last executing test programs: 13.065144565s ago: executing program 3 (id=4): procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x16) r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) umask(0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r1, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) open$dir(0x0, 0x110206, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000180), 0x100000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f00000001c0)={0xb, 0x21, 0x18, &(0x7f0000000140)="ec7b00000900ff2425c3f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdfffd05, [0x0, 0x0, 0x0, 0x2]}) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000100)={0x29, 0x0, 0x8, &(0x7f00000000c0)="ec7b00002cfeff02", 0x0, 0x0, 0x0, 0xb, [0x40000000, 0x0, 0x0, 0x3]}) close(r4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x7843d88b80d1cecd, 0x100) pipe2(0x0, 0xd505eb4556f41fdb) ioctl$KDMKTONE(r5, 0x20044b08) r6 = socket(0x1c, 0x1, 0x0) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) r8 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_buf(r8, 0x29, 0x68, &(0x7f0000000200)="aab9266ddfdb0845b1b40ee2064ebe569ec3f98ca30c40c18f2ac4887ae3b4ff6b3d3f77b77e8bd422260493fd645192fa38128112b3b7f4e2ec1f34375acbd50e03d80f4b3069df", 0x48) setsockopt$inet6_int(r8, 0x29, 0x2b, &(0x7f0000000080)=0x2, 0x4) getsockopt$sock_timeval(r6, 0xffff, 0x1005, &(0x7f0000000040), &(0x7f00000000c0)=0x8) sendto$inet6(r8, &(0x7f0000002700)="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", 0x2db, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) setsockopt$inet6_int(r7, 0x29, 0x1b, &(0x7f00000001c0), 0x4) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000080), 0x4) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x4, @empty, 0xffff}, 0x1c) r9 = setsid() procctl$PROC_TRAPCAP_STATUS(0x0, r9, 0xa, &(0x7f0000000000)) 11.286405945s ago: executing program 0 (id=64): r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x1, &(0x7f00000000c0)={0x1c, 0x1c, 0x0, 0x7ff, @ipv4={'\x00', '\xff\xff', @loopback}, 0x6}, 0x4b) setsockopt$inet6_udplite(0xffffffffffffffff, 0x88, 0x2, &(0x7f0000000040)=0xa, 0x4) lchmod(&(0x7f0000000000)='./file0\x00', 0x102) sendto$inet6(0xffffffffffffffff, &(0x7f00000002c0)="5a89c9", 0x3, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0x4, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) 11.035783033s ago: executing program 0 (id=65): socket(0x26, 0x2, 0x0) cpuset_setaffinity(0x2, 0x2, 0x0, 0x0, 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80000001, &(0x7f00000004c0), 0x0, [0x3, 0x10000000], 0x200000000000000, 0x20, 0x0, {0x4, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562ef}}) r0 = open(&(0x7f0000000880)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, 0xd2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r4 = __specialfd$inotify(0x2, &(0x7f00000001c0)={0x100000}, 0x4) r5 = socket(0x1b, 0x3, 0x0) shutdown(r5, 0x0) r6 = socket(0x1b, 0x3, 0x0) sendto$inet6(r6, &(0x7f0000000080)="02090100020000008e4ca277fce00d8f", 0x10, 0x20008, 0x0, 0x0) inotify_add_watch_at(r4, 0xffffffffffffff9c, &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x5) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)={{0x0, 0xffffffffffffffff}, {0xffffffffffffffff, 0x10}}, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000040)={0x15, 0x0, 0x10, &(0x7f0000000100)="ec7b0000000000000001f0a5a2519798", 0x0, 0x0, 0x8, 0xfdf9ff85}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r7 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) syz_emit_ethernet(0x7e, &(0x7f00000003c0)=ANY=[@ANYBLOB="8f6f77edbb65ffffffffffff86dd605f6ad900483a003bcc3f0600000058132fa13a8be173b2fe8000000000000000000000000000aa02009078000000386006c33e00002b00fe8000000000000000000000000000aa0000000000000300fffffffffffffffe6402007300000000ff020000000000000000000000000001"]) readlinkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) 10.747875265s ago: executing program 3 (id=4): procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x16) r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) umask(0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r1, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) open$dir(0x0, 0x110206, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000180), 0x100000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f00000001c0)={0xb, 0x21, 0x18, &(0x7f0000000140)="ec7b00000900ff2425c3f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdfffd05, [0x0, 0x0, 0x0, 0x2]}) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000100)={0x29, 0x0, 0x8, &(0x7f00000000c0)="ec7b00002cfeff02", 0x0, 0x0, 0x0, 0xb, [0x40000000, 0x0, 0x0, 0x3]}) close(r4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x7843d88b80d1cecd, 0x100) pipe2(0x0, 0xd505eb4556f41fdb) ioctl$KDMKTONE(r5, 0x20044b08) r6 = socket(0x1c, 0x1, 0x0) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) r8 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_buf(r8, 0x29, 0x68, &(0x7f0000000200)="aab9266ddfdb0845b1b40ee2064ebe569ec3f98ca30c40c18f2ac4887ae3b4ff6b3d3f77b77e8bd422260493fd645192fa38128112b3b7f4e2ec1f34375acbd50e03d80f4b3069df", 0x48) setsockopt$inet6_int(r8, 0x29, 0x2b, &(0x7f0000000080)=0x2, 0x4) getsockopt$sock_timeval(r6, 0xffff, 0x1005, &(0x7f0000000040), &(0x7f00000000c0)=0x8) sendto$inet6(r8, &(0x7f0000002700)="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", 0x2db, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) setsockopt$inet6_int(r7, 0x29, 0x1b, &(0x7f00000001c0), 0x4) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000080), 0x4) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x4, @empty, 0xffff}, 0x1c) r9 = setsid() procctl$PROC_TRAPCAP_STATUS(0x0, r9, 0xa, &(0x7f0000000000)) 8.918318982s ago: executing program 0 (id=66): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000bc"]) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="9f4c4662c157ffffffffffff08004500002000680000010290780000ef4c0000130000000000000000"]) pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) open$dir(0x0, 0x200000, 0xc6) mkdir(&(0x7f0000000080)='./file\x00', 0x4) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x4a) chroot(&(0x7f0000000040)='./file/file0\x00') fchownat(0xffffffffffffff9c, &(0x7f0000000280)='./file/file0/../\x00', 0x0, 0x0, 0x4000) socket(0x1c, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) truncate(&(0x7f0000000140)='./file0\x00', 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(r1, r2, 0x1, 0x400000000000, 0x0, 0x0, 0x1) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000002c0)='\x00'], 0x0) 7.874178693s ago: executing program 3 (id=4): procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x16) r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) umask(0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r1, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) open$dir(0x0, 0x110206, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000180), 0x100000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f00000001c0)={0xb, 0x21, 0x18, &(0x7f0000000140)="ec7b00000900ff2425c3f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdfffd05, [0x0, 0x0, 0x0, 0x2]}) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000100)={0x29, 0x0, 0x8, &(0x7f00000000c0)="ec7b00002cfeff02", 0x0, 0x0, 0x0, 0xb, [0x40000000, 0x0, 0x0, 0x3]}) close(r4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x7843d88b80d1cecd, 0x100) pipe2(0x0, 0xd505eb4556f41fdb) ioctl$KDMKTONE(r5, 0x20044b08) r6 = socket(0x1c, 0x1, 0x0) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) r8 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_buf(r8, 0x29, 0x68, &(0x7f0000000200)="aab9266ddfdb0845b1b40ee2064ebe569ec3f98ca30c40c18f2ac4887ae3b4ff6b3d3f77b77e8bd422260493fd645192fa38128112b3b7f4e2ec1f34375acbd50e03d80f4b3069df", 0x48) setsockopt$inet6_int(r8, 0x29, 0x2b, &(0x7f0000000080)=0x2, 0x4) getsockopt$sock_timeval(r6, 0xffff, 0x1005, &(0x7f0000000040), &(0x7f00000000c0)=0x8) sendto$inet6(r8, &(0x7f0000002700)="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", 0x2db, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) setsockopt$inet6_int(r7, 0x29, 0x1b, &(0x7f00000001c0), 0x4) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000080), 0x4) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x4, @empty, 0xffff}, 0x1c) r9 = setsid() procctl$PROC_TRAPCAP_STATUS(0x0, r9, 0xa, &(0x7f0000000000)) 5.990767705s ago: executing program 0 (id=70): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000bc"]) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="9f4c4662c157ffffffffffff08004500002000680000010290780000ef4c00001300"/46]) pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) open$dir(0x0, 0x200000, 0xc6) mkdir(&(0x7f0000000080)='./file\x00', 0x4) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x4a) chroot(&(0x7f0000000040)='./file/file0\x00') fchownat(0xffffffffffffff9c, &(0x7f0000000280)='./file/file0/../\x00', 0x0, 0x0, 0x4000) socket(0x1c, 0x1, 0x0) execve(0x0, &(0x7f00000003c0)=[&(0x7f0000000300)='^@\x00', &(0x7f0000000400)='\xbd\x99\x9dym\xd6(}\n\r)\x00hc\xba\x84e\x9ca\xe8\xfa\x05\x97@U\x91i\xf5-\xbd\xb1\x9b\xfe=\x81\xd8\xcb\xce\xb6\xaa\x7fW\x8f\xce}\x02\xd7\x97\xe1A\x87ym\xc8s\xcb\xad\xb0l\xa7:\xf6\xd24\x12f0\xc8\xc1U\xa5\x1cp\xcb\xff\xb4\xde2\xdf\x90(C\x84\xba\xaa\x8a\x12\xd1)\xe8\x11\x98BU\xf8\xdf_\xd6\xb1\x9a\xbf\xfd\x1cW\x17+\x92\xa1\xb2\x9a\xcca\xec.\xdf\x89\xa7A\xad\x8d\x1d\xe1pd\xbe\xa3\xba\xc8\xe6\x93US \x05\xc2\xfa\x80o\x18\x03K\xe1\xcdH\xdc\x90\xdd\xd1\xb4R\x041\x81\x93{\x1d0a\xab_\xec\x1c', &(0x7f0000000380)=',}^-E-\x00'], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) truncate(&(0x7f0000000140)='./file0\x00', 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) sendfile(r1, r4, 0x1, 0x400000000000, 0x0, 0x0, 0x1) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000002c0)='\x00'], 0x0) 5.788209046s ago: executing program 1 (id=74): open(&(0x7f0000000040)='./file0\x00', 0x200, 0x124) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) r0 = socket$inet6(0x1c, 0x3, 0x1c) cap_ioctls_limit(r0, &(0x7f0000000080)) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r1 = kqueue() freebsd11_mknod(0x0, 0x1000, 0x0) kqueue() open$dir(&(0x7f00000000c0)='./file1\x00', 0x80201, 0x0) kevent(r1, &(0x7f0000000040)=[{0x12dd, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r3, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x6, @rand_addr="7ced1a01d641e48ac1f0114efb95cf5b", 0xfffffffc}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x10145}, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) msgget(0x1, 0x213) msgget(0x1, 0x501) select(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaa94ea09066dad86dd60db834400081100fe8000000000000000000000000000bbfe8000000000000000000000000000aa4e204e2200089078"]) readlink(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)=""/30, 0x1e) fcntl$setflags(r4, 0x2, 0x1) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r5, 0x40000000006, &(0x7f0000000240)="a3", 0x1, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sival_int=0xfffffba3}}) copy_file_range(r5, &(0x7f0000000000)=0x20080000003, r5, 0x0, 0xd, 0x0) __realpathat(r0, &(0x7f00000001c0)='./file1/file0\x00', &(0x7f0000000200)=""/12, 0xc, 0x0) pipe2(&(0x7f0000000080), 0x100004) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x8e, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffff0180c200000086dd6082d2f300183c00fe880000000000000000000000000001ff0200000000000000000000000000012c000000"]) open(&(0x7f0000000280)='./file0\x00', 0x4, 0x0) 5.787325108s ago: executing program 2 (id=75): socket(0x26, 0x2, 0x0) cpuset_setaffinity(0x2, 0x2, 0x0, 0x0, 0x0) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80000001, &(0x7f00000004c0), 0x0, [0x3, 0x10000000], 0x200000000000000, 0x20, 0x0, {0x4, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562ef}}) r0 = open(&(0x7f0000000880)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, 0xd2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x800, 0x0) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r4 = __specialfd$inotify(0x2, &(0x7f00000001c0)={0x100000}, 0x4) r5 = socket(0x1b, 0x3, 0x0) shutdown(r5, 0x0) r6 = socket(0x1b, 0x3, 0x0) sendto$inet6(r6, &(0x7f0000000080)="02090100020000008e4ca277fce00d8f", 0x10, 0x20008, 0x0, 0x0) inotify_add_watch_at(r4, 0xffffffffffffff9c, &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x5) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)={{0x0, 0xffffffffffffffff}, {0xffffffffffffffff, 0x10}}, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000040)={0x15, 0x0, 0x10, &(0x7f0000000100)="ec7b0000000000000001f0a5a2519798", 0x0, 0x0, 0x8, 0xfdf9ff85}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) r7 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) syz_emit_ethernet(0x7e, &(0x7f00000003c0)=ANY=[@ANYBLOB="8f6f77edbb65ffffffffffff86dd605f6ad900483a003bcc3f0600000058132fa13a8be173b2fe8000000000000000000000000000aa02009078000000386006c33e00002b00fe8000000000000000000000000000aa0000000000000300fffffffffffffffe6402007300000000ff020000000000000000000000000001"]) readlinkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r7, 0x40046676, 0x22e00000) open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) 5.460995098s ago: executing program 3 (id=4): procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x16) r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) umask(0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r1, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) open$dir(0x0, 0x110206, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000180), 0x100000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f00000001c0)={0xb, 0x21, 0x18, &(0x7f0000000140)="ec7b00000900ff2425c3f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdfffd05, [0x0, 0x0, 0x0, 0x2]}) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000100)={0x29, 0x0, 0x8, &(0x7f00000000c0)="ec7b00002cfeff02", 0x0, 0x0, 0x0, 0xb, [0x40000000, 0x0, 0x0, 0x3]}) close(r4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x7843d88b80d1cecd, 0x100) pipe2(0x0, 0xd505eb4556f41fdb) ioctl$KDMKTONE(r5, 0x20044b08) r6 = socket(0x1c, 0x1, 0x0) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) r8 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_buf(r8, 0x29, 0x68, &(0x7f0000000200)="aab9266ddfdb0845b1b40ee2064ebe569ec3f98ca30c40c18f2ac4887ae3b4ff6b3d3f77b77e8bd422260493fd645192fa38128112b3b7f4e2ec1f34375acbd50e03d80f4b3069df", 0x48) setsockopt$inet6_int(r8, 0x29, 0x2b, &(0x7f0000000080)=0x2, 0x4) getsockopt$sock_timeval(r6, 0xffff, 0x1005, &(0x7f0000000040), &(0x7f00000000c0)=0x8) sendto$inet6(r8, &(0x7f0000002700)="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", 0x2db, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) setsockopt$inet6_int(r7, 0x29, 0x1b, &(0x7f00000001c0), 0x4) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000080), 0x4) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x4, @empty, 0xffff}, 0x1c) r9 = setsid() procctl$PROC_TRAPCAP_STATUS(0x0, r9, 0xa, &(0x7f0000000000)) 3.477092417s ago: executing program 0 (id=76): open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) r0 = open(&(0x7f0000000300)='./file0\x00', 0x8000, 0x18) openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x462, 0x0) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000bc"]) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mmap(&(0x7f0000128000/0x1000)=nil, 0x1000, 0x2, 0x11, r2, 0x0) syz_emit_ethernet(0x3e, &(0x7f00000005c0)={@random="4b8f3a6f6f98", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x8, 0x3a, 0xff, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@echo_request={0x80, 0x0, 0x0, 0x400, 0x7}}}}}}) sync() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0x101, &(0x7f0000000340)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0x2, 0x5, 0x1ff, 0x7fff, 0x3}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000400)={0x8be2, 0x0, 0x5, 0x9, r3}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0x0) copy_file_range(0xffffffffffffffff, 0x0, r4, &(0x7f0000000080)=0x2ffdf, 0x100f, 0x0) preadv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000380)=""/27, 0x1b}], 0x1, 0x2ffdf) open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) flock(r0, 0x3) 3.468227374s ago: executing program 1 (id=77): openat$bpf(0xffffffffffffff9c, 0x0, 0x462, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) truncate(&(0x7f0000000080)='./file0\x00', 0xa1) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) r1 = fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYRESDEC=r1]) setsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x24, &(0x7f0000000240)="f4617eb349bb", 0x6) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) ftruncate(r2, 0x107d2) sync() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f0000000340)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, 0x0, 0xfffffffe, 0x5, 0x200, 0x7fff, 0x5}, &(0x7f0000000140)=0x98) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f00000001c0)={0x8be2, 0x680, 0x3, 0x3, r3}, 0xa) socket$inet_icmp_raw(0x2, 0x3, 0x1) openat(r2, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x40000, 0x11) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x108) mlockall(0x2) socket(0x1c, 0x1, 0x0) chflags(&(0x7f0000000300)='./file0\x00', 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x11, 0xffffffffffffffff, 0x1000) pipe2(&(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) read(r4, &(0x7f0000001000)=""/223, 0xdf) kqueue() 3.46273675s ago: executing program 2 (id=78): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) open$dir(&(0x7f0000000080)='./file1/file0\x00', 0x202, 0x0) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() statfs(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000300)) pipe2(0x0, 0xd505eb4556f41fdb) getuid() __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000080)=[0x199, 0xfffd]) aio_waitcomplete(0x0, 0x0) socket$inet6_tcp(0x1c, 0x1, 0x0) r0 = socket(0x1c, 0x1, 0x0) lio_listio(0x0, &(0x7f0000000a80), 0x0, &(0x7f0000000d80)={0x1, 0x20, @sigval_ptr=0xe, @spare=[0x4005, 0x5, 0x6, 0x5, 0x8, 0x7, 0xfd926ff, 0x8]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) setegid(0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0xfffffffe, 0xfffffffffffffff9, 0x4009, 0x8, 0xe8c5, 0x40000000, [0x1, 0x88f]}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) procctl$PROC_REAP_STATUS(0x0, 0xffffffffffffffff, 0x4, &(0x7f0000000140)) lio_listio(0x0, &(0x7f0000000080), 0x0, 0x0) openat$bpf(0xffffff9c, &(0x7f0000000000), 0x800, 0x0) lio_listio(0x1, &(0x7f0000000040), 0x52, &(0x7f0000000c40)={0x3, 0x1a, @sigval_int=0x110, @spare=[0x8, 0x9cff, 0x1c23, 0x9, 0x60, 0x6bf, 0xffffffca, 0x8]}) socket$inet6(0x1c, 0x3, 0x6) syz_emit_ethernet(0x46, &(0x7f0000000280)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x2, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2}, @icmp=@dest_unreach={0x3, 0x4, 0x0, 0x0, 0x0, 0xfffd, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x6, 0x8000, @multicast1, @empty=0xe0}, "6cacac773109ed74"}}}}}) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) 2.570860483s ago: executing program 3 (id=4): procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x16) r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) umask(0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r1, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) open$dir(0x0, 0x110206, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000180), 0x100000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f00000001c0)={0xb, 0x21, 0x18, &(0x7f0000000140)="ec7b00000900ff2425c3f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdfffd05, [0x0, 0x0, 0x0, 0x2]}) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000100)={0x29, 0x0, 0x8, &(0x7f00000000c0)="ec7b00002cfeff02", 0x0, 0x0, 0x0, 0xb, [0x40000000, 0x0, 0x0, 0x3]}) close(r4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x7843d88b80d1cecd, 0x100) pipe2(0x0, 0xd505eb4556f41fdb) ioctl$KDMKTONE(r5, 0x20044b08) r6 = socket(0x1c, 0x1, 0x0) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) r8 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_buf(r8, 0x29, 0x68, &(0x7f0000000200)="aab9266ddfdb0845b1b40ee2064ebe569ec3f98ca30c40c18f2ac4887ae3b4ff6b3d3f77b77e8bd422260493fd645192fa38128112b3b7f4e2ec1f34375acbd50e03d80f4b3069df", 0x48) setsockopt$inet6_int(r8, 0x29, 0x2b, &(0x7f0000000080)=0x2, 0x4) getsockopt$sock_timeval(r6, 0xffff, 0x1005, &(0x7f0000000040), &(0x7f00000000c0)=0x8) sendto$inet6(r8, &(0x7f0000002700)="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", 0x2db, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) setsockopt$inet6_int(r7, 0x29, 0x1b, &(0x7f00000001c0), 0x4) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000080), 0x4) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x4, @empty, 0xffff}, 0x1c) r9 = setsid() procctl$PROC_TRAPCAP_STATUS(0x0, r9, 0xa, &(0x7f0000000000)) 471.384528ms ago: executing program 0 (id=79): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fork() syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000bc"]) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="9f4c4662c157ffffffffffff08004500002000680000010290780000ef4c0000130000000000000000"]) pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) open$dir(0x0, 0x200000, 0xc6) mkdir(&(0x7f0000000080)='./file\x00', 0x4) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x4a) chroot(&(0x7f0000000040)='./file/file0\x00') fchownat(0xffffffffffffff9c, &(0x7f0000000280)='./file/file0/../\x00', 0x0, 0x0, 0x4000) socket(0x1c, 0x1, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) truncate(&(0x7f0000000140)='./file0\x00', 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) sendfile(r1, r2, 0x1, 0x400000000000, 0x0, 0x0, 0x1) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000002c0)='\x00'], 0x0) 470.518018ms ago: executing program 1 (id=80): r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000000000)={@local, @rand_addr}, &(0x7f0000000080)=0xc) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c921bf0817a0000000000006a89dbdf", 0x2c) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) sendto$inet(r0, &(0x7f0000000300)="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", 0x565, 0x20181, &(0x7f0000000040)={0x10, 0x2, 0x2, @loopback}, 0x10) 468.981355ms ago: executing program 2 (id=81): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x3b, &(0x7f0000000280), 0x4) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0xa, @mcast2}, 0x1c) connect$inet6(r0, 0x0, 0x0) 416.343787ms ago: executing program 2 (id=82): r0 = openat(0xffffffffffffff9c, 0x0, 0x200201, 0xa0) kqueue() socket(0x1, 0x10000003, 0x4) bind$inet6(0xffffffffffffffff, &(0x7f0000001140)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0x1c) write(0xffffffffffffffff, &(0x7f0000000140)='\x00', 0xfe80) r1 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r1, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffff80, 0x0, 0x0, 0xfff, 0x4, 0x0, 0x26, 0x0, 0x0, 0x0, [0x0, 0x2, 0x3, 0x0, 0x40, 0x0, 0x3ff, 0x6, 0x1, 0xb32c, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0xd8bd, 0x0, 0x5, 0xfffffffe, 0x0, 0x0, 0x1, 0x4, 0x400, 0x0, 0xe322, 0x8000000, 0x5, 0x42f, 0xfffffffd, 0x0, 0x1, 0x400000, 0xf, 0x9, 0x0, 0x3ff, 0xc4, 0x4, 0x0, 0xa7, 0xc37b, 0x17, 0x0, 0x9, 0x0, 0x2000, 0xfffffffc, 0xffffffff, 0xfffffffe, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x2, 0x6cdd1400, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0xaf, 0x0, 0x7, 0x1, 0x1000, 0x0, 0x4, 0x80000, 0x0, 0x1000, 0x7fed, 0x0, 0xfffffffc, 0xfffffffe, 0x0, 0x0, 0x0, 0x5, 0x0, 0x800006, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffffffc, 0xfffffffb]}) ioctl$MDIOCATTACH(r1, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7fffffff, 0x3, 0x0, 0x8, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, [0x0, 0x2, 0x3, 0x0, 0x0, 0x399e, 0xfffffffe, 0x0, 0x6, 0xb32c, 0x4, 0x0, 0x0, 0x1, 0xfffffffd, 0x101, 0x2000000, 0x0, 0x0, 0x6, 0x0, 0xf6, 0x0, 0x1, 0x0, 0x0, 0x0, 0xe122, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0xf, 0xfffffffd, 0x0, 0x3ff, 0x11, 0x4, 0x0, 0xa7, 0xc37b, 0x4, 0x0, 0x3, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0xfffffffe, 0x3, 0x2, 0x4, 0x0, 0x0, 0xfffffffb, 0xffffffff, 0x0, 0xa, 0x8, 0x1000, 0x0, 0x0, 0x80000, 0x0, 0x0, 0x7fed, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x10005, 0x0, 0x6, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0xffffffff]}) r2 = socket(0x11, 0x10000000000003, 0x8) setsockopt$sock_int(r2, 0xffff, 0x1017, &(0x7f0000000000)=0x1, 0x4) ioctl$SMB_PCALL(r0, 0xc01c6909, &(0x7f00000000c0)={0x5, 0x2, 0x5, @word=0x8, @byte=0x6, 0x6, &(0x7f0000000040)=0x4a, 0x1, &(0x7f0000000080)=0x6, 0x1}) 416.114798ms ago: executing program 2 (id=83): setuid(0xffffffffffffffff) r0 = socket$inet6(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x0, 0x825, @loopback, 0x20}, 0x1c) sendmsg$inet6_sctp(r0, &(0x7f0000000480)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x3, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x81) r1 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_CONGESTION(r1, 0x6, 0x40, 0xfffffffffffffffe, 0x0) ioctl$EVIOCGKEYCODE(0xffffffffffffffff, 0xc0084504, 0x3) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f0000000240), 0x4) open$dir(0x0, 0x40000400000002c6, 0x0) open$dir(&(0x7f00000016c0)='./file0\x00', 0xa182fdacd32160a9, 0x0) mkdir(0x0, 0x38) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') __specialfd$inotify(0x2, 0x0, 0x0) setgroups(0x0, 0x0) 405.736411ms ago: executing program 2 (id=84): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x3) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff0200000000000000000000000000012902000000000000bc"]) syz_emit_ethernet(0x2e, &(0x7f0000000200)=ANY=[@ANYBLOB="9f4c4662c157ffffffffffff08004500002000680000010290780000ef4c00001300"/46]) pipe2(0x0, 0xd505eb4556f41fdb) aio_waitcomplete(0x0, 0x0) open$dir(0x0, 0x200000, 0xc6) mkdir(&(0x7f0000000080)='./file\x00', 0x4) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x4a) chroot(&(0x7f0000000040)='./file/file0\x00') fchownat(0xffffffffffffff9c, &(0x7f0000000280)='./file/file0/../\x00', 0x0, 0x0, 0x4000) socket(0x1c, 0x1, 0x0) execve(0x0, &(0x7f00000003c0)=[&(0x7f0000000300)='^@\x00', &(0x7f0000000400)='\xbd\x99\x9dym\xd6(}\n\r)\x00hc\xba\x84e\x9ca\xe8\xfa\x05\x97@U\x91i\xf5-\xbd\xb1\x9b\xfe=\x81\xd8\xcb\xce\xb6\xaa\x7fW\x8f\xce}\x02\xd7\x97\xe1A\x87ym\xc8s\xcb\xad\xb0l\xa7:\xf6\xd24\x12f0\xc8\xc1U\xa5\x1cp\xcb\xff\xb4\xde2\xdf\x90(C\x84\xba\xaa\x8a\x12\xd1)\xe8\x11\x98BU\xf8\xdf_\xd6\xb1\x9a\xbf\xfd\x1cW\x17+\x92\xa1\xb2\x9a\xcca\xec.\xdf\x89\xa7A\xad\x8d\x1d\xe1pd\xbe\xa3\xba\xc8\xe6\x93US \x05\xc2\xfa\x80o\x18\x03K\xe1\xcdH\xdc\x90\xdd\xd1\xb4R\x041\x81\x93{\x1d0a\xab_\xec\x1c', &(0x7f0000000380)=',}^-E-\x00'], 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = socket(0x2, 0x1, 0x0) connect$inet(r0, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) dup2(0xffffffffffffffff, 0xffffffffffffffff) openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) truncate(&(0x7f0000000140)='./file0\x00', 0x2) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = fcntl$dupfd(r3, 0x0, r2) sendfile(r1, r4, 0x1, 0x400000000000, 0x0, 0x0, 0x1) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000640)=[&(0x7f00000002c0)='\x00'], 0x0) 276.323634ms ago: executing program 1 (id=85): mkdir(&(0x7f00000000c0)='./file0\x00', 0xb) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x8, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r1, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet6_sctp_SCTP_AUTH_CHUNK(r1, 0x84, 0x12, &(0x7f0000000440), 0x1) connect$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x2, 0x80000001, @loopback, 0x2}, 0x1c) sendto$inet6(r1, &(0x7f0000000200)="82458020", 0x4, 0x0, 0x0, 0x0) sendto$inet6(r1, &(0x7f00000020c0)="d1", 0xffef, 0x20184, 0x0, 0x0) acct(&(0x7f0000000000)='./file0\x00') r2 = kqueue() kevent(r2, &(0x7f0000000100)=[{0x3, 0xffffffffffffffff, 0x80a9, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) r3 = __specialfd$inotify(0x2, &(0x7f0000000040)={0x4}, 0x4) r4 = socket$unix(0x1, 0x2, 0x0) connect$unix(r4, &(0x7f0000000180)=@file={0x13, 0x0, './file0/../file0\x00'}, 0x13) inotify_add_watch_at(r3, r0, &(0x7f0000000080)='./file0\x00', 0x84000008) rmdir(&(0x7f0000000380)='./file0/../file0\x00') 186.312664ms ago: executing program 1 (id=86): munmap(&(0x7f0000000000/0x3000)=nil, 0x3000) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_JOIN_GROUP(r0, 0x0, 0x50, &(0x7f0000000200)={0x1, {{0x10, 0x2, 0x2, @loopback}}}, 0x84) 146.132621ms ago: executing program 1 (id=87): r0 = socket(0x1b, 0x3, 0x0) getgid() sendmsg$unix(r0, 0x0, 0x188) r1 = socket(0x0, 0x10000000, 0xfe) r2 = socket(0x1c, 0x1, 0x0) sigaction(0xc, &(0x7f0000000200)={&(0x7f0000000180)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de3516cb69989999908", 0x35, {[0xfffff801, 0x50e5, 0xfdffffff]}}, 0x0) lgetfh(0x0, 0x0) r3 = socket(0x1b, 0x3, 0x0) recvmsg(r3, &(0x7f0000000800)={0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000640)=""/171, 0xab}], 0x1, 0x0}, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) sendmsg$inet_sctp(r1, &(0x7f0000000280)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x101, @mcast2, 0x2}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x185) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_buf(r4, 0x0, 0x51, &(0x7f0000000300)="33634fb519050f221002ceb88b0a43ab759be9ccf9b668f27c74c22107de1ab78a9df980a69fef8483a7e8b94504a2607c9c38da5f437b4436f3b2b5f0578e7610de538f2a198592520f47f4f13623f148681efffe12b79ad3e40092aefd5637d0f9d27977d9f595df759245aa5a40fc86f3238e91abf816b3da8aa4b7cbe97952", 0x81) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, &(0x7f00000016c0)=ANY=[], 0x28) r5 = kqueue() kevent(r5, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x9c, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd604292c800660000fe0aad1f4900000000000000000000aaff02000000000000000000"]) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) __cap_rights_get(0x3, r3, &(0x7f0000000000)) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, 0xffffffffffffffff, 0x0) ioctl$BIOCGBLEN(0xffffffffffffffff, 0x40044266, &(0x7f00000001c0)) ioctl$OPIO_DEADKEYMAP(0xffffffffffffffff, 0x862a6b09, &(0x7f0000000980)={0x2, [{0x59, "85911283716542809bc5d178fe745fe38b3b97e450c22e037e753df574a89ac1581fc8d7cac247d65aff8a35f81ebb34dd32fd3af975866de219f13f8fe29e642a16971cf6dc116993b92c582a02b339395d9956ec3a3c1b8db123ece9596696e4e5b2cfd9669a2c"}, {0x8, "26c4f4481864af747832e7b07bb871510113dd87981817a7d0517f95c93feb3771c7cf6874d007730e8870bdc26ad20b5f6aba0f96e7e3e1da1117e88a580a2bc781f7b30068150b09b2f0749552191f27ac65a6828398beaf7ae6219ecd4e45efe008632573b095"}, {0xf7, "abe01d85a055228e3faba921d3ccf6835a7309fa0bb76b80fd314816f771792c3703abd55751886203efd342c47f2794bb4e3b55c79e8340856b4cc32cb212bcf9ab9528e109c7e91a343e67340beaf79c98debfaa5449d040072a0a2abc60847b694a26d2d27b4e"}, {0x0, "aa8712e825fabb358f4381e34104d54626ab593748d6ef4fd46f8b404784b636189a8db12c6fd8ce1bf45bc8603385ce68bfcf1584ba84fabc6aaf1867cd285488409e30bbb41d28f1378d0934c05c954056d8e1839466ce297a461082d8b5cb2e292d2ef24a1c48"}, {0xf7, "0858f9e58e85c5057e011a5af3dd770c92ec1f3ddc4b4a5738e53d8b70c079837dced64b54e6995f84aec48e3176a51ee6b41ad484f165596d30f6f3844abc2f48dde114ceaefdecef448a0f2f030c31b5c723610ca5757417ac4c3b8359c655a343362b6f5dd896"}, {0x4, "69ad5e9c43f6d1211d078931eca36bd521ecdf1780e305ee631de918ffedaf46a9705598b734f35789e3111b91fd18d5bd0b844d677b57fa60bb8058a0e76082bd90aaf977d96ec5126400e8e2450e55e0725773734632cea62a54e71b68630165f9c88a0b286613"}, {0x6, "6b205c950ccd1eb1e11d8fb80ce8f995f2d9acc51cbfb0f4804d663069e96e9ab1e0f906958c76d021a822e687a92b08a1503251715e9403fdf7ed2f7cd3cc45df8bea1a843854831c9cd7cdae7d77a8314052e642a753c7f522cf42712e603dd60fd9f54b02b865"}, {0x4f, "fcde4a2ad9b7b0dd63d9dc294e2bb9965b49a7faca54ef5b394a1a89c948a72fb1eb14db05e3b7a784a63514ea36f18732fef2668510cdc7285cfee227c54941e6ebceeb630220ab33e18a791ae6495441adea3f97f7465c26d59ab991d324f8604becebbbdc66ad"}, {0x28, "3fc288f950cc34f3cd3dabedbf3202c8bd1773d6d0347ea47cecde6ab0209b5d86762ce20731038d4adcdb7d088190c802adf46301d0bce12e20404c10f59c0c0f85630c8daeb51f1f87343e9125766d5b92c47c7182190c7793c87066b60cf558516eac0f55fca4"}, {0x4, "a26145bba9a60b8e0b13b7fe0a22d67ba8767c413b32521a27fa8e67033ecb3f674a05d88cec7c622dca8bee1a9520e26dd0efdf36b1f7becdbaa15abea6b69826f345228cd499c5badb034cc6753552bd90756468666b12d8abba091da5a20682e4cbde7efebd1c"}, {0xc, "7ce950f1653543108e854b9c1078a7ba8fb50c0ef2a96159f47fe776672e8bbb49c452c800b5065396c40e078beffc82d461e0908282b8d85fa35f98cdd7b2e6cdab7a90bfe9346c53c2954fc048d8cf51ddff10f323c300a51f99e60156e90b1ffd0eb0e35971a3"}, {0x2, "767ad598c80c7590fb2e7467a6960498bda02a38efd1599e826f78f9c139f0c1345b6c0018eb0a5b2ff89275e112c873ee5442634a61b2f388a00691abd03e952c9cf6caa86c9b3b89c1ab6e600ad358b6376caefa7273258e366bdc206b077f7670cde6cc652dca"}, {0x3, "aa0fe1f95a83173d620c449facb7dca585859734aad79a731581c9e212f0a5bfe8b0424fd5b90c1b905adc7c0a06572593349a2d553f126c5eb93fe1f75a1fa285e3a467483dc3ea223d27457dd0d867c02d7bfa4da6ea1b3dccb5953a8ae16207e52ea7b9df819b"}, {0x9, "9d49cfcc25c4a073ad863a0ce9956d32186748245b36c8bd7c92794492474d42d4c7fc63bb2f906425489cde308a820cac3903cee89541695d38da6227d899cc56d4140008234ffe1a6e4ee3a9e2d44d48ab884e0749ee97a50cd3107e63a291759b48a6651b1e94"}, {0x3, "4aa5b10003575621bb5b10f6ea00868140b348fce8207c8c809d22fedc42d778fcd8c8de7af52262d2f2e09916e8eba8cd503365b98805e88e2af56117667528605222c7c1c987c5fe94027d8508ad5258f0c4c03c2ecb38e7d6a77e75729dec732714726a4b2414"}]}) sysarch$AMD64_GET_GSBASE(0x82, &(0x7f0000000240)=0xfffffffffffffff7) r6 = socket(0x1c, 0x1, 0x0) connect$inet6(r6, &(0x7f0000000180)={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0xffffffff}, 0x10) ioctl$EVIOCGKEYCODE_V2(0xffffffffffffffff, 0xc0284504, &(0x7f00000000c0)={0x8, 0x9, 0x8, 0x1, "cb798192781e1f8e02cca7e8dde26e9d6f80478cb20754a6cdafebeba9eab204"}) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) lchmod(&(0x7f0000000140)='./file1\x00', 0x120) pipe2(0x0, 0x100004) procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x16) 0s ago: executing program 3 (id=4): procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x16) r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) umask(0x40) r1 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r1, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) open$dir(0x0, 0x110206, 0x0) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000180), 0x100000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f00000001c0)={0xb, 0x21, 0x18, &(0x7f0000000140)="ec7b00000900ff2425c3f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdfffd05, [0x0, 0x0, 0x0, 0x2]}) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000100)={0x29, 0x0, 0x8, &(0x7f00000000c0)="ec7b00002cfeff02", 0x0, 0x0, 0x0, 0xb, [0x40000000, 0x0, 0x0, 0x3]}) close(r4) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r5 = open(&(0x7f00000001c0)='./file0\x00', 0x7843d88b80d1cecd, 0x100) pipe2(0x0, 0xd505eb4556f41fdb) ioctl$KDMKTONE(r5, 0x20044b08) r6 = socket(0x1c, 0x1, 0x0) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) r8 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_buf(r8, 0x29, 0x68, &(0x7f0000000200)="aab9266ddfdb0845b1b40ee2064ebe569ec3f98ca30c40c18f2ac4887ae3b4ff6b3d3f77b77e8bd422260493fd645192fa38128112b3b7f4e2ec1f34375acbd50e03d80f4b3069df", 0x48) setsockopt$inet6_int(r8, 0x29, 0x2b, &(0x7f0000000080)=0x2, 0x4) getsockopt$sock_timeval(r6, 0xffff, 0x1005, &(0x7f0000000040), &(0x7f00000000c0)=0x8) sendto$inet6(r8, &(0x7f0000002700)="6a3364f80c04449d07afb23ef30fa25a8bd0daafa9f5fb5b7880cb0eabd568116b4b0bc2945f03d453cf4a291b6bb29347a95bd4f27d5e2a65afc2fbcc7d47d4f3d85c384c7ee13c266e4f213ee4ccf9cd815fe090a52b83943c3d1557a846c96d5f5d9012138b8f76ea18979e5140654454281b7db9f6cc48bb3c69e59b1dee28c4067ae69256a30794f0e15fcd09ad8fc2f5bf5004e60558e13480a8c9f63278ea239ca9a5d34426ad42a8b875d6418cf423075345f911826f3b968391b18371ff8305a3c78eea0164310f2d8a9893a344e3f80d69ed0977c6467b5dac655894a5ca8ec0d6a932321d034e012163e43efbae8ddcee3638e52eee61e5953f6a79a72d5f83d7c61fabfc22f8421c8cf48714eef6d6282fea3a6d60940a8b35e6a0346959855aa8300d5edd336c4c5987e2e9fe88f281c8bfcb916542a9cb4646999aeb612231aa884f67aad7e3e60332b96852b948bf8c67e698650a25a2e5fae88c5885f8b3193fe6da2d5201a0a099413234e86944d33c71f74408daa816a33b40d63ca2e37d0ddfe090b6e4deaa92c620c8d967b3f1cc2e98a276f8b2a4f897775d01e4717e4898125631f9fade0aa6a251a5c4576c2e7f88276d0a3e158b4b828483a72082048a4f20c613ef3fc02d9c2f51ee66bffe3b3590b6e83182a0a43991a62c57f643493c55d490c0621bb5bb906b8365f109e48f4067563ad13bb7be1cf4eb150b142e9bf4104520e07aff6bc779a8dc23677de0df616e85f52fe753ebabca519feb6520bd3457918cc477876b77e11ef4feefa58af330949783ca0b41304bbf744c2e2f39ae6dafb6ef69878fa7779015844127f101e9c0cb6d661e615ebd8c5d931799d6581ac8fc70cbc23c027bf30e91bfb2e8d8286ab20ce44cf4c9476d19260bbb215f738c3b5d4c9615c9ba010ee2bda2db5d342cb39e6a2259145748f0173a7db9e05bc4ac7279f757eda70ff51385d627aed93fc44b6a033263b850e6e2189720c5bf4ba35ae0739e023c9eeccbc0c6b9", 0x2db, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) setsockopt$inet6_int(r7, 0x29, 0x1b, &(0x7f00000001c0), 0x4) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f0000000080), 0x4) bind(r0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x4, @empty, 0xffff}, 0x1c) r9 = setsid() procctl$PROC_TRAPCAP_STATUS(0x0, r9, 0xa, &(0x7f0000000000)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.10.4' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054212800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054212800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054212800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054212800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054212800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054212800 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0054213000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007793000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e2000 Expensive callout(9) function: 0xffffffff81af1090(0) 0.005902449 s if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e1000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5df800 md2147483520: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 ifconfig: interface tap3 does not exist SYZFAIL: invalid kcov comp type type=ffffffff815ebab6 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff8158af49 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff821477d8 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff815bca03 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff821477d8 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=3 req=4 state=3 status=67 (errno 35: Resource temporarily unavailable) FreeBSD/amd64 (ci-freebsd-i386-0.us-central1-b.c.syzkaller.internal) (ttyu0) login: if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 if_delmulti_locked: detaching ifnet instance 0xfffffe006e5e0000 set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Nov 6 12:30:58 ci-freebsd-i386-0 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl