last executing test programs: 30.728400807s ago: executing program 0 (id=2010): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x48, &(0x7f0000000180)={@multicast1, @broadcast, @multicast2}, 0xc) r1 = kqueue() setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x200, 0x0, 0x0) kevent(r1, &(0x7f0000000040)=[{0x100, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x1, 0x1, 0x7, 0x3fffffffffffff]}], 0x1, 0x0, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000540)=[{0xc8, 0xffffffffffffffff, 0x80e7, 0x0, 0x0, 0x100040, [0xd8b6, 0x5, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000240)=ANY=[]) setrlimit(0x7, &(0x7f0000000040)={0x1}) setreuid(0xee00, 0x0) fork() r3 = socket(0x11, 0x10000000000003, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) sendto$unix(r3, &(0x7f0000000140)="b1000500e80348031bc75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c8817f7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a371a3f8000000000000000000010090d2c4e5187c000000", 0xb1, 0x0, 0x0, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000440)={0x28, 0x0, 0x10, &(0x7f0000000200)="3c9e89526b1f00b07f8aee18e5aa3505", 0x0, 0x0, 0x1, 0xfdffffff, [0x7, 0x0, 0x40]}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$CIOCCRYPT(r5, 0xc0306367, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x7, 0xfffffffffffffffe, 0x0, 0x0, 0x0}) freebsd11_fstatfs(0xffffffffffffffff, &(0x7f00000002c0)) clock_nanosleep(0x0, 0x0, 0x0, 0x0) freebsd11_stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000004c0)) clock_getres(0xe, &(0x7f0000000000)) rfork(0x1000) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) lpathconf(&(0x7f0000000000)='./file0\x00', 0x6) procctl$PROC_SPROTECT(0x2, 0x0, 0x1, &(0x7f00000000c0)=0x31) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) openat$crypto(0xffffffffffffff9c, &(0x7f0000000440), 0x40, 0x0) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) 28.024927712s ago: executing program 0 (id=2013): r0 = kqueue() setitimer(0x1, &(0x7f0000000000)={{0x8, 0x1}, {0x5, 0xe87f}}, 0x0) setrlimit(0x8, &(0x7f0000000040)={0x8, 0x75}) chown(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) fchown(r0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r2, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="04010000ffff000001"], 0x104}, 0x0) recvmsg(r1, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/25, 0x19}, 0x80) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0xb8, @empty, 0xfffff0ec}, 0x1c) mount(&(0x7f0000000000), 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, r2, 0x4) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r3, 0x11, 0x2, 0x0, 0x0) sigtimedwait(&(0x7f00000000c0)={[0x8, 0x8000, 0x7, 0xe]}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @sigval_int, @poll}, &(0x7f0000000200)={0x7}) getfsstat(&(0x7f0000001280), 0x928, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000180)={0x12, 0x1, 0xffffffffffffffff, 0xfffffffc}) 26.965249808s ago: executing program 0 (id=2021): ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) kmq_timedreceive(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100000, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$DIOCRADDADDRS(r1, 0xc0184415, &(0x7f0000000a80)={{"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", "0920cf14d501a846a22d8eb300fbff0400000000000000001000"}, 0x0, 0x14, 0x0, 0x0, 0x20000002, 0xb, 0x0, 0xfffffffffffffffe}) mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) fhstat(&(0x7f0000000040)={{[0x5c8951ac, 0x3bea9983]}, {0x0, 0x0, "3d0000009b1557d800"}}, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f0000000080)={0x10, 0x8, 0x1, &(0x7f0000000740)='\x00', 0x1, &(0x7f00000000c0)='\"', 0x1000, 0x7d86619b, [0x0, 0x9, 0xc]}) kmq_open(&(0x7f0000000300)='./file0\x00', 0x200, 0x1, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') sync() open(&(0x7f0000000100)='./file0\x00', 0x200, 0x3f2) pathconf(0x0, 0x12) 24.782081759s ago: executing program 0 (id=2026): r0 = socket$inet_tcp(0x2, 0x1, 0x0) fchmod(r0, 0x0) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r0, 0x6, 0x27, &(0x7f0000000680)={&(0x7f0000000640)="00b2c06df480cfe19f0da47ac0235414", 0x0, &(0x7f0000000800)='\x00', 0xb, 0x10, 0x0, 0x12, 0x1, 0x0, 0x3, 0x3, "710800000094ffff"}, 0x40) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x3, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000300)}) shm_open2(&(0x7f0000000000)='./file0\x00', 0x400, 0x4, 0x6, 0x0) cpuset_getaffinity(0x1, 0x2, 0x0, 0xfed1, &(0x7f0000000040)) openat$bpf(0xffffff9c, &(0x7f0000000280), 0x1, 0x0) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) procctl$PROC_SPROTECT(0x2, 0x0, 0x1, &(0x7f0000000000)=0x32) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) open$dir(0x0, 0x488200, 0x176) r2 = socket(0x1c, 0x1, 0x0) extattr_list_fd(0xffffffffffffffff, 0x0, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r3, 0x40047459, &(0x7f00000003c0)) r4 = socket$inet6(0x1c, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000080)={0x1c, 0x1c, 0x0, 0x825, @loopback, 0x20}, 0x1c) sendmsg$inet6_sctp(r4, &(0x7f00000000c0)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x3, 0x0, @loopback={0x64}}, 0x1c, 0x0}, 0x81) r5 = vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f0000000300)={0x1, 0x9, @sigval_int=0x8, @tid=r5}) bind$inet6(0xffffffffffffffff, &(0x7f0000000100)={0x49, 0x1c, 0x0, 0x1, @loopback, 0x800}, 0x1c) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f0000000000)=@in={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000240)}, {&(0x7f0000019640)="1e81b63eec2966024fc54a32d49f3e74105eaeb31f76", 0x16}], 0x2, 0x0, 0x0, 0x149}, 0x0) writev(r2, 0x0, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0xb1c, 0x0) r6 = socket(0x26, 0x2, 0x0) setsockopt$sock_int(r6, 0xffff, 0x1002, 0x0, 0x0) r7 = __specialfd$eventfd(0x1, &(0x7f0000000180)={0x7}, 0x8) readv(r7, &(0x7f0000000280)=[{&(0x7f0000000240)=""/3, 0x3}], 0x1000000000000396) 24.282999328s ago: executing program 0 (id=2029): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r1 = open$dir(0x0, 0x1, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) procctl$PROC_SPROTECT(0x2, 0x0, 0x1, &(0x7f00000000c0)=0x21) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f00000001c0), 0x4) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000580)=@in6={0x1c, 0x1c, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\b\x00\x00\b\x00'}, 0x1c) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{0xffffffffffffffff, 0xb0}], 0x1, &(0x7f00000000c0)={0x200000077359400}, &(0x7f0000000100)={[0xfffffffffffffffd]}, 0x10) symlink(&(0x7f0000000580)='.\x02/file1\x00', &(0x7f00000002c0)='.\x02\x00') getfh(&(0x7f0000000300)='.\x02/file1\x00', &(0x7f0000000340)) r3 = semget$private(0x0, 0x3, 0x308) __semctl$GETZCNT(r3, 0x0, 0x7) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000300)}, {&(0x7f0000000100)="2d6423617603beca7fe150dceeb4b7b850d489b5eb94c1a26ff1adacdb47295698b10167a3c88c3f82e5d95ee15854a88d65f18f590e9513b0bf7657550851ac00482c59", 0x44}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/255, 0xff}], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r4, 0x0) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x0, 0x2, &(0x7f0000000040)='./file0\x00', 0x10004, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffebe, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x36ef, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x537, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x653, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff]}) open(&(0x7f0000000440)='.\x02/file1\x00', 0x70e, 0x0) 23.180381545s ago: executing program 0 (id=2035): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0x48, &(0x7f0000000180)={@multicast1, @broadcast, @multicast2}, 0xc) r1 = kqueue() setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x200, 0x0, 0x0) kevent(r1, &(0x7f0000000040)=[{0x100, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x1, 0x1, 0x7, 0x3fffffffffffff]}], 0x1, 0x0, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000540)=[{0xc8, 0xffffffffffffffff, 0x80e7, 0x0, 0x0, 0x100040, [0xd8b6, 0x5, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000240)=ANY=[@ANYBLOB]) setrlimit(0x7, &(0x7f0000000040)={0x1}) setreuid(0xee00, 0x0) fork() r3 = socket(0x11, 0x10000000000003, 0x0) syz_extract_tcp_res$synack(&(0x7f0000000100), 0x1, 0x0) sendto$unix(r3, &(0x7f0000000140)="b1000500e80348031bc75786ca900f0e08fecea11ea8fef96ec2c73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa79230000f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb770c1f5a872c8817f7cc53c894303b22f310b404f36a00f90006ee01be657aea8c500000002000000000000020200a371a3f8000000000000000000010090d2c4e5187c000000", 0xb1, 0x0, 0x0, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000440)={0x28, 0x0, 0x10, &(0x7f0000000200)="3c9e89526b1f00b07f8aee18e5aa3505", 0x0, 0x0, 0x1, 0xfdffffff, [0x7, 0x0, 0x40]}) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$CIOCCRYPT(r5, 0xc0306367, &(0x7f0000000000)={0x0, 0x1, 0x0, 0x7, 0xfffffffffffffffe, 0x0, 0x0, 0x0}) freebsd11_fstatfs(0xffffffffffffffff, &(0x7f00000002c0)) clock_nanosleep(0x0, 0x0, 0x0, 0x0) freebsd11_stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000004c0)) clock_getres(0xe, &(0x7f0000000000)) rfork(0x1000) mkdir(&(0x7f00000002c0)='./file0\x00', 0x0) lpathconf(&(0x7f0000000000)='./file0\x00', 0x6) procctl$PROC_SPROTECT(0x2, 0x0, 0x1, &(0x7f00000000c0)=0x31) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) openat$crypto(0xffffffffffffff9c, &(0x7f0000000440), 0x40, 0x0) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) 9.10298973s ago: executing program 1 (id=2065): setsockopt$inet6_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r1 = kqueue() syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB]) kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000080)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x48, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x2b, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, [@dstopts={0x2b, 0x1, '\x00', [@pad1, @pad1, @padn, @ra={0x5, 0x2, 0x1}]}]}}}}}}}) freebsd11_mknod(0x0, 0x1000, 0x0) r2 = open$dir(&(0x7f0000000200)='./file0\x00', 0x40000400000002c6, 0x0) fcntl$lock(r2, 0x16, &(0x7f0000000000)={0x570}) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x52, 0x0, 0x0) setrlimit(0x7, &(0x7f00000001c0)={0x1}) setreuid(0xee00, 0x0) fork() madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x1, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x100000}}, {{0x1c, 0x1c, 0x1, 0x0, @empty, 0x2}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x100000}}, {{0x1c, 0x1c, 0x1, 0x0, @rand_addr="000000000000000b0500009300", 0x2}}}, 0x108) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0x108) r7 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r7, 0x0, 0x0, 0x0) r8 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r8, 0x0) 9.101682243s ago: executing program 2 (id=2066): r0 = open$dir(0x0, 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) ftruncate(r0, 0x80002) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) r2 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) shutdown(r2, 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) sendmsg$inet6_sctp(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000980)={'bbr\x00'}, 0x24) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000300)={0x1c, 0x1c, 0x2, 0xfffffffe, @loopback, 0x8be}, 0x1c) syz_emit_ethernet(0xca, &(0x7f0000000740)={@random="3a54680fc4b6", @remote, [], {@ipv6={0x86dd, {0x8, 0x6, "7082d2", 0x94, 0x20, 0xff, @mcast2, @local={0xfe, 0x80, '\x00', 0x0}, {[@fragment={0x1b, 0x0, 0x3, 0x1, 0x0, 0x14, 0x64}, @routing={0x26, 0x2, 0x0, 0x8, 0x0, [@remote={0xfe, 0x80, '\x00', 0x0}]}], @generic="33bab4299b12617d38e6d54d714f7b71c105a1fb04fb631f9ee5c33b6ed7903bb4e14eb606f8825caa6567baaa2801d0902f18bf1929a289a47546260bc013e313bcdbea591a0ca0047fe7e81659ac281648c7502f99a8f8da2c70edeb5518f0e73ca32740f0a3bb7489b276bcc841df19a0b4bf"}}}}}) pipe2(&(0x7f0000000080), 0x100004) sendmsg$inet6_sctp(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000240)='g', 0x1}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB], 0x4c, 0x185}, 0x9) rfork(0x85000) 9.099507335s ago: executing program 3 (id=2067): r0 = kqueue() setitimer(0x1, &(0x7f0000000000)={{0x8, 0x1}, {0x5, 0xe87f}}, 0x0) r1 = getegid() chown(&(0x7f0000000200)='./file0\x00', 0x0, r1) fchown(r0, 0xffffffffffffffff, r1) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg(r3, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="04010000ffff000001"], 0x104}, 0x0) recvmsg(r2, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=""/25, 0x19}, 0x80) connect$inet6(0xffffffffffffffff, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x100, 0x0, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0xb8, @empty, 0xfffff0ec}, 0x1c) mount(&(0x7f0000000000), 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1, 0x1010, r3, 0x4) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_int(r4, 0x11, 0x2, 0x0, 0x0) sigtimedwait(&(0x7f00000000c0)={[0x8, 0x8000, 0x7, 0xe]}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @sigval_int, @poll}, &(0x7f0000000200)={0x7}) getfsstat(&(0x7f0000001280), 0x928, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000180)={0x12, 0x1, 0xffffffffffffffff, 0xfffffffc}) 7.487076354s ago: executing program 1 (id=2068): setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x51, &(0x7f0000000240)={0x1, {{0x1c, 0x1c, 0x3, 0x0, @mcast1}}}, 0x88) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) fork() kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x7e, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x1005, &(0x7f00000001c0), &(0x7f0000000200)=0x10) r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) setitimer(0x0, &(0x7f0000000040)={{0x7bfffffe, 0x26}, {0x0, 0xcfe}}, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000340)='wb', 0x2}], 0x1, 0x0) r1 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(0xffffffffffffffff, 0x14040000) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f0000000080)={0x10, 0x1d, 0x1, &(0x7f0000000740)='\x00', 0x1, &(0x7f00000000c0)='\"', 0x1000, 0x7d86619b, [0x0, 0x9, 0xc]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 7.483859075s ago: executing program 2 (id=2069): r0 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1}], 0x1, 0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x1, 0x401) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) ioctl$SMB_OLD_TRANS(r3, 0xc01c690c, &(0x7f0000000140)={0x6c, 0x6f, 0x30, @word, @buf="e2f7", 0x0, 0x0, 0x0, 0x0}) pipe2(0x0, 0x100004) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x2) r5 = kqueue() kevent(r5, &(0x7f0000000380)=[{0x4, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, [0x0, 0x1, 0x0, 0x3]}], 0x1, 0x0, 0x20, 0x0) setsockopt$sock_int(r4, 0xffff, 0x1001, 0x0, 0x0) ioctl$DIOCGETRULES(r4, 0xcbe04406, &(0x7f00000000c0)="40ccd65890e32c0b2b5ac2f750511b3f968c75dc58b33ae1ab4d65cbe35941c3c892b3ea3b3130966d352ce260670c503d7e116174409cb87733d5e1e631f07ab371f0aaaa10b3f381a6a7f042e8dc5006b641b4c34f602e808c4bf30853af3b") __semctl$SETVAL(0x0, 0x3, 0x8, &(0x7f00000001c0)=0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x395e9c817565919e, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000300)={0x1c, 0x1c, 0x0, 0x0, @loopback}, 0x1c) readv(0xffffffffffffffff, 0x0, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) clock_gettime(0xa, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) ftruncate(r0, 0x107d2) shm_rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x3) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x116) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/184, 0xb8}], 0x1, 0x0) 7.482932837s ago: executing program 3 (id=2070): setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x51, &(0x7f0000000240)={0x1, {{0x1c, 0x1c, 0x3, 0x0, @mcast1}}}, 0x88) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) fork() kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x7e, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x1005, &(0x7f00000001c0), &(0x7f0000000200)=0x10) r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) setitimer(0x0, &(0x7f0000000040)={{0x7bfffffe, 0x26}, {0x0, 0xcfe}}, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000340)='wb', 0x2}], 0x1, 0x0) r1 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(0xffffffffffffffff, 0x14040000) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f0000000080)={0x10, 0x1d, 0x1, &(0x7f0000000740)='\x00', 0x1, &(0x7f00000000c0)='\"', 0x1000, 0x7d86619b, [0x0, 0x9, 0xc]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 5.762902761s ago: executing program 1 (id=2071): ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) kmq_timedreceive(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) kqueue() openat$crypto(0xffffffffffffff9c, 0x0, 0x100000, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$DIOCRADDADDRS(r0, 0xc0184415, &(0x7f0000000a80)={{"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", "0920cf14d501a846a22d8eb300fbff0400000000000000001000"}, 0x0, 0x14, 0x0, 0x0, 0x20000002, 0xb, 0x0, 0xfffffffffffffffe}) fork() mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) fhstat(&(0x7f0000000040)={{[0x5c8951ac, 0x3bea9983]}, {0x0, 0x0, "3d0000009b1557d800"}}, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000080)={0x10, 0x8, 0x1, &(0x7f0000000740)='\x00', 0x1, &(0x7f00000000c0)='\"', 0x1000, 0x7d86619b, [0x0, 0x9, 0xc]}) ioctl$CIOCCRYPT(r1, 0xc0306367, 0x0) kmq_open(&(0x7f0000000300)='./file0\x00', 0x200, 0x1, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, 0x0) sync() open(&(0x7f0000000100)='./file0\x00', 0x200, 0x3f2) pathconf(0x0, 0x12) 5.761587721s ago: executing program 2 (id=2072): setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x51, &(0x7f0000000240)={0x1, {{0x1c, 0x1c, 0x3, 0x0, @mcast1}}}, 0x88) fork() r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x7e, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x1005, &(0x7f00000001c0), &(0x7f0000000200)=0x10) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) setitimer(0x0, &(0x7f0000000040)={{0x7bfffffe, 0x26}, {0x0, 0xcfe}}, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000340)='wb', 0x2}], 0x1, 0x0) r2 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(0xffffffffffffffff, 0x14040000) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r2, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f0000000080)={0x10, 0x1d, 0x1, &(0x7f0000000740)='\x00', 0x1, &(0x7f00000000c0)='\"', 0x1000, 0x7d86619b, [0x0, 0x9, 0xc]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 5.758744495s ago: executing program 3 (id=2073): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080), 0x0, 0x0) ftruncate(r0, 0x80002) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) r2 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) shutdown(r2, 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) sendmsg$inet6_sctp(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000980)={'bbr\x00'}, 0x24) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000300)={0x1c, 0x1c, 0x2, 0xfffffffe, @loopback, 0x8be}, 0x1c) syz_emit_ethernet(0xca, &(0x7f0000000740)={@random="3a54680fc4b6", @remote, [], {@ipv6={0x86dd, {0x8, 0x6, "7082d2", 0x94, 0x20, 0xff, @mcast2, @local={0xfe, 0x80, '\x00', 0x0}, {[@fragment={0x1b, 0x0, 0x3, 0x1, 0x0, 0x14, 0x64}, @routing={0x26, 0x2, 0x0, 0x8, 0x0, [@remote={0xfe, 0x80, '\x00', 0x0}]}], @generic="33bab4299b12617d38e6d54d714f7b71c105a1fb04fb631f9ee5c33b6ed7903bb4e14eb606f8825caa6567baaa2801d0902f18bf1929a289a47546260bc013e313bcdbea591a0ca0047fe7e81659ac281648c7502f99a8f8da2c70edeb5518f0e73ca32740f0a3bb7489b276bcc841df19a0b4bf"}}}}}) pipe2(&(0x7f0000000080), 0x100004) sendmsg$inet6_sctp(0xffffffffffffffff, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000240)='g', 0x1}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB], 0x4c, 0x185}, 0x9) rfork(0x85000) 3.941195776s ago: executing program 1 (id=2074): openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r0 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140), 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) procctl$PROC_SPROTECT(0x2, 0x0, 0x1, &(0x7f00000000c0)=0x21) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1b, &(0x7f00000001c0), 0x4) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{0xffffffffffffffff, 0xb0}], 0x1, &(0x7f00000000c0)={0x200000077359400}, &(0x7f0000000100)={[0xfffffffffffffffd]}, 0x10) symlink(&(0x7f0000000580)='.\x02/file1\x00', &(0x7f00000002c0)='.\x02\x00') r2 = semget$private(0x0, 0x3, 0x308) __semctl$GETZCNT(r2, 0x0, 0x7) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000300)}, {&(0x7f0000000100)="2d6423617603beca7fe150dceeb4b7b850d489b5eb94c1a26ff1adacdb47295698b10167a3c88c3f82e5d95ee15854a88d65f18f590e9513b0bf7657550851ac00482c598c55157212c8e620bb", 0x4d}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/255, 0xff}], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r3, 0x0) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x0, 0x2, &(0x7f0000000040)='./file0\x00', 0x10004, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffebe, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x36ef, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x537, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x653, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff]}) open(&(0x7f0000000440)='.\x02/file1\x00', 0x70e, 0x0) 3.938819729s ago: executing program 2 (id=2075): ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) kmq_timedreceive(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, 0x0, 0x100000, 0x0) ioctl$DIOCRADDADDRS(0xffffffffffffffff, 0xc0184415, &(0x7f0000000a80)={{"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", "0920cf14d501a846a22d8eb300fbff0400000000000000001000"}, 0x0, 0x14, 0x0, 0x0, 0x20000002, 0xb, 0x0, 0xfffffffffffffffe}) fork() mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) fhstat(&(0x7f0000000040)={{[0x5c8951ac, 0x3bea9983]}, {0x0, 0x0, "3d0000009b1557d800"}}, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000080)={0x10, 0x8, 0x1, &(0x7f0000000740)='\x00', 0x1, &(0x7f00000000c0)='\"', 0x1000, 0x7d86619b, [0x0, 0x9, 0xc]}) kmq_open(&(0x7f0000000300)='./file0\x00', 0x200, 0x1, 0x0) symlinkat(0x0, 0xffffffffffffffff, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x23, 0x0, 0x0) renameat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0xffffffffffffffff, &(0x7f0000000140)='./file0\x00') sync() open(&(0x7f0000000100)='./file0\x00', 0x200, 0x3f2) pathconf(0x0, 0x12) 3.935813518s ago: executing program 3 (id=2076): setsockopt$inet6_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x29, 0x51, &(0x7f0000000240)={0x1, {{0x1c, 0x1c, 0x3, 0x0, @mcast1}}}, 0x88) fork() r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x7e, 0x0) getsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x1005, &(0x7f00000001c0), &(0x7f0000000200)=0x10) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) setitimer(0x0, &(0x7f0000000040)={{0x7bfffffe, 0x26}, {0x0, 0xcfe}}, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000340)='wb', 0x2}], 0x1, 0x0) r2 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(0xffffffffffffffff, 0x14040000) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r2, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f0000000080)={0x10, 0x1d, 0x1, &(0x7f0000000740)='\x00', 0x1, &(0x7f00000000c0)='\"', 0x1000, 0x7d86619b, [0x0, 0x9, 0xc]}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 2.018211081s ago: executing program 1 (id=2077): setsockopt$inet6_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r1 = kqueue() syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB]) kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000080)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x48, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x2b, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, [@dstopts={0x2b, 0x1, '\x00', [@pad1, @pad1, @padn, @ra={0x5, 0x2, 0x1}]}]}}}}}}}) freebsd11_mknod(0x0, 0x1000, 0x0) r2 = open$dir(&(0x7f0000000200)='./file0\x00', 0x40000400000002c6, 0x0) fcntl$lock(r2, 0x16, &(0x7f0000000000)={0x570}) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x52, 0x0, 0x0) setrlimit(0x7, &(0x7f00000001c0)={0x1}) setreuid(0xee00, 0x0) fork() madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x1, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x100000}}, {{0x1c, 0x1c, 0x1, 0x0, @empty, 0x2}}}, 0x108) setsockopt$inet6_group_source_req(r3, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x100000}}, {{0x1c, 0x1c, 0x1, 0x0, @rand_addr="000000000000000b0500009300", 0x2}}}, 0x108) r6 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r6, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x4, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0xffffd}}, {{0x1c, 0x1c, 0x1, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0x108) r7 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r7, 0x0, 0x0, 0x0) r8 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r8, 0x0) 2.014791556s ago: executing program 2 (id=2078): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet_sctp(r0, &(0x7f0000002d40)={&(0x7f0000001800)=@in={0x10, 0x2, 0x3, @rand_addr=0x58}, 0x10, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="1c000000840000000400000008b67b001b47fc419c93d9a9180d209dd3428745c654c15451910d250b93a1fe637a1aef44e1bc3c7272587a9b48b2084d4196b036bc77610149b7705e2cf430fb3bfab0fcbbe0548e7493b93410d47a316a18c45eed5959ccde453bbc4497995bc6cfac78311af8dedc9b7bd64df1430de4f22f188c7734559822dfb090cdc3312d62205da2cc1213547b8e", @ANYRES32=0x0], 0x1c, 0x80}, 0x100) 2.011481013s ago: executing program 3 (id=2079): openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) freebsd10_pipe(0x0) fcntl$getflags(0xffffffffffffffff, 0x13) utimes(0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r0, 0xffff, 0x800, &(0x7f00000002c0)=0x8, 0x4) r1 = kqueue() kevent(r1, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x100000) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) open$dir(0x0, 0x0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_MAXSEG(r2, 0x84, 0xe, &(0x7f0000002580)={0x0, 0x3}, 0x8) bind(r2, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r2, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) r3 = dup(r2) setsockopt$inet6_IPV6_HOPOPTS(r3, 0x29, 0x31, &(0x7f00000001c0)=ANY=[@ANYBLOB="0003"], 0x20) sendto$inet6(r3, &(0x7f0000000200)="d39b2845e7ba3176e4274c88fadfa5c97fcd5e5dc0e3faf8152b08516a85021e4e44df284df341e812601743bbd41d16f5f4940090eb8e4de3d83a9831e0d22ea7d470e904a9b060ebc8a685bda77a67145eff01521c88ea73c9f838e773fc308188c6ee56b9e6afac9d32999f9ba4db09ff4333a648fecd5002dd930b8876bfd5c149cd35528a5f44a17db43d3e018eda54", 0xff96, 0xc0, 0x0, 0x0) 1.42341ms ago: executing program 1 (id=2080): openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) freebsd10_pipe(0x0) fcntl$getflags(0xffffffffffffffff, 0x13) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) utimes(0x0, &(0x7f0000000440)={{0xfffffffffffffffc, 0x100}, {0xe, 0x80}}) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r1, 0xffff, 0x800, &(0x7f00000002c0)=0x8, 0x4) r2 = kqueue() kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) pipe2(&(0x7f0000000000), 0x100000) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) open$dir(0x0, 0x0, 0x0) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_MAXSEG(r3, 0x84, 0xe, &(0x7f0000002580)={0x0, 0x3}, 0x8) bind(r3, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) r4 = dup(r3) setsockopt$inet6_IPV6_HOPOPTS(r4, 0x29, 0x31, &(0x7f00000001c0)=ANY=[@ANYBLOB="0003"], 0x20) sendto$inet6(r4, &(0x7f0000000200)="d39b2845e7ba3176e4274c88fadfa5c97fcd5e5dc0e3faf8152b08516a85021e4e44df284df341e812601743bbd41d16f5f4940090eb8e4de3d83a9831e0d22ea7d470e904a9b060ebc8a685bda77a67145eff01521c88ea73c9f838e773fc308188c6ee56b9e6afac9d32999f9ba4db09ff4333a648fecd5002dd930b8876bfd5c149cd35528a5f44a17db43d3e018eda54", 0xff96, 0xc0, 0x0, 0x0) 1.112846ms ago: executing program 2 (id=2081): r0 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1}], 0x1, 0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x1, 0x401) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) ioctl$SMB_OLD_TRANS(r3, 0xc01c690c, &(0x7f0000000140)={0x6c, 0x6f, 0x30, @word, @buf="e2f7", 0x0, 0x0, 0x0, 0x0}) pipe2(0x0, 0x100004) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) shutdown(0xffffffffffffffff, 0x2) r5 = kqueue() kevent(r5, &(0x7f0000000380)=[{0x4, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, [0x0, 0x1, 0x0, 0x3]}], 0x1, 0x0, 0x20, 0x0) setsockopt$sock_int(r4, 0xffff, 0x1001, 0x0, 0x0) ioctl$DIOCGETRULES(r4, 0xcbe04406, &(0x7f00000000c0)="40ccd65890e32c0b2b5ac2f750511b3f968c75dc58b33ae1ab4d65cbe35941c3c892b3ea3b3130966d352ce260670c503d7e116174409cb87733d5e1e631f07ab371f0aaaa10b3f381a6a7f042e8dc5006b641b4c34f602e808c4bf30853af3b") __semctl$SETVAL(0x0, 0x3, 0x8, &(0x7f00000001c0)=0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x395e9c817565919e, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000300)={0x1c, 0x1c, 0x0, 0x0, @loopback}, 0x1c) readv(0xffffffffffffffff, 0x0, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) clock_gettime(0xa, &(0x7f00000002c0)) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) ftruncate(r0, 0x107d2) shm_rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x3) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x116) preadv(r1, &(0x7f0000000000)=[{&(0x7f0000000180)=""/184, 0xb8}], 0x1, 0x0) 0s ago: executing program 3 (id=2082): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r1, 0x0, 0x0, 0x0) procctl$PROC_SPROTECT(0x2, 0x0, 0x1, &(0x7f00000000c0)=0x21) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f00000001c0), 0x4) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000580)=@in6={0x1c, 0x1c, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\b\x00\x00\b\x00'}, 0x1c) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) ppoll(&(0x7f0000000280)=[{0xffffffffffffffff, 0xb0}], 0x1, &(0x7f00000000c0)={0x200000077359400}, &(0x7f0000000100)={[0xfffffffffffffffd]}, 0x10) symlink(&(0x7f0000000580)='.\x02/file1\x00', &(0x7f00000002c0)='.\x02\x00') getfh(&(0x7f0000000300)='.\x02/file1\x00', &(0x7f0000000340)) r3 = semget$private(0x0, 0x3, 0x308) __semctl$GETZCNT(r3, 0x0, 0x7) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) writev(r4, &(0x7f0000000000)=[{&(0x7f0000000300)}, {&(0x7f0000000100)="2d6423617603beca7fe150dceeb4b7b850d489b5eb94c1a26ff1adacdb47295698b10167a3c88c3f82e5d95ee15854a88d65f18f590e9513b0bf7657550851ac00482c59", 0x44}], 0x2) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/255, 0xff}], 0x1) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r4, 0x0) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x0, 0x2, &(0x7f0000000040)='./file0\x00', 0x10004, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffebe, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x36ef, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x537, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x9, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x653, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc1a, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xffffffff]}) open(&(0x7f0000000440)='.\x02/file1\x00', 0x70e, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.79' (ED25519) to the list of known hosts. WARNING pid 890 (syz-executor): ioctl sign-extension ioctl 2000004218456b if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 Expensive callout(9) function: 0xffffffff814963c0(0xfffffe006e580b40) 0.002583297 s vnode_pager_putpages: zero-length write at 0 resid 14434 0xfffffe00776af370: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371c560 usecount 6, writecount 4, refcount 2 seqc users 0 hold count flags () flags (VIRF_PGREAD|VV_MD|VMP_LAZYLIST) v_object 0xfffffe005412f000 ref 1 pages 4 cleanbuf 0 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0054136780 (pid 960, syz-executor, tid 100346) nlink=1, effnlink=1, size=14434, extsize=0 generation=2c707f28, uid=0, gid=0, flags=0x40008 ino 86, on dev gpt/rootfs Warning! syz-executor[963] uses SF_SYNC sendfile(2) flag. Please follow up to https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=287348. WARNING pid 991 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1001 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1014 (syz-executor): ioctl sign-extension ioctl 2000004218456b Expensive callout(9) function: 0xffffffff81a5f890(0xfffffe006df91000) 0.006247587 s WARNING pid 1085 (syz-executor): ioctl sign-extension ioctl 2000004218456b if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 WARNING pid 1100 (syz-executor): ioctl sign-extension ioctl 2000004218456b Out of ktrace request objects. Expensive callout(9) function: 0xffffffff814963c0(0xfffffe006e5805a0) 0.017212289 s WARNING pid 1167 (syz-executor): ioctl sign-extension ioctl 2000004218456b if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 WARNING pid 1184 (syz-executor): ioctl sign-extension ioctl 2000004218456b ktrace write failed, errno 27, tracing stopped for pid 762 ktrace write failed, errno 27, tracing stopped for pid 763 ktrace write failed, errno 27, tracing stopped for pid 765 ktrace write failed, errno 27, tracing stopped for pid 764 ktrace write failed, errno 27, tracing stopped for pid 766 ktrace write failed, errno 27, tracing stopped for pid 1165 ktrace write failed, errno 27, tracing stopped for pid 1 arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.2.187 on tap2 ktrace write failed, errno 27, tracing stopped for pid 809 if_delmulti_locked: detaching ifnet instance 0xfffffe005859a800 WARNING pid 1215 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1225 (syz-executor): ioctl sign-extension ioctl 2000004218456b arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.2.187 on tap2 WARNING pid 1232 (syz-executor): ioctl sign-extension ioctl 2000004218456b ktrace write failed, errno 27, tracing stopped for pid 765 ktrace write failed, errno 27, tracing stopped for pid 763 ktrace write failed, errno 27, tracing stopped for pid 766 ktrace write failed, errno 27, tracing stopped for pid 764 ktrace write failed, errno 27, tracing stopped for pid 762 ktrace write failed, errno 27, tracing stopped for pid 1 WARNING pid 1246 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1259 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1262 (syz-executor): ioctl sign-extension ioctl 2000004218456b arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) WARNING pid 1271 (syz-executor): ioctl sign-extension ioctl 2000004218456b ktrace write failed, errno 27, tracing stopped for pid 809 if_delmulti_locked: detaching ifnet instance 0xfffffe005859b800 WARNING pid 1304 (syz-executor): ioctl sign-extension ioctl 2000004218456b if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 WARNING pid 1315 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1319 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1335 (syz-executor): ioctl sign-extension ioctl 2000004218456b if_delmulti_locked: detaching ifnet instance 0xfffffe005859b800 WARNING pid 1347 (syz-executor): ioctl sign-extension ioctl 2000004218456b if_delmulti_locked: detaching ifnet instance 0xfffffe005859b800 WARNING pid 1361 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1374 (syz-executor): ioctl sign-extension ioctl 2000004218456b if_delmulti_locked: detaching ifnet instance 0xfffffe005859b800 WARNING pid 1420 (syz-executor): ioctl sign-extension ioctl 2000004218456b if_delmulti_locked: detaching ifnet instance 0xfffffe005859a800 WARNING pid 1435 (syz-executor): ioctl sign-extension ioctl 2000004218456b if_delmulti_locked: detaching ifnet instance 0xfffffe00077f5800 WARNING pid 1444 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1451 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1459 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1463 (syz-executor): ioctl sign-extension ioctl 2000004218456b WARNING pid 1476 (syz-executor): ioctl sign-extension ioctl 2000004218456b Accounting enabled arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) WARNING pid 1493 (syz-executor): ioctl sign-extension ioctl 2000004218456b pid 1516 (syz-executor) is attempting to use unsafe AIO requests - not logging anymore if_delmulti_locked: detaching ifnet instance 0xfffffe00077f5800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) WARNING pid 1575 (syz-executor): ioctl sign-extension ioctl 2000004218456b arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) if_delmulti_locked: detaching ifnet instance 0xfffffe005859a800 arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) if_delmulti_locked: detaching ifnet instance 0xfffffe005859b800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 arp: short packet received on tap1 WARNING pid 1710 (syz-executor): ioctl sign-extension ioctl 2000004218456b lock order reversal: (sleepable after non-sleepable) 1st 0xfffffe006df69208 tun_mtx (tun_mtx, sleep mutex) @ /syzkaller/managers/main/kernel/sys/net/if_tuntap.c:1688 2nd 0xffffffff83cdda40 tun_ioctl (tun_ioctl, sx) @ /syzkaller/managers/main/kernel/sys/net/if_tuntap.c:1387 lock order tun_ioctl -> tun_mtx established at: #0 0xffffffff816835e1 at witness_checkorder+0x781 #1 0xffffffff81508187 at __mtx_lock_flags+0x187 #2 0xffffffff8186dbcc at tunifioctl+0x15c #3 0xffffffff81848dfe at ifhwioctl+0xefe #4 0xffffffff8184cff2 at ifioctl+0xde2 #5 0xffffffff816923ca at kern_ioctl+0x52a #6 0xffffffff81691dae at sys_ioctl+0x36e #7 0xffffffff821698b2 at amd64_syscall+0x4e2 #8 0xffffffff8210e34b at fast_syscall_common+0xf8 lock order tun_mtx -> tun_ioctl attempted at: #0 0xffffffff816844b2 at witness_checkorder+0x1652 #1 0xffffffff81571e49 at _sx_xlock+0x139 #2 0xffffffff8186dafa at tunifioctl+0x8a #3 0xffffffff81849cab at ifhwioctl+0x1dab #4 0xffffffff8186b562 at tunioctl+0xd92 #5 0xffffffff811df136 at devfs_ioctl+0x266 #6 0xffffffff8232bf87 at VOP_IOCTL_APV+0x87 #7 0xffffffff817f0187 at vn_ioctl+0x3c7 #8 0xffffffff811dfff9 at devfs_ioctl_f+0x69 #9 0xffffffff816923ca at kern_ioctl+0x52a #10 0xffffffff81691dae at sys_ioctl+0x36e #11 0xffffffff821698b2 at amd64_syscall+0x4e2 #12 0xffffffff8210e34b at fast_syscall_common+0xf8 ktrace write failed, errno 27, tracing stopped for pid 763 ktrace write failed, errno 27, tracing stopped for pid 764 ktrace write failed, errno 27, tracing stopped for pid 765 ktrace write failed, errno 27, tracing stopped for pid 766 ktrace write failed, errno 27, tracing stopped for pid 762 arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) if_delmulti_locked: detaching ifnet instance 0xfffffe005859a800 arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: requested protocol length != 4 arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 arp: aa:aa:aa:aa:aa:bb is using my IP address 172.20.3.170 on tap3! arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: packet with unknown hardware format 0x2304 received on tap2 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe00782d7dc0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371c560 usecount 8, writecount 6, refcount 25 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00541cb4d8 ref 1 pages 184 cleanbuf 22 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe00541bc000 (pid 2005, syz-executor, tid 102113) nlink=1, effnlink=1, size=697472, extsize=0 generation=ee261d40, uid=0, gid=0, flags=0x40008 ino 230, on dev gpt/rootfs vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe00782d7dc0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371c560 usecount 8, writecount 6, refcount 25 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00541cb4d8 ref 1 pages 184 cleanbuf 23 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0054182780 (pid 2008, syz-executor, tid 102126) nlink=1, effnlink=1, size=697472, extsize=0 generation=ee261d40, uid=0, gid=0, flags=0x40008 ino 230, on dev gpt/rootfs arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) if_delmulti_locked: detaching ifnet instance 0xfffffe005859b800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) if_delmulti_locked: detaching ifnet instance 0xfffffe00077f7000 arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) arp: packet with invalid ethernet address length 0 received on tap0 arp: packet with invalid ethernet address length 0 received on tap1 arp: packet with invalid ethernet address length 0 received on tap3 Expensive callout(9) function: 0xffffffff848d9450(0xfffffe0077f9e458) 0.021709504 s SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=0 req=2035 state=1 status=67 (errno 9: Bad file descriptor)