last executing test programs: 37.889812286s ago: executing program 0 (id=59): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f0000000080)={@multicast1, @empty, @local={0xac, 0x14, 0x0}}, 0xc) r2 = getpid() r3 = socket(0x26, 0x2, 0x0) bind(r3, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3, 0x300, @mcast1}, 0x1c) r4 = socket$unix(0x1, 0x2, 0x0) ioctl$SMB_SENDB(r4, 0xc020697c, &(0x7f0000000100)={0x67, 0x69, 0x66, @buf="fba0", @buf="f6b6", 0xfff, 0x0, 0x0, 0x0}) recvmsg(r3, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) getpgrp(r2) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f0000000100)={@multicast2, @multicast2, @loopback}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f00000001c0)={@multicast2, @broadcast, @local={0xac, 0x14, 0x0}}, 0xc) extattr_list_link(&(0x7f0000000040)='./file0\x00', 0x2, &(0x7f0000000480)=""/117, 0x75) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) r5 = kqueue() kevent(r5, &(0x7f0000000100)=[{0x3, 0xffffffffffffffff, 0x80a9, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x39, &(0x7f0000000280)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2b, 0x0, 0x0, 0x2, 0x1, 0x0, @broadcast, @local={0xac, 0x14, 0x0}}, @udp={{0x3, 0x1, 0x8}, {"0088cea55a38d89d544188892ebbe5"}}}}}}) mount(&(0x7f00000000c0)='msdosfs\x00', 0x0, 0x0, &(0x7f0000000100)) mount(0x0, 0x0, 0x8400004, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5, 0x1010, 0xffffffffffffffff, 0x0) r6 = socket(0x11, 0x3, 0x0) setsockopt$sock_int(r6, 0xffff, 0x1014, 0x0, 0x0) sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000240)={0x1ff, 0x6, 0x40}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(0x0, 0x1) syz_emit_ethernet(0x4e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa07000000ffff86dd60ae029d00183aff000000000000600000000000ee0000deff0200000000000000000000000000018700907800"]) aio_waitcomplete(0x0, 0x0) 36.727440864s ago: executing program 0 (id=64): r0 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) r1 = socket(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000280)={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10) r2 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f00000002c0)={0x1f, 0x25, 0x10, &(0x7f0000000140)="ec7b000009060000000000000051be2d", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x3ff80000, 0x4]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x8, 0x402, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000001c0)}) connect$inet(r1, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) sendto(r1, &(0x7f0000000000)='a', 0x1, 0x20005, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x2010, 0xffffffffffffffff, 0x0) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000100)={0x0, 0x35, "5aeede3407a9535dba5df08d152a611ebd76e22f30bf2725ccb772b94434878020ebe93a44de7da7266f007422138eeba4241cacfa"}, &(0x7f0000000200)=0x3d) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, 0x0, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_tcp_TCP_TXTLS_MODE(r1, 0x6, 0x28, &(0x7f00000001c0), &(0x7f0000000300)=0x4) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000080)={'rack\x00', 0xfffffffd}, 0x24) mkdir(&(0x7f0000000340)='./file0/file0\x00', 0x84) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x7, &(0x7f0000000140)=[{0x190000000000}], 0x1}) open$dir(&(0x7f0000000040)='./file0\x00', 0x100, 0x7369a073367631) ppoll(0x0, 0x0, &(0x7f0000000480)={0x80000000, 0x8}, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffff9c, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000380)={0x10001, 0x0}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 35.825852669s ago: executing program 0 (id=68): syz_emit_ethernet(0x2e, &(0x7f0000000000)={@random="9f4c4662c957", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x68, 0x0, 0x1, 0x2, 0x0, @rand_addr=0x7, @multicast2}, @icmp=@generic={0x11, 0x8, 0x0, "00000000009f0000"}}}}}) r0 = openat$filemon(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) ioctl$FILEMON_SET_FD(r0, 0xc0045301, &(0x7f0000000000)) syz_emit_ethernet(0x2e, &(0x7f0000000040)=ANY=[@ANYBLOB="9f4c4662c957ffffffff08004500002078ac1400bbe00000021108907864ec52a7a29dc1870000000000007d8471088a7537359a17dee20000002c6ccb6068577fd7c821a3ed799b41ef03c4eedab1a3325b572e535d193160812136c11feb406e547666e038e856500e990e0f304600af360a"]) 35.816505498s ago: executing program 0 (id=69): r0 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xfffffffffffffffc) r1 = socket(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000280)={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10) r2 = openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc030636a, &(0x7f00000002c0)={0x1f, 0x25, 0x10, &(0x7f0000000140)="ec7b000009060000000000000051be2d", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x4, 0x3ff80000, 0x4]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f0000000000)={0x0, 0x1, 0x8, 0x402, &(0x7f00000001c0), 0x0, 0x0, &(0x7f00000001c0)}) connect$inet(r1, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) sendto(r1, &(0x7f0000000000)='a', 0x1, 0x20005, 0x0, 0x0) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x0, 0x2010, 0xffffffffffffffff, 0x0) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000100)={0x0, 0x35, "5aeede3407a9535dba5df08d152a611ebd76e22f30bf2725ccb772b94434878020ebe93a44de7da7266f007422138eeba4241cacfa"}, &(0x7f0000000200)=0x3d) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, 0x0, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) getsockopt$inet_tcp_TCP_TXTLS_MODE(r1, 0x6, 0x28, &(0x7f00000001c0), &(0x7f0000000300)=0x4) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000080)={'rack\x00', 0xfffffffd}, 0x24) mkdir(&(0x7f0000000340)='./file0/file0\x00', 0x84) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x7, &(0x7f0000000140)=[{0x190000000000}], 0x1}) open$dir(&(0x7f0000000040)='./file0\x00', 0x100, 0x7369a073367631) ppoll(0x0, 0x0, &(0x7f0000000480)={0x80000000, 0x8}, 0x0, 0x0) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffff9c, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000380)={0x10001, &(0x7f0000000180)=[{0x7}, {0x4}, {0x1}, {0xa37}], 0x4}) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 34.937977668s ago: executing program 0 (id=74): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r0, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0xffffffff, {0x0, 0x7, 0x0}, {0x0, 0x200}}) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r2, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="1000"], 0x10}, 0x0) r3 = socket(0x1c, 0x2, 0x0) symlink(0x0, 0x0) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = openat$md(0xffffffffffffff9c, &(0x7f00000002c0), 0x400000, 0x0) fchflags(r5, 0x8) setsockopt$inet_buf(r4, 0x0, 0x4a, &(0x7f0000003600), 0x0) r6 = kqueue() kevent(r6, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff9, 0x17, 0x10, 0x2, 0x0, [0x0, 0x0, 0x1, 0x95]}], 0x1, 0x0, 0x0, 0x0) kevent(r6, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffb, 0x51, 0x40, 0x1, 0x3, [0x7fff, 0x4, 0x595, 0x8]}, {0x10000, 0xfffffffffffffff9, 0xc029, 0x2, 0x8, 0x7, [0x3ff, 0xfffffffffffffffd, 0x1, 0x1]}], 0x2, &(0x7f0000000100)=[{}], 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x1c, 0x1c, 0x2, 0x3, @rand_addr="ff9257e458d5953af8098179fa5a24fc"}, 0x1c) sysarch$I386_SET_LDT(0x1, 0x0) dup2(r6, r2) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) clock_nanosleep(0x7, 0x1, &(0x7f0000000180)={0x0, 0x989680}, 0x0) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) getfhat(r7, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) setloginclass(&(0x7f0000002dc0)="6e8b") truncate(&(0x7f0000000000)='./file0\x00', 0xaa480) 34.051093434s ago: executing program 0 (id=81): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x6, &(0x7f0000002000)={0x1, 0x0, 0x200, 0x2}) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x3}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000180), 0x100000, 0x0) ioctl$CIOCGSESSION(r2, 0xc01c6365, &(0x7f0000000200)={0x16, 0x18, 0x25, &(0x7f0000000100)="41390e6b6d53bfd994d197a7413fd2e2b25726577a73ce036e68b78c6810afad49bf7966e8", 0xd, &(0x7f0000000140)="6d03c27a2c35f3838e06e37994", 0x2}) r3 = kqueue() r4 = getppid() ktrace(&(0x7f0000000240)='./file1\x00', 0x0, 0x80, r4) kevent(r3, &(0x7f00000001c0)=[{0x3, 0xffffffffffffffff, 0x21, 0x0, 0x20000000000000}], 0x1, 0x0, 0x0, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) chdir(&(0x7f0000000040)='./file0\x00') sigqueue(r4, 0x47, @sigval_int=0x5) mount(&(0x7f0000000080)='ufs\x00', &(0x7f00000000c0)='.\x00', 0x0, &(0x7f0000000100)) 33.966143151s ago: executing program 32 (id=81): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r1, 0x6, &(0x7f0000002000)={0x1, 0x0, 0x200, 0x2}) fcntl$lock(r0, 0x7, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x3}) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000180), 0x100000, 0x0) ioctl$CIOCGSESSION(r2, 0xc01c6365, &(0x7f0000000200)={0x16, 0x18, 0x25, &(0x7f0000000100)="41390e6b6d53bfd994d197a7413fd2e2b25726577a73ce036e68b78c6810afad49bf7966e8", 0xd, &(0x7f0000000140)="6d03c27a2c35f3838e06e37994", 0x2}) r3 = kqueue() r4 = getppid() ktrace(&(0x7f0000000240)='./file1\x00', 0x0, 0x80, r4) kevent(r3, &(0x7f00000001c0)=[{0x3, 0xffffffffffffffff, 0x21, 0x0, 0x20000000000000}], 0x1, 0x0, 0x0, 0x0) lchown(&(0x7f0000000000)='./file0\x00', 0xee01, 0xee00) chdir(&(0x7f0000000040)='./file0\x00') sigqueue(r4, 0x47, @sigval_int=0x5) mount(&(0x7f0000000080)='ufs\x00', &(0x7f00000000c0)='.\x00', 0x0, &(0x7f0000000100)) 15.459443166s ago: executing program 2 (id=110): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0xb, 0x0, 0x18, &(0x7f0000000440)="ec7b008ac583a405c068ad00c90b0000000000008b519798", 0x0, 0x0, 0x8, 0xfdffff85, [0x0, 0x0, 0x3, 0xfffff]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x40, &(0x7f0000000140), 0x0, 0x0, 0x0}) r1 = socket(0x1c, 0x2, 0x0) getfh(0x0, 0x0) symlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(0x0, 0x4, 0x1) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setreuid(0x0, 0xee01) ksem_open(0x0, 0x0, 0x200, 0x9, 0x7e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udplite(r2, 0x88, 0x4, &(0x7f0000000280)=0x3, 0x4) ksem_unlink(&(0x7f0000002f40)='/dev/kbd\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r4, r3) r5 = open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1b) cap_enter() openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5) freebsd12_shm_open(&(0x7f0000000000)='./file1\x00', 0x602, 0x0) r6 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) syz_emit_ethernet(0x4f, &(0x7f00000001c0)=ANY=[@ANYBLOB="24c46508004500004100000000041d2778ac1400bbffffffff4e224e22000890788b793ec7818306b0b1e0ffa7b00b1b920937bc639875b0c970f48bed94308257a4000000000000000000"]) inotify_add_watch_at(r6, r5, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xa1000835) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') getsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(r1, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x92, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08b50b0000840000000000069078ac1400bbac1400aa890306004e224623", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5100000390780005013e881f3937c9d81c8a78fb11dac9a6a0298e8302d94cbc41e27631fa3157ea8c50acf405dd43198ac95891d2b31d568a3d07b41cb9db2b284854b4b3f066010ff31c6a0cfb706935d1108ac5b4eeade6900e4dfa9924a8"]) 13.197453505s ago: executing program 2 (id=110): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0xb, 0x0, 0x18, &(0x7f0000000440)="ec7b008ac583a405c068ad00c90b0000000000008b519798", 0x0, 0x0, 0x8, 0xfdffff85, [0x0, 0x0, 0x3, 0xfffff]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x40, &(0x7f0000000140), 0x0, 0x0, 0x0}) r1 = socket(0x1c, 0x2, 0x0) getfh(0x0, 0x0) symlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(0x0, 0x4, 0x1) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setreuid(0x0, 0xee01) ksem_open(0x0, 0x0, 0x200, 0x9, 0x7e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udplite(r2, 0x88, 0x4, &(0x7f0000000280)=0x3, 0x4) ksem_unlink(&(0x7f0000002f40)='/dev/kbd\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r4, r3) r5 = open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1b) cap_enter() openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5) freebsd12_shm_open(&(0x7f0000000000)='./file1\x00', 0x602, 0x0) r6 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) syz_emit_ethernet(0x4f, &(0x7f00000001c0)=ANY=[@ANYBLOB="24c46508004500004100000000041d2778ac1400bbffffffff4e224e22000890788b793ec7818306b0b1e0ffa7b00b1b920937bc639875b0c970f48bed94308257a4000000000000000000"]) inotify_add_watch_at(r6, r5, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xa1000835) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') getsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(r1, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x92, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08b50b0000840000000000069078ac1400bbac1400aa890306004e224623", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5100000390780005013e881f3937c9d81c8a78fb11dac9a6a0298e8302d94cbc41e27631fa3157ea8c50acf405dd43198ac95891d2b31d568a3d07b41cb9db2b284854b4b3f066010ff31c6a0cfb706935d1108ac5b4eeade6900e4dfa9924a8"]) 11.169821508s ago: executing program 2 (id=110): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0xb, 0x0, 0x18, &(0x7f0000000440)="ec7b008ac583a405c068ad00c90b0000000000008b519798", 0x0, 0x0, 0x8, 0xfdffff85, [0x0, 0x0, 0x3, 0xfffff]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x40, &(0x7f0000000140), 0x0, 0x0, 0x0}) r1 = socket(0x1c, 0x2, 0x0) getfh(0x0, 0x0) symlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(0x0, 0x4, 0x1) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setreuid(0x0, 0xee01) ksem_open(0x0, 0x0, 0x200, 0x9, 0x7e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udplite(r2, 0x88, 0x4, &(0x7f0000000280)=0x3, 0x4) ksem_unlink(&(0x7f0000002f40)='/dev/kbd\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r4, r3) r5 = open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1b) cap_enter() openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5) freebsd12_shm_open(&(0x7f0000000000)='./file1\x00', 0x602, 0x0) r6 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) syz_emit_ethernet(0x4f, &(0x7f00000001c0)=ANY=[@ANYBLOB="24c46508004500004100000000041d2778ac1400bbffffffff4e224e22000890788b793ec7818306b0b1e0ffa7b00b1b920937bc639875b0c970f48bed94308257a4000000000000000000"]) inotify_add_watch_at(r6, r5, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xa1000835) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') getsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(r1, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x92, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08b50b0000840000000000069078ac1400bbac1400aa890306004e224623", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5100000390780005013e881f3937c9d81c8a78fb11dac9a6a0298e8302d94cbc41e27631fa3157ea8c50acf405dd43198ac95891d2b31d568a3d07b41cb9db2b284854b4b3f066010ff31c6a0cfb706935d1108ac5b4eeade6900e4dfa9924a8"]) 9.115245117s ago: executing program 2 (id=110): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0xb, 0x0, 0x18, &(0x7f0000000440)="ec7b008ac583a405c068ad00c90b0000000000008b519798", 0x0, 0x0, 0x8, 0xfdffff85, [0x0, 0x0, 0x3, 0xfffff]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x40, &(0x7f0000000140), 0x0, 0x0, 0x0}) r1 = socket(0x1c, 0x2, 0x0) getfh(0x0, 0x0) symlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(0x0, 0x4, 0x1) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setreuid(0x0, 0xee01) ksem_open(0x0, 0x0, 0x200, 0x9, 0x7e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udplite(r2, 0x88, 0x4, &(0x7f0000000280)=0x3, 0x4) ksem_unlink(&(0x7f0000002f40)='/dev/kbd\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r4, r3) r5 = open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1b) cap_enter() openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5) freebsd12_shm_open(&(0x7f0000000000)='./file1\x00', 0x602, 0x0) r6 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) syz_emit_ethernet(0x4f, &(0x7f00000001c0)=ANY=[@ANYBLOB="24c46508004500004100000000041d2778ac1400bbffffffff4e224e22000890788b793ec7818306b0b1e0ffa7b00b1b920937bc639875b0c970f48bed94308257a4000000000000000000"]) inotify_add_watch_at(r6, r5, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xa1000835) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') getsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(r1, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x92, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08b50b0000840000000000069078ac1400bbac1400aa890306004e224623", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5100000390780005013e881f3937c9d81c8a78fb11dac9a6a0298e8302d94cbc41e27631fa3157ea8c50acf405dd43198ac95891d2b31d568a3d07b41cb9db2b284854b4b3f066010ff31c6a0cfb706935d1108ac5b4eeade6900e4dfa9924a8"]) 7.294982646s ago: executing program 1 (id=206): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0x29, 0x27, 0x89, &(0x7f0000000640)="e80b008a0183240e019b519f98e0ffffffff7f74080b852918bce5e625e15635f07c9212804c7787ee46ef1ba66e56eee2f50522a9ac915fdbfc12bd27268755bdefb1ab2f9e56cbe509779e2ef40d9b421cda3b14e69483dbb4a9396b806370d232f65c7709705e8a39b872bba10d66c5189b7b974cde610592a79f14ce66d33ab08df5671ecbfb14", 0x0, 0x0, 0x8, 0x10000, [0x6, 0x0, 0x3, 0xfffff]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x40, &(0x7f0000000140), 0x0, 0x0, 0x0}) r1 = socket(0x1c, 0x2, 0x0) getfh(0x0, 0x0) symlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(0x0, 0x4, 0x1) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setreuid(0x0, 0xee01) ksem_open(0x0, 0x0, 0x200, 0x9, 0x7e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udplite(r2, 0x88, 0x4, &(0x7f0000000280)=0x3, 0x4) ksem_unlink(&(0x7f0000000600)='\xb9dev/kbd\x00') openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8, 0x1) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r4, r3) cap_enter() openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5) freebsd12_shm_open(&(0x7f0000000480)='./file1\x00', 0x602, 0x0) r5 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) syz_emit_ethernet(0x4f, &(0x7f00000001c0)=ANY=[@ANYBLOB="24c46508004500004100000000041d2778ac1400bbffffffff4e224e22000890788b793ec7818306b0b1e0ffa7b00b1b920937bc639875b0c970f48bed94308257a4000000000000000000"]) inotify_add_watch_at(r5, 0xffffffffffffffff, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xa1000835) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') getsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(r1, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x92, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08b50b0000840000000000069078ac1400bbac1400aa890306004e224623", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5100000390780005013e881f3937c9d81c8a78fb11dac9a6a0298e8302d94cbc41e27631fa3157ea8c50acf405dd43198ac95891d2b31d568a3d07b41cb9db2b284854b4b3f066010ff31c6a0cfb706935d1108ac5b4eeade6900e4dfa9924a8"]) 6.924666256s ago: executing program 2 (id=110): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0xb, 0x0, 0x18, &(0x7f0000000440)="ec7b008ac583a405c068ad00c90b0000000000008b519798", 0x0, 0x0, 0x8, 0xfdffff85, [0x0, 0x0, 0x3, 0xfffff]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x40, &(0x7f0000000140), 0x0, 0x0, 0x0}) r1 = socket(0x1c, 0x2, 0x0) getfh(0x0, 0x0) symlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(0x0, 0x4, 0x1) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setreuid(0x0, 0xee01) ksem_open(0x0, 0x0, 0x200, 0x9, 0x7e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udplite(r2, 0x88, 0x4, &(0x7f0000000280)=0x3, 0x4) ksem_unlink(&(0x7f0000002f40)='/dev/kbd\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r4, r3) r5 = open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1b) cap_enter() openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5) freebsd12_shm_open(&(0x7f0000000000)='./file1\x00', 0x602, 0x0) r6 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) syz_emit_ethernet(0x4f, &(0x7f00000001c0)=ANY=[@ANYBLOB="24c46508004500004100000000041d2778ac1400bbffffffff4e224e22000890788b793ec7818306b0b1e0ffa7b00b1b920937bc639875b0c970f48bed94308257a4000000000000000000"]) inotify_add_watch_at(r6, r5, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xa1000835) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') getsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(r1, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x92, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08b50b0000840000000000069078ac1400bbac1400aa890306004e224623", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5100000390780005013e881f3937c9d81c8a78fb11dac9a6a0298e8302d94cbc41e27631fa3157ea8c50acf405dd43198ac95891d2b31d568a3d07b41cb9db2b284854b4b3f066010ff31c6a0cfb706935d1108ac5b4eeade6900e4dfa9924a8"]) 4.97975992s ago: executing program 1 (id=210): pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) r1 = fork() aio_fsync(0x1000000, &(0x7f0000000380)={r0, 0x7, &(0x7f0000000500)="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", 0x1000, [0x39, 0x8], 0x7, 0x20, 0x2, {0xfff, 0x3, &(0x7f0000000340)="6b27312642e80ea42a05c6cf86604174fb32d6cf"}, {0x3, 0x19, @sigval_ptr=0x5, @spare=[0x5, 0x7f, 0x400, 0x2, 0x26, 0x10000, 0x6, 0xab1]}}) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r3 = dup(r2) syz_emit_ethernet(0x5a, &(0x7f0000000440)=ANY=[@ANYBLOB="ffffffffffff94ea09066dbd86dd60db83440081000000000000000000000000000000000000fe8000000000000000000000000000aa3c00000900000000c204ffffffff00004e224e23", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5100ffff90780004"]) sendmsg(r3, 0x0, 0x0) __specialfd$inotify(0x2, &(0x7f0000001700)={0x4}, 0xffffffffffffff25) inotify_add_watch_at(r3, r3, &(0x7f00000002c0)='./file0\x00', 0x40000800) procctl$PROC_TRAPCAP_STATUS(0x2, r1, 0xa, &(0x7f0000000400)) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f00000004c0), 0x10000, 0x0) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, 0x0) ioctl$CIOCCRYPT(r4, 0xc0306367, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000016c0)='./file0/file0\x00', 0x200201, 0x12) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) munlock(&(0x7f0000411000/0x1000)=nil, 0x1000) getsockopt$inet_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r3, 0x84, 0x24, &(0x7f00000015c0)={0x0, @in6={{0x1c, 0x1c, 0x3, 0xf89, @rand_addr="e7b4d6ef8502da97f60a19e674819bd9", 0x9}}, 0xae7}, &(0x7f0000001680)=0x88) aio_write(&(0x7f0000000240)={r5, 0x80000001, &(0x7f0000000300)="e2", 0x1, [0xfffffffd], 0x6, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int, @spare=[0x0, 0x0, 0x40000000]}}) r6 = open(&(0x7f0000000140)='./file0\x00', 0x0, 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r6, 0xf000000) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40, 0xc3) preadv(r7, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) setuid(0xffffffffffffffff) 4.979346695s ago: executing program 3 (id=211): r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) lchflags(&(0x7f0000000040)='./file1\x00', 0x4) r1 = socket$inet6_sctp(0x1c, 0x800000000000005, 0x84) r2 = dup2(r1, r1) ioctl$DIOCCHANGERULE(r2, 0x8048756d, &(0x7f0000000200)="600944a2643c58c56f195dd53b38f5221c7e70e514a5c05f53cc04a4") mkdir(&(0x7f0000000180)='./file0\x00', 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0x48, &(0x7f0000000180)={@multicast1, @rand_addr=0xe2fc, @rand_addr=0x2}, 0xc) setsockopt$inet_mreqsrc(r3, 0x0, 0x48, &(0x7f0000000140)={@multicast1, @broadcast, @broadcast}, 0xc) chroot(&(0x7f00000023c0)='./file0\x00') chmod(&(0x7f0000000140)='./file0\x00', 0x80) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x0, &(0x7f0000000100)) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000100)={@multicast1, @multicast2, @rand_addr=0x2}, 0xc) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000400)={@multicast1, @multicast1, @broadcast}, 0xc) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)}], 0x1}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000880)="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", 0x1000}, {&(0x7f0000000280)="4d9936d2432a71f5ff57fb3cc825c029a0adf15748b0b41efcdd5f379c808526279f4687a346bbe233e264c15e2bcd1d4f4d2c15c95c8820cab93fcae48f52e9fc1fed345769d6c3e6bd3ed6f530f0c17edd1c8eec7caa7a", 0x58}, {&(0x7f0000000500)="82c5f998d5be288b846faf533ef09aaf206b2f4a669ab9963039e58a5e2e445434ff20e72b487243fb0a0846a455f0a7419b470e5399a245fe414b6c1b66930c147f7f77b3d69e6c66e6d4a258224a549b4e2c7a3fa090028d44d96c364954ee67d86c1d3581a2bd546cdc05555495c41682216b3779b7615a64ebd5caf242bf57967c9e9569b49aa64f74f20692fd47a19d0acd4ffb1326daf75c0d76796ecf6f03b879d370e801469825b7ca5026ec76f4a1dd684c5364b44169c4f9c7", 0xbe}, {&(0x7f0000002400)="24a8beb6a3ac5eb25daabc1d5af311b343c941763667288cd2e7f66ecd71a647203c8618ab98dc037813074543af77fc153f24bd3824ab965dd1aa2f434ca47712f5bfe71091c89b2115da621c4bf88fbdc652f2f7f03558c0ce84251ed1649d33566e79c4bfb31920d212c0035aa793e0e25cd678936892cc42b611658751d5768fd2d2a8856a44b0fbb0a8f0e15e98b618197347da19d6fa14477b2c8e26bd5eb56e136a77ab60d700f0e7ea91c7bc4276394f3eaa3f5976b2209c9d8dfe32fa0382983181de672c55d4cc97c623a9bb4ff455338de001c139f02ccb382dd785c10cf3b3ba6b03df3fea87a0fcec1fa4dfa0712b5f963bbf7d61717d2b9d71c6c546755bd5a49cef2e518317b7726aadac404e5e67f4828c869bbf48a1d38d6d2ef43ec51d8169b0007eac963fc0739dbc3c20a8d9b4118f259e01ba6f5727d0e89872576ef6eec1cfc7a9863e896d9dd31f609501e8114cd534d6407b83941043ec7a923d78d99f7cb1b7088392c2c90073bec6f1d47d76a9f2dd7943248c2333cb58f666c7bffca3069dcfa35d4706665150b0c41457c15a753349ae6424924feed89cd35f88854d533815dbaf92eda91c08cc01a8e546625e1f2c3fc5c7dd29a182c181a54a62bc57758c44cf997a08561c3a767f20b399703b60a3dba3283303cbf4a0f4c6d6649113771fd37b04ff01ad83b648afdd4b7634db8f63c58cc1142213e8b30218c5d3b5074142209231fdbf2cbc2f0888c5f843c6d60f08e64b42a903f80d44f67e8d2ebd904370983b7df051ecf778c5be77f81b65afc42c1790ac09aa1f4c3747efef27a6e64cc9ae50e5c5bb23375885c98f2f64b8ae155b89c30cf3b446bc08f38fca512ec65e51b923e1bac94ac195ea7e28afcab3fe4f191f56a2f44d907def368cf1403acb48f1047ca2fc2591a6d24aea731b703dc64e61e17860356c9bbd927e413e21eae442e5c8d22b1f57097371097a79e3e85c22e0c77f1ac9b758226279d4d2a6a939001a152a14728d18cebcfdde1a45294cdaffa2a5ba2f1c6341611dbe3c92bb42a74aa60d76eedb1ddfbda19ddd313172126b252f171fafcd3360c6a34ca53bc51052cc534229b53861704205743c2314ca2e410b245c5d5d919009e980cb58dba17537e3face7de7ab5866ea68c832a42e31aabcf0d7b8b04518f4078553a4cd88bc0c9fe5dfca98b86d1bc517ad110f24acba69571365a909e147a1cf655a55aae82a017540cd57c83c309ddf9cf4528f7f4162247a4a3f4280bee92268703b70c2f80ab484722e7ea9a6e419102263ba48737291bef45850598973e0b9435d26e363ca8aad0ba172fd0e01d64e64d75ed42340abca9c08c17bf59c3c42e45c1ae8d29cfc9072aa369ca59e60f6da7592f780dce9101593b69d605b2521ac7a9d8bc3b6fc7b8a91978a1081e3cee1a91a431e0596fc3c2e55f5995130cbda4d7adf6ccd155d810eed5f9f8c6a2acfdd48d2d4729da4e50caeedb5119fee457a3105a4c12cd7f5ce98f233e58ca9fe5ba795152baad0320ffa237839666cc83351b2e8f26cce232ee421a858cc1115b8ef9ba4bfa1fea49d4dc0ae5de5a9de0ecf5068ea72dfd85eecd0b856aab6b19cffade037456cbf5a8586cd730e77d77242e16b39dbea39c1385de66dae4f7f00e8796c1857eccb621ea6508c30e2bf73487f0496aae944bee87fbe4121f514cd2033d6181046b5ff303c4f3dc834a01efa408fed8b6d608787ea2bbf4f3b92fe7c708bc7ea8c0d61e0c28de5d92b3ecc790e997d017bb7e7dea0107ccb63e7fadc7f0324ec6917482416cb4fa3cdb3238fe3154925ed06afa05e6f12351827fd2e415e8796ccb6a370663472321464d0f85dfce8e42bbdb4c9abcbd057c83b2079d3aa5ff1483b3630b6b06f7748eba6a64ea28c1985ed12cd9cc1566b97deda9f76e200121c9c568eaac4f4fd08d7260bbceee7e85736050e90c6229a09bea93d105c8c46d03c6aeef6b93822039252123690db06c2546bb2ec70353c411c05a4ed9e5c10939a7eda2d656bc1521d08bcf41852f8218484cf396b673942f2e31f03e95caa0f934d9f2f208da67c4bbeb54a344c59dd9d7e3b61da2fd9bd87309d3ba3b368d5ada20845d44d28bf7702c0757b404c5dbb8c0b87a6a6f6fc8ff815ec812a3bf6d407406714f1350fc00ddd3f498dd1f70a89453218a29d08a411f7b224c114c2f6c82b95fbac54197541e500de5b180976ec3f160594680d89f6c7793ae6f9f9bf73512907f1f10343d8ab3d89a7db7bdad2c04037943e58f205e9c454398956b3420766eef12145e559ba0c44f75d932a89b62e362f1fcde61ff8df2f8c8bce63e4f3c3a16510e083efaee1d188643b9ed55c21db46e1205f3ae728613aab38d24e8e2b25d7a104756eb88de00a2a34c17f9f8285327dd70b0da361b3ba509cbfd2457d9751111851c13488ed5b3b836d801d5786cb4457194a6c96827ab81838230408d4e9a6b030ca1109747e9da197e5ffefb3829da7c05f7c2d8dd22c18c0da335b14d789b670d87819832b1480b5bc86fea836e749dde041b4585ad487f63bc5956fe0d63e269f5286a0af2e744a7db356544ae8e718f1b171c8c8e8256b57aecdfcdfc0a6da020461f73c61b0e09d1462a5d255d8fe1f58af617610f2c4fee88c8fdb61f17b81e9fe0e79268f0553a1777823094843139b1993dac314379bf0eba06943839dde7df5c813b748822c90bf94f92e4c00fcc35841c2d09f72cf8c0d91538fcdc606888ab47bbf994b9feb4f82906f80df14e59a8df227c68b50296477833a54fd16c991489c1187a2cd620ba0325acfc28ed19015342b78ed5c76d790a8cfd7aa2b81fc71883d0c83ea0f753e112ac3b6d4b7af668511381f7112655a74d5baaf7d53947f85f4b09c8f139fc34e197b9a90db62752d3ba7cd54eba78c4fb23308922b7500b1387105329ca0c4489d5d6ec4dbf53a0884db1752c287a47c0a5fe9d8662cb11426a4b276de5574f3db509fefee858c323236b721042854dbe215e6db5fa23c336e1b7c0a30012e2de3060373340dbf223c1c5831e89d24cd3d7e8a28147974abe43a0077b2f57f0877cd796557b7dcc10d76bcd35697b185fc7225ab394dff1c3eaa72330fc4a2d0ab81d3b0cbdcc43dd173db5305d940a3d654d999212991ea865250417e609496502074f6f6f91dd46a756b96910470b112debf7070a2197970ca4e4a7e521e72c82e119253e3371cc10f5b1216354ce015a0316e6198ba90b9d3b7bff39897d84be0c753de074fd022b383e20dabf0d4666b3ccf18c9bdb1b0a928ebac7173d0a7cc7e7429aef0b9c971950a3a71896bf9cd277fce5073d8a91cc11641750a4124cbbf6605f3ffdd2ce67ee5d2f32dfdaa4c28180972b1a1b2e8f23d1fad5e3b24bff62790b7fd10bb6556419fa0e1056b0aa655f9d4bdee9786990b883de80db455703c9adc425dd14f92af44aed540af51cf7dc74ef43d71ee14d036fc6a065efa917d5b9bc3100f02a85bc09f9f03c12703bcaed956eacdd7c67dcb7efd4aec196774b3b50455febded402d1ec9d819eefff1ebbe0cd51deda1fc5526fd9ffd13da82c9b265e918e299da580fa5ad3f8f34991d085ff6b50cae466198c5bb60f5b51708ee8ae1574424e1246a1bd12c49f791e527a36157c581e5edaddd4ba328fa0e602efde92a9e059ec33c1942a751f7ff719a362dc64d5ba57f7982b32eafa2df2f34d68510c98dd47c9ceadffcd44813fa8579f38ec97592859541467944dc047a7e9fec49803cdde5abfc106f2d52229d90693682c197f2e264e97f63dacf814a34dc41caaed85c922dbaf26d9e2ed6684cf1680284c67105b8a2b1914f40be0354812773290f18f88ad74c1c45d6f11f97cf312b8b0cd95ceecc830ac59a37ca6efc92072509af1aef4b3bc976427cee2860e88fff349f36ad2741a5925457a9c77f1a4cd9c0f89307abfa1122bf14cfc9cfa4948b15a99efae0512e133fff76e146316a915fb320a23c9c103a8fd6409ad91133a786a241b8006cf2a03fed8a02fb0ed6c25b13e95d5ff02a63996ab179a76db478e983f1e1afe270b9e34be3a8b7f83c215f72dacb599853601d0477eac48f59c888806c137436c0c428261a4a559ca712ab833e7669a8b2b614f5ce38305095716ce94f587ca3ddeda17bd08d4932a718cbd2646bcfe24d8b5a9dd1be0c855d8bc51ad29d6edfbd2d0434ca682a1e4e816a996432b64cfdba684930b4f5340f66672fc656c6fc0b136d66a91ca88a9682cdac793ef4388eb01a940b875d9418a13091ed03fd009139b2dc593085323822af794e0bedd79275101ca59d05f10860a9f7f4fe0d0af5a39f1ab093d9dea63de6d5483efea17832cfeed9cccc1408310f2b311ded28b578af428b45efd8cf21e7b3c10b91195af2922bab97d818fb77bfb139e7fd5c0405e6621d1663c0504d534193978fee72a4520053429f6d05ea68c10ba087ba8d087726f202cc1cd47da9aceb88e5a17fb7550d4ebeabac6129f799311bc10dd1acc47423cb225aee9a103026689a24f5d4ed121507ba0f8002bd4a4be61efe91f06a89d1a7431d4feb6041b7bc7d6bb30640ffb9445cb8e8c413ef2ea5793091d9bee2c8d0a13eb54b434cdbc26735295e360bf712522b4c2e75af1062bd57125d3265c8e8c92742f1fec3bea7f56b9fbf0f1b284a9887b6ff93b432f0bc7e27d233147027c4791b1779a281cc4a2a50cb95bfb280c4056ab31642c415c1096613699a5dd55fd33912e02a1b7d58b69ff8f49d6aec2d7fd804c11e60e94c36acaf493cf32bb224f2bc7053b8e5e10e7ec319b52cecbaf84b66f7f13c73e8be02b2a4c9e19a7309fe659d8964473c97f41ddfb8c0cc1400c35b20eb65ebf4d842bfa4e01049cc816fbd3ce1f6900cec716a1775eeca39d6d3d81e0111d54b0addd820d0bbcd00f731e0759816a47e725faff4e27496379de5d76bcc552cf23d2fdc2c5b490ee003ca94485165984d2be6a5cf8d1bf92136af223593a457664422cbd907984045f9441700d91adf450be36cfa0423d56e27b3080cd0602d86b398a4f3d9845269e7092198f7e6e93db9388f1c64c9655cd3e082473ff947c8563ebd323edb5b0b5a88385f9080b94e4fba81a87522bb6978756aa4cd2d187deaef52d44dcdf01e66a1877d0f294ec1dfacbdcbefd9f91dba859cb36451c6f0d6b21eddca4805ca6135313c402f3b1561f0d1a17d96adae7c3a0e90cfa75170f210a35f6afdb0a4e321ab0fe1f7f6054fcad4eb5078e862c8f92e6e76c8f4ed10f157cd348b518a89242719b198a1c4bdaf30d973125a3a05e19aa180399e5e0c7bd7d6e6e540b20c1a8f8457553acd72f485e97b1af5bb422cc22d796d27a61ed8aa19f2583d5410d1bf525bfb3e7c5c190fdeef0e5350c5fc02624cc039ddd7fb4df6cbac66f2bd12134ac38dde993ab9d8a3ad1de00b52ab1c10c69d5f19ce93f772e4356aa4121f23ce2202617cf2b574c829512e865789fde76ff33e1161acece6715debe2ac69732e637523831da9fe6efd986678d565343baf00e5cde8b1e0d13b179e7338d2fe3e34309cf140a247de8f4a0d0b35144c740155f1447c74596cfe53f581e88e1a39ab4c00070fea0441c9572b2f7de7e3c970ca442db2fe1411de7c2a0c54846981265caa026cd40b0df920464ad6ef1b195625815fc66f53fabb0e8563396a7f2306c8753653295a8f97b3f94076683a7be94249130f3199", 0x1000}], 0x4, 0x0) mount(&(0x7f00000004c0)='ufs\x00', 0x0, 0x0, &(0x7f00000001c0)="7cf8af059a2eeb690408dc9cb91f44114213e4a3ee652863373383aec7505d24f92ce2141aee639bf0e123fc5d62eb42d3bd0d7e43bd5027ecf9") setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x48, &(0x7f0000000080)={@multicast1, @broadcast}, 0xc) socket(0x1, 0x1, 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000001c0)}], 0x1}, 0x0) r4 = getuid() setuid(r4) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) setgroups(0x0, 0x0) ktrace(&(0x7f00000000c0)='./file0\x00', 0x4, 0x40005aa8, 0xffffffffffffffff) syz_emit_ethernet(0x2a, &(0x7f0000000240)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08004552a400001c0067000000019078ffff0b80e6bf0aa45d49b348e102ae171f6effffffffffff120090780000"]) mount(&(0x7f0000000080)='cd9660\x00', &(0x7f00000000c0)='.\x00', 0x0, &(0x7f0000000100)) 4.632813971s ago: executing program 1 (id=212): r0 = socket$unix(0x1, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1018, &(0x7f0000000b80)=0xf6ad, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000e40)={&(0x7f0000000040)=@file={0xa, 0x0, './file0\x00'}, 0xa, 0x0, 0x0, &(0x7f0000000dc0)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10}], 0x60}, 0x0) r2 = socket(0x11, 0x10000000000003, 0x8) r3 = semget$private(0x0, 0x4000000009, 0x595) semop(r3, &(0x7f0000000000)=[{0x2, 0x9, 0x1800}, {0x4, 0x6, 0x400}, {0x4, 0x2}, {0x1, 0x7ffc, 0x1000}, {0x4, 0x4, 0x1000}, {0x1, 0x0, 0x1000}], 0x6) r4 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) listen(r4, 0x0) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) bind$inet6(r5, &(0x7f00000000c0)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @loopback}, 0x1c) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x6000, 0x1) setuid(0xee01) chflags(&(0x7f0000000640)='./file0\x00', 0x101006) sendto$inet6(r5, &(0x7f0000000100)="875500000000a599", 0x8, 0x108, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x9, @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, 0x45}, 0x1c) r6 = openat$ptmx(0xffffff9c, &(0x7f0000000080), 0x100, 0x0) bindat$unix(r6, r2, &(0x7f0000000140)=@file={0xa, 0x0, './file0\x00'}, 0xa) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000001c0)={0x0, 0xbb7, 0x8, 0x6, 0x1, 0x2}, &(0x7f0000000200)=0x14) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r2, 0x84, 0x8003, &(0x7f0000000300)={r7, &(0x7f0000000240)=[@in={0x10, 0x2, 0xffffffffffffffff, @broadcast}, @in6={0x1c}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}, @in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}]}, &(0x7f0000000340)=0x8) setsockopt$sock_int(r2, 0xffff, 0x1015, &(0x7f0000000040)=0x6, 0x4) 4.551889841s ago: executing program 4 (id=213): r0 = open$dir(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x141) kqueue() r1 = socket$bt_l2cap(0x24, 0x0, 0x87) r2 = fcntl$dupfd(0xffffffffffffffff, 0x0, r0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x11, &(0x7f0000000000)=0xffff, 0x4) freebsd11_kevent(r1, &(0x7f0000000040)=[{0x0, 0x0, 0x8081, 0x40000000, 0x8}], 0x1, 0x0, 0x0, 0x0) 4.526446679s ago: executing program 3 (id=214): r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) cap_fcntls_get(r0, &(0x7f0000000380)=[0x0]) (async) getsockopt$sock_accept_filter(r1, 0xffff, 0x1000, &(0x7f0000000280), &(0x7f0000000080)=0x100) setrlimit(0x2, &(0x7f0000000140)={0x1, 0x6}) (async) ioctl$MDIOCATTACH(r0, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0xe2ab, 0x2, 0x0, 0x7c, 0x8, 0x41, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30db, 0x0, 0x0, 0x0, 0x0, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5426, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1733, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xcea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8b86, 0x8f, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x71e]}) 4.480917277s ago: executing program 4 (id=215): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) (async) r0 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) socket(0x1c, 0x2, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000100)={0x1c, 0x1c, 0x0, 0xe, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x10006}, 0x1c) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$MDIOCRESIZE(r3, 0xc1c06d04, &(0x7f0000000040)={0x0, 0x1000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x4, 0x0, 0x80000001, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x20000, 0x3, 0x80000000, 0xffffffff, 0x9, 0x0, 0x8, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x7, 0xde1, 0x0, 0x176a6, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0xfffffffc, 0x5, 0xfffffffe, 0x0, 0x0, 0x3, 0x0, 0x0, 0x96, 0x0, 0xffffffff, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x4, 0x5, 0x0, 0xfffffffd, 0x800, 0xfffff7f1, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x501, 0x0, 0xfffffff8, 0x1, 0x0, 0xfffffffd, 0x8, 0x101, 0x0, 0x0, 0x2000005, 0x2, 0x0, 0x0, 0x0, 0x4, 0x6, 0x10e0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x400000]}) (async) ioctl$MDIOCRESIZE(r3, 0xc1c06d04, &(0x7f0000000040)={0x0, 0x1000000, 0x0, 0x0, 0x4000000000000000, 0x0, 0x4, 0x0, 0x80000001, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x300, 0x0, 0x0, 0x20000, 0x3, 0x80000000, 0xffffffff, 0x9, 0x0, 0x8, 0x2, 0xfffffffe, 0x0, 0x0, 0x0, 0x7, 0xde1, 0x0, 0x176a6, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1, 0xfffffffc, 0x5, 0xfffffffe, 0x0, 0x0, 0x3, 0x0, 0x0, 0x96, 0x0, 0xffffffff, 0xfffffffc, 0x0, 0x3, 0x0, 0x0, 0x4, 0x5, 0x0, 0xfffffffd, 0x800, 0xfffff7f1, 0x6d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x501, 0x0, 0xfffffff8, 0x1, 0x0, 0xfffffffd, 0x8, 0x101, 0x0, 0x0, 0x2000005, 0x2, 0x0, 0x0, 0x0, 0x4, 0x6, 0x10e0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x400000]}) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r1, 0x84, 0x8003, &(0x7f0000000400)={0x0, &(0x7f0000000140)=[@in={0x10, 0x2, 0xffffffffffffffff, @local}, @in={0x10, 0x2, 0xffffffffffffffff, @broadcast}, @in={0x10, 0x2, 0xffffffffffffffff, @rand_addr}]}, &(0x7f0000000200)=0x8) setsockopt$inet6_sctp_SCTP_MAXSEG(r2, 0x84, 0xe, &(0x7f0000000240)={r4, 0x1ff}, 0x8) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) (async) r6 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BIOCSRTIMEOUT32(r6, 0x4004667a, &(0x7f00000002c0)={0x1, 0x6}) (async) ioctl$BIOCSRTIMEOUT32(r6, 0x4004667a, &(0x7f00000002c0)={0x1, 0x6}) ioctl$BIOCGTSTAMP(r6, 0x40044283, &(0x7f00000000c0)) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) extattr_list_file(0x0, 0x0, &(0x7f0000000680)=""/219, 0xdb) setsockopt$inet_mreqsrc(r7, 0x0, 0x6b, 0x0, 0x0) (async) setsockopt$inet_mreqsrc(r7, 0x0, 0x6b, 0x0, 0x0) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000300)={@in6={{0x1c, 0x1c, 0x2, 0x4000005, @empty, 0x2}}, r5, 0x1ef, 0x59188734, 0x195, 0x6, 0x4, 0x4}, 0x98) open(&(0x7f0000000200)='./file0\x00', 0x200, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x4, 0xd27d43220c7df9b, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) extattr_get_file(&(0x7f0000000040)='./file1\x00', 0x3, &(0x7f00000000c0)='\x00', 0x0, 0x0) r8 = openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) ioctl$CIOCGSESSION2(r8, 0xc030636a, &(0x7f0000000080)={0x17, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffef85}) (async) ioctl$CIOCGSESSION2(r8, 0xc030636a, &(0x7f0000000080)={0x17, 0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdffef85}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) (async) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 4.479455939s ago: executing program 3 (id=216): open(&(0x7f0000000000)='./file0\x00', 0x2000000, 0x4c) (async) r0 = open(&(0x7f0000000000)='./file0\x00', 0x2000000, 0x4c) rfork(0x86024) (async) rfork(0x86024) freebsd11_mknod(&(0x7f0000000080)='./file2\x00', 0x2000, 0x9807) rename(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') (async) rename(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000200)='./file1\x00') socket$inet_udplite(0x2, 0x2, 0x88) (async) r1 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x43, &(0x7f00000000c0)=0x2, 0xffffffffffffff1d) (async) setsockopt$inet_int(r0, 0x0, 0x43, &(0x7f00000000c0)=0x2, 0xffffffffffffff1d) sendto$inet(r1, 0x0, 0x0, 0x100, &(0x7f00000002c0)={0x10, 0x2, 0x1, @loopback}, 0x10) openat$filemon(0xffffffffffffff9c, &(0x7f0000000180), 0x400, 0x0) socket(0x1c, 0x1, 0x0) (async) r2 = socket(0x1c, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0xbc0, @loopback, 0x7}, 0x1c) setsid() setsockopt$inet6_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) kqueue() fork() setsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=0x3, 0x4) (async) setsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000040)=0x3, 0x4) socketpair(0x1c, 0x3, 0xd, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$inet_buf(r3, 0x0, 0x1, 0x0, &(0x7f0000000080)) kqueue() socket(0x1, 0x10000001, 0x80) (async) socket(0x1, 0x10000001, 0x80) mount(0x0, 0x0, 0x8400004, 0x0) r4 = msgget$private(0x0, 0x3b2) msgsnd(r4, &(0x7f0000000400)=ANY=[@ANYBLOB="02deba2731edee4b1cda2954d9efe9407a99f33bef6d539f28c9dcedf8e1f7f2dcfcefb09eec77288181a4c8d1cacfa0cb2d4810b8058edfa10f92b6cc351f6498bc011e1ba63be1b4867516b2e96c819724b1ffe4afdfafee7fd2239e2168b7241951e5d781e13472651112ffb67542d1f089259232feb117271979414fb39a7e50b69a9d23f7c961d56b765af7d358d2d0d08c148e8451f687250683ad8cd038483ca1bb122d75a9989f584f2213cb2693286071a9c7576fc5ad4637df65a58b57c3f0d803a37d2fb5"], 0x8, 0x800) msgsnd(r4, &(0x7f0000000500)=ANY=[@ANYRES8=r4, @ANYRES64=r2, @ANYBLOB="76000c4ae625c1385a9853ccb0d33575cfdfd50a4e736f47f71d0a876b33fa7655372033d47dfbc3ed277b6ba17f45b1764f54ecc5061717d4dc885234f4140775a4271b9375aaa84a60a8225d2969d6a7a4e821c130e8c59bdc22e748e3e3f1c9183d34c8ccaa2f455e3bf12151a4944f16dadc492c6aeb5c2244a35dd180f5437c3fb7e812fb6bf0bb871a667c9736cca200ff37b1cd259f6278ea934d5d39fb33d369fc1012452ae5df994c5a8788eb16cc595dacf018e19232d4d7fde290df3706d1dde35b9edb0ebe8bac1444"], 0xe1, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x2, 0x0) symlink(0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x14a5) readlinkat(r0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300)=""/217, 0xd9) (async) readlinkat(r0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000300)=""/217, 0xd9) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0xfffffffc) (async) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0xfffffffc) lpathconf(&(0x7f0000000100)='./file0\x00', 0x11) 4.401047986s ago: executing program 4 (id=217): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x7f, @empty}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) freebsd11_fstatfs(r1, &(0x7f0000000080)) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) unmount(&(0x7f0000000200)='./file1\x00', 0x280080) sendto$inet6(r0, &(0x7f0000000200)="96", 0x1, 0x81, 0x0, 0x0) sendto(r0, &(0x7f0000002cc0)="30f83289c9523fe9789680968e2ce68ccf1fa0e26cdb9d72b0d6a04bd1b626a6b8fc86de9751b45e35e30864c6569b795113ec0a637b0800522e8276f3d55e204aed4439b75bd8ebc1e04cae74cb1e6abb124e335ab1f3a6f5831de5047830f40e4baa9a2e5e8e135ae77ad51c91391938a65467e71dbdaebd57c7c9baf9c54a63a852d3cfced60bb2b1c1a3d18a83eb5a350059f0d45118f99e587a131ad0cd7b", 0xa1, 0x0, 0x0, 0x0) 4.385581371s ago: executing program 2 (id=110): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0xb, 0x0, 0x18, &(0x7f0000000440)="ec7b008ac583a405c068ad00c90b0000000000008b519798", 0x0, 0x0, 0x8, 0xfdffff85, [0x0, 0x0, 0x3, 0xfffff]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x40, &(0x7f0000000140), 0x0, 0x0, 0x0}) r1 = socket(0x1c, 0x2, 0x0) getfh(0x0, 0x0) symlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(0x0, 0x4, 0x1) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setreuid(0x0, 0xee01) ksem_open(0x0, 0x0, 0x200, 0x9, 0x7e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udplite(r2, 0x88, 0x4, &(0x7f0000000280)=0x3, 0x4) ksem_unlink(&(0x7f0000002f40)='/dev/kbd\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) dup2(r4, r3) r5 = open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1b) cap_enter() openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x5) freebsd12_shm_open(&(0x7f0000000000)='./file1\x00', 0x602, 0x0) r6 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) syz_emit_ethernet(0x4f, &(0x7f00000001c0)=ANY=[@ANYBLOB="24c46508004500004100000000041d2778ac1400bbffffffff4e224e22000890788b793ec7818306b0b1e0ffa7b00b1b920937bc639875b0c970f48bed94308257a4000000000000000000"]) inotify_add_watch_at(r6, r5, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xa1000835) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') getsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(r1, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x92, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08b50b0000840000000000069078ac1400bbac1400aa890306004e224623", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5100000390780005013e881f3937c9d81c8a78fb11dac9a6a0298e8302d94cbc41e27631fa3157ea8c50acf405dd43198ac95891d2b31d568a3d07b41cb9db2b284854b4b3f066010ff31c6a0cfb706935d1108ac5b4eeade6900e4dfa9924a8"]) 2.108745224s ago: executing program 4 (id=218): setuid(0xee01) setuid(0xffffffffffffffff) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) unlink(&(0x7f0000000000)='./file0\x00') r0 = socket(0x1c, 0x2, 0x0) extattr_delete_link(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2.105030365s ago: executing program 1 (id=219): mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x7) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x67, &(0x7f0000001ec0)=""/4086, &(0x7f0000000000)=0x1035) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0xb, 0x0, 0x10, &(0x7f0000000000)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0xfff, 0x100000]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000240)={0xfffffffa, 0x3, 0x0, 0x240, &(0x7f0000000200), 0x0, 0x0, 0x0}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c9, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000200)={0x0, 0x9, 0x0, 0x6, 0x10, 0x1, 0x1, 0x9, 0x6, 0x36, 0x5}, 0xb) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000340)={0xb, 0x1d, 0x88, &(0x7f0000000540)="ec7b00000900ff000000000000000098363a1f61c3167b564eca5bcf25ef170eb64905fccc90adfb27e5aa3737a615b0a5620f30ccf96c3a2c1ad3b68e19955ae78ea21353c4326d47114c29bf5c39f20a02bdc233a737fc44039e5a68252c6c1aef899845d3e794e83d8ad53057f4dedc061a384d76e6a3d98a6fdf37624db4bbdba70765b9a383", 0x0, 0x0, 0x20000, 0x0, [0x7, 0x0, 0xc, 0xfffffffe]}) ioctl$CIOCCRYPT(r3, 0xc01c6367, &(0x7f0000000280)={0x0, 0x3, 0x0, 0x10000, &(0x7f0000000300), 0x0, 0x0, 0x0}) r4 = socket(0x1c, 0x1, 0x0) sendfile(r4, r4, 0x5, 0x7, &(0x7f0000000000)={&(0x7f0000000280), 0x0, 0x0}, &(0x7f0000000000), 0x0) r5 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_int(r5, 0x29, 0x3d, &(0x7f00000000c0)=0x80000000, 0x4) fhstatfs(&(0x7f00000001c0)={{[0x1, 0xee]}, {0x7, 0x8000, "16e46e665230bfc7c33a5567281a2a5e"}}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) r7 = getgid() setresgid(r7, 0x0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', r6, r7) setsockopt$inet6_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x18, &(0x7f0000000000)=0xfffffff8, 0x4) r8 = open$dir(&(0x7f00000000c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x356c9e37f35d6e0f, 0x108) clock_getres(0x1, &(0x7f0000000040)) r9 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000680), 0x1, 0x0) ioctl$CIOCGSESSION2(r9, 0xc030636a, &(0x7f00000002c0)={0x10, 0x7, 0x4, &(0x7f0000000400)="14b4426e", 0x1, &(0x7f00000003c0)="fb", 0x2, 0x4d46bf70, [0x0, 0x4, 0x1043, 0x4]}) renameat(0xffffffffffffff9c, &(0x7f0000000600)='\x00', r8, 0x0) fstatat(r8, &(0x7f0000000440)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000001040), 0x4200) 2.060975996s ago: executing program 3 (id=220): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0xb, 0xe, 0x18, &(0x7f0000000440)="ec7b008ac583a405c068ad00c90b0000000000008b519798", 0x0, 0x0, 0x8, 0xfdffff85, [0x0, 0x0, 0x3, 0xfffff]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x2, 0x0, 0x40, &(0x7f0000000140), 0x0, 0x0, 0x0}) r1 = socket(0x1c, 0x2, 0x0) getfh(0x0, 0x0) symlink(&(0x7f0000000240)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r2 = open$dir(0x0, 0x4, 0x1) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setreuid(0x0, 0xee01) ksem_open(0x0, 0x0, 0x200, 0x9, 0x7e) r3 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udplite(r3, 0x88, 0x4, &(0x7f0000000280)=0x3, 0x4) fcntl$setstatus(r2, 0x4, 0x20) ksem_unlink(&(0x7f0000002f40)='/dev/kbd\x00') openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) dup2(0xffffffffffffffff, r3) r4 = open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1b) cap_enter() openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0) freebsd12_shm_open(&(0x7f00000005c0)='./file0\x00', 0x602, 0x48) r5 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) syz_emit_ethernet(0x4f, &(0x7f00000001c0)=ANY=[@ANYBLOB="24c46508004500004100000000041d2778ac1400bbffffffff4e224e22000890788b793ec7818306b0b1e0ffa7b00b1b920937bc639875b0c970f48bed94308257a4000000000000000000"]) inotify_add_watch_at(r5, r4, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xa1000835) getsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(r1, 0x84, 0x1b, &(0x7f0000000000), &(0x7f0000000040)=0x4) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) syz_emit_ethernet(0x92, &(0x7f00000004c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08b50b0000840000000000069078ac1400bbac1400aa890306004e224623", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="5100000390780005013e881f3937c9d81c8a78fb11dac9a6a0298e8302d94cbc41e27631fa3157ea8c50acf405dd43198ac95891d2b31d568a3d07b41cb9db2b284854b4b3f066010ff31c6a0cfb706935d1108ac5b4eeade6900e4dfa9924a8"]) 2.060586543s ago: executing program 1 (id=221): setreuid(0x0, 0xee01) fhstatfs(&(0x7f0000000000)={{[0x3, 0xd4]}, {0x1, 0x0, "7b7ffe6ce22e2ffeff6404898904c78c"}}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) setrlimit(0x2, &(0x7f0000000100)={0x60000000, 0x5}) getrlimit(0x2, 0x0) 2.060230577s ago: executing program 4 (id=222): ppoll(0x0, 0xffffffffffffffb2, 0x0, 0x0, 0x3) r0 = socket(0x1c, 0x1, 0x0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f0000000080)={@multicast1, @empty, @local={0xac, 0x14, 0x0}}, 0xc) r2 = getpid() r3 = socket(0x26, 0x2, 0x0) bind(r3, &(0x7f0000000040)=@in6={0x1c, 0x1c, 0x3, 0x300, @mcast1}, 0x1c) r4 = socket$unix(0x1, 0x2, 0x0) ioctl$SMB_SENDB(r4, 0xc020697c, &(0x7f0000000100)={0x67, 0x69, 0x66, @buf="fba0", @buf="f6b6", 0xfff, 0x0, 0x0, 0x0}) recvmsg(r3, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x2) getpgrp(r2) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f0000000100)={@multicast2, @multicast2, @loopback}, 0xc) setsockopt$inet_mreqsrc(r1, 0x0, 0x46, &(0x7f00000001c0)={@multicast2, @broadcast, @local={0xac, 0x14, 0x0}}, 0xc) extattr_list_link(&(0x7f0000000040)='./file0\x00', 0x2, &(0x7f0000000480)=""/117, 0x75) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) r5 = kqueue() kevent(r5, &(0x7f0000000100)=[{0x3, 0xffffffffffffffff, 0x80a9, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x39, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb08004500002b0000000002019078ffffffffac1400aa4e234e210008907800881b70cb7b4df8044697182fd8cea55a38d89d544188892ebbe5"]) mount(&(0x7f00000000c0)='msdosfs\x00', 0x0, 0x0, &(0x7f0000000100)) mount(0x0, 0x0, 0x8400004, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5, 0x1010, 0xffffffffffffffff, 0x0) r6 = socket(0x11, 0x3, 0x0) setsockopt$sock_int(r6, 0xffff, 0x1014, 0x0, 0x0) sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000240)={0x1ff, 0x6, 0x40}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(0x0, 0x1) syz_emit_ethernet(0x4e, &(0x7f0000000340)=ANY=[@ANYBLOB="aaaaaaaaaaaa07000000ffff86dd60ae029d00183aff000000000000600000000000ee0000deff02000000000000000000000000000187009078000000000000000000000000000000000e00d1ce"]) aio_waitcomplete(0x0, 0x0) 1.024688ms ago: executing program 4 (id=223): socketpair(0x1, 0x2, 0x2, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) read(r1, &(0x7f00000006c0)=""/161, 0xa1) r2 = getpgrp(0x0) aio_write(&(0x7f0000000200)={r0, 0x4, &(0x7f00000000c0)="ccca4e28cd55785f70411189baa0c5b366d6a6935eb3dae731499ba97f4d840da8d1d2de706b15a8bfbf96afd96dd5521c0d3d7872a60ac0365d513d38f60fb37b9296b3ee4edcbbf50d5fbd321293dd525e6ded3540dca44cbb0fe21f9d4c143424fcf145e03efb86ac0ef056d414a861412883ecbeaabcc294ed5d1b4ef1f01622f8787a16f8560485c4c582eb081c5469a8c0f1cdc8a5121479b34762e4a6d679941d611362d41838a67db974c837e393f79196fac46b702c9d6619", 0xbd, [0x3, 0xfff], 0x4, 0x1, 0x4, {0x3, 0x36e64b5, &(0x7f0000000180)="4ebfc459da20a1ab3908814c972be0dcf4237fbcfed1fb960a1ce5c47838dbf3b325e4d006286d22e171ebe333d32cf0d9b02d74c0f397073c93ca6ccd14cf51ecabaa2ff0b9c032a85e4baa7543b68798e4f8cc7380fdf5206d62920869571345d4b0f7ef"}, {0x4, 0x12, @sival_ptr=0xf7, @tid=r2}}) procctl$PROC_REAP_KILL(0x2, 0x0, 0x6, &(0x7f0000000040)={0x1, 0x40, 0xffffffffffffffff, 0x2, 0xffffffffffffffff}) setpgid(0x0, r3) write(r0, &(0x7f00000014c0)="d602485228add1524309c78c4291bf53154f0326f1fc86ab596874d378d82316cbeaca6bf619f01d29cc1be66f1af92d3d09ea9cad30968855d166d7fb7cbaaa12731d6e5c9d176d80491eaca8b0d709f40082e194", 0x55) 648.732µs ago: executing program 1 (id=224): r0 = socket(0x1, 0x3, 0x80) accept$inet6(r0, 0x0, &(0x7f0000000000)) r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x80000, 0x110) r2 = socket$inet6(0x1c, 0x10000000, 0x5) mlockall(0x3) setsockopt$inet_sctp_SCTP_BINDX_ADD_ADDR(r0, 0x84, 0x8001, &(0x7f0000000080)=@in={0x10, 0x2, 0x0, @multicast2}, &(0x7f00000000c0)=0x10) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x11, r2, 0x3) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000180)={0x0, &(0x7f0000000100)=[@in6={0x1c}, @in={0x10}, @in={0x10, 0x2, 0xffffffffffffffff, @local}, @in={0x10, 0x2, 0xffffffffffffffff, @remote}, @in6={0x1c}]}, &(0x7f00000001c0)=0x8) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000200)={r3, 0x8001}, 0x8) r4 = vfork() getpgrp(r4) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r6 = socket$unix(0x1, 0x5, 0x0) connectat$unix(r5, r6, &(0x7f0000000240)=@abs={0x8, 0x0, 0x0, 0x3}, 0x8) setsockopt$inet_sctp_SCTP_REUSE_PORT(r0, 0x84, 0x1c, &(0x7f0000000280)=0x5, 0x4) r7 = openat(r1, &(0x7f00000002c0)='./file0\x00', 0x20000, 0x10) ioctl$KDGETMODE(r7, 0x40044b09, 0x101) r8 = __specialfd$inotify(0x2, &(0x7f0000000300), 0x4) inotify_add_watch_at(r8, r1, &(0x7f0000000340)='./file0\x00', 0x10) setsockopt$inet_mreqsrc(r0, 0x0, 0x49, &(0x7f0000000380)={@rand_addr=0x8, @remote={0xac, 0x14, 0x0}, @local={0xac, 0x14, 0x0}}, 0xc) r9 = openat(r7, &(0x7f00000003c0)='./file0\x00', 0x4, 0x140) r10 = socket$bt_hci(0x24, 0x3, 0x86) bind$bt_hci(r10, &(0x7f0000000400)={0x67, 0x5}, 0x3) pipe2(&(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}, 0x200000) fcntl$setflags(r11, 0x2, 0x1) setsockopt$inet_sctp_SCTP_MAX_BURST(r11, 0x84, 0x19, &(0x7f0000000480)={r3, 0x695}, 0x8) sendto$inet(r0, &(0x7f00000004c0)="0e13a3dd9efed2470ce4efe5714a1d57204209e280ff7c197c221dd199ffa45c583d12448fc226f1d7ad84f689a41669a74634bf979cc1dea29a332e3d85c683a3ae9e696ce4b48aace954c0fffd29209320974065e9", 0x56, 0x0, &(0x7f0000000540)={0x10, 0x2, 0x1, @broadcast}, 0x10) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000580)=0x5, 0x4) getsockopt$inet_mreqn(r9, 0x0, 0xc, &(0x7f00000005c0)={@rand_addr}, &(0x7f0000000600)=0xc) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2, 0x10, r12, 0x8) 156.908µs ago: executing program 3 (id=225): r0 = semget$private(0x0, 0x3, 0x7d0) __semctl$SETALL(r0, 0x0, 0x9, &(0x7f0000000080)=[0x199, 0xfffd]) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) connect$inet(r2, &(0x7f00000000c0)={0xfffffffffffffe21, 0x2, 0x2, @loopback}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='newreno\x00', 0x8) __realpathat(r1, &(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=""/1, 0x1, 0x0) mount(&(0x7f0000000280)='msdosfs\x00', 0x0, 0x8400010, 0x0) r3 = socket(0x1b, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000500)="029964b3d67539141b00020900c72613a516eefd49dfa2b729833246e4322b3401d3f56584ccd1ecc503ec001ea8baa4cecf8c3a4fbce88f2529f4fbf887c596bebb086701cebcad0c58e7ced749a8c6d1172e772e243092dbf041b832b207922229a84a02b32b6deaa60c548981f051dbc1efbc5e09d5714f78b8e0038b2e8da86d47f7b37912b0f105f581d27af34b14f64ed2a142a7d5a95bce4c52b2528eec9eb64fa63e253e65b6c7e0", 0x10, 0x5d1c37e4eab62832, 0x0, 0xffffffc4) sendto(r2, &(0x7f00000002c0)="01afd876ff08ac791500", 0xa, 0x4, 0x0, 0x0) recvfrom(r2, &(0x7f0000000100)=""/247, 0xf7, 0x8e2, 0x0, 0x0) r4 = semget(0x0, 0x1, 0x281) semop(r0, &(0x7f0000000440)=[{0x4, 0xc, 0x800}, {0x3, 0x1, 0x1800}], 0x1) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x3d) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) __semctl$SETVAL(r4, 0x4, 0x8, &(0x7f0000000240)=&(0x7f0000000040)=0x2) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r5, 0x84, 0x8003, &(0x7f00000001c0)={0x0, &(0x7f0000000140)=[@in={0x10, 0x2, 0xffffffffffffffff, @local}, @in={0x10, 0x2, 0xffffffffffffffff, @broadcast}, @in={0x10, 0x2, 0xffffffffffffffff, @rand_addr}]}, &(0x7f0000000200)=0x8) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0xa, &(0x7f0000000300)={@in={{0x10, 0x2, 0x1, @broadcast}}, r6, 0x1ef, 0x59188734, 0x195, 0x6, 0x9, 0x4}, 0x98) r7 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_buf(r7, 0x6, 0x24, &(0x7f0000000480)="975e55c254559a46475d4eea8183cd479d0a9f620b8e44629e9a7dfd379db65601bc53d5c1f7b366c7a46faaee04d9ef7a611c7ff76baef59bf95e1a878e24", 0x3f) setsockopt$inet6_sctp_SCTP_MAXSEG(0xffffffffffffff9c, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x7}, 0x8) r8 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f00000005c0)={0x0, 0x1}, &(0x7f0000000600)=0x8) sendmsg$unix(r3, &(0x7f0000002740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="28000000ffff000001000000", @ANYRES32, @ANYRES32=r1, @ANYRES32=r8, @ANYRES32=r8, @ANYRES32=r1, @ANYRES32=r8, @ANYRES32=r8, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="100000002ec55c8ca2cd9204064d04b357f959bcd30386e80ada1af667b177c60e97eac017533cde8c00ccb95e01e422d58963d34098c88c7b3e7e6017afa5c1aac061d4b79e20da5f4c2f0aefc8", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="20000000ffff000001000000", @ANYRES32=r2, @ANYRES32, @ANYRES32=r7, @ANYRES32, @ANYRES32, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="60000000ffff000003000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="10000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="20000000ffff000001000000", @ANYRES32, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r1, @ANYRES32], 0x1e8}, 0x1) procctl$PROC_REAP_RELEASE(0x0, 0x0, 0x3, 0x12) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) 0s ago: executing program 3 (id=226): r0 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f00000001c0)=0x5, 0x4) open(&(0x7f0000000200)='./file0\x00', 0x200, 0x7d) ktrace(&(0x7f0000000200)='./file0\x00', 0x4, 0xd27d43220c7df9b, 0x0) eaccess(&(0x7f0000000000)='./file0\x00', 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.145' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 Expensive callout(9) function: 0xffffffff81afc400(0) 0.005851222 s if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 Expensive callout(9) function: 0xffffffff819c5c50(0) 0.005860232 s if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe005873f400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 md0: truncating fractional last sector by 510 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 Expensive callout(9) function: 0xffffffff81afc400(0) 0.006144842 s if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe005873f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005873f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005873f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005873f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005873f000 if_delmulti_locked: detaching ifnet instance 0xfffffe005873f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 md1: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 Jan 6 17:21:00 ci-freebsd-i386-4 kernel: arp: 00:00:00:00:00:00 is using my IP address 172.20.1.170 on tap1! if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe005873ec00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 lock order reversal: 1st 0xfffffe00543e2070 ufs (ufs, lockmgr) @ /syzkaller/managers/i386/kernel/sys/kern/vfs_mount.c:2264 2nd 0xfffffe0059a08908 devfs (devfs, lockmgr) @ /syzkaller/managers/i386/kernel/sys/kern/vfs_subr.c:3395 lock order ufs -> devfs attempted at: #0 0xffffffff816a3722 at witness_checkorder+0x1652 #1 0xffffffff8150e135 at lockmgr_xlock+0xa5 #2 0xffffffff8235ade7 at VOP_LOCK1_APV+0x57 #3 0xffffffff8181463e at _vn_lock+0x14e #4 0xffffffff817d4f8f at vget_finish+0x10f #5 0xffffffff811f3513 at devfs_allocv+0x183 #6 0xffffffff811f24d7 at devfs_root+0xb7 #7 0xffffffff817e2ca9 at vfs_cache_root_fallback+0x1a9 #8 0xffffffff817d7936 at vflush+0x1a6 #9 0xffffffff811f2319 at devfs_unmount+0x69 #10 0xffffffff817bee72 at dounmount+0xf22 #11 0xffffffff817bde18 at kern_unmount+0x648 #12 0xffffffff823204f2 at ia32_syscall+0x4d2 #13 0xffffffff82135eff at int0x80_syscall_common+0x9c ifaddr cache = 0xfffffe0077f48180 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 tap2: link state changed to DOWN pid 494 (syslogd), jid 0, uid 0: exited on signal 10 (core dumped) if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 if_delmulti_locked: detaching ifnet instance 0xfffffe0077c33400 SYZFAIL: invalid kcov comp type type=ffffffff817b3b46 (errno 4: Interrupted system call) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff817b3b46 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: open of /dev/kcov failed (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=2 req=110 state=1 status=67 (errno 9: Bad file descriptor)