last executing test programs: 11.703807434s ago: executing program 1 (id=103): syz_emit_ethernet(0x56, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00203aff78042000000014000001000007000000ff02000000000000000000000000000188009000000000000000bb020121094debf6f2"]) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x29, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x3, "2e090000ffffffe0"}, 0x30) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r1, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) r3 = setsid() fcntl$lock(r2, 0xb, &(0x7f0000000680)={0x0, 0x1, 0x3d7, 0xffffffff, r3}) socket$inet_sctp(0x2, 0x5, 0x84) kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x801b, 0xffffff, 0xfffffffffffffffe, 0x0, [0xffffffffffffffff, 0x0, 0x0, 0x8000]}], 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x40008000, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0x3}, 0x1c) sendmsg$unix(r2, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[], 0x100}, 0x20180) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0xffffffffffffff80, 0x9, 0x5, 0xa, 0xbf, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) r4 = socket(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040)=0x2, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x10, 0x2, 0x2, @loopback}, 0x10) rfork(0x1000) extattr_list_file(0x0, 0x0, 0x0, 0x0) setpgid(r3, r3) setsockopt$sock_splice(r1, 0xffff, 0x1023, &(0x7f0000000000)={0xffffffffffffffff, 0xab, {0x1, 0x2}}, 0x14) r5 = socket(0x1c, 0x1, 0x0) r6 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$BIOCSHDRCMPLT(r6, 0x80044275, &(0x7f0000000040)=0x1) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) kqueue() open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) 9.74475184s ago: executing program 3 (id=302): openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r0 = openat$md(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f0000000500)={0x0, 0x0, 0x2, &(0x7f00000000c0)='./file0\x00', 0x800, 0x0, 0xf, 0x2000000, 0x80000, 0x0, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x5, 0x2, 0x3, 0x1, 0x3, 0x0, 0x6, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000000, 0x0, 0x401, 0x7fffffff, 0x9, 0x2, 0x84, 0x0, 0x0, 0x0, 0x1, 0xfffffffa, 0x0, 0xe585, 0xfffffffd, 0x0, 0x0, 0x2000000, 0x3, 0x0, 0xfffffffd, 0x0, 0x5, 0x0, 0x5, 0x2, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffd, 0xe, 0x0, 0x4e9, 0x0, 0x80, 0x0, 0x3, 0xfffffff9, 0x0, 0xa5d, 0xa]}) 9.662421572s ago: executing program 3 (id=304): r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$MDIOCDETACH(r0, 0xc1c06d01, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2, 0x0, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x8, 0x10000, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x6, 0x1000d826, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x5, 0x1004, 0x3, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0xfffffffe, 0x4000000]}) socket$inet6_sctp(0x1c, 0x1, 0x84) syz_emit_ethernet(0x66, &(0x7f0000000240)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x30, 0x3a, 0x0, @empty, @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2}}}}}}}) r1 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r1, &(0x7f0000000500), 0xf4, 0x0, 0x1000) socket(0x1c, 0x1, 0x0) semop(0x0, &(0x7f0000000180)=[{0x2, 0x5, 0x1800}, {0x4, 0xfffb, 0x1000}], 0x2) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) execve(0x0, 0x0, &(0x7f0000000280)=[&(0x7f0000000080)='\x00', &(0x7f0000000480)='\x00']) writev(r3, &(0x7f0000000280), 0x26) write(r3, &(0x7f00000004c0)="9665a44f", 0x2000) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$MDIOCDETACH(r0, 0xc1c06d01, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2, 0x0, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x8, 0x10000, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x6, 0x1000d826, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x5, 0x1004, 0x3, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0xfffffffe, 0x4000000]}) (async) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) syz_emit_ethernet(0x66, &(0x7f0000000240)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x30, 0x3a, 0x0, @empty, @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2}}}}}}}) (async) msgget$private(0x0, 0xfffffffffffffffd) (async) msgrcv(r1, &(0x7f0000000500), 0xf4, 0x0, 0x1000) (async) socket(0x1c, 0x1, 0x0) (async) semop(0x0, &(0x7f0000000180)=[{0x2, 0x5, 0x1800}, {0x4, 0xfffb, 0x1000}], 0x2) (async) socket$inet6_udp(0x1c, 0x2, 0x0) (async) fcntl$dupfd(r2, 0x3, 0xffffffffffffffff) (async) execve(0x0, 0x0, &(0x7f0000000280)=[&(0x7f0000000080)='\x00', &(0x7f0000000480)='\x00']) (async) writev(r3, &(0x7f0000000280), 0x26) (async) write(r3, &(0x7f00000004c0)="9665a44f", 0x2000) (async) 9.391766748s ago: executing program 2 (id=307): open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x20180}, 0x0) mount(&(0x7f0000000080)='cd9660\x00', &(0x7f00000000c0)='.\x00', 0x10200140, &(0x7f0000000100)) truncate(&(0x7f0000000180)='./file0\x00', 0x4) truncate(&(0x7f0000000080)='./file0\x00', 0x7) r0 = socket(0x1c, 0x1, 0x0) fcntl$lock(r0, 0xc, &(0x7f0000000140)={0x1, 0x1, 0x1, 0x4}) getpid() r1 = socket$inet6_udp(0x1c, 0x2, 0x0) freebsd11_fstatat(0xffffffffffffff9c, &(0x7f0000000080)='\x00', &(0x7f00000000c0), 0x200) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x4) write(r0, &(0x7f0000000200)="2c479e8917ec5590063860ff54a4f846817767bdd6b703b5ed34cbd57a63c886c58c003e9c30b62d56474bdfaf6526edd758d3dd1b1abb9917c6fc07891599d587002b6fcc4bf0e4536c65c8ec40a78851c37a15571810f52b49db30d71c3517f28ce6c4244aef24fc33d472aa7519fe6aae55da8a54320169748e72de2212524e84ffb8c112185a8c74d3e573804b21139c4aa30294b43c18cc00ec561bc2fd83639189", 0xa4) sendmsg(r1, &(0x7f0000000180)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c, 0x0, 0x0, 0x0}, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000300)={0x10, 0x2, 0x0}, 0x10) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x0, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) cpuset_getid(0x1, 0x9, 0x0, 0x0) r3 = socket(0x2, 0x1, 0x0) r4 = open(&(0x7f0000000040)='./file0\x00', 0x18289, 0x110) ftruncate(r4, 0x10000) r5 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) copy_file_range(r5, 0x0, r5, &(0x7f0000000180)=0xffff, 0x3ff, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) setresgid(0x0, 0xee01, 0x0) ktrace(&(0x7f0000000140)='./file0\x00', 0x4, 0xd27d43220c7df1b, 0x0) msgctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/17) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 9.256754274s ago: executing program 1 (id=103): syz_emit_ethernet(0x56, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00203aff78042000000014000001000007000000ff02000000000000000000000000000188009000000000000000bb020121094debf6f2"]) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x29, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x3, "2e090000ffffffe0"}, 0x30) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r1, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) r3 = setsid() fcntl$lock(r2, 0xb, &(0x7f0000000680)={0x0, 0x1, 0x3d7, 0xffffffff, r3}) socket$inet_sctp(0x2, 0x5, 0x84) kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x801b, 0xffffff, 0xfffffffffffffffe, 0x0, [0xffffffffffffffff, 0x0, 0x0, 0x8000]}], 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x40008000, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0x3}, 0x1c) sendmsg$unix(r2, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[], 0x100}, 0x20180) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0xffffffffffffff80, 0x9, 0x5, 0xa, 0xbf, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) r4 = socket(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040)=0x2, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x10, 0x2, 0x2, @loopback}, 0x10) rfork(0x1000) extattr_list_file(0x0, 0x0, 0x0, 0x0) setpgid(r3, r3) setsockopt$sock_splice(r1, 0xffff, 0x1023, &(0x7f0000000000)={0xffffffffffffffff, 0xab, {0x1, 0x2}}, 0x14) r5 = socket(0x1c, 0x1, 0x0) r6 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$BIOCSHDRCMPLT(r6, 0x80044275, &(0x7f0000000040)=0x1) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) kqueue() open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) 9.222326603s ago: executing program 3 (id=308): r0 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) (async) sendmsg$inet_sctp(r0, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x6, @loopback}, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x149}, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = dup(r1) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f00000000c0)={0x10, 0x20, 0x1, &(0x7f0000000000)='\x00', 0xf8, &(0x7f0000000500)="d5666c05910bf49966d2e371abca324eecbc6cfcb2e6ce0731d623116a5dc371b8fd9437601dd92fa0ab38ece42517a7b3c27f4dd84ba7a6bf30a42a1fcf478fa2d8c7091ed31cae9d341ff8034720d8994842863b12138535b0b125b4a651bed869787d9520c47e220240f1a4c56ace77d190b793bb0c9d8dc062611dbbf398f76c570553869d5e982459efdf02b0f44ce78f41a20420dfaa435138d406dfe52ddffa9663d14ebb64a14ebdd18edba775395be9b9bfa47b9a5902000000e8f38276b00acec508e170f77da2bcb666ca32083a4443d8da2081b484af45d1c2a7c7ac4c158585e3369498adfc869bf33db8d8afe482d1ffc7", 0x0, 0x4d46b770, [0x0, 0x0, 0x3ff]}) ioctl$CIOCCRYPT(r2, 0xc01c6367, &(0x7f00000003c0)={0x20000000, 0x3, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140), 0x0}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r5, &(0x7f00000001c0)={0x1c, 0x1c, 0x3, 0xffffffff, @local={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) dup2(r5, r4) r6 = dup2(r4, r5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000380)=0x8) (async) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000380)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0xa, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x2, 0x16e, @empty, 0x80}}, r7, 0x4, 0x0, 0x291, 0x40, 0xfffb, 0xfc}, 0x98) setsockopt$inet6_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x1d, &(0x7f0000000100)={r7, 0xf}, 0x8) (async) setsockopt$inet6_sctp_SCTP_AUTH_DEACTIVATE_KEY(r2, 0x84, 0x1d, &(0x7f0000000100)={r7, 0xf}, 0x8) mkdir(&(0x7f0000000200)='./file0/../file0\x00', 0x124) (async) mkdir(&(0x7f0000000200)='./file0/../file0\x00', 0x124) chroot(&(0x7f0000000080)='./file0/file0/..\x00') (async) chroot(&(0x7f0000000080)='./file0/file0/..\x00') r8 = socket(0x1c, 0x1, 0x0) aio_readv(0x0) ioctl$KDGETMODE(r8, 0x40046676, 0x22e00000) (async) ioctl$KDGETMODE(r8, 0x40046676, 0x22e00000) freebsd11_mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x2000, 0x1) ioctl$EVIOCGBIT(0xffffffffffffffff, 0x40004523) (async) ioctl$EVIOCGBIT(0xffffffffffffffff, 0x40004523) open$dir(&(0x7f0000000280)='.\x00', 0x80, 0x0) (async) r9 = open$dir(&(0x7f0000000280)='.\x00', 0x80, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) fchownat(r9, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x6000) (async) fchownat(r9, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x6000) setreuid(0xee01, 0x0) truncate(0x0, 0x3) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000180)='\x06\xc3\''], 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 7.287036641s ago: executing program 2 (id=309): clock_nanosleep(0x4, 0x1, &(0x7f00000000c0)={0x7fa1, 0x3b5f4b9a}, 0x0) r0 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) r1 = setsid() fcntl$lock(r0, 0xb, &(0x7f0000000680)={0x0, 0x1, 0x3d7, 0xffffffff, r1}) r2 = socket$inet_sctp(0x2, 0x5, 0x84) kevent(r0, &(0x7f0000000040)=[{0x9, 0xfffffffffffffff9, 0x9, 0x1, 0xe8c5, 0x0, [0xa356]}], 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x40008000, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0x3}, 0x1c) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYRESOCT=r1, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRESDEC=r1, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=r2, @ANYRES32, @ANYRES32, @ANYRESHEX=r2, @ANYRES32, @ANYRES32=0x0, @ANYRESDEC, @ANYRES32, @ANYRES32, @ANYRES64, @ANYRES64, @ANYRES32, @ANYRES16=r0, @ANYRES64=0x0, @ANYRES32], 0x100}, 0x20180) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) extattr_list_file(0x0, 0x0, 0x0, 0x0) setsockopt$sock_splice(0xffffffffffffffff, 0xffff, 0x1023, &(0x7f0000000000)={0xffffffffffffffff, 0x499, {0x1, 0x2}}, 0xfffffffffffffee5) r3 = socket(0x1c, 0x1, 0x0) r4 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$BIOCSHDRCMPLT(r4, 0x80044275, &(0x7f0000000040)=0x1) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) kqueue() semop(0x0, &(0x7f00000000c0), 0x2aaaaaaaaaaaab8a) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) r5 = kqueue() kevent(r5, &(0x7f00000001c0)=[{0x3, 0xffffffffffffffff, 0x21}], 0x1, 0x0, 0x0, 0x0) link(&(0x7f0000000140)='./file0\x00', &(0x7f0000000980)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') freebsd10_pipe(&(0x7f00000000c0)) ioctl$MDIOCRESIZE(r0, 0xc1b46d04, 0x0) sigqueue(0x0, 0x55, @sival_ptr=0xad) ioctl$DIOCRCLRASTATS(0xffffffffffffffff, 0xc44c4448, &(0x7f0000000f00)={{"4e1497ce396b493d5095c359a6f174187e17c5f3025aaa772f0ae7b4137ee0876435a62f35d6ef5a1f9848230b01e06c6629b5f3c0bfc8c7567d18d1c833d770c0860455de944d885cc71762fab1d76a5954170a8f17e2efbd8defaa2bbc8d0cf9492d2a2cc6bd4f3f6133cd2ead45c3692ad2ce0f189b9cea6160f3252390812c4d1aa407cb4822841f7b0107d52cd1c6aaab614dfc45f9ac47209336ef85e6c9dfa89a19ecb25900f2322ebb89740e3972cadba6e331acda35b5c02c1830aef0708d2356b56fbb3992a3d0ebfd9eede002604c4f0ee66d24e8ad62370821bae990f1d84c1d8d4a9d8a2999de64b9583358b67f55db7b24b5b7f511f67ad98b06fcde94ac6cd5533ea0cd81fe80ab99514c445ad633a2cab3be147fdc6ea508008f8035b06da02c69a0cb52a8a59f0c7b947bce9db23dfe44a2a1c98fb7849119cd9ad4534558bf9d53fd0ecdda4d4ad28b5f391f04d6935f76adbd9c8473e803149443757b9bb934494899d1da9d00bed478ac05660f9a414629c58ffc126121f761c1bc0edc72fc9f5288c8ad69eeaf1135c4c1c1c9a08ebf248d6d0e9ba69a1687865b4ddd9c9ccc2fcd5d7eca9910564cc82d1e0d04f3f4e01faaa4ecc2390c1143421a530e8a81a0a2a1e1e45ab7924b05c9eb6e9c96909cc765d8d8fb09526dd094b6954e88f66d2f7229f44bcc53712db1ca7df9fac2bf2c875c5c3a7595dabd100dc7eb95b07ceca9f2878d7c85c78a50f575a84b6254f022c14837d8354392cc2157239b608b50dbe36533398b265e5c916e2d8e3ac51cbb0468556bbd5e48ac1134fd22203327b03949417210120576ff14389f32a5f90d8d799b5f695998a56941272922cf54af109cf100c908979e20f2cac41bfe5c18b26101356403ad83f4c12f32896935c77068788ad6eb218184d532f014701bbca01d2974b46713590f492667a6221f3f4478f4fbb220169d3e3d9a298c775b8aeb8ac3e23e81798eea6d4c6526c20ecdef6755ec0bdb205cdeb73d70eb74c5c6316311a7d23653d1110df2bb1291a49c91aa9fa6b4b4bbccdaaf4195a989a31ef80fbd2a75ee8a1a63237eec2cf07ab6fb6a96ac407080a141b9a2204a70a904daa077fe0aa91e3fbfb0ae3aee323feec1af2839398193a1b38e7c0c49c2c359fd9e4fc42b64737be9dc0bb8b8d4a380755c9cae223cb4242836eab4183129a289c44f3e50a5bf714c5252d96db4a47ab826cbe8a3c430cc4734f4e63ea2acc254189d8080feb8053e4c5b6b906ea701b8bedc95b032a160c0f205d1d453f8ed4c01824625ab3f66da447385ed223df509ebefb4d3ee861830a3a89d1564bea3b32d7c0990f5969239f871e47226483528eb49985beb86df9e85ae928feb510adf50884d4dcd972e3951b3ddc2733d722f1f1322dc97f7149ab29cb2e0a0feb2383845", "0f08aa774c0ec477e722e9912013773e1ba927681672cc4c9b1ea2bea3a2bd84", 0x9, 0xcc}, &(0x7f0000000080), 0x9, 0x7fffffffffffffff, 0x4, 0x4, 0x3, 0x4, 0x2, 0x9}) kqueue() rfork(0x3060) socketpair$unix(0x1, 0x2, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 7.286736641s ago: executing program 3 (id=310): r0 = socket(0x1c, 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) freebsd11_fstatat(r1, &(0x7f0000000080)='\x00', &(0x7f00000000c0), 0x4200) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) r2 = socket(0x1c, 0x1, 0x0) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r3, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet6_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x12, &(0x7f0000000440), 0x1) connect$inet6(r3, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2, 0x0, @loopback}, 0x1c) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="00ffe540f5fe3b863c9097e71373e38c58e9b6117c11fc44833e3d972f90982a7ab64839c88582a8f2fb6b5391d01c1a983c4261b4dfb829c55072a0ce367b65b53fc1c7d56dc22bf7793ebf1628d084af8e335e6fa534a86fad742108e5f49444477cf55daaea7dec1786b6ca69573741705af348b10096caae80e5b5852b753475de6fe5e9bdc628c7992cfc", 0x8d}], 0x1, 0x0}, 0xd) r4 = shmat(0x0, &(0x7f0000001000/0x3000)=nil, 0x1000) shmdt(r4) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) ioctl$MDIOCRESIZE(0xffffffffffffffff, 0xc1b46d04, &(0x7f0000000740)={0x1ff, 0x1, 0x4, &(0x7f0000000480)='./file0\x00', 0x4, 0x2, 0xd01, 0xcb2, 0x3, 0xff, &(0x7f0000000580)='\x00', [0x4, 0x2, 0xfffff001, 0x5, 0x7f, 0x0, 0xff, 0xdea, 0x9, 0xfffffff7, 0xbc, 0x0, 0x9, 0x1, 0x1, 0x3, 0x34d, 0x5, 0x4, 0x401, 0x101, 0xa91, 0x2b, 0x5, 0xff, 0x8, 0x1, 0x47da, 0x8, 0xd46, 0x0, 0x4, 0x2, 0x2b, 0x400, 0x0, 0x7f, 0x2, 0x5f30, 0x9, 0x9, 0x2, 0xffffffff, 0x4, 0x80000001, 0x8, 0x7, 0x2, 0x4, 0xcd0, 0xf7, 0xfffffe39, 0x7fff, 0xff3, 0xfffff808, 0x6, 0x6, 0xca30, 0x4, 0x9, 0x4, 0x0, 0x5, 0x1, 0x0, 0x3, 0x81, 0x10000, 0xff, 0x6, 0x6, 0x9, 0x5, 0xa02, 0x8, 0x40000, 0x1ff, 0x8, 0x81, 0x7, 0x8, 0x1, 0xd6f6, 0xb, 0x0, 0x805, 0x8, 0xffffffa7, 0x81, 0x452, 0x7, 0x1354, 0xb, 0x4, 0xc, 0x9]}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) fstat(r0, &(0x7f0000000340)) getresgid(&(0x7f00000011c0)=0x0, &(0x7f0000001200), &(0x7f0000001240)=0x0) freebsd11_fstatat(r0, &(0x7f0000002280)='./file0\x00', &(0x7f00000022c0), 0x4200) getresgid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) __semctl$SEM_STAT(0xffffffffffffffff, 0x2, 0xa, 0x0) socketpair(0x1, 0x1, 0xde, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = semget$private(0x0, 0x3, 0x392) __semctl$SEM_STAT(r8, 0x4, 0xa, &(0x7f00000001c0)=&(0x7f0000000200)={{0x0, 0x0, 0x0, 0x0}}) sendmsg$unix(r7, &(0x7f0000004e00)={0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000004cc0)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, r9, 0x0, 0xffffffffffffffff, r9, 0x0, 0x0, r9]}, @cred={0x60, 0xffff, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, [0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0xffffffffffffffff]}], 0x120}, 0x0) fstatat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000640), 0x200) getgid() r11 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0xc8) fchownat(r11, &(0x7f0000000940)='./file0\x00', 0xffffffffffffffff, r6, 0xdf691f5cb9ca1617) 7.28632148s ago: executing program 0 (id=317): r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x2000, 0x0) write(0xffffffffffffffff, 0x0, 0x0) r1 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) chflags(&(0x7f0000000100)='./file0\x00', 0x20006) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) 7.000497242s ago: executing program 1 (id=103): syz_emit_ethernet(0x56, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00203aff78042000000014000001000007000000ff02000000000000000000000000000188009000000000000000bb020121094debf6f2"]) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x29, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x3, "2e090000ffffffe0"}, 0x30) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r1, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) r3 = setsid() fcntl$lock(r2, 0xb, &(0x7f0000000680)={0x0, 0x1, 0x3d7, 0xffffffff, r3}) socket$inet_sctp(0x2, 0x5, 0x84) kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x801b, 0xffffff, 0xfffffffffffffffe, 0x0, [0xffffffffffffffff, 0x0, 0x0, 0x8000]}], 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x40008000, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0x3}, 0x1c) sendmsg$unix(r2, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[], 0x100}, 0x20180) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"0b6599970e127ad54d6de5cb281e7f49179902145c4c152b91c7df3995cef04951ce546d946f159d6c05f36920069ccc9fa7343fa06abc96c7bf04113f80be09a81bd2958244999fc5233a1abe1fec1574e1f5eed6e0595df5531a8ea1ae014c1ad699810724b461547bcd75393a07ba3a442cc263e32e01078a91ad9c22b6b8c8034cf6ca8b3b5b4b2940cda8315672d261b81d3477c9112bde8ae085b828363a70f6279932a06ab20a9d18c845a2064d44cc324d6297cfd3ccb2113a9c06b87eaaa07c2ffcae960ea465154ab353368dff6b03d32e8d3e84b541c9d9011aaedd9322326687c1201d4344ea2b35b67eadf4b5faac281588c953bbdf11836e72c246564d486d1a25051eb805de8474be46d86a7a28100428b722fe29968323f3a6ca0b99886bcdc173593ff8c73a36f6a62810088e96ab0f83f02f62ae89eceba8dc55572a88785dec790eedddd4e6a19f49b207d285b7e9124b055fb56110d2584a72376aa6eccf5a718f35f3605291cae5af7799d4963ddeaffa365b91fa86a28671ee2b008909695bc542783f87a6157f7a77f2008c62b420c78891635f0d122fae6d57f89ea36dbaa00f65ea4fa8fef4913795165f26cf8f8a53e88a496ecdb987146d002d63c6fd27c929b3c2d2b4f9fb19ea665d20ea37f39115ac28dab0cf9a8d23bc4748bc211345a694cab5a4c6cdec959ec8a0fa062411f0175fb8e89b23154efbb5e2d890c1fa7524783b47f2ad1ac866365019224de7018cdc8d876c183518b15681f427bd148c47e141dcd72ed720947bafff4dc5159c8def7dea8dea62fc61f1248f3276e84358db0c96b92da5de390d3a9eec96d44497acf20738e1c1194d5b0556f8172d7d35aa286b5b5ecf8380d27e973aab2404e3a9a3601e5343e7af710343d2191b3df75d992dd6c51259e79750c96d6d05c236492fc2e715fcbc8c9f5185ef3b86a87d79d3ee071d844eb15694f7884942be6637697f9875995b4a77b4a19d04c38df04484b2fa7ceaf79c0234ed58aac3ebe06b8bd501efc6a526c1a8492b059cc36c1ffb3c68edce05ecce7327460199fdceca05269bee671f35097aaa971eed57931dacfdb5ce7178e6ca88af8ba2fb967bddf6e5e86fdc1776fd45f57f37979a54c2698df36feb63a5efdb3636f09715a7f6bed5fe0a955ee1b499f34338f14b530b9d71a088978a11eaba784b12886cb1cb9d53ec077512f95e135857f17459b956f3ca71b209d11e7512275421adb1a12851f277f5e73b514145d7d733725e3ada50cc7027e1d992bff5f37334c7a429e20675832df09ad24483cad85a4ad9a9d8e87975eee7827375b19d8a4ef0e7b84fd21e613e882b3a80b10686bd3ca210f8014f2e100e6df28756639cd360558776e60a23e8a7eb81a56b90b39a23037387810b4f79e2c6328876c911b496ff227a31", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0xffffffffffffff80, 0x9, 0x5, 0xa, 0xbf, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) r4 = socket(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040)=0x2, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x10, 0x2, 0x2, @loopback}, 0x10) rfork(0x1000) extattr_list_file(0x0, 0x0, 0x0, 0x0) setpgid(r3, r3) setsockopt$sock_splice(r1, 0xffff, 0x1023, &(0x7f0000000000)={0xffffffffffffffff, 0xab, {0x1, 0x2}}, 0x14) r5 = socket(0x1c, 0x1, 0x0) r6 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$BIOCSHDRCMPLT(r6, 0x80044275, &(0x7f0000000040)=0x1) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) kqueue() open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) 5.086347535s ago: executing program 0 (id=311): mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000500)={0x1c, 0x1c, 0x2, 0x0, @loopback, 0x2}, 0x1c) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r1, 0x29, 0x32, &(0x7f0000001600), 0x8) getsockopt$inet6_buf(r1, 0x29, 0x32, 0x0, &(0x7f0000001000)) setsockopt$inet6_int(r0, 0x29, 0x1b, &(0x7f00000001c0), 0x4) r2 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x1002, &(0x7f0000000000)=0x4, 0x4) mprotect(&(0x7f0000506000/0x4000)=nil, 0x4000, 0x6) 5.085190114s ago: executing program 2 (id=320): r0 = socket(0x1c, 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) freebsd11_fstatat(r1, &(0x7f0000000080)='\x00', &(0x7f00000000c0), 0x4200) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) r2 = socket(0x1c, 0x1, 0x0) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r3, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet6_sctp_SCTP_AUTH_CHUNK(r3, 0x84, 0x12, &(0x7f0000000440), 0x1) connect$inet6(r3, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2, 0x0, @loopback}, 0x1c) sendmsg(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="00ffe540f5fe3b863c9097e71373e38c58e9b6117c11fc44833e3d972f90982a7ab64839c88582a8f2fb6b5391d01c1a983c4261b4dfb829c55072a0ce367b65b53fc1c7d56dc22bf7793ebf1628d084af8e335e6fa534a86fad742108e5f49444477cf55daaea7dec1786b6ca69573741705af348b10096caae80e5b5852b753475de6fe5e9bdc628c7992cfc", 0x8d}], 0x1, 0x0}, 0xd) r4 = shmat(0x0, &(0x7f0000001000/0x3000)=nil, 0x1000) shmdt(r4) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) ioctl$MDIOCRESIZE(0xffffffffffffffff, 0xc1b46d04, &(0x7f0000000740)={0x1ff, 0x1, 0x4, &(0x7f0000000480)='./file0\x00', 0x4, 0x2, 0xd01, 0xcb2, 0x3, 0xff, &(0x7f0000000580)='\x00', [0x4, 0x2, 0xfffff001, 0x5, 0x7f, 0x0, 0xff, 0xdea, 0x9, 0xfffffff7, 0xbc, 0x0, 0x9, 0x1, 0x1, 0x3, 0x34d, 0x5, 0x4, 0x401, 0x101, 0xa91, 0x2b, 0x5, 0xff, 0x8, 0x1, 0x47da, 0x8, 0xd46, 0x0, 0x4, 0x2, 0x2b, 0x400, 0x0, 0x7f, 0x2, 0x5f30, 0x9, 0x9, 0x2, 0xffffffff, 0x4, 0x80000001, 0x8, 0x7, 0x2, 0x4, 0xcd0, 0xf7, 0xfffffe39, 0x7fff, 0xff3, 0xfffff808, 0x6, 0x6, 0xca30, 0x4, 0x9, 0x4, 0x0, 0x5, 0x1, 0x0, 0x3, 0x81, 0x10000, 0xff, 0x6, 0x6, 0x9, 0x5, 0xa02, 0x8, 0x40000, 0x1ff, 0x8, 0x81, 0x7, 0x8, 0x1, 0xd6f6, 0xb, 0x0, 0x805, 0x8, 0xffffffa7, 0x81, 0x452, 0x7, 0x1354, 0xb, 0x4, 0xc, 0x9]}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) fstat(r0, &(0x7f0000000340)) getresgid(&(0x7f00000011c0)=0x0, &(0x7f0000001200), &(0x7f0000001240)=0x0) freebsd11_fstatat(r0, &(0x7f0000002280)='./file0\x00', &(0x7f00000022c0), 0x4200) getresgid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) __semctl$SEM_STAT(0xffffffffffffffff, 0x2, 0xa, 0x0) socketpair(0x1, 0x1, 0xde, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = semget$private(0x0, 0x3, 0x392) __semctl$SEM_STAT(r8, 0x4, 0xa, &(0x7f00000001c0)=&(0x7f0000000200)={{0x0, 0x0, 0x0, 0x0}}) sendmsg$unix(r7, &(0x7f0000004e00)={0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000004cc0)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, r9, 0x0, 0xffffffffffffffff, r9, 0x0, 0x0, r9]}, @cred={0x60, 0xffff, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, [0x0, r10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r10, 0x0, 0xffffffffffffffff]}], 0x120}, 0x0) fstatat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000640), 0x200) getgid() r11 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0xc8) fchownat(r11, &(0x7f0000000940)='./file0\x00', 0xffffffffffffffff, r6, 0xdf691f5cb9ca1617) 5.081322431s ago: executing program 3 (id=321): r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) r1 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r0, 0x0) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, 0x0) freebsd11_mknod(&(0x7f0000000140)='./file0\x00', 0x2000, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) r2 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x1) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) chflags(&(0x7f0000000100)='./file0\x00', 0x20006) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) msync(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x2) 4.813386406s ago: executing program 0 (id=312): ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000001800)={0x19, 0x18, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xffffeff8, [0x10, 0x80000000, 0xfffffffa, 0x5]}) mkdir(&(0x7f0000000340)='./file\x00', 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) freebsd11_stat(&(0x7f0000001840)='./file/file0/../\x00', 0x0) sysarch$I386_SET_LDT(0x1, 0x0) freebsd11_stat(&(0x7f0000000280)='./file/file0/../\x00', &(0x7f00000002c0)) execve(&(0x7f0000004200)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000005240), 0x0) syz_emit_ethernet(0x76, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60826e030040000000000000000000000e14fc11133f6400fe800000ff07000000000000000000aa3c01000000000000c2040000000403059ebafd8dfb000000890090780000000014371397a886c26732b7a0e8c6544806ff0100"/117]) open(&(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000000, 0x24) r0 = socket(0x1c, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x200, 0x26) aio_suspend(0x0, 0xfffffffffffffd7d, &(0x7f0000001380)={0x9, 0x9}) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unmount(&(0x7f0000000380)='./file0\x00', 0x400) socket$inet_udplite(0x2, 0x2, 0x88) rename(0x0, 0x0) symlink(&(0x7f0000000080)='.\x00', &(0x7f0000000240)='./file0\x00') pathconf(&(0x7f0000000100)='./file0\x00', 0x4) syz_emit_ethernet(0x36, &(0x7f0000000300)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @multicast2, @remote={0xac, 0x14, 0x0}}, @tcp={{0x2, 0x1, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x4}}}}}}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r2 = openat(r1, &(0x7f0000001880)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20000, 0x4) ioctl$BIOCIMMEDIATE(r2, 0x80044270, &(0x7f00000003c0)=0x3) 4.812655713s ago: executing program 2 (id=313): openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r0 = openat$md(0xffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f0000000500)={0x0, 0x0, 0x2, &(0x7f00000000c0)='./file0\x00', 0x800, 0x0, 0xf, 0x2000000, 0x80000, 0x0, 0x0, [0x10001, 0x8, 0x0, 0x0, 0x12, 0x0, 0x5, 0x2, 0x3, 0x1, 0x3, 0x0, 0x6, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2000200, 0x0, 0x401, 0x7fffffff, 0x9, 0x2, 0x84, 0x0, 0x0, 0x0, 0x1, 0xfffffffa, 0x0, 0xe585, 0xfffffffd, 0x0, 0x0, 0x2000000, 0x3, 0x0, 0xfffffffd, 0x0, 0x5, 0x0, 0x5, 0x2, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffd, 0xe, 0x0, 0x4e9, 0x0, 0x80, 0x0, 0x3, 0xfffffff9, 0x0, 0xa5d, 0xa]}) 4.711977967s ago: executing program 2 (id=314): r0 = socket(0x1c, 0x1, 0x0) writev(r0, 0x0, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaaa986dd64040000003043ff00000000000000000000000000000000ff020000000000000000000000000001030190780c00000069a08afffff811ff00000000000000000000ffffe0000002fe8000000000000000000000000000bb"]) r2 = dup(r0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) msync(&(0x7f0000860000/0x600000)=nil, 0x600000, 0x2) minherit(&(0x7f0000d93000/0x1000)=nil, 0x1000, 0x0) madvise(&(0x7f00009d6000/0x600000)=nil, 0x600000, 0x3) msync(&(0x7f0000ce0000/0x3000)=nil, 0x3000, 0x2) ioctl$CIOCGSESSION2(r1, 0xc030636a, &(0x7f00000000c0)={0x10, 0x20, 0x1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x0, 0x4d46b770, [0x0, 0x0, 0x3ff]}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0x23, &(0x7f0000000400)="f358b501318548eb85805f7f569e7f95ddf05a36334c7795537bc445dde528baa7596485587bba58252a28c296f948a643b93ea3f08374f71e68e932", 0x3c) freebsd11_statfs(&(0x7f0000000340)='./file0/file0/..\x00', &(0x7f0000000580)) open(0x0, 0x80000000000209, 0xfffffffffffffffc) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) chroot(&(0x7f0000000080)='./file0/file0/..\x00') fchownat(0xffffffffffffffff, &(0x7f0000000000)='./file0/../file0\x00', 0x0, 0x0, 0x6000) setreuid(0xee01, 0x0) socketpair(0x2, 0x10000007, 0x9, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername(r4, 0xfffffffffffffffe, &(0x7f0000000480)) open(&(0x7f0000000000)='./file0\x00', 0x200, 0x2) open$dir(&(0x7f0000000500)='./file0\x00', 0x1, 0x0) lchflags(&(0x7f0000000300)='./file0/../file0\x00', 0x100009) fchflags(r1, 0x40c08) truncate(&(0x7f0000000100)='./file0/../file0\x00', 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 4.680195484s ago: executing program 0 (id=315): ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000001800)={0x19, 0x18, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xffffeff8, [0x10, 0x80000000, 0xfffffffa, 0x5]}) mkdir(&(0x7f0000000340)='./file\x00', 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) freebsd11_stat(&(0x7f0000001840)='./file/file0/../\x00', 0x0) sysarch$I386_SET_LDT(0x1, 0x0) freebsd11_stat(&(0x7f0000000280)='./file/file0/../\x00', &(0x7f00000002c0)) execve(&(0x7f0000004200)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000005240), 0x0) syz_emit_ethernet(0x76, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60826e030040000000000000000000000e14fc11133f6400fe800000ff07000000000000000000aa3c01000000000000c2040000000403059ebafd8dfb000000890090780000000014371397a886c26732b7a0e8c6544806ff010000000000000000000000000001"]) open(0x0, 0x2000000, 0x24) r0 = socket(0x1c, 0x1, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x200, 0x26) aio_suspend(0x0, 0xfffffffffffffd7d, &(0x7f0000001380)={0x9, 0x9}) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unmount(&(0x7f0000000380)='./file0\x00', 0x400) socket$inet_udplite(0x2, 0x2, 0x88) rename(0x0, 0x0) symlink(&(0x7f0000000080)='.\x00', &(0x7f0000000240)='./file0\x00') pathconf(&(0x7f0000000100)='./file0\x00', 0x4) syz_emit_ethernet(0x36, &(0x7f0000000300)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @multicast2, @remote={0xac, 0x14, 0x0}}, @tcp={{0x2, 0x1, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x4}}}}}}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r2 = openat(r1, &(0x7f0000001880)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20000, 0x4) ioctl$BIOCIMMEDIATE(r2, 0x80044270, &(0x7f00000003c0)=0x3) 4.644857048s ago: executing program 0 (id=316): r0 = socket(0x1c, 0x1, 0x0) r1 = socket(0x1c, 0x1, 0x0) freebsd11_fstatat(r1, &(0x7f0000000080)='\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x4200) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sendmsg$unix(r1, &(0x7f0000001400)={&(0x7f0000000100)=@abs={0x8, 0x0, 0x0, 0x3}, 0x8, 0x0, 0x0, &(0x7f0000001580)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, r2, 0x0, 0x0, 0xffffffffffffffff, r2]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, r2]}], 0x120, 0x4}, 0x0) getresgid(&(0x7f00000004c0), &(0x7f0000000500), &(0x7f0000000540)) r3 = socket(0x1c, 0x1, 0x0) r4 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r4, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet6_sctp_SCTP_AUTH_CHUNK(r4, 0x84, 0x12, &(0x7f0000000440), 0x1) connect$inet6(r4, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2, 0x0, @loopback}, 0x1c) sendmsg(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)="00ffe540f5fe3b863c9097e71373e38c58e9b6117c11fc44833e3d972f90982a7ab64839c88582a8f2fb6b5391d01c1a983c4261b4dfb829c55072a0ce367b65b53fc1c7d56dc22bf7793ebf1628d084af8e335e6fa534a86fad742108e5f49444477cf55daaea7dec1786b6ca69573741705af348b10096caae80e5b5852b753475de6fe5e9bdc628c7992cfc", 0x8d}], 0x1, 0x0}, 0xd) shmat(0x0, &(0x7f0000001000/0x3000)=nil, 0x1000) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) ioctl$MDIOCRESIZE(0xffffffffffffffff, 0xc1b46d04, &(0x7f0000000740)={0x1ff, 0x1, 0x4, &(0x7f0000000480)='./file0\x00', 0x4, 0x2, 0xd01, 0xcb2, 0x3, 0xff, &(0x7f0000000580)='\x00', [0x4, 0x2, 0xfffff001, 0x5, 0x7f, 0x0, 0xff, 0xdea, 0x9, 0xfffffff7, 0xbc, 0x0, 0x9, 0x1, 0x1, 0x3, 0x34d, 0x5, 0x4, 0x401, 0x101, 0xa91, 0x2b, 0x5, 0xff, 0x8, 0x1, 0x47da, 0x8, 0xd46, 0x0, 0x4, 0x2, 0x2b, 0x400, 0x0, 0x7f, 0x2, 0x5f30, 0x9, 0x9, 0x2, 0xffffffff, 0x4, 0x80000001, 0x8, 0x7, 0x2, 0x4, 0xcd0, 0xf7, 0xfffffe39, 0x7fff, 0xff3, 0xfffff808, 0x6, 0x6, 0xca30, 0x4, 0x9, 0x4, 0x0, 0x5, 0x1, 0x0, 0x3, 0x81, 0x10000, 0xff, 0x6, 0x6, 0x9, 0x5, 0xa02, 0x8, 0x40000, 0x1ff, 0x8, 0x81, 0x7, 0x8, 0x1, 0xd6f6, 0xb, 0x0, 0x805, 0x8, 0xffffffa7, 0x81, 0x452, 0x7, 0x1354, 0xb, 0x4, 0xc, 0x9]}) getresgid(&(0x7f0000000cc0), &(0x7f0000000d00), &(0x7f0000000d40)) fstat(r0, &(0x7f0000000340)) freebsd11_fstatat(r0, &(0x7f0000002280)='./file0\x00', &(0x7f00000022c0), 0x4200) getresgid(&(0x7f0000002340), &(0x7f0000002380), &(0x7f00000023c0)) __semctl$SEM_STAT(0xffffffffffffffff, 0x2, 0xa, &(0x7f00000024c0)=&(0x7f0000002480)) socketpair(0x1, 0x1, 0xde, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = semget$private(0x0, 0x3, 0x392) __semctl$SEM_STAT(r6, 0x4, 0xa, &(0x7f00000001c0)=&(0x7f0000000200)={{0x0, 0x0, 0x0, 0x0}}) sendmsg$unix(r5, &(0x7f0000004e00)={0x0, 0x0, &(0x7f0000000400), 0x0, &(0x7f0000004cc0)=[@cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r7, 0x0, 0xffffffffffffffff, r7, 0x0, 0x0, r7]}, @cred={0x60, 0xffff, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, [0x0, r8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8]}, @cred={0x60, 0xffff, 0x3, 0x0, 0x0, 0x0, 0x0, 0x10, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0, 0xffffffffffffffff]}], 0x120}, 0x0) fstatat(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000640), 0x200) getgid() r9 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0xc8) fchownat(r9, &(0x7f0000000940)='./file0\x00', 0xffffffffffffffff, 0x0, 0xdf691f5cb9ca1617) 4.544756303s ago: executing program 1 (id=103): syz_emit_ethernet(0x56, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00203aff78042000000014000001000007000000ff02000000000000000000000000000188009000000000000000bb020121094debf6f2"]) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x29, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x3, "2e090000ffffffe0"}, 0x30) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r1, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) r3 = setsid() fcntl$lock(r2, 0xb, &(0x7f0000000680)={0x0, 0x1, 0x3d7, 0xffffffff, r3}) socket$inet_sctp(0x2, 0x5, 0x84) kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x801b, 0xffffff, 0xfffffffffffffffe, 0x0, [0xffffffffffffffff, 0x0, 0x0, 0x8000]}], 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x40008000, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0x3}, 0x1c) sendmsg$unix(r2, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[], 0x100}, 0x20180) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0xffffffffffffff80, 0x9, 0x5, 0xa, 0xbf, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) r4 = socket(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040)=0x2, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x10, 0x2, 0x2, @loopback}, 0x10) rfork(0x1000) extattr_list_file(0x0, 0x0, 0x0, 0x0) setpgid(r3, r3) setsockopt$sock_splice(r1, 0xffff, 0x1023, &(0x7f0000000000)={0xffffffffffffffff, 0xab, {0x1, 0x2}}, 0x14) r5 = socket(0x1c, 0x1, 0x0) r6 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$BIOCSHDRCMPLT(r6, 0x80044275, &(0x7f0000000040)=0x1) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) kqueue() open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) 2.544827313s ago: executing program 0 (id=318): r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000280)={0x10, 0x2, 0x3}, 0x10) connect$inet(r0, &(0x7f0000001740)={0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}, 0x10) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) freebsd11_mknodat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x0) setsockopt$inet6_MRT6_DEL_MFC(0xffffffffffffffff, 0x29, 0x69, 0x0, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) syz_emit_ethernet(0x9b, &(0x7f0000001480)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x65, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @remote={0xfe, 0x80, '\x00', 0x0}, [{0x1, 0x1, "21090962354e64022acbd8"}, {0x1, 0x8, "35a3bb9eb7ebab276ff3151d0a10f8884120794242d0b5f1501312df97ee73cdd56f39c583ecec6daf39496cccb6d1ebfbe78074209e7d7c82c41da2c144"}]}}}}}}) r2 = __specialfd$eventfd(0x1, &(0x7f0000000000)={0x0, 0x5}, 0x8) bind$bt_rfcomm(r2, &(0x7f0000000180)={0xff, 0x10, 0x6, 0xc}, 0x4) r3 = open(&(0x7f0000000080)='./file0\x00', 0xf5fbbcdef939e6ea, 0x0) flock(r3, 0x8) open(&(0x7f0000000040)='./file0\x00', 0x2f9, 0xe9c95da4eed287a8) rfork(0x85000) r4 = socket(0x2, 0x1, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, &(0x7f0000000000)={0xfe, 0x6, 0x8, 0x37, 0x2, 0x0, 0x6, 0x0, 0x0, 0xbf, 0x2}, 0xb) freebsd11_mknodat(r2, &(0x7f00000002c0)='./file0\x00', 0x6000, 0x6) setrlimit(0x3, &(0x7f0000000000)={0xb35c, 0xb359}) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) access(&(0x7f0000000180)='./file0\x00', 0x1) ioctl$MDIOCDETACH(r1, 0xc00c6d32, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x2, 0x0, 0x80000, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x7, 0x0, 0x8, 0x10000, 0x80000001, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x6, 0x1000d826, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x10, 0x0, 0x400000, 0x5, 0x1004, 0x3, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x25, 0x0, 0x0, 0x0, 0xfffffffe, 0x4000000]}) 2.544220395s ago: executing program 2 (id=319): r0 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) mkdir(&(0x7f0000000040)='./file2\x00', 0xc1) mkdir(&(0x7f0000000300)='./file2/file0\x00', 0xc2) rename(&(0x7f0000000000)='./file2\x00', &(0x7f0000000080)='./file2/file0\x00') pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1000) r2 = socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) chdir(&(0x7f0000000400)='./file/file0/..//file0\x00') getsockopt$inet_mreqn(r3, 0x0, 0xc, 0x0, &(0x7f0000000100)) setsockopt$inet_mreqn(r4, 0x0, 0x9, &(0x7f0000000140)={@multicast2, @loopback}, 0xc) ioctl$BIOCSHDRCMPLT(r0, 0x80044275, &(0x7f0000000380)=0x2) r5 = socket(0x1b, 0x3, 0x0) sendto$inet6(r5, &(0x7f0000000000)="02fc1dd56d0131fd8c68dfd48fc30d4e", 0xb68, 0x0, 0x0, 0x0) minherit(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r6, 0x0, 0x15, &(0x7f0000000a40)={0x0, {{0x2, 0x0}}, {{0x2, 0x0}}}, 0x108) dup2(r2, r4) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) kevent(0xffffffffffffffff, &(0x7f0000000000), 0x20b89, 0x0, 0xffff3955, 0x0) fork() syz_emit_ethernet(0x5e, &(0x7f0000000a00)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaaaa86dd60f4adf700282c0020010000000000000000000000000000ff0200000000000000000000000000013c0200000000000001020000c910fff5"]) socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x38) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) rmdir(&(0x7f0000000100)='./file0\x00') fstatat(r4, &(0x7f00000000c0)='./file/file0/..//file0\x00', &(0x7f0000000440), 0x34d8ad819382f46d) 2.540179737s ago: executing program 3 (id=328): ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000001800)={0x19, 0x18, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xffffeff8, [0x10, 0x80000000, 0xfffffffa, 0x5]}) mkdir(&(0x7f0000000340)='./file\x00', 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x0) freebsd11_stat(&(0x7f0000001840)='./file/file0/../\x00', 0x0) sysarch$I386_SET_LDT(0x1, 0x0) freebsd11_stat(&(0x7f0000000280)='./file/file0/../\x00', &(0x7f00000002c0)) execve(&(0x7f0000004200)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000005240), 0x0) syz_emit_ethernet(0x76, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60826e030040000000000000000000000e14fc11133f6400fe800000ff07000000000000000000aa3c01000000000000c2040000000403059ebafd8dfb000000890090780000000014371397a886c26732b7a0e8c6544806ff010000000000000000000000000001"]) open(&(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000000, 0x24) r0 = socket(0x1c, 0x1, 0x0) r1 = open(0x0, 0x200, 0x26) aio_suspend(0x0, 0xfffffffffffffd7d, &(0x7f0000001380)={0x9, 0x9}) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) unmount(&(0x7f0000000380)='./file0\x00', 0x400) socket$inet_udplite(0x2, 0x2, 0x88) rename(0x0, 0x0) symlink(&(0x7f0000000080)='.\x00', &(0x7f0000000240)='./file0\x00') pathconf(&(0x7f0000000100)='./file0\x00', 0x4) syz_emit_ethernet(0x36, &(0x7f0000000300)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1, 0x28, 0x0, 0x0, 0x0, 0x6, 0x0, @multicast2, @remote={0xac, 0x14, 0x0}}, @tcp={{0x2, 0x1, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x4}}}}}}) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r2 = openat(r1, &(0x7f0000001880)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20000, 0x4) ioctl$BIOCIMMEDIATE(r2, 0x80044270, &(0x7f00000003c0)=0x3) 2.252449253s ago: executing program 1 (id=103): syz_emit_ethernet(0x56, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00203aff78042000000014000001000007000000ff02000000000000000000000000000188009000000000000000bb020121094debf6f2"]) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x29, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x3, "2e090000ffffffe0"}, 0x30) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r1, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) r3 = setsid() fcntl$lock(r2, 0xb, &(0x7f0000000680)={0x0, 0x1, 0x3d7, 0xffffffff, r3}) socket$inet_sctp(0x2, 0x5, 0x84) kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x801b, 0xffffff, 0xfffffffffffffffe, 0x0, [0xffffffffffffffff, 0x0, 0x0, 0x8000]}], 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x40008000, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0x3}, 0x1c) sendmsg$unix(r2, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[], 0x100}, 0x20180) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0xffffffffffffff80, 0x9, 0x5, 0xa, 0xbf, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) r4 = socket(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040)=0x2, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x10, 0x2, 0x2, @loopback}, 0x10) rfork(0x1000) extattr_list_file(0x0, 0x0, 0x0, 0x0) setpgid(r3, r3) setsockopt$sock_splice(r1, 0xffff, 0x1023, &(0x7f0000000000)={0xffffffffffffffff, 0xab, {0x1, 0x2}}, 0x14) r5 = socket(0x1c, 0x1, 0x0) r6 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$BIOCSHDRCMPLT(r6, 0x80044275, &(0x7f0000000040)=0x1) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) kqueue() open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) 0s ago: executing program 1 (id=103): syz_emit_ethernet(0x56, &(0x7f0000000300)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd60ae029d00203aff78042000000014000001000007000000ff02000000000000000000000000000188009000000000000000bb020121094debf6f2"]) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(0xffffffffffffffff, 0x6, 0x29, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x19, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x3, 0x3, "2e090000ffffffe0"}, 0x30) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r1, 0x0) r2 = open(&(0x7f0000007f80)='./bus\x00', 0x145142, 0x0) r3 = setsid() fcntl$lock(r2, 0xb, &(0x7f0000000680)={0x0, 0x1, 0x3d7, 0xffffffff, r3}) socket$inet_sctp(0x2, 0x5, 0x84) kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x801b, 0xffffff, 0xfffffffffffffffe, 0x0, [0xffffffffffffffff, 0x0, 0x0, 0x8000]}], 0x1, 0x0, 0x0, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x40008000, @ipv4={'\x00', '\xff\xff', @local={0xac, 0x14, 0x0}}, 0x3}, 0x1c) sendmsg$unix(r2, &(0x7f0000001440)={0x0, 0x0, 0x0, 0x0, &(0x7f00000006c0)=ANY=[], 0x100}, 0x20180) ioctl$DIOCRADDTABLES(0xffffffffffffffff, 0xc450443d, &(0x7f0000000200)={{"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", "45c7a3903b2ec85566844c77c9f9b8d3841e1186d26b39d01977a101eb6684c9", 0x5, 0x2}, 0x0, 0xf5c1, 0x40, 0xffffffffffffff80, 0x9, 0x5, 0xa, 0xbf, 0x8}) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) r4 = socket(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x22, &(0x7f0000000040)=0x2, 0x4) connect$inet(r4, &(0x7f00000000c0)={0x10, 0x2, 0x2, @loopback}, 0x10) rfork(0x1000) extattr_list_file(0x0, 0x0, 0x0, 0x0) setpgid(r3, r3) setsockopt$sock_splice(r1, 0xffff, 0x1023, &(0x7f0000000000)={0xffffffffffffffff, 0xab, {0x1, 0x2}}, 0x14) r5 = socket(0x1c, 0x1, 0x0) r6 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x200000, 0x0) ioctl$BIOCSHDRCMPLT(r6, 0x80044275, &(0x7f0000000040)=0x1) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) kqueue() open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.187' (ED25519) to the list of known hosts. ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe005464a000 Expensive callout(9) function: 0xffffffff81a53fc0(0) 0.005840617 s if_delmulti_locked: detaching ifnet instance 0xfffffe005464a000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8e800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d000 vnode_pager_putpages: zero-length write at 0 resid 12288 0xfffffe0077dfd898: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83507aa0 usecount 4, writecount 4, refcount 35 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0054938840 ref 3 pages 264 cleanbuf 32 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe0054946740 (pid 1130, syz-executor, tid 100461) nlink=1, effnlink=1, size=1048576, extsize 0 generation=8e7ec741, uid=0, gid=0, flags=0x20006 ino 74, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8d800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 vnode_pager_putpages: zero-length write at 0 resid 12288 0xfffffe0078887370: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83507aa0 usecount 4, writecount 4, refcount 35 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe0054945528 ref 3 pages 264 cleanbuf 32 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe0054927740 (pid 1218, syz-executor, tid 100553) nlink=1, effnlink=1, size=1048576, extsize 0 generation=857672da, uid=0, gid=0, flags=0x20006 ino 78, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 vnode_pager_putpages: zero-length write at 0 resid 12288 0xfffffe0077e1a6e0: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83507aa0 usecount 4, writecount 4, refcount 12 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe005494d210 ref 3 pages 80 cleanbuf 10 dirtybuf 0 lock type ufs: EXCL by thread 0xfffffe0054951740 (pid 1297, syz-executor, tid 100623) with exclusive waiters pending nlink=1, effnlink=1, size=327680, extsize 0 generation=fde09eca, uid=0, gid=0, flags=0x20006 ino 94, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 if_delmulti_locked: detaching ifnet instance 0xfffffe00788cd800 SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d8c000 proc=1 req=103 state=3 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-i386-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Mar 30 11:23:17 ci-freebsd-i386-4 login[748]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect