last executing test programs: 54.474750002s ago: executing program 0 (id=65): aio_waitcomplete(0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x149}, 0x9) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000001c0)={0x7ff, 0x8001, 0x96}, 0x8) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344, 0x41424344}, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000300)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000400)=ANY=[@ANYBLOB="aaaaaa2aa2aa0000000000f7080045400028000000000006e106e4fc969f5b1d00aa4e204e22e09af84c8a9c3cacc4dffe53ddcecd27e447c6278d57c6707a2548d08e822ffd5eed4df023dae4d507ef6605f9fd42fad78a01fa34d53893d7352328e3cd013c164483989a79f9557811c97da4e77bec4ea5c11d60a17f2d1ef9", @ANYRES32=r1, @ANYRES32=0x41424344, @ANYBLOB="5000000790780000"]) syz_extract_tcp_res$synack(&(0x7f0000000000)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x18d, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff88a813008100300008004514017700670002012e9078e0000001ffffffff071f07e0000002000000000000000700000000e0000001ffffffffe0000001831706e0000002ac1400bb00000a67000000027f000001940600000006010000004e224e22", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="7101ffff907800081312b9f00459c15d1fd91369d304c2db72962208ad35995036af13121c871b66905e34d0bb93418204d4960e03030822036301080a00000002000000090006f0a48edd0402000000604c07f7cb14ceed824c2b15f07a005b3c65d5c523a33911675f05023f059e193f359be959ee46052cb4600a6af45304d386eb3fc42a07000000000000006a69ffd694a8443cc3d4deb58ae6460af5a142fcbfa1a020bb21e0ddf14adb6a211a94d8e03911e4eb278b665d01dd17b19819607bd73a7b15c4575abfa83025e5900346a7ab1973ef2ecb6422b846f3b7c01b01fe6d6e0dc09fe18038aa84643d2227cb3e1552512fa9c584f877fb842707ba27ad6332350e0191645b3e927c3950c5a305fbb067fb"]) syz_emit_ethernet(0x400e, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "15f2ff", 0x3a3a, 0x0, 0x0, @rand_addr="eee7567b2c0e280000004c1e7b3b00", @local={0xfe, 0x80, '\x00', 0x0}}}}}) syz_emit_ethernet(0x148, &(0x7f0000000340)={@broadcast, @empty, [{[{0x88a8, 0x7, 0x1, 0xfff}], {0x8100, 0x2, 0x1, 0x3}}], {@ipv6={0x86dd, {0xb, 0x6, "625af8", 0x10a, 0x21, 0xff, @rand_addr="f72d47281e6cc3ffd040d23ea719bf9b", @loopback, {[@hopopts={0x8, 0x2, '\x00', [@padn={0x1, 0x1, [0x0]}, @pad1, @enc_lim={0x4, 0x1, 0x7}, @ra={0x5, 0x2, 0xff30}, @pad1]}, @routing={0x1f, 0xe, 0x1, 0xb, 0x0, [@empty, @mcast2, @mcast2, @remote={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, @loopback, @empty]}], @tcp={{0x2, 0x3, r0, r2, 0x1, 0x0, 0xa, 0x10, 0x6e88, 0x0, 0x2, {[@mss={0x2, 0x4, 0xcea8}, @window={0x3, 0x3, 0x2}, @timestamp={0x8, 0xa, 0x9, 0x3}]}}, {"99e4727df3db300b85b77f9ab47933343d1ada33ef06198ad2e64378e35313605c1ee175ec368a4bd2c1c4f05042c35a7c66f90c3211d3dbe3e514335a377ee84d51abbd2a84110a2b324b887ba38f957a7a"}}}}}}}) r3 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x72, &(0x7f0000000400)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14, 0x64, 0x0, 0x0, 0x4, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0xfd, 0x0, 0x0, {0x12, 0x4, 0x0, 0x1b, 0xfffc, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr=0xb8, @loopback, {[@ra={0x94, 0x6, 0x62}, @ssrr={0x89, 0x3, 0x9}, @lsrr={0x83, 0x3, 0x81}, @timestamp={0x44, 0x10, 0x1a, 0x0, 0x0, [{[@rand_addr=0xc0], 0x4}, {[], 0x6}]}, @rr={0x7, 0x13, 0x1b, [@loopback, @empty, @multicast2, @loopback]}, @ssrr={0x89, 0x3, 0x3}]}}}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x80, &(0x7f0000000200)=@file={0xa, 0x1, './file0\x00'}, 0xa) r4 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 53.629104401s ago: executing program 0 (id=69): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = dup(r0) sendmsg$unix(r1, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="1000"], 0xd0}, 0x0) 53.622824411s ago: executing program 0 (id=70): r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) rename(&(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') syz_emit_ethernet(0x2a, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaab60a4a4251cd9d67bb08004500471c0000000000019004ac1400aae00000014e234e3300089078"]) copy_file_range(0xffffffffffffffff, &(0x7f0000000140)=0x1, 0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x3, 0x0) pipe2(&(0x7f00000001c0), 0x4) syz_emit_ethernet(0x46, &(0x7f0000000340)={@random="fb00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "826e03", 0x10, 0x0, 0x0, @rand_addr="00000000000000000e14fc11133f6400", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@ndisc_ra}}}}}) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) 53.427050843s ago: executing program 0 (id=72): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) r0 = socket(0x11, 0x10000000000003, 0x0) sendto$unix(r0, &(0x7f0000000780)="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", 0x158, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b4, 0x6000) fork() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r1, 0x84, 0x8003, 0x0, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) freebsd11_statfs(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)) pipe2(0x0, 0x100004) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff020000000000000000"]) socket(0x2, 0x3, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@broadcast, @random="f0d498643912", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14, 0x40, 0x0, 0x0, 0x4, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @loopback}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0xfd, 0x0, 0x0, {0x9, 0x4, 0x0, 0x1b, 0xfffc, 0x64, 0x0, 0xa6, 0x1, 0x0, @empty, @empty, {[@rr={0x7, 0xf, 0x8, [@multicast2, @loopback, @local={0xac, 0x14, 0x0}]}]}}}}}}}) syz_emit_ethernet(0x46, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\n\x00', 0x10, 0x0, 0x0, @rand_addr="135e80f1d38ddba80b9e61dd0c575a88", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x6}], @udp={{0x2, 0x2, 0x8}}}}}}}) socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) 52.270050181s ago: executing program 0 (id=77): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) r0 = socket(0x11, 0x10000000000003, 0x0) sendto$unix(r0, &(0x7f0000000780)="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", 0x158, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b4, 0x6000) fork() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r1, 0x84, 0x8003, 0x0, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) freebsd11_statfs(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)) pipe2(0x0, 0x100004) socket(0x2, 0x3, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@broadcast, @random="f0d498643912", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14, 0x40, 0x0, 0x0, 0x4, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @loopback}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0xfd, 0x0, 0x0, {0x9, 0x4, 0x0, 0x1b, 0xfffc, 0x64, 0x0, 0xa6, 0x1, 0x0, @empty, @empty, {[@rr={0x7, 0xf, 0x8, [@multicast2, @loopback, @local={0xac, 0x14, 0x0}]}]}}}}}}}) syz_emit_ethernet(0x46, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\n\x00', 0x10, 0x0, 0x0, @rand_addr="135e80f1d38ddba80b9e61dd0c575a88", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x6}], @udp={{0x2, 0x2, 0x8}}}}}}}) socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) 50.934624563s ago: executing program 0 (id=83): aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) sendmsg$unix(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xd0}, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 39.227032627s ago: executing program 1 (id=131): r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) rename(&(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') copy_file_range(0xffffffffffffffff, &(0x7f0000000140)=0x1, 0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x3, 0x0) r1 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f00000001c0), 0x4) syz_emit_ethernet(0x46, &(0x7f0000000340)={@random="fb00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "826e03", 0x10, 0x0, 0x0, @rand_addr="00000000000000000e14fc11133f6400", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@ndisc_ra}}}}}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 39.134421014s ago: executing program 1 (id=132): r0 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, 0x0, 0x0) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 39.124754655s ago: executing program 1 (id=133): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) r0 = socket(0x11, 0x10000000000003, 0x0) sendto$unix(r0, &(0x7f0000000780)="b10005059000e803000708c75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8ea3ebbc257699a1f132e27acb5d602010d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aeb8c500000002000000000000020200a371a3f80000000000846983a51d3454ff82cd179fd616db1b5d40c346db1e505cf06717a5030a72652a07d1000000000000000084433fafa0dbd526f488e7c0c4a347ffbdbf9ccea0a255e8e35bcc87a554f463676843ba69bb6f575b8d88c86f6f58d9eaf0fc07d4254e87bb058d191939a8da8168f251f79486f3d4712f7be8c782a5bde40f14efce95378bfed678a179621313583b357b01731885438e7eb314915c7e1efee4dd41b0bba819a16ad3d0b8756ab0214893e9ab671c825e8913b9902fa1f3a6bb8d09a0bf", 0x158, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b4, 0x6000) fork() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r1, 0x84, 0x8003, 0x0, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) freebsd11_statfs(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)) pipe2(0x0, 0x100004) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff020000000000000000"]) socket(0x2, 0x3, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@broadcast, @random="f0d498643912", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14, 0x40, 0x0, 0x0, 0x4, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @loopback}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0xfd, 0x0, 0x0, {0x9, 0x4, 0x0, 0x1b, 0xfffc, 0x64, 0x0, 0xa6, 0x1, 0x0, @empty, @empty, {[@rr={0x7, 0xf, 0x8, [@multicast2, @loopback, @local={0xac, 0x14, 0x0}]}]}}}}}}}) syz_emit_ethernet(0x76, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\n\x00', 0x40, 0x0, 0x0, @rand_addr="135e80f1d38ddba80b9e61dd0c575a88", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x6, 0x5, '\x00', [@generic={0x6, 0x2c, "215d6eefc02f61290429998677167a5a0b6f30beb80768899304025aecc34a6f8d128880da5f34dbc2e9082c"}]}], @udp={{0x2, 0x2, 0x8}}}}}}}) socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) 38.142299309s ago: executing program 1 (id=137): mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) syz_emit_ethernet(0x7e, &(0x7f00000000c0)=ANY=[@ANYBLOB="ffffffffffff000000000000080045020070000000000001d078030f9078001000a2454e0a31006400020856020000000000ffffffff85029406fffffff10044340c200000003d0000000800000004000007ff000000250000"]) lseek(r0, 0x5, 0x2) open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x2e, 0x0, 0x0) sendmsg(r1, &(0x7f00000007c0)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x3, 0x8, @empty, 0x2}, 0x1c, 0x0, 0x0, &(0x7f00000019c0)=ANY=[@ANYBLOB="0c000000111d0000d2000000f163bf65de281c999effe986da0d881e9436b6da57d9d6e8da25c97493dbdb600f02c4f47ce1cac707cb926830b8d398d043998383634809"], 0xc}, 0x5) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x3, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x1, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x7, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x1, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0xa842, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x9, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x0, 0x8, 0xc, 0x8]}, {0x5c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0x0, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0x0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x6, 0x2, 0x58, 0x2, 0x81, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x6, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x3, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0xffe, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x3, 0x2, 0x800, 0x0, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x538, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x2, 0x3, 0xfff, 0x343d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x7, 0x3d104cc0, 0x52, 0x8, 0x10c, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0x7fff, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x0, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1ff, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x9552, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x1, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x0, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124442, 0x2, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x9, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x40, 0x225, 0x80, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x6, 0x2, 0x6, 0x200, 0x4, 0x5, 0x3, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0x10000, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0x2, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x5, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xfffffffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x7, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd1, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x2, 0x1ff, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff5, 0x8, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x3, 0xfff, 0x5, 0x8, 0xffffffff, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xfffffff8, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc9, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x4, 0x80, 0x10000, 0x8, 0xae, 0x7, 0x3, 0x8, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x683, 0xd3b0, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x5, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6f1, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x7, 0x9, 0x100000c, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x400, 0x5, 0xfffffffc, 0xffffffff, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x7, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x4, 0x81, 0x8, 0x3, 0x4, 0x6, 0x1, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x7, 0x8, 0x1, 0x7ff, 0xa, 0x0, 0x8, 0x7, 0xc0, 0xf58f, 0x1000, 0xb, 0x3, 0x7ff, 0xfe0, 0x3, 0x400007, 0x8, 0xffffff3f, 0x3, 0x1, 0x0, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x6, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x1a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xfffffffb]}, {0x6, [0x10, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8008, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x1, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0x8, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x40000, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x5fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x3, 0x1, 0x0, 0x8, 0x40009, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0xa, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0x1000, 0x9, 0x46, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4451, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x0, 0x3, 0x2, 0x9, 0xf, 0x3, 0x7, 0x80000000, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0xb, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0xc, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x1, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xfff, 0x6, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x5, 0x9, 0x3, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x2, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x8, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0xffffff01, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0x2, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe298, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0x8000, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x4, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x401, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x3, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x0, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x0, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x9, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0x3, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0x8, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x0, 0x5, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0x800ecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x5, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x5, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x2, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7f7fffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x8, 0xeb7, 0x7, 0x9, 0x10000, 0x9, 0x4, 0x80000001, 0x6, 0x8, 0x7, 0x6cec, 0x10001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) setpriority(0x1, 0x1, 0x151d) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r2, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') aio_waitcomplete(0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r3 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r4 = kqueue() kevent(r4, &(0x7f0000000100)=[{0x3, 0xffffffffffffffff, 0x80a9, 0x0, 0x40000000000}], 0x1, 0x0, 0x0, 0x0) link(&(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000d40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x21) extattr_delete_file(&(0x7f0000000100)='./file0/file0/..\x00', 0x2, &(0x7f0000000140)='#$!@]*\x00') socket(0x17, 0x10000000, 0x5) chroot(&(0x7f0000000080)='./file0/file0/..\x00') mmap(&(0x7f000001b000/0x1000)=nil, 0x1000, 0x1, 0x12, r3, 0x30dda4ff) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 37.280566981s ago: executing program 1 (id=141): r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) rename(&(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') copy_file_range(0xffffffffffffffff, &(0x7f0000000140)=0x1, 0xffffffffffffffff, &(0x7f0000000200)=0x1, 0x3, 0x0) r1 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f00000001c0), 0x4) syz_emit_ethernet(0x46, &(0x7f0000000340)={@random="fb00", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "826e03", 0x10, 0x0, 0x0, @rand_addr="00000000000000000e14fc11133f6400", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@ndisc_ra}}}}}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 37.157275142s ago: executing program 1 (id=142): aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r1, 0x3862) r2 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r1, 0x2000) r3 = accept(r1, 0x0, &(0x7f0000000180)) aio_error(&(0x7f0000000600)={r3, 0xd, &(0x7f00000001c0)="f3b1685e28ef52fc1982d5caf1e2832efecc54b12db4e0e2e65fb6baa48dd1219c1b752b19121110980412ea0759a891e01c34ea99e540720429bf3022594c8ae3b9622a38a43cf13ee234b43055b14501310a2a3cdcceedc0de8f015ff1c50b4c6d0474156145049596128d34e2", 0x6e, [0xb4, 0x6cd], 0x7, 0x20, 0x7, {0x6, 0xdb, &(0x7f00000004c0)="4a4841633e82091fbdee2b883917d965840887ec342fbae0ecc550a9e21756858dea2484ea9db8af001f754c7685cec8f517b91fe129322fc58827380de8436012f4fe7ef06f38145ce975f142db7dd58191269625d800dfff7879ca54edd0eea0d2404675868f76f9e71a5d2a31a1fa8202e279c5dc2d197a40fab136"}, {0x1, 0x18, @sival_ptr=0xc018faa, @thr={&(0x7f0000000540)="660fe095000000003408c4e17d706dffd3f3aec4c2818c6d81dadf6483b4430000000000c4c13c58491e26660f1af20f0fe19e", &(0x7f0000000580)="5ff98004d2db1f7e2c3b931cacef6fc43304704c13e573d0f43994b625e3f8b3472277d915104c0f394e4e4a16c197d031cefe13f73345e4c308295cbb4046873b7a66a9b45b79341e69831cf038e389"}}}) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x7, 0x11, r2, 0x0) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) freebsd11_fstatfs(r0, &(0x7f0000000740)) r4 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setuid(0xee01) setsockopt$inet_mreqsrc(r4, 0x0, 0x10, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x80000000, @mcast2, 0x8}, 0x1c) socketpair$unix(0x1, 0x1, 0x0, 0x0) r5 = dup2(r2, 0xffffffffffffffff) r6 = open$dir(&(0x7f0000000240)='./file0\x00', 0x2000000, 0x126) sendfile(r6, r5, 0x1f00, 0x0, 0x0, 0x0, 0x0) r7 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r7, 0x29, 0x1a, &(0x7f0000000080), 0x4) syz_emit_ethernet(0x66, &(0x7f0000000280)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd60d90000003052003bcc694212fae9849cf1404e6d2ee900fe8000000000000000000000000000aa02009008000000006006c33e000006000000000001000000000000000000000100000000020000000000000000000000cd4caa27bd58fb5ec56461996c818f64691ef73339ca40408e1c3408f3b1a4ae6517de354abd18d9a56571a8ae7d3fe8837e9d151294155b96db218dded2631e165c9540f29688bffff0efb39d09ae8a9193273463d3ee188023f5ae959e35da0d5fded1748452e2fae09e51af133f7ab1a041489b01fc102f4412993048c0b66a11b8071b1e3734185caa3c761710bd0f6f484c01a0b4c5640f9b89f0b36091d3c8961616"]) syz_emit_ethernet(0x8e, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) fstatat(r6, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x4000) 26.946989116s ago: executing program 2 (id=171): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x11, r0) ioctl$KDGKBTYPE(r1, 0x40044b40, 0x9) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, 0x0, 0x0) cpuset_getid(0x2, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r3, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000180)=0x4, 0x4) setsockopt$sock_int(r4, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)="c886b4", 0x3}], 0x1) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') syz_emit_ethernet(0x138, &(0x7f0000000000)=ANY=[]) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x3, @empty=0xe0000000}, 0x10) r5 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_INFO(r5, 0xe, &(0x7f0000000080)=""/89) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) setgroups(0xfffe, 0x0) r6 = socket(0x2, 0x1, 0x2) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) openat$crypto(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 26.141248687s ago: executing program 2 (id=173): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x11, r0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, 0x0, 0x0) cpuset_getid(0x2, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r3, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000180)=0x4, 0x4) setsockopt$sock_int(r4, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)="c886b4", 0x3}], 0x1) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') syz_emit_ethernet(0x138, &(0x7f0000000000)=ANY=[]) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x3, @empty=0xe0000000}, 0x10) r5 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_INFO(r5, 0xe, &(0x7f0000000080)=""/89) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) setgroups(0xfffe, 0x0) r6 = socket(0x2, 0x1, 0x2) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) dup(r6) openat$crypto(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 25.297714047s ago: executing program 2 (id=175): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) r0 = socket(0x11, 0x10000000000003, 0x0) sendto$unix(r0, &(0x7f0000000780)="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", 0x158, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b4, 0x6000) fork() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r1, 0x84, 0x8003, 0x0, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) freebsd11_statfs(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)) pipe2(0x0, 0x100004) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff020000000000000000"]) socket(0x2, 0x3, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@broadcast, @random="f0d498643912", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14, 0x40, 0x0, 0x0, 0x4, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @loopback}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0xfd, 0x0, 0x0, {0x9, 0x4, 0x0, 0x1b, 0xfffc, 0x64, 0x0, 0xa6, 0x1, 0x0, @empty, @empty, {[@rr={0x7, 0xf, 0x8, [@multicast2, @loopback, @local={0xac, 0x14, 0x0}]}]}}}}}}}) syz_emit_ethernet(0x8e, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\n\x00', 0x58, 0x0, 0x0, @rand_addr="135e80f1d38ddba80b9e61dd0c575a88", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x6, 0x8, '\x00', [@generic={0x6, 0x42, "215d6eefc02f61290429998677167a5a0b6f30beb80768899304025aecc34a6f8d128880da5f34dbc2e9082c93b534693039119aec0905320139722607af18fbe39a"}]}], @udp={{0x2, 0x2, 0x8}}}}}}}) socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) 23.195976961s ago: executing program 2 (id=177): r0 = kqueue() r1 = msgget$private(0x0, 0x790) msgsnd(r1, &(0x7f0000000100)=ANY=[@ANYRES8], 0x401, 0x0) msgsnd(r1, &(0x7f0000001f40)=ANY=[], 0x401, 0x0) msgsnd(r1, &(0x7f00000005c0)=ANY=[@ANYBLOB="01000000"], 0x12f, 0x0) msgrcv(r1, 0x0, 0xfffffffffffffe75, 0x0, 0x1800) kevent(r0, &(0x7f0000000040), 0x7fffffff, 0x0, 0xfffffffb, 0x0) mprotect(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x5) fork() kqueue() pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) writev(r2, &(0x7f0000000200)=[{&(0x7f0000000100)="19", 0x4000}], 0x1) r3 = fork() mlock(&(0x7f0000ffa000/0x1000)=nil, 0x1000) setresuid(0x0, 0xee01, 0x0) freebsd11_getfsstat(&(0x7f0000000080), 0xff18, 0x1) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) sigqueue(r3, 0xf, @sival_int=0x8000) munmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000) 21.707854534s ago: executing program 2 (id=179): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f00000001c0), 0x20000000000001c9) freebsd11_mknod(&(0x7f0000004400)='./file0\x00', 0x2000, 0x3) r0 = socket$unix(0x1, 0x5, 0x0) connectat$unix(0xffffffffffffff9c, r0, &(0x7f0000000040)=@file={0xfffffffffffffe44, 0x1, './file0/file0\x00'}, 0xa) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) 20.796968011s ago: executing program 2 (id=181): aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) sendmsg$unix(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="1000"], 0xd0}, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 9.0737192s ago: executing program 3 (id=191): aio_waitcomplete(0x0, 0x0) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000000)=@in={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10, &(0x7f0000000340), 0x0, 0x0, 0x0, 0x149}, 0x9) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x10}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(0xffffffffffffffff, 0x84, 0x3, &(0x7f00000001c0)={0x7ff, 0x8001, 0x96}, 0x8) syz_extract_tcp_res$synack(&(0x7f0000000080)={0x41424344, 0x41424344}, 0x1, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000300)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000400)=ANY=[@ANYBLOB="aaaaaa2aa2aa0000000000f7080045400028000000000006e106e4fc969f5b1d00aa4e204e22e09af84c8a9c3cacc4dffe53ddcecd27e447c6278d57c6707a2548d08e822ffd5eed4df023dae4d507ef6605f9fd42fad78a01fa34d53893d7352328e3cd013c164483989a79f9557811c97da4e77bec4ea5c11d60a17f2d1ef9", @ANYRES32=r1, @ANYRES32=0x41424344, @ANYBLOB="5000000790780000"]) syz_extract_tcp_res$synack(&(0x7f0000000000)={0x41424344}, 0x1, 0x0) syz_emit_ethernet(0x18d, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff88a813008100300008004514017700670002012e9078e0000001ffffffff071f07e0000002000000000000000700000000e0000001ffffffffe0000001831706e0000002ac1400bb00000a67000000027f000001940600000006010000004e224e22", @ANYRES32=r1, @ANYRES32=r2, @ANYBLOB="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"]) syz_emit_ethernet(0x400e, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "15f2ff", 0x3a3a, 0x0, 0x0, @rand_addr="eee7567b2c0e280000004c1e7b3b00", @local={0xfe, 0x80, '\x00', 0x0}}}}}) syz_emit_ethernet(0x148, &(0x7f0000000340)={@broadcast, @empty, [{[{0x88a8, 0x7, 0x1, 0xfff}], {0x8100, 0x2, 0x1, 0x3}}], {@ipv6={0x86dd, {0xb, 0x6, "625af8", 0x10a, 0x21, 0xff, @rand_addr="f72d47281e6cc3ffd040d23ea719bf9b", @loopback, {[@hopopts={0x8, 0x2, '\x00', [@padn={0x1, 0x1, [0x0]}, @pad1, @enc_lim={0x4, 0x1, 0x7}, @ra={0x5, 0x2, 0xff30}, @pad1]}, @routing={0x1f, 0xe, 0x1, 0xb, 0x0, [@empty, @mcast2, @mcast2, @remote={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, @loopback, @empty]}], @tcp={{0x2, 0x3, r0, r2, 0x1, 0x0, 0xa, 0x10, 0x6e88, 0x0, 0x2, {[@mss={0x2, 0x4, 0xcea8}, @window={0x3, 0x3, 0x2}, @timestamp={0x8, 0xa, 0x9, 0x3}]}}, {"99e4727df3db300b85b77f9ab47933343d1ada33ef06198ad2e64378e35313605c1ee175ec368a4bd2c1c4f05042c35a7c66f90c3211d3dbe3e514335a377ee84d51abbd2a84110a2b324b887ba38f957a7a"}}}}}}}) r3 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000400)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14, 0x5c, 0x0, 0x0, 0x4, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@parameter_prob={0xc, 0x2, 0x0, 0xfd, 0x0, 0x0, {0x10, 0x4, 0x0, 0x1b, 0xfffc, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr=0xb8, @loopback, {[@ra={0x94, 0x6, 0x62}, @ssrr={0x89, 0x3, 0x9}, @lsrr={0x83, 0x3, 0x81}, @timestamp={0x44, 0x10, 0x1a, 0x0, 0x0, [{[@rand_addr=0xc0], 0x4}, {[], 0x6}]}, @ssrr={0x89, 0xf, 0x3, [@broadcast, @broadcast, @multicast2]}]}}}}}}}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x80, &(0x7f0000000200)=@file={0xa, 0x1, './file0\x00'}, 0xa) r4 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) 7.461454694s ago: executing program 3 (id=192): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x11, r0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, 0x0, 0x0) cpuset_getid(0x2, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r3, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000180)=0x4, 0x4) setsockopt$sock_int(r4, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)="c886b4", 0x3}], 0x1) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x3, @empty=0xe0000000}, 0x10) r5 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_INFO(r5, 0xe, &(0x7f0000000080)=""/89) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) setgroups(0xfffe, 0x0) r6 = socket(0x2, 0x1, 0x2) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) dup(r6) openat$crypto(0xffffffffffffff9c, &(0x7f0000000480), 0x2, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 5.748452009s ago: executing program 3 (id=193): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) r0 = socket(0x11, 0x10000000000003, 0x0) sendto$unix(r0, &(0x7f0000000780)="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", 0x158, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b4, 0x6000) fork() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r1, 0x84, 0x8003, 0x0, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) freebsd11_statfs(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)) pipe2(0x0, 0x100004) socket(0x2, 0x3, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@broadcast, @random="f0d498643912", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14, 0x40, 0x0, 0x0, 0x4, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @loopback}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0xfd, 0x0, 0x0, {0x9, 0x4, 0x0, 0x1b, 0xfffc, 0x64, 0x0, 0xa6, 0x1, 0x0, @empty, @empty, {[@rr={0x7, 0xf, 0x8, [@multicast2, @loopback, @local={0xac, 0x14, 0x0}]}]}}}}}}}) syz_emit_ethernet(0x46, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\n\x00', 0x10, 0x0, 0x0, @rand_addr="135e80f1d38ddba80b9e61dd0c575a88", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x6}], @udp={{0x2, 0x2, 0x8}}}}}}}) socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) 3.922747067s ago: executing program 3 (id=194): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) execve(0x0, 0x0, 0x0) r0 = socket(0x11, 0x10000000000003, 0x0) sendto$unix(r0, &(0x7f0000000780)="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", 0x158, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x6, &(0x7f0000000000)={0x10000000000b35d, 0x800000b35d}) mlockall(0x1) munlock(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r1 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) truncate(0x0, 0xaa480) minherit(&(0x7f0000ff9000/0x1000)=nil, 0x820cf7000, 0x1) fchmodat(r1, &(0x7f0000000040)='./file0\x00', 0x1b4, 0x6000) fork() aio_waitcomplete(0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r1, 0x84, 0x8003, 0x0, 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) freebsd11_statfs(&(0x7f0000000340)='./file0\x00', &(0x7f0000000500)) pipe2(0x0, 0x100004) syz_emit_ethernet(0x72, &(0x7f0000000140)=ANY=[@ANYBLOB="d726dd259dc9ffffffffffff86dd60000000003c00fffe8000000000000000000000006400aaff020000000000000000"]) socket(0x2, 0x3, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000180)={@broadcast, @random="f0d498643912", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14, 0x40, 0x0, 0x0, 0x4, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @loopback}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0xfd, 0x0, 0x0, {0x9, 0x4, 0x0, 0x1b, 0xfffc, 0x64, 0x0, 0xa6, 0x1, 0x0, @empty, @empty, {[@rr={0x7, 0xf, 0x8, [@multicast2, @loopback, @local={0xac, 0x14, 0x0}]}]}}}}}}}) syz_emit_ethernet(0x96, &(0x7f0000000080)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\n\x00', 0x60, 0x0, 0x0, @rand_addr="135e80f1d38ddba80b9e61dd0c575a88", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x6, 0x9, '\x00', [@generic={0x6, 0x4d, "215d6eefc02f61290429998677167a5a0b6f30beb80768899304025aecc34a6f8d128880da5f34dbc2e9082c93b534693039119aec0905320139722607af18fbe39a502871ba56a23da308375c"}]}], @udp={{0x2, 0x2, 0x8}}}}}}}) socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) 2.018565103s ago: executing program 3 (id=195): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r1 = fcntl$dupfd(r0, 0x11, r0) ioctl$KDGKBTYPE(r1, 0x40044b40, 0x9) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r2 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r2, 0x84, 0x12, 0x0, 0x0) cpuset_getid(0x2, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) r3 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r3, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r3, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) r4 = socket$inet(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) setsockopt$inet_int(r1, 0x0, 0x0, &(0x7f0000000180)=0x4, 0x4) setsockopt$sock_int(r4, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) writev(0xffffffffffffffff, &(0x7f0000000580)=[{&(0x7f0000000000)="c886b4", 0x3}], 0x1) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') syz_emit_ethernet(0x138, &(0x7f0000000000)=ANY=[]) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) bind$inet(r4, &(0x7f0000000000)={0x10, 0x2, 0x3, @empty=0xe0000000}, 0x10) r5 = shmget$private(0x0, 0x3000, 0x2, &(0x7f0000ffd000/0x3000)=nil) shmctl$SHM_INFO(r5, 0xe, &(0x7f0000000080)=""/89) setsockopt$inet_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f0000000040)={0xb, 0x5000, 0x100, 0x3}, 0x8) setgroups(0xfffe, 0x0) r6 = socket(0x2, 0x1, 0x2) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) openat$crypto(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 0s ago: executing program 3 (id=196): aio_waitcomplete(0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r2 = dup(r1) sendmsg$unix(r2, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0xd0}, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) (fail_nth: 1) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.75' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 ip6_pcbopts: all specified options are cleared. Out of ktrace request objects. SYZFAIL: invalid kcov comp type type=ffffffff8215485b (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=2 req=181 state=1 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl