last executing test programs: 11.972206653s ago: executing program 0 (id=129): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe800000000000"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) r1 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d900", 0x30, 0x52, 0x0, @rand_addr="3bcc694212fae9849cf1404e6d2ee900", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x6, 0x0, @loopback={0x1000000}, @empty}}}}}}}) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}], 0x2, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r4, &(0x7f0000000240)='./file0\x00') setresuid(0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) r6 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ioctl$SMB_READB(r6, 0xc024698a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) r7 = openat$ptmx(0xffffff9c, &(0x7f0000000e00), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000007240)={&(0x7f00000022c0)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000007040)=[@rights={0x10, 0xffff, 0x1, [r7]}, @rights={0x10, 0xffff, 0x1, [r7]}], 0x20, 0x104}, 0x100) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x2004, 0x4, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @generic="179d64ca430bb096c6832cde18679e29dba3ef488e11ee14"}}}}) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2008, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x52, &(0x7f0000000080)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x3, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0xff, 0x0, {0x9, 0x4, 0x0, 0x8, 0x5, 0x66, 0x800, 0x3, 0x1e, 0x401, @rand_addr=0x6, @loopback, {[@end, @ssrr={0x89, 0x3, 0x1}, @ssrr={0x89, 0x3, 0xb}, @ra={0x94, 0x6, 0x1}]}}, "7b1f2915"}}}}}) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 10.300336598s ago: executing program 2 (id=191): openat$crypto(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) socket(0x1c, 0x1, 0x0) __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe800000"]) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x200201, 0x27) socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r0, 0x29, 0x48, &(0x7f0000000200), 0x2) syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d900", 0x30, 0x52, 0x0, @rand_addr="3bcc694212fae9849cf1404e6d2ee900", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x6, 0x0, @loopback={0x1000000}, @empty}}}}}}}) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}], 0x2, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, r3, &(0x7f0000000240)='./file0\x00') setresuid(0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ioctl$SMB_READB(r5, 0xc024698a, 0x0) r6 = openat$ptmx(0xffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r7, &(0x7f0000007240)={&(0x7f00000022c0)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="08000000000000003e0001000000f9ee9b41b27dc5e760bcab36e35a8fd835bf7c98a923858376c5682d038e4f16ad258f642640e6cf353e4445cd34eb45381a82156e2975fa6134f91bc6", @ANYRES32=r6, @ANYBLOB="10000000ffff000001000000", @ANYRES32=r6], 0x20, 0x104}, 0x100) syz_emit_ethernet(0x3a, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb08004500002c0000200404009078ac1400bbffffffff179d64ca430bb096c6832c54f9679e29dba3ef488e11ee144c787de0"]) syz_emit_ethernet(0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb08004507001c0000200800009078ac1400bbffffffff4e214e2200089078"]) syz_emit_ethernet(0x52, &(0x7f0000000080)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x3, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0xff, 0x0, {0x9, 0x4, 0x0, 0x8, 0x5, 0x66, 0x800, 0x3, 0x1e, 0x401, @rand_addr=0x6, @loopback, {[@end, @ssrr={0x89, 0x3, 0x1}, @ssrr={0x89, 0x3, 0xb}, @ra={0x94, 0x6, 0x1}]}}, "7b1f2915"}}}}}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) 10.022424511s ago: executing program 0 (id=129): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe800000000000"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) r1 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d900", 0x30, 0x52, 0x0, @rand_addr="3bcc694212fae9849cf1404e6d2ee900", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x6, 0x0, @loopback={0x1000000}, @empty}}}}}}}) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}], 0x2, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r4, &(0x7f0000000240)='./file0\x00') setresuid(0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) r6 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ioctl$SMB_READB(r6, 0xc024698a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) r7 = openat$ptmx(0xffffff9c, &(0x7f0000000e00), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000007240)={&(0x7f00000022c0)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000007040)=[@rights={0x10, 0xffff, 0x1, [r7]}, @rights={0x10, 0xffff, 0x1, [r7]}], 0x20, 0x104}, 0x100) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x2004, 0x4, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @generic="179d64ca430bb096c6832cde18679e29dba3ef488e11ee14"}}}}) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2008, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x52, &(0x7f0000000080)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x3, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0xff, 0x0, {0x9, 0x4, 0x0, 0x8, 0x5, 0x66, 0x800, 0x3, 0x1e, 0x401, @rand_addr=0x6, @loopback, {[@end, @ssrr={0x89, 0x3, 0x1}, @ssrr={0x89, 0x3, 0xb}, @ra={0x94, 0x6, 0x1}]}}, "7b1f2915"}}}}}) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 8.271307558s ago: executing program 1 (id=194): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) kqueue() socket$inet6_udp(0x1c, 0x2, 0x0) r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) inotify_add_watch_at(0xffffffffffffffff, r1, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r2 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r1, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r2, &(0x7f0000000240)='./file0\x00') getsockname$unix(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) open(&(0x7f0000000480)='./file0\x00', 0x100, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) r4 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) ioctl$BIOCSETF(r4, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 8.267772087s ago: executing program 2 (id=195): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, 0x0) r0 = socket(0x1c, 0x1, 0x0) mount(0x0, 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x27) __specialfd$inotify(0x2, 0x0, 0x0) r1 = kqueue() kevent(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) r2 = open(0x0, 0x400000, 0x0) inotify_add_watch_at(0xffffffffffffffff, r2, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(0x0, 0x200, 0x0) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x2) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_splice(r0, 0xffff, 0x1023, &(0x7f0000000180)={r3, 0x3, {0x3, 0x1}}, 0x14) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) r5 = openat$bpf(0xffffff9c, 0x0, 0x200000, 0x0) ioctl$BIOCSETF(r5, 0x80084267, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 7.941597799s ago: executing program 3 (id=197): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, 0x0) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x27) __specialfd$inotify(0x2, 0x0, 0x0) r1 = kqueue() kevent(r1, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) r2 = open(0x0, 0x400000, 0x0) inotify_add_watch_at(0xffffffffffffffff, r2, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x2) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_splice(r0, 0xffff, 0x1023, 0x0, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) r3 = openat$bpf(0xffffff9c, 0x0, 0x200000, 0x0) ioctl$BIOCSETF(r3, 0x80084267, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 7.889601859s ago: executing program 0 (id=129): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe800000000000"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) r1 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d900", 0x30, 0x52, 0x0, @rand_addr="3bcc694212fae9849cf1404e6d2ee900", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x6, 0x0, @loopback={0x1000000}, @empty}}}}}}}) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}], 0x2, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r4, &(0x7f0000000240)='./file0\x00') setresuid(0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) r6 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ioctl$SMB_READB(r6, 0xc024698a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) r7 = openat$ptmx(0xffffff9c, &(0x7f0000000e00), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000007240)={&(0x7f00000022c0)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000007040)=[@rights={0x10, 0xffff, 0x1, [r7]}, @rights={0x10, 0xffff, 0x1, [r7]}], 0x20, 0x104}, 0x100) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x2004, 0x4, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @generic="179d64ca430bb096c6832cde18679e29dba3ef488e11ee14"}}}}) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2008, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x52, &(0x7f0000000080)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x3, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0xff, 0x0, {0x9, 0x4, 0x0, 0x8, 0x5, 0x66, 0x800, 0x3, 0x1e, 0x401, @rand_addr=0x6, @loopback, {[@end, @ssrr={0x89, 0x3, 0x1}, @ssrr={0x89, 0x3, 0xb}, @ra={0x94, 0x6, 0x1}]}}, "7b1f2915"}}}}}) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 6.014990947s ago: executing program 1 (id=198): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe800000000000"]) r0 = socket(0x1c, 0x1, 0x0) mount(0x0, 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x8000000000000000, 0x0, [0x7ffffffffffffffd, 0x0, 0x0, 0x3]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0xc0000000, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x16, 0x0, 0x20, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0x1000]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x0, 0x8000, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000001400)}) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) inotify_add_watch_at(0xffffffffffffffff, r4, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r5 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r4, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r5, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10000, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfffffffffffffd64) getsockname$unix(0xffffffffffffffff, &(0x7f0000000380)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 5.938133612s ago: executing program 2 (id=199): rfork(0x11010) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000140), 0x10000, 0x0) r1 = kqueue() r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000240)={r2, 0x80001005, &(0x7f0000000440)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x4, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000606, 0x48) aio_readv(&(0x7f00000003c0)={r2, 0x36b, &(0x7f00000001c0)="bbba4a0e36fd8ca8a068f4d8eae9c0e6035399bd070d542c21b3814a4a5d0020ffe37c9ccbf1af01c683ad1f1d6d973724edacf3c8e1bba3f5432f0aef", 0x3d, [0x9, 0x7fff], 0xb, 0x20, 0xe2, {0xffffffff, 0xff, &(0x7f0000000200)="7bdc4e"}, {0x1, 0x17, @sigval_ptr=0x1, @thr={&(0x7f00000002c0)="26646465db450fc4c2493e3d00000000d96504c4e2cd38082ae9dbe0c4e155fa551e0fdae365e37ad8ff", &(0x7f0000000300)="f788c0d9efa93154af6da0e2a154fbdc01e94d20ecd84628f447d789bc538af806bf7b68a0bd542268fdc6412a9e9e6e1df62d1e44637dbc8af35a65aa0330e9a2bf"}}}) socket(0x2, 0x3, 0x0) __specialfd$eventfd(0x1, &(0x7f0000000180)={0x81, 0x5}, 0x8) r3 = kqueue() kevent(r3, &(0x7f0000000380)=[{0x4, 0xfffffffffffffffe, 0x1, 0xc0000000, 0x0, 0x4, [0x0, 0x4, 0x0, 0x3]}, {0x4, 0xfffffffffffffffe, 0xc710, 0x1, 0x3, 0x2, [0x4c, 0x0, 0x7fff]}], 0x2, 0x0, 0x0, 0x0) kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x3, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0xc, &(0x7f0000000080)={0xffff, {{0x1c, 0x1c, 0x2, 0x4, @remote={0xfe, 0x80, '\x00', 0x0}}}, {{0x1c, 0x1c, 0x3, 0x6, @mcast2}}}, 0xfc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) ppoll(0x0, 0x0, &(0x7f0000000480)={0x80000000, 0x8}, 0x0, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x7f7884acbfff, 0x4) socket(0x10, 0x10000000, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0x17, 0x0, 0x10, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0xfffffffe, 0xfdffff85, [0x0, 0x0, 0x7fe, 0xfffffffc]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x76, 0x20008, &(0x7f0000000600), 0x0, 0x0, &(0x7f0000000540)}) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x10000, 0x0) 5.937236011s ago: executing program 3 (id=200): socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) r0 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r0, 0x29, 0x67, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0xb, 0x8, 0xe8c1, 0x0, [0x6, 0x0, 0x0, 0x4]}], 0x1, 0x0, 0x0, 0x0) setgroups(0x0, 0x0) syz_emit_ethernet(0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$MDIOCATTACH(r3, 0xc1b46d00, &(0x7f00000006c0)={0x0, 0x0, 0x2, 0x0, 0x800, 0x0, 0xf, 0x1ffffff, 0x7ffff, 0x0, 0x0, [0x10001, 0x88, 0x0, 0x0, 0x12, 0x0, 0x2000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20008, 0x23, 0x2, 0x40000000, 0x0, 0x0, 0xe, 0xfffffffc, 0x1, 0x3, 0x0, 0x0, 0x0, 0x8000000, 0x40000001, 0x2, 0x0, 0x800, 0x800000, 0x2, 0x0, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, 0x0, 0x0, 0x5, 0x1000000, 0x0, 0x0, 0xfffffffd, 0xfffffffd, 0x0, 0x4, 0x2000000, 0x3, 0x0, 0x0, 0x0, 0x0, 0xe, 0x8000, 0xfffffff8, 0x2, 0xfffffffc, 0xfe, 0x0, 0x4, 0x0, 0x1003, 0x0, 0x0, 0x1, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0xfffffff9, 0x368, 0xe, 0xb2, 0x0, 0x0, 0x80, 0x0, 0x0, 0x9, 0x0, 0x3, 0x4, 0x0, 0x6, 0x0, 0x0, 0x2]}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000c80)={r4, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0xfffffffe, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sigval_ptr=0x3}}) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x1, 0x20011, r5, 0x60000000) lpathconf(&(0x7f00000001c0)='./file1\x00', 0xc) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x108) r6 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xe, 0x0, 0x0) getsockname(r6, 0x0, &(0x7f0000001200)=0xffffffffffffffe3) cpuset_getaffinity(0x3, 0x3, 0x0, 0x0, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x1a38, 0x0) 5.102438769s ago: executing program 1 (id=201): __getcwd(&(0x7f0000000100)=""/3, 0x3) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) kevent(0xffffffffffffffff, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x2, 0x0, 0x0, 0x0) select(0xff00, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100}, 0x0, &(0x7f0000000040)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000240)={r0, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) aio_write(&(0x7f0000000680)={r1, 0x0, 0x0, 0x0, [0x14, 0x3], 0x0, 0x0, 0xffffffff, {0x8000000000, 0x3, 0x0}, {0x0, 0x4000014, @sival_int=0xa2e5, @spare=[0xfffffffffffffff9, 0x40, 0x9, 0x43, 0xfe, 0x7, 0x5, 0x9]}}) aio_error(&(0x7f0000000680)={0xffffffffffffffff, 0x15e, 0x0, 0x0, [0x5, 0x7], 0x8, 0x18, 0x7, {0x2, 0x8, 0x0}, {0x7, 0x5, @sival_int, @thr={0x0, 0x0}}}) 4.993976485s ago: executing program 1 (id=202): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe80000000000000010000000b0000aaff020000000000000000000000000000000088"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) socket$inet_udplite(0x2, 0x2, 0x88) sendfile(r0, 0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r1 = kqueue() kevent(r1, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x183, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, r3, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r5 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(r3, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r5, &(0x7f0000000240)='./file0\x00') setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) getsockname$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xef, 0x0, ""/237}, &(0x7f00000000c0)=0xef) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x84) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) mkdir(0x0, 0x3d) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) r7 = semget$private(0x0, 0x2, 0x100) semop(r7, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 4.946194126s ago: executing program 3 (id=203): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) getpriority(0x1, 0x0) setresuid(0xee00, 0xee01, 0xffffffffffffffff) r1 = msgget$private(0x0, 0x8) setresuid(0x0, 0x0, 0x0) msgsnd(r1, &(0x7f0000000100)={0x3}, 0x4, 0x800) msgctl$IPC_RMID(r1, 0x0) clock_gettime(0xffffffffc0000011, 0x0) fsync(r0) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000240)={0x1c, 0x1c, 0x2, 0xd, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x28) r3 = socket(0x1c, 0x3, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_udp(0x1c, 0x2, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r4, 0x0, 0x47, &(0x7f0000001600)="ee32d4ce78238b07421c63", 0xb) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r5, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c921bf0817a0000000000006a89dbdf", 0x2c) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) mkdir(&(0x7f00000006c0)='./file0\x00', 0x110) linkat(0xffffffffffffff9c, &(0x7f0000000140)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x6000) getsockopt$inet_tcp_TCP_TXTLS_MODE(r3, 0x6, 0x28, &(0x7f0000000180), &(0x7f00000001c0)=0x4) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x8, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) acct(&(0x7f0000000000)='./file0\x00') fstat(r5, &(0x7f0000000040)) socket$inet6_udp(0x1c, 0x2, 0x0) syz_emit_ethernet(0x34, &(0x7f0000000000)={@local, @remote, [], {@arp={0x806, @generic={0x20, 0x86db, 0x6, 0x2, 0x4, @random="2e047de13d83", "f219", @random="958e3c0762bf", "a2ee0000f4070000000000000100"}}}}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 4.834550759s ago: executing program 0 (id=129): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe800000000000"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) r1 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d900", 0x30, 0x52, 0x0, @rand_addr="3bcc694212fae9849cf1404e6d2ee900", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x6, 0x0, @loopback={0x1000000}, @empty}}}}}}}) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}], 0x2, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r4, &(0x7f0000000240)='./file0\x00') setresuid(0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) r6 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ioctl$SMB_READB(r6, 0xc024698a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) r7 = openat$ptmx(0xffffff9c, &(0x7f0000000e00), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000007240)={&(0x7f00000022c0)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000007040)=[@rights={0x10, 0xffff, 0x1, [r7]}, @rights={0x10, 0xffff, 0x1, [r7]}], 0x20, 0x104}, 0x100) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x2004, 0x4, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @generic="179d64ca430bb096c6832cde18679e29dba3ef488e11ee14"}}}}) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2008, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x52, &(0x7f0000000080)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x3, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0xff, 0x0, {0x9, 0x4, 0x0, 0x8, 0x5, 0x66, 0x800, 0x3, 0x1e, 0x401, @rand_addr=0x6, @loopback, {[@end, @ssrr={0x89, 0x3, 0x1}, @ssrr={0x89, 0x3, 0xb}, @ra={0x94, 0x6, 0x1}]}}, "7b1f2915"}}}}}) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 4.827123076s ago: executing program 2 (id=204): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) msgget$private(0x0, 0x100) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x400, 0x0) fhopen(&(0x7f0000000000)={{[0x5c8951ac, 0x3bea9983]}, {0x0, 0xb, "0a0000009a165d5900"}}, 0x80000) r2 = socket$inet6(0x1c, 0x3, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000280)={0x19, 0x23, 0x1a, &(0x7f00000000c0)="2425c1ffa58b404ced529c3180a5a32c94139800000000000000", 0x0, 0x0, 0x1000, 0xfdffff85, [0x2, 0x7ff, 0x4, 0x5]}) setsockopt$inet6_int(r2, 0x29, 0x18, &(0x7f00000001c0)=0x8, 0x4) openat$md(0xffffff9c, &(0x7f0000000140), 0x4, 0x0) setrlimit(0x7, &(0x7f0000000040)={0x1, 0x6}) r4 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000000)='./file0\x00', 0x0) ioctl$KDSKBSTATE(0xffffffffffffffff, 0x20044b14) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) sigaction(0x14, &(0x7f0000000100)={0x0, 0x11, {[0x0, 0x0, 0x6]}}, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4900bf732d83df73) kevent(0xffffffffffffffff, &(0x7f0000000240)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x2, 0x7, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f0000000040)={0x10, 0x2, 0x0, @rand_addr=0xfffffff9}, 0x10) sendto$inet(r5, &(0x7f0000001040)="017a88ca", 0x4, 0x20081, &(0x7f0000000000)={0x10, 0x2, 0x0, @rand_addr=0x2}, 0x10) rfork(0x85000) r6 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, r6, &(0x7f0000000180)='./file0\x00') setreuid(0xee00, 0x0) ioctl$BIOCSETF(r1, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) pipe2(0x0, 0xa) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) socket$inet_icmp_raw(0x2, 0x3, 0x1) 2.730664601s ago: executing program 1 (id=205): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x3f, &(0x7f0000001380)=ANY=[@ANYBLOB="e727dc2a001f756c69bd7dd786dd608907a600092c03cb697a653e336f000000500000000000ff020000000000000000000000000001f00000300000000043"]) r0 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000400)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @local}, &(0x7f0000000380)=0xc17848646ec6456d, 0x30000000) setsockopt$inet6_tcp_TCP_FASTOPEN(r0, 0x6, 0x401, &(0x7f0000000180)={0x6, "b4cbfd1be3682d3f13da9355306561f2"}, 0x14) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0x8, 0x0) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f0000000080)={0x19, 0x0, 0x10, &(0x7f0000000000)="ec7b0000f2feff03000000000000007f", 0x0, 0x0, 0x0, 0xfdffef85}) ioctl$CIOCCRYPT(r1, 0xc01c6367, &(0x7f0000000140)={0x0, 0x2, 0x0, 0x10000, &(0x7f00000004c0), 0x0, &(0x7f0000000040), &(0x7f0000000240)}) r2 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000340)='./file0/../file0\x00', 0x0) getpriority(0x1, 0x0) setresuid(0xee00, 0xee01, 0xffffffffffffffff) r3 = msgget$private(0x0, 0x8) syz_emit_ethernet(0x82, &(0x7f0000000000)={@random="c69d00", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x4c, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x38, {0x0, 0x6, "06c33e", 0x0, 0x54, 0x0, @rand_addr="52e8604bc8b1641f1a39a00cc19509b1", @mcast2, [@routing={0x33, 0x2, 0x0, 0x1, 0x0, [@loopback]}], '}EBd'}}}}}}}) msgsnd(r3, &(0x7f00000001c0)={0x3, "44309b5a76f185eff1724d"}, 0xf, 0x0) r4 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x17, 0x1d, 0x10, &(0x7f00000000c0)="ec7b00002cfeff02000000000000007f", 0x0, 0x0, 0x0, 0xfdffef85}) ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f0000000100)={0x0, 0x1, 0x0, 0x8003, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000000140)}) msgctl$IPC_RMID(r3, 0x0) r5 = socket(0x1c, 0x3, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x900, &(0x7f0000000200)={0x0, 0x6}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r5, 0x84, 0x1a, &(0x7f0000000300)={r6}, 0x8) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_udp(0x1c, 0x2, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r7, 0x0, 0x47, &(0x7f0000001600)="ee32d4ce78238b07421c63af", 0xc) mkdir(&(0x7f00000006c0)='./file0\x00', 0x110) linkat(0xffffffffffffffff, &(0x7f0000000280)='./file0/../file0/file0\x00', 0xffffffffffffffff, 0x0, 0x4000) r8 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r8, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x8000008, @loopback}, 0x1c) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 2.72993495s ago: executing program 2 (id=206): utimensat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', &(0x7f0000000080)={{0x0, 0x2710}, {0x0, 0x8}}, 0x0) sigtimedwait(&(0x7f0000000180)={[0x0, 0x6, 0x4, 0x7]}, 0x0, &(0x7f00000019c0)={0x40000005, 0x9}) unmount(&(0x7f0000000000)='./file0\x00', 0x8200000) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x12) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r1, &(0x7f0000000200)=[{&(0x7f0000000100)="19", 0x3a4e1e905c56cdb7}], 0x1) fork() sendto$inet6(0xffffffffffffffff, &(0x7f0000000240)="04", 0x1, 0x20185, 0x0, 0x0) madvise(&(0x7f0000003000/0x1000)=nil, 0x7f7884acbfff, 0x4) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @random="7004f5b37507", [], {@ipv6={0x86dd, {0x0, 0x6, "d900", 0x18, 0x3a, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@mld={0xc2, 0x0, 0x0, 0x7, 0xfff7, @mcast1}}}}}}) flock(r0, 0x1) r2 = fhopen(&(0x7f0000000000)={{[0x5c8951ac, 0x3bea9983]}, {0x0, 0x8, "0a0000009a165d5900"}}, 0x40000) syz_emit_ethernet(0x6e, &(0x7f0000000700)={@broadcast, @local, [], {@ipv4={0x800, {{0x16, 0x4, 0x2, 0x9, 0x60, 0x64, 0x284, 0x8, 0x22, 0x0, @multicast2, @multicast2, {[@ssrr={0x89, 0x17, 0x10, [@multicast1, @empty, @empty, @local={0xac, 0x14, 0x0}, @rand_addr=0x6]}, @rr={0x7, 0x1f, 0xfe, [@multicast1, @multicast2, @remote={0xac, 0x14, 0x0}, @local={0xac, 0x14, 0x0}, @broadcast, @multicast1, @empty]}, @rr={0x7, 0xb, 0x0, [@rand_addr=0x80000001, @remote={0xac, 0x14, 0x0}]}]}}, @udp={{0x1, 0x1, 0x8}}}}}}) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f0000000000)={0x20000000000000ac, &(0x7f0000000140)=[{0x3, 0x8, 0x0, 0x4}, {0x7, 0x9, 0x3, 0x20000004}, {0xfff, 0x89, 0x6, 0x20003}]}) fcntl$lock(r2, 0xb, &(0x7f0000000140)={0x2, 0x2, 0x4}) sigqueue(0x0, 0x2, @sival_ptr=0xfff) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) posix_fallocate(r0, 0x2, 0x5) aio_write(0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) syz_emit_ethernet(0x34, &(0x7f0000000140)=ANY=[]) recvfrom$unix(0xffffffffffffffff, &(0x7f0000000040)=""/150, 0x96, 0x40, &(0x7f0000000100)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8) 2.699766484s ago: executing program 3 (id=207): openat$crypto(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe800000"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x200201, 0x27) socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r1, 0x29, 0x48, &(0x7f0000000200), 0x2) syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d900", 0x30, 0x52, 0x0, @rand_addr="3bcc694212fae9849cf1404e6d2ee900", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x6, 0x0, @loopback={0x1000000}, @empty}}}}}}}) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}], 0x2, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, 0x0, r4, &(0x7f0000000240)='./file0\x00') setresuid(0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) r6 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ioctl$SMB_READB(r6, 0xc024698a, 0x0) r7 = openat$ptmx(0xffffff9c, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000007240)={&(0x7f00000022c0)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="08000000000000003e0001000000f9ee9b41b27dc5e760bcab36e35a8fd835bf7c98a923858376c5682d038e4f16ad258f642640e6cf353e4445cd34eb45381a82156e2975fa6134f91bc6", @ANYRES32=r7, @ANYBLOB="10000000ffff000001000000", @ANYRES32=r7], 0x20, 0x104}, 0x100) syz_emit_ethernet(0x3a, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb08004500002c0000200404009078ac1400bbffffffff179d64ca430bb096c6832c54f9679e29dba3ef488e11ee144c787de0"]) syz_emit_ethernet(0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb08004507001c0000200800009078ac1400bbffffffff4e214e2200089078"]) syz_emit_ethernet(0x52, &(0x7f0000000080)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x3, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0xff, 0x0, {0x9, 0x4, 0x0, 0x8, 0x5, 0x66, 0x800, 0x3, 0x1e, 0x401, @rand_addr=0x6, @loopback, {[@end, @ssrr={0x89, 0x3, 0x1}, @ssrr={0x89, 0x3, 0xb}, @ra={0x94, 0x6, 0x1}]}}, "7b1f2915"}}}}}) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2.368575885s ago: executing program 0 (id=129): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe800000000000"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) r1 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d900", 0x30, 0x52, 0x0, @rand_addr="3bcc694212fae9849cf1404e6d2ee900", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x6, 0x0, @loopback={0x1000000}, @empty}}}}}}}) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}], 0x2, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r4, &(0x7f0000000240)='./file0\x00') setresuid(0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) r6 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ioctl$SMB_READB(r6, 0xc024698a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) r7 = openat$ptmx(0xffffff9c, &(0x7f0000000e00), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000007240)={&(0x7f00000022c0)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000007040)=[@rights={0x10, 0xffff, 0x1, [r7]}, @rights={0x10, 0xffff, 0x1, [r7]}], 0x20, 0x104}, 0x100) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x2004, 0x4, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @generic="179d64ca430bb096c6832cde18679e29dba3ef488e11ee14"}}}}) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2008, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x52, &(0x7f0000000080)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x3, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0xff, 0x0, {0x9, 0x4, 0x0, 0x8, 0x5, 0x66, 0x800, 0x3, 0x1e, 0x401, @rand_addr=0x6, @loopback, {[@end, @ssrr={0x89, 0x3, 0x1}, @ssrr={0x89, 0x3, 0xb}, @ra={0x94, 0x6, 0x1}]}}, "7b1f2915"}}}}}) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) 300.513473ms ago: executing program 1 (id=208): sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) r1 = socket$inet6(0x1c, 0x2, 0x0) sendmsg$inet6_sctp(r1, &(0x7f00000001c0)={&(0x7f0000000200)=@in={0x0, 0x2, 0x1, @remote={0xac, 0x14, 0x0}}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=ANY=[], 0x14, 0x10006}, 0x8d) freebsd10_pipe(&(0x7f0000000440)={0xffffffffffffffff}) r3 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, r3, &(0x7f0000000280)='.\x00', 0x21000630) r5 = open$dir(&(0x7f0000000100)='.\x00', 0x0, 0x6) freebsd11_getdents(r5, 0x0, 0x0) r6 = socket(0x1b, 0x3, 0x0) sendto$inet6(r6, &(0x7f0000000180)="0206000302000300000000008fc30d4e", 0x10, 0x188, 0x0, 0x0) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) chflags(&(0x7f0000000180)='./file0\x00', 0x20000) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) ioctl$DIOCNATLOOK(r2, 0x4004667f, &(0x7f00000003c0)="57eea7da56da2d4a7aede543c7339e1d58450ac7580df2831ab51ecb7797901e1ac9467c5260c8655b575f1b6254ff1f4dd20111a8ccd21c4ba6d2e516fe8d6720a8e8dd0e2b8acfcf3c11a03c265126fb31d5012fb7871ac81eb8a6df4543451744526bf280998eacaeb362cc55") pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) kmq_open(&(0x7f0000000080)='./file0\x00', 0x200, 0x102, 0x0) rfork(0x81000) accept$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs={0x8}, &(0x7f0000000140)=0x8) listen(r0, 0x8) r7 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) extattr_list_file(&(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000b80)=""/4096, 0x1000) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000300)={'bbr\x00', 0xb}, 0x24) socket(0x1c, 0x1, 0x0) open(&(0x7f0000000240)='./file0\x00', 0x200, 0x4) select(0x0, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x4, 0x0, 0x9, 0x10000, 0x5}, 0x0, 0x0) 294.316193ms ago: executing program 2 (id=209): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000040)='hfsp\x00', 0x0, 0x8400004, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x4000, [0x7ffffffffffffffd, 0x0, 0xffffffffffffffff]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x3, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) socket$inet6(0x1c, 0x20000000, 0x3) getsockname$unix(r1, &(0x7f00000004c0)=@file={0xf0, 0x0, ""/238}, &(0x7f00000000c0)=0xf0) aio_write(0x0) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x48) setrlimit(0x8, &(0x7f0000000000)={0x9, 0x8000000000000000}) pipe2(0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 290.391525ms ago: executing program 3 (id=210): __getcwd(&(0x7f0000000100)=""/3, 0x3) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) kevent(0xffffffffffffffff, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x4, 0xfffffffffffffff5, 0x10, 0x40, 0x0, 0x2, [0x4, 0x0, 0x1, 0x1]}], 0x2, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) aio_write(&(0x7f0000000240)={r0, 0x80001001, &(0x7f0000000380)="e2", 0x1, [0x0, 0x2ecc], 0xfffffffd, 0x8, 0x0, {0x0, 0x6, 0x0}, {0x0, 0x0, @sival_int=0xfffffff8}}) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) aio_write(&(0x7f0000000680)={r1, 0x0, 0x0, 0x0, [0x14, 0x3], 0x0, 0x0, 0xffffffff, {0x8000000000, 0x3, 0x0}, {0x0, 0x4000014, @sival_int=0xa2e5, @spare=[0xfffffffffffffff9, 0x40, 0x9, 0x43, 0xfe, 0x7, 0x5, 0x9]}}) aio_error(&(0x7f0000000680)={0xffffffffffffffff, 0x15e, 0x0, 0x0, [0x5, 0x7], 0x8, 0x18, 0x7, {0x2, 0x8, 0x0}, {0x7, 0x5, @sival_int, @thr={0x0, 0x0}}}) 124.046377ms ago: executing program 3 (id=211): open(0x0, 0x7843d88b80d1cecd, 0x100) truncate(&(0x7f0000000040)='./file0\x00', 0xaa47f) r0 = shmget$private(0x0, 0x4000, 0x80, &(0x7f0000ffa000/0x4000)=nil) setuid(0xee01) shmctl$IPC_RMID(r0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x16, 0x0, 0x20, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798d25cd0a9cfbc8c96469dc0119723f87f", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0x1000]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x0, 0x8000, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000001400)}) bind$inet6(r1, &(0x7f0000000100)={0x1c, 0x1c, 0x0, 0xfd, @empty}, 0x1c) bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0xbc0, @loopback, 0x7}, 0x1c) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) shmctl$IPC_RMID(r0, 0x0) __specialfd$eventfd(0x1, &(0x7f0000000040)={0xfffffffd, 0x1}, 0x8) freebsd11_statfs(&(0x7f0000000000)='./file0\x00', &(0x7f00000003c0)) 0s ago: executing program 0 (id=129): __getcwd(&(0x7f0000000100)=""/3, 0x3) syz_emit_ethernet(0x5e, &(0x7f0000000080)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaa02aa86dd60cc58da00280000fe800000000000"]) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x27) r1 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r1, 0x29, 0x1a, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x66, &(0x7f0000000080)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "d900", 0x30, 0x52, 0x0, @rand_addr="3bcc694212fae9849cf1404e6d2ee900", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x6, 0x0, @loopback={0x1000000}, @empty}}}}}}}) __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r2 = kqueue() kevent(r2, &(0x7f00000002c0)=[{0x1, 0xfffffffffffffffa, 0x1, 0x0, 0x0, 0x0, [0x7ffffffffffffffd]}, {0x186, 0x0, 0x0, 0xc0000000, 0x4, 0x1, [0x0, 0x100, 0x3, 0x100000000]}], 0x2, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = open$dir(&(0x7f0000001240)='.\x00', 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r4, &(0x7f0000000240)='./file0\x00') setresuid(0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000000c0)={0xfffeffff, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x10, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0xfc) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) r6 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ioctl$SMB_READB(r6, 0xc024698a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) r7 = openat$ptmx(0xffffff9c, &(0x7f0000000e00), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r8, &(0x7f0000007240)={&(0x7f00000022c0)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, &(0x7f0000007040)=[@rights={0x10, 0xffff, 0x1, [r7]}, @rights={0x10, 0xffff, 0x1, [r7]}], 0x20, 0x104}, 0x100) syz_emit_ethernet(0x3a, &(0x7f0000000180)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x2004, 0x4, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @generic="179d64ca430bb096c6832cde18679e29dba3ef488e11ee14"}}}}) syz_emit_ethernet(0x2a, &(0x7f0000000040)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2008, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x52, &(0x7f0000000080)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x44, 0x0, 0x3, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0xff, 0x0, {0x9, 0x4, 0x0, 0x8, 0x5, 0x66, 0x800, 0x3, 0x1e, 0x401, @rand_addr=0x6, @loopback, {[@end, @ssrr={0x89, 0x3, 0x1}, @ssrr={0x89, 0x3, 0xb}, @ra={0x94, 0x6, 0x1}]}}, "7b1f2915"}}}}}) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f0000000000), 0x4, 0x92b) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.5' (ED25519) to the list of known hosts. md1: truncating fractional last sector by 3 bytes md0: truncating fractional last sector by 1 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 lock order reversal: 1st 0xffffffff830019c0 proctree (proctree, sx) @ /syzkaller/managers/i386/kernel/sys/kern/kern_ktrace.c:1151 2nd 0xfffffe006ebffac0 ufs (ufs, lockmgr) @ /syzkaller/managers/i386/kernel/sys/kern/vfs_vnops.c:581 lock order proctree -> ufs attempted at: #0 0xffffffff816a3722 at witness_checkorder+0x1652 #1 0xffffffff8150a7e6 at lockmgr_lock_flags+0x1d6 #2 0xffffffff81de99fb at ffs_lock+0x18b #3 0xffffffff8235ade7 at VOP_LOCK1_APV+0x57 #4 0xffffffff8181463e at _vn_lock+0x14e #5 0xffffffff81814ee8 at vn_close1+0x1e8 #6 0xffffffff814fc0fa at ktrops+0x41a #7 0xffffffff814fb86d at sys_ktrace+0xaed #8 0xffffffff823204f2 at ia32_syscall+0x4d2 #9 0xffffffff82135eff at int0x80_syscall_common+0x9c Out of ktrace request objects. Jan 8 17:21:38 ci-freebsd-i386-if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 4 dhclient[807]:if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 Interface tap0 is down, dhclient exiting if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 Jan 8 17:21:38 ci-freebsd-i386-4 dhclient[807]: connection closed Jan 8 17:21:38 ci-freebsd-i386-4 dhclient[807]: exiting. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 Expensive callout(9) function: 0xffffffff81afc400(0) 0.004776663 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c4c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 SYZFAIL: invalid kcov comp type type=ffffffff8185c8e7 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff81888f70 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=0 req=129 state=3 status=67 (errno 35: Resource temporarily unavailable) if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 FreeBSD/amd64 (ci-freebsd-i386-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 show registers Password: Login incorrect login: ps Jan 8 17:22:12 ci-freebsd-i386-4 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl