last executing test programs: 4.158344127s ago: executing program 0 (id=112): r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r0, 0xb7c5) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff}) close(r1) accept4(r0, 0x0, 0x0, 0x0) aio_cancel(r1, 0x0) r2 = socket$inet6(0x1c, 0x1, 0x0) bind$inet6(r2, 0x0, 0x0) open$dir(0x0, 0x40000400000002c2, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x3, 0x0, 0xffffffffffffffe5}) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000100)={0x8, 0x0}) openat$bpf(0xffffff9c, 0x0, 0x1, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1001, 0x0, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$DIOCRADDADDRS(r4, 0xc0184415, &(0x7f0000000a80)={{"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", "0920cf14d501a846a22d8eb300fbff0400000000000000001000"}, 0x0, 0x40000000009, 0x0, 0xf7b2, 0x20000002, 0x1, 0x0, 0xffffffffffffffff, 0x1}) openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="04010000ffff000001"], 0x104}, 0x0) recvmsg(r5, &(0x7f0000000240)={&(0x7f0000000080)=@in={0x10, 0x2, 0xffffffffffffffff, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000380)=""/136, 0x88}, 0x40) setgid(0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) r8 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r8, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r9 = fork() fhlinkat(&(0x7f0000000140)={{[0x2]}, {0x7f, 0x7, "688d7cd945f512931d9e1dfca44b93cf"}}, r2, &(0x7f0000000280)='./file0\x00') sigqueue(r9, 0xf, @sival_int=0x8000) preadv(r7, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) 3.067517124s ago: executing program 0 (id=117): r0 = socket$inet6(0x1c, 0x2, 0x0) setsockopt(r0, 0x29, 0x40, &(0x7f0000000000)="60c6eabb", 0x4) bind$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, 0x2}, 0x1c) setsockopt$inet6_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r2 = kqueue() syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB]) kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000080)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x48, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x2b, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, [@dstopts={0x2b, 0x1, '\x00', [@pad1, @pad1, @padn, @ra={0x5, 0x2, 0x1}]}]}}}}}}}) freebsd11_mknod(0x0, 0x1000, 0x0) r3 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) fcntl$lock(r3, 0x16, &(0x7f0000000000)={0x570}) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x100000}}, {{0x1c, 0x1c, 0x1, 0x246, @ipv4, 0x2}}}, 0x108) setrlimit(0x7, &(0x7f00000001c0)={0x1}) setreuid(0xee00, 0x0) fork() madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x1, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x100000}}, {{0x1c, 0x1c, 0x1, 0x0, @empty, 0x2}}}, 0x108) setsockopt$inet6_group_source_req(r4, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x100000}}, {{0x1c, 0x1c, 0x1, 0x0, @rand_addr="000000000000000b0500009300", 0x2}}}, 0x108) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0x108) r8 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r8, 0x0, 0x0, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) 2.917578312s ago: executing program 1 (id=120): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000001240)={@multicast2, @broadcast}, 0xc) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') extattr_set_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f0000000080)='+.](\x00', 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f00000001c0)={@multicast2, @rand_addr=0x4}, 0xc) r1 = dup2(r0, r0) r2 = kqueue() kevent(r2, 0x0, 0x0, &(0x7f0000000940)=[{}], 0x1, &(0x7f0000000280)={0x9, 0x4}) sendto(r0, &(0x7f0000000200)="f69471b0bc5e66a942979a2692bf5d84412ddda124db6bf7c319f79194fb8aa794db7482ce3e91abb35d25fb4924c1fc5551f7566ff4935d83a65079a483e6ebf3a79ea480808846ff4c346090d2765455b9e1856258b4c14602671832338058f2e0c0830f09bb7250e36a07489fb6f14562f07e528b7a8b7f6017f159bf051b25a40eace7263ab3d74a3aac73aa1fe1e1fdbb5189b757b6cee9aa9253cd6d7e8c311857bd1e386d3facb7b605b2", 0xae, 0x100, 0x0, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000140)={0x15, 0x8, 0x0, 0x0, 0x57, &(0x7f0000000040)="d024da87ec8bd0d834c727977133b4375d5f72b0af6100b6621c4f63c4e19dcb1561e2a4b25e81a6c0807caae6314393a11cfe6f60cdf1d90a5a1e3f10455d96d42072f8f40f6a9f6c5221270e3ebef4621cb2f2a933c8", 0x8, 0x1000, [0x9, 0x2, 0x6, 0x1e19]}) r3 = kqueue() r4 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0xffe, 0x0, 0x0, 0x0, 0x0}) kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) accept4(r5, 0x0, &(0x7f0000000000), 0x30000000) setsockopt$sock_int(r5, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) aio_write(&(0x7f0000000240)={0xffffffffffffffff, 0x80000001, 0x0, 0x0, [0x0, 0xc9], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x10, @sival_int, @spare=[0x0, 0x0, 0x8000]}}) aio_write(&(0x7f0000000140)={0xffffffffffffffff, 0x40000000006, &(0x7f0000000240)="a3", 0x1, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sival_ptr=0x5}}) copy_file_range(0xffffffffffffffff, &(0x7f0000000000)=0x80000001, 0xffffffffffffffff, 0x0, 0x100000, 0x0) 2.151679137s ago: executing program 0 (id=123): openat$filemon(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) lpathconf(&(0x7f0000000180)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x3f) fork() symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') shm_open2(&(0x7f0000000100)='./file0\x00', 0x200, 0xe8, 0x1, &(0x7f0000000140)='\x00') r0 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x2, &(0x7f0000000080)=0x20000, 0x4) socket(0x1c, 0x5, 0x0) execve(0x0, &(0x7f00000001c0)=[&(0x7f0000000200)='.)(#./:+\\}@{[\x00\x90\x8f}8\tC\x8bH\xee)jj\x0f8l\tc\xfax\xfb8\x13]\x13\x82\xeb\x9f\x90\x97y^x\xf0\xb22\x8b5[\xba\x17\xff\f\x93J,}\xac8Xm\x8a\xd5'], 0x0) r1 = socket$inet6(0x1c, 0x2, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x50, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1012, &(0x7f0000000080)=0x8449, 0x4) kqueue() r3 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x50, &(0x7f0000000380)={0x6, {{0x1c, 0x1c, 0x1, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r3, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}}, 0x108) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) ioctl$DIOCSETLIMIT(0xffffffffffffffff, 0xc0084428, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x24, &(0x7f0000000640)=0x4, 0x4) r4 = openat$md(0xffffff9c, &(0x7f00000001c0), 0x40, 0x0) freebsd11_fstatfs(r4, &(0x7f00000002c0)) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) ioctl$MDIOCDETACH(r4, 0xc1c06d01, &(0x7f0000000680)={0x8, 0xd2, 0x0, 0x0, 0x1, 0x5, 0x5, 0x4, 0xb60, 0x2, 0x0, [0x9, 0x7, 0xdd4, 0x400, 0x1, 0x1, 0x6, 0x7, 0x2c, 0x3, 0x3, 0xfd, 0x9, 0x9, 0x9, 0x4, 0x10, 0xffffffff, 0xc, 0xba, 0xf25e, 0xfffffffe, 0xc, 0x7ff, 0x5, 0x5, 0x2, 0x7, 0x4, 0x3, 0x81, 0x4, 0x1, 0xfffffffb, 0x8, 0x1, 0x401, 0x8, 0x1, 0x0, 0x6, 0x8000, 0x81, 0x2, 0x2, 0x57eaa6a4, 0x10000, 0x8, 0xfffffff7, 0x0, 0x3, 0xdb37432, 0x1, 0xe7, 0x0, 0x7, 0xe00c, 0x9, 0x5, 0xf74, 0x3, 0x1000000, 0x6, 0x3, 0x33f9, 0x8, 0x9, 0x1100, 0x85cf, 0x9, 0x8001, 0x7, 0x2, 0x7, 0x9, 0xf64, 0x1000, 0x3ff, 0x0, 0x1, 0x8002, 0x1, 0x31b, 0x2, 0xffffffff, 0x7fffffff, 0x8, 0x81, 0x3f, 0x2, 0xfffffffc, 0x200, 0x80, 0x100, 0x8b2b, 0x5a]}) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000440), 0x40, 0x0) ktimer_create(0x0, 0x0, 0x0) ioctl$CIOCCRYPT(r5, 0x8002440b, &(0x7f0000000640)={0x0, 0x1, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0}) 2.04176675s ago: executing program 1 (id=125): r0 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r1 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r2, 0x80000000, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x9, 0x0}, {0x0, 0x0, @sigval_ptr=0x4, @spare=[0x0, 0x0, 0x1, 0x0, 0x0, 0xfffffffffffffffe]}}) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) posix_fallocate(r3, 0x0, 0x50e088b7) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) r4 = dup(r1) fspacectl(r4, 0x1, &(0x7f0000000040)={0x3ff, 0x7ffffffffffffc00}, 0x0, 0x0) 1.88818671s ago: executing program 1 (id=126): r0 = socket$inet6(0x1c, 0x2, 0x0) procctl$PROC_WXMAP_CTL(0x0, 0x0, 0x15, &(0x7f0000000440)=0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) fork() mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000580)=[0xffffffffffff7185, 0x8000000000000001]) lgetfh(&(0x7f0000001040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000002080)) thr_wake(0x0) r2 = socket(0x10, 0x20000000, 0x0) getsockopt(r2, 0x0, 0x36, 0x0, 0x0) r3 = kqueue() kevent(r3, &(0x7f00000000c0), 0x0, &(0x7f0000000080)=[{}], 0x1, 0x0) sysarch$I386_GET_FSBASE(0x7, &(0x7f0000000000)) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x1, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) sendmsg$inet6_sctp(r0, &(0x7f00000001c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="14000000290000002f"], 0x14}, 0x23ec) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x80) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) setresuid(0xee01, 0xee01, 0x0) r6 = msgget$private(0x0, 0x710) setresuid(0x0, 0x0, 0x0) msgctl$IPC_SET(r6, 0x1, &(0x7f0000000240)={{0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1b9, 0x9, 0x0, 0x5}, 0x800006, 0x7618a71f, 0x3, 0x8000000000000008, 0x1000006, 0x80008a01}) bind$inet6(r5, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) connect$inet6(r5, &(0x7f0000000000)={0x1c, 0x1c, 0x2, 0x3, @mcast1, 0x2}, 0x1c) syz_emit_ethernet(0x3e, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaa04036e9b028eaa94ea09066dbd86dd60db834400081100fe8000000000000000000000000000bbff0200000000000000000000000000014e224e2200089078"]) r7 = open$dir(&(0x7f0000002100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x40000400000002c2, 0x21) pwritev(r7, &(0x7f0000000080)=[{&(0x7f00000020c0)="4e4e7681ff74dfb3c4", 0x9}], 0x1, 0x0) aio_write(&(0x7f0000000240)={r4, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sigval_int=0x3ff, @spare=[0x0, 0x0, 0x0, 0x0, 0x0, 0x101]}}) open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 1.638243361s ago: executing program 2 (id=128): r0 = open$dir(&(0x7f0000000ac0)='./file0/file0\x00', 0x4, 0xf2) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x1d3) ioctl$EVIOCSABS(0xffffffffffffffff, 0x5, &(0x7f0000000440)={0xffffffff, 0x3ff, 0x9, 0x10000, 0x7, 0x5}) open$dir(&(0x7f0000000000)='./file0\x00', 0x400004000011830a, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) getsockopt$inet6_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r2, 0x84, 0x24, &(0x7f0000000140)={0x0, @in={{0x10, 0x2, 0x2, @loopback}}, 0x7f}, &(0x7f0000000300)=0x90) setsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r3, 0x84, 0x24, 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x8, 0x0) ioctl$CIOCGSESSION2(r5, 0xc040636a, &(0x7f0000000440)={0x28, 0x0, 0x18, &(0x7f00000000c0)="3c9e89526b1700b07f82ee18e15b4e73e47f022de5aa3505", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x0, 0xc]}) r6 = fcntl$dupfd(r5, 0x11, r4) ioctl$CIOCCRYPT(r6, 0xc0306367, &(0x7f0000000300)={0x0, 0x1, 0x40, 0x8203, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000040)}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r3, 0x0) setsockopt$sock_accept_filter(r1, 0xffff, 0x1000, &(0x7f00000004c0)={'accf_data\x00', "044791a0c1f000188bdcd809663d210600000000000000683b7cc0673e11a7c824293af5ce0665cc3143766bfe1283f6e2e4b135702c67b60cfb9e1ed93563c4267a7820b3f1f058d6876247cb64563d7a06f4f45dd9d2d0223f3309446fddb43e282ca55738404bf83e18e8f62b4373d173ab82716d59ff761b5e483329e26bb5cf43d2531d8aeb768aabe7931dceed0e37530d842320059692985295405448ad57dc5fd6eb3282b485bbc9e08552ed0a4f0d387840fb3fafcc1b285753b66f145bbbff9717be06e66404c67391f01417375dcf66ab61b044f3152069d81d33b924ce324f9200"}, 0x100) __specialfd$inotify(0x2, &(0x7f0000000100)={0x4}, 0x4) thr_new(&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000001180), 0x0, 0x7, 0x0, [0xfffffffffffffffd, 0xffffffff]}, 0x68) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) minherit(&(0x7f0000c99000/0x3000)=nil, 0x3000, 0x1) msync(&(0x7f0000860000/0x600000)=nil, 0x600000, 0x2) madvise(&(0x7f00009d6000/0x600000)=nil, 0x600000, 0x3) fork() mprotect(&(0x7f0000d9c000/0x4000)=nil, 0x4000, 0x2) open$dir(0x0, 0x0, 0x0) posix_fadvise(0xffffffffffffffff, 0x0, 0x0, 0x319579fad68d7ca2) 1.528485408s ago: executing program 2 (id=129): setsockopt(0xffffffffffffffff, 0x0, 0x1f, &(0x7f0000000080)="c5", 0x1) select(0x40, &(0x7f0000000000)={0xfffffffffffffffd, 0x1, 0x0, 0x564, 0xffffffffffffffff, 0x8000000000000000, 0x0, 0x1}, 0x0, 0x0, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffff06000000"]) syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="00001c00ac14"]) syz_emit_ethernet(0x138, &(0x7f0000000000)=ANY=[@ANYBLOB="ff02"]) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x2, 0x0) setsockopt$sock_accept_filter(r0, 0xffff, 0x1000, &(0x7f00000000c0)={'accf_data\x00', "d1cb140bf47f06118ed1f89969ed8724c7476b4477e102a4ebc1f4538c275ab87e075bfe1ad1709697072cbe31c1683de0f00b35bc5e96134f8f97cdf7c4fd5f3d51b9e5a6a5c3ac75e8a7d42cafd468376e05c83c74a7fd090a901e035b8fc3d52c7f2d6ada3773961cbf5d2e62c298a589ae5a0495e0868645cf566e74c18ace1f0ff18139bdeeb42ff69b34a31b07e40e1522e0732df59ae409811f1341f301d12fd0161aa6cfbb002649b028da3ff4f066e21a3c9184fe45eb845ff07c029c06d5c0cb3d0923818b591aaf7612dc3b23fc6350913eebf7abc48c9f84e9ac0dce0cf68f7c72a8e091c0908c053e66"}, 0x100) setsockopt$sock_int(r0, 0xffff, 0x20, &(0x7f0000000080)=0x6, 0x4) connect$unix(r0, &(0x7f0000000000), 0x10) write(r0, &(0x7f0000000280)="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", 0x5c1) openat$bpf(0xffffffffffffff9c, &(0x7f0000000400), 0x1, 0x0) 1.518114612s ago: executing program 2 (id=130): mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r0 = kqueue() cap_rights_limit(r0, &(0x7f0000000180)=[0x3, 0x6]) r1 = socket(0x2, 0x3, 0x0) getsockopt(r1, 0x0, 0x6d, 0x0, 0x0) extattr_get_fd(0xffffffffffffffff, 0x0, &(0x7f0000000280)='%\x03\x00\x00]:\\\x00\x00\x00.S\xaf*F', 0x0, 0x0) kqueue() kevent(r0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) ppoll(0x0, 0xffffffffffffff7f, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000040)={0x10, 0x2, 0x3, @loopback}, 0x10) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x80008, 0x7ffd, 0x6, 0xfffffffffffffffe, 0xfffffffe, 0x10, 0x0, [0x0, 0x0, 0x8001, 0x4, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1000, 0x0, 0x40000000, 0x0, 0x2, 0x0, 0xed4, 0x204, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x1, 0x2, 0x80002, 0x0, 0x40000, 0x0, 0x3, 0xfffffffe, 0x1fffffe, 0xe2, 0x0, 0xffffffff, 0x0, 0x10001, 0x1, 0x8, 0x80000007, 0x0, 0x0, 0x1000000, 0x800000, 0x9, 0x0, 0x0, 0x60d6, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffc, 0x0, 0x0, 0xc7d8, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x10, 0x4, 0x0, 0xfffffffc, 0x3, 0x0, 0x2, 0x0, 0xc, 0x7a, 0x3, 0x6, 0x9, 0x80000, 0x3, 0x0, 0x800, 0x7, 0x0, 0x9, 0x1, 0x0, 0x0, 0x4, 0x2, 0x20000003, 0x7]}) setsockopt(0xffffffffffffffff, 0x0, 0x6e, 0x0, 0x0) clock_nanosleep(0x4, 0x0, &(0x7f0000000040)={0x80000000004, 0x9}, &(0x7f0000000200)) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) rfork(0x80040) connect$inet(r2, &(0x7f0000000140)={0x10, 0x2, 0x3, @rand_addr=0xff}, 0x10) r3 = socket(0x11, 0x3, 0x0) extattr_delete_link(&(0x7f0000000080)='./file0\x00', 0x2, &(0x7f00000001c0)='\x00') cpuset_getaffinity(0x2, 0x4, 0x7, 0x8, &(0x7f0000000100)) open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r4 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x10) pwritev(r4, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x10000) sendto$unix(r3, &(0x7f0000000500)="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", 0x194, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000006c0)=ANY=[@ANYBLOB="aaaaaaaaaaaac7a2e46f05fa08004500001c0000000000019078e000db01e00000650546d17d010800907800000000"]) rfork(0x83000) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) 1.438249987s ago: executing program 3 (id=131): mount(0x0, 0x0, 0x400, 0x0) extattr_delete_link(0x0, 0x1, 0x0) r0 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = dup2(r0, r0) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f00000000c0)={0x0, 0x1d, 0x0, 0x0, 0x1, &(0x7f0000000040)="83", 0x0, 0x4d46b76e, [0x0, 0x0, 0x6]}) socket(0x1c, 0x1, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x4, 0xd27d43220c7df9f, 0x0) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x5) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, &(0x7f0000000000)=""/148) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, 0x0) setitimer(0x0, &(0x7f0000000280)={{0x2, 0x2}, {0x8000000000000001, 0x4}}, 0x0) cap_enter() sendto(0xffffffffffffffff, 0x0, 0x0, 0x101, &(0x7f00000002c0)=@in6={0x1c, 0x1c, 0x0, 0xffff, @local={0xfe, 0x80, '\x00', 0x0}, 0x7}, 0x1c) aio_fsync(0x80, &(0x7f0000000400)={r2, 0x8000df, 0x0, 0x0, [0x6, 0x3], 0x9, 0x8, 0xfffffffc, {0x932, 0x497, 0x0}, {0x0, 0x20, @sigval_int=0x9}}) aio_fsync(0x1000000, &(0x7f0000000e00)={r2, 0x8000, 0x0, 0x0, [0x101, 0xfffc], 0x4, 0x18, 0x2, {0x1, 0x0, 0x0}, {0x4, 0x1a, @sigval_int=0xe0c6}}) aio_waitcomplete(0x0, 0x0) socket(0x2, 0x3, 0x10) setrlimit(0x9, &(0x7f0000000300)={0x401, 0x8}) setrlimit(0x8, &(0x7f0000000000)={0x3, 0xffffffffffffffff}) sigaltstack(&(0x7f0000000000/0x3000)=nil, 0x0) lio_listio(0x0, 0x0, 0x0, &(0x7f0000000d80)={0x1, 0x20, @sival_ptr=0xfffffffffffff861}) 1.435951412s ago: executing program 2 (id=132): openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0xc8a, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x200, 0x2) r0 = fork() r1 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d11c19e9ace00000000000000002100000002ff02000000000000000000000000000104004e20004d"]) (async) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d11c19e9ace00000000000000002100000002ff02000000000000000000000000000104004e20004d"]) bind$inet6(r1, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x7, @empty, 0x2}, 0x1c) syz_emit_ethernet(0xa1, &(0x7f00000003c0)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x6b, 0x6, 0x0, @rand_addr="00000000080001000000001b00", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x2, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}, {"074d1de37f53f8f9b3130d4e824266db27478ee96bd0541a28c99cb0eed93f6bdc2a95c6118d24dd14730940fca47057d906e83865d8e12e272c6a38b3a0bde9fec1544faba33372f9d480ca3e497fe5406c1811385366"}}}}}}}) (async) syz_emit_ethernet(0xa1, &(0x7f00000003c0)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x6b, 0x6, 0x0, @rand_addr="00000000080001000000001b00", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x2, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x10}, {"074d1de37f53f8f9b3130d4e824266db27478ee96bd0541a28c99cb0eed93f6bdc2a95c6118d24dd14730940fca47057d906e83865d8e12e272c6a38b3a0bde9fec1544faba33372f9d480ca3e497fe5406c1811385366"}}}}}}}) sigqueue(r0, 0x49, @sigval_int=0x4) (async) sigqueue(r0, 0x49, @sigval_int=0x4) open$dir(&(0x7f0000000040)='./file0\x00', 0x100000, 0x106) 1.378305138s ago: executing program 2 (id=133): r0 = kqueue() kevent(r0, &(0x7f0000000040), 0x7fffffff, 0x0, 0xfffffffb, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x5) r1 = fork() setitimer(0x1, &(0x7f0000000340)={{}, {0x0, 0x270f}}, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) fork() procctl$PROC_WXMAP_STATUS(0x0, r1, 0x16, &(0x7f0000000140)) fhstat(0x0, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) kqueue() socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000554000/0x2000)=nil, 0x2000, 0x40000) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r4 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x602, 0x0) r5 = freebsd12_shm_open(0x0, 0x200, 0x1) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x0, 0x12, r5, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ftruncate(r4, 0x80000001003864) write(r4, &(0x7f0000000080)="0095743d9f438929966646495da8e88bd6aa04f42a5f8ca82c97370470006f63d1ced0b08f0506f3d526c0d96ccdbbb91deca2e6c20e623ea0588ee91abc50ee2a75065484166464941540589917f9cda2666520e333424d1a39240c7e18fcd0c737f3f1db2661f1b51da36d6eae97f73426d0bfa092a46113fe6d70218f047a0587c0b3", 0x2b7bd7d216c1e05f) bindat$unix(0xffffffffffffff9c, r3, &(0x7f0000000240)=@file={0xa, 0x1, './file0\x00'}, 0xa) connect$unix(r3, &(0x7f0000000140)=@abs={0x8, 0x0, 0x0, 0x2}, 0xffffffffffffffd5) rfork(0x3060) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) kevent(r2, 0x0, 0x0, &(0x7f0000000480), 0x0, 0x0) semget$private(0x0, 0x1adc25350da2656, 0x4) syz_emit_ethernet(0xae, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6000001500782cffe1aaa2241dc0fb000000000000000178ff02000000000000000000000000000102009078000000066718deb30000710100000000000000000000000000000001fe8000000000000000000000000000bb710800098f7bec6f737213af3c9dafaa62be00000000fe8000000000000000000000000000bbff010000000000000000000000000001ff020000000000000000000000000001ff0100000000000000000000000000015d8679ccbd"]) 1.372216816s ago: executing program 0 (id=134): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000001240)={@multicast2, @broadcast}, 0xc) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='./file0\x00') extattr_set_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f0000000080)='+.](\x00', 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f00000001c0)={@multicast2, @rand_addr=0x4}, 0xc) r1 = dup2(r0, r0) r2 = kqueue() kevent(r2, 0x0, 0x0, &(0x7f0000000940)=[{}], 0x1, &(0x7f0000000280)={0x9, 0x4}) sendto(r0, &(0x7f0000000200)="f69471b0bc5e66a942979a2692bf5d84412ddda124db6bf7c319f79194fb8aa794db7482ce3e91abb35d25fb4924c1fc5551f7566ff4935d83a65079a483e6ebf3a79ea480808846ff4c346090d2765455b9e1856258b4c14602671832338058f2e0c0830f09bb7250e36a07489fb6f14562f07e528b7a8b7f6017f159bf051b25a40eace7263ab3d74a3aac73aa1fe1e1fdbb5189b757b6cee9aa9253cd6d7e8c311857bd1e386d3facb7b605b2", 0xae, 0x100, 0x0, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000140)={0x15, 0x8, 0x0, 0x0, 0x57, &(0x7f0000000040)="d024da87ec8bd0d834c727977133b4375d5f72b0af6100b6621c4f63c4e19dcb1561e2a4b25e81a6c0807caae6314393a11cfe6f60cdf1d90a5a1e3f10455d96d42072f8f40f6a9f6c5221270e3ebef4621cb2f2a933c8", 0x8, 0x1000, [0x9, 0x2, 0x6, 0x1e19]}) r3 = kqueue() r4 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0xffe, 0x0, 0x0, 0x0, 0x0}) kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) accept4(r5, 0x0, &(0x7f0000000000), 0x30000000) setsockopt$sock_int(r5, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r6, 0x40000000006, &(0x7f0000000240)="a3", 0x1, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sival_ptr=0x5}}) copy_file_range(r6, &(0x7f0000000000)=0x80000001, r6, 0x0, 0x100000, 0x0) 1.188408823s ago: executing program 3 (id=135): open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) (async) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) cpuset_setdomain(0x2, 0x9, 0x7f, 0x20, &(0x7f0000000080)={[0x1]}, 0x3) (async) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r0, 0x6, 0x27, &(0x7f0000000140)={&(0x7f00000018c0)="00b2c0", 0x0, 0x0, 0x19, 0x3, 0x0, 0x1a, 0x0, 0x0, 0x3}, 0x40) (async) kmq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x3, 0x0, @sival_int=0x4, @ke_flags=0x1}) sendto$unix(0xffffffffffffffff, &(0x7f0000000a00)="b10005019000e81ea8fef96ec2873fd3357ae26caa0416fa4f376336", 0x1c, 0x20080, 0x0, 0x0) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r1, &(0x7f0000000900)="6a3364f80c04449d07afb23ef30fa25a8bd0daafa9f5fb5b7880cb0eabd568116b4b0bc2945f03d453cf4a291b6bb293", 0x30, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0x0, @mcast2, 0x6}, 0x1c) recvmsg(r1, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0xa86a7001833bc174) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000, 0x0) (async) recvfrom$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x200000000000) mkdirat(0xffffffffffffff9c, 0x0, 0x1) (async) ioctl$BIOCLOCK(0xffffffffffffffff, 0x2000427a) (async) r3 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x400, 0x0, 0x0) (async) connect$inet(r3, 0x0, 0x0) ioctl$sock_bt_hci(r3, 0x20006265, 0x0) (async) cpuset_setdomain(0x3, 0x2, 0x0, 0x20, &(0x7f0000000040)={[0x1]}, 0x1) kqueue() r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) fork() (async) wait4(0x0, 0x0, 0x2, 0x0) (async) setpgid(0x0, 0x0) (async) aio_write(0x0) fork() (async) ioctl$DIOCCHANGERULE(r4, 0xcbe0441a, &(0x7f0000000040)) (async) ioctl$MDIOCDETACH(r2, 0xc1b46d01, 0x0) (async) freebsd11_getfsstat(0x0, 0x0, 0x2) socket(0x1b, 0x3, 0x0) 998.420402ms ago: executing program 3 (id=136): r0 = socket$inet_tcp(0x2, 0x1, 0x0) (async) r1 = openat$filemon(0xffffffffffffff9c, &(0x7f0000000180), 0x40000, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) (async) shmdt(0x0) (async) open$dir(&(0x7f0000001240)='./file0\x00', 0x40000000ac5, 0x0) r3 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) r4 = getpid() fcntl$lock(r3, 0xe, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000006, r4}) r5 = open(&(0x7f0000000300)='./file0\x00', 0x0, 0x0) (async) r6 = getpid() fcntl$lock(r5, 0xe, &(0x7f0000000040)={0x3, 0x0, 0xffffffffffffffff, 0x100000006, r6}) (async) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) (async) r8 = getpid() fcntl$lock(r7, 0xe, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x100040000004e, r8}) (async) openat$md(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) (async) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "db8344", 0x8, 0x11, 0x0, @rand_addr="fc000000200000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @udp={{0x0, 0x2, 0x8}}}}}}}) (async) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x47, 0x0, 0x0) dup2(r1, r1) (async) cap_rights_limit(0xffffffffffffffff, 0xffffffffffffffff) (async) r9 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$MDIOCATTACH(r9, 0xc1c06d00, &(0x7f0000000780)={0x0, 0x2, 0x0, 0x0, 0x10001, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, [0x2, 0xffffffff, 0x0, 0x0, 0x1ff, 0x4ae, 0x0, 0x6, 0x0, 0x0, 0x0, 0x3, 0x3, 0x7, 0xfffffffb, 0xf22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000, 0x46d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x3, 0x0, 0x0, 0xfffffffe, 0x0, 0xffffffff, 0x0, 0x2, 0x14, 0x0, 0x8000, 0x7fff, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x2002, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x2, 0x6, 0xb]}) (async) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r0, 0x6, 0x27, &(0x7f0000000140)={&(0x7f0000000080)="00b2c06df480cfe19f0da4833728dc14", 0x0, &(0x7f0000000040)="cf", 0xb, 0x10, 0x0, 0x7, 0x1, 0x0, 0x3, 0x3, "00ff03ff8e3500"}, 0x40) socket(0x1c, 0x1, 0x0) (async) sendto$inet(r0, &(0x7f0000000000)="727f4c98e6e3b6d62e469a3ba2e66dba9106d9b78a10424b958051429e1dce150e1970605333c5f442aa7ab1e26f9aecabf014a76c0000e80000", 0x3a, 0x185, &(0x7f0000000280)={0x10, 0x2, 0x1, @local={0xac, 0x14, 0x0}}, 0x10) 555.053872ms ago: executing program 1 (id=137): r0 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x48000101) fork() mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_extract_tcp_res$synack(&(0x7f0000001100), 0x1, 0x0) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$sock_int(r1, 0xffff, 0x4000, 0x0, &(0x7f0000000000)) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000580)=[0xffffffffffff7185, 0x8000000000000001]) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r2 = open$dir(&(0x7f0000000100)='.\x00', 0x80000, 0x1c1) openat(r0, &(0x7f0000001080)='./file2\x00', 0x2400008, 0x2) syz_emit_ethernet(0xc0, &(0x7f00000011c0)={@broadcast, @random="5dcaed54055d", [], {@generic={0x601, "6570258a99dbff98185375a8cfb72df9a45d6edf93c29267e20dc907681630a1221c9625617137b70c56578f22af5237def724f44e50fb139929e7d3c1e62a3a28bd284df7c0f2193b8240dfbf72b09d6b7f01e8fdbf7df05ec3c986f0c5ef2cc1b907c596f1fd4116b8d1c0841a4317bd3b413bfe785e11b4b69066ddd35f6cc2a1e3e062174c0046cc7d3ccd7b7712448bdfab1e8fbdad2bd5884783cf854ace89aec22d71ae9f4bf064ee5a1b76083edf"}}}) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f00000000c0)={0xb, 0x0, 0x18, &(0x7f0000000100)="0b6fac4103e7a00d4689e8090000005aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d86699a, [0x0, 0x0, 0x0, 0x1]}) ioctl$CIOCCRYPT(r3, 0xc0306367, &(0x7f0000000640)={0x0, 0x2, 0x0, 0x4d90, &(0x7f00000002c0), 0x0, 0x0, 0x0}) cap_ioctls_get(r2, &(0x7f0000001040)=[0x0, 0x0], 0x2) r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @mcast2}}, {{0x1c, 0x1c, 0xffffffffffffffff, 0x0, @rand_addr="19fdb123c091ae3db1f1c5f51d8be800"}}}, 0x108) setsockopt$inet6_group_source_req(r5, 0x29, 0x55, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x3, 0x0, @mcast2}}, {{0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}}}}, 0x108) setsockopt$inet6_group_source_req(r5, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @mcast2}}, {{0x1c, 0x1c, 0x1, 0x0, @loopback, 0x4}}}, 0x108) setsockopt$inet6_group_source_req(r5, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x80000000, @mcast2, 0xf}}, {{0x1c, 0x1c, 0x1, 0x0, @rand_addr="2e3bd580583afb490ea98696165ed7d1", 0x4}}}, 0x108) rfork(0x3060) mkdirat(r4, &(0x7f00000001c0)='./file1\x00', 0x4) renameat(r2, &(0x7f0000001140)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', r4, &(0x7f0000000180)='./file0\x00') sync() sync() 554.105338ms ago: executing program 3 (id=138): freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x0, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0xa, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) (async) access(0x0, 0x0) (async) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) (async) getsockopt$inet6_int(r2, 0x29, 0x18, 0x0, &(0x7f0000000cc0)) (async) kevent(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) (async) setreuid(0xee00, 0xffffffffffffffff) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000180)={0x12, 0x1, 0xffffffffffffffff, 0xfffffffc}) (async, rerun: 32) r4 = socket$inet(0x2, 0x1, 0x81) (rerun: 32) setsockopt$inet_mreqsrc(r4, 0x0, 0x46, &(0x7f0000000040)={@multicast1, @broadcast, @local={0xac, 0x14, 0x0}}, 0xc) setsockopt$inet_mreqsrc(r4, 0x0, 0x46, &(0x7f0000000140)={@multicast1, @multicast1, @local={0xac, 0x14, 0x0}}, 0xc) (async, rerun: 32) setsockopt$inet_mreqsrc(r4, 0x0, 0x47, &(0x7f0000000100)={@multicast1, @loopback}, 0xc) (rerun: 32) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000f40)=""/218) (async) socket(0x1c, 0x1, 0x0) (async) ioctl$DIOCSETLIMIT(0xffffffffffffffff, 0xc0084428, 0x0) freebsd11_mknod(0x0, 0x1000, 0x7) (async) r5 = kqueue() kevent(r5, &(0x7f0000000000)=[{0xb039, 0xfffffffffffffff9, 0x88, 0xc0000000, 0xa3a, 0xf9, [0x0, 0x7fff, 0x6, 0xd0bf]}], 0x1, 0x0, 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) (async) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) close(r0) (async) setuid(0xffffffffffffffff) (async) r6 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_int(r6, 0x29, 0x28, 0x0, 0x0) (async, rerun: 32) writev(0xffffffffffffffff, &(0x7f00000000c0), 0x133c) (async, rerun: 32) setsockopt$inet6_group_source_req(r1, 0x29, 0x55, &(0x7f0000000280)={0x10d, {{0x1c, 0x1c, 0x3, 0x7, @empty, 0x3ff}}, {{0x1c, 0x1c, 0x3, 0x4, @ipv4, 0x3}}}, 0x108) 429.191954ms ago: executing program 0 (id=139): r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x4, 0x0) r1 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000840)={'bbr\x00'}, 0x24) (async) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x1ff, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) sendto(r1, &(0x7f0000000500)="b9d5cf29033fda9f0d47f14a5babefe85e2f1027c0bb21378a3d78aef12d04ee87a68f4323d818a91259db9fd1aaf026a235647bf27a0443ed4b8192e7b591b1592001d1632f2f74b1cd1043c1f242135d868693021711dbbf2091", 0x5b, 0x100, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x1, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x2006}, 0x1c) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x30000, 0x80010, 0xffffffffffffffff, 0x9) ioctl$DIOCRADDTABLES(r0, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b0e929ef2844c77c9f9b8d30102a25cd90935ea0777a101eb6784c9", 0x0, 0xfc}, 0x0, 0x0, 0x5, 0x0, 0x0, 0x3, 0x0, 0x5, 0x3}) (async) setsockopt$inet6_tcp_buf(r1, 0x6, 0x41, &(0x7f0000000180)="ffea7c751d84c4e4f31800", 0xb) (async) mount(&(0x7f0000000740)='ext2fs\x00', 0x0, 0x10, &(0x7f0000000680)="ade842ebae21f7633aca48499e99749030ddbd9e14874ce6a586d90a306cb74264626630e10532de6c39d4332680bcfd0f4d702e0d69a62e7d5efef16b33148f8b") (async) shm_open2(0x0, 0x400, 0x0, 0x9, 0x0) (async) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) (async) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r2, 0x6, 0x27, &(0x7f0000000140)={&(0x7f0000000080)="20b202c0235414000000000000000000", 0x0, &(0x7f00000007c0)="1a7d6d0f0000004ddbda06", 0xb, 0x10, 0x64, 0x7, 0x1, 0x0, 0x3, 0x3, "00ff03ff8e3500"}, 0x40) (async) sendto$inet(r2, &(0x7f0000000240)='\x00\x00\x00\t', 0x4, 0x20001, &(0x7f0000000200)={0x10, 0x2, 0x1, @loopback}, 0x10) (async) setsockopt$sock_splice(r2, 0xffff, 0x1023, &(0x7f0000000a40)={r2, 0x0, {0x7000000000000000, 0x1}}, 0x20) (async, rerun: 64) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) (rerun: 64) madvise(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x2) (async) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) extattr_set_fd(0xffffffffffffffff, 0x0, &(0x7f0000000880)='\x80\xad\xe8\xd7\xbd\x02\xdd\x05\xb5\xe0\x0e\x18I1\xd2\x93\x99\x8b\xea\xd6\xc4T\x81B~\x9d\xdc\x90\xd6\x92}\x03\x87\x13\x10\xf1\xba\xee\x1f\x1c+kB\t\xab\xcf*\x95\xe7\x81\x16Y\xa0\xd5\xf0\xf9M\x9fQb\\\xba\xdas\xdca\xe8\xe9t\xc66A\x9f\x966f\xe3\xd7v\xfe%\xda =\xe2\x1f\xecDO\xcb\x824\xd7Q\xca\'4\xa4\xa2\x1d\b],\xe3-\xe7\xec\xa9\xa5\x06\xf61\xbd\x95\xe7\xe1@\x1eYGw\x8b\xad\xa0A\"\xd3\x9f@\x9c:\b6/2\t\xc9\xd8j\xbds\x16S\xb0\xa2\x04\x1e\x021\xc8\xb5N\x9a|\xaa\xea\xe7\xa5\xeb\xc7\xaa\x05\xa3z\x9a\x7f\xe8no\x933?\xba\xce\xd0fM\x83\xbc\xc5D\x8e\x16Sv\xf6\xe7RP,\xb9\xf0\xce\xdd\xbb\x9b\x84il\xdfH\xda\x16}\xcc\xd4\xc4\xae\xa3-\x00\x00\x00', 0x0, 0x0) r3 = open$dir(0x0, 0xa, 0x0) writev(r3, &(0x7f0000000340), 0x0) readv(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/58, 0x3a}], 0x1) (async) extattr_set_file(&(0x7f00000001c0)='./file0\x00', 0x3, &(0x7f0000000700)='bbr\x00', &(0x7f0000000780)="d605a7c31ea9dfba635cd56e22453554ff0cea186ccd5d6d5cde7a856f2c9ee724071d2fc0ef88a2414626b70c80d51d48c1d2e678fbf0fd", 0x38) (async) socket$inet_tcp(0x2, 0x1, 0x0) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_buf(r4, 0x0, 0x19, &(0x7f0000001080)=""/4096, &(0x7f0000000100)=0x1000) (async) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r2, 0x6, 0x27, &(0x7f0000000680)={&(0x7f0000000980)="51c51b5aedeb26a5db1e5400b2c0010080a4", 0x0, &(0x7f0000000040)="2c061978cd2035c5c300"/23, 0x29, 0x12, 0x0, 0x13, 0x17, 0x0, 0x3, 0x3, "710800000094ffff"}, 0x40) r5 = socket$inet_sctp(0x2, 0x5, 0x84) (async, rerun: 32) rfork(0x1000) (rerun: 32) setsockopt$inet_int(r5, 0x0, 0x41, &(0x7f0000000800)=0xf625, 0x4) 192.338098ms ago: executing program 3 (id=140): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x2, &(0x7f0000000040)=0x2, 0x4) sendto$inet(r0, &(0x7f0000000200)="4b420055bfb403f04ef8f6ebbb5a59f3f11b82079608d2a3f85f9a3d78df82c0512a7c64f8cdc42f35d09e7fa43d44ee2f1362063b11818ebf8b61204b9b6838a51a7570a2903cc764527e57b0c043b2a49d2637e8", 0x55, 0x1, &(0x7f0000001200)={0x10, 0x2, 0x1, @multicast1}, 0x10) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0x68, &(0x7f0000000080)={{0x1c, 0x1c, 0x1, 0x2, @loopback, 0xffffffff}, {0x17, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}, 0x0, [0x0, 0xfffffffd, 0x0, 0x800, 0x1, 0x1000, 0xfffffffd, 0x2ffff]}, 0x5c) setsockopt$inet6_IPV6_RTHDR(r1, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) connect$inet6(r1, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x10, @rand_addr="ff8e0000731600", 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd60006f330018000000000700000000000000000000000000fe8000459c7a598631533ca2a4e3000000000000000000aa3a0100000000000001030000000401fd8000907800000000"]) 191.050386ms ago: executing program 3 (id=141): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r0, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) mlockall(0x2) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) truncate(&(0x7f0000000000)='./file0\x00', 0x80) open(0x0, 0x80000000000206, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r2, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x0, 0x1ff], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int, @ke_flags=0x9fc040a3bd859cca}}) r3 = kqueue() sysarch$I386_GET_IOPERM(0x3, &(0x7f0000000040)) kevent(r3, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000080)=""/224, 0xe0}, {&(0x7f0000000180)=""/247}, {&(0x7f00000002c0)=""/121}], 0x10000000000001e2, 0x0}, 0x0) shutdown(r4, 0x0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000f00)={0xfd7, [{0x3, [0x8, 0x6, 0x7, 0x6, 0x1, 0x0, 0xffffffff, 0x5, 0x80, 0x8, 0x500, 0x8001, 0x2000, 0x80000000, 0x7, 0x0, 0x6, 0x7, 0x2, 0x8, 0xfff, 0x10001, 0x1000, 0x8, 0x4d97, 0xff, 0x101, 0x3, 0x6, 0x304, 0x6, 0x2, 0xfffffff9, 0x7, 0x7, 0x101, 0x10000, 0x2, 0x5, 0x2, 0x1, 0x3, 0x6f, 0x22df, 0x401, 0x7fffffff, 0xa7, 0xc, 0x6, 0x4, 0x9d49, 0xb, 0x8001, 0x6, 0x2, 0x1, 0x7f, 0x2, 0x6, 0x80000000, 0x2, 0x96fc, 0x200, 0x0, 0xfffffc00, 0x8, 0x0, 0x1e780, 0x50, 0x8001, 0x4, 0x9, 0x7, 0xffffffff, 0xfffeffff, 0xee, 0x0, 0x8, 0x7fff, 0x0, 0x2, 0x5b23, 0x4, 0xffffffff, 0x1, 0xf05, 0x9, 0xffffffff, 0x9, 0x80000001, 0x8, 0x9, 0x4, 0x7fffffff, 0x8000, 0x2, 0x8001, 0x8, 0x4, 0x3, 0x6, 0x80, 0xb3ab, 0x9]}, {0x4, [0x4, 0x3, 0x1, 0x3, 0x80000000, 0x4, 0x400, 0xeec, 0xf557, 0x8, 0x7fff, 0x8, 0x8, 0x401, 0xb, 0xa, 0xfad6, 0x8, 0x5, 0x6, 0x40, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0xc77e, 0x8, 0x81, 0xc9, 0xa4, 0xfffffff8, 0x2, 0x921, 0x5fffffff, 0x24, 0x2, 0x370c, 0xb00, 0x4, 0x52a, 0x8, 0xfffffffd, 0xff, 0x8, 0x4, 0x370a8713, 0x9, 0x6, 0x428, 0xfffffff8, 0x2, 0x7, 0x4, 0x0, 0x5, 0xffff, 0x81, 0x0, 0x8, 0x9, 0x0, 0x7, 0x3, 0x2, 0x2, 0xff, 0x1, 0x4, 0x3, 0x7, 0x2, 0x6, 0x3, 0xbb, 0xffff, 0x8, 0x4, 0x0, 0x9, 0x7, 0x703, 0x0, 0xfffffff9, 0x9, 0x6, 0x4, 0xb32, 0x4, 0x10, 0x9, 0x40, 0x3, 0x4, 0x91, 0x0, 0x0, 0x7fffffff, 0x8, 0x66f53e15, 0x1, 0x8000, 0x4]}, {0x1, [0x826, 0x1000, 0x9, 0xffff8001, 0x3, 0xffffff77, 0x6, 0x1, 0x7, 0x0, 0x9, 0x6621, 0x5, 0x1, 0x6, 0x0, 0x3, 0x44, 0x5, 0x7f, 0x2, 0x40, 0xe, 0x10001, 0x1, 0xfffffff7, 0x80, 0x6, 0x7, 0xe51, 0x1ff, 0x2, 0x2, 0xf8000000, 0x40, 0x0, 0x400, 0x10000, 0x7, 0x1, 0x8, 0xc03, 0x3, 0x2, 0x122, 0x7, 0xf, 0x7, 0x31c, 0xcbc0, 0x81, 0x0, 0xffffffff, 0xd08, 0x5, 0x7, 0x1, 0x2, 0x8, 0x6d, 0xff, 0x3b, 0x8, 0x8, 0x5834, 0x8, 0x7fff, 0x1, 0x4, 0x0, 0x5, 0x9, 0xaa, 0x0, 0xa, 0x4, 0x80000001, 0x0, 0x4, 0x7fff, 0x0, 0xdc5, 0x6, 0x4, 0x8, 0x8001, 0x4, 0x9, 0x9, 0x80, 0x3, 0xd5ca, 0x7, 0x7fff, 0x1, 0x2, 0x80, 0x1d12, 0x3, 0x0, 0xfffffffc, 0xe358, 0x200, 0x5]}, {0x0, [0xfffffff6, 0xb729, 0xa, 0x9, 0x2, 0x5, 0x9, 0x6, 0x40, 0x3fc3, 0x0, 0x3a, 0x72, 0x7ff3, 0x7, 0xfffffffe, 0xdcb, 0x81, 0x1, 0x7fffffff, 0x282d, 0x1ff, 0x10000000, 0x89, 0xffff0000, 0x7fff, 0x10, 0x2, 0x3, 0x4, 0xffffffff, 0xde, 0x400, 0x0, 0x6cd9, 0x101, 0x7, 0x1000, 0x2, 0x7f, 0x1, 0xe03, 0x7, 0x5, 0x3, 0x2, 0x1, 0x4, 0x1, 0x2, 0x7f, 0x8, 0xf, 0x9, 0x50, 0x5, 0x0, 0x0, 0x93, 0x1, 0x4, 0x2, 0x18, 0x7ff, 0xd, 0x4, 0x5, 0x7c8, 0x9, 0x9f, 0x7f2d, 0x8fa, 0x1, 0xfffffff9, 0x9a9d, 0x5, 0x6, 0x8, 0x2e, 0x6, 0x1, 0x7f, 0x8, 0x5, 0x0, 0x0, 0x2, 0x40, 0x9, 0x7, 0xd5e, 0x1, 0x1ff, 0x7, 0x3ff, 0x10c, 0x7fff, 0x2, 0x7, 0x7, 0x1, 0x6, 0x6, 0x38]}, {0x1ff, [0x2, 0x0, 0x2, 0x2, 0x3e, 0xe, 0x401, 0xb, 0x0, 0x31, 0xad6b, 0x0, 0x5, 0x1ff, 0x3b, 0x9, 0xd, 0x1, 0x574b, 0x9, 0x5, 0xfffffff7, 0x9, 0x3, 0x7, 0x6, 0xa41, 0x6, 0x7, 0x1, 0x3, 0xa, 0xfffffffb, 0x2, 0x5, 0xe0000000, 0x3, 0x80000000, 0x8001, 0xfffffff9, 0x3, 0x2, 0x553, 0x40, 0x6f4, 0x0, 0x6, 0x0, 0x7, 0x2, 0x2, 0x8, 0x100, 0xd, 0x7, 0xfffffff6, 0xc3, 0x6, 0x8, 0x9, 0x0, 0x2000, 0x3ae, 0x40000000, 0x4, 0xc08, 0x8, 0xffffffc0, 0x9, 0x10001, 0x10001, 0x0, 0x3, 0x200, 0x5, 0x5, 0x8, 0x3, 0x1, 0x3, 0x2, 0x5, 0x7186b6e1, 0x7, 0x4, 0x10, 0x8, 0x7, 0xffffffff, 0xffffffff, 0x85f5, 0x0, 0x1, 0x800, 0x5, 0x5, 0x5, 0x80000001, 0x5, 0x8000, 0x3, 0xffffffff, 0x8, 0x1ff]}, {0x7db, [0x5, 0x7, 0x7, 0x9, 0x2, 0x6, 0x80000000, 0xffffffff, 0x6, 0x4, 0x6, 0x67d7, 0x8, 0x10001, 0xfffffffa, 0x2, 0x4, 0x6, 0xfffffe01, 0x8, 0xffffff93, 0x3, 0xa37, 0x3ff, 0x8, 0x7c8, 0x5, 0x101, 0x8, 0x2, 0x1000, 0x0, 0x3ff, 0x1, 0x3, 0x6, 0x1f64d413, 0x5, 0x1, 0xfffffffc, 0xedf, 0x2, 0xc, 0x2, 0x8, 0x0, 0x7, 0x9, 0x149, 0x5, 0x2, 0x5, 0x7fff, 0x0, 0x70, 0x4, 0x2, 0x2, 0x5, 0xba38, 0x2, 0x7, 0xffffffff, 0xfffffffa, 0x2, 0x2, 0x9, 0xdd, 0xff, 0x3, 0x401, 0x200, 0x0, 0x9ad, 0x6, 0x91dc, 0x7fffffff, 0x6, 0xf0ff, 0x4, 0x7, 0xff8, 0x8001, 0x0, 0x10000, 0xe, 0x5, 0x1000, 0x622, 0x7fffffff, 0x2e, 0x4, 0x4, 0x2, 0x5, 0x4, 0xe, 0xffffffff, 0xfffffff7, 0x6, 0x4007f, 0x20d4, 0x3, 0x401]}, {0xdb6d, [0x8, 0x1, 0xffff8001, 0x6, 0x9, 0x0, 0x2, 0x6, 0xfffffff2, 0x7f, 0x8, 0x8, 0x7, 0xfffff755, 0x6, 0x9, 0x4, 0x5, 0x50f, 0x100, 0x6, 0x5, 0x3, 0x9e3, 0x7, 0xfff, 0x4, 0x7, 0x9, 0x8, 0x2, 0x0, 0xb4d, 0x2, 0x200, 0x4, 0x5, 0x9, 0x7df, 0x2, 0x7ff, 0x7, 0x1196, 0x2, 0x1afa, 0x7, 0xf, 0x80000001, 0x8, 0x4, 0x3, 0x1, 0x5, 0x2, 0x4, 0x9, 0x462, 0xf1, 0xffffffca, 0xad58, 0x66d, 0x7, 0x1, 0x1e, 0x5, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfa, 0x701, 0x81, 0xea2, 0x3, 0x7ff, 0x8, 0xb11, 0x3, 0x1000, 0x2, 0x400, 0x1ff, 0x6, 0x101, 0x6, 0xfffffffe, 0x5, 0x1, 0x81, 0x5, 0x3ff, 0x8, 0x4, 0x4, 0x2, 0x4, 0xfffffff9, 0xf, 0x573, 0xb, 0x6, 0x5, 0x7]}, {0x0, [0x6, 0x55f, 0x7fff, 0xad3, 0x4, 0x0, 0x0, 0x6b, 0x9, 0x101, 0x8, 0x3ff, 0x5, 0x40, 0x8, 0x8, 0x9, 0x0, 0x5, 0x0, 0x3, 0x81, 0xfffffffa, 0x9, 0x401, 0xda, 0x6, 0xfffffff7, 0x200, 0x2, 0xb, 0x1, 0x3, 0x2, 0xd7, 0x0, 0x805, 0xffffffff, 0x40, 0x1, 0xd, 0x8001, 0x0, 0xaca, 0x3, 0xff, 0x5c, 0x100, 0x10000, 0x1, 0xffffffff, 0xffff, 0x40, 0x0, 0x914, 0x8, 0x7, 0x8, 0x6, 0x5, 0xa0, 0xc, 0xffff, 0xf1a, 0x100, 0x6, 0x4, 0x7fffffff, 0xc, 0x9, 0x7fff, 0x3, 0x8000, 0x0, 0x3, 0x4, 0x9, 0xffffffff, 0x4, 0x10000, 0x0, 0x4, 0x6, 0xe45, 0x1, 0xd, 0xd7, 0x8000, 0xfffffff7, 0x6, 0x5, 0x200, 0x4, 0x5, 0x7, 0x5, 0x81, 0x8, 0x0, 0x6, 0x4, 0x8, 0xb4f, 0x9]}, {0x3, [0xfffffff5, 0x4, 0x9, 0x401, 0xd97, 0x80000001, 0x0, 0x470, 0x1, 0x6, 0x2, 0x4, 0x2f6229ce, 0x2, 0xa, 0x8, 0x7f, 0x4, 0x34, 0x9, 0x0, 0x5e, 0x7fffffff, 0xd2df, 0x54, 0x8, 0x6, 0x7ff, 0x5, 0x3, 0x6, 0x0, 0xffffffff, 0xffffffff, 0x3, 0x80000000, 0x9, 0x2, 0x18, 0x8, 0xff, 0x5, 0x9, 0x4, 0xfdb, 0x0, 0x6, 0x0, 0x6, 0x8, 0x2, 0x400, 0x8, 0x0, 0x8, 0x1, 0x401, 0x2400, 0x1, 0x5, 0x7f, 0x7ff, 0x80, 0x1ff, 0x70d, 0x9, 0x0, 0xb8, 0x1d3, 0x7fff, 0x2, 0xd74b, 0x1000, 0x8000, 0xff, 0x6, 0x10, 0xfff, 0x9, 0x1fe0, 0x5, 0x0, 0xffffff80, 0x0, 0xfd9, 0x1000, 0x6, 0xcb4, 0x7b9, 0x6, 0x4, 0x9, 0x4, 0x8, 0xfffffff7, 0x80000000, 0x80000000, 0x7f, 0x800, 0x2, 0x1, 0x1, 0x6, 0x7]}, {0x1, [0x2, 0x6, 0x5, 0x3ff, 0x9, 0xc, 0xfffffffe, 0x3, 0xfffffffd, 0x10000, 0xfffffe01, 0xfffffff7, 0xfffffffc, 0x7fff, 0xffffffb9, 0x32c, 0x9, 0x1, 0x50dc, 0x1006, 0x8, 0x8, 0x2e, 0x8a05, 0x7, 0x3, 0xb, 0x1, 0xffff3c32, 0x8001, 0x2, 0xc3e0, 0x2, 0x6e31, 0x3, 0x2, 0x4, 0xa5, 0x4, 0xd6, 0xfffffff9, 0x9, 0x9fc, 0x6, 0x81, 0xffffffc0, 0xc2ee, 0x6cb, 0x3, 0x35, 0x68, 0x6, 0xe28a, 0x7, 0xff, 0x8, 0x8, 0x1, 0x9f, 0x6, 0x8, 0x2, 0x4, 0xa4, 0x8, 0x7fff, 0x1, 0xfffff001, 0x0, 0x9, 0xa, 0x274, 0x9, 0x5, 0x9a, 0x9c99, 0x81, 0xc, 0x18, 0x7, 0x0, 0x8, 0x10, 0x7, 0x6, 0x8, 0xff, 0x6, 0x7, 0x4, 0x8, 0x2, 0xaa37, 0x8, 0x5, 0x8, 0x1f, 0x4, 0x2, 0x1, 0xd, 0x1, 0xb9, 0x4]}, {0x0, [0x0, 0x5, 0x1, 0xe, 0x8000, 0x3, 0xafc, 0x401, 0x6, 0x8, 0x0, 0x8fa, 0x7f, 0xfffffff6, 0x120000, 0xff, 0xb4, 0xc, 0x6, 0x7ff, 0x5, 0x100, 0x10001, 0x3, 0x9, 0x101, 0xffffffff, 0xc, 0x8001, 0xc, 0x5, 0xa227, 0x5, 0x3ff, 0x1, 0x4, 0x1, 0x8, 0x2277, 0x7, 0xe9, 0x3, 0x1, 0x0, 0x2000, 0x8, 0x6, 0x1, 0x3, 0x3, 0x8, 0x5, 0x400, 0xaec, 0xfffffff7, 0x8c86, 0x9, 0x0, 0x8, 0x8, 0xe, 0xa, 0x3, 0x40, 0x10000, 0x1, 0x46, 0x1, 0x82, 0x5, 0x5, 0x7, 0x184, 0xc3f2, 0xfffffffb, 0x8, 0x3, 0x5, 0xfffffff8, 0x0, 0xa436, 0x81, 0x4, 0x6, 0x7, 0x0, 0x0, 0x3b9, 0xb81a, 0x7, 0x1, 0x3, 0xffffffff, 0x8, 0xe, 0xffffa46a, 0x7fff, 0x0, 0x2, 0x201, 0x4, 0x1, 0x436f95d4, 0x1]}, {0x5, [0x0, 0xffffffff, 0x0, 0x5, 0x7, 0x2, 0x2, 0x7ff, 0x438, 0x2, 0x83, 0x4, 0x8, 0x10001, 0x5e54, 0x4, 0xd, 0x8, 0x4b, 0x5b3, 0x9, 0x7000000, 0x3, 0x8, 0x1, 0x10001, 0xf39a, 0x17, 0x5, 0xd94f, 0x87a9f2b, 0x4, 0x8, 0x9, 0x6, 0x4, 0x7, 0x4, 0x2, 0x10000, 0x8, 0x4e2, 0x10, 0x0, 0xd, 0x9, 0x0, 0x1, 0x4, 0xda, 0x28, 0x10001, 0x29, 0xff, 0x7, 0x61a, 0x3, 0x6, 0x5, 0x0, 0x3, 0x6, 0x7ff, 0x3b0, 0x8, 0x3, 0x2, 0x0, 0xc349, 0xd, 0xe1, 0x5, 0x6, 0x6, 0x8001, 0x3, 0x4, 0x8, 0x69e, 0x4, 0xd, 0x0, 0x3, 0x2, 0x4, 0x0, 0x7fffffff, 0x5, 0x4, 0x5, 0x3, 0x5, 0x2, 0x88, 0x81, 0x6, 0x10001, 0x8, 0x7f, 0x200, 0x0, 0x3, 0x4, 0x8]}, {0x6, [0x80, 0x9, 0x4af, 0x4, 0x2, 0x2, 0x6, 0x7, 0xff, 0x10001, 0x7, 0x2, 0x3, 0x3, 0x9eca, 0xc9, 0x9, 0xff, 0x7f, 0xfffffff8, 0xa250, 0x6, 0x92, 0xfffff989, 0x3, 0x5, 0x1, 0x4, 0x3, 0x94, 0x1, 0xfffffff6, 0x800, 0x9, 0x2, 0xf8, 0xcca, 0xffffff01, 0x5c, 0x2, 0x10, 0x4, 0xd, 0x15f5, 0x9, 0x7f, 0x5, 0xfffffffa, 0x2, 0xe0000000, 0x8001, 0x9, 0x1, 0x8, 0xc327, 0xfffffffe, 0xea, 0x9, 0x9, 0x8000, 0x2, 0x8000, 0x8, 0x3ff, 0x5, 0x4, 0x5, 0x81d2, 0x4, 0x6, 0x40, 0x9a, 0x5, 0x0, 0x7ff, 0x6, 0x1, 0x718f, 0x3, 0x6, 0x3, 0x4, 0x8, 0x8001, 0x200, 0x802e, 0x2, 0x5, 0x10000, 0x8, 0x101, 0x1, 0xd, 0x9, 0x0, 0x0, 0x7, 0x3, 0xf57a, 0x1ff, 0xff, 0x1, 0x12a, 0x9]}, {0x6, [0x5, 0xfffffc01, 0x6366, 0xf, 0x4, 0x432, 0x3, 0xba6c0000, 0x0, 0x7, 0x4c000000, 0x3, 0x0, 0x3ff, 0x2, 0x4, 0xcc39, 0x473, 0x3, 0x6, 0x3, 0xa, 0x6, 0x0, 0x7ff, 0x6d0, 0x187e9fac, 0xd, 0x18, 0x3, 0x1, 0x2, 0xfffffffb, 0x1, 0x6, 0x4, 0x5, 0x4, 0x8, 0x88, 0x0, 0x80000000, 0xb, 0x4, 0x9, 0x3ff, 0x7, 0xd8b, 0x502e, 0x7, 0x7, 0x4, 0x6, 0xffffffff, 0x8, 0x1, 0x1ff, 0x97f, 0x310, 0x3, 0xcc0, 0x5, 0x169a, 0x10000, 0x43ad4fa3, 0x2, 0x9, 0x6, 0x401, 0xf, 0xffffff7f, 0x4b8a, 0x8, 0x7, 0x8ca9, 0x3, 0x9, 0xd7, 0x374, 0x8, 0x5, 0x4, 0x3, 0x5, 0x7fff, 0x7, 0x800, 0x0, 0x4, 0x10001, 0x80000001, 0x7fff, 0x7, 0xc9, 0x800, 0x9, 0x80, 0x8, 0xd2, 0x2, 0x1, 0x0, 0x8330, 0x9]}, {0x200, [0x9, 0x4000008, 0x6, 0x9, 0xedf, 0x1, 0x3, 0x101, 0x9, 0x0, 0x101, 0x10, 0xf, 0x1, 0xc5, 0xa588, 0x0, 0xe, 0x6, 0x2, 0x0, 0x8, 0xe, 0xa, 0x8, 0x2, 0x7e, 0x0, 0x6, 0x80000000, 0x77, 0x2, 0xfffffffb, 0x199, 0x2, 0xbf63e0, 0x0, 0xc6, 0x0, 0x400, 0x2, 0x140, 0x5, 0x6, 0x0, 0x9, 0xc7, 0x3c, 0xffffffff, 0x0, 0x5, 0x0, 0x8, 0x3, 0x2, 0x3486238e, 0x0, 0x7, 0xffffffff, 0xd93, 0x6, 0x2, 0x8, 0xfb6, 0x7, 0x5, 0x2, 0x1, 0x1, 0x80000001, 0x9, 0xc, 0x3, 0x8, 0xd6b, 0x36, 0x6, 0xb8, 0x0, 0x9, 0xc, 0x0, 0x7, 0x6, 0x869e1, 0x100, 0x4, 0xfe, 0x4800000, 0x613, 0xfffffff8, 0xbe1, 0xe, 0xffffff7f, 0x5a8, 0x8001, 0x4e8a095, 0x6, 0x9, 0xffffffff, 0x3, 0xbbe, 0x5, 0x50]}]}) seteuid(0xffffffffffffffff) r5 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000001000/0x3000)=nil) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r6, 0xc040636a, &(0x7f00000000c0)={0xb, 0xe, 0x18, &(0x7f0000000100)="0b6fac4103e7a00d4689e8090000005aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d86699a, [0x0, 0x0, 0x0, 0x1]}) seteuid(0x0) r7 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECVRCVINFO(r7, 0x84, 0x1f, &(0x7f0000000480), &(0x7f00000004c0)=0x4) shmctl$IPC_RMID(r5, 0x0) r8 = getpgid(0xffffffffffffffff) open$dir(&(0x7f0000000380)='./file0\x00', 0x2, 0x3) aio_fsync(0x4fb6c9497fdf3192, &(0x7f00000003c0)={0xffffffffffffffff, 0xfff, 0x0, 0x0, [0xc, 0x2], 0xa, 0x8, 0x2, {0x92, 0xbac7, &(0x7f0000000100)="6f3ff43c7a16a74d1458064d0a9bea2054e66a56c02b2c22b79531a85bb5caff7bcb67fd4b0b86517f1f0cd8b1668dd2516aa56914da6b3b9b81afdf52035772a5c1ac5a186b0bc2024cdae5d15371eb98f58c4f1ae59a3410"}, {0x4, 0x1, @sival_int=0x32bc3360, @tid=r8}}) r9 = openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) posix_fallocate(r9, 0x3, 0x8) 70.842476ms ago: executing program 0 (id=142): setreuid(0xee00, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) recvmsg(r1, 0x0, 0x2) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) aio_readv(&(0x7f0000000480)={r2, 0x3, 0x0, 0x0, [0x6, 0x7e5], 0xfffffffe, 0x6, 0x8, {0x8, 0xd1b, 0x0}, {0x1, 0x9, @sival_int=0x5, @thr={0x0, 0x0}}}) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) aio_fsync(0x80, &(0x7f0000000400)={r3, 0x8000df, 0x0, 0x0, [0x6, 0x3], 0xc, 0x8, 0xfffffff8, {0x932, 0x2, 0x0}, {0x1, 0x22, @sigval_int=0x9, @thr={0x0, 0x0}}}) aio_fsync(0x80, &(0x7f0000000e00)={r3, 0x8000, 0x0, 0x0, [0x101, 0xfffc], 0x84, 0x6, 0x2, {0x5, 0x7fffffff, 0x0}, {0x4, 0x18, @sigval_ptr=0x7}}) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000080)={'rack\x00'}, 0x24) bind$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x0, 0x0, @loopback}, 0x1c) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x3, 0x7, @ipv4={'\x00', '\xff\xff', @multicast1}}, 0x1c) sendto(r0, &(0x7f00000001c0)='\a', 0x1, 0x80, 0x0, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x48, &(0x7f0000000000), 0x4) r4 = getpgid(0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)) r5 = kqueue() kevent(r5, &(0x7f0000000380)=[{0x4, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, [0x0, 0x1, 0x0, 0x3]}, {0x4, 0xfffffffffffffffe, 0xc700, 0x1, 0x3, 0x2, [0x4c, 0x0, 0x7fff]}], 0x2, 0x0, 0x20, 0x0) r6 = getsid(0x0) setpgid(r4, r6) r7 = socket$inet_sctp(0x2, 0x1, 0x84) freebsd11_fstatfs(r7, &(0x7f0000000200)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x103, 0x0, 0x0) r8 = socket$inet_sctp(0x2, 0x1, 0x84) sendto$inet(r8, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2, 0x3, @rand_addr=0x2}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x20181, 0x0, 0x0) 68.198678ms ago: executing program 1 (id=143): r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000180)='./file1\x00', 0x0) chdir(&(0x7f0000000040)='./file1\x00') r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000180)='./file1\x00', 0x0) chdir(&(0x7f0000000040)='./file1\x00') renameat(r1, &(0x7f00000000c0)='./file1\x00', r1, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') chmod(&(0x7f0000000180)='./file0\x00', 0x23f) setresuid(0x0, 0xee01, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000002c0)=[&(0x7f0000000100)='/,&-,\x00'], 0x0) r2 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r3 = dup2(r2, r2) ioctl$DIOCCHANGERULE(r3, 0x8048756d, &(0x7f0000000200)="eac9e749df4966312bd14e1a6e1c8adaf8e3e9cf8daefbc33e8511deaad0f23ba3e9c891c0f2") mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) getresuid(&(0x7f0000000000), &(0x7f00000000c0), &(0x7f0000000040)) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000100)={0x9, 0x3b27, 0x0, 0xb0}) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000180)={0xb, 0x4, 0x0, 0x2}) procctl$PROC_REAP_KILL(0x2f9933215ba6770e, r4, 0x6, &(0x7f0000000240)={0xfffff4e8, 0x4, r5, 0x30, 0xffffffffffffffff}) 765.17µs ago: executing program 1 (id=144): r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0xcc83cd6cb470ff4d) open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r1 = getuid() setresuid(r1, r1, 0x0) __semctl$SEM_STAT(0xffffffffffffffff, 0x3, 0xa, &(0x7f0000000600)=0x0) fstatat(r0, &(0x7f0000000040)='./file0/file0\x00', &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(r1, 0x0, r2) r3 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) r4 = open$dir(&(0x7f0000000100)='.\x00', 0x80000, 0x1c1) r5 = open$dir(0x0, 0x0, 0x0) mkdirat(r5, 0x0, 0x4) renameat(r4, &(0x7f0000000000)='./file1\x00', r5, &(0x7f0000000180)='./file0\x00') sync() pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r6 = socket(0x1c, 0x1, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) setrlimit(0x7, &(0x7f00000001c0)={0x1}) setreuid(0xee00, 0x0) fork() r7 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x1, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x100000}}, {{0x1c, 0x1c, 0x1, 0x0, @empty, 0x2}}}, 0x108) r8 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r8, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xe121}}, {{0x1c, 0x1c, 0x1, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0x108) open$dir(0x0, 0x1, 0x0) rfork(0x85000) bind$inet6(r6, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0xbc0, @loopback, 0x7}, 0x1c) r9 = socket$unix(0x1, 0x2, 0x0) bind$unix(r9, 0x0, 0x0) aio_cancel(r4, &(0x7f0000000500)={0xffffffffffffffff, 0x8001, 0x0, 0x0, [0x5a, 0x40], 0x1, 0x2, 0x6, {0x5, 0x4fa9, &(0x7f00000002c0)="30f90e4431db4020fa54ec24280dc3db7fda96fd0a209d81fb897ca28b07d7d3c2b6e5167300d22da75e79e62419f9f4f3e820b857ed758ca44fd3aa7bc437c5ed2b485558da1be7f51484dab9557dd5b1b3583713913f3b01cb380eab4e9c5a9889fa76528c413b69406d7a8157910902aaaae0af768f9ef8a085498a7f388ba2fce2f5c233b134da4456d8915aa9c82552b0f0f0e3b0f61c5c7275c4006538ffcb47034f8a637f57087e9f74b1c41d2a3253d078364b5f70e970d6cfcb0559c34e549bfdbe4cff14c10c3450e92079"}, {0x3, 0x14, @sigval_int=0x2, @thr={&(0x7f0000000200)="f20f2cd842787c410f8a000000002647d12ac4e2ad3c2d00000000c402fd1d8096000000c461a81430c4617910c7c461f97e0d2a000000c4017458a4cd1d6f70b6", &(0x7f0000000440)="2d5db92d33300ed4feae4109aeef48da5e019b10c4812ccb313a1ba9a3799f331a886979dd8fef43e268beb895bea4be2f7d89b2adb8661f11310b2badbf499c012d1f247a4a91c83abab86e8adac703919e05824906752f27e70b7ebb6eecf11a41f3b1bc693102e36e90c54c3c94045075f2f519ecda01421148708d3088b0f2e6041df989"}}}) connect$inet6(r6, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) 0s ago: executing program 2 (id=145): cap_enter() fork() (async) r0 = setsid() wait4(r0, 0x0, 0x8, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.124' (ED25519) to the list of known hosts. lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe0058125508 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/main/kernel/sys/net/if_tuntap.c:1688 2nd 0xffffffff83cccac0 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/main/kernel/sys/net/if_tuntap.c:1387 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff81681891 at witness_checkorder+0x781 #1 0xffffffff81506877 at __mtx_lock_flags+0x187 #2 0xffffffff8186b5cc at tunifioctl+0x15c #3 0xffffffff818467fe at ifhwioctl+0xefe #4 0xffffffff8184a9f2 at ifioctl+0xde2 #5 0xffffffff8169063a at kern_ioctl+0x4ca #6 0xffffffff8169007e at sys_ioctl+0x36e #7 0xffffffff82165702 at amd64_syscall+0x4e2 #8 0xffffffff82109d4b at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff81682762 at witness_checkorder+0x1652 #1 0xffffffff81570509 at _sx_xlock+0x139 #2 0xffffffff8186b4fa at tunifioctl+0x8a #3 0xffffffff818476ab at ifhwioctl+0x1dab #4 0xffffffff81868f62 at tunioctl+0xd92 #5 0xffffffff811dd876 at devfs_ioctl+0x266 #6 0xffffffff82327ce7 at VOP_IOCTL_APV+0x87 #7 0xffffffff817edec7 at vn_ioctl+0x3c7 #8 0xffffffff811de739 at devfs_ioctl_f+0x69 #9 0xffffffff8169063a at kern_ioctl+0x4ca #10 0xffffffff8169007e at sys_ioctl+0x36e #11 0xffffffff82165702 at amd64_syscall+0x4e2 #12 0xffffffff82109d4b at fast_syscall_common+0xf8 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 ZFS filesystem version: 5 ZFS storage pool version: features support (5000) vnode_pager_putpages: zero-length write at 0 resid 14434 0xfffffe006e5136e0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371b820 usecount 6, writecount 4, refcount 2 seqc users 0 hold count flags () flags (VIRF_PGREAD|VV_MD|VMP_LAZYLIST) v_object 0xfffffe00540feaa8 ref 1 pages 4 cleanbuf 0 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0054156000 (pid 941, syz-executor, tid 100319) nlink=1, effnlink=1, size=14434, extsize 0 generation=45383744, uid=0, gid=0, flags=0x40008 ino 103, on dev gpt/rootfs Connection to 10.128.1.124 closed by remote host. FreeBSD/amd64 (ci-freebsd-main-6.us-central1-b.c.syzkaller.internal) (ttyu0) login: md1: truncating fractional last sector by 8 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000 Expensive callout(9) function: 0xffffffff84467450(0xfffffe007894c458) 0.004200534 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058575800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000