 0x71, 0x1, @loopback, @empty, [@hopopts={0x70}]}}}}}}}) 4m4.421725083s ago: executing program 2 (id=823): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r0, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) mlockall(0x2) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x80) open(0x0, 0x80000000000206, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r2, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x0, 0x1ff], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int, @ke_flags=0x9fc040a3bd859cca}}) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) mlockall(0x2) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(r4, 0x14000000) syz_emit_ethernet(0x3e, &(0x7f0000000100)={@local, @random="00000200", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x2, 0x6, 0x0, @multicast2, @multicast2}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x7, 0x10, 0xa7, 0x0, 0x406, {[@sack_perm={0x4, 0x2}, @generic={0x2, 0x2}, @nop]}}}}}}}) kevent(r2, 0x0, 0x0, &(0x7f0000000680)=[{}, {}, {}], 0x3, &(0x7f00000001c0)={0x4, 0x100}) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) rename(&(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a80)='./file0\x00') sync() mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r3, 0x0) 32.544629858s ago: executing program 1 (id=1743): r0 = socket(0x1c, 0x3, 0x0) connect$inet6(r0, 0x0, 0x0) openat$bpf(0xffffff9c, 0x0, 0x1, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) getpeername$unix(r0, &(0x7f00000002c0)=@abs={0x8}, &(0x7f0000000340)=0x8) r2 = socket$inet_sctp(0x2, 0x5, 0x84) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) nanosleep(&(0x7f0000000100)={0xfffffffffffffffd, 0x50}, 0x0) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f00000000c0)={0x15, 0x0, 0x17, &(0x7f0000000000)="0b6fac4103f48e8d08afe5de81d4755aedaacdd4743c7e", 0x0, 0x0, 0x0, 0x7d86699a}) ioctl$CIOCCRYPT(r3, 0xc0306367, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x10000, &(0x7f0000000100), 0x0, 0x0, 0x0}) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) dup2(r2, r3) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getpgrp(0xffffffffffffffff) procctl$PROC_PDEATHSIG_CTL(0x0, 0x0, 0xb, &(0x7f0000000840)=0x81) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) sync() thr_suspend(&(0x7f0000000240)={0x8, 0xc}) fpathconf(0xffffffffffffff9c, 0x0) sync() mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) sendmsg$unix(r0, &(0x7f0000001440)={0x0, 0x0, 0x0}, 0x0) 31.641858531s ago: executing program 1 (id=1748): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) shmdt(r1) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000000ac5, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r3 = getpid() fcntl$lock(r2, 0xe, &(0x7f0000000040)={0x3, 0x0, 0xffffffffffffffff, 0x100000006, r3}) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = getpid() fcntl$lock(r4, 0xe, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100040000004e, r5}) openat$md(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "db8344", 0x8, 0x11, 0x0, @rand_addr="fc000000200000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @udp={{0x0, 0x2, 0x8}}}}}}}) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r6 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x47, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, 0xffffffffffffffff) r7 = openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MDIOCATTACH(r7, 0xc1c06d00, &(0x7f0000000780)={0x0, 0x2, 0x0, 0x0, 0x10001, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, [0x2, 0xfffffffe, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000, 0xfffffffb, 0xf22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x2, 0x14, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x6, 0x9]}) 31.216665977s ago: executing program 1 (id=1749): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) procctl$PROC_SPROTECT(0x2, 0x0, 0x1, &(0x7f00000000c0)=0x21) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f00000001c0), 0x4) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000580)=@in6={0x1c, 0x1c, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\b\x00\x00\b\x00'}, 0x1c) setitimer(0x2, &(0x7f0000000000)={{0x3}}, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{0xffffffffffffffff, 0x12}, {0xffffffffffffffff, 0xb0}], 0x2, &(0x7f00000000c0)={0x200000077359400}, &(0x7f0000000100)={[0xfffffffffffffffd]}, 0x10) semget$private(0x0, 0x3, 0x308) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) r3 = socket$inet6(0x1c, 0x2, 0x0) bind$inet6(r3, &(0x7f0000000300)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="ff070a791b4375202b5c2baf2781e604", 0x4}, 0x1c) connect$inet6(r3, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0000000000000000b8e75dce6e8bdcd8"}, 0x1c) sendmsg(r3, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x20004) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000300)="27d5dabd0af2540c6719dfe2f8ea25fbdc712c5374b52815c6dc4f66d2e65adf8b78bff646b4b7bff9a50b51f58ac522b70f9c20bf9d4ae735214cc6c46e55052a6d34b60041065a8c2d352ad933b19e3fd206282cf60e86eb6539a072e20d938af26760f09fe2ec0afcd0a521a767d65ac071db113135bc5aad7e53521f40a0afa926f4d8d287cf33665985a8752bda5fa60fcd2fd8208ac1d80d50c89fd314aeb9", 0xa2}, {&(0x7f0000000100)}], 0x2) open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x0, 0x2, &(0x7f0000000040)='./file0\x00', 0x10004, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffebe, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x36ef, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x537, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x653, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff]}) open(&(0x7f0000000440)='.\x02/file1\x00', 0x70e, 0x0) msync(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) syz_emit_ethernet(0x52, &(0x7f0000000200)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaaa86dd685ee511001c49ff00000000000000000000ffffe0000002000000000000000000000000000000008200907800070005ff02000000000030fccf056bd972c69b4d57"]) 30.273131173s ago: executing program 1 (id=1753): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r2, 0x6, 0x29, &(0x7f0000000400)={&(0x7f0000000000)="9d4bb23cb3ddc650cbd6161a398a5b1106e783e2cc59", 0x0, &(0x7f0000000500)="0096d8d84c1e188133cba083408fed9635498258c17a37872e90c20dc9d4910ddab503cccf9a726f75b76bed437eeaee688073e9f37db2d22e94b67976280d4b899b43604c1fddce84a2c0e81f2f4134ad274061fbe625fd6cbad9f16d7717e2beebdd10d4353251898e749addcf37a7b6fa5aceccb10f2ceafc54f47cbcf5e92a7e1ed8684add390676d0b20334e1f8239b585a36eb49a7fbd0f40474887cfaed917e5bcf780e5233cc70e7cbea", 0xb, 0x16, 0x0, 0x0, 0xae, 0x0, 0x3, 0x2, "08f73a051425f94f"}, 0x40) aio_error(&(0x7f0000000440)={r0, 0x3ff, &(0x7f0000000340)="85459704950212c688348d0e9ac5a0674809c3d0b58df7fa07a2545428897492360f88f405faae9e2c6427de24ca7214639f08e38de491e63af9bf3d91e752c57fc144a3bd78d3445f915ee49935c4256c21f151ee8584a64084274a5ce260a09a8edf7b212c17553764fd1b3c8003cda87b65182fda5667bb4f0fec76c2666933b0b99db7d6f2fefe2a4e2d2cca413f9ed62ce96a8b99f885d76f37f8c8cec5c1a65db4c0", 0xa5, [0x2, 0xffffa063], 0x5, 0x8, 0x10, {0x2, 0x1, &(0x7f0000000180)="da3e2ac2926825d0d43d2c2735807bc21cc03dcbc7f1f18048f32a3b6e7a5f413f74f4bbf3b63b359bf9e3efcc0d7b755afa64244b615ded0b8afcd136f42e28fa4bac05b939bbd8fe89e89c8d17572fba92c101a5c7acc3a5f06949e9"}, {0x0, 0xa, @sigval_ptr=0x8000000000000000, @ke_flags=0x2}}) sendmsg$inet6_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)="ca1b3b5c422ca65675e274c429d4ecb6043c5c10548af3499af18ae3b738b9b6b5428e18e8a6f70a1fad05f03388e5d7fcc796fa874a4c850fc114d59d7d095f07c3338b7653ed757e08fc8325e69831de6411138839053b1a7b32636f2e05fcbcada2375bde92ed0ac706042efe8a3bcd095a7ab57ac9ddbdc94f1545f59d15ada6e76061b7834beac7d501f26c2752d451ca96b5f61b24c88865cfe25dfb939a9fcbb9146239110e08576b3ec84e75714e740034e78dba801094faa3edb5774e0c58a39e0a1439a32fb837000000000000800108fcaeec67663ce77bfbc50affa69135c9385cd6d36ff365039a3c5a89a24e3fed7dee1a35513534f7173d892afd3b73f76a08af4f857a1f2674d9ace7647aace412d13afc1ac098fe6f86bfdef411248be5e096c4e747bfdc32a173cf9cdba48cc36819787f", 0x13a}], 0x1, 0x0, 0x0, 0x81}, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000980)={'bbr\x00'}, 0x24) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaa90aaaaaaaaaaaaaafb08004548001c0000000000019078ac1400aae000000111009078000000050d86521c9ea0326d1b19cb34d96c8376b994ae37873a8f2938ffeece1711744289f398bec352408006672b7efce930c3788595bc4359b495d1f86e9c20c4983921152f1074f41147e325a305"]) pipe2(0x0, 0x100004) sendmsg$inet6_sctp(r1, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x0, 0x185}, 0x9) rfork(0x85000) 29.597337721s ago: executing program 1 (id=1756): freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x672cda28f543e327, 0x3) lchown(&(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x0) freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) cap_rights_limit(r0, 0x0) cap_rights_limit(r0, &(0x7f0000000580)=[0x20000207fffffdc, 0x400000000000005]) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = kqueue() kevent(r1, 0x0, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') kqueue() kevent(0xffffffffffffffff, &(0x7f0000000000), 0x20b89, 0x0, 0xffff3955, 0x0) mknodat(0xffffffffffffff9c, 0x0, 0x100, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) getsockopt$inet6_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0xf, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r2, 0x8004745b, &(0x7f0000000080)) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) lio_listio(0x1, &(0x7f0000000080)=[{0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0, [0x100, 0x7], 0x5, 0x26, 0x9, {0x4000000000000004, 0xffff, 0x0}, {0x3, 0x15, @sival_ptr=0x1, @spare=[0xffffffff, 0x8, 0x8, 0x100, 0x8, 0x3, 0x1000, 0x8]}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x2, 0x10000], 0x9, 0x8, 0xb, {0x7, 0x1000000b, 0x0}, {0x1, 0xfffffffe, @sival_int=0x3, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0x4, 0x0, 0x0, [0x7, 0x40], 0x6, 0x5, 0x110, {0x7f, 0x9, 0x0}, {0x3, 0x10, @sival_int, @ke_flags=0x40a6}}], 0x3, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x3, 0x21596174, @loopback, 0xfffffffc}}, {{0x1c, 0x1c, 0x3, 0x2, @local={0xfe, 0x80, '\x00', 0x0}, 0x68}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x53, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @mcast2}}, {{0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0x108) open$dir(&(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1b) 29.486408825s ago: executing program 1 (id=1757): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) shmdt(r1) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000000ac5, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r3 = getpid() fcntl$lock(r2, 0xe, &(0x7f0000000040)={0x3, 0x0, 0xffffffffffffffff, 0x100000006, r3}) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = getpid() fcntl$lock(r4, 0xe, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100040000004e, r5}) openat$md(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "db8344", 0x8, 0x11, 0x0, @rand_addr="fc000000200000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @udp={{0x0, 0x2, 0x8}}}}}}}) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r6 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x47, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, 0xffffffffffffffff) r7 = openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MDIOCATTACH(r7, 0xc1c06d00, &(0x7f0000000780)={0x0, 0x2, 0x0, 0x0, 0x10001, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, [0x2, 0xfffffffe, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000, 0xfffffffb, 0xf22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x2, 0x14, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x6, 0x9]}) 29.486078112s ago: executing program 32 (id=1757): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) shmdt(r1) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000000ac5, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r3 = getpid() fcntl$lock(r2, 0xe, &(0x7f0000000040)={0x3, 0x0, 0xffffffffffffffff, 0x100000006, r3}) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = getpid() fcntl$lock(r4, 0xe, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100040000004e, r5}) openat$md(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "db8344", 0x8, 0x11, 0x0, @rand_addr="fc000000200000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @udp={{0x0, 0x2, 0x8}}}}}}}) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r6 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x47, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, 0xffffffffffffffff) r7 = openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MDIOCATTACH(r7, 0xc1c06d00, &(0x7f0000000780)={0x0, 0x2, 0x0, 0x0, 0x10001, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, [0x2, 0xfffffffe, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000, 0xfffffffb, 0xf22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x2, 0x14, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x6, 0x9]}) 22.815431357s ago: executing program 4 (id=1782): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r2, 0x6, 0x29, &(0x7f0000000400)={&(0x7f0000000000)="9d4bb23cb3ddc650cbd6161a398a5b1106e783e2cc", &(0x7f0000000300), &(0x7f0000000500)="0096d8d84c1e188133cba083408fed9635498258c17a37872e90c20dc9d4910ddab503cccf9a726f75b76bed437eeaee688073e9f37db2d22e94b67976280d4b899b43604c1fddce84a2c0e81f2f4134ad274061fbe625fd6cbad9f16d7717e2beebdd10d4353251898e749addcf37a7b6fa5aceccb10f2ceafc54f47cbcf5e92a7e1ed8684add390676d0b20334e1f8239b585a36eb49a7fbd0f40474887cfaed917e5bcf780e5233cc70e7cbea", 0xb, 0x15, 0x0, 0x0, 0xae, 0x0, 0x3, 0x2, "08f73a051425f94f"}, 0x40) aio_error(&(0x7f0000000440)={r0, 0x3ff, &(0x7f0000000340)="85459704950212c688348d0e9ac5a0674809c3d0b58df7fa07a2545428897492360f88f405faae9e2c6427de24ca7214639f08e38de491e63af9bf3d91e752c57fc144a3bd78d3445f915ee49935c4256c21f151ee8584a64084274a5ce260a09a8edf7b212c17553764fd1b3c8003cda87b65182fda5667bb4f0fec76c2666933b0b99db7d6f2fefe2a4e2d2cca413f9ed62ce96a8b99f885d76f37f8c8cec5c1a65db4c0", 0xa5, [0x2, 0xffffa063], 0x5, 0x8, 0x10, {0x2, 0x1, &(0x7f0000000180)="da3e2ac2926825d0d43d2c2735807bc21cc03dcbc7f1f18048f32a3b6e7a5f413f74f4bbf3b63b359bf9e3efcc0d7b755afa64244b615ded0b8afcd136f42e28fa4bac05b939bbd8fe89e89c8d17572fba92c101a5c7acc3a5f06949e9"}, {0x0, 0xa, @sigval_ptr=0x8000000000000000, @ke_flags=0x2}}) sendmsg$inet6_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)="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", 0x13a}], 0x1, 0x0, 0x0, 0x81}, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000980)={'bbr\x00'}, 0x24) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaa90aaaaaaaaaaaaaafb08004548001c0000000000019078ac1400aae000000111009078000000050d86521c9ea0326d1b19cb34d96c8376b994ae37873a8f2938ffeece1711744289f398bec352408006672b7efce930c3788595bc4359b495d1f86e9c20c4983921152f1074f41147e325a305"]) pipe2(0x0, 0x100004) sendmsg$inet6_sctp(r1, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x0, 0x185}, 0x9) rfork(0x85000) 21.170216739s ago: executing program 4 (id=1788): open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x64) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getuid() setresuid(r1, r1, 0x0) __semctl$SEM_STAT(0xffffffffffffffff, 0x3, 0xa, &(0x7f0000000600)=0x0) fstatat(r0, &(0x7f0000000640)='./file1\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4200) setresuid(r1, 0x0, r2) r3 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) r4 = open$dir(&(0x7f0000000100)='.\x00', 0x80000, 0x1c1) r5 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r5, 0x0, 0x4) renameat(r4, &(0x7f0000000040)='./file1\x00', r5, 0x0) sync() pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r6 = socket(0x1c, 0x1, 0x0) bind$inet6(r6, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0xbc0, @loopback, 0x7}, 0x1c) r7 = socket$unix(0x1, 0x2, 0x0) bind$unix(r7, 0x0, 0x0) aio_cancel(r4, &(0x7f0000000500)={0xffffffffffffffff, 0x8001, 0x0, 0x0, [0x5a, 0x40], 0x1, 0x2, 0x6, {0x5, 0x4fa9, &(0x7f00000002c0)="30f90e4431db4020fa54ec24280dc3db7fda96fd0a209d81fb897ca28b07d7d3c2b6e5167300d22da75e79e62419f9f4f3e820b857ed758ca44fd3aa7bc437c5ed2b485558da1be7f51484dab9557dd5b1b3583713913f3b01cb380eab4e9c5a9889fa76528c413b69406d7a8157910902aaaae0af768f9ef8a085498a7f388ba2fce2f5c233b134da4456d8915aa9c82552b0f0f0e3b0f61c5c7275c4006538ffcb47034f8a637f57087e9f74b1c41d2a3253d078364b5f70e970d6cfcb0559c34e549bfdbe4cff14c10c3450e92079"}, {0x3, 0x14, @sigval_int=0x3, @thr={&(0x7f00000003c0)="f20f2cd842787c410f8a000000002647d12ac4e2ad3c2d00000000c402fd1d8096000000c461a81430c4617910c7c461f97e0d2a000000c4017458a4cd1d6f70b6", &(0x7f0000000440)="2d5db92d33300ed4feae4109aeef48da5e019b10c4812ccb313a1ba9a3799f331a886979dd8fef43e268beb895bea4be2f7d89b2adb8661f11310b2badbf499c012d1f247a4a91c83abab86e8adac703919e05824906752f27e70b7ebb6eecf11a41f3b1bc693102e36e90c54c3c94045075f2f519ecda01421148708d3088b0f2e6041df989"}}}) connect$inet6(r6, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) sendfile(r0, r6, 0x4, 0x0, 0x0, 0x0, 0x0) rfork(0x3000) 20.588960921s ago: executing program 4 (id=1790): getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) r1 = open$dir(0x0, 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1, 0x6}}, {{0x1c, 0x1c, 0x2, 0x0, @empty}}}, 0x108) copy_file_range(r1, 0x0, r0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) kqueue() setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x4, 0x102) pipe2(&(0x7f0000000000), 0x100004) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0xc00, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SMB_PCALL(r4, 0xc0106978, &(0x7f0000000480)={0x0, 0x0, 0x0, @byte=0x2, @word, 0x5f5000, 0x0, 0x0, 0x0}) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f00000000c0)={0x0, 0x13, 0x0, 0x0, 0x4, &(0x7f0000000400)='pg:@', 0x0, 0xfdffffff, [0x0, 0x502, 0x8000, 0x7fff]}) r5 = msgget$private(0x0, 0x790) setuid(0xffffffffffffffff) seteuid(0x0) msgsnd(r5, &(0x7f0000000100)=ANY=[], 0x401, 0x0) msgsnd(r5, &(0x7f0000001f40)=ANY=[], 0x401, 0x0) 20.156427688s ago: executing program 4 (id=1791): setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x51, 0x0, 0x0) kqueue() syz_emit_ethernet(0x7e, 0x0) r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f00000004c0), 0x100000, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000000)={0xb, 0x22, 0x10, &(0x7f0000000940)="0b6fac4103e7a00d4689e808d0d4755a", 0x0, 0x0, 0x0, 0x7d86699a, [0x0, 0x5]}) ioctl$CIOCCRYPT(r1, 0xc0306367, &(0x7f0000000180)={0x0, 0x1, 0x400, 0x10000, &(0x7f0000000380), 0x0, 0x0, 0x0}) setitimer(0x0, &(0x7f0000000040)={{0x7bfffffe, 0x26}, {0x0, 0xcfe}}, 0x0) pwritev(r0, &(0x7f0000000080), 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$sock_int(r2, 0xffff, 0x4, 0x0, 0x0) r3 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x31, &(0x7f0000000440)=ANY=[@ANYBLOB="360200000000000004013b0401021f0500000000000502fffb"], 0x20) listen(0xffffffffffffffff, 0x14040000) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, &(0x7f0000000080)={0x10, 0x1d, 0x1, &(0x7f0000000740)='\x00', 0x1, &(0x7f00000000c0)='\"', 0x1000, 0x7d86619b, [0x0, 0x9, 0xc]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x22, &(0x7f0000000100)={0x3, 0x81, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r3, 0x84, 0x24, &(0x7f0000000380)={r4, @in6={{0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x3}}}, 0x90) 19.968393977s ago: executing program 4 (id=1792): freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x672cda28f543e327, 0x3) lchown(&(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x0) freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) cap_rights_limit(r0, 0x0) cap_rights_limit(r0, &(0x7f0000000580)=[0x20000207fffffdc, 0x400000000000005]) openat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = kqueue() kevent(r1, 0x0, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') kqueue() kevent(0xffffffffffffffff, &(0x7f0000000000), 0x20b89, 0x0, 0xffff3955, 0x0) mknodat(0xffffffffffffff9c, 0x0, 0x100, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) getsockopt$inet6_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0xf, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r2, 0x8004745b, &(0x7f0000000080)) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) lio_listio(0x1, &(0x7f0000000080)=[{0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0, [0x100, 0x7], 0x5, 0x26, 0x9, {0x4000000000000004, 0xffff, 0x0}, {0x3, 0x15, @sival_ptr=0x1, @spare=[0xffffffff, 0x8, 0x8, 0x100, 0x8, 0x3, 0x1000, 0x8]}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x2, 0x10000], 0x9, 0x8, 0xb, {0x7, 0x1000000b, 0x0}, {0x1, 0xfffffffe, @sival_int=0x3, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0x4, 0x0, 0x0, [0x7, 0x40], 0x6, 0x5, 0x110, {0x7f, 0x9, 0x0}, {0x3, 0x10, @sival_int, @ke_flags=0x40a6}}], 0x3, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x3, 0x21596174, @loopback, 0xfffffffc}}, {{0x1c, 0x1c, 0x3, 0x2, @local={0xfe, 0x80, '\x00', 0x0}, 0x68}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x53, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @mcast2}}, {{0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0x108) open$dir(&(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1b) 19.821441442s ago: executing program 4 (id=1795): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) shmdt(r1) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000000ac5, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r3 = getpid() fcntl$lock(r2, 0xe, &(0x7f0000000040)={0x3, 0x0, 0xffffffffffffffff, 0x100000006, r3}) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = getpid() fcntl$lock(r4, 0xe, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100040000004e, r5}) openat$md(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "db8344", 0x8, 0x11, 0x0, @rand_addr="fc000000200000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @udp={{0x0, 0x2, 0x8}}}}}}}) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r6 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x47, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, 0xffffffffffffffff) r7 = openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MDIOCATTACH(r7, 0xc1c06d00, &(0x7f0000000780)={0x0, 0x2, 0x0, 0x0, 0x10001, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, [0x2, 0xfffffffe, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000, 0xfffffffb, 0xf22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x2, 0x14, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x6, 0x9]}) 19.723454393s ago: executing program 33 (id=1795): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) shmdt(r1) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000000ac5, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r3 = getpid() fcntl$lock(r2, 0xe, &(0x7f0000000040)={0x3, 0x0, 0xffffffffffffffff, 0x100000006, r3}) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = getpid() fcntl$lock(r4, 0xe, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100040000004e, r5}) openat$md(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "db8344", 0x8, 0x11, 0x0, @rand_addr="fc000000200000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @udp={{0x0, 0x2, 0x8}}}}}}}) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r6 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x47, 0x0, 0x0) cap_rights_limit(0xffffffffffffffff, 0xffffffffffffffff) r7 = openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$MDIOCATTACH(r7, 0xc1c06d00, &(0x7f0000000780)={0x0, 0x2, 0x0, 0x0, 0x10001, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, [0x2, 0xfffffffe, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x100000, 0xfffffffb, 0xf22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x2, 0x14, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x6, 0x9]}) 5.685452979s ago: executing program 5 (id=1850): mkdir(&(0x7f0000000040)='./file0\x00', 0x38) r0 = kqueue() kevent(r0, &(0x7f00000007c0)=[{0xfffffffffffffffd, 0xfffffffffffffff9, 0x6fd0e9ee5e208145, 0x8, 0xe8c5, 0x0, [0xfffffffffffffffc, 0x4000000000000000, 0x0, 0x2]}, {0x0, 0xfffffffffffffffb, 0x9, 0x2, 0x89, 0xfffffffffffffff7, [0x104, 0x8000000000000001, 0x0, 0x2]}, {0x4, 0xfffffffffffffffc, 0x61, 0xc0000000, 0x5, 0x0, [0x2, 0x1, 0x2, 0x1]}], 0x3, 0x0, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) chflagsat(r0, 0x0, 0x40300, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000480)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@dest_unreach={0x3, 0x6bd374b27f86e548, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, @multicast1}}}}}}) close(r1) r2 = socket$inet6_tcp(0x1c, 0x1, 0x0) symlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus/\x00') listen(r2, 0x6) fhlinkat(0x0, 0xffffffffffffffff, 0x0) ktrace(&(0x7f0000000100)='./file0\x00', 0x2, 0x1000, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$kbd(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000700)={@broadcast, @random="870698b05a75", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @empty, @remote={0xac, 0x14, 0x0}, @local, @remote={0xac, 0x14, 0x0}}}}}) setsockopt$inet_tcp_int(r1, 0x6, 0x200, &(0x7f0000000900)=0x401, 0x4) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x81, @empty, 0x6}, 0x1c, 0x0}, 0x0) ioctl$DIOCBEGINADDRS(0xffffffffffffffff, 0xc0184460, 0x0) aio_suspend(&(0x7f0000000b40), 0x0, &(0x7f0000000c00)={0x0, 0xe011}) ioctl$OGIO_DEADKEYMAP(r3, 0x462a6b08, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') 4.8302898s ago: executing program 5 (id=1852): getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) r1 = open$dir(0x0, 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1, 0x6}}, {{0x1c, 0x1c, 0x2, 0x0, @empty}}}, 0x108) copy_file_range(r1, 0x0, r0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) kqueue() setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x4, 0x102) pipe2(&(0x7f0000000000), 0x100004) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0xc00, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SMB_PCALL(r4, 0xc0106978, &(0x7f0000000480)={0x0, 0x0, 0x0, @byte=0x2, @word, 0x5f5000, 0x0, 0x0, 0x0}) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f00000000c0)={0x0, 0x13, 0x0, 0x0, 0x4, &(0x7f0000000400)='pg:@', 0x0, 0xfdffffff, [0x0, 0x502, 0x8000, 0x7fff]}) r5 = msgget$private(0x0, 0x790) setuid(0xffffffffffffffff) seteuid(0x0) msgsnd(r5, &(0x7f0000000100)=ANY=[], 0x401, 0x0) msgsnd(r5, &(0x7f0000001f40)=ANY=[], 0x401, 0x0) 4.280875718s ago: executing program 3 (id=1854): setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000200)={@multicast1, @rand_addr=0xfffffffd, @multicast1}, 0xc) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = kqueue() freebsd11_kevent(r1, &(0x7f0000000000)=[{}], 0x6a81, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000300)={0x3, 0x2, 0x0, @broadcast}, 0xfffffd12) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sigqueue(0x0, 0xf, @sival_int=0x8000) chflagsat(r1, &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r3 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000dc0)='./file0\x00', r3, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r4 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000005c0)='\x00', r4, &(0x7f0000000c80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x1) rename(&(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a80)='./file0\x00') unlink(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') getsockopt$inet_mreqn(r2, 0x0, 0x9, 0x0, &(0x7f0000000800)) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x2e, &(0x7f0000000840)={@mcast1}, 0x14) rename(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000180)='./file1\x00') sysarch$I386_SET_GSBASE(0xa, &(0x7f0000000080)=0xff0) r5 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000dc0)='./file0\x00', r5, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') execve(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000540)=[&(0x7f00000004c0)='\x00', &(0x7f0000000500)=')\x00']) 4.271424117s ago: executing program 5 (id=1855): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r2, 0x6, 0x29, &(0x7f0000000400)={&(0x7f0000000000)="9d4bb23cb3ddc650cbd6161a398a5b1106e783e2cc59", &(0x7f0000000300), 0x0, 0xb, 0x16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, "08f73a051425f94f"}, 0x40) aio_error(&(0x7f0000000440)={r0, 0x3ff, &(0x7f0000000340)="85459704950212c688348d0e9ac5a0674809c3d0b58df7fa07a2545428897492360f88f405faae9e2c6427de24ca7214639f08e38de491e63af9bf3d91e752c57fc144a3bd78d3445f915ee49935c4256c21f151ee8584a64084274a5ce260a09a8edf7b212c17553764fd1b3c8003cda87b65182fda5667bb4f0fec76c2666933b0b99db7d6f2fefe2a4e2d2cca413f9ed62ce96a8b99f885d76f37f8c8cec5c1a65db4c0", 0xa5, [0x2, 0xffffa063], 0x5, 0x8, 0x10, {0x2, 0x1, &(0x7f0000000180)="da3e2ac2926825d0d43d2c2735807bc21cc03dcbc7f1f18048f32a3b6e7a5f413f74f4bbf3b63b359bf9e3efcc0d7b755afa64244b615ded0b8afcd136f42e28fa4bac05b939bbd8fe89e89c8d17572fba92c101a5c7acc3a5f06949e9"}, {0x0, 0xa, @sigval_ptr=0x8000000000000000, @ke_flags=0x2}}) sendmsg$inet6_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)="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", 0x13a}], 0x1, 0x0, 0x0, 0x81}, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000980)={'bbr\x00'}, 0x24) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaa90aaaaaaaaaaaaaafb08004548001c0000000000019078ac1400aae000000111009078000000050d86521c9ea0326d1b19cb34d96c8376b994ae37873a8f2938ffeece1711744289f398bec352408006672b7efce930c3788595bc4359b495d1f86e9c20c4983921152f1074f41147e325a305"]) pipe2(0x0, 0x100004) sendmsg$inet6_sctp(r1, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x0, 0x185}, 0x9) rfork(0x85000) 3.623787657s ago: executing program 3 (id=1858): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r2, 0x6, 0x29, &(0x7f0000000400)={&(0x7f0000000000)="9d4bb23cb3ddc650cbd6161a398a5b1106e783e2cc59", &(0x7f0000000300), &(0x7f0000000500)="0096d8d84c1e188133cba083408fed9635498258c17a37872e90c20dc9d4910ddab503cccf9a726f75b76bed437eeaee688073e9f37db2d22e94b67976280d4b899b43604c1fddce84a2c0e81f2f4134ad274061fbe625", 0xb, 0x16, 0x0, 0x0, 0x57, 0x0, 0x3, 0x2, "08f73a051425f94f"}, 0x40) aio_error(&(0x7f0000000440)={r0, 0x3ff, &(0x7f0000000340)="85459704950212c688348d0e9ac5a0674809c3d0b58df7fa07a2545428897492360f88f405faae9e2c6427de24ca7214639f08e38de491e63af9bf3d91e752c57fc144a3bd78d3445f915ee49935c4256c21f151ee8584a64084274a5ce260a09a8edf7b212c17553764fd1b3c8003cda87b65182fda5667bb4f0fec76c2666933b0b99db7d6f2fefe2a4e2d2cca413f9ed62ce96a8b99f885d76f37f8c8cec5c1a65db4c0", 0xa5, [0x2, 0xffffa063], 0x5, 0x8, 0x10, {0x2, 0x1, &(0x7f0000000180)="da3e2ac2926825d0d43d2c2735807bc21cc03dcbc7f1f18048f32a3b6e7a5f413f74f4bbf3b63b359bf9e3efcc0d7b755afa64244b615ded0b8afcd136f42e28fa4bac05b939bbd8fe89e89c8d17572fba92c101a5c7acc3a5f06949e9"}, {0x0, 0xa, @sigval_ptr=0x8000000000000000, @ke_flags=0x2}}) sendmsg$inet6_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)="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", 0x13a}], 0x1, 0x0, 0x0, 0x81}, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000980)={'bbr\x00'}, 0x24) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaa90aaaaaaaaaaaaaafb08004548001c0000000000019078ac1400aae000000111009078000000050d86521c9ea0326d1b19cb34d96c8376b994ae37873a8f2938ffeece1711744289f398bec352408006672b7efce930c3788595bc4359b495d1f86e9c20c4983921152f1074f41147e325a305"]) pipe2(0x0, 0x100004) sendmsg$inet6_sctp(r1, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x0, 0x185}, 0x9) rfork(0x85000) 3.540666852s ago: executing program 0 (id=1859): getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080), 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1, 0x6}}, {{0x1c, 0x1c, 0x2, 0x0, @empty}}}, 0x108) copy_file_range(r1, 0x0, r0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) kqueue() setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x4, 0x102) pipe2(&(0x7f0000000000), 0x100004) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0xc00, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SMB_PCALL(r4, 0xc0106978, &(0x7f0000000480)={0x0, 0x0, 0x0, @byte=0x2, @word, 0x5f5000, 0x0, 0x0, 0x0}) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f00000000c0)={0x0, 0x13, 0x0, 0x0, 0x4, &(0x7f0000000400)='pg:@', 0x0, 0xfdffffff, [0x0, 0x502, 0x8000, 0x7fff]}) r5 = msgget$private(0x0, 0x790) setuid(0xffffffffffffffff) seteuid(0x0) msgsnd(r5, &(0x7f0000000100)=ANY=[], 0x401, 0x0) msgsnd(r5, &(0x7f0000001f40)=ANY=[], 0x401, 0x0) 3.20060217s ago: executing program 5 (id=1860): mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) minherit(&(0x7f0000c99000/0x3000)=nil, 0x3000, 0x1) msync(&(0x7f0000860000/0x600000)=nil, 0x600000, 0x2) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000001240)={@multicast2, @broadcast}, 0xc) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendto$inet(r1, &(0x7f0000000140), 0x0, 0x20000, &(0x7f0000001200)={0x10, 0x2, 0x1}, 0x10) kevent(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000940)=[{}], 0x1, 0x0) r2 = kqueue() openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x24, &(0x7f0000000a00)="06805bf96096ee932073818eb07255ba3a034567b26a0f1024672ed005e4a68cdb9fe027442d90c267ae69fa9b", 0x2d) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x26, 0x0, 0x0) open$dir(0x0, 0x202, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1002, 0x0, 0x0) sendto(0xffffffffffffffff, 0x0, 0x0, 0x20000, 0x0, 0x0) rfork(0x3060) madvise(&(0x7f00009d6000/0x600000)=nil, 0x600000, 0x3) fork() mprotect(&(0x7f0000d9c000/0x4000)=nil, 0x4000, 0x2) 3.19954521s ago: executing program 0 (id=1868): getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, 0x0, 0x0) copy_file_range(r1, 0x0, r0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) kqueue() setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x4, 0x102) pipe2(&(0x7f0000000000), 0x100004) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0xc00, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SMB_PCALL(r4, 0xc0106978, &(0x7f0000000480)={0x0, 0x0, 0x0, @byte=0x2, @word, 0x5f5000, 0x0, 0x0, 0x0}) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f00000000c0)={0x0, 0x13, 0x0, 0x0, 0x4, &(0x7f0000000400)='pg:@', 0x0, 0xfdffffff, [0x0, 0x502, 0x8000, 0x7fff]}) r5 = msgget$private(0x0, 0x790) setuid(0xffffffffffffffff) seteuid(0x0) msgsnd(r5, &(0x7f0000000100)=ANY=[], 0x401, 0x0) msgsnd(r5, &(0x7f0000001f40)=ANY=[], 0x401, 0x0) 3.00125863s ago: executing program 3 (id=1861): mkdir(&(0x7f0000000040)='./file0\x00', 0x38) r0 = kqueue() kevent(r0, &(0x7f00000007c0)=[{0xfffffffffffffffd, 0xfffffffffffffff9, 0x6fd0e9ee5e208145, 0x8, 0xe8c5, 0x0, [0xfffffffffffffffc, 0x4000000000000000, 0x0, 0x2]}, {0x2, 0xfffffffffffffff9, 0x0, 0x80000000, 0x4, 0x9a, [0xfffffffffffffffe, 0x1, 0xa, 0x4cf]}, {0x4, 0xfffffffffffffffc, 0x61, 0xc0000000, 0x5, 0x0, [0x2, 0x1, 0x2, 0x1]}], 0x3, 0x0, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) chflagsat(r0, 0x0, 0x40300, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000480)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@dest_unreach={0x3, 0x6bd374b27f86e548, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x0, @multicast1}}}}}}) close(r1) r2 = socket$inet6_tcp(0x1c, 0x1, 0x0) symlink(&(0x7f0000000000)='./bus\x00', &(0x7f0000000040)='./bus/\x00') listen(r2, 0x6) fhlinkat(0x0, 0xffffffffffffffff, 0x0) ktrace(&(0x7f0000000100)='./file0\x00', 0x2, 0x1000, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$kbd(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000700)={@broadcast, @random="870698b05a75", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x1, @empty, @remote={0xac, 0x14, 0x0}, @local, @remote={0xac, 0x14, 0x0}}}}}) setsockopt$inet_tcp_int(r1, 0x6, 0x200, &(0x7f0000000900)=0x401, 0x4) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x81, @empty, 0x6}, 0x1c, 0x0}, 0x0) ioctl$DIOCBEGINADDRS(0xffffffffffffffff, 0xc0184460, 0x0) aio_suspend(&(0x7f0000000b40), 0x0, &(0x7f0000000c00)={0x0, 0xe011}) ioctl$OGIO_DEADKEYMAP(r3, 0x462a6b08, 0x0) accept$inet(0xffffffffffffffff, 0x0, 0x0) rmdir(&(0x7f0000000100)='./file0\x00') 2.792513871s ago: executing program 0 (id=1862): getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1, 0x6}}, {{0x1c, 0x1c, 0x2, 0x0, @empty}}}, 0x108) copy_file_range(r1, 0x0, r0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) kqueue() ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r3 = semget$private(0x0, 0x4, 0x102) __semctl$SETVAL(r3, 0x981f250082ac26b2, 0x8, &(0x7f0000001140)=0x0) r4 = msgget$private(0x0, 0x790) setuid(0xffffffffffffffff) msgsnd(r4, &(0x7f0000000100)=ANY=[], 0x401, 0x0) msgsnd(r4, &(0x7f0000001f40)=ANY=[], 0x401, 0x0) 2.107038122s ago: executing program 5 (id=1863): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r2, 0x6, 0x29, &(0x7f0000000400)={&(0x7f0000000000)="9d4bb23cb3ddc650cbd6161a398a5b1106e783e2cc59", 0x0, &(0x7f0000000500)="0096d8d84c1e188133cba083408fed9635498258c17a37872e90c20dc9d4910ddab503cccf9a726f75b76bed437eeaee688073e9f37db2d22e94b67976280d4b899b43604c1fddce84a2c0e81f2f4134ad274061fbe625fd6cbad9f16d7717e2beebdd10d4353251898e749addcf37a7b6fa5aceccb10f2ceafc54f47cbcf5e92a7e1ed8684add390676d0b20334e1f8239b585a36eb49a7fbd0f40474887cfaed917e5bcf780e5233cc70e7cbea", 0xb, 0x16, 0x0, 0x0, 0xae, 0x0, 0x3, 0x2, "08f73a051425f94f"}, 0x40) aio_error(&(0x7f0000000440)={r0, 0x3ff, &(0x7f0000000340)="85459704950212c688348d0e9ac5a0674809c3d0b58df7fa07a2545428897492360f88f405faae9e2c6427de24ca7214639f08e38de491e63af9bf3d91e752c57fc144a3bd78d3445f915ee49935c4256c21f151ee8584a64084274a5ce260a09a8edf7b212c17553764fd1b3c8003cda87b65182fda5667bb4f0fec76c2666933b0b99db7d6f2fefe2a4e2d2cca413f9ed62ce96a8b99f885d76f37f8c8cec5c1a65db4c0", 0xa5, [0x2, 0xffffa063], 0x5, 0x8, 0x10, {0x2, 0x1, &(0x7f0000000180)="da3e2ac2926825d0d43d2c2735807bc21cc03dcbc7f1f18048f32a3b6e7a5f413f74f4bbf3b63b359bf9e3efcc0d7b755afa64244b615ded0b8afcd136f42e28fa4bac05b939bbd8fe89e89c8d17572fba92c101a5c7acc3a5f06949e9"}, {0x0, 0xa, @sigval_ptr=0x8000000000000000, @ke_flags=0x2}}) sendmsg$inet6_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)="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", 0x13a}], 0x1, 0x0, 0x0, 0x81}, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000980)={'bbr\x00'}, 0x24) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaa90aaaaaaaaaaaaaafb08004548001c0000000000019078ac1400aae000000111009078000000050d86521c9ea0326d1b19cb34d96c8376b994ae37873a8f2938ffeece1711744289f398bec352408006672b7efce930c3788595bc4359b495d1f86e9c20c4983921152f1074f41147e325a305"]) pipe2(0x0, 0x100004) sendmsg$inet6_sctp(r1, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x0, 0x185}, 0x9) rfork(0x85000) 2.015578625s ago: executing program 3 (id=1864): ktrace(0x0, 0x5, 0x40000424, 0xffffffffffffffff) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r0 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) openat$bpf(0xffffff9c, 0x0, 0x400000, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r2 = socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r2, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) cpuset_getdomain(0x3, 0x6, 0xff, 0x20, &(0x7f00000000c0), 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000280)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x18, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @local={0xfe, 0x80, '\x00', 0x0}}}}}}}) setsockopt$inet6_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, 0x0, 0x0) open$dir(0x0, 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) procctl$PROC_SPROTECT(0x2, 0x0, 0x1, &(0x7f0000000040)=0x11) 1.65227189s ago: executing program 0 (id=1865): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) shmdt(r1) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000000ac5, 0x0) open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r2 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r3 = getpid() fcntl$lock(r2, 0xe, &(0x7f0000000040)={0x3, 0x0, 0xffffffffffffffff, 0x100000006, r3}) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r5 = getpid() fcntl$lock(r4, 0xe, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100040000004e, r5}) openat$md(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "db8344", 0x8, 0x11, 0x0, @rand_addr="fc000000200000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @udp={{0x0, 0x2, 0x8}}}}}}}) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x47, 0x0, 0x0) r7 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$MDIOCATTACH(r7, 0xc1c06d00, 0x0) 1.237136347s ago: executing program 0 (id=1866): socketpair(0x1, 0x1, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet(0x2, 0x2, 0x0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(r2, 0x14000000) syz_emit_ethernet(0x36, &(0x7f0000000100)={@local, @random="00000200", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x2, 0x6, 0x0, @multicast2, @multicast2}, @tcp={{0x0, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x4, 0xa7, 0x0, 0x406}}}}}}) r3 = kqueue() kevent(r3, &(0x7f0000000000), 0x20b89, 0x0, 0xffff3955, 0x0) fhopen(0x0, 0x2006d00) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0x200000, 0x0) aio_read(&(0x7f0000000500)={r4, 0xf, &(0x7f0000000100)='Lv', 0x2, [0x8, 0x5], 0xb, 0x2, 0x3ff, {0x7, 0x5, 0x0}, {0x4, 0x17, @sigval_ptr=0x40}}) fork() connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) fork() posix_fadvise(r3, 0x631b, 0x3, 0x5) openat$ptmx(0xffffffffffffff9c, &(0x7f00000018c0), 0x800, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mlock(&(0x7f0000477000/0x1000)=nil, 0x1000) mprotect(&(0x7f00000d2000/0x1000)=nil, 0x1000, 0x6) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) connect$inet(r1, &(0x7f0000000080)={0xcdf6, 0x2, 0x1, @local={0xac, 0x14, 0x0}}, 0x10) rtprio(0x0, 0x0, &(0x7f0000000080)={0x4, 0x9}) setsockopt$inet_mreqn(r0, 0x0, 0xd, 0x0, 0x0) 1.127426243s ago: executing program 3 (id=1867): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) openat$filemon(0xffffffffffffff9c, 0x0, 0x8, 0x0) ioctl$SMB_OLD_TRANS(0xffffffffffffffff, 0xc01c690c, &(0x7f0000000140)={0x6c, 0x6f, 0x30, @word, @buf="cce7", 0xffffffff, 0x0, 0x0, 0x0}) socket(0x2, 0x1, 0x0) symlink(0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ioctl$SMB_READB(r1, 0x80246989, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @byte=0x4, 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x1c, 0x1, 0x0) connect$inet6(r2, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) setsockopt$sock_splice(r2, 0xffff, 0x1023, &(0x7f0000000080)={r2, 0xc332, {0x6, 0x8}}, 0x20) aio_read(&(0x7f0000001c40)={r2, 0x7fffffff, 0x0, 0x0, [0x0, 0xfffffffa], 0x1, 0x2, 0x9, {0x7, 0x7fff, 0x0}, {0x4, 0xd, @sival_int=0x7, @ke_flags}}) chdir(0x0) select(0x40, &(0x7f0000000080)={0x9, 0x10001, 0x400, 0x0, 0x5, 0x5, 0x0, 0x8}, 0x0, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000540)=[{0xc8, 0xfffffffffffffffe, 0x4007, 0x0, 0x1, 0x0, [0x3, 0x7fffffffffffffff]}], 0x1, 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) chdir(&(0x7f00000000c0)='./file1\x00') truncate(0x0, 0xfffffffffffffff8) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x27, &(0x7f0000000140)={&(0x7f0000000080), 0x0, &(0x7f0000000040)='O', 0xb, 0x0, 0x0, 0x7, 0x1, 0x0, 0x3, 0x3, "4cf4091400"}, 0x40) setsockopt$inet_tcp_TCP_TXTLS_MODE(0xffffffffffffffff, 0x6, 0x28, 0x0, 0x0) mkdirat(r3, &(0x7f0000000100)='./file1\x00', 0x0) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000001c0)) 703.50355ms ago: executing program 5 (id=1869): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r2, 0x6, 0x29, &(0x7f0000000400)={&(0x7f0000000000)="9d4bb23cb3ddc650cbd6161a398a5b1106e783e2cc59", &(0x7f0000000300), 0x0, 0xb, 0x16, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, "08f73a051425f94f"}, 0x40) aio_error(&(0x7f0000000440)={r0, 0x3ff, &(0x7f0000000340)="85459704950212c688348d0e9ac5a0674809c3d0b58df7fa07a2545428897492360f88f405faae9e2c6427de24ca7214639f08e38de491e63af9bf3d91e752c57fc144a3bd78d3445f915ee49935c4256c21f151ee8584a64084274a5ce260a09a8edf7b212c17553764fd1b3c8003cda87b65182fda5667bb4f0fec76c2666933b0b99db7d6f2fefe2a4e2d2cca413f9ed62ce96a8b99f885d76f37f8c8cec5c1a65db4c0", 0xa5, [0x2, 0xffffa063], 0x5, 0x8, 0x10, {0x2, 0x1, &(0x7f0000000180)="da3e2ac2926825d0d43d2c2735807bc21cc03dcbc7f1f18048f32a3b6e7a5f413f74f4bbf3b63b359bf9e3efcc0d7b755afa64244b615ded0b8afcd136f42e28fa4bac05b939bbd8fe89e89c8d17572fba92c101a5c7acc3a5f06949e9"}, {0x0, 0xa, @sigval_ptr=0x8000000000000000, @ke_flags=0x2}}) sendmsg$inet6_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)="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", 0x13a}], 0x1, 0x0, 0x0, 0x81}, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000980)={'bbr\x00'}, 0x24) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaa90aaaaaaaaaaaaaafb08004548001c0000000000019078ac1400aae000000111009078000000050d86521c9ea0326d1b19cb34d96c8376b994ae37873a8f2938ffeece1711744289f398bec352408006672b7efce930c3788595bc4359b495d1f86e9c20c4983921152f1074f41147e325a305"]) pipe2(0x0, 0x100004) sendmsg$inet6_sctp(r1, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x0, 0x185}, 0x9) rfork(0x85000) 474.288298ms ago: executing program 3 (id=1870): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r2, 0x6, 0x29, &(0x7f0000000400)={&(0x7f0000000000)="9d4bb23cb3ddc650cbd6161a398a5b1106e783e2cc59", &(0x7f0000000300), &(0x7f0000000500)="0096d8d84c1e188133cba083408fed9635498258c17a37872e90c20dc9d4910ddab503cccf9a726f75b76bed437eeaee688073e9f37db2d22e94b67976280d4b899b43604c1fddce84a2c0e81f2f4134ad274061fbe625", 0xb, 0x16, 0x0, 0x0, 0x57, 0x0, 0x3, 0x2, "08f73a051425f94f"}, 0x40) aio_error(&(0x7f0000000440)={r0, 0x3ff, &(0x7f0000000340)="85459704950212c688348d0e9ac5a0674809c3d0b58df7fa07a2545428897492360f88f405faae9e2c6427de24ca7214639f08e38de491e63af9bf3d91e752c57fc144a3bd78d3445f915ee49935c4256c21f151ee8584a64084274a5ce260a09a8edf7b212c17553764fd1b3c8003cda87b65182fda5667bb4f0fec76c2666933b0b99db7d6f2fefe2a4e2d2cca413f9ed62ce96a8b99f885d76f37f8c8cec5c1a65db4c0", 0xa5, [0x2, 0xffffa063], 0x5, 0x8, 0x10, {0x2, 0x1, &(0x7f0000000180)="da3e2ac2926825d0d43d2c2735807bc21cc03dcbc7f1f18048f32a3b6e7a5f413f74f4bbf3b63b359bf9e3efcc0d7b755afa64244b615ded0b8afcd136f42e28fa4bac05b939bbd8fe89e89c8d17572fba92c101a5c7acc3a5f06949e9"}, {0x0, 0xa, @sigval_ptr=0x8000000000000000, @ke_flags=0x2}}) sendmsg$inet6_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)="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", 0x13a}], 0x1, 0x0, 0x0, 0x81}, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000980)={'bbr\x00'}, 0x24) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaa90aaaaaaaaaaaaaafb08004548001c0000000000019078ac1400aae000000111009078000000050d86521c9ea0326d1b19cb34d96c8376b994ae37873a8f2938ffeece1711744289f398bec352408006672b7efce930c3788595bc4359b495d1f86e9c20c4983921152f1074f41147e325a305"]) pipe2(0x0, 0x100004) sendmsg$inet6_sctp(r1, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000240)}], 0x1, 0x0, 0x0, 0x185}, 0x9) rfork(0x85000) 0s ago: executing program 0 (id=1871): getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080), 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1, 0x6}}, {{0x1c, 0x1c, 0x2, 0x0, @empty}}}, 0x108) copy_file_range(r1, 0x0, r0, 0x0, 0xffffffffffffffff, 0x0) open$dir(0x0, 0x0, 0x0) kqueue() setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) semget$private(0x0, 0x4, 0x102) pipe2(&(0x7f0000000000), 0x100004) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0xc00, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SMB_PCALL(r4, 0xc0106978, &(0x7f0000000480)={0x0, 0x0, 0x0, @byte=0x2, @word, 0x5f5000, 0x0, 0x0, 0x0}) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f00000000c0)={0x0, 0x13, 0x0, 0x0, 0x4, &(0x7f0000000400)='pg:@', 0x0, 0xfdffffff, [0x0, 0x502, 0x8000, 0x7fff]}) r5 = msgget$private(0x0, 0x790) setuid(0xffffffffffffffff) seteuid(0x0) msgsnd(r5, &(0x7f0000000100)=ANY=[], 0x401, 0x0) msgsnd(r5, &(0x7f0000001f40)=ANY=[], 0x401, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.221' (ED25519) to the list of known hosts. Sep 18 20:26:15 ci-freebsd-main-3 kernel: arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 Warning! syz-executor[853] uses SF_SYNC sendfile(2) flag. Please follow up to https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=287348. FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 arp: requested protocol length != 4 ktrace write failed, errno 27, tracing stopped for pid 766 ktrace write failed, errno 27, tracing stopped for pid 762 ktrace write failed, errno 27, tracing stopped for pid 764 ktrace write failed, errno 27, tracing stopped for pid 763 ktrace write failed, errno 27, tracing stopped for pid 765 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 ktrace write failed, errno 27, tracing stopped for pid 866 Out of ktrace request objects. md1: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 nd6_na_input: duplicate IP6 address fe80:6::1aa if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.2.187 on tap2 Expensive callout(9) function: 0xffffffff81a5dab0(0xfffffe006e4f4a80) 0.005619311 s if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) pid 1030 (syz-executor), jid 0, uid 0: exited on signal 4 (no core dump - coredumpsize limit is 0) pid 1029 (syz-executor) is attempting to use unsafe AIO requests - not logging anymore nd6_na_input: duplicate IP6 address fe80:6::1aa if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 arp: ff:ff:ff:ff:ff:ff is multicast arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 nd6_na_input: duplicate IP6 address fe80:5::3aa vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe006e4fdc08: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371ba00 usecount 8, writecount 6, refcount 25 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0054150c98 ref 1 pages 184 cleanbuf 22 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe0054148780 (pid 1075, syz-executor, tid 100476) nlink=1, effnlink=1, size=697472, extsize 0 generation=62bc2878, uid=0, gid=0, flags=0x40008 ino 138, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000 ktrace write failed, errno 27, tracing stopped for pid 762 ktrace write failed, errno 27, tracing stopped for pid 765 ktrace write failed, errno 27, tracing stopped for pid 766 ktrace write failed, errno 27, tracing stopped for pid 764 ktrace write failed, errno 27, tracing stopped for pid 763 arp: aa:aa:aa:aa:aa:bb is using my IP address 172.20.2.170 on tap2! if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 ktrace write failed, errno 27, tracing stopped for pid 866 vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe00783e8370: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371ba00 usecount 8, writecount 6, refcount 25 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0054174aa8 ref 1 pages 184 cleanbuf 22 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe005416c780 (pid 1147, syz-executor, tid 100614) nlink=1, effnlink=1, size=697472, extsize 0 generation=1b79a39d, uid=0, gid=0, flags=0x40008 ino 137, on dev gpt/rootfs arp: packet with invalid infiniband address length 6 received on tap3 if_delmulti_locked: detaching ifnet instance 0xfffffe0058575800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe006e4fd6e0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371ba00 usecount 7, writecount 5, refcount 25 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe005413d4d8 ref 1 pages 184 cleanbuf 23 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0054133780 (pid 1209, syz-executor, tid 100724) nlink=1, effnlink=1, size=697472, extsize 0 generation=2341b860, uid=0, gid=0, flags=0x40008 ino 137, on dev gpt/rootfs arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 arp: packet with invalid infiniband address length 6 received on tap2 arp: packet with invalid infiniband address length 6 received on tap1 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe0078d88a50: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371ba00 usecount 8, writecount 6, refcount 25 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00541a48b8 ref 1 pages 184 cleanbuf 22 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe0054195000 (pid 1297, syz-executor, tid 100898) nlink=1, effnlink=1, size=697472, extsize 0 generation=3469de91, uid=0, gid=0, flags=0x40008 ino 190, on dev gpt/rootfs vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe0078d871b8: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371ba00 usecount 8, writecount 6, refcount 25 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00541a2e88 ref 1 pages 184 cleanbuf 22 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe00541a8780 (pid 1316, syz-executor, tid 100935) nlink=1, effnlink=1, size=697472, extsize 0 generation=fc9c45e0, uid=0, gid=0, flags=0x40008 ino 180, on dev gpt/rootfs arp: packet with unknown hardware format 0x15 received on tap2 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 Expensive callout(9) function: 0xffffffff81495d10(0xfffffe006e5628c0) 0.016145498 s arp: packet with invalid infiniband address length 6 received on tap0 vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe0078d88000: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371ba00 usecount 7, writecount 5, refcount 25 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00541b26c8 ref 1 pages 184 cleanbuf 22 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe00541a6000 (pid 1393, syz-executor, tid 101109) nlink=1, effnlink=1, size=697472, extsize 0 generation=5d4ad82a, uid=0, gid=0, flags=0x40008 ino 187, on dev gpt/rootfs vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe0078d891b8: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371ba00 usecount 8, writecount 6, refcount 25 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00541a56c8 ref 1 pages 184 cleanbuf 22 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe00541a6000 (pid 1395, syz-executor, tid 101115) with exclusive waiters pending nlink=1, effnlink=1, size=697472, extsize 0 generation=270995c8, uid=0, gid=0, flags=0x40008 ino 186, on dev gpt/rootfs arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: arp: packet with invalid infiniband address length 6 received on tap1 nd6_na_input: duplicate IP6 address fe80:4::2aa if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) ktrace write failed, errno 27, tracing stopped for pid 762 ktrace write failed, errno 27, tracing stopped for pid 765 ktrace write failed, errno 27, tracing stopped for pid 866 ktrace write failed, errno 27, tracing stopped for pid 764 ktrace write failed, errno 27, tracing stopped for pid 766 ktrace write failed, errno 27, tracing stopped for pid 763 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 Expensive callout(9) function: 0xffffffff818ce8f0(0xfffffe005861b800) 0.017870036 s nd6_na_input: duplicate IP6 address fe80:4::2aa if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 nd6_na_input: duplicate IP6 address fe80:6::1aa arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) nd6_na_input: duplicate IP6 address fe80:4::2aa if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 md2: truncating fractional last sector by 1 bytes md3: truncating fractional last sector by 1 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md4: truncating fractional last sector by 1 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 nd6_na_input: duplicate IP6 address fe80:6::1aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 nd6_na_input: duplicate IP6 address fe80:6::1aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 nd6_na_input: duplicate IP6 address fe80:6::1aa md5: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md6: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:3::aa md7: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md8: truncating fractional last sector by 1 bytes md9: truncating fractional last sector by 1 bytes md10: truncating fractional last sector by 1 bytes md11: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 md12: truncating fractional last sector by 1 bytes md13: truncating fractional last sector by 1 bytes md14: truncating fractional last sector by 1 bytes md15: truncating fractional last sector by 1 bytes md16: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md17: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:5::3aa md18: truncating fractional last sector by 1 bytes md19: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:6::1aa nd6_na_input: duplicate IP6 address fe80:5::3aa nd6_na_input: duplicate IP6 address fe80:3::aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md20: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md21: truncating fractional last sector by 1 bytes md22: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 nd6_na_input: duplicate IP6 address fe80:5::3aa md23: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 md24: truncating fractional last sector by 1 bytes md25: truncating fractional last sector by 1 bytes md26: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 nd6_na_input: duplicate IP6 address fe80:3::aa md27: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md28: truncating fractional last sector by 1 bytes Expensive callout(9) function: 0xffffffff84520450(0xfffffe00788c5178) 0.022105644 s arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 nd6_na_input: duplicate IP6 address fe80:5::3aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md29: truncating fractional last sector by 1 bytes md30: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md31: truncating fractional last sector by 1 bytes md33: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 nd6_na_input: duplicate IP6 address fe80:5::3aa nd6_na_input: duplicate IP6 address fe80:3::aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md34: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 nd6_na_input: duplicate IP6 address fe80:5::3aa md35: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 nd6_na_input: duplicate IP6 address fe80:5::3aa md36: truncating fractional last sector by 1 bytes md37: truncating fractional last sector by 1 bytes md38: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md39: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 nd6_na_input: duplicate IP6 address fe80:3::aa ktrace write failed, errno 27, tracing stopped for pid 779 ktrace write failed, errno 27, tracing stopped for pid 1 FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: md41: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 nd6_na_input: duplicate IP6 address fe80:6::1aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md42: truncating fractional last sector by 1 bytes md43: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md44: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:6::1aa md45: truncating fractional last sector by 1 bytes FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: nd6_na_input: duplicate IP6 address fe80:3::aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md47: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:3::aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 nd6_na_input: duplicate IP6 address fe80:5::3aa md48: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md49: truncating fractional last sector by 1 bytes md50: truncating fractional last sector by 1 bytes md51: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md52: truncating fractional last sector by 1 bytes md53: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:5::3aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md54: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:3::aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 nd6_na_input: duplicate IP6 address fe80:5::3aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md55: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:5::3aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 nd6_na_input: duplicate IP6 address fe80:3::aa md56: truncating fractional last sector by 1 bytes md57: truncating fractional last sector by 1 bytes md58: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md59: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:3::aa md60: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md61: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md62: truncating fractional last sector by 1 bytes FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 md64: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: md66: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:3::aa ip6_ctloutput: mbuf limit hit arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 nd6_na_input: duplicate IP6 address fe80:5::3aa md67: truncating fractional last sector by 1 bytes md68: truncating fractional last sector by 1 bytes md69: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:6::1aa md70: truncating fractional last sector by 1 bytes nd6_na_input: duplicate IP6 address fe80:6::1aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 nd6_na_input: duplicate IP6 address fe80:3::aa arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md71: truncating fractional last sector by 1 bytes vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe007a651000: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371ba00 usecount 7, writecount 6, refcount 25 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe007acc87c0 ref 2 pages 184 cleanbuf 23 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe007acc5780 (pid 2943, syz-executor, tid 104252) nlink=1, effnlink=1, size=697472, extsize 0 generation=410dc2d1, uid=0, gid=0, flags=0x40008 ino 380, on dev gpt/rootfs arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 md72: truncating fractional last sector by 1 bytes md73: truncating fractional last sector by 1 bytes md74: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 nd6_na_input: duplicate IP6 address fe80:5::3aa md75: truncating fractional last sector by 1 bytes md76: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 md77: truncating fractional last sector by 1 bytes md78: truncating fractional last sector by 1 bytes md79: truncating fractional last sector by 1 bytes md80: truncating fractional last sector by 1 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.1.187 on tap1 md512: truncating fractional last sector by 4 bytes md81: truncating fractional last sector by 1 bytes md82: truncating fractional last sector by 1 bytes arp: a8:aa:aa:aa:aa:bb attempts to modify permanent entry for 172.20.0.187 on tap0 nd6_na_input: duplicate IP6 address fe80:3::aa tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: link state changed to UP md83: truncating fractional last sector by 1 bytes ifaddr cache = 0xfffffe0059866180 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058574000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058574000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058574000 tap4: link state changed to DOWN tap5: Ethernet address: 58:9c:fc:10:e6:49 tap5: link state changed to UP if_delmulti_locked: detaching ifnet instance 0xfffffe0058574000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058574000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058574000 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.5.187 on tap5 md84: truncating fractional last sector by 8 bytes arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.5.187 on tap5 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 nd6_na_input: duplicate IP6 address fe80:5::3aa if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) login: ktrace write failed, errno 27, tracing stopped for pid 758 ktrace write failed, errno 27, tracing stopped for pid 762 ktrace write failed, errno 27, tracing stopped for pid 2922 ktrace write failed, errno 27, tracing stopped for pid 1 ktrace write failed, errno 27, tracing stopped for pid 3128 ktrace write failed, errno 27, tracing stopped for pid 766 ktrace write failed, errno 27, tracing stopped for pid 760 ktrace write failed, errno 27, tracing stopped for pid 763 ktrace write failed, errno 27, tracing stopped for pid 681 ktrace write failed, errno 27, tracing stopped for pid 2791 set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl