last executing test programs: 2m59.362158946s ago: executing program 1 (id=387): rfork(0x96014) (async) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) aio_read(&(0x7f0000000180)={r0, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_ptr, @thr={0x0, 0x0}}}) (async) aio_return(&(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, [], 0x2, 0x0, 0x0, {0x0, 0x4, 0x0}, {0x0, 0x0, @sival_int, @ke_flags}}) aio_waitcomplete(0x0, 0x0) (async) socket(0x1c, 0x1, 0x0) (async) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) openat$evdev(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) (async) r1 = socket(0x1c, 0x1, 0x0) socketpair(0x1, 0x1, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r2, 0xffff, 0x1002, &(0x7f00000002c0)=0x4, 0x4) (async) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0xc, &(0x7f0000000080)={0x1ff, {{0x1c, 0x1c, 0x2, 0x1000, @rand_addr="65cb30df060000000b603666ab2f3df4", 0x8}}, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="3f12c0d81c479be15ccb830030bc5ee7"}}}, 0xfc) (async) getsockopt$inet6_int(r4, 0x29, 0xa, 0x0, 0x0) (async) sendto(r3, &(0x7f0000001100)="08149a6b28b8fd091f79e23906e76bab809f5ffeddfce3782400466487d4afb9882c29e9d58cc3ff28a6581a0f12aba78233ddbeed53d0aed4c16b5171ee63cc04c6baa94e00"/85, 0x55, 0x20188, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r5 = socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) (async) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) kmq_notify(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x21, @sigval_ptr=0x8f7, @spare=[0xc, 0x3, 0xd, 0x1, 0x7b, 0x2, 0x5, 0x3]}) (async) connect$inet6(0xffffffffffffffff, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) (async) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2000) (async) syz_emit_ethernet(0x4e, &(0x7f00000001c0)=ANY=[@ANYBLOB]) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r6, &(0x7f00000008c0)=""/242, 0xfea3, 0x860, 0x0, 0x0) (async) sendto(r7, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/126, 0x7e, 0x100, 0x0, 0x0) (async) recvmsg(r6, 0x0, 0x40000) (async) socket(0x1c, 0x1, 0x0) (async) socket(0x0, 0x1, 0x6) (async) profil(0x0, 0x0, 0xfffffffe, 0xd5) 2m59.262080201s ago: executing program 1 (id=388): r0 = open(&(0x7f0000000000)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r1 = socket(0x1c, 0x1, 0x0) mkdir(0x0, 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x101) r2 = socket(0x1c, 0x2, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x2, &(0x7f0000000040)=0x2, 0x4) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DIOCNATLOOK(r4, 0x8008745b, &(0x7f00000003c0)="28a7c7f9812306") r6 = socket(0x10, 0x4, 0x0) sendmsg$inet_sctp(r6, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x3, @multicast2}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x10145}, 0x0) aio_mlock(&(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0xffffffff, {0x0, 0x0, 0x0}, {0x0, 0x0, @sigval_ptr=0x5, @ke_flags=0x44}}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r7 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x1aa, &(0x7f0000000cc0)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaa008100000086dd602e5cea01703c0020010000000000000000000000000002ff0200000000000000000000000000012b0a01"]) eaccess(&(0x7f0000000040)='./file0\x00', 0x2) statfs(&(0x7f0000000240)='./file/file0\x00', 0x0) ioctl$EFIIOC_VAR_NEXT(r4, 0xc0244505, &(0x7f0000000200)={&(0x7f0000000080)=0x5, 0x2, {0x5, 0xa92, 0x2, 0x4, 0xf, "20c79046c0c1"}, 0x2, 0x0}) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) aio_write(&(0x7f00000002c0)={r5, 0x5c, &(0x7f0000000780)="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", 0xff, [0x7, 0x5], 0xe4, 0x4, 0x24000, {0x1000008, 0x8004008, &(0x7f0000000180)="3c41406fd9feaefe7d4473239ab747fd001af16d436e3b8ea3a5c1599d8a9d0d395114c9660b000000008e9c26f4925a069e9a1f46fefc834fb3b4a1dc3bc603668e48779044a6f061b421"}, {0x0, 0xc, @sigval_ptr=0x8, @ke_flags=0x25}}) socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0xfff) sendmsg$inet_sctp(r4, &(0x7f00000004c0)={&(0x7f0000000280)=@in6={0x1c, 0x1c, 0x2, 0xfffffffb, @remote={0xfe, 0x80, '\x00', 0x0}, 0x80}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x108}, 0xb399b153d7abb6ae) socket$inet_icmp_raw(0x2, 0x3, 0x1) r8 = socket(0x1c, 0x1, 0x0) aio_readv(&(0x7f00000009c0)={r8, 0x3, 0x0, 0x0, [0x3, 0x7e9], 0xfffffffe, 0x20, 0x8, {0x8, 0x8, 0x0}, {0x3, 0x16, @sival_ptr=0x8, @ke_flags=0x80}}) listen(r8, 0x3) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 2m58.434248067s ago: executing program 1 (id=392): open(&(0x7f0000000000)='./file0\x00', 0x80000000000206, 0x0) aio_write(&(0x7f00000004c0)={0xffffffffffffffff, 0x80000001, &(0x7f0000000040)="ea", 0x1, [0x1, 0x1ff], 0x0, 0x0, 0x0, {0x0, 0x5, 0x0}, {0x0, 0x40000000, @sival_int=0x8, @thr={0x0, 0x0}}}) open(&(0x7f0000000480)='./file0\x00', 0x4, 0x0) (async) open(&(0x7f0000000480)='./file0\x00', 0x4, 0x0) ppoll(0x0, 0x0, 0x0, &(0x7f0000000240)={[0x861b, 0x2, 0x3, 0x80000000]}, 0x10) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) (async) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x3) (async) procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x3) r0 = kqueue() kevent(r0, &(0x7f00000006c0)=[{0xfffffffe, 0xfffffffffffffff9, 0x9, 0x0, 0xcf0, 0x1000, [0x0, 0x6, 0x4, 0x40000000000000]}, {0x3fffc, 0xfffffffffffffff5, 0x4010, 0x1, 0x4, 0x5, [0x9, 0x100, 0x4, 0x8c]}, {0x0, 0xfffffffffffffffd, 0x8090, 0x2, 0xbe08, 0x3, [0x4000000001, 0xfff, 0x7, 0xffffffffffff8001]}, {0x2, 0xfffffffffffffff8, 0x4004, 0xffffff, 0xd3dc, 0x4, [0x3, 0x3, 0x0, 0x3]}, {0x8, 0xffffffffffffffff, 0x14, 0x8, 0x30e, 0x7, [0x8, 0x8000000000000001, 0x8, 0x5b42]}, {0x3, 0xfffffffffffffff8, 0x98eab78fe5b25576, 0x8, 0x1, 0x200, [0x3, 0x8, 0x9, 0x6]}], 0x6, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) (async) r1 = socket(0x1c, 0x1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x1f, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0xffe, 0xfffffffc]}) (async) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f0000000080)={0x1f, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0xffe, 0xfffffffc]}) setfib(0xff) (async) setfib(0xff) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x76, 0x8040, &(0x7f00000003c0)="6b8200456510b014de335b97014d6a46f4d4acae671918817e152dd4b52d8d5e479db3ab32a2c54543c51c98485113112f89749d8173800e0598749fb0f94f5118ee41268c844458d883b9f9664bdb8fc4c88bad5b1ad7827f5b501de0f13dca335a537210ebdaa4e42ee583175f3e00"/125, 0x0, 0x0, 0x0}) minherit(&(0x7f0000692000/0x4000)=nil, 0x4000, 0x0) __realpathat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x20, 0x0) (async) __realpathat(0xffffffffffffffff, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x20, 0x0) syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000bc"]) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sendmsg$inet6_sctp(r1, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) socketpair(0x11, 0x3, 0x2, 0x0) r4 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x110) rmdir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x85) (async) open(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x85) inotify_add_watch_at(0xffffffffffffffff, r4, &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20000410) freebsd11_getdents(r4, &(0x7f00000000c0)=""/180, 0xb4) (async) freebsd11_getdents(r4, &(0x7f00000000c0)=""/180, 0xb4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) fork() accept$inet6(r1, &(0x7f00000001c0)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, &(0x7f0000000180)=0x1c) (async) r5 = accept$inet6(r1, &(0x7f00000001c0)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, &(0x7f0000000180)=0x1c) sendto$inet6(r5, &(0x7f00000010c0)="2f16aca894c2a8c6e479e5f4aa73bfa518f1d6306da9f3ad34436df8cad9205de1371176fa569739efb6d2f12e1c59c73ba173e30b7a9ada3188d39fc869155e535178470dba9859b65ea636a7d20ae7ef83c1798f44bf8299e801bda1d451e74d32e6d33d8bfb4aa15769ae6b2d4ad96108f73201993ac7ca278a2850b75f5f53553068c4e8a96a3f5fb74b5fc1ee51d701641de3a058490c1d2f29a83039092de88faee90c617408d114ddfbbb8f7db92f7dac0d08865f95afd887533f8b160b8ac5027d34baa2d8f2ec430b075a9e536a8ffbe2658fd55fdf91730a22c54e07", 0xe1, 0x5, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 2m56.422044658s ago: executing program 1 (id=396): r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket(0x10, 0x10000000, 0x6c) recvmsg(r0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x200201, 0x50) syz_emit_ethernet(0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaa00f6074d3b7447f90008004500006e080800000000000000ffffff77fc65e7ac1400aa7ea4933f396535227c18f8f412bcb27d7d", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5000000090780000"]) aio_write(&(0x7f0000000240)={r1, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x400, 0x1ff], 0x0, 0x0, 0x0, {0x0, 0x2, 0x0}, {0x0, 0x0, @sival_int=0x200000}}) socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = socket(0x1c, 0x1, 0x0) r3 = shmget$private(0x0, 0x3000, 0x108, &(0x7f0000ffb000/0x3000)=nil) shmat(r3, &(0x7f00002ed000/0x1000)=nil, 0x2000) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_readv(&(0x7f0000000580)={r2, 0x0, 0x0, 0x0, [0x0, 0xffffffff], 0x7fff, 0x0, 0x3, {0xffffffff, 0xfffffffe, 0x0}, {0x0, 0x0, @sival_ptr=0xf9f, @ke_flags}}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r4 = kqueue() kevent(r4, &(0x7f0000000040)=[{0x10001, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r6 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r6, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x8000, 0x2, 0x0, 0x8000, 0x5, 0xfffffffe, 0xf, 0x0, 0x0, 0x0, [0x0, 0x2, 0x7ff, 0x0, 0xffffffff, 0x1, 0xfffffffd, 0x0, 0xf, 0xb32a, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, 0x0, 0xfffffffe, 0x0, 0xe122, 0x0, 0xffffffff, 0x0, 0x9, 0x0, 0xbb8, 0x9, 0xf, 0xfffffffd, 0xdbd, 0x3ff, 0x11, 0xfffffffe, 0x0, 0xa7, 0xc37b, 0x7, 0x2, 0x0, 0x0, 0x0, 0x6c635637, 0x4, 0xfffffffe, 0x0, 0x200000, 0x0, 0x0, 0x20002000, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x8, 0x0, 0x0, 0x10001, 0xffffffff, 0xc, 0x7, 0x1, 0x1000, 0xfffffffc, 0x1002, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0xffffffff, 0x0, 0x40000, 0xfffffffe, 0x0, 0x0, 0x9, 0x23e6, 0xffffffff]}) getfh(&(0x7f0000000380)='./file0\x00', &(0x7f00000002c0)) r7 = socket$inet6_tcp(0x1c, 0x1, 0x0) chown(&(0x7f0000000180)='./file0/../file0\x00', 0x0, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x1, &(0x7f00000000c0)={0x1c, 0x1c, 0x0, 0x800, @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, 0x6}, 0x1c) r8 = socket(0x2, 0x1, 0x0) sendmsg$inet_sctp(r8, &(0x7f00000004c0)={&(0x7f0000000100)=@in={0x10, 0x2, 0x3, @rand_addr=0x80}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2000c}, 0x20005) ioctl$KDGETMODE(r8, 0x40046676, 0x22e00000) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r5, 0x0) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x5) rfork(0x96014) write(r5, &(0x7f0000000080)="ba", 0x100000) 2m53.786285935s ago: executing program 1 (id=406): freebsd11_mknod(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x672cda28f543e327, 0x3) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) open$dir(&(0x7f0000000400)='./file0\x00', 0x60200, 0x40) r1 = fcntl$dupfd(r0, 0x11, r0) ioctl$SMB_READB(r1, 0xc01c6907, &(0x7f0000000180)={0x1, 0x1d, 0x1, @buf="f3fb", @buf="83d6", 0x3, &(0x7f0000000080), 0x1, &(0x7f0000000100)=0x1, 0x1}) ioctl$SMB_READB(r0, 0xc020697a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @word=0x4f, @buf="de32", 0x0, 0x0, 0x0, 0x0}) r2 = socket(0x1c, 0x1, 0x0) mlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) setpgid(0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='newreno\x00', 0x8) mount(&(0x7f0000000000), 0x0, 0xc4, 0x0) ioctl$DIOCSETIFFLAG(r3, 0xc0284459, &(0x7f0000000140)={0x10, 0x0, 0x0, 0x800000}) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x26, &(0x7f00000001c0)={0x0, 0x40}, &(0x7f0000000240)=0x8) setsockopt$inet6_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f00000003c0)={r4, 0x84cb}, 0x8) munlock(&(0x7f0000ffc000/0x1000)=nil, 0x1000) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) ioctl$DIOCCLRIFFLAG(r3, 0xc024445a, &(0x7f0000000040)={0x10, &(0x7f0000000000)="908df65c6a2034", 0x2, 0x8, 0x1}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2, 0x0) 2m53.785339515s ago: executing program 1 (id=407): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4, 0xf7) aio_write(&(0x7f0000000240)={r0, 0x80000001, &(0x7f0000000380)="e20f97ae78b27eed144427e3c16608b9a695c3ce8e0aa2dbc5a478f4d4e04716110215c8d0eaded6b6f300e874e1bc0d249e29b34f9d4d90e841eeba614ec35fd3cbd57112a42d122576bd2c84b59df7bf2ee26910524b83123b008156efa70a6329e9b611a520959500866dbf3649684ec32a53ef31c63e0c10df57fa80db215440602ada03fab0daaffbebb363cd75841d54708839efb3f6c4453128a8e6eafdbb47ac2afb2d300f1d009e487ec61211430c95613390a7a0af60ac1bb6dd41", 0xc0, [0x0, 0x20000], 0x1, 0x8, 0x3, {0x0, 0x35, 0x0}, {0x0, 0x4000, @sival_int=0x8, @ke_flags=0xc086}}) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) freebsd11_mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x2000, 0x1ff) ftruncate(r1, 0x80000) r2 = fork() wait4(r2, 0x0, 0x10, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(0x0, 0x110206, 0x0) mlock(&(0x7f00007fe000/0x800000)=nil, 0x800000) socket(0x1c, 0x1, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$inet_sctp(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000900)="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", 0x770}, {0x0}], 0x2, 0x0, 0x0, 0x149}, 0x4) r5 = socket$inet6(0x1c, 0x2, 0x0) sendmsg$inet6_sctp(r5, &(0x7f0000000500)={&(0x7f0000000240)=@in6={0x1c, 0x1c, 0x2, 0x5, @rand_addr="dbeca8627a0d02ec270718991555cdd8", 0xe9a}, 0x1c, 0x0}, 0x0) r6 = vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sigval_int, @spare}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0), 0x4) wait4(r6, &(0x7f0000000040), 0x1, &(0x7f0000000140)) ioctl$KDGETMODE(r0, 0x40046676, 0x22dffffc) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @remote, [], {@arp={0x806, @generic={0x18, 0x200, 0x6, 0xc, 0x8, @remote, "63304e5faca06ee7eb414f0d", @broadcast, "4853103ca7865295be5dd97ccc0c4f57"}}}}) dup(r3) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f00000000c0)={0x10, 0x20, 0x0, &(0x7f0000000000), 0x1, &(0x7f0000000040)="fb", 0x0, 0x4d46b770, [0x0, 0x0, 0x3ff]}) socket$unix(0x1, 0x1, 0x0) mknodat(0xffffffffffffff9c, 0x0, 0xc0e99db6de761f86, 0xfffffffd) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0xca0706ee3fd5d6f6) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_accept_filter(r7, 0xffff, 0x1000, &(0x7f0000000580)={'accf_data\x00', "33fcd9ea4ed13bc192476c672e66fe6f09975e82171c69ca9d2045369a7fefaae11b08e386ba4475d07b03243cb454e66744ad775ad4b52c282e41160116a62930dd6a9244be72e2e7f7c901face21b0734745500246514b36a73a736b4c6567f458b79887db74db14a72450d9b96a504b0b120113c15fd62e8d9466bedd3241587e83b6d1de79865082cad77704c2017f39e371c74dd1a68b48dff9a37edfc2fc5eb08e55a816f4b5da338b0b78fe372cca52d1b8b96a1e49b60183346cd28a26c7c24988262e72d69bd25d30e0a74df9fbc9bb987306f5828f37b81bedc20bc9f0bb11a659d8216579bc792e1a1e6b"}, 0x81) openat$filemon(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) 2m53.78415186s ago: executing program 32 (id=407): r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x4, 0xf7) aio_write(&(0x7f0000000240)={r0, 0x80000001, &(0x7f0000000380)="e20f97ae78b27eed144427e3c16608b9a695c3ce8e0aa2dbc5a478f4d4e04716110215c8d0eaded6b6f300e874e1bc0d249e29b34f9d4d90e841eeba614ec35fd3cbd57112a42d122576bd2c84b59df7bf2ee26910524b83123b008156efa70a6329e9b611a520959500866dbf3649684ec32a53ef31c63e0c10df57fa80db215440602ada03fab0daaffbebb363cd75841d54708839efb3f6c4453128a8e6eafdbb47ac2afb2d300f1d009e487ec61211430c95613390a7a0af60ac1bb6dd41", 0xc0, [0x0, 0x20000], 0x1, 0x8, 0x3, {0x0, 0x35, 0x0}, {0x0, 0x4000, @sival_int=0x8, @ke_flags=0xc086}}) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) freebsd11_mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x2000, 0x1ff) ftruncate(r1, 0x80000) r2 = fork() wait4(r2, 0x0, 0x10, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) open$dir(0x0, 0x110206, 0x0) mlock(&(0x7f00007fe000/0x800000)=nil, 0x800000) socket(0x1c, 0x1, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r4 = socket(0x10, 0x2, 0x0) sendmsg$inet_sctp(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000900)="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", 0x770}, {0x0}], 0x2, 0x0, 0x0, 0x149}, 0x4) r5 = socket$inet6(0x1c, 0x2, 0x0) sendmsg$inet6_sctp(r5, &(0x7f0000000500)={&(0x7f0000000240)=@in6={0x1c, 0x1c, 0x2, 0x5, @rand_addr="dbeca8627a0d02ec270718991555cdd8", 0xe9a}, 0x1c, 0x0}, 0x0) r6 = vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sigval_int, @spare}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0), 0x4) wait4(r6, &(0x7f0000000040), 0x1, &(0x7f0000000140)) ioctl$KDGETMODE(r0, 0x40046676, 0x22dffffc) syz_emit_ethernet(0x3e, &(0x7f0000000040)={@local, @remote, [], {@arp={0x806, @generic={0x18, 0x200, 0x6, 0xc, 0x8, @remote, "63304e5faca06ee7eb414f0d", @broadcast, "4853103ca7865295be5dd97ccc0c4f57"}}}}) dup(r3) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f00000000c0)={0x10, 0x20, 0x0, &(0x7f0000000000), 0x1, &(0x7f0000000040)="fb", 0x0, 0x4d46b770, [0x0, 0x0, 0x3ff]}) socket$unix(0x1, 0x1, 0x0) mknodat(0xffffffffffffff9c, 0x0, 0xc0e99db6de761f86, 0xfffffffd) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0xca0706ee3fd5d6f6) r7 = socket$inet(0x2, 0x3, 0x0) setsockopt$sock_accept_filter(r7, 0xffff, 0x1000, &(0x7f0000000580)={'accf_data\x00', "33fcd9ea4ed13bc192476c672e66fe6f09975e82171c69ca9d2045369a7fefaae11b08e386ba4475d07b03243cb454e66744ad775ad4b52c282e41160116a62930dd6a9244be72e2e7f7c901face21b0734745500246514b36a73a736b4c6567f458b79887db74db14a72450d9b96a504b0b120113c15fd62e8d9466bedd3241587e83b6d1de79865082cad77704c2017f39e371c74dd1a68b48dff9a37edfc2fc5eb08e55a816f4b5da338b0b78fe372cca52d1b8b96a1e49b60183346cd28a26c7c24988262e72d69bd25d30e0a74df9fbc9bb987306f5828f37b81bedc20bc9f0bb11a659d8216579bc792e1a1e6b"}, 0x81) openat$filemon(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) 2m28.162265132s ago: executing program 2 (id=545): open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x7369a0733676a8) truncate(&(0x7f00000000c0)='./file0\x00', 0xfffff) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180)=[&(0x7f0000000080)=',\x00'], 0x0) open(&(0x7f0000000100)='./file0\x00', 0x0, 0x90) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x0) 2m28.122122466s ago: executing program 2 (id=546): socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)) (async) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) sendto(r1, &(0x7f0000000380)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c000000000000000000000000008f6a195cbe81cb7309d8d6c06f28f44fba63777fb9b995455a008ce4405e01c007fd", 0xa2, 0x109, 0x0, 0x0) r2 = socket$inet6(0x1c, 0x20000000, 0x4) setsockopt$inet6_int(r2, 0x29, 0x4, &(0x7f0000000080)=0x9, 0x4) (async) setsockopt$inet6_int(r2, 0x29, 0x4, &(0x7f0000000080)=0x9, 0x4) syz_emit_ethernet(0x66, &(0x7f0000000100)=ANY=[@ANYBLOB="c3b58b132350aaaaaaaaaabb86dd6000010000305000fe9400000000000000000000000000aaff02"]) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) kqueue() (async) kqueue() r3 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[]) socket(0x11, 0x10000000000003, 0x0) (async) r4 = socket(0x11, 0x10000000000003, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) link(&(0x7f0000000400)='./file0\x00', &(0x7f00000000c0)='.\x00') sendto$unix(r4, &(0x7f0000000140)="b10005019000e803034808c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbd83a699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c50000000ecc0000000000020200a371a3f8000000005ad0fea5f5be0400000000000100", 0xb1, 0x0, 0x0, 0x0) getsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1023, 0x0, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) sendmsg$inet6_sctp(r3, 0x0, 0x0) (async) sendmsg$inet6_sctp(r3, 0x0, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socket$inet6(0x1c, 0x2, 0x0) (async) socket$inet6(0x1c, 0x2, 0x0) socket(0x1c, 0x1, 0x0) (async) socket(0x1c, 0x1, 0x0) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x74) kqueue() (async) r5 = kqueue() kevent(r5, &(0x7f0000000200)=[{0x4c, 0xfffffffffffffffa, 0x0, 0x8, 0x200000e8c7, 0x1, [0x1, 0x0, 0x4]}], 0x1, 0x0, 0x0, 0x0) setresgid(0x0, 0xee00, 0x0) setresgid(0x0, 0xee00, 0xee01) socket(0x1c, 0x1, 0x0) (async) r6 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r6, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) (async) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) getpid() socket$inet6_sctp(0x1c, 0x5, 0x84) 2m27.252021561s ago: executing program 2 (id=551): setsockopt$inet6_sctp_SCTP_RECVNXTINFO(0xffffffffffffff9c, 0x84, 0x20, &(0x7f0000000000)=0x9, 0x4) r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x1, 0x5, 0x0}, &(0x7f0000000080)=0xc) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000000c0)={@in={{0x10, 0x2, 0x1, @rand_addr=0x9}}, r1}, &(0x7f0000000180)=0x84) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(r2, 0x84, 0x103, &(0x7f00000001c0)={r1, 0xa9, "bae1641aaf057271c5d0b6705cb8294970e7ce46d4df93377190939e6529befc0df40b816509631c08312d06af53cd295914023d627842df3ca7fa4a83c9b7d25df3c5ad5b8144c06a4790662348eda90076e6ffc0b02d6f6f3d02294b4e4c105064963feabc86f939d6e024fbee123fa968ebc9f4af33c33e98fec4ab7db832d8c1fce10d80d67582fa00fe93761f831433635b1bfac28e669ff2058c558c0b382953280f15224df5"}, &(0x7f0000000280)=0xb1) r4 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN(r4, 0x6, 0x401, &(0x7f00000002c0)={0x9, "39a38b0bcec2f5b695a92f433da7ce73"}, 0x14) rmdir(&(0x7f0000000300)='./file0\x00') cpuset(&(0x7f0000000340)) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x1, 0x10, r0, 0x7ff) r5 = dup2(r0, r0) ioctl$MDIOCDETACH(r5, 0xc1b46d01, &(0x7f0000000400)={0xff, 0x48000000, 0x1, &(0x7f0000000380)='./file0\x00', 0x1, 0x7fff, 0x2, 0x9f9, 0x0, 0x8, &(0x7f00000003c0)='\x00', [0x3, 0x3, 0x367657ad, 0x7fffffff, 0x0, 0x9, 0x3, 0x200, 0x8, 0xfb, 0x0, 0x7fffffff, 0x5, 0x11d, 0x8, 0x2, 0x2, 0xffff, 0x5, 0x5, 0xfffffffd, 0x6, 0x9, 0x8, 0x2, 0x7, 0x5e68, 0x10, 0x81, 0x1, 0x0, 0x9, 0x5, 0x10000, 0xa, 0x10001, 0x81, 0x1, 0x8, 0x9, 0xa, 0x6, 0x8, 0x39, 0xba, 0x81, 0x4, 0x7, 0x9, 0x2, 0x4, 0xbe, 0x0, 0x2, 0xa, 0x8, 0x4, 0x4, 0x401, 0x4, 0xe0000000, 0x1, 0x8, 0x2, 0x3, 0x1b, 0x10001, 0x2, 0x10, 0x1, 0xb, 0x5f5737f0, 0xe0000000, 0x4, 0x4, 0x40, 0x7, 0x7, 0xc, 0x8000, 0x8, 0x964, 0xfffffc00, 0x3, 0x6, 0xe1, 0x6, 0x9, 0x101, 0x1875, 0x6, 0x6, 0x1000, 0x7f, 0x98, 0x80000000]}) getfh(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)) r6 = socket$inet6_sctp(0x1c, 0x4, 0x84) futimesat(r5, &(0x7f0000000640)='./file0\x00', &(0x7f0000000680)={{0x4, 0x80000000}, {0x8, 0x9}}) shm_rename(&(0x7f00000006c0)='./file0\x00', &(0x7f0000000700)='./file0\x00', 0x0) setsid() __cap_rights_get(0x3, r4, &(0x7f0000000740)) getsockopt$bt_hci(r0, 0x802, 0x3, &(0x7f0000000780)=""/27, &(0x7f00000007c0)=0x1b) r7 = accept4$inet6(r6, &(0x7f0000000800)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @ipv4={""/10, ""/2, @loopback}}, &(0x7f0000000840)=0x1c, 0x30000000) r8 = accept(r7, &(0x7f0000000880)=@un=@file={0x109, 0x0, ""/263}, &(0x7f00000009c0)=0x109) setsockopt$inet_udplite(r8, 0x88, 0x2, &(0x7f0000000a00)=0xfffffffd, 0x4) getpriority(0x0, 0xa13) setsockopt$inet6_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x26, &(0x7f0000000a40)={r1, 0xc5}, 0x8) setsockopt$inet6_sctp_SCTP_MAX_BURST(r2, 0x84, 0x19, &(0x7f0000000a80)={r1, 0x5}, 0x8) sendto(r2, &(0x7f0000000ac0)="46cafd4f2d2b5cecbcbcbe2a69ede6a41e1c2f7e700f914529aa189e1527d5ffd331a9dccc92d44a006c6ad5d39f4de12ab1902e3f0289ec517c3e547360b4b31c0f360b4af31eaf39d6682a76b1a3ba6ea56139d50af95738c28239fe64a5158d24061ef92caa5368bf0940a697167eaae802a91458e3a007e03895014c900334555f0d268e8c370cb61a72f48ec1cac99c804cb5e74cfb6caabf67817dc4f89c24a31f349b3285e6e3e1cc6b7478f645083f7e506268378774d40769e386e2c6ede0c316a762174fcba2", 0xcb, 0x101, &(0x7f0000000bc0)=@in={0x10, 0x2, 0x1}, 0x10) bind$inet(r0, &(0x7f0000000c00)={0x10, 0x2, 0x0, @broadcast}, 0x10) getsockopt$inet6_sctp_SCTP_MAX_BURST(r2, 0x84, 0x19, &(0x7f0000000c40)={r3, 0x6}, &(0x7f0000000c80)=0x8) freebsd11_fstatat(0xffffffffffffffff, &(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40), 0x6000) 2m26.151965154s ago: executing program 2 (id=555): mkdir(0x0, 0x167) r0 = socket(0x1c, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x2, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) setsockopt$inet_tcp_int(r0, 0x6, 0x80, &(0x7f0000000200)=0x4, 0x4) lchown(&(0x7f0000000580)='./file0\x00', 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') r1 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r1, 0xc1b46d00, &(0x7f0000000640)={0x0, 0x6, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x4, 0x0, [0x7f, 0xfffffffe, 0x3, 0x0, 0x40, 0x0, 0x3ff, 0x0, 0x2, 0xfffff70e, 0x4, 0x4, 0xeffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x0, 0x0, 0x1, 0xffffffff, 0x4, 0x0, 0x0, 0xe11e, 0x8000000, 0x2, 0x42f, 0xfffffffd, 0x0, 0xa, 0x3ffffe, 0xf, 0x1, 0xfffffffa, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x7, 0x0, 0xa, 0x0, 0x0, 0x9, 0x4, 0xfffffffe, 0x5, 0x200005, 0x0, 0x7fffffff, 0x0, 0x7f, 0x0, 0x6cdd1400, 0x0, 0xf, 0x5, 0x9, 0x0, 0xfffff37c, 0x0, 0xae, 0x0, 0xc, 0x1, 0x4, 0x0, 0x8, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x88]}) socket(0x2, 0x1, 0x0) socket(0x1c, 0x1, 0x0) socket$unix(0x1, 0x2, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0xc00, 0x105) aio_write(&(0x7f0000001b00)={r2, 0x80000000, &(0x7f0000000240)="526f4da8df81ab2125b8c000e2", 0xd, [0x40000, 0x1ff], 0x0, 0x4, 0x0, {0x81, 0x4, 0x0}, {0x2, 0x4000, @sival_ptr=0xb, @spare=[0x1, 0x2, 0xfffffffd, 0x33518c07, 0xdca6, 0x7fffffff, 0x800000000, 0x51c4929]}}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x20011, 0xffffffffffffffff, 0x0) aio_waitcomplete(0x0, 0x0) r3 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x8000, 0x0) ioctl$BIOCLOCK(r3, 0x2000427a) fork() setreuid(0xee00, 0x0) ioctl$BIOCLOCK(r3, 0x2000427a) r4 = socket(0x1c, 0x1, 0x0) r5 = open(&(0x7f0000000280)='./file0\x00', 0x8aa0, 0x31) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0xb1c, 0x0) sendmsg$inet_sctp(r5, &(0x7f0000000140)={&(0x7f0000000400)=@in6={0x1c, 0x1c, 0x3, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x4d}, 0x20000) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x10000, 0x0) ioctl$CIOCGSESSION2(r6, 0xc030636a, &(0x7f0000000180)={0x15, 0xf, 0xf6, &(0x7f0000000440)="008093564ae813bf3743dd9fc3bc944543b79cd0a5ff1e050000000000000000000033de8c50b100000000fefa314be9d8d0c2ec7ca1724036aed7779bebc4dd76d98fb2e3e51f979ef83577119377657d8d05142a07d61b7eddbffcda6e1b3f6cfe9ea7f82d005dc17621c033157e8a0d40773370c98506f5d96556823dc3994e1bb7173e600b5bb8486928ac77911c3c1a4baa49d39301e54593fbdcbc8900379ad05acca5f688b51ccab95bc62f5ae0653a7008edec480de39779da58cda63fb0212c618167abc49abb0ccd30d20f6c8fdc41051d8f4d23b68226b9101833cffb8b9c2b39bec67dafa55c8c4411461b841bd1e8f4", 0x0, 0x0, 0x120005, 0x2, [0x4, 0x4, 0x3fb, 0x4000000]}) r7 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r7, 0x84, 0x103, &(0x7f00000002c0)={0x0, 0x39, "5338eba85df882fbc6e63d61d9d959d97653c9df013a90dd9cf03e9ebd5ccbdb85a712943649166f5835ebb167296302a75752dff1890bc292"}, &(0x7f0000000100)=0x41) getsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xe, &(0x7f00000001c0)={r8, 0xfd5}, &(0x7f0000000340)=0x8) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) 2m24.24468083s ago: executing program 2 (id=561): aio_waitcomplete(0x0, 0x0) extattr_set_file(&(0x7f0000000080)='./file0\x00', 0x1, 0x0, 0x0, 0x0) socket(0x10, 0x1, 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x101) extattr_set_link(&(0x7f0000000080)='./file0/file0\x00', 0x1, 0x0, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x143140, 0x4) mount(&(0x7f0000000440), 0x0, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x29, &(0x7f00000001c0)={&(0x7f00000000c0), 0x0, 0x0, 0x29, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x1}, 0x30) aio_waitcomplete(0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000, 0x0) extattr_list_link(&(0x7f0000000140)='./file1/file1\x00', 0x2, 0x0, 0x0) semget(0x1, 0x3, 0x301) r1 = socket(0x0, 0x4, 0x0) bind$inet6(r1, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="1274aa13c3f2ef8311046cc512f73fbb"}, 0x2c) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r2, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(r2, 0x0, 0x48, &(0x7f0000000140)={@multicast1, @multicast2, @broadcast}, 0xc) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x48, &(0x7f0000000100)={@rand_addr=0xfffffaec, @loopback, @multicast2}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x48, &(0x7f0000000200)={@multicast1, @rand_addr=0xfffffffd, @multicast1}, 0xc) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r4, 0x0, 0x46, &(0x7f0000000240)={@multicast2, @rand_addr=0x7, @local={0xac, 0x14, 0x0}}, 0xc) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r5, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(r4, 0x0, 0x48, &(0x7f0000000400)={@multicast1, @rand_addr=0x6}, 0xc) 2m23.372043547s ago: executing program 2 (id=566): open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80000001, &(0x7f00000000c0)="7f", 0x1, [0x3], 0x200000000000000, 0x0, 0x0, {0x6, 0x20000000008, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562f1, @spare=[0x3, 0x2, 0xb, 0x5, 0xa251, 0x3, 0x4]}}) r1 = open(&(0x7f0000000040)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) r2 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) copy_file_range(r2, 0x0, r1, &(0x7f0000000080)=0x2ffff, 0xf, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x167) r3 = socket(0x1c, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) r4 = __specialfd$inotify(0x2, &(0x7f00000001c0)={0x4}, 0x4) readv(r4, &(0x7f00000003c0), 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) r5 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r5, 0xc1b46d00, &(0x7f0000000640)={0x3, 0x7fffff7f, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x4, 0x0, [0x7f, 0x2, 0x0, 0x0, 0x40, 0x0, 0x3ff, 0x0, 0x2, 0xfffff70e, 0x5, 0x4, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x0, 0x0, 0x1, 0x1, 0x4, 0x0, 0x0, 0xe11e, 0x8000000, 0x3, 0x42f, 0xfffffffd, 0x0, 0x3, 0x3fffff, 0xf, 0xfffffffd, 0xfffffffa, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x40007, 0x0, 0xa, 0x3, 0x0, 0x9, 0x4, 0xfffffffe, 0x0, 0x200005, 0x0, 0x0, 0x0, 0x1, 0xfffffffe, 0x6cdd1400, 0x0, 0xf, 0x5, 0x9, 0x0, 0xfffff37c, 0x0, 0xae, 0x0, 0xc, 0x1, 0x4, 0x3, 0x4, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x400, 0x40000, 0x0, 0x0, 0x0, 0x86]}) r6 = socket(0x2, 0x1, 0x0) r7 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x4de, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa9cd7361987d486dd60ecea6604a80000fe8000000000000089750e6b000000aaff0200000000000000000000000000010020000000000000000100000093"]) sendmsg$inet_sctp(r7, 0x0, 0x0) fhstat(&(0x7f0000000280)={{[0xfffff921, 0x715]}, {0xe, 0x8, "ea0000000000000c7d3a85d9d300"}}, &(0x7f0000000880)) writev(r7, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x3, 0xfffffffffffffff9, 0x8012, 0x4f, 0xfffffffffffffffe, 0x0, [0x3, 0x2000080000000000, 0x0, 0x9]}], 0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) utimes(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{0x3, 0x1}, {0xad, 0xe}}) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) copy_file_range(r5, 0x0, r4, 0x0, 0x7, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 11.024436579s ago: executing program 3 (id=996): r0 = kqueue() getpgid(0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000040)=0x40004, 0xfe68) connect$inet(r1, &(0x7f0000000240)={0x10, 0x2, 0x0, @multicast2}, 0x10) rfork(0x85000) kevent(r0, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x0, 0x88f]}], 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x141) r2 = openat$md(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MDIOCATTACH(r2, 0xc1b46d00, &(0x7f0000000500)={0x0, 0xfffffffe, 0x2, &(0x7f00000000c0)='./file0\x00', 0x800, 0x0, 0x346, 0x2000000, 0x80000, 0x349d, 0x0, [0x10001, 0x8, 0x0, 0xffffffff, 0x10011, 0xfffffffc, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x4, 0x6, 0x0, 0x0, 0x0, 0x200, 0x0, 0x0, 0x20000000, 0x100, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x40000002, 0x41, 0x0, 0x9, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x84, 0x0, 0x0, 0x0, 0x7, 0x2, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x2000000, 0x3, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x8000, 0x2, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfffffff9, 0x1ff, 0xb, 0x4, 0x800, 0x0, 0x80, 0x0, 0x3, 0xfffffff9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) socket(0x1c, 0x1, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x400000, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x10, &(0x7f0000000100)="ec7b000000800008000180a5a2519798", 0x0, 0x0, 0x0, 0xfdf9ff81}) r4 = open$dir(&(0x7f0000000000)='\x00', 0x2000000, 0x169) symlinkat(&(0x7f0000000c80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r4, &(0x7f0000001240)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a80)='./file0\x00') extattr_set_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f0000000080)='+.](\x00', 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r5 = semget$private(0x0, 0x3, 0x4f3) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) mount(&(0x7f00000001c0)='msdosfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) syz_emit_ethernet(0x56, &(0x7f0000000280)=ANY=[@ANYRES32=r5, @ANYBLOB="858c522b869b059a6aca408e6252be7c69e46e68d546e2199097e5aaf3d6646232832a2b49e4a2dac9d8cb4479834361d60e5a227a3f79370908974ca365992c2033b1fc43c06c9c5b30adcfe58b45c20d626930724938fccfe3afb660f29341addd259038b6e53b714721ef728feed25610bf9d2ea8940017f7e69f143dd80191c65a7359cdfd88e191831b6c25a14a60b0764fcc120f61d7ac"]) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0xff00) socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x0, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000000), 0x8, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x602, 0x0) 9.457591429s ago: executing program 0 (id=997): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) socketpair(0x11, 0x4, 0x2, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(0xffffffffffffffff, 0x84, 0x12, &(0x7f0000000140)={0x4}, 0x1) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r1, 0x40047477, &(0x7f0000000080)) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) open(&(0x7f0000000040)='./file0\x00', 0x8381, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0x0) mount(&(0x7f0000000400)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0xc0000400, &(0x7f00000001c0)) freebsd11_fstat(0xffffffffffffffff, &(0x7f0000000040)) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) __semctl$SEM_STAT(0x0, 0x0, 0xa, &(0x7f00000000c0)=&(0x7f0000000180)={{0x0}}) setreuid(r2, 0x0) getuid() open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) r3 = openat$md(0xffffff9c, &(0x7f0000000040), 0x4, 0x0) freebsd11_fstatfs(r3, &(0x7f00000002c0)) kqueue() dup2(0xffffffffffffffff, 0xffffffffffffffff) r4 = fork() wait4(r4, 0x0, 0x2, 0x0) r5 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r5, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x0, 0x6, @loopback, 0x290}, 0x1c, &(0x7f0000000280)=[{0x0}, {0x0}, {&(0x7f0000000140)}, {&(0x7f00000002c0)="7913820dbcc6c1c68f37338ca40879a836d98dcae2dbbc4c296da4f9", 0x1c}, {&(0x7f0000000500)="b311e2ad42fa6094f47c211826ef52f550a7cc8540dfb028234578a8815100d578d78987758840d0d0fc7185bbee2303be8763c9ae55c670b3de77a6cdbcca15d14c689b18517d5e6f52ce3d894bedaef4d0aab5e721394cab1ed38327a881f7a83e00167ae590fce65b6960b61f48101f040c01138d02b1e25b9d266deaf1c2a5df867f633c849535fd892cb7d04df578f64a9e708ad10e0000dda737e87040a795b3b953474d", 0xa7}], 0x22e, 0x0, 0x0, 0x149}, 0x4) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r6) __specialfd$eventfd(0x1, &(0x7f0000000000)={0x0, 0x5}, 0x8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) 9.457145045s ago: executing program 4 (id=998): open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000001b00)={r0, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x40000, 0x1ff], 0x0, 0x2, 0x0, {0x0, 0x4, 0x0}, {0x0, 0x0, @sival_ptr=0x400, @spare=[0x1, 0x2, 0x0, 0x33518c07, 0xdca6, 0x7fffffff, 0x800000000, 0xffff]}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) setregid(0x0, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) r1 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x13e, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2000) syz_emit_ethernet(0x10d, &(0x7f0000000700)={@broadcast, @local, [], {@ipv4={0x800, {{0x13, 0x4, 0x1, 0x0, 0xff, 0x67, 0xa, 0x3, 0x22, 0x0, @rand_addr=0x9, @local={0xac, 0x14, 0x0}, {[@timestamp={0x44, 0x10, 0x4, 0x3, 0xc, [{[], 0x7}, {[@multicast1], 0x401}]}, @generic={0x94, 0x3, 'w'}, @ssrr={0x89, 0x3, 0x4}, @ssrr={0x89, 0x1f, 0x4, [@loopback, @loopback, @rand_addr=0xc24, @local={0xac, 0x14, 0x0}, @loopback, @local={0xac, 0x14, 0x0}, @empty]}]}}, @generic="dd80ed6b69a5311e22be4819307140978f5aa4492bce01f205676be62a3f002196bb8d11324dd3c56f646c26c354983b97d60618031cd9a73c41f1c887f5ff7e04f7b6ffdd10059f2ff6496638fd073a56b49ecb547d486cd2723a98294e18e73d37176769dcbaf33869506c4d68a6f01c974909c3bbe254f93a92336055ed5e369b7051c229a2a97b6b2a50528cd8077003dcd32d638a57b729e9b8d7ff600a93f7abb6cb04860c585a6065532e1e3a0d7205"}}}}) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r3 = socket(0x1c, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r4 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r4, 0xffff, 0x1002, &(0x7f0000000300)=0x6, 0x4) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd0) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x31, &(0x7f00000005c0)=ANY=[@ANYBLOB="1f0000759819071ff464c2d996b29d620000000000"], 0x8) sendto$inet6(r5, &(0x7f00000004c0)="d791f39c6bb4dcb718df4062ba784d5cbca7d31bd3aba3f2db6908751defa111cc842b9c27aa15e4934f83684112f5efa36b97333e5825a3d142be2300d84ed3975bae11ed0cf633bcd099ae5254c59c74821a6bfefbad24fa62e7c50251b7433908319c0b0db9dd7b5aa03d74b70e7095028e7b325a02e594f0b8e5a2ede259460bd6a45f7d53ec1d3da6feff5e653acdd84e666be6ebf3bc25e31f933dc8d56dfb1e95d3bde1e08126b84e408dcfbbf4d1d02e2d9b2632ddcee93730bea18f88dbb28e0a416247acbca9adfe", 0xcd, 0x20008, &(0x7f0000002380)={0x1c, 0x1c, 0x0, 0x5, @loopback}, 0x1c) r6 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r6, &(0x7f0000000040)='./file0\x00', 0x100, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) aio_waitcomplete(0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r7, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) sendto(r8, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342", 0x66, 0x100, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) 9.45521661s ago: executing program 3 (id=999): rfork(0x96014) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c921bf0817a0000000000006a89dbdf", 0x2c) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) sendto$inet(r0, &(0x7f0000001040)="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", 0xffffffffffffffd2, 0x20081, &(0x7f0000000000)={0x10, 0x2, 0x0, @loopback}, 0x10) sendmsg(r0, &(0x7f0000000600)={&(0x7f0000000280)=@un=@abs={0x8, 0x1, 0x0, 0x2}, 0x8, 0x0, 0x0, 0x0}, 0x1) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) aio_read(&(0x7f0000000180)={r1, 0x0, 0x0, 0x0, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_ptr, @thr={0x0, 0x0}}}) aio_return(&(0x7f0000000180)={0xffffffffffffffff, 0x0, 0x0, 0x0, [], 0x2, 0x0, 0x0, {0x0, 0x4, 0x0}, {0x0, 0x0, @sival_int, @ke_flags}}) aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x5, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) openat$evdev(0xffffff9c, &(0x7f0000000180), 0x200000, 0x0) r2 = socket(0x1c, 0x1, 0x0) socketpair(0x1, 0x1, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r3, 0xffff, 0x1002, &(0x7f00000002c0)=0x4, 0x4) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0xc, &(0x7f0000000080)={0x1ff, {{0x1c, 0x1c, 0x2, 0x1000, @rand_addr="65cb30df060000000b603666ab2f3df4", 0x8}}, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="3f12c0d81c479be15ccb830030bc5ee7"}}}, 0xfc) getsockopt$inet6_int(r5, 0x29, 0xa, 0x0, 0x0) sendto(r4, &(0x7f0000000300)="0814", 0x2, 0x100, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r6 = socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) r7 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0x0, @mcast2, 0x6}, 0x1c) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) syz_emit_ethernet(0x5e, &(0x7f0000000540)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd6000000000283a000000000000000007392e660000000000fe8000000000000098850000000000aa890090780000000000000000000000000000000000000001fe8000000000000000000000000000bb"]) r8 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x1b2) getdirentries(r8, &(0x7f00000000c0)=""/10, 0xa, 0x0) 7.762129148s ago: executing program 0 (id=1000): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x11, r0) (async) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) lpathconf(&(0x7f0000000000)='./file0\x00', 0x6) (async, rerun: 32) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) (async, rerun: 32) r3 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) (async, rerun: 32) r4 = __specialfd$inotify(0x2, &(0x7f00000007c0)={0x100000}, 0x4) (rerun: 32) recvfrom$inet(r1, &(0x7f0000000140)=""/77, 0x4d, 0x40040, 0x0, 0x0) (async, rerun: 64) inotify_add_watch_at(r4, 0xffffffffffffff9c, &(0x7f0000000800)='./file0\x00', 0x40) (async, rerun: 64) copy_file_range(r3, 0x0, r2, 0x0, 0xffffffffffffffff, 0x0) (async, rerun: 64) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) (rerun: 64) r5 = socket(0x1c, 0x1, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r5, 0x84, 0x12, 0x0, 0x0) (async, rerun: 32) setsockopt$inet_sctp_SCTP_INITMSG(r5, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) (rerun: 32) setgroups(0xfffe, 0x0) r6 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) (async) dup(r6) (async) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) (async, rerun: 64) r7 = socket(0x1c, 0x1, 0x0) (rerun: 64) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x3, 0x410, 0xffffffffffffffff, 0x0) r8 = socket(0x1c, 0x3, 0x0) getsockopt$sock_timeval(r8, 0xffff, 0x1010, &(0x7f0000000000), &(0x7f0000001840)=0x10) (async, rerun: 64) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) (rerun: 64) getsockopt$inet_sctp_SCTP_INITMSG(r1, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x8) (async) recvfrom$unix(r9, 0x0, 0x0, 0x0, 0x0, 0x0) (async) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) 7.761318372s ago: executing program 4 (id=1001): syz_emit_ethernet(0x4e, &(0x7f00000001c0)=ANY=[@ANYBLOB]) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r0, &(0x7f00000008c0)=""/242, 0xfea3, 0x860, 0x0, 0x0) sendto(r1, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/126, 0x7e, 0x100, 0x0, 0x0) recvmsg(r0, 0x0, 0x40000) socket(0x1c, 0x1, 0x0) socket(0x0, 0x1, 0x6) profil(0x0, 0x0, 0xfffffffe, 0xd5) bind$inet(0xffffffffffffffff, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r2, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r3, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendmsg(0xffffffffffffffff, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r5, 0x40047477, &(0x7f0000000080)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt(r7, 0x0, 0x2, &(0x7f0000000580)="7215a382", 0x4) r8 = dup(r6) sendmsg$unix(r8, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="10000000ffff000001000000", @ANYRES32=r8, @ANYBLOB="60000000ff020000000000001bc4fc6e662a99b925daa16d93515158cae520bd8ea9cdf53f7f23aa4589547caf3dd7cdfdc131fcaf479bb0cb3300bd7e23399f20cba2f96353d0a9b51a00ff7912425c84327807a8ca5db823dccab096ecc60d15146069477efde042b5ae97caf1bdc56ec750b7", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0x70}, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) open(&(0x7f0000000040)='./file0\x00', 0x8381, 0x10) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0x0) mount(&(0x7f0000000400)='ufs\x00', &(0x7f0000000040)='./file0\x00', 0xc0000400, &(0x7f00000001c0)) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x100, 0x0) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x2000) r9 = socket(0x1c, 0x3, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r9, 0x29, 0x32, &(0x7f0000002a80)=ANY=[], 0x8) 7.760228092s ago: executing program 3 (id=1002): aio_waitcomplete(0x0, 0x0) munmap(&(0x7f0000ffb000/0x3000)=nil, 0xffffffffffffffff) socket(0xcea957e796b7bb96, 0x10000000, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000240)={0x3, 0x3, 0x0, 0xf7ffffff}) r0 = socket$inet(0x2, 0x1, 0xfc) setsockopt$inet_mreqsrc(r0, 0x0, 0x49, &(0x7f0000000200)={@empty, @empty, @local={0xac, 0x14, 0x0}}, 0xc) socket(0x10, 0x5, 0x0) symlink(0x0, &(0x7f0000000100)='./file0\x00') r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffedb, 0x149}, 0x30009) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) socket(0x26, 0x2, 0x0) r3 = accept$unix(r1, &(0x7f0000000100)=@file={0x39, 0x0, ""/55}, &(0x7f0000000140)=0x39) bind(r3, &(0x7f00000000c0)=@in6={0x0, 0x1c, 0x0, 0xfffffeff, @remote={0xfe, 0x80, '\x00', 0x0}, 0x40}, 0x0) r4 = msgget$private(0x0, 0x3ac) msgsnd(r4, &(0x7f00000001c0)=ANY=[], 0x8, 0x0) msgsnd(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="03"], 0xbe, 0x800) msgrcv(r4, 0x0, 0x0, 0x3, 0x1000) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 5.961610726s ago: executing program 0 (id=1003): aio_waitcomplete(0x0, 0x0) munmap(&(0x7f0000ffb000/0x3000)=nil, 0xffffffffffffffff) socket(0xcea957e796b7bb96, 0x10000000, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000240)={0x3, 0x3, 0x0, 0xf7ffffff}) r0 = socket$inet(0x2, 0x1, 0xfc) setsockopt$inet_mreqsrc(r0, 0x0, 0x49, &(0x7f0000000200)={@empty, @empty, @local={0xac, 0x14, 0x0}}, 0xc) socket(0x10, 0x5, 0x0) symlink(0x0, &(0x7f0000000100)='./file0\x00') r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffedb, 0x149}, 0x30009) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) socket(0x26, 0x2, 0x0) r3 = accept$unix(r1, &(0x7f0000000100)=@file={0x39, 0x0, ""/55}, &(0x7f0000000140)=0x39) bind(r3, &(0x7f00000000c0)=@in6={0x0, 0x1c, 0x0, 0xfffffeff, @remote={0xfe, 0x80, '\x00', 0x0}, 0x40}, 0x0) r4 = msgget$private(0x0, 0x3ac) msgsnd(r4, &(0x7f00000001c0)=ANY=[], 0x8, 0x0) msgsnd(r4, &(0x7f00000001c0)=ANY=[@ANYBLOB="03"], 0xbe, 0x800) msgrcv(r4, 0x0, 0x0, 0x3, 0x1000) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 5.961250549s ago: executing program 4 (id=1004): aio_waitcomplete(0x0, 0x0) r0 = socket$inet6(0x1c, 0x3, 0x1) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000280), 0x200, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0xfffffffc, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c1, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) syz_emit_ethernet(0x6e, &(0x7f0000000240)=ANY=[@ANYRES32=r1, @ANYRES64=r2]) r3 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x31, &(0x7f0000000400)=ANY=[@ANYBLOB='c^'], 0x2f8) sendto$inet6(r3, &(0x7f00000004c0)="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", 0x1d9, 0x1, &(0x7f00000012c0)={0x1c, 0x1c, 0x0, 0x4, @ipv4, 0x6}, 0x1c) r4 = socket(0x1c, 0x1, 0x0) r5 = open(&(0x7f00000002c0)='./file0\x00', 0x80000, 0x0) chflags(&(0x7f0000000300)='./file0\x00', 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x1010, r5, 0x1000) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read(r6, &(0x7f0000001000)=""/223, 0xdf) writev(0xffffffffffffffff, &(0x7f00000002c0), 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x5) cap_fcntls_get(r4, &(0x7f0000000580)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]) r7 = socket(0x1, 0x10000000, 0x4) getsockopt$inet_tcp_TCP_TXTLS_MODE(r7, 0x6, 0x28, &(0x7f0000000040), &(0x7f0000000180)=0x4) r8 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080), 0x100004) getsockopt$inet_mreqn(r8, 0x0, 0xc, &(0x7f00000000c0)={@multicast1, @remote}, &(0x7f0000000100)=0xc) r9 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r9, 0xffff, 0x1002, &(0x7f0000000300)=0x6, 0x4) 5.959911878s ago: executing program 3 (id=1005): socket(0x1b, 0x3, 0x0) getgid() r0 = open$dir(&(0x7f0000000280)='./file0\x00', 0x400, 0x24) extattr_delete_fd(r0, 0x0, &(0x7f0000000040)='\x00') r1 = socket(0x2, 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) sigaction(0xc, &(0x7f0000000200)={&(0x7f0000000180)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de3516cb69989999908", 0x35, {[0xfffff801, 0x50e5, 0xfdffffff]}}, 0x0) lgetfh(0x0, 0x0) r3 = socket(0x1b, 0x3, 0x0) recvmsg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000640)=""/171, 0xab}], 0x1, 0x0}, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0x40, &(0x7f0000000280)='cdg\x00', 0x4) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r4 = socket(0x1c, 0x1, 0x0) openat$md(0xffffff9c, &(0x7f0000000100), 0x40000, 0x0) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x2, 0x7e) lchflags(&(0x7f0000000000)='./file0\x00', 0x8014) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r7 = kqueue() kevent(r5, &(0x7f0000000000)=[{0x4c1e, 0xfffffffffffffff9, 0x5, 0x4, 0x18, 0x0, [0x8, 0xa, 0xffffffffffffffff, 0xfffffffffffffffe]}, {0xb, 0xfffffffffffffffd, 0x8062, 0x1, 0x9, 0x3, [0xd0, 0x7, 0x101, 0x2003]}], 0x2, 0x0, 0x0, 0x0) kevent(r7, &(0x7f0000000000), 0x3ff, 0x0, 0x8000800, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f00000002c0)={0x5, &(0x7f0000000240)=[{0x7e}, {}, {0x80000003}, {0x3ff}, {0x7}, {0x7}, {0x8}], 0x7}) setsockopt$inet_opts(0xffffffffffffff9c, 0x0, 0x1, &(0x7f0000000080)="ae3c44e34eec39aedbf603c29ec04063a70130ef5f3d2910a6e6c58f7adeaa391941c9cd74d8424852669f2c508803784d0664de83b86adde09714ebfd457e12e8f87e943324492141b8c49d358c1c2385b10e833d48930d94bf330d139500411f35dc69419c4e01", 0x68) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r6, 0x0) syz_emit_ethernet(0xec, &(0x7f0000000080)=ANY=[@ANYBLOB]) syz_emit_ethernet(0x8e, &(0x7f00000023c0)=ANY=[@ANYBLOB]) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) aio_waitcomplete(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) 4.041440227s ago: executing program 0 (id=1006): aio_waitcomplete(0x0, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r0 = kqueue() kevent(r0, &(0x7f00000006c0)=[{0xfffffffe, 0xfffffffffffffff5, 0x9, 0x0, 0xcf0, 0x1000, [0x0, 0xfffffffffffffffc, 0x4, 0x40000000000000]}, {0x40004, 0xfffffffffffffff5, 0x55, 0x1, 0x4, 0x688c, [0x9, 0x4, 0x4, 0x8c]}, {0x0, 0xfffffffffffffffd, 0x8092, 0x2, 0xbe08, 0x3, [0x0, 0xfff, 0x7, 0xffffffffffff8001]}, {0x2, 0xfffffffffffffffa, 0x4025, 0xffffff, 0xd3dc, 0x4, [0x3, 0x3, 0x4, 0x3]}, {0x3, 0xfffffffffffffff9, 0xc011, 0x8, 0x1, 0x200, [0x7ff, 0x8, 0x9, 0x1]}], 0x5, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x76, 0x8040, &(0x7f00000003c0)="6b8200456510b014de335b97014d6a46f4d4acae671918817e152dd4b52d8d5e479db3ab32a2c54543c51c98485113112f89749d8173800e0598749fb0f94f5118ee41268c844458d883b9f9664bdb8fc4c88bad5b1ad7827f5b501de0f13dca335a537210ebdaa4e42ee583175f", 0x0, 0x0, &(0x7f0000000540)="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"}) minherit(&(0x7f0000692000/0x4000)=nil, 0x4000, 0x2) syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaff7fd900aaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000008000000000aaff0200000000000000000000000000010000bc000000000000"]) r3 = socket(0x1c, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x40, @empty, 0x2}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd600000000014060000000000080001000000001b00000000fe8000000000000000000000000000aa4e214e22", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5043000090780000af77fd5a7314df8d6ce6c9e2a99ec81d4dac5530cd85df88e67f5b830edf9927d1c4cee1dfc4dc2478fd4f6b7e9c6711782425616a0fedb624c77579c6c0f1691b3d"]) open$dir(&(0x7f0000000940)='./file3\x00', 0x13689f7875b0fff6, 0x1de) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) socketpair(0x17, 0x4, 0x2, 0x0) aio_waitcomplete(0x0, 0x0) setuid(0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x6, 0x1010, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x1010, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) munlock(&(0x7f0000ffd000/0x1000)=nil, 0x1000) open$dir(&(0x7f0000000880)='./file1\x00', 0x10000, 0x8) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r4 = open(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x85) sysarch$I386_SET_GSBASE(0xa, 0xffffffffffffffff) inotify_add_watch_at(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)='./file3\x00', 0x20000410) freebsd11_getdents(r4, &(0x7f0000000480)=""/158, 0x9e) 4.038605083s ago: executing program 4 (id=1007): r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x31, &(0x7f00000016c0)=ANY=[@ANYBLOB="0004000000000000040100040100c2"], 0x28) (async) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) (async) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000180)={'freebsd\x00', 0x3}, 0x24) sendto$inet6(r0, 0x0, 0x0, 0x81, &(0x7f0000000080)={0x1c, 0x1c, 0x2, 0x6, @rand_addr="fee3a38e40ac1c51de6ee27b07a430a0", 0x9}, 0x1c) (async, rerun: 64) r1 = kqueue() (async, rerun: 64) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r2 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x10) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) (async, rerun: 32) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) (rerun: 32) fcntl$setstatus(r3, 0x4, 0x10044) (async, rerun: 64) r4 = socket(0x1c, 0x1, 0x0) (rerun: 64) bind$inet6(r4, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) (async) connect$inet6(r4, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) r5 = open$dir(&(0x7f0000000240)='./file0\x00', 0x2, 0x16a) sendfile(r5, r4, 0x0, 0x0, 0x0, 0x0, 0x0) writev(r3, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) (async) r6 = open(&(0x7f0000000040)='./file0/../file0/file0\x00', 0x80, 0x0) preadv(r6, &(0x7f0000001740)=[{&(0x7f0000000740)=""/4096, 0x400004}], 0x1, 0x0) (async) aio_suspend(&(0x7f0000000bc0)=[{0xffffffffffffffff, 0x0, 0x0, 0x0, [0x9, 0x80000000], 0x3f, 0x20, 0x1, {0xfffffffffffffff8, 0x794b1f5c, 0x0}, {0x1, 0xd, @sigval_int=0x5, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0xffffffffffffff1b, 0x0, 0x0, [0x3, 0x5], 0x780000, 0x5, 0x6, {0x6, 0x0, 0x0}, {0x1, 0xe, @sigval_int=0x44}}, {0xffffffffffffffff, 0x8, 0x0, 0x0, [0x0, 0x1], 0x0, 0x18, 0x2, {0xffffffffffffffff, 0x4, 0x0}, {0x3, 0x1b, @sigval_ptr=0x3, @ke_flags=0x205e}}, {0xffffffffffffffff, 0x3, 0x0, 0x0, [0x5, 0x4], 0x7, 0x4, 0x3e1, {0x7, 0xfff, 0x0}, {0x4, 0x11, @sigval_int=0x9, @thr={0x0, 0x0}}}, {0xffffffffffffffff, 0x8, 0x0, 0x0, [0x5, 0x7], 0x7fff, 0x1, 0x8, {0x4, 0x7, 0x0}, {0x4, 0x2, @sival_ptr=0xa2, @thr={0x0, 0x0}}}], 0x5, 0x0) (async, rerun: 64) kevent(r1, &(0x7f0000000000), 0x20b89, 0x0, 0xffff3955, 0x0) (rerun: 64) fork() semop(0x0, &(0x7f00000001c0)=[{0x2, 0xfffe}], 0x1) (async) thr_new(&(0x7f0000000240)={&(0x7f0000000000)="8fe820ce46f400c4e215914c51fec4e17c50f0c4c1905c494cc4c3f17cccbcc4e201f7162ed12281c500000010c4c3d968ae02000000fa660f3841a5d3000000", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x3c) (async, rerun: 64) pathconf(&(0x7f00000001c0)='./file0/../file0\x00', 0x37) (async, rerun: 64) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) (async) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) fcntl$dupfd(r7, 0x10, 0xffffffffffffffff) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) (async) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) 2.108450811s ago: executing program 0 (id=1008): aio_waitcomplete(0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) dup(0xffffffffffffffff) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f00000002c0)={0x15, 0x23, 0x4, &(0x7f0000000340)='\x00\x00\x00\x00', 0x70, &(0x7f0000000400)="ffa6e8cf8c97191500000052aa74ff08b581580f5800579b0d811b1d3a72a677f76785aa6471bb219766e4813c2d092ebbe0b7eeb301301a8d18e8024a07f40435fa1c01c56d44f13543044aedebe2c4fd4bd75f621c3fafdd8cec60e962e929e21a1314a7c74730af2fff2e5d5170d7", 0x8, 0x1000, [0x3, 0x0, 0x3ff, 0x7]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r2 = socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x3, 0x0) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r4, 0x29, 0x14, &(0x7f0000000140)=0x4, 0x4) setsockopt$inet6_int(r4, 0x29, 0x39, &(0x7f0000000180)=0xffff2375, 0x4) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x1, 0x0, &(0x7f0000000100)) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x9, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0xffffffffdfffffff, 0x5) syz_emit_ethernet(0x4e, &(0x7f0000000200)=ANY=[@ANYRES8]) openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r5 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x602, 0x0) write(r5, 0x0, 0x0) ioctl$BIOCSHDRCMPLT(0xffffffffffffffff, 0x80044275, &(0x7f0000000380)=0x2) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0xff8008, &(0x7f00000001c0)) r6 = socket(0x2, 0x3, 0x4) connect$inet(r6, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) sendto(r6, 0x0, 0x0, 0x180, 0x0, 0x0) recvmsg(r6, &(0x7f0000001200)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000140)=""/99, 0x63}], 0x1, 0x0}, 0x40000) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) dup2(r2, r6) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 2.107606333s ago: executing program 4 (id=1009): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) syz_emit_ethernet(0x42, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaa4fdd9bac97aaaaaaaaaaaaaaaa080046000034fffc00000084906cffffffffac1400aa890302000b01907800020000450800020052000907560ffc7f000001fffffff8"]) r1 = fcntl$dupfd(r0, 0x11, r0) ioctl$KDGKBTYPE(r1, 0x40044b40, 0x9) (async) ioctl$SMB_READB(r0, 0xc020697a, &(0x7f00000000c0)={0x0, 0x0, 0x0, @buf="dcbf", @buf="de32", 0x0, 0x0, 0x0, 0x0}) (async) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) (async) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) (async) kqueue() (async) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x9, @loopback}, 0x1c, &(0x7f00000003c0), 0x0, 0x0, 0x0, 0x149}, 0x0) setuid(0x0) (async) r3 = socket(0x1, 0x2, 0x81) sendto$inet6(r3, &(0x7f0000000080)="02021b00020000008f00a277fce00d8f", 0x10, 0x0, 0x0, 0x0) (async) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x6, 0x1010, 0xffffffffffffffff, 0x0) (async) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, &(0x7f0000000080)={0x8}, 0x1) r4 = openat$filemon(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) (async) r5 = __specialfd$eventfd(0x1, &(0x7f0000000a00), 0x8) write(r5, &(0x7f00000000c0)="75a3bc9e013442a3", 0x8) ioctl$FILEMON_SET_FD(r4, 0xc0045301, &(0x7f0000000a40)=r5) (async) readv(r5, &(0x7f0000000940)=[{&(0x7f0000001a80)=""/4096, 0x1000}], 0x1) (async) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) (async) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x1010, 0xffffffffffffffff, 0x0) r6 = socket(0x1c, 0x1, 0x0) (async) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_buf(r7, 0x29, 0x32, &(0x7f0000002340)=""/4096, &(0x7f0000001000)=0x1000) (async) syz_emit_ethernet(0x6e, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaf8fe7004f5b3750786dd60d9002000383a003bcc694212fae9849cd9402a6cdc5c2486f44e6d2ee900fe8000000000000000000000000000aa0200fc5d5d0eda475fb4416aeb1e030990780000380060060000000080000000000009000000000000000000000100000000000000000000ffff7f000001947bddf014b016a6920829faf9f7c57b840926594c56b8fa0f8e7deb6c659beb141d83fa08b1970f4cee443cff45a0cf53f0c2c44aad7e703faf0c9157f4643eff47297a1d242618ca855dd2eeb4c72b554770d7f0bb1f4eb0c39b4da9cb33ae6c84a3e5d1db2acef0dc"]) (async) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) (async) r8 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000480), 0x202, 0x0) ioctl$CRIOGET(r8, 0xc0046364, &(0x7f00000001c0)=0x456) 2.106423182s ago: executing program 3 (id=1010): open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000001b00)={r0, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x40000, 0x1ff], 0x0, 0x2, 0x0, {0x0, 0x4, 0x0}, {0x0, 0x0, @sival_ptr=0x400, @spare=[0x1, 0x2, 0x0, 0x33518c07, 0xdca6, 0x7fffffff, 0x800000000, 0xffff]}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) setregid(0x0, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) r1 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x13e, &(0x7f0000000240)=ANY=[@ANYBLOB="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"]) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0\x00', 0x0, 0x2000) syz_emit_ethernet(0x10d, &(0x7f0000000700)={@broadcast, @local, [], {@ipv4={0x800, {{0x13, 0x4, 0x1, 0x0, 0xff, 0x67, 0xa, 0x3, 0x22, 0x0, @rand_addr=0x9, @local={0xac, 0x14, 0x0}, {[@timestamp={0x44, 0x10, 0x4, 0x3, 0xc, [{[], 0x7}, {[@multicast1], 0x401}]}, @generic={0x94, 0x3, 'w'}, @ssrr={0x89, 0x3, 0x4}, @ssrr={0x89, 0x1f, 0x4, [@loopback, @loopback, @rand_addr=0xc24, @local={0xac, 0x14, 0x0}, @loopback, @local={0xac, 0x14, 0x0}, @empty]}]}}, @generic="dd80ed6b69a5311e22be4819307140978f5aa4492bce01f205676be62a3f002196bb8d11324dd3c56f646c26c354983b97d60618031cd9a73c41f1c887f5ff7e04f7b6ffdd10059f2ff6496638fd073a56b49ecb547d486cd2723a98294e18e73d37176769dcbaf33869506c4d68a6f01c974909c3bbe254f93a92336055ed5e369b7051c229a2a97b6b2a50528cd8077003dcd32d638a57b729e9b8d7ff600a93f7abb6cb04860c585a6065532e1e3a0d7205"}}}}) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r3 = socket(0x1c, 0x1, 0x0) connect$inet6(r3, &(0x7f0000000100)={0x1c, 0x1c, 0x3, 0x8, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r2, 0x0) r4 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r4, 0xffff, 0x1002, &(0x7f0000000300)=0x6, 0x4) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd0) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0x31, &(0x7f00000005c0)=ANY=[@ANYBLOB="1f0000759819071ff464c2d996b29d620000000000"], 0x8) sendto$inet6(r5, &(0x7f00000004c0)="d791f39c6bb4dcb718df4062ba784d5cbca7d31bd3aba3f2db6908751defa111cc842b9c27aa15e4934f83684112f5efa36b97333e5825a3d142be2300d84ed3975bae11ed0cf633bcd099ae5254c59c74821a6bfefbad24fa62e7c50251b7433908319c0b0db9dd7b5aa03d74b70e7095028e7b325a02e594f0b8e5a2ede259460bd6a45f7d53ec1d3da6feff5e653acdd84e666be6ebf3bc25e31f933dc8d56dfb1e95d3bde1e08126b84e408dcfbbf4d1d02e2d9b2632ddcee93730bea18f88dbb28e0a416247acbca9adfe", 0xcd, 0x20008, &(0x7f0000002380)={0x1c, 0x1c, 0x0, 0x5, @loopback}, 0x1c) r6 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) openat(r6, &(0x7f0000000040)='./file0\x00', 0x100, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) aio_waitcomplete(0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom(r7, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) sendto(r8, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342", 0x66, 0x100, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) 5.516197ms ago: executing program 4 (id=1011): aio_waitcomplete(0x0, 0x0) profil(0x0, 0x0, 0x1, 0xd6) socket(0x1c, 0x1, 0x0) aio_waitcomplete(0x0, 0x0) inotify_rm_watch(0xffffffffffffffff, 0x0) socket(0x1c, 0x1, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000180), 0x200, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c1, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x20000001, 0x0) syz_emit_ethernet(0x9c, &(0x7f0000000200)=ANY=[@ANYRESHEX]) ioctl$KDGETMODE(r0, 0x40046676, 0x9fef) sendmsg$inet6_sctp(r0, 0x0, 0x0) open$dir(&(0x7f0000000840)='./file1\x00', 0x20000, 0x12) lchmod(&(0x7f0000000140)='./file1\x00', 0x120) open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) open$dir(0x0, 0x40000400000002c2, 0x5b) setuid(0xffffffffffffffff) r1 = fork() shmget$private(0x0, 0x0, 0x0, &(0x7f0000ffe000/0x1000)=nil) r2 = openat$filemon(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$FILEMON_SET_PID(r2, 0xc0045302, &(0x7f00000000c0)=r1) ioctl$SMB_WRITEB(0xffffffffffffffff, 0xc0086924, 0x0) r3 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file1\x00', 0x1000, 0x0) lpathconf(&(0x7f0000000080)='./file1\x00', 0x2) madvise(&(0x7f000018c000/0x1000)=nil, 0x1000, 0x5) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x0, &(0x7f0000000140)) socket(0x1c, 0x5, 0xd) 4.198677ms ago: executing program 3 (id=1012): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) r0 = socket(0x1c, 0x1, 0x0) freebsd11_mknod(0x0, 0x6000, 0x9) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffc]}], 0x1, 0x0, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) setpriority(0x2, 0x0, 0xfffffffc) getsockopt$sock_timeval(r0, 0xffff, 0x1006, &(0x7f0000001680), &(0x7f00000016c0)=0x8) select(0x40, &(0x7f0000000340)={0x0, 0x10000000000a39e, 0x0, 0x300, 0xffffffffffffffff}, 0x0, 0x0, &(0x7f00000005c0)={0x0, 0x10000}) openat(0xffffffffffffff9c, 0x0, 0x80000, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000140)='chd\x00', 0x4) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r3, 0x0, r2) r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendmsg(r4, &(0x7f0000000700)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x2, 0x5, @loopback, 0xfffffffd}, 0x1c, &(0x7f0000000000)=[{&(0x7f00000000c0)="85d9000000000000", 0x8}], 0x1, 0x0}, 0x8) syz_emit_ethernet(0x7e, &(0x7f0000000500)=ANY=[@ANYBLOB="ffffffffffff0000000000000800455000700000000004019078ac1400bbe00000010c009078fd000000456cfffc00640000a6010000000000000000000094060000006289030783038544101ae0000000047f00000100000006890303940600000008441802000100000100015304345d8000000000000006000000"]) sigaction(0x10, &(0x7f0000000040)={&(0x7f0000000180)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de3516cb69989999908", 0x35, {[0xfffff801, 0x70e5, 0xffff]}}, 0x0) r5 = fork() ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0x7fff, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x9, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x0, 0x5, 0x10000e0, 0x7ff, 0x2, 0x0, 0x8, 0xc, 0x8]}, {0x4005c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0x0, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x7f33c58a, 0x2, 0x58, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eec, 0x0, 0x0, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x79, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x803, 0x7f, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x538, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x6, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x2, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1ff, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124442, 0x8, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0xfffffffe, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x42, 0x225, 0x81, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0x10000, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x34, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0x2, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xffffdffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0xa, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd1, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff5, 0x1, 0x3041, 0x8, 0x400006f, 0x7, 0x7, 0x3, 0xfff, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xfffffff8, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc9, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0x9, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x10000, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x1, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x400, 0x5, 0xfffffffc, 0xffffffff, 0xcd9f, 0x19d, 0x4, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x7, 0x81, 0x8, 0x2, 0x4, 0x6, 0x1, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x7, 0x8, 0x1ff, 0x7fe, 0xa, 0x0, 0x1, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x6, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x1a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xfffffffb]}, {0x6, [0x3, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x5, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0x1000, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x1, 0x0, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x2, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x0, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x1000008, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x9, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x4, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x80000001, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x401, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x4, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x0, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0x3, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x1, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70c, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x2, 0x401, 0x8, 0x8, 0x1, 0x7, 0x2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x8, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0x10001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x6, 0x9, 0x0, 0x3]}]}) r6 = socket(0x1c, 0x5, 0x0) bind$unix(r6, &(0x7f0000000080)=@abs={0x8, 0x1c}, 0x1c) sigqueue(r5, 0x11, @sigval_int=0xfd51) sigqueue(r5, 0x13, @sigval_ptr=0x1000000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r7 = socket(0x1c, 0x1, 0x0) r8 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r8, 0x0, 0x1, &(0x7f0000000200)="ee08665d19ac14d5f513226ba8e6bce4d5bd473019d6e283717748891197a7728420aef61715f7b1c3d4b383", 0x2c) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) 0s ago: executing program 0 (id=1019): r0 = socket(0x1c, 0x1, 0x0) r1 = accept$unix(r0, &(0x7f0000000100)=@file={0x39, 0x0, ""/55}, &(0x7f0000000140)=0x39) bind(r1, &(0x7f00000000c0)=@in6={0x0, 0x1c, 0x0, 0xfffffeff, @remote={0xfe, 0x80, '\x00', 0x0}, 0x40}, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.144' (ED25519) to the list of known hosts. lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe006de66508 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1641 2nd 0xffffffff83cc7a40 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/i386/kernel/sys/net/if_tuntap.c:1340 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff81664981 at witness_checkorder+0x781 #1 0xffffffff814ea187 at __mtx_lock_flags+0x187 #2 0xffffffff8184f536 at tuninit+0x76 #3 0xffffffff8183da64 at ether_ioctl+0x1b4 #4 0xffffffff8184e2d2 at tunifioctl+0x3c2 #5 0xffffffff8198934b at in_control_ioctl+0x16db #6 0xffffffff8182d6e1 at ifioctl+0xe51 #7 0xffffffff8167372a at kern_ioctl+0x4ca #8 0xffffffff8167316e at sys_ioctl+0x36e #9 0xffffffff82145702 at amd64_syscall+0x4e2 #10 0xffffffff820ea3eb at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff81665852 at witness_checkorder+0x1652 #1 0xffffffff81553d49 at _sx_xlock+0x139 #2 0xffffffff8184df9a at tunifioctl+0x8a #3 0xffffffff8182a36d at ifhwioctl+0x1d6d #4 0xffffffff8184bb88 at tunioctl+0xd38 #5 0xffffffff811c5406 at devfs_ioctl+0x266 #6 0xffffffff82307b87 at VOP_IOCTL_APV+0x87 #7 0xffffffff817d0c67 at vn_ioctl+0x3c7 #8 0xffffffff811c62c9 at devfs_ioctl_f+0x69 #9 0xffffffff8167372a at kern_ioctl+0x4ca #10 0xffffffff8167316e at sys_ioctl+0x36e #11 0xffffffff80440dd7 at freebsd32_ioctl+0x607 #12 0xffffffff822cfab2 at ia32_syscall+0x4d2 #13 0xffffffff820eac4f at int0x80_syscall_common+0x9c if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 md2147483519: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe00077e9000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e9000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e9000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e9000 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 Aug 29 20:54:41 ci-freebsd-i386-4 kernel: attempted source route from 255.255.255.255 to 172.20.1.170 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 Out of ktrace request objects. md2147483645: truncating fractional last sector by 3 bytes Aug 29 20:54:50 ci-freebsd-i386-4 kernel: arp: aa:aa:aa:aa:aa:bb is using my IP address 172.20.0.170 on tap0! if_delmulti_locked: detaching ifnet instance 0xfffffe00077e9000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 Expensive callout(9) function: 0xffffffff81a3fea0(0xfffffe007799ca80) 0.002427650 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 ZFS filesystem version: 5 ZFS storage pool version: features support (5000) if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 md1: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 md2: truncating fractional last sector by 1 bytes md7: truncating fractional last sector by 4 bytes Aug 29 20:55:04 ci-freebsd-i386-4 syslogd: last message repeated 4 times Aug 29 20:55:24 ci-freebsd-i386-4 kernel: nd6_na_input: duplicate IP6 address fe80:3::aa md38403: truncating fractional last sector by 50368 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 Aug 29 20:55:26 ci-freebsd-i386-4 dhclient[1320]: Can't find free bpf: No such file or directory Aug 29 20:55:26 ci-freebsd-i386-4 dhclient[1320]: exiting. if_delmulti_locked: detaching ifnet instance 0xfffffe00077e9000 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 Aug 29 20:55:31 ci-freebsd-i386-4 dhclient[1360]: Can't find free bpf: No such file or directory Aug 29 20:55:31 ci-freebsd-i386-4 dhclient[1360]: exiting. if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 Aug 29 20:55:33 ci-freebsd-i386-4 dhclient[1402]: Can't find free bpf: No such file or directory Aug 29 20:55:33 ci-freebsd-i386-4 dhclient[1402]: exiting. Aug 29 20:55:35 ci-freebsd-i386-4 dhclient[1440]: Can't find free bpf: No such file or directory Aug 29 20:55:35 ci-freebsd-i386-4 dhclient[1440]: exiting. if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 md3: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe0077d08528: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83716b20 usecount 7, writecount 6, refcount 69 seqc users 0 hold count flags () flags (VIRF_PGREAD|VV_MD|VMP_LAZYLIST) v_object 0xfffffe007ba012e8 ref 1 pages 536 cleanbuf 64 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe005409f780 (pid 1648, syz-executor, tid 101670) nlink=1, effnlink=1, size=2147483650, extsize 0 generation=532d21e1, uid=0, gid=0, flags=0x48008 ino 197752, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 md6: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe00077e7800 Aug 29 20:56:14 ci-freebsd-i386-4 kernel: attempted source route from 224.0.0.2 to 172.20.4.187 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e8800 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077e9000 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 vnode_pager_putpages: zero-length write at 1610612736 resid 4096 0xfffffe007b4c7898: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83716b20 usecount 0, writecount 0, refcount 7 seqc users 0 hold count flags () flags (VIRF_PGREAD|VI_DOINGINACT|VMP_LAZYLIST) v_object 0xfffffe007ba584d8 ref 0 pages 40 cleanbuf 2 dirtybuf 3 lock type ufs: EXCL by thread 0xfffffe007ba6d780 (pid 2151, syz-executor, tid 102868) nlink=1, effnlink=1, size=2147483652, extsize 0 generation=c04d6edc, uid=0, gid=0, flags=0x4 ino 232, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe00077e8800 if_delmulti_locked: detaching ifnet instance 0xfffffe005856e800 SYZFAIL: cover mmap failed (errno 12: Cannot allocate memory) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=2 req=566 state=1 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl