last executing test programs: 50.153711487s ago: executing program 1 (id=757): freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff}) cap_rights_limit(r0, &(0x7f0000000580)=[0x20000207fffffc0, 0x400000000000005]) recvmsg(r0, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) setloginclass(0x0) 50.153286311s ago: executing program 1 (id=758): sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x100000000, &(0x7f0000000000)={&(0x7f0000000480)=[{&(0x7f0000000300)="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", 0x17c}, {&(0x7f0000002780)="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", 0xff}, {&(0x7f0000000200)="8b6f98364a0f9dd2c63ae3104b7d529138251284519d4ad7ac176537fdbf58232dc8c443d7bbc6abefc9ce95fa521a97f33067f7a43f2f8f546b5c9ba04d9a2a0368154c73825c7d6e795124451bce7a18348cadca247f881d7cb7563a1f789a", 0x60}, {&(0x7f0000000500)}], 0x4, 0x0}, &(0x7f0000000000), 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x42, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}, {"b76bf11d5d4ff88eab4e7d94dcf5288151f250627b0e1fb0"}}}}}}) syz_emit_ethernet(0x33, &(0x7f0000000200)={@random="b905f0ffffff", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x25, 0x0, 0x1, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x3, 0x8}, {"e3c4fc107f71ed734b"}}}}}}) openat$md(0xffffff9c, &(0x7f0000000100), 0x200, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) cpuset_getaffinity(0x1, 0x6, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) aio_waitcomplete(0x0, &(0x7f0000004080)={0x4272, 0xfffffff7}) r1 = socket$inet6(0x1c, 0x2, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200, 0x14) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x1, './file0\x00'}, 0xa) setsockopt$sock_int(r2, 0xffff, 0x20, &(0x7f00000000c0)=0x8001, 0x4) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0xfffffffe, @loopback}, 0x1c) sendmsg$inet6_sctp(r1, &(0x7f0000000580)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1, 0x9, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c"], 0x1c, 0x82}, 0x8) r3 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) ioctl$BIOCSETF(r3, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='newreno\x00', 0x8) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) socket$inet6_tcp(0x1c, 0x1, 0x0) socket$inet(0x2, 0x5, 0xc0) 49.324769134s ago: executing program 1 (id=763): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = open(&(0x7f00000002c0)='.\x00', 0x4, 0x8) r1 = __specialfd$inotify(0x2, &(0x7f00000005c0)={0x4}, 0x2) r2 = inotify_add_watch_at(r1, r0, &(0x7f0000000280)='.\x00', 0x21000630) r3 = open$dir(&(0x7f0000000700)='./file1\x00', 0xd7848ede797c9e10, 0x0) r4 = socket(0x1b, 0x3, 0x81) sendto$inet6(r4, &(0x7f0000000180)="02090103020000008e4cb277fce00d8f", 0x10, 0x0, 0x0, 0x0) pwritev(r4, &(0x7f00000004c0)=[{&(0x7f00000003c0)="a4404659f5e66946426944a572cea46178f6523a6857901b57619f51ed38b10527ed51c00b19c639231dc0fcbbb201d8d210eeee6462ef17a8f8d8e57a33c08364a85f13da37020e1ee0d96470fa136d6de9e5fd22db124f23ab4523b6eefb22", 0x60}, {&(0x7f0000000440)="921d3cb0344b1e66025cf3a949b832ab8356a94f2b6eb5b7abf082f8731c0eebdee983a6fd301206f7d5d9324c93e5ece82fca3aec0a8564cc7fff6303f96b5c3bbc2be6b2613127a83d6c4b007bb672387c08e4cf9f30098b4a44bdf7c1fbc7ffb31e22ec26d8414acce468bff9", 0x6e}], 0x2, 0x31) inotify_rm_watch(r0, r2) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x4, &(0x7f0000000140), &(0x7f0000000300)=0x4) r5 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setresuid(0xee00, 0xee01, 0xffffffffffffffff) setreuid(0x0, 0xffffffffffffffff) chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x0, &(0x7f0000000380)={0xfffffff7, 0x10000be}) getrlimit(0x2, &(0x7f0000000340)) __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000080)=[0x199, 0xfffd]) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x2d, &(0x7f0000000100)) ppoll(&(0x7f0000000080)=[{r3, 0x8}, {r3, 0x4}, {r5, 0x80}, {r1, 0x8}, {r1, 0xa}, {r3, 0x8}, {r3, 0x40}, {r4, 0x100}], 0x8, &(0x7f0000000000)={0x9, 0xa}, &(0x7f0000000100)={[0x1000, 0x1000, 0x8, 0x401]}, 0x10) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) setsockopt$inet_tcp_buf(r5, 0x6, 0x25, &(0x7f00000001c0)="234ed88a2dd6370276343206aafb2c8daa0c826fe9fa7b1823b2d424b6850b5d07a6ed1f254865a41a5ee1053800610d1cae0ddbf0754cd30e9c9abb3c38d327fa353fe90ce3e1528aa4944024d33298ebe0624769744a69dbab1d75c8764cf666f526c386d01b0a9bae8a1988e1e85bce30ce8ad139a780be3500dd3054363c0c88090cac09f9df4c700a8f3e364d2cbf2cc29eb41917983bd7100cc10804f5c42e1c2d33ae7c1af231e87112d1b2000000000000000000", 0xb8) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r6, 0x6, 0x24, &(0x7f0000000100)='a', 0x1) setsockopt$inet_tcp_buf(r6, 0x6, 0x24, &(0x7f00000004c0)="8e4a6f9ecc1bffeb6a051fcdba06c0f31205c5e1437f2c94186ea57b7f003dd066b01bbeda7042517d5d4b4b1eaa184c7beabc32987b3c3d82ecc983109881c1dadd24d36e4ddbfc4cbc39be7c6d23a934106aa47ca39478c1886771514585cc787da2480d4aa801dc2e0b07b41b08e71a8ad95bb236dcae0eb9654193f720e4b6a6085d729e62586e74e1d46ecb36eca7dc7de99f70e76851", 0x99) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) futimesat(0xffffffffffffffff, 0x0, 0xfffffffffffffffe) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f00000001c0)={0xb, 0xf, 0x3e, &(0x7f0000000580)="ec7b00000900ff2425c3f0a58b519798d25cd0a9cfbc8c96d420d26eaea8bc96417fa1cc0b0308ad536a96cf5c1215ebbff06c47ae1076041157fcfb79d7", 0x0, 0x0, 0x2, 0xfdffff01}) 48.422018489s ago: executing program 1 (id=768): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@random="57001000", @random="c0b42db27f9e", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x67, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@generic={0x11, 0x2, 0x0, "a759442b"}}}}}) mkdirat(0xffffffffffffffff, 0x0, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ftruncate(r0, 0x8531) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) msync(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4) seteuid(0xffffffffffffffff) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000080)={0x19, 0x0, 0x18, &(0x7f0000000000)="ec7b00000900ff2425c1f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0x1000]}) ioctl$CIOCCRYPT(r3, 0xc01c6367, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x38, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000001400)}) setsockopt$inet_int(r1, 0x0, 0x2, &(0x7f0000000200)=0x8, 0x4) writev(r2, 0x0, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000000)=ANY=[@ANYBLOB="8f6f77ede655ff18ffffffff86dd60dcffd900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa02009078000000006006db3efffe2b00fe8000000000000000000000040000aa000000000000000000000000000000010002007300000000fe8000000000000000000000000000aa"]) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$sock_int(r4, 0xffff, 0x400, &(0x7f0000000000)=0x1, 0x42) syz_emit_ethernet(0x4e, &(0x7f00000002c0)={@random="c3b58b132350", @empty, [{[], {0x8100, 0x3, 0x1}}], {@ipv6={0x86dd, {0x0, 0x6, "000100", 0x14, 0x3b, 0x0, @rand_addr="f6ec06afdf466c130afc590bdb9e4ff6", @mcast2, {[], @icmpv6=@ndisc_ns={0x87, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}}}}}}}) recvmsg(r4, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x3981060e1aa124c4) getrusage(0xffffffffffffffff, &(0x7f0000000040)) readlink(0x0, &(0x7f0000000280)=""/16, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r6, 0xc030636a, &(0x7f0000000080)={0x17, 0x8, 0x6, &(0x7f0000000180)="04b17c7c0000", 0x0, 0x0, 0x7fffffff, 0xfdffff85, [0x1, 0x5, 0xffc, 0x4000]}) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 47.601033532s ago: executing program 1 (id=772): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 46.736248582s ago: executing program 1 (id=778): r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_EVENT(r0, 0x84, 0x1e, &(0x7f0000000000)={0x0, 0x1, 0x45}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080)={@in6={{0x1c, 0x1c, 0x1, 0x3fc5, @mcast1, 0x4000000}}, r1, 0xfffffffa, 0x1a4, 0x102, 0x88, 0xfffa, 0xd4}, 0x98) fcntl$getflags(r0, 0x1) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=""/90, &(0x7f00000001c0)=0x5a) r2 = getpid() procctl$PROC_SPROTECT(0x0, r2, 0x1, &(0x7f0000000200)=0x8) r3 = getppid() r4 = open(&(0x7f0000000240)='./file0\x00', 0x8, 0xd1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRESSES(r0, 0x84, 0x8003, &(0x7f00000002c0)={r1, &(0x7f0000000280)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @empty}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @local}]}, &(0x7f0000000300)=0x8) sigqueue(r3, 0x11, @sival_ptr=0x3) setsockopt$inet_sctp_SCTP_CONNECT_X(r0, 0x84, 0x8007, &(0x7f00000003c0)={0xd, &(0x7f0000000340)=[@in6={0x1c, 0x1c, 0x3, 0x0, @rand_addr="a1888362d8c44b89851c474f10062136", 0xd}, @in={0x10, 0x2, 0x0, @remote={0xac, 0x14, 0x0}}, @in={0x10, 0x2, 0x3, @remote={0xac, 0x14, 0x0}}, @in6={0x1c, 0x1c, 0x1, 0x7, @empty, 0x3}]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000440)=0x6, 0x4) getsockopt$inet_sctp_SCTP_EVENT(r4, 0x84, 0x1e, &(0x7f0000000480)={r5, 0x6, 0x1}, &(0x7f00000004c0)=0x8) getsockopt$inet6_sctp_SCTP_MAX_BURST(r4, 0x84, 0x19, &(0x7f0000000500)={r6, 0x6}, &(0x7f0000000540)=0x8) r8 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTO_ASCONF(r8, 0x84, 0x18, &(0x7f0000000580)=0xfffffff7, 0x4) r9 = open(&(0x7f00000005c0)='./file0\x00', 0x800, 0x18b) ioctl$UI_SET_PHYS(r4, 0x2000556c) sigtimedwait(&(0x7f0000000600)={[0x651, 0xe5, 0x7, 0x7]}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @sival_int, @poll}, &(0x7f0000000680)={0x0, 0x6}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f00000006c0)={0xa1, 0x0, 0x3, 0x4, r5}, &(0x7f0000000700)=0x10) aio_write(&(0x7f0000000900)={r0, 0x800, &(0x7f0000000740)="e296fd8ccc72fb91a6ff2dc544d574a87a9a75c706be0ee009d62279887e7f5e657e90d81d9905364a23addce233a8277eaaf7f456c481ea1f052722f27baad6ed57bbbe12efb26f3726bd80d92c912ebfa5f6767e96ceb6b74095a741e8edaa7c81eead10a648a3d68c4e7a59fe4a04b366ea609d185a74185a23cd5c024a8dfe7a3a1a719e5a07121356e26deaac79049d7fa3d94e", 0x96, [0x7, 0x7], 0xcc3, 0x20, 0x18, {0x3, 0x80, &(0x7f0000000800)="ef0f79b3630bee19a3de0872ffe2d5b668d4785ce435c1fdbe6a419f0e6bd90888fa4d2fd9aa0301571ab8701809ea7c49b88a5fba9cbe316e5abdb3de619ceadbe8d33c69dde93a67b35cf4387b562ff81c610a2010bfe97438351105e8b2c2b4b0606613589b837a96a39bfa7356d7e567393122d54c4e42188335074bb8697930d23804d7826d07a44c097cb0f6950e88d7a6dbae9ee1da76ee6fe119321192d04728594e43e2583cd387e4b7480924ab501350559092b93e0b21bf9dc4f0fb9e349676aedb7b3866d29c9dc33bd8a133f3e7bb1303372cb82e323cc2636c10c3f8a6baa74f43932391830227979f06693c438630f38e9e"}, {0x3, 0x20, @sigval_int=0x9, @ke_flags=0x48}}) procctl$PROC_NO_NEW_PRIVS_CTL(0x0, r3, 0x13, &(0x7f0000000980)=0x7) setsockopt$inet_tcp_int(r9, 0x6, 0x4, &(0x7f00000009c0)=0x9, 0x4) ioctl$EVIOCRMFF(r9, 0x20044581) ioctl$GETFKEY(r4, 0xc0146b00, &(0x7f0000000a00)={0x401, "1373e6de9e644a9af03a689fa0c3fce0", 0x4}) getsockopt$inet6_sctp_SCTP_NODELAY(r9, 0x84, 0x4, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x14, &(0x7f0000000ac0)={0x4, [0x1000, 0x3, 0x3ff, 0x5]}, &(0x7f0000000b00)=0xc) setsockopt$inet6_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x901, &(0x7f0000000b40)={r7, 0x8, 0x1, [0x0]}, 0xa) setsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x22, &(0x7f0000000b80)={0xf, 0x3, r10}, 0xc) 31.701082548s ago: executing program 32 (id=778): r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_EVENT(r0, 0x84, 0x1e, &(0x7f0000000000)={0x0, 0x1, 0x45}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080)={@in6={{0x1c, 0x1c, 0x1, 0x3fc5, @mcast1, 0x4000000}}, r1, 0xfffffffa, 0x1a4, 0x102, 0x88, 0xfffa, 0xd4}, 0x98) fcntl$getflags(r0, 0x1) getsockopt$inet_tcp_buf(0xffffffffffffffff, 0x6, 0x0, &(0x7f0000000140)=""/90, &(0x7f00000001c0)=0x5a) r2 = getpid() procctl$PROC_SPROTECT(0x0, r2, 0x1, &(0x7f0000000200)=0x8) r3 = getppid() r4 = open(&(0x7f0000000240)='./file0\x00', 0x8, 0xd1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRESSES(r0, 0x84, 0x8003, &(0x7f00000002c0)={r1, &(0x7f0000000280)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @empty}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @local}]}, &(0x7f0000000300)=0x8) sigqueue(r3, 0x11, @sival_ptr=0x3) setsockopt$inet_sctp_SCTP_CONNECT_X(r0, 0x84, 0x8007, &(0x7f00000003c0)={0xd, &(0x7f0000000340)=[@in6={0x1c, 0x1c, 0x3, 0x0, @rand_addr="a1888362d8c44b89851c474f10062136", 0xd}, @in={0x10, 0x2, 0x0, @remote={0xac, 0x14, 0x0}}, @in={0x10, 0x2, 0x3, @remote={0xac, 0x14, 0x0}}, @in6={0x1c, 0x1c, 0x1, 0x7, @empty, 0x3}]}, &(0x7f0000000400)=0x8) setsockopt$inet_sctp_SCTP_NODELAY(r0, 0x84, 0x4, &(0x7f0000000440)=0x6, 0x4) getsockopt$inet_sctp_SCTP_EVENT(r4, 0x84, 0x1e, &(0x7f0000000480)={r5, 0x6, 0x1}, &(0x7f00000004c0)=0x8) getsockopt$inet6_sctp_SCTP_MAX_BURST(r4, 0x84, 0x19, &(0x7f0000000500)={r6, 0x6}, &(0x7f0000000540)=0x8) r8 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_AUTO_ASCONF(r8, 0x84, 0x18, &(0x7f0000000580)=0xfffffff7, 0x4) r9 = open(&(0x7f00000005c0)='./file0\x00', 0x800, 0x18b) ioctl$UI_SET_PHYS(r4, 0x2000556c) sigtimedwait(&(0x7f0000000600)={[0x651, 0xe5, 0x7, 0x7]}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @sival_int, @poll}, &(0x7f0000000680)={0x0, 0x6}) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r4, 0x84, 0x21, &(0x7f00000006c0)={0xa1, 0x0, 0x3, 0x4, r5}, &(0x7f0000000700)=0x10) aio_write(&(0x7f0000000900)={r0, 0x800, &(0x7f0000000740)="e296fd8ccc72fb91a6ff2dc544d574a87a9a75c706be0ee009d62279887e7f5e657e90d81d9905364a23addce233a8277eaaf7f456c481ea1f052722f27baad6ed57bbbe12efb26f3726bd80d92c912ebfa5f6767e96ceb6b74095a741e8edaa7c81eead10a648a3d68c4e7a59fe4a04b366ea609d185a74185a23cd5c024a8dfe7a3a1a719e5a07121356e26deaac79049d7fa3d94e", 0x96, [0x7, 0x7], 0xcc3, 0x20, 0x18, {0x3, 0x80, &(0x7f0000000800)="ef0f79b3630bee19a3de0872ffe2d5b668d4785ce435c1fdbe6a419f0e6bd90888fa4d2fd9aa0301571ab8701809ea7c49b88a5fba9cbe316e5abdb3de619ceadbe8d33c69dde93a67b35cf4387b562ff81c610a2010bfe97438351105e8b2c2b4b0606613589b837a96a39bfa7356d7e567393122d54c4e42188335074bb8697930d23804d7826d07a44c097cb0f6950e88d7a6dbae9ee1da76ee6fe119321192d04728594e43e2583cd387e4b7480924ab501350559092b93e0b21bf9dc4f0fb9e349676aedb7b3866d29c9dc33bd8a133f3e7bb1303372cb82e323cc2636c10c3f8a6baa74f43932391830227979f06693c438630f38e9e"}, {0x3, 0x20, @sigval_int=0x9, @ke_flags=0x48}}) procctl$PROC_NO_NEW_PRIVS_CTL(0x0, r3, 0x13, &(0x7f0000000980)=0x7) setsockopt$inet_tcp_int(r9, 0x6, 0x4, &(0x7f00000009c0)=0x9, 0x4) ioctl$EVIOCRMFF(r9, 0x20044581) ioctl$GETFKEY(r4, 0xc0146b00, &(0x7f0000000a00)={0x401, "1373e6de9e644a9af03a689fa0c3fce0", 0x4}) getsockopt$inet6_sctp_SCTP_NODELAY(r9, 0x84, 0x4, &(0x7f0000000a40), &(0x7f0000000a80)=0x4) getsockopt$inet_sctp_SCTP_HMAC_IDENT(r4, 0x84, 0x14, &(0x7f0000000ac0)={0x4, [0x1000, 0x3, 0x3ff, 0x5]}, &(0x7f0000000b00)=0xc) setsockopt$inet6_sctp_SCTP_RESET_STREAMS(r8, 0x84, 0x901, &(0x7f0000000b40)={r7, 0x8, 0x1, [0x0]}, 0xa) setsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x22, &(0x7f0000000b80)={0xf, 0x3, r10}, 0xc) 12.220991969s ago: executing program 2 (id=907): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0xfffffdc3) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0x6000) r2 = semget$private(0x0, 0x7, 0x3c0) semop(r2, 0x0, 0x0) semop(r2, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r5 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r4, 0x29, 0x23, 0x0, 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457", 0x3f) extattr_get_file(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f0000000300)='(*,\'$[:\x00\xd0\xaf\x022\xa0\xb59\xdd\xe0\a\x8a:\x9e8d\x88\v\xc3g\x8eU\x96e\xf1\xb8\xa8\x96\tc3\x85\xe7K\x0fU\xc7q\xa3\x97QH\xfe\xe2G?\xb1\xe4\x16\xcc\r\x92W\xe2 n\f\x10j\xf0\xbb\xa3\x8b\nF}\f>\x80w\xe7\xcf\x05\xbf6\x02\x8e\xda\x99\x0f\x03\xa5\x1d?\xecS\x8e\x86&M\xf0\xd7\x10W', &(0x7f0000000480)=""/101, 0x65) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f00000002c0), 0x5, 0x4) syz_emit_ethernet(0x11b, &(0x7f0000000540)=ANY=[]) 12.213229547s ago: executing program 3 (id=908): r0 = socket(0x1c, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000002b80)={&(0x7f00000000c0)=@file={0xa, 0x1, './file0\x00'}, 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffb1, 0x1}, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) aio_write(&(0x7f00000001c0)={r1, 0xd, 0x0, 0x0, [0x299, 0x5], 0x3, 0x5, 0x0, {0x7, 0xfb, 0x0}, {0x4, 0x1e, @sigval_ptr=0x9}}) aio_error(&(0x7f0000000440)={0xffffffffffffffff, 0x5, 0x0, 0x0, [0x40, 0x9], 0x6, 0x1, 0x9, {0x20000004, 0x2, 0x0}, {0x3, 0xb, @sival_int=0x3}}) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x9d84, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x5, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x4, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x1, 0x8, 0xc, 0x8]}, {0x4005c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0xfffffffc, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x7f33c58a, 0x2, 0x58, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x800, 0x7f, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x2, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x1, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124446, 0x7, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x42, 0x225, 0x81, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0xfffe, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0xb730, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xffffdffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd4, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff8, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x3, 0x7, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xe, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc8, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x40]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x1, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x9, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x402, 0x5, 0xfffffffc, 0x0, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x7, 0x81, 0x8, 0x2, 0x4, 0x6, 0x2, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x1360000, 0x8, 0x1ff, 0x7ff, 0xa, 0x0, 0xfffffffd, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1002, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x4, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x41a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xdc]}, {0x6, [0x3, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x2, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xc, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0xffe, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x5, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x4, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x8, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x1000008, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x6, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x2, 0x404, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x4, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0xe0, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x1, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x3, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x5, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0xfffd, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) r2 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r3, r2, &(0x7f0000000280)='.\x00', 0x21000630) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x10c44, 0x140) r6 = socket(0x26, 0x2, 0x0) setsockopt$sock_int(r6, 0xffff, 0x1004, 0x0, 0x0) faccessat(r5, &(0x7f0000000040)='./file0\x00', 0x2, 0x4000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000001940)={@in6={{0x1c, 0x1c, 0x2, 0x20000000, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1000}}}, &(0x7f0000001a00)=0x84) r7 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r7, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) rfork(0x10050) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) bind(0xffffffffffffffff, &(0x7f0000000040)=@in6={0x22, 0x1c, 0x3, 0x300, @mcast1}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/4096, 0x1000}, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getsockname$unix(0xffffffffffffff9c, &(0x7f0000000140)=@abs={0x8}, &(0x7f0000000080)=0x8) 11.844468379s ago: executing program 4 (id=852): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, r1, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r3 = kqueue() kevent(r3, &(0x7f00000000c0)=[{0x4, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x743a]}], 0x1, 0x0, 0x0, 0x0) r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x02/file1/file0\x00', &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(r4, &(0x7f0000000640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_int(r5, 0x29, 0x13, 0x0, &(0x7f0000000040)) r6 = socket(0x2, 0x1, 0x0) recvmsg(r6, &(0x7f0000001280)={&(0x7f0000000000)=@un=@abs={0x8}, 0x8, &(0x7f0000001200)=[{&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000080)=""/42, 0x2a}], 0x3, &(0x7f0000001240)=""/42, 0x2a}, 0x82) getsockopt$inet6_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) accept4$inet6(r5, 0x0, &(0x7f00000012c0), 0x0) setreuid(0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x2d, &(0x7f0000000100)) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 10.079647372s ago: executing program 2 (id=910): sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x100000000, &(0x7f0000000000)={&(0x7f0000000480)=[{&(0x7f0000000300)="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", 0x17c}, {&(0x7f0000002780)="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", 0xff}, {&(0x7f0000000200)="8b6f98364a0f9dd2c63ae3104b7d529138251284519d4ad7ac176537fdbf58232dc8c443d7bbc6abefc9ce95fa521a97f33067f7a43f2f8f546b5c9ba04d9a2a0368154c73825c7d6e795124451bce7a18348cadca247f881d7cb7563a1f789a", 0x60}, {&(0x7f0000000500)="306cdf54b8a36fc88f6d74522c362ff3f1389be682a75b6debf72a40c18f9b6bca27b77e2db1d1716d73ce296858d932e410ebfa31c5e01715dee2b776f7430953e424d84cbf0f3ddf4fec1015a8fe627ad9f7ae7915d07cad7addf893c41520df60db7e6ed7b6cae9aa17e95bd94d3b3fc6bbce36700f", 0x77}], 0x4, 0x0}, &(0x7f0000000000), 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x42, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}, {"b76bf11d5d4ff88eab4e7d94dcf5288151f250627b0e1fb0"}}}}}}) syz_emit_ethernet(0x33, &(0x7f0000000200)={@random="b905f0ffffff", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x25, 0x0, 0x1, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x3, 0x8}, {"e3c4fc107f71ed734b"}}}}}}) openat$md(0xffffff9c, &(0x7f0000000100), 0x200, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) cpuset_getaffinity(0x1, 0x6, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) aio_waitcomplete(0x0, &(0x7f0000004080)={0x4272, 0xfffffff7}) r1 = socket$inet6(0x1c, 0x2, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200, 0x14) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x1, './file0\x00'}, 0xa) setsockopt$sock_int(r2, 0xffff, 0x20, &(0x7f00000000c0)=0x8001, 0x4) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0xfffffffe, @loopback}, 0x1c) sendmsg$inet6_sctp(r1, &(0x7f0000000580)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1, 0x9, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c"], 0x1c, 0x82}, 0x8) r3 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) ioctl$BIOCSETF(r3, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='newreno\x00', 0x8) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) socket$inet6_tcp(0x1c, 0x1, 0x0) socket$inet(0x2, 0x5, 0xc0) 9.946069619s ago: executing program 3 (id=911): mkdir(&(0x7f0000000240)='./file0\x00', 0x1b) r0 = open(&(0x7f0000000180)='.\x00', 0x8000, 0x4) r1 = __specialfd$inotify(0x2, &(0x7f0000000100), 0x4) syz_emit_ethernet(0x46, &(0x7f0000000300)=ANY=[@ANYBLOB="ffffffffffffaaaaaaaaaabb0800450000380000000000019078ac1400bbe0000001030990780000fffd450000040000000007880000e0000001000000e06cacac773109ed741fb4ada6af4971baa395b05cd104df1c544b37b2b692bc6d6b8004a2d4eb5397f39aef"]) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='.\x00', 0x21000630) rmdir(&(0x7f0000000040)='./file0\x00') bind$inet(r0, &(0x7f00000002c0)={0x10, 0x2, 0x3, @loopback}, 0x10) connect$inet(r0, &(0x7f0000000400)={0x10, 0x2, 0x0, @loopback}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3, @rand_addr=0x75}, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x10, @empty, 0xfffffffb}, 0x1c) rfork(0x85000) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000200)=0x8, 0x4) writev(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000000)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd60dcffd900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa02b39f78000000006006db3efffe2b00fe8000000000000000000000000000aa000000000000000000000000000000012b02007300000000fe8000000000010000000000000000aa"]) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x100000000, 0x0, &(0x7f0000000000), 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x1) openat$md(0xffffff9c, &(0x7f00000000c0), 0x200, 0x0) getrusage(0xffffffffffffffff, 0x0) r3 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x6, @mcast1, 0xe7f}, 0x1c) readlink(0x0, &(0x7f0000000280)=""/16, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) clock_nanosleep(0x2, 0x0, &(0x7f0000000080)={0x9, 0x8}, 0x0) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x8000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x28, 0x8, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfdffff85, [0x1, 0x4005, 0xffc, 0x4000]}) 9.567237298s ago: executing program 4 (id=852): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, r1, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r3 = kqueue() kevent(r3, &(0x7f00000000c0)=[{0x4, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x743a]}], 0x1, 0x0, 0x0, 0x0) r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x02/file1/file0\x00', &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(r4, &(0x7f0000000640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_int(r5, 0x29, 0x13, 0x0, &(0x7f0000000040)) r6 = socket(0x2, 0x1, 0x0) recvmsg(r6, &(0x7f0000001280)={&(0x7f0000000000)=@un=@abs={0x8}, 0x8, &(0x7f0000001200)=[{&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000080)=""/42, 0x2a}], 0x3, &(0x7f0000001240)=""/42, 0x2a}, 0x82) getsockopt$inet6_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) accept4$inet6(r5, 0x0, &(0x7f00000012c0), 0x0) setreuid(0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x2d, &(0x7f0000000100)) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 7.731606945s ago: executing program 0 (id=912): r0 = socket(0x1c, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000002b80)={&(0x7f00000000c0)=@file={0xa, 0x1, './file0\x00'}, 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffb1, 0x1}, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) aio_write(&(0x7f00000001c0)={r1, 0xd, 0x0, 0x0, [0x299, 0x5], 0x3, 0x5, 0x0, {0x7, 0xfb, 0x0}, {0x4, 0x1e, @sigval_ptr=0x9}}) aio_error(&(0x7f0000000440)={0xffffffffffffffff, 0x5, 0x0, 0x0, [0x40, 0x9], 0x6, 0x1, 0x9, {0x20000004, 0x2, 0x0}, {0x3, 0xb, @sival_int=0x3}}) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x9d84, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x5, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x4, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x1, 0x8, 0xc, 0x8]}, {0x4005c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0xfffffffc, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x7f33c58a, 0x2, 0x58, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x800, 0x7f, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x2, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x1, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124446, 0x7, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x42, 0x225, 0x81, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0xfffe, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0xb730, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xffffdffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd4, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff8, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x3, 0x7, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xe, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc8, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x40]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x1, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x9, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x402, 0x5, 0xfffffffc, 0x0, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x7, 0x81, 0x8, 0x2, 0x4, 0x6, 0x2, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x1360000, 0x8, 0x1ff, 0x7ff, 0xa, 0x0, 0xfffffffd, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1002, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x4, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x41a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xdc]}, {0x6, [0x3, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x2, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xc, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0xffe, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x5, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x4, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x8, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x1000008, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x6, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x2, 0x404, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x4, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0xe0, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x1, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x3, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x5, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0xfffd, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) r2 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r3, r2, &(0x7f0000000280)='.\x00', 0x21000630) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) r5 = open(&(0x7f0000000000)='./file0\x00', 0x10c44, 0x140) r6 = socket(0x26, 0x2, 0x0) setsockopt$sock_int(r6, 0xffff, 0x1004, 0x0, 0x0) faccessat(r5, &(0x7f0000000040)='./file0\x00', 0x2, 0x4000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000001940)={@in6={{0x1c, 0x1c, 0x2, 0x20000000, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x1000}}}, &(0x7f0000001a00)=0x84) r7 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) pwritev(r7, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) rfork(0x10050) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) bind(0xffffffffffffffff, &(0x7f0000000040)=@in6={0x22, 0x1c, 0x3, 0x300, @mcast1}, 0xc) recvmsg(0xffffffffffffffff, &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=""/4096, 0x1000}, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) getsockname$unix(0xffffffffffffff9c, &(0x7f0000000140)=@abs={0x8}, &(0x7f0000000080)=0x8) 7.724493108s ago: executing program 2 (id=913): sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x100000000, &(0x7f0000000000)={&(0x7f0000000480)=[{&(0x7f0000000300)="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", 0x17b}, {&(0x7f0000002780)="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", 0xff}, {&(0x7f0000000200)="8b6f98364a0f9dd2c63ae3104b7d529138251284519d4ad7ac176537fdbf58232dc8c443d7bbc6abefc9ce95fa521a97f33067f7a43f2f8f546b5c9ba04d9a2a0368154c73825c7d", 0x48}, {&(0x7f0000000500)="306cdf54b8a36fc88f6d74522c362ff3f1389be682a75b6debf72a40c18f9b6bca27b77e2db1d1716d73ce296858d932e410ebfa31c5e01715dee2b776f7430953e424d84cbf0f3ddf4fec1015a8fe627ad9f7ae7915d07cad7addf893c41520df60db7e6ed7b6cae9aa17e95bd94d3b3fc6bbce36700fbe467d1951995526848de710c43aeb2f61", 0x88}], 0x4, 0x0}, &(0x7f0000000000), 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x42, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}, {"b76bf11d5d4ff88eab4e7d94dcf5288151f250627b0e1fb0"}}}}}}) syz_emit_ethernet(0x3c, &(0x7f0000000200)={@random="b905f0ffffff", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2e, 0x0, 0x1, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x3, 0x8}, {"e3c4fc107f71ed734b5547194172bf7adeb4"}}}}}}) openat$md(0xffffff9c, &(0x7f0000000100), 0x200, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) cpuset_getaffinity(0x1, 0x6, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) aio_waitcomplete(0x0, &(0x7f0000004080)={0x4272, 0xfffffff7}) r1 = socket$inet6(0x1c, 0x2, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200, 0x14) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x1, './file0\x00'}, 0xa) setsockopt$sock_int(r2, 0xffff, 0x20, &(0x7f00000000c0)=0x8001, 0x4) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0xfffffffe, @loopback}, 0x1c) sendmsg$inet6_sctp(r1, &(0x7f0000000580)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1, 0x9, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c"], 0x1c, 0x82}, 0x8) r3 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) ioctl$BIOCSETF(r3, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='newreno\x00', 0x8) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 7.615396664s ago: executing program 3 (id=914): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7ffffffd, 0x3, 0x0, 0x8000, 0x5, 0x37d, 0x0, 0x1, 0x0, 0x0, [0x0, 0x2, 0x100007ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xb32a, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000, 0xfffffffe, 0x0, 0x2000e122, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0xf, 0xfffffffd, 0xdbd, 0x3ff, 0x11, 0x1, 0x0, 0xa7, 0xc37b, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x941, 0x0, 0x200001, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0xfffffffe, 0xeffffffc, 0x0, 0x8, 0x0, 0x0, 0x40, 0xffffffff, 0x80000000, 0x7, 0x1, 0x1000, 0xfffffffc, 0x2, 0x10001, 0x0, 0x0, 0x7fed, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffe, 0x6, 0x0, 0x0, 0x40004, 0xfffffffe, 0x0, 0x0, 0xffffffff, 0x0, 0xffffffff]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x200201, 0x85) aio_write(0x0) fhopen(0x0, 0x40000) aio_cancel(r1, 0x0) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000040)=@in={0x10, 0x2, 0xffffffffffffffff, @remote}, 0x0, 0x20000000) fchdir(r2) open(&(0x7f0000000980)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x611, 0x20) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') rename(&(0x7f00000012c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000180)='./file1\x00') open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) mkdir(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4a) r3 = socket(0x1c, 0x1, 0x0) r4 = socket$inet6_udplite(0x1c, 0x2, 0x88) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_int(r5, 0x0, 0x2, &(0x7f0000000200)=0x8, 0x4) msync(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2) recvmsg(r5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)=""/191, 0xbf}], 0x1, 0x0}, 0x40043) writev(r6, &(0x7f0000004580)=[{&(0x7f0000004300)="d634b458fd082e2b56da5dfe846f90ffa775a78e992099e5fea099e7e5ac9a", 0x1f}, {&(0x7f0000004340)="8827c39cca08e45befc258949dacf5dc766c9cbe96a84d51aeb60cfb1e2242e11166443e613aaae19209aeee32c6728712567ac8a8196de65c0e70eed56c0d", 0x3f}, {&(0x7f00000043c0)="d874c52c", 0x4}], 0x3) r7 = socket$inet6(0x1c, 0x2, 0x0) sendmsg$inet6_sctp(r7, &(0x7f00000001c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0a7e323a55d965957a443f400731bb73"}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="140000002900000015"], 0x14}, 0x0) sendmsg(r4, &(0x7f0000000340)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000002900000017"], 0x1c}, 0x2008a) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 7.219322392s ago: executing program 4 (id=852): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, r1, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r3 = kqueue() kevent(r3, &(0x7f00000000c0)=[{0x4, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x743a]}], 0x1, 0x0, 0x0, 0x0) r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x02/file1/file0\x00', &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(r4, &(0x7f0000000640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_int(r5, 0x29, 0x13, 0x0, &(0x7f0000000040)) r6 = socket(0x2, 0x1, 0x0) recvmsg(r6, &(0x7f0000001280)={&(0x7f0000000000)=@un=@abs={0x8}, 0x8, &(0x7f0000001200)=[{&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000080)=""/42, 0x2a}], 0x3, &(0x7f0000001240)=""/42, 0x2a}, 0x82) getsockopt$inet6_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) accept4$inet6(r5, 0x0, &(0x7f00000012c0), 0x0) setreuid(0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x2d, &(0x7f0000000100)) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 5.247947276s ago: executing program 0 (id=915): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000680)={@local, @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x18, 0x0, 0x0, @rand_addr="eee21f0000003c00000500004c58053b", @local={0xfe, 0x80, '\x00', 0x0}, {[@hopopts={0x0, 0x0, '\x00', [@pad1]}, @hopopts={0x2b}]}}}}}) r1 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2, 0x3, @multicast2}, 0x10) rfork(0x3000) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 5.240678437s ago: executing program 2 (id=916): sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x100000000, &(0x7f0000000000)={&(0x7f0000000480)=[{&(0x7f0000000300)="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", 0x17c}, {&(0x7f0000002780)="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", 0xff}, {&(0x7f0000000200)="8b6f98364a0f9dd2c63ae3104b7d529138251284519d4ad7ac176537fdbf58232dc8c443d7bbc6abefc9ce95fa521a97f33067f7a43f2f8f546b5c9ba04d9a2a0368154c73825c7d6e795124451bce7a18348cadca247f881d7cb7563a1f789a", 0x60}, {&(0x7f0000000500)="306cdf54b8a36fc88f6d74522c362ff3f1389be682a75b6debf72a40c18f9b6bca27b77e2db1d1716d73ce296858d932e410ebfa31c5e01715dee2b776f7430953e424d84cbf0f3ddf4fec1015a8fe627ad9f7ae7915d07cad7addf893c41520df60db7e6ed7b6cae9aa17e95bd94d3b3fc6bbce36700fbe467d1951995526848de710c4", 0x84}], 0x4, 0x0}, &(0x7f0000000000), 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x42, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}, {"b76bf11d5d4ff88eab4e7d94dcf5288151f250627b0e1fb0"}}}}}}) syz_emit_ethernet(0x33, &(0x7f0000000200)={@random="b905f0ffffff", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x25, 0x0, 0x1, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x3, 0x8}, {"e3c4fc107f71ed734b"}}}}}}) openat$md(0xffffff9c, &(0x7f0000000100), 0x200, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) cpuset_getaffinity(0x1, 0x6, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) aio_waitcomplete(0x0, &(0x7f0000004080)={0x4272, 0xfffffff7}) r1 = socket$inet6(0x1c, 0x2, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200, 0x14) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x1, './file0\x00'}, 0xa) setsockopt$sock_int(r2, 0xffff, 0x20, &(0x7f00000000c0)=0x8001, 0x4) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0xfffffffe, @loopback}, 0x1c) sendmsg$inet6_sctp(r1, &(0x7f0000000580)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1, 0x9, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c"], 0x1c, 0x82}, 0x8) r3 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) ioctl$BIOCSETF(r3, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='newreno\x00', 0x8) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) socket$inet6_tcp(0x1c, 0x1, 0x0) socket$inet(0x2, 0x5, 0xc0) 5.201747186s ago: executing program 3 (id=917): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@random="57001000", @random="c0b42db27f9e", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x67, 0x0, 0x1, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@generic={0x11, 0x2, 0x0, "a759442b"}}}}}) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ftruncate(r1, 0x8531) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) msync(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4) seteuid(0xffffffffffffffff) setgroups(0x4000000000000287, &(0x7f0000000000)=[0xffffffffffffffff]) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x19, 0x0, 0x18, &(0x7f0000000000)="ec7b00000900ff2425c1f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0x1000]}) ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x38, &(0x7f0000000200), 0x0, 0x0, &(0x7f0000001400)}) setsockopt$inet_int(r2, 0x0, 0x2, &(0x7f0000000200)=0x8, 0x4) writev(r3, 0x0, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000000)=ANY=[@ANYBLOB="8f6f77ede655ff18ffffffff86dd60dcffd900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa02009078000000006006db3efffe2b00fe8000000000000000000000040000aa000000000000000000000000000000010002007300000000fe8000000000000000000000000000aa"]) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$sock_int(r5, 0xffff, 0x400, &(0x7f0000000000)=0x1, 0x42) syz_emit_ethernet(0x4e, &(0x7f00000002c0)={@random="c3b58b132350", @empty, [{[], {0x8100, 0x3, 0x1}}], {@ipv6={0x86dd, {0x0, 0x6, "000100", 0x14, 0x3b, 0x0, @rand_addr="f6ec06afdf466c130afc590bdb9e4ff6", @mcast2, {[], @icmpv6=@ndisc_ns={0x87, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}}}}}}}) recvmsg(r5, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x3981060e1aa124c4) getrusage(0xffffffffffffffff, &(0x7f0000000040)) readlink(0x0, &(0x7f0000000280)=""/16, 0x10) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) r7 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r7, 0xc030636a, &(0x7f0000000080)={0x17, 0x8, 0x6, &(0x7f0000000180)="04b17c7c0000", 0x0, 0x0, 0x7fffffff, 0xfdffff85, [0x1, 0x5, 0xffc, 0x4000]}) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 5.109411716s ago: executing program 0 (id=918): r0 = open(&(0x7f00000002c0)='.\x00', 0x4, 0x8) r1 = inotify_add_watch_at(0xffffffffffffffff, r0, &(0x7f0000000280)='.\x00', 0x21000630) r2 = socket(0x1b, 0x3, 0x81) sendto$inet6(r2, &(0x7f0000000180)="02090103020000008e4cb277fce00d8f", 0x10, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f00000004c0)=[{&(0x7f00000003c0)="a4404659f5e66946426944a572cea46178f6523a6857901b57619f51ed38b10527ed51c00b19c639231dc0fcbbb201d8d210eeee6462ef17a8f8d8e57a33c08364a85f13da37020e1ee0d96470fa136d6de9e5fd22db124f23ab4523b6eefb22", 0x60}, {&(0x7f0000000440)="921d3cb0344b1e66025cf3a949b832ab8356a94f2b6eb5b7abf082f8731c0eebdee983a6fd301206f7d5d9324c93e5ece82fca3aec0a8564cc7fff6303f96b5c3bbc2be6b2613127a83d6c4b007bb672387c08e4cf9f30098b4a44bdf7c1fbc7ffb31e22ec26d8414acce468bff9", 0x6e}], 0x2, 0x31) inotify_rm_watch(r0, r1) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x4, &(0x7f0000000140), &(0x7f0000000300)=0x4) r3 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setresuid(0xee00, 0xee01, 0xffffffffffffffff) getsockopt$inet6_sctp_SCTP_RTOINFO(r2, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x2, 0x10, 0x9017}, &(0x7f0000000380)=0x10) setreuid(0x0, 0xffffffffffffffff) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x40, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) shm_unlink(&(0x7f0000000000)='./file0\x00') chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x5, &(0x7f0000000000)={0x10000000000b35d, 0x92}) __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000080)=[0x199, 0xfffd]) r4 = semget$private(0x0, 0x1, 0x80) kevent(0xffffffffffffffff, &(0x7f0000000540)=[{0xc8, 0xfffffffffffffffe, 0x4021, 0x42, 0xffffffffffffffff, 0x0, [0x8, 0x8000000000080003]}], 0x1, 0x0, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff9, 0x17, 0x10}], 0x29f, 0x0, 0x8001, 0x0) __semctl$GETNCNT(r4, 0x3, 0x3) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x2d, &(0x7f0000000100)) ppoll(&(0x7f0000000080)=[{r3, 0x100}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x4}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0xa}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x40}, {r0, 0x1}, {r2, 0x100}], 0x9, &(0x7f0000000000)={0x9, 0xa}, &(0x7f0000000100)={[0x1000, 0x1000, 0x8, 0x401]}, 0x10) preadv(r2, &(0x7f00000007c0)=[{&(0x7f0000000800)=""/79, 0x4f}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/10, 0xa}, {&(0x7f0000000600)=""/159, 0x9f}, {&(0x7f00000006c0)=""/220, 0xdc}], 0x5, 0x5f2) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) setsockopt$inet_tcp_buf(r3, 0x6, 0x25, &(0x7f00000001c0)="234ed88a2dd63702763432e3a9fb2c8daa0c826fe9fa7b1823b2d424b6850b5d07a6ed1f254865a41a5ee1053800610d1cae0ddbf0754cd30e9c9abb3c38d327fa353fe90ce3e1528aa4944024d33298ebe0624769744a69dbab1d75c8764cf666f526c386d01b0a9bae8a1988a5e85bce30ce8ad139a780be35f4b37e2ae106612857a1dd3054363c0d88090cac09f9489e700a8f3e364d2cbf2cc29eb41917983bd7100cc10804f5c42e1c2d33ae7c1af231e87112d1b2f459", 0xba) 4.909713652s ago: executing program 4 (id=852): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, r1, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r3 = kqueue() kevent(r3, &(0x7f00000000c0)=[{0x4, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x743a]}], 0x1, 0x0, 0x0, 0x0) r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x02/file1/file0\x00', &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(r4, &(0x7f0000000640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_int(r5, 0x29, 0x13, 0x0, &(0x7f0000000040)) r6 = socket(0x2, 0x1, 0x0) recvmsg(r6, &(0x7f0000001280)={&(0x7f0000000000)=@un=@abs={0x8}, 0x8, &(0x7f0000001200)=[{&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000080)=""/42, 0x2a}], 0x3, &(0x7f0000001240)=""/42, 0x2a}, 0x82) getsockopt$inet6_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) accept4$inet6(r5, 0x0, &(0x7f00000012c0), 0x0) setreuid(0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x2d, &(0x7f0000000100)) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 2.890824038s ago: executing program 0 (id=919): r0 = socket(0x1c, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000002b80)={&(0x7f00000000c0)=@file={0xa, 0x1, './file0\x00'}, 0xa, 0x0, 0x0, 0x0, 0xffffffffffffffb1, 0x1}, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) aio_write(&(0x7f00000001c0)={r1, 0xd, 0x0, 0x0, [0x299, 0x5], 0x3, 0x5, 0x0, {0x7, 0xfb, 0x0}, {0x4, 0x1e, @sigval_ptr=0x9}}) aio_error(&(0x7f0000000440)={0xffffffffffffffff, 0x5, 0x0, 0x0, [0x40, 0x9], 0x6, 0x1, 0x9, {0x20000004, 0x2, 0x0}, {0x3, 0xb, @sival_int=0x3}}) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x9d84, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x5, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x4, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x1, 0x8, 0xc, 0x8]}, {0x4005c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0xfffffffc, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x7f33c58a, 0x2, 0x58, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x800, 0x7f, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x2, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x1, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124446, 0x7, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x42, 0x225, 0x81, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0xfffe, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0xb730, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xffffdffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd4, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff8, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x3, 0x7, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xe, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc8, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x40]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x1, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x9, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x402, 0x5, 0xfffffffc, 0x0, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x7, 0x81, 0x8, 0x2, 0x4, 0x6, 0x2, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x1360000, 0x8, 0x1ff, 0x7ff, 0xa, 0x0, 0xfffffffd, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1002, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x4, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x41a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xdc]}, {0x6, [0x3, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x2, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xc, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0xffe, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x5, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x4, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x8, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x1000008, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x6, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x2, 0x404, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x4, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0xe0, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x1, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x3, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x5, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0xfffd, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) r2 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r3, r2, &(0x7f0000000280)='.\x00', 0x21000630) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x10c44, 0x140) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r5 = socket(0x26, 0x2, 0x0) bind(r5, &(0x7f0000000040)=@in6={0x22, 0x1c, 0x3, 0x300, @mcast1}, 0xc) 2.889919405s ago: executing program 2 (id=920): sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x5, 0x100000000, &(0x7f0000000000)={&(0x7f0000000480)=[{&(0x7f0000000300)="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", 0x17b}, {&(0x7f0000002780)="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", 0xff}, {&(0x7f0000000200)="8b6f98364a0f9dd2c63ae3104b7d529138251284519d4ad7ac176537fdbf58232dc8c443d7bbc6abefc9ce95fa521a97f33067f7a43f2f8f546b5c9ba04d9a2a0368154c73825c7d6e795124451bce7a18348cad", 0x54}, {&(0x7f0000000500)="306cdf54b8a36fc88f6d74522c362ff3f1389be682a75b6debf72a40c18f9b6bca27b77e2db1d1716d73ce296858d932e410ebfa31c5e01715dee2b776f7430953e424d84cbf0f3ddf4fec1015a8fe627ad9f7ae7915d07cad7addf893c41520df60db7e6ed7b6cae9aa17e95bd94d3b3fc6bbce36700fbe467d1951995526848de710c43aeb2f61", 0x88}], 0x4, 0x0}, &(0x7f0000000000), 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}}}}}}) syz_emit_ethernet(0x42, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x2000, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x2, 0x8}, {"b76bf11d5d4ff88eab4e7d94dcf5288151f250627b0e1fb0"}}}}}}) syz_emit_ethernet(0x3c, &(0x7f0000000200)={@random="b905f0ffffff", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2e, 0x0, 0x1, 0x0, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x1, 0x3, 0x8}, {"e3c4fc107f71ed734b5547194172bf7adeb4"}}}}}}) openat$md(0xffffff9c, &(0x7f0000000100), 0x200, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) cpuset_getaffinity(0x1, 0x6, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) aio_waitcomplete(0x0, &(0x7f0000004080)={0x4272, 0xfffffff7}) r1 = socket$inet6(0x1c, 0x2, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x200, 0x14) connect$unix(r2, &(0x7f0000000100)=@file={0xa, 0x1, './file0\x00'}, 0xa) setsockopt$sock_int(r2, 0xffff, 0x20, &(0x7f00000000c0)=0x8001, 0x4) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0xfffffffe, @loopback}, 0x1c) sendmsg$inet6_sctp(r1, &(0x7f0000000580)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x1, 0x9, @remote={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1c"], 0x1c, 0x82}, 0x8) r3 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x200000, 0x0) ioctl$BIOCSETF(r3, 0x80084267, &(0x7f0000000140)={0x5c, &(0x7f0000000100)}) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='newreno\x00', 0x8) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2.784677516s ago: executing program 3 (id=921): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) utimensat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x2000) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @mcast2}, 0xfffffdc3) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) r2 = semget$private(0x0, 0x7, 0x3c0) semop(r2, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) socket(0x1c, 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r4 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca00"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) setsockopt$inet6_buf(r4, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6bf5613bf839d6e8905b73cee827162ad78b169dbadaf516b743fc5c0f29457", 0x3f) extattr_get_file(&(0x7f00000000c0)='./file0\x00', 0x2, &(0x7f0000000300)='(*,\'$[:\x00\xd0\xaf\x022\xa0\xb59\xdd\xe0\a\x8a:\x9e8d\x88\v\xc3g\x8eU\x96e\xf1\xb8\xa8\x96\tc3\x85\xe7K\x0fU\xc7q\xa3\x97QH\xfe\xe2G?\xb1\xe4\x16\xcc\r\x92W\xe2 n\f\x10j\xf0\xbb\xa3\x8b\nF}\f>\x80w\xe7\xcf\x05\xbf6\x02\x8e\xda\x99\x0f\x03\xa5\x1d?\xecS\x8e\x86&M\xf0\xd7\x10W', &(0x7f0000000480)=""/101, 0x65) syz_extract_tcp_res(&(0x7f00000002c0), 0x5, 0x4) syz_emit_ethernet(0x11b, &(0x7f0000000540)=ANY=[]) 2.508821515s ago: executing program 0 (id=922): r0 = open(&(0x7f00000002c0)='.\x00', 0x4, 0x8) r1 = inotify_add_watch_at(0xffffffffffffffff, r0, &(0x7f0000000280)='.\x00', 0x21000630) r2 = socket(0x1b, 0x3, 0x81) sendto$inet6(r2, &(0x7f0000000180)="02090103020000008e4cb277fce00d8f", 0x10, 0x0, 0x0, 0x0) pwritev(r2, &(0x7f00000004c0)=[{&(0x7f00000003c0)="a4404659f5e66946426944a572cea46178f6523a6857901b57619f51ed38b10527ed51c00b19c639231dc0fcbbb201d8d210eeee6462ef17a8f8d8e57a33c08364a85f13da37020e1ee0d96470fa136d6de9e5fd22db124f23ab4523b6eefb22", 0x60}, {&(0x7f0000000440)="921d3cb0344b1e66025cf3a949b832ab8356a94f2b6eb5b7abf082f8731c0eebdee983a6fd301206f7d5d9324c93e5ece82fca3aec0a8564cc7fff6303f96b5c3bbc2be6b2613127a83d6c4b007bb672387c08e4cf9f30098b4a44bdf7c1fbc7ffb31e22ec26d8414acce468bff9", 0x6e}], 0x2, 0x31) inotify_rm_watch(r0, r1) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x4, &(0x7f0000000140), &(0x7f0000000300)=0x4) r3 = socket(0x1c, 0x1, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) setresuid(0xee00, 0xee01, 0xffffffffffffffff) getsockopt$inet6_sctp_SCTP_RTOINFO(r2, 0x84, 0x1, &(0x7f0000000340)={0x0, 0x2, 0x10, 0x9017}, &(0x7f0000000380)=0x10) setreuid(0x0, 0xffffffffffffffff) openat$crypto(0xffffff9c, &(0x7f0000000000), 0x40, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) shm_unlink(&(0x7f0000000000)='./file0\x00') chdir(&(0x7f0000000040)='./file0\x00') mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x5, &(0x7f0000000000)={0x10000000000b35d, 0x92}) __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000080)=[0x199, 0xfffd]) r4 = kqueue() kevent(r4, &(0x7f0000000540)=[{0xc8, 0xfffffffffffffffe, 0x4021, 0x42, 0xffffffffffffffff, 0x0, [0x8, 0x8000000000080003]}], 0x1, 0x0, 0x0, 0x0) kevent(r4, &(0x7f0000000000)=[{0x0, 0xfffffffffffffff9, 0x17, 0x10}], 0x29f, 0x0, 0x8001, 0x0) __semctl$GETNCNT(0x0, 0x3, 0x3) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x2d, &(0x7f0000000100)) ppoll(&(0x7f0000000080)=[{r3, 0x100}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x4}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0xa}, {0xffffffffffffffff, 0x8}, {0xffffffffffffffff, 0x40}, {r0, 0x1}, {r2, 0x100}], 0x9, &(0x7f0000000000)={0x9, 0xa}, &(0x7f0000000100)={[0x1000, 0x1000, 0x8, 0x401]}, 0x10) preadv(r2, &(0x7f00000007c0)=[{&(0x7f0000000800)=""/79, 0x4f}, {&(0x7f0000000580)}, {&(0x7f00000005c0)=""/10, 0xa}, {&(0x7f0000000600)=""/159, 0x9f}, {&(0x7f00000006c0)=""/220, 0xdc}], 0x5, 0x5f2) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) setsockopt$inet_tcp_buf(r3, 0x6, 0x25, &(0x7f00000001c0)="234ed88a2dd63702763432e3a9fb2c8daa0c826fe9fa7b1823b2d424b6850b5d07a6ed1f254865a41a5ee1053800610d1cae0ddbf0754cd30e9c9abb3c38d327fa353fe90ce3e1528aa4944024d33298ebe0624769744a69dbab1d75c8764cf666f526c386d01b0a9bae8a1988a5e85bce30ce8ad139a780be35f4b37e2ae106612857a1dd3054363c0d88090cac09f9489e700a8f3e364d2cbf2cc29eb41917983bd7100cc10804f5c42e1c2d33ae7c1af231e87112d1b2f459", 0xba) 2.482967209s ago: executing program 4 (id=852): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, r1, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r3 = kqueue() kevent(r3, &(0x7f00000000c0)=[{0x4, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x743a]}], 0x1, 0x0, 0x0, 0x0) r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x02/file1/file0\x00', &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(r4, &(0x7f0000000640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_int(r5, 0x29, 0x13, 0x0, &(0x7f0000000040)) r6 = socket(0x2, 0x1, 0x0) recvmsg(r6, &(0x7f0000001280)={&(0x7f0000000000)=@un=@abs={0x8}, 0x8, &(0x7f0000001200)=[{&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000080)=""/42, 0x2a}], 0x3, &(0x7f0000001240)=""/42, 0x2a}, 0x82) getsockopt$inet6_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) accept4$inet6(r5, 0x0, &(0x7f00000012c0), 0x0) setreuid(0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x2d, &(0x7f0000000100)) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) 360.681628ms ago: executing program 0 (id=923): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$md(0xffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$MDIOCATTACH(r0, 0xc1b46d00, &(0x7f00000003c0)={0x0, 0x7ffffffd, 0x3, 0x0, 0x8000, 0x5, 0x37d, 0x0, 0x1, 0x0, 0x0, [0x0, 0x2, 0x100007ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xb32a, 0x4, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x80000, 0xfffffffe, 0x0, 0x2000e122, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x9, 0xf, 0xfffffffd, 0xdbd, 0x3ff, 0x11, 0x1, 0x0, 0xa7, 0xc37b, 0x7, 0x2, 0x0, 0x0, 0x0, 0x0, 0x4, 0x941, 0x0, 0x200001, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0xfffffffe, 0xeffffffc, 0x0, 0x8, 0x0, 0x0, 0x40, 0xffffffff, 0x80000000, 0x7, 0x1, 0x1000, 0xfffffffc, 0x2, 0x10001, 0x0, 0x0, 0x7fed, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x5, 0xfffffffe, 0x6, 0x0, 0x0, 0x40004, 0xfffffffe, 0x0, 0x0, 0xffffffff, 0x0, 0xffffffff]}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x200201, 0x85) aio_write(0x0) fhopen(0x0, 0x40000) aio_cancel(r1, 0x0) r2 = accept4(0xffffffffffffff9c, &(0x7f0000000040)=@in={0x10, 0x2, 0xffffffffffffffff, @remote}, 0x0, 0x20000000) fchdir(r2) open(&(0x7f0000000980)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x611, 0x20) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file1\x00') rename(&(0x7f00000012c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000180)='./file1\x00') open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) mkdir(&(0x7f00000006c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4a) r3 = socket(0x1c, 0x1, 0x0) r4 = socket$inet6_udplite(0x1c, 0x2, 0x88) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet_int(r5, 0x0, 0x2, &(0x7f0000000200)=0x8, 0x4) msync(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2) recvmsg(r5, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000280)=""/191, 0xbf}], 0x1, 0x0}, 0x40043) writev(r6, &(0x7f0000004580)=[{&(0x7f0000004300)="d634b458fd082e2b56da5dfe846f90ffa775a78e992099e5fea099e7e5ac9a", 0x1f}, {&(0x7f0000004340)="8827c39cca08e45befc258949dacf5dc766c9cbe96a84d51aeb60cfb1e2242e11166443e613aaae19209aeee32c6728712567ac8a8196de65c0e70eed56c0d", 0x3f}, {&(0x7f00000043c0)="d874c52c", 0x4}], 0x3) r7 = socket$inet6(0x1c, 0x2, 0x0) sendmsg$inet6_sctp(r7, &(0x7f00000001c0)={&(0x7f0000000080)=@in6={0x1c, 0x1c, 0x3, 0x0, @rand_addr="0a7e323a55d965957a443f400731bb73"}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="140000002900000015"], 0x14}, 0x0) sendmsg(r4, &(0x7f0000000340)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1, 0x0, @loopback}, 0x1c, 0x0, 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c0000002900000017"], 0x1c}, 0x2008a) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 356.924853ms ago: executing program 2 (id=924): r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x78) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r2, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e51348771197a7728420aef61715d7b1c3d4b3830c921bf0817a1600000000006a89db", 0x2b) r3 = setsid() rtprio(0x0, r3, &(0x7f00000000c0)={0x3, 0x17}) r4 = socket(0x1c, 0x1, 0x0) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) fcntl$setown(r4, 0x6, r3) r5 = accept4(r1, &(0x7f0000000200)=@un=@abs={0x8}, &(0x7f0000000240)=0x8, 0x30000000) sendto$inet(r5, 0x0, 0x0, 0x0, &(0x7f00000001c0)={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) r6 = msgget$private(0x0, 0x8) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f0000000000)={0x0, 0xa6, "6950f5ef59670a747f64f2ca692b8261f6bd73d1a983db3b4e45841588f4130560739157f2626db34b3a496f0a87e087967a4a1c54fbe80d4ef4c63c742655b8f04b826223f6a3c9fea16f44a8e2bb1029288fb58d27face8d785fda58d229ff73f7286c2392a73746646609910ebc409e4bb36331108d59be66765f4a0a00599ed07aacef5eada1534fb9c732f99cf8a3fed8bd929fd846db5c9774bb827df23b1f386cfb67"}, &(0x7f00000000c0)=0xae) setsockopt$inet6_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000100)={r7, 0x0, 0x100, 0xff}, 0x10) r8 = socket(0x1c, 0x1, 0x0) bind$inet6(r8, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) connect$inet6(r8, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) msgsnd(r6, &(0x7f0000000100)=ANY=[@ANYBLOB], 0x4, 0x800) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r8, 0x29, 0x23, &(0x7f0000000280)={0x31, 0x2, '\x00', [@pad1, @ra={0x5, 0x2, 0x7f}, @ra={0x5, 0x2, 0x5}, @ra, @pad1]}, 0x20) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x410, 0xffffffffffffffff, 0x0) sysarch$I386_GET_IOPERM(0x3, 0x0) setresuid(0x0, 0xee01, 0x0) r9 = shmget$private(0x0, 0x3000, 0x602, &(0x7f0000ffa000/0x3000)=nil) shmat(r9, &(0x7f0000319000/0x2000)=nil, 0x0) aio_write(&(0x7f0000000140)={r0, 0x40000000006, &(0x7f0000000240)="a3", 0x1, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sival_ptr=0x6}}) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 330.447705ms ago: executing program 3 (id=925): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\x00\x00 \x00', 0x8}, 0x1c) sendmsg(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x280}, 0x88) r1 = socket(0x1c, 0x1, 0x0) symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') socketpair$unix(0x1, 0x2, 0x0, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x2, &(0x7f0000000080)="09001000", 0x4) recvmsg(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, 0x60043) setresuid(0x0, 0x0, 0x0) mkdir(&(0x7f00000006c0)='./file0\x00', 0x114) linkat(0xffffffffffffff9c, &(0x7f0000000280)='./file0/../file0\x00', 0xffffffffffffffff, 0x0, 0x6000) r2 = semget$private(0x0, 0x7, 0x3c0) semop(r2, &(0x7f00000001c0)=[{0x0, 0xfffd}], 0x1) semop(r2, &(0x7f0000000000)=[{0x0, 0x4, 0x1000}], 0x1) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) r3 = socket(0x1c, 0x1, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20101, 0x0, 0x0) r5 = socket$inet6(0x1c, 0x2, 0x7) kqueue() setsockopt$inet6_IPV6_RTHDRDSTOPTS(r4, 0x29, 0x23, &(0x7f00000001c0)=ANY=[@ANYBLOB="5d02000000000000010100c20400000e420401ff0401ca00"], 0x20) __specialfd$inotify(0x2, &(0x7f0000000180)={0x18000c}, 0x4) setsockopt$inet6_buf(r5, 0x29, 0x32, &(0x7f0000000000)="0e83119fc3d7124685d209233aa06c6931f1c52244029f8f47a5e6bc208020b6", 0x20) extattr_get_file(&(0x7f00000000c0)='./file0\x00', 0x2, 0x0, &(0x7f0000000480)=""/101, 0x65) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) syz_extract_tcp_res(&(0x7f00000002c0), 0x5, 0x4) syz_emit_ethernet(0x11b, &(0x7f0000000540)=ANY=[]) 0s ago: executing program 4 (id=852): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) r2 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r2, r1, &(0x7f0000000280)='.\x00', 0x21000630) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r3 = kqueue() kevent(r3, &(0x7f00000000c0)=[{0x4, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x743a]}], 0x1, 0x0, 0x0, 0x0) r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) symlink(&(0x7f00000001c0)='.\x02/file1/file0\x00', &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(r4, &(0x7f0000000640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x6) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet6_int(r5, 0x29, 0x13, 0x0, &(0x7f0000000040)) r6 = socket(0x2, 0x1, 0x0) recvmsg(r6, &(0x7f0000001280)={&(0x7f0000000000)=@un=@abs={0x8}, 0x8, &(0x7f0000001200)=[{&(0x7f0000000100)=""/200, 0xc8}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000000080)=""/42, 0x2a}], 0x3, &(0x7f0000001240)=""/42, 0x2a}, 0x82) getsockopt$inet6_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) accept4$inet6(r5, 0x0, &(0x7f00000012c0), 0x0) setreuid(0x0, 0xffffffffffffffff) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x2d, &(0x7f0000000100)) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00000) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.226' (ED25519) to the list of known hosts. md0: truncating fractional last sector by 3 bytes md1: truncating fractional last sector by 3 bytes md2: truncating fractional last sector by 3 bytes md3: truncating fractional last sector by 3 bytes md4: truncating fractional last sector by 3 bytes Jan 23 17:35:55 ci-freebsd-i386-1 kernel: arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.0.187 on tap0 md5: truncating fractional last sector by 3 bytes md6: truncating fractional last sector by 3 bytes Out of ktrace request objects. md7: truncating fractional last sector by 3 bytes md8: truncating fractional last sector by 3 bytes md9: truncating fractional last sector by 3 bytes md10: truncating fractional last sector by 3 bytes md11: truncating fractional last sector by 3 bytes md12: truncating fractional last sector by 3 bytes md13: truncating fractional last sector by 3 bytes md14: truncating fractional last sector by 3 bytes md15: truncating fractional last sector by 3 bytes md16: truncating fractional last sector by 3 bytes md17: truncating fractional last sector by 3 bytes md18: truncating fractional last sector by 3 bytes md19: truncating fractional last sector by 3 bytes md20: truncating fractional last sector by 3 bytes md21: truncating fractional last sector by 3 bytes md22: truncating fractional last sector by 3 bytes md23: truncating fractional last sector by 3 bytes md24: truncating fractional last sector by 3 bytes md25: truncating fractional last sector by 3 bytes md26: truncating fractional last sector by 3 bytes md27: truncating fractional last sector by 3 bytes md28: truncating fractional last sector by 3 bytes md29: truncating fractional last sector by 3 bytes md30: truncating fractional last sector by 3 bytes md31: truncating fractional last sector by 3 bytes md32: truncating fractional last sector by 3 bytes md33: truncating fractional last sector by 3 bytes md34: truncating fractional last sector by 3 bytes md35: truncating fractional last sector by 3 bytes md36: truncating fractional last sector by 3 bytes md37: truncating fractional last sector by 3 bytes md38: truncating fractional last sector by 3 bytes md39: truncating fractional last sector by 3 bytes md40: truncating fractional last sector by 3 bytes md41: truncating fractional last sector by 3 bytes md42: truncating fractional last sector by 3 bytes md43: truncating fractional last sector by 3 bytes md44: truncating fractional last sector by 3 bytes md45: truncating fractional last sector by 3 bytes md46: truncating fractional last sector by 3 bytes md47: truncating fractional last sector by 3 bytes md48: truncating fractional last sector by 3 bytes md49: truncating fractional last sector by 3 bytes md50: truncating fractional last sector by 3 bytes md51: truncating fractional last sector by 3 bytes md52: truncating fractional last sector by 3 bytes md53: truncating fractional last sector by 3 bytes md54: truncating fractional last sector by 3 bytes md55: truncating fractional last sector by 3 bytes md56: truncating fractional last sector by 3 bytes md57: truncating fractional last sector by 3 bytes md58: truncating fractional last sector by 3 bytes md59: truncating fractional last sector by 3 bytes md60: truncating fractional last sector by 3 bytes md61: truncating fractional last sector by 3 bytes md62: truncating fractional last sector by 3 bytes md63: truncating fractional last sector by 3 bytes md64: truncating fractional last sector by 3 bytes md65: truncating fractional last sector by 3 bytes md66: truncating fractional last sector by 3 bytes md67: truncating fractional last sector by 3 bytes md68: truncating fractional last sector by 3 bytes md69: truncating fractional last sector by 3 bytes md70: truncating fractional last sector by 3 bytes md71: truncating fractional last sector by 3 bytes md72: truncating fractional last sector by 3 bytes md73: truncating fractional last sector by 3 bytes md74: truncating fractional last sector by 3 bytes md75: truncating fractional last sector by 3 bytes md76: truncating fractional last sector by 3 bytes md77: truncating fractional last sector by 3 bytes md78: truncating fractional last sector by 3 bytes md79: truncating fractional last sector by 3 bytes md80: truncating fractional last sector by 3 bytes md81: truncating fractional last sector by 3 bytes md82: truncating fractional last sector by 3 bytes md83: truncating fractional last sector by 3 bytes md84: truncating fractional last sector by 3 bytes md85: truncating fractional last sector by 3 bytes md86: truncating fractional last sector by 3 bytes md87: truncating fractional last sector by 3 bytes Jan 23 17:38:04 ci-freebsd-i386-1 kernel: attempted source route from 255.255.255.255 to 172.20.2.170 md88: truncating fractional last sector by 3 bytes md89: truncating fractional last sector by 3 bytes md90: truncating fractional last sector by 3 bytes md91: truncating fractional last sector by 3 bytes Jan 23 17:38:08 ci-freebsd-i386-1 kernel: arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 md92: truncating fractional last sector by 3 bytes md93: truncating fractional last sector by 3 bytes md94: truncating fractional last sector by 3 bytes md95: truncating fractional last sector by 3 bytes md96: truncating fractional last sector by 3 bytes md97: truncating fractional last sector by 3 bytes md98: truncating fractional last sector by 3 bytes md99: truncating fractional last sector by 3 bytes md100: truncating fractional last sector by 3 bytes md101: truncating fractional last sector by 3 bytes Jan 23 17:38:24 ci-freebsd-i386-1 kernel: attempted source route from 255.255.255.255 to 172.20.2.170 Jan 23 17:38:24 ci-freebsd-i386-1 kernel: arp: 00:00:00:00:00:00 attempts to modify permanent entry for 172.20.3.187 on tap3 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 Expensive callout(9) function: 0xffffffff81afc400(0) 0.006145244 s if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 md102: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 md103: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2400 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 md104: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2800 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 md105: truncating fractional last sector by 3 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c2000 ifconfig: interface tap4 does not exist SYZFAIL: invalid kcov comp type type=ffffffff81e83db9 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff81e83db9 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff81eb6cd3 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff8231fcee (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: invalid kcov comp type type=ffffffff8231fd24 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=4 req=852 state=3 status=67 (errno 35: Resource temporarily unavailable) if_delmulti_locked: detaching ifnet instance 0xfffffe007ab33c00 if_delmulti_locked: detaching ifnet instance 0xfffffe007ab33c00 if_delmulti_locked: detaching ifnet instance 0xfffffe007ab33c00 if_delmulti_locked: detaching ifnet instance 0xfffffe007ab33c00 if_delmulti_locked: detaching ifnet instance 0xfffffe007ab33c00 if_delmulti_locked: detaching ifnet instance 0xfffffe007ab33c00 FreeBSD/amd64 (ci-freebsd-i386-1.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Jan 23 17:39:04 ci-freebsd-i386-1 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl