last executing test programs: 30.839516611s ago: executing program 0 (id=77): r0 = socket(0x1c, 0x10000000, 0x8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000280)=ANY=[], 0x8) dup2(0xffffffffffffffff, 0xffffffffffffffff) r1 = fork() wait4(r1, 0x0, 0x2, 0x0) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x3, @multicast1}, 0x10, &(0x7f0000000280)=[{0x0}, {0x0}, {&(0x7f0000000140)}, {&(0x7f00000002c0)="7913820dbcc6c1c68f37338ca40879a836d98dcae2dbbc4c296da4", 0x1b}, {&(0x7f0000000500)}], 0x5, 0x0, 0x0, 0x144}, 0x4) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r3) __specialfd$eventfd(0x1, &(0x7f0000000000)={0x0, 0x5}, 0x8) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r4, 0x80000001, &(0x7f0000000040)="9e", 0x1, [0x4, 0x1ff], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x2, 0x0, @sigval_int=0x1053, @ke_flags=0x9fc040a3bd859cca}}) r5 = kqueue() kevent(r5, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x11, 0x0, 0x0, 0x4, [0x0, 0x0, 0x0, 0x200000005c95]}, {0x4, 0xfffffffffffffffe, 0x15, 0x40000000, 0x8000000000000, 0x0, [0x0, 0x3]}], 0x2, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) r7 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_readv(&(0x7f0000000400)={r7, 0x47b, &(0x7f00000001c0)="5b04", 0x2, [], 0x5, 0x0, 0x3, {0x0, 0xfffffffe, 0x0}, {0x0, 0x0, @sival_ptr=0xfa3, @spare=[0x3ea6205d, 0x200000, 0x1, 0x400, 0x401, 0x1, 0xd, 0x1040]}}) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) kqueue() r8 = open(&(0x7f0000000480)='./file0\x00', 0x1, 0x0) r9 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r9, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x1003, 0x0, 0x0, 0x4, 0x2, 0x10000, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1e, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0xb32e, 0x4, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x1, 0xe122, 0x0, 0x0, 0x0, 0xc, 0x400000, 0x0, 0x9, 0x12, 0x1, 0xdb9, 0x3ff, 0x11, 0x8, 0x0, 0xa7, 0xc37d, 0x7, 0x2000002, 0xc, 0x0, 0x0, 0x0, 0x4, 0xfffffffc, 0x0, 0x1ffffe, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, 0x8000000, 0x8, 0x3, 0xfffffffc, 0x40, 0xfffffffc, 0x2, 0x7, 0xfffffffe, 0x1000, 0xfffffffc, 0x2, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4000, 0x6, 0xfffffffe, 0x3, 0x3ffff, 0x2, 0x0, 0x0, 0xffffffff, 0x0, 0xfdffffff]}) getfh(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)) syz_emit_ethernet(0x4e, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00183aff78042000000014000001000000086500ff020000005e0000000000000000000188009078fe000000fe8000000000000000000000000000aa"]) mlockall(0x2) rfork(0x96014) write(r8, &(0x7f0000000080)="ba", 0x100000) 30.029177937s ago: executing program 0 (id=84): r0 = socket(0x1c, 0x10000000, 0x8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000280)=ANY=[], 0x8) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = fork() wait4(r2, 0x0, 0x2, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r3, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x3, @multicast1}, 0x10, &(0x7f0000000280)=[{0x0}, {0x0}, {&(0x7f0000000140)}, {&(0x7f00000002c0)="7913820dbcc6c1c68f37338ca40879a836d98dcae2dbbc4c296da4f9", 0x1c}, {&(0x7f0000000500)}], 0x5, 0x0, 0x0, 0x144}, 0x4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) __specialfd$eventfd(0x1, &(0x7f0000000000)={0x0, 0x5}, 0x8) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r5, 0x80000001, &(0x7f0000000040)="9e", 0x1, [0x4, 0x1ff], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x2, 0x0, @sigval_int=0x1053, @ke_flags=0x9fc040a3bd859cca}}) r6 = kqueue() kevent(r6, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x11, 0x0, 0x0, 0x4, [0x0, 0x0, 0x0, 0x200000005c95]}, {0x4, 0xfffffffffffffffe, 0x15, 0x40000000, 0x8000000000000, 0x0, [0x0, 0x3]}], 0x2, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) r8 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_readv(&(0x7f0000000400)={r8, 0x47b, &(0x7f00000001c0)="5b04", 0x2, [], 0x5, 0x0, 0x3, {0x0, 0xfffffffe, 0x0}, {0x0, 0x0, @sival_ptr=0xfa3, @spare=[0x3ea6205d, 0x200000, 0x1, 0x400, 0x401, 0x1, 0xd, 0x1040]}}) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x9, 0x200, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r9 = open(&(0x7f0000000480)='./file0\x00', 0x1, 0x0) r10 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r10, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x1003, 0x0, 0x0, 0x4, 0x2, 0x10000, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1e, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0xb32e, 0x4, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x1, 0xe122, 0x0, 0x0, 0x0, 0xc, 0x400000, 0x0, 0x9, 0x12, 0x1, 0xdb9, 0x3ff, 0x11, 0x8, 0x0, 0xa7, 0xc37d, 0x7, 0x2000002, 0xc, 0x0, 0x0, 0x0, 0x4, 0xfffffffc, 0x0, 0x1ffffe, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, 0x8000000, 0x8, 0x3, 0xfffffffc, 0x40, 0xfffffffc, 0x2, 0x7, 0xfffffffe, 0x1000, 0xfffffffc, 0x2, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4000, 0x6, 0xfffffffe, 0x3, 0x3ffff, 0x2, 0x0, 0x0, 0xffffffff, 0x0, 0xfdffffff]}) getfh(&(0x7f0000000100)='./file0\x00', 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00183aff78042000000014000001000000086500ff020000005e0000000000000000000188009078fe000000fe8000000000000000000000000000aa"]) mlockall(0x2) rfork(0x96014) write(r9, &(0x7f0000000080)="ba", 0x100000) 29.152293827s ago: executing program 0 (id=88): r0 = socket(0x1c, 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000a80)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r2, 0x1) writev(r2, &(0x7f0000000c00)=[{&(0x7f0000000b00)="960f3c1128793fe7599a5424997c39c8407dd1fff4", 0x15}, {&(0x7f0000000b40)="d279c40bb4ab7f7662b13116cb1ef6ecc37c9263dc427f0afc40604f324c29b06a53d70cd21eafcd4d890c3ee9f8b10bf4d2379d21b4772280abd6578457c97a", 0x40}], 0x2) readv(r3, &(0x7f0000002640)=[{&(0x7f00000011c0)=""/4096, 0x1000}], 0x1) r4 = open(&(0x7f0000000040)='./file0\x00', 0x18289, 0x114) lseek(r4, 0x10001, 0xf4117b07cc254307) setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x51, &(0x7f0000000500)={0x18b, {{0x10, 0x2, 0x1, @multicast2}}}, 0x84) r5 = kqueue() kevent(r5, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r6 = socket$inet6(0x1c, 0x2, 0x0) connect$inet6(r6, &(0x7f0000000040)={0x1c, 0x1c, 0x1, 0x0, @empty, 0x7}, 0x1c) sendto$inet6(r6, &(0x7f0000000300)="e1d466e1e771e0a6252a7cc00a8b1f368eff7cafafe64fa2c550fbaa1ef29767431e8e4169a686bd2bb019e519507dae4d6950f4c4f4f14836e3982c5fc759f1532ea2d166aabb5d446623d242d7712d48e9d26639", 0x55, 0x4, 0x0, 0x0) getgid() recvmsg(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=""/100, 0x64}, 0x42) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x46, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa0800470000380000000000049078e0000002ac1400aa57077b3bc4b1b5000bb149d416c0f5e54a5e065a6500000045000000000000f400000000"]) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) mkdir(&(0x7f0000000280)='./file0\x00', 0x0) accept(r3, &(0x7f0000000000)=@in={0x10, 0x2, 0xffffffffffffffff, @local}, &(0x7f0000000080)=0x10) pipe2(&(0x7f0000000200), 0x100000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sysarch$AMD64_CLEAR_PKRU(0x86, &(0x7f0000000140)={&(0x7f00000000c0)="2b38038e4ca6148c867080dcc1c49809126e5e20a42f57c79092be1154b46b97b57cadadc38c500857c8e925ae82487054394bf151f75f622d89250ddba6545d9e536ef5b2ee372be162a5c713", 0x4d, 0x8, 0x2}) 28.119122929s ago: executing program 0 (id=93): aio_waitcomplete(0x0, 0x0) (async) aio_waitcomplete(0x0, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) profil(0x0, 0x0, 0x1, 0xd6) r0 = socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x2) sendmsg$unix(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="28000000ffff000001"], 0x28, 0x3010b}, 0x0) connectat$unix(0xffffffffffffffff, r2, 0x0, 0x0) (async) connectat$unix(0xffffffffffffffff, r2, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) socket(0x1, 0x5, 0xfc) (async) r4 = socket(0x1, 0x5, 0xfc) bind$inet6(0xffffffffffffffff, 0x0, 0x0) (async) bind$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) minherit(&(0x7f00004ac000/0x3000)=nil, 0x3000, 0x1) (async) minherit(&(0x7f00004ac000/0x3000)=nil, 0x3000, 0x1) freebsd11_stat(&(0x7f0000003700)='./file0\x00', &(0x7f0000003740)) (async) freebsd11_stat(&(0x7f0000003700)='./file0\x00', &(0x7f0000003740)={0x0, 0x0, 0x0, 0x0, 0x0}) fstat(r3, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$unix(r2, &(0x7f0000003940)={&(0x7f0000000100)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, &(0x7f0000000640)=[{&(0x7f0000000400)="812b3e62667b1661133f17c42482e7c2c41ae8102fcde95e2f892a2cfcc9490cec4d9755d9495d1cc1f8f2a4e8b54a25563cc1f76724e2083de7912056bc4846a6fe1485fe106ca7f56f6ee134edc1f750a25dea05526e1fa60b784b5e6d13fae9447a1a5bb7a354593d726fe18f4347f8d79813bff02c386485284fa35b173576cdeb6af2c767d3bb2cd27b0f0bc3037a0340ed2b2f8895ed8854e59e78c5d50d", 0xa1}, {&(0x7f00000001c0)="a2db3b0e2d6b1b4f17e8a8254537b411dd5e7a8022c04f279d8d08f76080bc46a058ef1a6f55217b000f9e1380b49f563d51dffb9703c17c584128a78381554997e33095c049f594db242ec3b1e303270003c4dd902464adc8de3981d53d424ab713fdba5a18f5c5b8d6754c90a8cfb78535", 0x72}, {&(0x7f00000004c0)="7ad2d7494de8b455cd37489ba9aef905ec5967c1c5fabdfda7c94776fc0672bb04e3fffb3da97cce2e9713083b7548f71fc97bddbad7211c60a204e5f70a4aee381c5a32da38e0f9cae58ba394f4028f2813e510578701e7a6bd5fa0a84aa7eaa301af3b2899d2535b673fe6db9e77f1d54891bb72c2fad59e855433f5e7ab4d36eafb08a21fdc135f3b8d6edefc9c93e24dee6505f23be628690c5051ba13b895161e1a353c6b0587502846495a31e6c3d5e0e5bd6c037433ebb6", 0xbb}, {&(0x7f0000000280)="7fb4b05d94884627c7b0c6a3a0bedf68b34923d0f51b67a134b1a061bb516f51d2c3df78ebab", 0x26}, {&(0x7f0000000580)="c9b38f76bd09f8852b408c4ddb2bd577185c52f945b908e1027cfb760de5b0e09618b3b61dadf42036cf65b9d648fa3fa6b6d99fb416380ee5c8ac546ba2165e7dbbf7b57c7b93afbe458b0c4ac0d4e17e5a85250d84ca03d11c46d2e1f8174a43c4929ace80b06278b0cf9731b71aeac3b95d747570c2ea2b71c789b0ffbadbc6155d000c", 0x85}, {&(0x7f00000018c0)="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", 0x7fe}, {&(0x7f00000002c0)="292ff96ea76ad27d513f48865d0315eafbed808c78f47ce6fb0d61a42bbf12f10746641aad2ee13d437394ab9aac", 0x2e}], 0x7, &(0x7f0000000780)=ANY=[@ANYBLOB="20000000ffff000001020000", @ANYRES32=r0, @ANYRES64=r3, @ANYRES64=r6, @ANYRESOCT=r5, @ANYRES32=r0, @ANYBLOB="10000000ffff000001000000", @ANYRESDEC], 0x30, 0x184}, 0x8) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) syz_emit_ethernet(0x9f, 0x0) rmdir(0x0) (async) rmdir(0x0) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$CIOCGSESSION2(r7, 0xc030636a, &(0x7f0000000300)={0x0, 0x23, 0x0, 0x0, 0x9, &(0x7f00000003c0)="df904edfd9db0dc7af", 0x0, 0x4d46b76e, [0x800000, 0x4000, 0x5]}) getsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000000)={0x0, 0x8}, &(0x7f0000000080)=0xc) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) (async) r8 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r8, &(0x7f0000000040)="84d5c69c169818d2", 0x8, 0x20000, &(0x7f0000000880)={0x1c, 0x1c, 0x1, 0x0, @loopback}, 0x1c) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) (async) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000240)={0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x11, 0xffffffffffffffff, 0x2) (async) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x11, 0xffffffffffffffff, 0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) 27.259698945s ago: executing program 0 (id=98): aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c1, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff020000000000000000"]) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sendmsg$inet6_sctp(r1, 0x0, 0x0) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) lchmod(&(0x7f0000000140)='./file1\x00', 0x1a2) syz_emit_ethernet(0x4e, &(0x7f00000006c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6036ea0700183a000000000000000000e800000000000000fe8000000000000000000000000000aa87009078000000000000000000000000000000000000bd0d"]) open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) acct(&(0x7f0000000000)='./file0\x00') acct(0x0) sendto(r1, &(0x7f00000004c0)="6b3aafb25df98a9a42de7689ae3b7d6bb79bc5d1c24fc32fad44cd519102ca18c1b25613ebe577fe3c3f4fec93913465ade0490f0af7f2c2fdee8d969cb559d4f4149f17f0a256647496e6f09d3fc41a1ec519f764b06d19fe79b7ce0a4944b181cedfd9a17b89637847eda685be2cb818dda374f48c555ee1f87ce97f034f7b8fddf8ed2152350d86288880bb2ef3a61e257a4a5e02612ef5c83d3b32720bdd60dc1b9432ffe15a37d8411d4eeba0b754e362fb7fe04943b893cda8d93012a6ea153e5e02335fd3326586236addba109a479d3161150adb3aef90e56f5bf4a2627089c878cec3ce593b27d64ab9ade7ae", 0xf1, 0x20108, 0x0, 0x0) ioctl$SMB_WRITEB(0xffffffffffffffff, 0xc0086924, 0x0) open(&(0x7f00000012c0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80000000000209, 0xfffffffffffffffc) freebsd11_mknod(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x672cda28f543e327, 0x1) r2 = socket(0x1c, 0x2, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) lpathconf(&(0x7f0000000080)='./file1\x00', 0x3f) madvise(&(0x7f000018c000/0x1000)=nil, 0x1000, 0x5) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r3 = socket(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) connect$inet(r3, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00', 0xa}, 0x24) fstatfs(0xffffffffffffffff, &(0x7f0000000880)) 26.29460361s ago: executing program 0 (id=103): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) cpuset_setid(0x2, 0x0, 0x0) r0 = openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) lio_listio(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000d80)={0x2, 0x1e, @sigval_ptr=0x38, @spare=[0x6, 0x5, 0x6, 0x5, 0x1, 0x7, 0xfd926ff, 0x9]}) ioctl$BIOCSRSIG(r0, 0x80044273, &(0x7f0000000100)=0xf6ad) __semctl$GETPID(0x0, 0x2, 0x4) r1 = socket(0x91ae9151d9abd3c9, 0x3, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1004, 0x0, 0x0) socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) kmq_notify(r0, &(0x7f00000000c0)={0x0, 0x11, @sigval_ptr=0x8f7, @thr={0x0, 0x0}}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r3, 0x0, 0xc, &(0x7f0000000000)={@multicast2, @loopback}, 0x8) getsockopt$inet_buf(r3, 0x0, 0x4a, &(0x7f0000002780)=""/4109, &(0x7f0000001080)=0x100d) getfsstat(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x928, 0x3) r5 = getuid() setresuid(0x0, r4, r5) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r6 = openat$crypto(0xffffff9c, 0x0, 0x400, 0x0) __cap_rights_get(0x0, r6, &(0x7f0000000080)) r7 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086ddf46cf36f2810310ffe8000000000000000000000000000aaff02000006000000000000000000000187009078ef0100000000000000000000000000010f0c57dcf5eaa4a988efdc637bd8519154157ed065ed711f404ae2ffb28ba20b20f722e7f75cb3068c91b9"]) sysarch$I386_GET_LDT(0x0, &(0x7f0000000000)={0x0, 0x0}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xc002010, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) 26.294255886s ago: executing program 32 (id=103): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) cpuset_setid(0x2, 0x0, 0x0) r0 = openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) lio_listio(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000d80)={0x2, 0x1e, @sigval_ptr=0x38, @spare=[0x6, 0x5, 0x6, 0x5, 0x1, 0x7, 0xfd926ff, 0x9]}) ioctl$BIOCSRSIG(r0, 0x80044273, &(0x7f0000000100)=0xf6ad) __semctl$GETPID(0x0, 0x2, 0x4) r1 = socket(0x91ae9151d9abd3c9, 0x3, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1004, 0x0, 0x0) socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) kmq_notify(r0, &(0x7f00000000c0)={0x0, 0x11, @sigval_ptr=0x8f7, @thr={0x0, 0x0}}) connect$inet6(0xffffffffffffffff, 0x0, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r3, 0x0, 0xc, &(0x7f0000000000)={@multicast2, @loopback}, 0x8) getsockopt$inet_buf(r3, 0x0, 0x4a, &(0x7f0000002780)=""/4109, &(0x7f0000001080)=0x100d) getfsstat(&(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x928, 0x3) r5 = getuid() setresuid(0x0, r4, r5) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r6 = openat$crypto(0xffffff9c, 0x0, 0x400, 0x0) __cap_rights_get(0x0, r6, &(0x7f0000000080)) r7 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x4a, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086ddf46cf36f2810310ffe8000000000000000000000000000aaff02000006000000000000000000000187009078ef0100000000000000000000000000010f0c57dcf5eaa4a988efdc637bd8519154157ed065ed711f404ae2ffb28ba20b20f722e7f75cb3068c91b9"]) sysarch$I386_GET_LDT(0x0, &(0x7f0000000000)={0x0, 0x0}) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0xc002010, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6) mlock(&(0x7f0000ffe000/0x2000)=nil, 0x2000) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) 10.824265368s ago: executing program 3 (id=148): aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) r0 = socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x2) sendmsg$unix(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="28000000ffff0000", @ANYRESHEX], 0x28, 0x3010b}, 0x0) connectat$unix(r0, r2, &(0x7f0000000000)=@abs={0x8, 0x0, 0x0, 0x2}, 0x8) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1, 0x5, 0xfc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0), 0x4) unlink(&(0x7f0000000100)='./file0\x00') bind$inet6(r4, &(0x7f0000000340)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x40000000}, 0x10000003}, 0x1c) setresuid(0xffffffffffffffff, 0xee01, 0x0) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r5, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) rmdir(&(0x7f0000000080)='./file0/file1\x00') cpuset_getid(0x1, 0x3, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x1e0, &(0x7f0000511000/0x1000)=nil) r6 = socket$inet6(0x1c, 0x2, 0x0) sendmsg$inet6_sctp(r6, &(0x7f00000001c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0a7e323a55b2000000393e400731bb73"}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r4], 0x14}, 0x0) getsockopt$inet6_buf(r3, 0x29, 0x19, &(0x7f0000000280)=""/127, &(0x7f0000000040)=0x7f) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000004c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x10) kqueue() open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x4, 0x190) utimensat(r7, &(0x7f00000003c0)='./file0/file1\x00', &(0x7f0000000400)={{0x9}, {0xfffffbff, 0x6}}, 0x200) 8.828949594s ago: executing program 1 (id=150): socket(0x1c, 0x1, 0x0) setuid(0xffffffffffffffff) ktrace(0x0, 0x1, 0x4000, 0xffffffffffffffff) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0xc, &(0x7f0000000080)={@multicast1, @rand_addr=0xfffffffa}, 0xc) r1 = kqueue() kevent(r1, &(0x7f0000000280)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x3, [0xe, 0x0, 0x0, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r2, 0xb7c5) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff}) close(r3) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) fork() preadv(0xffffffffffffffff, &(0x7f0000001780)=[{0x0}], 0x1, 0x0) fork() accept4(r2, 0x0, 0x0, 0x0) syz_emit_ethernet(0xe, 0x0) writev(0xffffffffffffffff, &(0x7f0000000240), 0x0) socket(0x1c, 0x1, 0x0) r4 = msgget$private(0x0, 0x790) msgsnd(r4, &(0x7f0000000100)=ANY=[@ANYRES8], 0x401, 0x0) msgsnd(r4, &(0x7f0000000140)=ANY=[@ANYBLOB="02000000e5c8eb87bffae1c7a75d9ac50e30ebd02773a861f58070355d6bd6777af9aaca8b92e474a7ebd34c60603dc5c8922aee8d2b11da1d7fd0c3059ff79dae31cebcf594ca5364bee5b07ad5c055461f94c0fd445eb9ed57f8642ffadd03e26cf8a73dc3322d2dea9f69ed2a5060c3ec3ac6975428aac0b0f31c93ef1a64a326f6248445de18a365e6db0087a75c975a931285c02bf3225a37d0bc06f59ca15555080b5e9578e73da91cc0d53dc9331756651b47be4ab1e8a8ca"], 0xbd, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x400000, 0x0) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r5 = socket(0x2, 0x1, 0x0) sysarch$AMD64_SET_FSBASE(0x88, &(0x7f0000000300)) setsockopt$inet_tcp_int(r5, 0x6, 0x200, &(0x7f00000002c0)=0x400009, 0x4) 8.815782521s ago: executing program 3 (id=152): aio_waitcomplete(0x0, 0x0) munmap(&(0x7f0000ffb000/0x3000)=nil, 0xffffffffffffffff) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x0, 0x88f]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080), 0x100004) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f0000009140)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="10000000ffff000001000000", @ANYRES32=r1, @ANYBLOB="60000000ffff"], 0x70}, 0x80) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 6.690070377s ago: executing program 1 (id=154): ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') truncate(&(0x7f0000000080)='./file1\x00', 0xea59) r1 = open$dir(&(0x7f0000000fc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) r2 = open$dir(0x0, 0x0, 0x0) mkdirat(r2, &(0x7f0000000a80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r3 = open$dir(&(0x7f0000000040)='.\x00', 0x8, 0x10) symlinkat(&(0x7f0000000300)='./file0\x00', r3, 0x0) rename(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 6.681649917s ago: executing program 2 (id=155): r0 = socket(0x1c, 0x10000000, 0x8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000280)=ANY=[], 0x8) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = fork() wait4(r2, 0x0, 0x2, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r3, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x3, @multicast1}, 0x10, &(0x7f0000000280)=[{0x0}, {0x0}, {&(0x7f0000000140)}, {&(0x7f00000002c0)="7913820dbcc6c1c68f37338ca40879a836d98dcae2dbbc4c296da4", 0x1b}, {&(0x7f0000000500)}], 0x5, 0x0, 0x0, 0x144}, 0x4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) __specialfd$eventfd(0x1, &(0x7f0000000000)={0x0, 0x5}, 0x8) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r5, 0x80000001, &(0x7f0000000040)="9e", 0x1, [0x4, 0x1ff], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x2, 0x0, @sigval_int=0x1053, @ke_flags=0x9fc040a3bd859cca}}) r6 = kqueue() kevent(r6, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x11, 0x0, 0x0, 0x4, [0x0, 0x0, 0x0, 0x200000005c95]}, {0x4, 0xfffffffffffffffe, 0x15, 0x40000000, 0x8000000000000, 0x0, [0x0, 0x3]}], 0x2, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x9, 0x200, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r8 = open(&(0x7f0000000480)='./file0\x00', 0x1, 0x0) r9 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r9, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x1003, 0x0, 0x0, 0x4, 0x2, 0x10000, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1e, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0xb32e, 0x4, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x1, 0xe122, 0x0, 0x0, 0x0, 0xc, 0x400000, 0x0, 0x9, 0x12, 0x1, 0xdb9, 0x3ff, 0x11, 0x8, 0x0, 0xa7, 0xc37d, 0x7, 0x2000002, 0xc, 0x0, 0x0, 0x0, 0x4, 0xfffffffc, 0x0, 0x1ffffe, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, 0x8000000, 0x8, 0x3, 0xfffffffc, 0x40, 0xfffffffc, 0x2, 0x7, 0xfffffffe, 0x1000, 0xfffffffc, 0x2, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4000, 0x6, 0xfffffffe, 0x3, 0x3ffff, 0x2, 0x0, 0x0, 0xffffffff, 0x0, 0xfdffffff]}) getfh(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)) syz_emit_ethernet(0x4e, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00183aff78042000000014000001000000086500ff020000005e0000000000000000000188009078fe000000fe8000000000000000000000000000aa"]) mlockall(0x2) rfork(0x96014) write(r8, &(0x7f0000000080)="ba", 0x100000) 6.680064823s ago: executing program 3 (id=156): r0 = socket(0x1c, 0x10000000, 0x8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000280)=ANY=[], 0x8) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = fork() wait4(r2, 0x0, 0x2, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r3, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x3, @multicast1}, 0x10, &(0x7f0000000280)=[{0x0}, {0x0}, {&(0x7f0000000140)}, {&(0x7f00000002c0)="7913820dbcc6c1c68f37338ca40879a836d98dcae2dbbc4c296da4f9", 0x1c}, {&(0x7f0000000500)}], 0x5, 0x0, 0x0, 0x144}, 0x4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) __specialfd$eventfd(0x1, &(0x7f0000000000)={0x0, 0x5}, 0x8) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r5, 0x80000001, &(0x7f0000000040)="9e", 0x1, [0x4, 0x1ff], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x2, 0x0, @sigval_int=0x1053, @ke_flags=0x9fc040a3bd859cca}}) r6 = kqueue() kevent(r6, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x11, 0x0, 0x0, 0x4, [0x0, 0x0, 0x0, 0x200000005c95]}, {0x4, 0xfffffffffffffffe, 0x15, 0x40000000, 0x8000000000000, 0x0, [0x0, 0x3]}], 0x2, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) r8 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_readv(&(0x7f0000000400)={r8, 0x47b, &(0x7f00000001c0)="5b04", 0x2, [], 0x5, 0x0, 0x3, {0x0, 0xfffffffe, 0x0}, {0x0, 0x0, @sival_ptr=0xfa3, @spare=[0x3ea6205d, 0x200000, 0x1, 0x400, 0x401, 0x1, 0xd, 0x1040]}}) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x9, 0x200, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r9 = open(&(0x7f0000000480)='./file0\x00', 0x1, 0x0) r10 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r10, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x1003, 0x0, 0x0, 0x4, 0x2, 0x10000, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1e, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0xb32e, 0x4, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x1, 0xe122, 0x0, 0x0, 0x0, 0xc, 0x400000, 0x0, 0x9, 0x12, 0x1, 0xdb9, 0x3ff, 0x11, 0x8, 0x0, 0xa7, 0xc37d, 0x7, 0x2000002, 0xc, 0x0, 0x0, 0x0, 0x4, 0xfffffffc, 0x0, 0x1ffffe, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, 0x8000000, 0x8, 0x3, 0xfffffffc, 0x40, 0xfffffffc, 0x2, 0x7, 0xfffffffe, 0x1000, 0xfffffffc, 0x2, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4000, 0x6, 0xfffffffe, 0x3, 0x3ffff, 0x2, 0x0, 0x0, 0xffffffff, 0x0, 0xfdffffff]}) getfh(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)) syz_emit_ethernet(0x4e, &(0x7f0000000280)=ANY=[]) mlockall(0x2) rfork(0x96014) write(r9, &(0x7f0000000080)="ba", 0x100000) 6.509778167s ago: executing program 1 (id=157): socket(0x1c, 0x1, 0x0) extattr_set_file(&(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000000), 0x0, 0x0, 0xff43, 0x0) socket(0x1c, 0x1, 0x0) socket(0x26, 0x1, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x60a44, 0x14) aio_write(&(0x7f0000000340)={r1, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r4, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7, 0x3, 0x0, 0x8, 0x4, 0x0, 0xa, 0x0, 0x10000000, 0x0, [0x0, 0x2, 0x4, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x6, 0xb32c, 0x4, 0x400, 0x0, 0x1, 0xfffffffe, 0x3, 0x0, 0x0, 0x0, 0x6, 0x5, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe122, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0xf, 0xfffffffd, 0x0, 0x3ff, 0x11, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0xffffffff, 0x0, 0x92f, 0x0, 0x4, 0x0, 0x1000, 0x0, 0x200000, 0x6, 0x0, 0x0, 0x0, 0xfffffffc, 0x7, 0x7f, 0x3, 0x2, 0x8, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xa, 0x8, 0x1000, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x5, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xffffffff]}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x40000, 0x0) aio_waitcomplete(0x0, 0x0) munmap(&(0x7f0000ffb000/0x3000)=nil, 0xffffffffffffffff) socket(0xcea957e796b7bb96, 0x3, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000240)={0x3, 0x3, 0x0, 0xf7ffffff}) r5 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_mreqsrc(r5, 0x0, 0x49, &(0x7f0000000040)={@multicast1, @empty, @local={0xac, 0x14, 0x0}}, 0xc) socket(0x1c, 0x1, 0x0) symlink(0x0, &(0x7f0000000100)='./file0\x00') socket(0x1c, 0x1, 0x0) r6 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r6, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffedb, 0x149}, 0x30009) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) socket(0x26, 0x2, 0x0) 4.625707586s ago: executing program 1 (id=158): setrlimit(0x7, &(0x7f0000000040)={0x2, 0x7}) setreuid(0xee00, 0x0) vfork() socket$inet6_udplite(0x1c, 0x2, 0x88) socket(0x1b, 0x3, 0x0) r0 = __specialfd$eventfd(0x1, &(0x7f0000000040)={0x3a1, 0xff}, 0x8) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0xca0706ee3fd5d6f6) r1 = openat$filemon(0xffffff9c, &(0x7f0000000a80), 0x40, 0x0) ioctl$FILEMON_SET_FD(r1, 0xc0045301, &(0x7f0000000a40)=r1) r2 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x8, 0xfffffffd) extattr_set_link(&(0x7f0000000380)='./file0\x00', 0x2, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\r\xa3\xa0\x01D\x9e\xca\f\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef/\x91\xcd\xc3\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xa0b9x\\\'\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xb8\x99\xe7\x1c\x00\x00\x00\x00\x00\x00\x00\x00', 0x0, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f0000000ac0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#I\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6L|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$\x0f\x8bU\xe1\a\x00\x00\x00\x00\x00\x00\x00+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1cy\xec\xc8\xba\xe9\x06F\xe8\xa9\xefZ\\Z\xbez\xc8O+\x91gFe_\x12[\x94\x8b(e<\x97D\x1cB\t\xdb\'3\xe3\xbe4_\xd9\xc6\xf7\f(\xe5\xcb\xaeZ\xb8Y\xa7\xfa\xf2=\xfb\xae\xea\x85\x8f\xe6B\x9d\xb0\xdd\xf0\xd1\xc2\xb6S\xd0\xd6\xbc\"\xda|6\xf0\xa6K\xad\xc3\x9a6\x01\xd5I\x9a\xbdv\xed\xd7\x92T\xd43\xe8\xa4\x05\x18A\x8fc\x98l\xafMJ\xd2x\xd1\xf5)2\x95\x80Y\x8f\xb0N\x95\x8f}\x8b\xf1\x8a\xbf\x82D\xaf\xf1]\xbdJ\xc3N\x9dLh\xebG\n\xe0\xde\xfe\xcb\xb3@\xadIZ\xbb\xcdc\x1fM=\xf1\x18S\xd5\xc5D\x9c\xde \xec.\x85\x12p\x1e:\b{\x0e\xf6\xd7a\xa94\x0f\x95\xea\xfdr\x0e\x00\xba\x00'/412) r3 = socket(0x1c, 0x1, 0x0) chdir(0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r4, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) kevent(r0, &(0x7f00000002c0)=[{0xace, 0xfffffffffffffffa, 0x4d2d8dd755ef8eb, 0x40000000, 0x4, 0x10, [0x6, 0x2, 0xfd, 0x4]}], 0x1, 0x0, 0x0, 0x0) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r5, 0x40000000002, &(0x7f0000000240)="a3", 0x1, [0x5], 0x8000, 0x0, 0x1, {0x9, 0xffffffffffffffff, 0x0}, {0x3, 0x0, @sigval_int=0x10001, @spare=[0x4, 0x4, 0x101, 0x0, 0x1, 0x10, 0x200, 0x8]}}) ksem_open(&(0x7f0000002580), &(0x7f0000000100)='\x00\xee\xd4\x94\\]\xaa\xf2\x1b<\x89\xb2p\x8ci\x1f\xc6\x9e\xa4\x9foXK\x03\x00\x00\x00\x00\x00\x00\x00\xecw\x0f\xd2\xadk\x00W\x86\x02\x05\x85\xfc&\xbf\t\xae\xe1\xa2\xea0\xfa\xa9\'\xca\xe1\xda\xec\xd8k\xb5\x93e\x1e\x8d}{&\x8b', 0xa00, 0x34, 0x9) copy_file_range(r5, &(0x7f0000000000)=0x80000001, r5, 0x0, 0x100000, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x4) r6 = getpid() rtprio(0x1, r6, &(0x7f0000000580)={0x2, 0x4}) shmctl$IPC_STAT(0x0, 0x2, 0x0) aio_read(&(0x7f0000000180)={r2, 0x0, &(0x7f0000000500)="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", 0x121, [0xc7, 0x4], 0x80, 0x8, 0x4, {0x8000000f, 0x7, 0x0}, {0x0, 0xa, @sival_int=0x10, @spare=[0x9, 0x80, 0x1, 0xd46, 0x5, 0x6, 0x9, 0x10]}}) 4.623773245s ago: executing program 2 (id=159): pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) r2 = openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000d80)={0x1, 0x20, @sigval_ptr=0xe, @spare=[0x4005, 0x5, 0x6, 0x5, 0x8, 0x7, 0xfd926ff, 0x9]}) ioctl$BIOCGETBUFMODE(r2, 0x4004427d, &(0x7f0000000200)) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) ioctl$BIOCSRSIG(r2, 0x80044273, &(0x7f0000000100)=0xf6ad) r5 = semget$private(0x0, 0x1, 0x1) __semctl$GETPID(r5, 0x2, 0x4) r6 = socket(0x91ae9151d9abd3c9, 0x20000000, 0x4) setsockopt$sock_int(r6, 0xffff, 0x1004, &(0x7f0000000000)=0x4, 0x4) socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) syz_emit_ethernet(0x0, 0x0) setsockopt$sock_splice(r0, 0xffff, 0x1023, &(0x7f0000000040)={r6, 0x8, {0xab2, 0x3ff}}, 0x14) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3, 0x3, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2b0d}, 0x1c, &(0x7f0000000240)=[{&(0x7f00000002c0)="a1102dbe38d27c1974a9be59ee79fcf728254fe15e370d12fb6c906e7063769553623a31755e107eb69a7ce9695d6941a5c846565ca03bdb4f0801b787acd5042c4ca6654fb65a21adfecbf75c15a30d32dfef7c38d9aa2a7d0f98e5864a1ef3cbcafba1451090225c3267f7cbe1f3fcb5fba9b7a67dd4b3735f509d0ef4", 0x7e}, {&(0x7f0000000340)="f01f8f2549230a4f25c9debfb6cdc6d53279458c4f62fb6add15deb6aa5b8fbaa28d67d8a23bf946d70a513dad23e34b0ca63fbe37f0b93481433e3e8a9ec9a9b5c0d4996fdb65752b8bdbdc8a723cafa3e2bc40c786068da7e7e60c5f189c3fdabcc5d36012ff8252b0008e1f65217527cb5c577fd5d788c8399e6079c216b0784fc03872029d817f35e40f7d86b1022c2d630ff6f8a8959902d0b5bcaf5407", 0xa0}, {&(0x7f0000000400)="837a64cb43b7cce49769ec5458c026ef4fbd38f27b4f4fa90caaf89c3839146ba4aafc96acde18c7a7b870e98280c3f0dbf0d0d5c54f9f671d698795d11aa1caa6775dc6f87551d3719d3c7249239ec324322d5299c9", 0x56}, {&(0x7f0000000500)="2c0af55d77bac4223380162e16c4259e0ab8b40dc6e1a57bd6984d0ff9d803081ef89cdeb4857e31e85c7372a4f9e35a0c4ee72969011393b8e5b7a66cee5cd38caa70163759d2d95bd48f23e1baee4d3bd8bee5bb27b16356cb24358618ee95984378db84c85eceb5044e1631d662371d0df50a6e94c3f8676598719830623abb860834a4bfd984571628", 0x8b}], 0x4, 0x0, 0x0, 0x149}, 0x239cc2853cea1ba9) writev(0xffffffffffffffff, 0x0, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) __cap_rights_get(0x0, r7, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) sendmsg(r1, &(0x7f0000000600)={&(0x7f0000000280)=@in6={0x1c, 0x1c, 0x0, 0x3, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c, 0x0, 0x0, 0x0}, 0x1) 4.622875768s ago: executing program 3 (id=160): aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) r0 = socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x2) sendmsg$unix(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="28000000ffff0000", @ANYRESHEX], 0x28, 0x3010b}, 0x0) connectat$unix(r0, r2, &(0x7f0000000000)=@abs={0x8, 0x0, 0x0, 0x2}, 0x8) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1, 0x5, 0xfc) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0), 0x4) unlink(&(0x7f0000000100)='./file0\x00') bind$inet6(r4, &(0x7f0000000340)={0x1c, 0x1c, 0x2, 0x0, @ipv4={'\x00', '\xff\xff', @rand_addr=0x40000000}, 0x10000003}, 0x1c) setresuid(0xffffffffffffffff, 0xee01, 0x0) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r5, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) rmdir(&(0x7f0000000080)='./file0/file1\x00') cpuset_getid(0x1, 0x3, 0x0, 0x0) shmget$private(0x0, 0x1000, 0x1e0, &(0x7f0000511000/0x1000)=nil) r6 = socket$inet6(0x1c, 0x2, 0x0) sendmsg$inet6_sctp(r6, &(0x7f00000001c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0a7e323a55b2000000393e400731bb73"}, 0x1c, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYRES32=r4], 0x14}, 0x0) getsockopt$inet6_buf(r3, 0x29, 0x19, &(0x7f0000000280)=""/127, &(0x7f0000000040)=0x7f) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000004c0)={0x3, [0x0, 0x0, 0x0]}, &(0x7f0000000240)=0x10) kqueue() open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x4, 0x190) utimensat(r7, &(0x7f00000003c0)='./file0/file1\x00', &(0x7f0000000400)={{0x9}, {0xfffffbff, 0x6}}, 0x200) 2.486219091s ago: executing program 1 (id=161): socket$unix(0x1, 0x2, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc00, 0x105) aio_write(&(0x7f0000001b00)={r0, 0x80000001, &(0x7f0000000240)="526f4da8df81ab2125b8c000e2", 0xd, [0x40000, 0x1ff], 0x0, 0x4, 0x0, {0x0, 0x4, 0x0}, {0x2, 0x4000, @sival_ptr=0xb, @spare=[0x1, 0x2, 0x0, 0x33518c07, 0xdca6, 0x7fffffff, 0x800000000, 0x51c4929]}}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @random="7004f5b37507", [], {@ipv6={0x86dd, {0x0, 0x6, "d900", 0x18, 0x3a, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@mld={0xc2, 0x0, 0x0, 0x7, 0xfff7, @mcast1}}}}}}) aio_waitcomplete(0x0, 0x0) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x8000, 0x0) fork() freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) r2 = socket(0x1c, 0x1, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) aio_writev(&(0x7f00000015c0)={r3, 0x4, &(0x7f00000003c0)="ff", 0x4b, [0x5, 0x8], 0x3, 0x1, 0x0, {0x0, 0xffff, 0x0}, {0x0, 0x5, @sigval_int=0x8}}) syz_emit_ethernet(0x36, &(0x7f00000002c0)={@random="91a6e34dd8bb", @random="cd349da16f26", [], {@ipv6={0x86dd, {0x0, 0x6, "86ead3", 0x0, 0x3c, 0x457ac6f75173a4d0, @empty, @local={0xfe, 0x80, '\x00', 0x0}}}}}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) setreuid(0xee00, 0x0) ioctl$BIOCLOCK(r1, 0x2000427a) socket(0x1c, 0x1, 0x0) r4 = open(&(0x7f0000000280)='./file0\x00', 0x8aa0, 0x31) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0xb6c, 0x0) sendmsg$inet_sctp(r4, &(0x7f0000000140)={&(0x7f0000000400)=@in6={0x1c, 0x1c, 0x3, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x4d}, 0x20000) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd0) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) pipe2(0x0, 0xd505eb4556f41fdb) semget$private(0x0, 0x2, 0x7de) aio_waitcomplete(0x0, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) openat$bpf(0xffffff9c, &(0x7f00000001c0), 0x200, 0x0) 2.457396474s ago: executing program 2 (id=162): rfork(0x85000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0/file0\x00', 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="10000000ffff0000", @ANYRES32=r2], 0x10}, 0x0) recvmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f00000018c0)=""/129, 0x81}, 0x0) 2.456110431s ago: executing program 3 (id=163): socket(0x1c, 0x1, 0x0) r0 = open(&(0x7f00000002c0)='./file0\x00', 0x80000, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x1010, r0, 0x1000) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read(r1, &(0x7f0000001000)=""/223, 0xdf) r2 = socket(0x1c, 0x1, 0x0) getsockopt$inet_tcp_TCP_TXTLS_MODE(r2, 0x6, 0x28, &(0x7f0000000040), &(0x7f0000000180)=0x4) r3 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080), 0x100004) getsockopt$inet_mreqn(r3, 0x0, 0xc, &(0x7f00000000c0)={@multicast1, @remote}, &(0x7f0000000100)=0xc) r4 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r4, 0xffff, 0x1002, &(0x7f0000000300)=0x6, 0x4) sendto(r4, 0x0, 0x0, 0x2000e, &(0x7f0000000340)=@in6={0x1c, 0x1c, 0x2, 0x5, @rand_addr="c9c54ffca05e5564b1b2ac1ed70e4076", 0x22}, 0x1c) sysarch$I386_SET_LDT(0x1, &(0x7f0000000240)={0x3, &(0x7f0000000000)=[{0x3}, {0xb9c}, {0x7f}, {0xaff3}, {0x9}, {0x2}, {0xffffffffffffffff}], 0x7}) sysarch$I386_SET_LDT(0x1, 0x0) aio_waitcomplete(0x0, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000100)=[0x2, 0x9]) socket(0x1c, 0x1, 0x0) r5 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) ioctl$BIOCSETF(r5, 0x80084267, &(0x7f0000000140)={0x0, 0x0}) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) chflags(&(0x7f0000000080)='./file0\x00', 0x119304) open$dir(&(0x7f0000000240)='./file0\x00', 0x40, 0x0) socket(0x1c, 0x1, 0xff) r6 = open(&(0x7f0000000000)='./file0\x00', 0x100000, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x80010, r6, 0x0) r7 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_MODE(r7, 0x6, 0x28, &(0x7f0000000100)=0x2, 0x4) openat$crypto(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) cpuset_getaffinity(0x2, 0x6, 0x4, 0x0, 0x0) 2.2597211s ago: executing program 2 (id=164): aio_waitcomplete(0x0, 0x0) munmap(&(0x7f0000ffb000/0x3000)=nil, 0xffffffffffffffff) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x0, 0x88f]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080), 0x100004) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r1, &(0x7f0000009140)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="10000000ffff000001000000", @ANYRES32=r1, @ANYBLOB="60000000ffff"], 0x70}, 0x80) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 165.505855ms ago: executing program 1 (id=165): symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socket(0x1c, 0x3, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) r0 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r0, 0x0) aio_waitcomplete(0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000480), 0x100000, 0x0) r3 = kqueue() kevent(r3, &(0x7f00000000c0)=[{0x0, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0x20000, 0x8, 0x1000]}, {0x4, 0xffffffffffffffff, 0x7f2, 0x1, 0x0, 0x0, [0xfffffffffffffffd, 0x0, 0x5]}], 0x2, 0x0, 0x0, 0x0) sigaction(0xc, &(0x7f0000000200)={&(0x7f00000002c0)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de351365e5e9989999908", 0x35, {[0xfffff801, 0x50e5, 0xfdffffff]}}, 0x0) r4 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r4, 0x0, 0x1, &(0x7f0000000500)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c921bf0817a0000000000006a89f908000000000003bd1e9d2db8d4f362bba529204a1d97149966fb5315353879b67ce99ee3faf845bac7da73bea4719afa4cda27570bb2c55aa001012361fe7939af0eb4b74eb31e6f48c89b306bcef962739f975f670981a7f08a6a41f3d5409c8d2864edb73c4377ec6c227c365a35", 0x9a) sendto$inet(r1, &(0x7f0000000340)="99106f82e5662b474e4ebca47b11f4ccc0b0e44f4e56a2664e512f2c1b20fb2818e400e75b1d16e424b408b93c57912b2defa01e28186ba338532255659eaba774ba6252722c33952ea6778be484b78d2166f42fbc87b6de8ee27b17a6cfef9b989957bffa02a092cb94bf453c4ac6b05a", 0x71, 0x101, &(0x7f0000000240)={0x10, 0x2, 0x2, @multicast2}, 0x10) lgetfh(0x0, 0x0) mmap(&(0x7f00006b4000/0x3000)=nil, 0x3000, 0x1, 0x10, 0xffffffffffffffff, 0x0) r5 = fcntl$getown(r2, 0x5) aio_readv(&(0x7f0000000640)={0xffffffffffffffff, 0x2, &(0x7f00000001c0)="8b343ee6f8b36e139eef485d557814acad385a3b7b804e17698049a379cb52ce36e9ec2195d3fbb56bbd719cf6114d1ea526b0", 0x33, [0xc5f, 0x80], 0x1, 0x20, 0x1, {0xab, 0x8, &(0x7f00000005c0)="e059ea2020fe7999d1a8c9289b04e17e54bcab6c8a9ca05ef82aec55f5ed133be20d165bfa17aa3e4d817fe83e65a3adf899ae27aa13eb11c64c32092f1c68b03d71c6b6d6951f5801"}, {0x3, 0x11, @sival_ptr=0xdf2, @tid=r5}}) poll(&(0x7f00000003c0)=[{r2}, {r3, 0x8}, {0xffffffffffffffff, 0x2}, {r2, 0x2000}, {r2, 0x4}, {r1, 0x2}, {r3, 0x4}], 0x7, 0x8) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r7 = dup2(r6, r6) ioctl$CIOCGSESSION2(r7, 0xc030636a, &(0x7f00000000c0)={0x0, 0x26, 0x0, 0x0, 0x20, &(0x7f0000000040)="83", 0x0, 0x4d46b76e, [0x0, 0x0, 0xfffffffd]}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000180)=@in={0x10, 0x2, 0x2, @broadcast}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x20000}, 0x185) socket(0x1c, 0x1, 0x0) openat$md(0xffffff9c, &(0x7f0000000100), 0x40000, 0x0) r8 = open$dir(&(0x7f0000000140)='./file0\x00', 0x8, 0x36) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x2010, 0xffffffffffffffff, 0x0) socketpair(0x1, 0x2, 0xff, &(0x7f00000000c0)) pwritev(r8, &(0x7f0000000080)=[{0x0}], 0x1, 0x0) 158.462703ms ago: executing program 2 (id=166): r0 = socket(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) r1 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) connect$inet(r0, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) sendto(r0, &(0x7f0000000380)="8e", 0x1, 0x20005, 0x0, 0x0) clock_nanosleep(0xe, 0x0, &(0x7f0000000080)={0x9, 0xffffffc7}, &(0x7f0000000100)) mkdir(&(0x7f0000000400)='./file0\x00', 0x18) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) pathconf(&(0x7f0000000180)='./file0/file0\x00', 0x10) select(0x40, &(0x7f0000000000)={0x0, 0x4, 0xffffffffffffe4b9, 0x0, 0x0, 0x3}, &(0x7f0000000040)={0xc5a, 0x6, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x100000000000}, &(0x7f0000000140)={0x9, 0x0, 0x0, 0x8000000000000000, 0x0, 0x3, 0x0, 0x80000000000}, 0x0) 154.934101ms ago: executing program 3 (id=167): r0 = socket(0x1c, 0x10000000, 0x8) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000280)=ANY=[], 0x8) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = fork() wait4(r2, 0x0, 0x2, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r3, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x3, @multicast1}, 0x10, &(0x7f0000000280)=[{0x0}, {0x0}, {&(0x7f0000000140)}, {&(0x7f00000002c0)="7913820dbcc6c1c68f37338ca40879a836d98dcae2dbbc4c296da4", 0x1b}, {&(0x7f0000000500)}], 0x5, 0x0, 0x0, 0x144}, 0x4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) __specialfd$eventfd(0x1, &(0x7f0000000000)={0x0, 0x5}, 0x8) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r5, 0x80000001, &(0x7f0000000040)="9e", 0x1, [0x4, 0x1ff], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x2, 0x0, @sigval_int=0x1053, @ke_flags=0x9fc040a3bd859cca}}) r6 = kqueue() kevent(r6, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x11, 0x0, 0x0, 0x4, [0x0, 0x0, 0x0, 0x200000005c95]}, {0x4, 0xfffffffffffffffe, 0x15, 0x40000000, 0x8000000000000, 0x0, [0x0, 0x3]}], 0x2, 0x0, 0x0, 0x0) r7 = socket(0x1c, 0x1, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x9, 0x200, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r8 = open(&(0x7f0000000480)='./file0\x00', 0x1, 0x0) r9 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r9, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x1003, 0x0, 0x0, 0x4, 0x2, 0x10000, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1e, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, 0xb32e, 0x4, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x1, 0xe122, 0x0, 0x0, 0x0, 0xc, 0x400000, 0x0, 0x9, 0x12, 0x1, 0xdb9, 0x3ff, 0x11, 0x8, 0x0, 0xa7, 0xc37d, 0x7, 0x2000002, 0xc, 0x0, 0x0, 0x0, 0x4, 0xfffffffc, 0x0, 0x1ffffe, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0xfffffffe, 0x3, 0x8000000, 0x8, 0x3, 0xfffffffc, 0x40, 0xfffffffc, 0x2, 0x7, 0xfffffffe, 0x1000, 0xfffffffc, 0x2, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4000, 0x6, 0xfffffffe, 0x3, 0x3ffff, 0x2, 0x0, 0x0, 0xffffffff, 0x0, 0xfdffffff]}) getfh(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)) syz_emit_ethernet(0x4e, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00183aff78042000000014000001000000086500ff020000005e0000000000000000000188009078fe000000fe8000000000000000000000000000aa"]) mlockall(0x2) rfork(0x96014) write(r8, &(0x7f0000000080)="ba", 0x100000) 0s ago: executing program 2 (id=168): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x11, r0) ioctl$KDGKBTYPE(r1, 0x40044b40, 0x9) ioctl$SMB_READB(r0, 0xc020697a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x1c, 0x1, 0x0) ktimer_create(0x4, 0x0, &(0x7f00000001c0)=0x0) ktimer_settime(r3, 0x0, &(0x7f0000000200)={{0x1}, {0x1, 0x2a21}}, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000400)=ANY=[@ANYBLOB="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"]) ktimer_settime(r3, 0x0, &(0x7f0000000340)={{0x5, 0x10001}, {0x4, 0x19f7}}, &(0x7f00000003c0)) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r6, 0x11, 0x4, 0x0, 0x0) sendmsg$unix(r1, &(0x7f0000004e00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001180)=[@rights={0x10, 0xffff, 0x1, [0xffffffffffffffff]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x10, [0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10}, @rights={0x18, 0xffff, 0x1, [0xffffffffffffffff, r5, 0xffffffffffffff9c]}, @rights={0x34, 0xffff, 0x1, [r6, 0xffffffffffffffff, 0xffffffffffffffff, r4, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10}, @rights={0x2c, 0xffff, 0x1, [0xffffffffffffffff, r1, r4, 0xffffffffffffffff, r1, r6, r1, 0xffffffffffffffff]}, @rights={0x2c, 0xffff, 0x1, [r6, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0xffffffffffffffff]}], 0x1d4}, 0x10c) mkdir(0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200, 0x28) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) msync(&(0x7f0000860000/0x600000)=nil, 0x600000, 0x2) madvise(&(0x7f00009d6000/0x600000)=nil, 0x600000, 0x3) munmap(&(0x7f0000d99000/0x3000)=nil, 0x3000) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x19, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0, 0x0, 0xfdffff85, [0x8, 0x0, 0x1000]}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) kqueue() setresuid(0xee01, 0xee01, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.45' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe00077e9000 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe0077788dc0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83716b20 usecount 6, writecount 5, refcount 70 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0054126000 ref 2 pages 544 cleanbuf 65 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe0054117780 (pid 863, syz-executor, tid 100188) nlink=1, effnlink=1, size=2147483650, extsize 0 generation=a443eee0, uid=0, gid=0, flags=0x48008 ino 90, on dev gpt/rootfs Out of ktrace request objects. vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe0077786dc0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83716b20 usecount 9, writecount 8, refcount 69 seqc users 0 hold count flags () flags (VIRF_PGREAD|VV_MD|VMP_LAZYLIST) v_object 0xfffffe0054110c98 ref 1 pages 536 cleanbuf 64 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe0054142780 (pid 891, syz-executor, tid 100236) nlink=1, effnlink=1, size=4294967296, extsize 0 generation=b2e24a3a, uid=0, gid=0, flags=0x48008 ino 72, on dev gpt/rootfs lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe006de21808 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1641 2nd 0xffffffff83cc7a40 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1340 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff81664981 at witness_checkorder+0x781 #1 0xffffffff814ea187 at __mtx_lock_flags+0x187 #2 0xffffffff8184f536 at tuninit+0x76 #3 0xffffffff8183da64 at ether_ioctl+0x1b4 #4 0xffffffff8184e2d2 at tunifioctl+0x3c2 #5 0xffffffff8198934b at in_control_ioctl+0x16db #6 0xffffffff8182d6e1 at ifioctl+0xe51 #7 0xffffffff8167372a at kern_ioctl+0x4ca #8 0xffffffff8167316e at sys_ioctl+0x36e #9 0xffffffff82145702 at amd64_syscall+0x4e2 #10 0xffffffff820ea3eb at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff81665852 at witness_checkorder+0x1652 #1 0xffffffff81553d49 at _sx_xlock+0x139 #2 0xffffffff8184df9a at tunifioctl+0x8a #3 0xffffffff8182a36d at ifhwioctl+0x1d6d #4 0xffffffff8184bb88 at tunioctl+0xd38 #5 0xffffffff811c5406 at devfs_ioctl+0x266 #6 0xffffffff82307b87 at VOP_IOCTL_APV+0x87 #7 0xffffffff817d0c67 at vn_ioctl+0x3c7 #8 0xffffffff811c62c9 at devfs_ioctl_f+0x69 #9 0xffffffff8167372a at kern_ioctl+0x4ca #10 0xffffffff8167316e at sys_ioctl+0x36e #11 0xffffffff80440dd7 at freebsd32_ioctl+0x607 #12 0xffffffff822cfab2 at ia32_syscall+0x4d2 #13 0xffffffff820eac4f at int0x80_syscall_common+0x9c ifconfig: interface tap4 does not exist kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=4 req=104 state=1 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-1.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Aug 29 08:53:22 ci-freebsd-i386-1 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl