last executing test programs: 16.144467204s ago: executing program 1 (id=57): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) acct(&(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreqn(r1, 0x0, 0x1, 0xfffffffffffffffe, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0xfffeffff, @rand_addr="caeb33aca447afcbebbfb477a3b36ba3", 0x7}, 0x1c) r2 = shmget$private(0x0, 0x3000, 0x1e0, &(0x7f0000001000/0x3000)=nil) setuid(0xffffffffffffffff) open$dir(&(0x7f0000000640)='./file0\x00', 0x200, 0x72) setresgid(0x0, 0xee01, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x8001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r3, 0x80000003, 0x0, 0x0, [0x20, 0xfffff48f], 0x401, 0x0, 0x2, {0xfffffffffffffffe, 0x7, 0x0}, {0x0, 0xfffffffd, @sival_int, @ke_flags=0xc000}}) rfork(0x3060) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344}, 0x5, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @random="0010000800", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @remote={0xac, 0x14, 0x0}}, @tcp={{0x2, 0x3, 0x41424344, r4, 0x0, 0x0, 0x5}}}}}}) mprotect(&(0x7f0000192000/0x4000)=nil, 0x4000, 0x5) munmap(&(0x7f00002bd000/0x3000)=nil, 0x3000) fork() mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344, 0x41424344}, 0x1, 0x401) syz_emit_ethernet(0x11a, &(0x7f0000000300)={@random="ef258162e50c", @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x31, 0x10c, 0x67, 0x401, 0x4, 0x11, 0x0, @local={0xac, 0x14, 0x0}, @rand_addr=0x8, {[@end, @end]}}, @tcp={{0x0, 0x1, 0x41424344, r5, 0x0, 0x0, 0x5, 0x0, 0x23b, 0x0, 0x6}, {"418be4171739917c58e244038e9f67e762df616dda83e57778e106ac2e723df807c2cd59707637925481c17ccc93e2aaac721515481ffb077e6eedf12e57a3ac4e2d9df24be04a5f6e8a4b32fb48c5edac24dff592d5f953dcbc6162b93b00513fb0435b016169348814685f25d59818e4aef3c51cffbcbfd53c8445c831ee9f0c6a9cc96b61ae3820c5d95224a77a961839cf6949d7cc1eaf1751059600429183fa4cccca2d20630f9e290d83adf3301f60386f9ae8645a20900e207cd5eca87e5d80a889da5ac06c743b6fbdccba1fa048124b29ed744cfc52654cddbbb86e"}}}}}}) syz_emit_ethernet(0x76, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "000200", 0x40, 0x6, 0x0, @rand_addr="0000000000000000000000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x2, 0x41424344, r5, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x3}, @mss={0x2, 0x4, 0x1}, @mss={0x2, 0x4, 0x8}, @sack={0x5, 0x2}, @mss={0x2, 0x4, 0x7}, @sack_perm={0x4, 0x2}, @generic={0x5, 0x11, "a05646940fb9d38ac868ab1e288926"}, @sack={0x5, 0x6, [0x6]}]}}}}}}}}) syz_emit_ethernet(0x21a, &(0x7f00000003c0)={@empty, @remote, [{[], {0x8100, 0x4, 0x0, 0x4}}], {@ipv6={0x86dd, {0x0, 0x6, "648ac5", 0x1e0, 0x28, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6c, 0xe, 0x0, 0x6, 0x0, [@loopback, @local={0xfe, 0x80, '\x00', 0x0}, @mcast1, @mcast2, @empty, @local={0xfe, 0x80, '\x00', 0x0}, @remote={0xfe, 0x80, '\x00', 0x0}]}, @dstopts={0x10, 0x2, '\x00', [@ra={0x5, 0x2, 0x1}, @pad1, @jumbo={0xc2, 0x4, 0x9}, @jumbo={0xc2, 0x4, 0xffffffff}, @pad1]}, @routing={0x3b, 0x6, 0x0, 0x7, 0x0, [@ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, @mcast1, @mcast2]}], @tcp={{0x0, 0x2, r4, r5, 0x1, 0x0, 0x12, 0x1, 0x6, 0x0, 0x6, {[@md5sig={0x13, 0x12, "4240de985ba51dae175af82b89242a22"}, @eol, @mss={0x2, 0x4, 0x3}, @nop, @eol, @eol, @fastopen={0x22, 0x3, "03"}, @sack_perm={0x4, 0x2}, @nop, @generic={0x8, 0x11, "5296f4049ce5609eac17ab7f4f43ff"}]}}, {"63e6b1c4ffcfd60ed5ab13001aed8f4edf199df6177553503f03d9b6ba937e5f94db8122cdbf29eb635178fd30fccc90551fb7e1b964b08c0ee93a48294d9e7578ae9c633b3bdca96ea3dea4e4c43cf31cce4716ca558a1465b7cd52ca05059522d4d711ea68f74981f309c42d4ca86190fff6ccc70c236507365d494d586c211dc83783480d11fdf06c449e0f58a1ee272e2d8d7d6a30df89b49fd74b803ff9bcd7f94dc6b032d0e2b5dff5222fe192ede44cb8cb7fc4ed7967926fb10993074d77301ec589cc89"}}}}}}}) aio_waitcomplete(0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000200)='*'], 0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd, 0xc70, 0x0, 0x2}, 0x80, 0xffff, 0x7, 0x80, 0x0, 0x0, 0x8}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x3, 0x1ff, @empty, 0x3}}, 0x0, 0x9, 0xb, 0x2}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000100)={0xcf14, 0x400, 0x1, 0x0, r6}, 0x10) 13.013846136s ago: executing program 1 (id=57): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) acct(&(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreqn(r1, 0x0, 0x1, 0xfffffffffffffffe, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0xfffeffff, @rand_addr="caeb33aca447afcbebbfb477a3b36ba3", 0x7}, 0x1c) r2 = shmget$private(0x0, 0x3000, 0x1e0, &(0x7f0000001000/0x3000)=nil) setuid(0xffffffffffffffff) open$dir(&(0x7f0000000640)='./file0\x00', 0x200, 0x72) setresgid(0x0, 0xee01, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x8001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r3, 0x80000003, 0x0, 0x0, [0x20, 0xfffff48f], 0x401, 0x0, 0x2, {0xfffffffffffffffe, 0x7, 0x0}, {0x0, 0xfffffffd, @sival_int, @ke_flags=0xc000}}) rfork(0x3060) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344}, 0x5, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @random="0010000800", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @remote={0xac, 0x14, 0x0}}, @tcp={{0x2, 0x3, 0x41424344, r4, 0x0, 0x0, 0x5}}}}}}) mprotect(&(0x7f0000192000/0x4000)=nil, 0x4000, 0x5) munmap(&(0x7f00002bd000/0x3000)=nil, 0x3000) fork() mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344, 0x41424344}, 0x1, 0x401) syz_emit_ethernet(0x11a, &(0x7f0000000300)={@random="ef258162e50c", @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x31, 0x10c, 0x67, 0x401, 0x4, 0x11, 0x0, @local={0xac, 0x14, 0x0}, @rand_addr=0x8, {[@end, @end]}}, @tcp={{0x0, 0x1, 0x41424344, r5, 0x0, 0x0, 0x5, 0x0, 0x23b, 0x0, 0x6}, {"418be4171739917c58e244038e9f67e762df616dda83e57778e106ac2e723df807c2cd59707637925481c17ccc93e2aaac721515481ffb077e6eedf12e57a3ac4e2d9df24be04a5f6e8a4b32fb48c5edac24dff592d5f953dcbc6162b93b00513fb0435b016169348814685f25d59818e4aef3c51cffbcbfd53c8445c831ee9f0c6a9cc96b61ae3820c5d95224a77a961839cf6949d7cc1eaf1751059600429183fa4cccca2d20630f9e290d83adf3301f60386f9ae8645a20900e207cd5eca87e5d80a889da5ac06c743b6fbdccba1fa048124b29ed744cfc52654cddbbb86e"}}}}}}) syz_emit_ethernet(0x76, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "000200", 0x40, 0x6, 0x0, @rand_addr="0000000000000000000000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x2, 0x41424344, r5, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x3}, @mss={0x2, 0x4, 0x1}, @mss={0x2, 0x4, 0x8}, @sack={0x5, 0x2}, @mss={0x2, 0x4, 0x7}, @sack_perm={0x4, 0x2}, @generic={0x5, 0x11, "a05646940fb9d38ac868ab1e288926"}, @sack={0x5, 0x6, [0x6]}]}}}}}}}}) syz_emit_ethernet(0x21a, &(0x7f00000003c0)={@empty, @remote, [{[], {0x8100, 0x4, 0x0, 0x4}}], {@ipv6={0x86dd, {0x0, 0x6, "648ac5", 0x1e0, 0x28, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6c, 0xe, 0x0, 0x6, 0x0, [@loopback, @local={0xfe, 0x80, '\x00', 0x0}, @mcast1, @mcast2, @empty, @local={0xfe, 0x80, '\x00', 0x0}, @remote={0xfe, 0x80, '\x00', 0x0}]}, @dstopts={0x10, 0x2, '\x00', [@ra={0x5, 0x2, 0x1}, @pad1, @jumbo={0xc2, 0x4, 0x9}, @jumbo={0xc2, 0x4, 0xffffffff}, @pad1]}, @routing={0x3b, 0x6, 0x0, 0x7, 0x0, [@ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, @mcast1, @mcast2]}], @tcp={{0x0, 0x2, r4, r5, 0x1, 0x0, 0x12, 0x1, 0x6, 0x0, 0x6, {[@md5sig={0x13, 0x12, "4240de985ba51dae175af82b89242a22"}, @eol, @mss={0x2, 0x4, 0x3}, @nop, @eol, @eol, @fastopen={0x22, 0x3, "03"}, @sack_perm={0x4, 0x2}, @nop, @generic={0x8, 0x11, "5296f4049ce5609eac17ab7f4f43ff"}]}}, {"63e6b1c4ffcfd60ed5ab13001aed8f4edf199df6177553503f03d9b6ba937e5f94db8122cdbf29eb635178fd30fccc90551fb7e1b964b08c0ee93a48294d9e7578ae9c633b3bdca96ea3dea4e4c43cf31cce4716ca558a1465b7cd52ca05059522d4d711ea68f74981f309c42d4ca86190fff6ccc70c236507365d494d586c211dc83783480d11fdf06c449e0f58a1ee272e2d8d7d6a30df89b49fd74b803ff9bcd7f94dc6b032d0e2b5dff5222fe192ede44cb8cb7fc4ed7967926fb10993074d77301ec589cc89"}}}}}}}) aio_waitcomplete(0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000200)='*'], 0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd, 0xc70, 0x0, 0x2}, 0x80, 0xffff, 0x7, 0x80, 0x0, 0x0, 0x8}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x3, 0x1ff, @empty, 0x3}}, 0x0, 0x9, 0xb, 0x2}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000100)={0xcf14, 0x400, 0x1, 0x0, r6}, 0x10) 10.027370031s ago: executing program 1 (id=57): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) acct(&(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreqn(r1, 0x0, 0x1, 0xfffffffffffffffe, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0xfffeffff, @rand_addr="caeb33aca447afcbebbfb477a3b36ba3", 0x7}, 0x1c) r2 = shmget$private(0x0, 0x3000, 0x1e0, &(0x7f0000001000/0x3000)=nil) setuid(0xffffffffffffffff) open$dir(&(0x7f0000000640)='./file0\x00', 0x200, 0x72) setresgid(0x0, 0xee01, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x8001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r3, 0x80000003, 0x0, 0x0, [0x20, 0xfffff48f], 0x401, 0x0, 0x2, {0xfffffffffffffffe, 0x7, 0x0}, {0x0, 0xfffffffd, @sival_int, @ke_flags=0xc000}}) rfork(0x3060) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344}, 0x5, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @random="0010000800", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @remote={0xac, 0x14, 0x0}}, @tcp={{0x2, 0x3, 0x41424344, r4, 0x0, 0x0, 0x5}}}}}}) mprotect(&(0x7f0000192000/0x4000)=nil, 0x4000, 0x5) munmap(&(0x7f00002bd000/0x3000)=nil, 0x3000) fork() mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344, 0x41424344}, 0x1, 0x401) syz_emit_ethernet(0x11a, &(0x7f0000000300)={@random="ef258162e50c", @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x31, 0x10c, 0x67, 0x401, 0x4, 0x11, 0x0, @local={0xac, 0x14, 0x0}, @rand_addr=0x8, {[@end, @end]}}, @tcp={{0x0, 0x1, 0x41424344, r5, 0x0, 0x0, 0x5, 0x0, 0x23b, 0x0, 0x6}, {"418be4171739917c58e244038e9f67e762df616dda83e57778e106ac2e723df807c2cd59707637925481c17ccc93e2aaac721515481ffb077e6eedf12e57a3ac4e2d9df24be04a5f6e8a4b32fb48c5edac24dff592d5f953dcbc6162b93b00513fb0435b016169348814685f25d59818e4aef3c51cffbcbfd53c8445c831ee9f0c6a9cc96b61ae3820c5d95224a77a961839cf6949d7cc1eaf1751059600429183fa4cccca2d20630f9e290d83adf3301f60386f9ae8645a20900e207cd5eca87e5d80a889da5ac06c743b6fbdccba1fa048124b29ed744cfc52654cddbbb86e"}}}}}}) syz_emit_ethernet(0x76, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "000200", 0x40, 0x6, 0x0, @rand_addr="0000000000000000000000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x2, 0x41424344, r5, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x3}, @mss={0x2, 0x4, 0x1}, @mss={0x2, 0x4, 0x8}, @sack={0x5, 0x2}, @mss={0x2, 0x4, 0x7}, @sack_perm={0x4, 0x2}, @generic={0x5, 0x11, "a05646940fb9d38ac868ab1e288926"}, @sack={0x5, 0x6, [0x6]}]}}}}}}}}) syz_emit_ethernet(0x21a, &(0x7f00000003c0)={@empty, @remote, [{[], {0x8100, 0x4, 0x0, 0x4}}], {@ipv6={0x86dd, {0x0, 0x6, "648ac5", 0x1e0, 0x28, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6c, 0xe, 0x0, 0x6, 0x0, [@loopback, @local={0xfe, 0x80, '\x00', 0x0}, @mcast1, @mcast2, @empty, @local={0xfe, 0x80, '\x00', 0x0}, @remote={0xfe, 0x80, '\x00', 0x0}]}, @dstopts={0x10, 0x2, '\x00', [@ra={0x5, 0x2, 0x1}, @pad1, @jumbo={0xc2, 0x4, 0x9}, @jumbo={0xc2, 0x4, 0xffffffff}, @pad1]}, @routing={0x3b, 0x6, 0x0, 0x7, 0x0, [@ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, @mcast1, @mcast2]}], @tcp={{0x0, 0x2, r4, r5, 0x1, 0x0, 0x12, 0x1, 0x6, 0x0, 0x6, {[@md5sig={0x13, 0x12, "4240de985ba51dae175af82b89242a22"}, @eol, @mss={0x2, 0x4, 0x3}, @nop, @eol, @eol, @fastopen={0x22, 0x3, "03"}, @sack_perm={0x4, 0x2}, @nop, @generic={0x8, 0x11, "5296f4049ce5609eac17ab7f4f43ff"}]}}, {"63e6b1c4ffcfd60ed5ab13001aed8f4edf199df6177553503f03d9b6ba937e5f94db8122cdbf29eb635178fd30fccc90551fb7e1b964b08c0ee93a48294d9e7578ae9c633b3bdca96ea3dea4e4c43cf31cce4716ca558a1465b7cd52ca05059522d4d711ea68f74981f309c42d4ca86190fff6ccc70c236507365d494d586c211dc83783480d11fdf06c449e0f58a1ee272e2d8d7d6a30df89b49fd74b803ff9bcd7f94dc6b032d0e2b5dff5222fe192ede44cb8cb7fc4ed7967926fb10993074d77301ec589cc89"}}}}}}}) aio_waitcomplete(0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000200)='*'], 0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd, 0xc70, 0x0, 0x2}, 0x80, 0xffff, 0x7, 0x80, 0x0, 0x0, 0x8}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x3, 0x1ff, @empty, 0x3}}, 0x0, 0x9, 0xb, 0x2}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000100)={0xcf14, 0x400, 0x1, 0x0, r6}, 0x10) 6.251538206s ago: executing program 2 (id=197): symlink(&(0x7f0000000080)='.\x00', &(0x7f0000000240)='./file0\x00') mount(0x0, 0x0, 0x0, &(0x7f00000000c0)="35bf33baee71d8a68674a31ee54818dcc65ff6c32c5eb531e6dbe2bc6236d3981e288786f2f9a8a3252db260f999f154315d5f8877175bd785ad4fa995422150afb39d83") kmq_open(0x0, 0x200, 0x9, &(0x7f0000000340)={0x2, 0x28b, 0x4, 0x3}) syz_emit_ethernet(0xe6, &(0x7f0000000300)=ANY=[@ANYBLOB="ffffffffffff00000000000086dd60dbbc6c00b00000fe80000000000000000000e6000000aaff0200000000000000000000000000012b15"]) setgroups(0x3e, &(0x7f0000000100)) r0 = getegid() r1 = open$dir(&(0x7f0000000040)='./file0\x00', 0x100000, 0x0) r2 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r2, 0x2) getgroups(0x8, &(0x7f0000000000)=[r0, r0, r0, r0, r0, r0, r0, r0]) setgroups(0x3, &(0x7f0000000180)=[r0, 0xffffffffffffffff, r3]) r4 = open(&(0x7f0000000300)='.\x00', 0x100000, 0x0) flock(r4, 0x1) flock(r4, 0x1) flock(r2, 0x1) r5 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$sock_int(r5, 0xffff, 0x200, 0x0, 0x0) fchownat(r1, &(0x7f0000000280)='./file0\x00', 0x0, r0, 0x0) chown(&(0x7f0000000140)='./file0\x00', 0xffffffffffffffff, 0x0) 6.249549854s ago: executing program 1 (id=57): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) acct(&(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreqn(r1, 0x0, 0x1, 0xfffffffffffffffe, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0xfffeffff, @rand_addr="caeb33aca447afcbebbfb477a3b36ba3", 0x7}, 0x1c) r2 = shmget$private(0x0, 0x3000, 0x1e0, &(0x7f0000001000/0x3000)=nil) setuid(0xffffffffffffffff) open$dir(&(0x7f0000000640)='./file0\x00', 0x200, 0x72) setresgid(0x0, 0xee01, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x8001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r3, 0x80000003, 0x0, 0x0, [0x20, 0xfffff48f], 0x401, 0x0, 0x2, {0xfffffffffffffffe, 0x7, 0x0}, {0x0, 0xfffffffd, @sival_int, @ke_flags=0xc000}}) rfork(0x3060) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344}, 0x5, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @random="0010000800", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @remote={0xac, 0x14, 0x0}}, @tcp={{0x2, 0x3, 0x41424344, r4, 0x0, 0x0, 0x5}}}}}}) mprotect(&(0x7f0000192000/0x4000)=nil, 0x4000, 0x5) munmap(&(0x7f00002bd000/0x3000)=nil, 0x3000) fork() mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344, 0x41424344}, 0x1, 0x401) syz_emit_ethernet(0x11a, &(0x7f0000000300)={@random="ef258162e50c", @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x31, 0x10c, 0x67, 0x401, 0x4, 0x11, 0x0, @local={0xac, 0x14, 0x0}, @rand_addr=0x8, {[@end, @end]}}, @tcp={{0x0, 0x1, 0x41424344, r5, 0x0, 0x0, 0x5, 0x0, 0x23b, 0x0, 0x6}, {"418be4171739917c58e244038e9f67e762df616dda83e57778e106ac2e723df807c2cd59707637925481c17ccc93e2aaac721515481ffb077e6eedf12e57a3ac4e2d9df24be04a5f6e8a4b32fb48c5edac24dff592d5f953dcbc6162b93b00513fb0435b016169348814685f25d59818e4aef3c51cffbcbfd53c8445c831ee9f0c6a9cc96b61ae3820c5d95224a77a961839cf6949d7cc1eaf1751059600429183fa4cccca2d20630f9e290d83adf3301f60386f9ae8645a20900e207cd5eca87e5d80a889da5ac06c743b6fbdccba1fa048124b29ed744cfc52654cddbbb86e"}}}}}}) syz_emit_ethernet(0x76, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "000200", 0x40, 0x6, 0x0, @rand_addr="0000000000000000000000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x2, 0x41424344, r5, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x3}, @mss={0x2, 0x4, 0x1}, @mss={0x2, 0x4, 0x8}, @sack={0x5, 0x2}, @mss={0x2, 0x4, 0x7}, @sack_perm={0x4, 0x2}, @generic={0x5, 0x11, "a05646940fb9d38ac868ab1e288926"}, @sack={0x5, 0x6, [0x6]}]}}}}}}}}) syz_emit_ethernet(0x21a, &(0x7f00000003c0)={@empty, @remote, [{[], {0x8100, 0x4, 0x0, 0x4}}], {@ipv6={0x86dd, {0x0, 0x6, "648ac5", 0x1e0, 0x28, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6c, 0xe, 0x0, 0x6, 0x0, [@loopback, @local={0xfe, 0x80, '\x00', 0x0}, @mcast1, @mcast2, @empty, @local={0xfe, 0x80, '\x00', 0x0}, @remote={0xfe, 0x80, '\x00', 0x0}]}, @dstopts={0x10, 0x2, '\x00', [@ra={0x5, 0x2, 0x1}, @pad1, @jumbo={0xc2, 0x4, 0x9}, @jumbo={0xc2, 0x4, 0xffffffff}, @pad1]}, @routing={0x3b, 0x6, 0x0, 0x7, 0x0, [@ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, @mcast1, @mcast2]}], @tcp={{0x0, 0x2, r4, r5, 0x1, 0x0, 0x12, 0x1, 0x6, 0x0, 0x6, {[@md5sig={0x13, 0x12, "4240de985ba51dae175af82b89242a22"}, @eol, @mss={0x2, 0x4, 0x3}, @nop, @eol, @eol, @fastopen={0x22, 0x3, "03"}, @sack_perm={0x4, 0x2}, @nop, @generic={0x8, 0x11, "5296f4049ce5609eac17ab7f4f43ff"}]}}, {"63e6b1c4ffcfd60ed5ab13001aed8f4edf199df6177553503f03d9b6ba937e5f94db8122cdbf29eb635178fd30fccc90551fb7e1b964b08c0ee93a48294d9e7578ae9c633b3bdca96ea3dea4e4c43cf31cce4716ca558a1465b7cd52ca05059522d4d711ea68f74981f309c42d4ca86190fff6ccc70c236507365d494d586c211dc83783480d11fdf06c449e0f58a1ee272e2d8d7d6a30df89b49fd74b803ff9bcd7f94dc6b032d0e2b5dff5222fe192ede44cb8cb7fc4ed7967926fb10993074d77301ec589cc89"}}}}}}}) aio_waitcomplete(0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000200)='*'], 0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd, 0xc70, 0x0, 0x2}, 0x80, 0xffff, 0x7, 0x80, 0x0, 0x0, 0x8}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x3, 0x1ff, @empty, 0x3}}, 0x0, 0x9, 0xb, 0x2}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000100)={0xcf14, 0x400, 0x1, 0x0, r6}, 0x10) 4.272725209s ago: executing program 0 (id=198): munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRESSES(r0, 0x84, 0x8003, &(0x7f0000000b00)={0x0, &(0x7f0000000a80)=[@in={0x10, 0x2, 0xffffffffffffffff, @multicast1}, @in={0x10, 0x2, 0xffffffffffffffff, @multicast2}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}, @in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, @in={0x10, 0x2, 0xffffffffffffffff, @multicast2}, @in={0x10, 0x2, 0xffffffffffffffff, @broadcast}, @in={0x10, 0x2, 0xffffffffffffffff, @loopback}]}, &(0x7f0000000b40)=0x10) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000003dc0)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h', &(0x7f00000007c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f0000000c40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f00000010c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f0000001540)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84U\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00'/1144, &(0x7f0000001b40)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h?\xa9\xbbW:\xa1\x95\xd0\xb8\xcc\x0f<\x88\b\x8a\x1d\xa1\xdc3d\xe7\xec\xa5\xb5(\xfc\xf9\x98\x1d\xc6\x14r\xca\x8d\x03\xca\xf5H\xf9\x8e\x7f\xad\xfan\'\xa8g\xda\x1a\xa3kM\x86\xef:\x92]\xde\xea\xae\xce\x98\x9f9\xe2\vZ%\xc5B\x91[b\xb5X\xed\\\xbd\xbbY@\xc5\xea!\x9a\x92E\x8cZ\xe3/^\xf4\x83\'\b\xdd\xd0\xd4L\xe9P62\xd7f\xf0\xdf\xdd\xc5V\xf7O,T\x90\x19\f\xbf\xf09lz=\x16\xb0\x8e,\xa3UhO\x7fe\xdb\xc35\xf7\x1ed\x9b\x7f\x9b\xf4\xadj} \xffX', &(0x7f0000003900)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h'], &(0x7f0000000100)) freebsd11_lstat(&(0x7f0000000140)='./file1\x00', &(0x7f0000000280)) setsockopt$inet6_int(r1, 0x29, 0x1b, &(0x7f00000001c0), 0x4) sendto(r1, 0x0, 0x0, 0x0, &(0x7f0000000580)=@in6={0x1c, 0x1c, 0x0, 0x0, @rand_addr='\x00\x00\x00\x00\x00\x00\b\x00\x00\b\x00'}, 0x1c) __realpathat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x49) fchflags(r1, 0x8) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) pipe2(&(0x7f0000000480), 0x0) sendto(r2, &(0x7f0000000040)="dc6f286d7025c87328285c0a6f0423fde83fdd529c028c39e6c8f1e238ce9db7557ca11d31289fd2cc28d62451d3c17a4f9cacd3b1d433377bb6d2364fc0505ce8fa0813424aa9d0b31348daa6670069d570f155220101f086347bdf298a3056b568682c4c26fc75d3bb1622d069324fb8dcb2cbe9b1e0daf4f1bf142a976ec2919903636a67136c7af265605e02af8de8e693ad1701f8f2c48df4e2619e27031a82cf56332d47c0ea7aa468e848d9a15de34a1b183a69608e399ff88aea3b344bd2dfb15b0a4e74e96d31d37b937831b8", 0xd1, 0x80, &(0x7f0000000200)=@in={0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10) freebsd10_pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x16, &(0x7f0000000080)={0x570}) freebsd11_lstat(&(0x7f0000000300)='./file0\x00', &(0x7f0000000500)) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r4, 0x8020690c, &(0x7f0000000080)) getgid() getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f00000004c0)) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r5, 0x0, 0x1, &(0x7f0000000140)="e047d6627cefe30108000074711ce4461d020000000001000069a3dba6f771d668fb0bfcfe337a83f39994f310103f66c10fe2ec0f1a02cd54ca4a3faf147b4ebf3cbb6e83d2c91a", 0x48) r6 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r6, 0x6, 0x2000, &(0x7f0000000200)={'rack\x00'}, 0x68) connect$inet(r6, &(0x7f0000000240)={0xb, 0x2, 0x3, @rand_addr}, 0x10) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$inet_int(r7, 0x0, 0x40, 0x0, 0x0) semop(0x0, 0xffffffffffffffff, 0x53) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x7, 0x410, 0xffffffffffffffff, 0x2db) 4.271299805s ago: executing program 2 (id=199): openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) syz_emit_ethernet(0xf2f, &(0x7f0000001480)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0xef9, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @remote={0xfe, 0x80, '\x00', 0x0}, [{0x1, 0x2, "21090962354e64022acbd86a94d838"}, {0x1, 0x1da, "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"}]}}}}}}) openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f0000000440)={0x28, 0x0, 0x10, &(0x7f0000000200)="3c9e89526b1f00b07f8aee18e5aa3505", 0x0, 0x0, 0x1, 0xfdffffff, [0x7, 0x0, 0x40]}) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$CIOCCRYPT(r1, 0xc0306367, &(0x7f0000000300)={0x0, 0x1, 0x0, 0x81ed, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000240)}) socket$inet6_sctp(0x1c, 0x5, 0x84) openat$crypto(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xa1) r2 = fork() sigqueue(r2, 0x11, @sival_ptr) sigqueue(r2, 0x13, @sigval_ptr) wait4(0x0, 0x0, 0x7, 0x0) open$dir(0x0, 0x1, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r1, 0x0) sync() kqueue() 4.231035127s ago: executing program 0 (id=201): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x8, 0x0, 0x1, 0x2, 0x0, @multicast2, @multicast1}, @icmp=@mask_reply={0x12, 0x0, 0x0, 0xdd}}}}}) symlink(0x0, 0x0) open$dir(0x0, 0x0, 0x0) truncate(0x0, 0xfffffffffffffff8) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) r1 = kqueue() syz_emit_ethernet(0x7e, &(0x7f00000003c0)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd605f6ad900483a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa0200907c000000006006c33e00002b00fe8000000000000000000000000000aa000000000000002bfffffffffffffffe640200730000000000000000000000000000ffffe0000001"]) kevent(r1, &(0x7f0000000100), 0x0, 0x0, 0x0, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) socket(0x10, 0x10000000, 0x4) chdir(0x0) getpriority(0x2, 0x0) openat$md(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r2, &(0x7f0000000100)='./file1\x00', 0x0) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000001c0)) renameat(r3, &(0x7f0000000200)='./file1\x00', r3, &(0x7f0000000140)='./file0/file0\x00') syz_emit_ethernet(0x5e, &(0x7f0000000380)={@random="73b9ccc300", @random="00f7000400", [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x28, 0x3a, 0xff, @rand_addr="00f0372e0865911feb7ee80000008000", @mcast2, {[], @icmpv6=@ndisc_redir={0x89, 0x0, 0x0, '\x00', @loopback, @loopback}}}}}}) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x3000000, 0x3, 0x0, 0x10000, 0x7, 0x3d, 0x0, 0x2, 0x0, 0x0, [0xffffffff, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x0, 0x6, 0x0, 0x4000002, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffffe, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2]}) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x47, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket(0x2, 0x1, 0x0) sendmsg$inet6_sctp(0xffffffffffffffff, &(0x7f0000000500)={&(0x7f0000000100)=@in6={0x1c, 0x1c, 0x0, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c, 0x0, 0x0, 0x0, 0x1c}, 0x0) 4.012822233s ago: executing program 2 (id=202): r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mkdirat(r0, &(0x7f0000000280)='./file0\x00', 0x0) mount(&(0x7f0000000040)='msdosfs\x00', &(0x7f00000000c0)='.\x00', 0x10000000000000, &(0x7f0000000100)) 3.96606207s ago: executing program 3 (id=203): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) mount(0x0, 0x0, 0x82600084, &(0x7f00000000c0)="35bf33baee71d8a68674a31ee54818dcc65ff6c32c5eb531e6dbe2bc6236d3981e288786f2f9a8a3252db260f999f154315d5f8877175bd785ad4fa995422150afb39d83") setgroups(0x3e, &(0x7f0000000100)) r1 = getegid() chown(&(0x7f0000000200)='./file0\x00', 0x0, r1) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r2, 0x3862) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) 3.934184643s ago: executing program 0 (id=204): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f0000000040)={0x29, 0x0, 0x1f, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735fbe8e5aa4f4bb6", 0x0, 0x0, 0x0, 0xfdfffffb, [0x8, 0x400000]}) 3.857088982s ago: executing program 0 (id=205): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x7, 0xffffffffffffff00, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet6_icmp(0x1c, 0x2, 0x3a) socket$inet6_udplite(0x1c, 0x2, 0x88) getsockname(r1, &(0x7f0000000000)=@un=@abs={0x8}, &(0x7f0000000040)=0x8) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000004c0)='./file0\x00') ioctl$MDIOCDETACH(0xffffffffffffffff, 0xc1c06d01, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3]}) socket(0x1, 0x5, 0x1a) r2 = kqueue() fpathconf(r2, 0x35) open$dir(&(0x7f0000000880)='./file0\x00', 0x8, 0x0) socket(0x1c, 0x1, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom(r3, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x0) connectat(r3, r1, &(0x7f0000000200)=@in={0x10, 0x2, 0x0, @local={0xac, 0x14, 0x0}}, 0x10) unmount(&(0x7f00000000c0)='./file0\x00', 0x180244) 3.687304508s ago: executing program 2 (id=206): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x80000, 0x0) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f0000000040)={0x29, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfdfffffd, [0x0, 0x0, 0x6]}) open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0x100000, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000000)={0x0, 0x18, 0x0, 0x0, 0x20, &(0x7f00000003c0)="70638953df0cef7e00080000000bf98994164394b5d947fa8802ca13b7270000", 0x10000, 0xbdfffffd, [0x0, 0x3]}) r2 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c2, 0x31) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) close(r2) open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) r3 = kqueue() openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) r4 = open(&(0x7f0000000280)='./file0\x00', 0x2110000, 0x12a) getsockopt$inet_mreqn(r4, 0x0, 0xd, &(0x7f00000002c0)={@remote, @rand_addr}, &(0x7f0000000300)=0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r5 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x6908bd7c4cbb1798) fchmod(r5, 0x188) kevent(r3, &(0x7f00000000c0)=[{0x4, 0xffffffffffffffff, 0xb1}], 0x1, 0x0, 0x0, 0x0) rfork(0x3060) rfork(0x80014) r6 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000, 0x0) ioctl$MDIOCATTACH(r6, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x0, 0x2, &(0x7f0000000040)='./file0\x00', 0x10000, 0x0, 0x3e, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x3, 0x0, 0x6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x653, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1]}) 3.39084942s ago: executing program 1 (id=57): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) acct(&(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreqn(r1, 0x0, 0x1, 0xfffffffffffffffe, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0xfffeffff, @rand_addr="caeb33aca447afcbebbfb477a3b36ba3", 0x7}, 0x1c) r2 = shmget$private(0x0, 0x3000, 0x1e0, &(0x7f0000001000/0x3000)=nil) setuid(0xffffffffffffffff) open$dir(&(0x7f0000000640)='./file0\x00', 0x200, 0x72) setresgid(0x0, 0xee01, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x8001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r3, 0x80000003, 0x0, 0x0, [0x20, 0xfffff48f], 0x401, 0x0, 0x2, {0xfffffffffffffffe, 0x7, 0x0}, {0x0, 0xfffffffd, @sival_int, @ke_flags=0xc000}}) rfork(0x3060) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344}, 0x5, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @random="0010000800", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @remote={0xac, 0x14, 0x0}}, @tcp={{0x2, 0x3, 0x41424344, r4, 0x0, 0x0, 0x5}}}}}}) mprotect(&(0x7f0000192000/0x4000)=nil, 0x4000, 0x5) munmap(&(0x7f00002bd000/0x3000)=nil, 0x3000) fork() mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344, 0x41424344}, 0x1, 0x401) syz_emit_ethernet(0x11a, &(0x7f0000000300)={@random="ef258162e50c", @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x31, 0x10c, 0x67, 0x401, 0x4, 0x11, 0x0, @local={0xac, 0x14, 0x0}, @rand_addr=0x8, {[@end, @end]}}, @tcp={{0x0, 0x1, 0x41424344, r5, 0x0, 0x0, 0x5, 0x0, 0x23b, 0x0, 0x6}, {"418be4171739917c58e244038e9f67e762df616dda83e57778e106ac2e723df807c2cd59707637925481c17ccc93e2aaac721515481ffb077e6eedf12e57a3ac4e2d9df24be04a5f6e8a4b32fb48c5edac24dff592d5f953dcbc6162b93b00513fb0435b016169348814685f25d59818e4aef3c51cffbcbfd53c8445c831ee9f0c6a9cc96b61ae3820c5d95224a77a961839cf6949d7cc1eaf1751059600429183fa4cccca2d20630f9e290d83adf3301f60386f9ae8645a20900e207cd5eca87e5d80a889da5ac06c743b6fbdccba1fa048124b29ed744cfc52654cddbbb86e"}}}}}}) syz_emit_ethernet(0x76, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "000200", 0x40, 0x6, 0x0, @rand_addr="0000000000000000000000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x2, 0x41424344, r5, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x3}, @mss={0x2, 0x4, 0x1}, @mss={0x2, 0x4, 0x8}, @sack={0x5, 0x2}, @mss={0x2, 0x4, 0x7}, @sack_perm={0x4, 0x2}, @generic={0x5, 0x11, "a05646940fb9d38ac868ab1e288926"}, @sack={0x5, 0x6, [0x6]}]}}}}}}}}) syz_emit_ethernet(0x21a, &(0x7f00000003c0)={@empty, @remote, [{[], {0x8100, 0x4, 0x0, 0x4}}], {@ipv6={0x86dd, {0x0, 0x6, "648ac5", 0x1e0, 0x28, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6c, 0xe, 0x0, 0x6, 0x0, [@loopback, @local={0xfe, 0x80, '\x00', 0x0}, @mcast1, @mcast2, @empty, @local={0xfe, 0x80, '\x00', 0x0}, @remote={0xfe, 0x80, '\x00', 0x0}]}, @dstopts={0x10, 0x2, '\x00', [@ra={0x5, 0x2, 0x1}, @pad1, @jumbo={0xc2, 0x4, 0x9}, @jumbo={0xc2, 0x4, 0xffffffff}, @pad1]}, @routing={0x3b, 0x6, 0x0, 0x7, 0x0, [@ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, @mcast1, @mcast2]}], @tcp={{0x0, 0x2, r4, r5, 0x1, 0x0, 0x12, 0x1, 0x6, 0x0, 0x6, {[@md5sig={0x13, 0x12, "4240de985ba51dae175af82b89242a22"}, @eol, @mss={0x2, 0x4, 0x3}, @nop, @eol, @eol, @fastopen={0x22, 0x3, "03"}, @sack_perm={0x4, 0x2}, @nop, @generic={0x8, 0x11, "5296f4049ce5609eac17ab7f4f43ff"}]}}, {"63e6b1c4ffcfd60ed5ab13001aed8f4edf199df6177553503f03d9b6ba937e5f94db8122cdbf29eb635178fd30fccc90551fb7e1b964b08c0ee93a48294d9e7578ae9c633b3bdca96ea3dea4e4c43cf31cce4716ca558a1465b7cd52ca05059522d4d711ea68f74981f309c42d4ca86190fff6ccc70c236507365d494d586c211dc83783480d11fdf06c449e0f58a1ee272e2d8d7d6a30df89b49fd74b803ff9bcd7f94dc6b032d0e2b5dff5222fe192ede44cb8cb7fc4ed7967926fb10993074d77301ec589cc89"}}}}}}}) aio_waitcomplete(0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000200)='*'], 0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd, 0xc70, 0x0, 0x2}, 0x80, 0xffff, 0x7, 0x80, 0x0, 0x0, 0x8}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x3, 0x1ff, @empty, 0x3}}, 0x0, 0x9, 0xb, 0x2}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000100)={0xcf14, 0x400, 0x1, 0x0, r6}, 0x10) 1.185690097s ago: executing program 0 (id=207): mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, 0x0, 0x0) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) kqueue() ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000280)={0x0, [{0x10, [0x2, 0x80000001, 0x3, 0x2, 0x5, 0x3, 0x7e3, 0xc00000, 0x1, 0x6, 0x6, 0x0, 0x10001, 0x2, 0x5, 0x10001, 0x6, 0x1, 0x8, 0x59, 0x8, 0x3, 0xffffffc0, 0x9a01, 0x0, 0x3ff, 0xf, 0x8, 0x8, 0x64, 0xffffff80, 0x2a, 0xd, 0xfffffff8, 0x4, 0xb1400000, 0x3, 0x1, 0x7f, 0x2, 0x1ff, 0x97, 0xc5, 0x0, 0x35ed, 0x5, 0x6, 0x7fff, 0x9, 0x5, 0x10000, 0x1, 0x0, 0x5, 0x1, 0x4, 0x7f, 0x2, 0x101, 0xffffc415, 0x400, 0x2e1, 0x8, 0xd, 0x6, 0x8, 0x9, 0x2, 0xd2ab1ce, 0x401, 0x7fffffff, 0x4, 0xfffff801, 0x4, 0x80000000, 0x0, 0x1ff, 0x7f, 0x8, 0x4, 0x7fff, 0x1, 0x8, 0x8001, 0x90000000, 0x81, 0x6, 0x2, 0x1, 0xa97, 0xffffffff, 0x7, 0x9, 0x7, 0xc42, 0x4, 0x8, 0x8bbd, 0x202e, 0x3, 0xe, 0xe6d1, 0x874, 0x3]}, {0x6, [0x7, 0x7, 0x5, 0x5, 0x6, 0xb66f, 0x77, 0x8, 0x1, 0x1ff, 0xffffffff, 0x7, 0x6, 0x1, 0x6fb, 0x2, 0x80, 0x4, 0x10000, 0x51, 0x81, 0xfffffffd, 0x1, 0x6, 0xb76, 0x8, 0x3, 0x7, 0x7, 0xa, 0x1, 0x2, 0xb, 0x7, 0xa41, 0x5, 0x0, 0x5, 0x63, 0x350, 0x3, 0x0, 0x4, 0x40, 0x10, 0x1370, 0xbd, 0xfffffffd, 0x8, 0x1, 0x80000001, 0x7, 0xd, 0x1, 0x80, 0x80000000, 0x7, 0x3, 0x4, 0x1, 0x3, 0x67, 0xfffffffe, 0x6, 0x100, 0x9, 0xfffffffc, 0x1, 0x5, 0xffffffff, 0xfff, 0x7, 0xe0000000, 0x6, 0x6, 0x1, 0x2, 0x5, 0xffffff01, 0x8, 0x1, 0x0, 0x6, 0x0, 0xd4b, 0x10001, 0x2, 0x23bb5c20, 0x36, 0x3, 0xffffffff, 0x2, 0x0, 0x3ff, 0x4, 0x5, 0xffffffff, 0x1f, 0x7, 0x6, 0x7fff, 0x92, 0x10]}, {0x0, [0xffff, 0x8, 0x5, 0x152, 0x18, 0x3, 0x8, 0x8, 0x3, 0x7, 0x4, 0xeae4, 0xfffffff7, 0x80000000, 0x4, 0x0, 0x3386, 0x5, 0x8, 0x7, 0x2, 0x46ceb067, 0x6, 0xf2, 0x8, 0x6, 0x9, 0x8, 0x8000, 0xf6000000, 0xe3, 0x80, 0x7, 0x7, 0x2, 0x842, 0x7, 0xc, 0x8, 0xb, 0x4, 0xffffffff, 0x9cec, 0x5, 0x5, 0x100, 0x5, 0x5, 0x200, 0xceb4, 0xfffffff7, 0x5, 0xd, 0x2, 0x7, 0x7fff, 0x2e, 0x5, 0x8, 0x6, 0xb, 0x6, 0x6, 0x7, 0x4e, 0x7f, 0xe00a, 0x81, 0x8, 0x7fff, 0x7, 0x3, 0x1, 0x8, 0x5, 0x5, 0x6, 0x7, 0x9, 0xfffff81d, 0x6, 0xa9, 0x7, 0x8000, 0x1, 0x7, 0x3, 0x0, 0x400, 0x1, 0xff, 0x32, 0x8001, 0x6, 0x4, 0x702c, 0x2, 0xb, 0xfffffffa, 0x803, 0x668085db, 0x4, 0x6, 0x8]}, {0x7, [0x2, 0xffffffff, 0x7, 0x8, 0x10001, 0x8000, 0x16c85719, 0x7, 0x2, 0x1, 0x0, 0xcc, 0xebfe, 0xfffffff0, 0x1ff, 0x8, 0x4, 0x1000, 0x7, 0x0, 0xffffffff, 0x2, 0x3, 0xffff7fff, 0x4, 0x0, 0x3, 0xffff, 0x84, 0xfff, 0x6, 0xa, 0xffff, 0x5dd, 0x6, 0x7, 0x40, 0x2, 0x5, 0x7, 0x6, 0xd, 0x8, 0xe, 0x6, 0x4, 0x6, 0x1ff, 0xe, 0x3, 0x40, 0x9, 0x8, 0xa36, 0x3, 0x4, 0x6, 0x65f, 0xef, 0x5, 0x7, 0x0, 0x4, 0x9, 0x2, 0x4000, 0x5, 0x8, 0x7, 0x6, 0x7, 0x5, 0x9d, 0x59, 0x100f, 0x7, 0x7, 0x5, 0xffffffff, 0x9d1c, 0x5c, 0x5ac9f6d2, 0x7, 0x9, 0x200, 0x6, 0x7, 0x2, 0xc034, 0x4, 0x3, 0x2, 0x549, 0x57, 0x6, 0x3, 0x8, 0x5, 0x2, 0xff, 0x2, 0x10001, 0x0, 0x8]}, {0x5, [0x7, 0x549a, 0x2, 0x5, 0x7fffffff, 0x7, 0xfffffffb, 0x8, 0x9, 0xb1, 0x4, 0xc, 0x2, 0xb, 0x5, 0x7, 0x1, 0x3, 0x8000, 0x3, 0xffffff81, 0x5, 0x8, 0x870f, 0xfffffffb, 0x8, 0x7, 0x4, 0x19, 0xab5, 0x69b, 0x401, 0x7, 0x2, 0x3, 0x5, 0xf, 0x80, 0xad2f, 0x4, 0x8, 0x60d7, 0x8f4, 0x7, 0x98, 0x6, 0x2, 0x7, 0xb5, 0x7, 0x0, 0x7, 0x0, 0xd2d1, 0x0, 0xdd8, 0x53d, 0x8, 0x3, 0x5, 0x1450, 0x6, 0x200, 0x8, 0x0, 0x7, 0x67, 0x9f, 0x8, 0x8, 0x4, 0x1, 0x73, 0xfffffff2, 0x4, 0x4, 0x5, 0x3, 0x3faf, 0x6, 0x0, 0xd70, 0xa, 0x20a9, 0x1a, 0x40, 0x8, 0x5, 0xffff, 0x7, 0xfff, 0x6, 0x200, 0xb, 0x400, 0x63, 0x6, 0x3ff, 0x6, 0x401, 0x8, 0x0, 0x8, 0x4]}, {0x10001, [0xa3f1, 0x10000, 0x2, 0x3, 0x9, 0x400, 0x2, 0x6, 0x4, 0x5, 0xfffffffd, 0x2, 0x400, 0x5, 0x9, 0x1, 0x81, 0x2, 0x1, 0x8, 0x8, 0x5, 0x3, 0x9, 0x5, 0xf269, 0x6, 0x4, 0xc, 0x0, 0x0, 0x7, 0x8, 0x3, 0xffffffff, 0x8001, 0x2, 0x3, 0xb57, 0x3, 0xbe, 0x9, 0x8, 0x7, 0x3, 0x200, 0x2, 0x4, 0x0, 0xff, 0x1, 0xc, 0x9194, 0x4, 0x9, 0x4293, 0x1000, 0x3, 0x1556, 0x0, 0x2, 0x3199, 0x9, 0xd352, 0x343b0fd1, 0xffffffff, 0x75a8921d, 0x4, 0xe3, 0x4c9, 0xfffff001, 0xf, 0x1, 0x4, 0x9, 0x1, 0xe3, 0x7, 0x3, 0x0, 0x7, 0x10001, 0x7, 0x2, 0x800, 0x300000, 0x3, 0x6, 0x7, 0x6, 0x0, 0x5, 0x2, 0x81, 0x5, 0x161, 0x7ff, 0x200, 0x832, 0x86d, 0x8, 0x10000, 0x3ff, 0x7fff]}, {0x6, [0x8, 0xfffffffb, 0x1, 0x2, 0x80, 0x3, 0x37f, 0x0, 0x400, 0x7, 0x134, 0xf7, 0x3, 0x0, 0x7, 0x1, 0x0, 0x4, 0xfffffff6, 0x4bdf68cc, 0x4, 0x7, 0x0, 0x1ff, 0x381, 0x9, 0xfc, 0x7f000000, 0xfffffff7, 0x9, 0x8, 0x9, 0xfffffff9, 0xb2, 0x7f, 0x3, 0x101, 0x5, 0x81, 0x7e25, 0x1, 0x9, 0x2, 0x3, 0x1, 0x5, 0x3, 0xa, 0x80000001, 0x2, 0xb5, 0x5, 0x401, 0x2, 0x84, 0x3fc0, 0x0, 0x5b1, 0x9, 0x5, 0x1ab, 0x8, 0x3, 0x4, 0x507, 0x3, 0x7fffffff, 0x1668, 0x7fff, 0x2, 0xe, 0x80, 0x2, 0x2, 0x27, 0x3, 0xfffff800, 0x8000, 0xfffffffc, 0x0, 0x2, 0x7ff, 0xfffffc00, 0x10, 0x2, 0x76, 0xd, 0x3ff, 0x1, 0x10001, 0x1000, 0x0, 0x9, 0xffffffff, 0x4, 0x81, 0xb, 0x4, 0x8, 0x7d, 0x5, 0x7b, 0xf1, 0x8]}, {0x9, [0x9, 0x7, 0x5, 0x5, 0x2, 0x80000001, 0x4, 0x1000, 0x9, 0x8, 0x7, 0x1, 0x1a2c88b4, 0xfffffffe, 0x10000, 0xf, 0x8, 0x0, 0xffff, 0x4, 0xfffffc01, 0x0, 0x57d, 0x0, 0x8000, 0x5, 0x8, 0x3, 0x2, 0xeff2, 0xf, 0x7, 0x7, 0xfffffff6, 0x3, 0x80000000, 0xfffffffb, 0xa8, 0x40, 0x80, 0x3c, 0x2, 0xdf, 0xb7, 0x0, 0xe, 0x7, 0x9, 0xed6, 0x10, 0x3ff, 0x2, 0x3, 0x9cf, 0x0, 0x1, 0x401, 0x8, 0x6, 0x3, 0x10, 0x8, 0x10000, 0x38, 0x6a5, 0x10, 0x0, 0xffffffff, 0x1ff, 0x1, 0x67, 0xfffffff9, 0x4, 0x3, 0x9, 0x5, 0x0, 0xffffffff, 0x1, 0x0, 0x71, 0x3, 0x1000, 0x9, 0xffff, 0x8000, 0x10, 0x5, 0x605, 0x9581, 0x8, 0x101, 0x2, 0x8, 0x9, 0x80000000, 0x3ff, 0x8, 0x7fe, 0x8, 0x0, 0x6, 0xf7600000, 0x4]}, {0x2, [0xe2e, 0x7f, 0x5, 0x1, 0xf20, 0x9, 0x7d4, 0x9, 0xffffff49, 0x5, 0x4, 0x3, 0x39b, 0x800, 0x4, 0x7, 0x7, 0x7, 0x5, 0x4df780, 0x7f, 0x1ff, 0x401, 0xb8d, 0x10, 0x9, 0x100, 0x7f, 0x3, 0xd4, 0x13eb, 0x6, 0xfffff6b4, 0x1, 0x7, 0x5de5, 0x7, 0x6, 0xfff, 0x40, 0x3, 0x8, 0x860d, 0x4, 0x1, 0x10, 0xb, 0x4, 0xfffffff7, 0x5, 0x5, 0x4, 0x1000, 0x3, 0x5, 0x5, 0x800, 0x2, 0x7, 0x3, 0x7a2a, 0xffff, 0x6, 0xf, 0x2, 0x2, 0xdd, 0x6, 0x8001, 0xee6, 0x7, 0xfd, 0x3, 0x38, 0xa, 0x800, 0xdc, 0xff, 0xfff, 0xffffffff, 0x40, 0x1, 0x4, 0x7, 0x80, 0x2, 0x9, 0x7, 0x7ff, 0x1, 0x9, 0x8000, 0x9, 0x8000, 0xa76f, 0x7, 0x9, 0x200, 0xffffffff, 0x6, 0xffffffff, 0x968f, 0x5, 0x84]}, {0x4, [0x0, 0x7ff, 0x100, 0x5, 0xa8, 0x80000000, 0x9, 0x8c, 0x6, 0x6, 0x80000001, 0x6, 0xc, 0x1, 0x7, 0x247, 0x8000, 0xc8, 0x400, 0x4, 0x5, 0x4, 0x44e546fd, 0xf7e, 0x6, 0x8000, 0x7, 0x7, 0x8, 0x5, 0x8001, 0x0, 0x8, 0x3, 0x5b, 0xfff, 0x3, 0x8, 0x800, 0x8, 0x7, 0x8, 0x2, 0xfffffff7, 0x8, 0x6, 0xf, 0x60, 0x4, 0x8, 0x5, 0xb257, 0x10001, 0x9, 0x0, 0x9, 0x9, 0x3, 0x8, 0x800, 0x8, 0x7ff8000, 0x80, 0x80000000, 0x4, 0x2, 0x4, 0x7, 0x0, 0x4, 0xffffffff, 0x4, 0x2, 0x3, 0x7, 0x9, 0x6, 0xfffffffb, 0x1ec9, 0x2, 0x0, 0x0, 0x3, 0x6, 0x7, 0xfff, 0x2, 0xffff, 0xa7b1, 0xf, 0x9, 0x617, 0x86, 0x5ccc9dd2, 0x6, 0xa, 0xf, 0x5, 0x2, 0x100, 0x8001, 0x1, 0x7, 0x44]}, {0x3ff, [0x9e, 0x10000, 0x5, 0xfffffffc, 0x80000001, 0xffffff81, 0x9, 0xffffff4f, 0x7f, 0x4, 0x2, 0xd, 0x2, 0x1, 0xe, 0x5, 0xfffffffe, 0x1, 0x6, 0x5, 0x5, 0x4, 0x3, 0xf090, 0xfffffff7, 0x8, 0xfffeffff, 0x7, 0x0, 0x7, 0x2, 0x5, 0x3, 0x8, 0x3ff, 0xfffffff5, 0x40, 0x1649aeb7, 0x0, 0x8, 0x0, 0x3, 0x2, 0x800, 0x0, 0xa, 0xda25, 0x3, 0x7, 0x6, 0x3ff, 0x5, 0x7f, 0x8, 0x7, 0xfffffff0, 0x8, 0xbdd, 0x800, 0x3, 0x0, 0xdb6, 0x8, 0x7ff, 0x7ff, 0x6, 0x8, 0x0, 0x8, 0x4, 0xb608, 0x5, 0x3, 0x9, 0x3, 0x0, 0x0, 0x7ff, 0x9, 0x5, 0x8, 0x8, 0xfffffbd0, 0x8, 0x5, 0x4, 0x10, 0x4, 0x7, 0x7, 0x6f, 0x4, 0x5, 0xffff7fff, 0x4, 0x4, 0x8000, 0x7, 0x401, 0x20000000, 0x0, 0x2, 0x2, 0x7]}, {0x7fff, [0x86fd, 0x3, 0x10001, 0x5, 0xc, 0xb, 0x10000, 0xe755197, 0x6e36, 0xdde5, 0x5, 0x101, 0x3d, 0x0, 0x56000000, 0x3, 0x8, 0x7, 0x1, 0x1ef, 0x101, 0x3ff, 0x1, 0x1, 0x2, 0x31, 0x6, 0xff, 0xc0000000, 0xfff, 0x3, 0x8, 0x5, 0x3, 0x2aee, 0x5, 0x5, 0x2, 0xb, 0x9, 0xb663, 0x40, 0x1, 0x1ff, 0x1, 0x87, 0x86b, 0x5, 0x9, 0x4, 0x4, 0x8, 0x8ee5, 0xfffffffb, 0x3, 0x0, 0x0, 0x8, 0xffffffff, 0x6075, 0x3, 0x6, 0x5dd, 0x0, 0x4, 0x4, 0x0, 0x3ff, 0x4, 0x101, 0x80000000, 0x6, 0x3, 0x800, 0xe, 0x6191, 0x800, 0x7, 0x8000000, 0x0, 0x10000, 0xa, 0x9, 0x1, 0x1, 0x10, 0x5, 0x2, 0xd66dc23, 0x5, 0x6, 0x3d6e, 0x40000000, 0x662e, 0x81, 0x81, 0x9, 0x4, 0xb, 0x200, 0x4, 0x56, 0x9, 0x3]}, {0x10, [0x2, 0x2008000, 0x800, 0x0, 0x434, 0x7, 0xff, 0x1ffa767a, 0x9, 0xff, 0x316, 0xb, 0x400, 0x9, 0x5, 0x5, 0x5, 0x80000000, 0x5, 0x5, 0xe380, 0x3, 0x1, 0x4, 0x55e, 0x3, 0x7, 0xa, 0x7, 0xf, 0x0, 0x3, 0x8fb5, 0x2, 0x80000001, 0x1, 0x0, 0x5, 0x5, 0x3, 0xde4a7a28, 0x4, 0x6, 0x4, 0x1, 0xfe4, 0x4, 0x8001, 0x1, 0xffffffff, 0x2, 0x1f, 0x4bf, 0xbb, 0x2800, 0x4af, 0xff, 0xfff, 0x80000001, 0x7, 0xd, 0x5b, 0x8, 0x1, 0xffff, 0x401, 0xd, 0x6, 0x4, 0x0, 0x7, 0x8, 0x8, 0x0, 0x6, 0x7fff, 0x8, 0x2, 0x2, 0x2a, 0x5, 0x4, 0xffff, 0x3ff, 0x8, 0x0, 0xbb4f, 0x200, 0xd, 0x40, 0x81, 0xfffff997, 0x6, 0x80, 0x9, 0x3, 0x8, 0x6, 0x1000, 0x10001, 0x8, 0x5, 0x6, 0x47d]}, {0x0, [0xbb2, 0xd, 0x7, 0x8, 0x2, 0x81, 0x12ff, 0x6, 0xd, 0xffff1277, 0x10, 0x3, 0x80000000, 0x5, 0x2, 0xffff, 0x2, 0x5, 0xd, 0x4, 0x1, 0x962, 0x6, 0x4, 0x3, 0xfffffffd, 0x0, 0xea5d, 0x81, 0x2, 0x4, 0xfe5, 0x510, 0x1, 0x3, 0x5ee6, 0x3, 0x9, 0xc793, 0xffffff71, 0x28, 0xfff, 0x4, 0x0, 0x8000, 0x2, 0x4, 0x34, 0x4a8, 0x5, 0x0, 0x6, 0x401, 0x6, 0x4, 0x6, 0x2, 0x7, 0x9, 0x80000001, 0x10001, 0x101, 0x1, 0x6, 0x6, 0x0, 0x1, 0x10000, 0x40000, 0x9, 0x8, 0x3e, 0x1, 0x1, 0x101, 0x2, 0x1, 0x5, 0x4, 0xfffffffa, 0xf, 0x0, 0x4d, 0x3ff, 0x3, 0xa, 0x3, 0x6, 0x8, 0xffff6683, 0xa, 0x3ff, 0x8, 0x8, 0xfffffff8, 0x6, 0x9, 0xfffffee0, 0x2, 0xffffffff, 0xc6, 0x1054, 0xd, 0x6]}, {0xffffff43, [0x0, 0xc9a, 0x62084d76, 0x4, 0x1, 0x1, 0x2, 0x4, 0x2, 0x8, 0x3, 0x6, 0x1, 0x2, 0x967f, 0x80000000, 0x800, 0x1ff, 0x0, 0x837d, 0x80000000, 0x1, 0x8, 0x5, 0x77, 0x7, 0x4cf, 0x10001, 0x3, 0x1, 0x10001, 0x4, 0x800, 0x9, 0x2, 0x0, 0x7f, 0x4, 0xea, 0x5, 0x97e, 0x2, 0xf, 0x8c, 0xb616, 0x6, 0xfffffff0, 0x4, 0x7fff, 0x12000, 0x4, 0xd, 0x1, 0x7, 0x2, 0x1ff, 0x8, 0xfffff334, 0x4, 0x40, 0x80, 0x8001, 0x8, 0x4, 0x5180, 0x5, 0xca, 0x9, 0x422, 0x10, 0x200, 0x4, 0x1, 0x2, 0x6, 0x92, 0xfffffffe, 0x6, 0x101, 0x58e, 0xd, 0x8, 0x719990b3, 0x3, 0xfffffff7, 0x800, 0x9, 0xffff, 0x80, 0x200, 0x8, 0xf, 0x8, 0x200000, 0x6803dbbe, 0x4, 0xe0, 0x3, 0x400, 0x1, 0x7, 0x92]}]}) bind$inet6(0xffffffffffffffff, 0x0, 0x0) aio_cancel(0xffffffffffffffff, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x80000, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r2, 0x0) ioctl$BIOCSETFNR32(r2, 0x80084282, &(0x7f0000000080)={0x7, 0x7}) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00'}, 0x24) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, &(0x7f0000000000)='newreno\x00', 0x8) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x2, &(0x7f0000000040)=0x2, 0xfffffffffffffffd) sendto$inet(r3, &(0x7f0000000200)="69420055bfb48f140d6473c6f203f04ef80900000059f3f11b82079618d2a354f0b30c78df82c0512a7c64f8cdc42f35d03b7fa43d44ee2f1355063b11818abf8b61204b9b6838a59070b46d453ed603d73b1a7570", 0x55, 0x100, &(0x7f0000000000)={0x10, 0x2, 0x1}, 0x10) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) munlockall() 1.18006886s ago: executing program 2 (id=208): setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x51, 0x0, 0x0) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000001940)='./file2aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) rmdir(&(0x7f0000000200)='./file2aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') setsockopt(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x18289, 0x110) write(r1, &(0x7f00000004c0)="b96abcf5ac7cffa09ea845315c0d853a", 0x10) r2 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x100) renameat(r2, &(0x7f00000000c0)='./file0\x00', r2, 0x0) syz_emit_ethernet(0x7a, &(0x7f0000000400)=ANY=[]) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, 0x0, 0x0) kevent(r0, 0x0, 0x0, &(0x7f0000000100)=[{}], 0x1, &(0x7f00000001c0)={0x80000000, 0x4}) getpid() recvmsg(r1, &(0x7f0000000480)={&(0x7f0000000080)=@un=@abs={0x8}, 0x8, &(0x7f0000000180)=[{&(0x7f0000000300)=""/114, 0x72}, {&(0x7f0000000500)=""/137, 0x89}, {&(0x7f00000005c0)=""/70, 0x46}], 0x3, &(0x7f0000000640)=""/166, 0xa6}, 0x2) cpuset_setdomain(0x2, 0x2, 0xffffffffffffffff, 0x20, &(0x7f0000000040)={[0x1]}, 0x3) ioctl$DIOCRADDADDRS(0xffffffffffffffff, 0xc0184415, &(0x7f0000000a80)={{"df45187d7638f2f7bc836152843806587e7ee1bd3970459cb2cbee8401dfc33320b75ccfd729a25b38df20b45c678215f49f53e09510b4b6914adcbc90ab07184b0ad82cd7384ed6c40686e93601819fb0b534d30b825c4b6f32dd0aeb13594b1d5d6e18070f475c62040e767a1675dafa428bd4cd50ba75aa99251bd476be7ed22a9b2f9d35db8e7d6672a9caba297d7ca6d23a0605562b94441d0c29b7be1f9685a2536b2a38da8c2d5eb87f3c489a956ed8ee3698d520ef8089198bc3429a67e0865de9152749003cfcabeeda083606cd1decd7b9eac2f2b36dc8848d9ec57747f51da25acd9070f37b11ac8c6f031bea2d6ec44f4222f106f1fbb9711ecce444ef7ffb7edc53bef1149ead739c6452d65c392c95425e281a6d68e8a449eab0e678af021a9b565da5ab53a4d452cc890b61412baaf8ebb313f553cbf95f715ee19e907bb0caed501e48a66509799b8257d03a2298d92002049ee5b0cc7980794513eda1fe9483c9a7fe0d64bd813e7e4218d8fa8550d94e2341d21d7f410af62c9ea1827e6249af29ce2e96cfc6028576160b54a9622dc58b629276d399c1094a20683e8e091bd1ed2c7045a949309daf5aca74652701f4e26c2d530eef192c1b713216c8c677fff95d9104097a3da48d674e5fb106e6b1c79639a341f4191044ae3ae1dbc112f1c1574d3cf8fd148326dd5e7d73b6940978413f5198caa090c0a4541775bff5851e09f5d6bfc7bf5b4902a282709216bda29d6c6aa64446aaeead04633f0dcd83c4b87964564108220d13a1a11ddea1006ce04c6ab96362e9f7780b82e8627f9298430855b151bc2c8429fa6fc1c9486388103f62e96bcbd87fec7d2f8b460f5973493a987bbafe8200000000595a645af34a594644dd369be6c42dcc99d9306f5fd7f963675bfe9aa133b7ec8d578f21e878a5f29d56af3887f8b5bc09e1363848e7ad02a9b1a4ad1da369869cfc2123e13588d249b8c0aab32534c4b6f1fbce459ce19f75f5153107c2884c6740bc04843b3f844d147061f4ccbe71c0e27eb42a370756560ecd81ad1ded939926794889b64e42c16830c07c99325f0e69c9daeded96af750e3894b819592f9fe1a6ecb7a9b99253ba4e8b4673dd4b14c7da84bd4e020080f18c3d07031cb9501828b6fc6eae4e94717d8cd8d9bd7f4d16653d5ac50a53858493fd7a747e35868ad247ce1865f8397827bdb2ff4dbda235b81813214a96ffc7db32dee1656be4fa080b61aab0b70a0646ef2d98106742fc28efd8c4858c4464b2a3f2c3d9b9df3832af68b77ba8ad698eddae6c38d90709c11b4e962ae43ad62d987a7b292be9c00b44671a1fc6c921ef9a4653883602c38c1fba148f3f1e1117ba61e080eb3991d8e8205b8e999adf52ab01cec50ec27d4c11b100", "0920cf14d501a846a22d8eb300fbff0400000000000000001000"}, 0x0, 0x14, 0x0, 0x0, 0x20000002, 0xb, 0x0, 0xfffffffffffffffe}) ioctl$DIOCCHANGERULE(0xffffffffffffffff, 0xcbe0441a, &(0x7f0000000040)) 1.178870393s ago: executing program 3 (id=209): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x200, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) (async) mkdirat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0) (async) ioctl$KDSETLED(0xffffffffffffffff, 0x20044b42) (async) socket$inet6_sctp(0x1c, 0x5, 0x84) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x8) r2 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) (async) r3 = socket(0x1c, 0x3, 0x6) getsockopt$sock_int(r3, 0xffff, 0x1011, &(0x7f0000000000), &(0x7f00000002c0)=0x4) (async) r4 = open(&(0x7f0000000380)='./file0\x00', 0x100000, 0x4ebfac6bbaf7949) fcntl$lock(r4, 0xa, &(0x7f00000019c0)={0x1, 0x0, 0x2000000000000001, 0x2}) (async) bind$inet6(r4, &(0x7f0000000140)={0x1c, 0x1c, 0x0, 0x400, @empty}, 0x1c) (async) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f00000001c0)={'bbr\x00', 0x1}, 0x24) (async) connect$inet6(r2, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0x1000000}, 0x1c) (async) ppoll(&(0x7f0000000000)=[{r2, 0x188}, {r2}, {0xffffffffffffffff, 0x4}], 0x3, 0x0, 0x0, 0x0) (async) sendto$inet(r2, &(0x7f0000000200)="0e", 0xff66, 0x0, 0x0, 0x0) (async) cpuset(&(0x7f0000000280)) (async) r5 = msgget$private(0x0, 0x2) msgsnd(r5, &(0x7f0000000580)=ANY=[@ANYBLOB="0300000000000000c5e94674dbd3604cde5c3557da6461341b1f80b87c9e9c0a41a1995000000100000000002b3895e0140869a1845fe194ac26f999f83cbdb241ab396b30c0d5d524ba717d8e5c5e2f873559783e450b4d87abe348cb20ebf83ab0ce789d687b03d617130b6a3e0bf33ecadaf63e98edbca150cb3de62df94a1f79cc369b90ec5facaa60d5ca5a4ded1918d96acaea78f5f7951089753cb55a6af68c2b946892077b0a8638debf61b65a6c8afb148b9fdf67be3d2e54590795cd2d00a13d86a58397e4da069add2e957d8a46d7ca639f510dae9b9b82d818"], 0x6d, 0x0) setgroups(0x1, &(0x7f0000000000)=[0xffffffffffffffff]) (async) setuid(0xffffffffffffffff) (async) __semctl$SEM_STAT(0x0, 0x4, 0xa, &(0x7f00000000c0)=0x0) ppoll(0x0, 0x0, &(0x7f0000000700)={0xfffffffffffffff9, 0x8}, 0x0, 0x0) (async) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000001c0)) (async) setresuid(0x0, 0xee01, 0x0) (async) ioctl$DIOCRCLRASTATS(r4, 0xc4504448, &(0x7f0000000740)={{"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", "0c7eb2a4844a6b353ee8a41dfb003973b06759bcb91b6b910f03618605e9a88f", 0xffffff88, 0x4}, &(0x7f0000000400)="836244c48c1824d70d0d5bc86f073f785ab4f897d753622d0a67fb0f2e0d93313880515759a202e44d87eea9ae613dd0861ef3091f20f79db6116767e46589c4ce0ef90d854607cff6ab7821a51f52d05cc8e973afcd65151ddaa472b99ceccb06e5cc411913a680b40c194afc8a5b74a85484f69bbb22b8e80bd7c46788089df1a12e8d15dda395da", 0x1fe000, 0x4, 0x80000001, 0x2d5667c7, 0x10000000000e216, 0x1, 0x9, 0x7ffffffe}) (async) setgroups(0x0, 0x0) (async) getresgid(&(0x7f0000000300), &(0x7f0000000340), &(0x7f00000003c0)) 1.123066381s ago: executing program 3 (id=210): mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) socket$inet_udplite(0x2, 0x2, 0x88) r0 = getpgrp(0xffffffffffffffff) procctl$PROC_SPROTECT(0x2, r0, 0x1, &(0x7f0000000080)=0x1) r1 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000200)={'rack\x00'}, 0x24) chmod(&(0x7f0000000280)='./file0\x00', 0x2768c724b44f59f3) fork() mlock(&(0x7f0000764000/0x2000)=nil, 0x2000) madvise(&(0x7f00009d6000/0x600000)=nil, 0x600000, 0x5) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) socket$inet_udplite(0x2, 0x2, 0x88) (async) getpgrp(0xffffffffffffffff) (async) procctl$PROC_SPROTECT(0x2, r0, 0x1, &(0x7f0000000080)=0x1) (async) socket(0x2, 0x1, 0x0) (async) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000200)={'rack\x00'}, 0x24) (async) chmod(&(0x7f0000000280)='./file0\x00', 0x2768c724b44f59f3) (async) fork() (async) mlock(&(0x7f0000764000/0x2000)=nil, 0x2000) (async) madvise(&(0x7f00009d6000/0x600000)=nil, 0x600000, 0x5) (async) 558.560777ms ago: executing program 3 (id=211): open$dir(&(0x7f0000000180)='./file0\x00', 0x20000, 0x0) (async) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r0, 0x0, 0xc, &(0x7f0000000040)={@multicast1, @loopback}, 0xc) setsockopt$inet_mreqsrc(r0, 0x0, 0x48, &(0x7f0000000180)={@multicast1, @multicast1, @loopback}, 0xc) (async) setsockopt$inet_mreqsrc(r0, 0x0, 0x49, &(0x7f0000000000)={@multicast1, @multicast1, @multicast1}, 0xc) (async) r1 = socket(0x2, 0x1, 0x0) shm_rename(0x0, 0x0, 0x3) (async) listen(r1, 0x0) (async) setsockopt$sock_accept_filter(r1, 0xffff, 0x1000, 0x0, 0x0) (async) open$dir(&(0x7f00000016c0)='./file0\x00', 0x10000, 0x60) (async) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x8, 0x108) (async) r3 = open$dir(&(0x7f0000000700)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) (async) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x2, 0x80010, r3, 0x4) (async) pwritev(0xffffffffffffffff, 0x0, 0x0, 0xfffffffffffffffc) (async) acct(&(0x7f0000000040)='./file0\x00') chflags(&(0x7f0000000100)='./file0\x00', 0x106) (async) mlock(&(0x7f0000ffb000/0x4000)=nil, 0x4000) getsockopt$inet_buf(r1, 0x0, 0x1, &(0x7f0000000280)=""/76, &(0x7f0000000140)=0x4c) r4 = socket$inet_tcp(0x2, 0x1, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x1, 0x8) (async) ktrace(&(0x7f0000000200)='./file0\x00', 0x4, 0xd27d43220c7df9b, 0x0) (async) cpuset_getaffinity(0x1, 0x3, 0xb1a, 0x0, 0x0) (async) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r4, 0x6, 0x27, &(0x7f0000000240)={&(0x7f00000004c0)="00b263bfd364040005fcff0000a3f7d85c54e036f32112a81bbb82eb79706d8fafbf53ecafe534103bf17575c91ab0ae64dd071ff07ac1917d28e34647af314594255743d039150e739501e3a637c1f9ec0572c021a41bb646cc2f8bf2eafe2c8d529181aec19a9509000000bb442953f77967d36778ff4c079bd431993fbaecc116406b84902e9575006204c73b498c", 0x0, &(0x7f00000003c0)="2c06f208d405ae5aef1978cd8fca52f19497dc0800000056f851a16c14248fd56742995e3480c0000000000000aec7ce08deba40348c7f8b8d6f57fc0f8de5ae57ee3dcaa5f2cf2928c234bffd7471cd11c27bf15cb8b64351baaae9ee1c217b15009770e0efa0399539cdf7f783446a208283d8736776ac1352ef3a7778e8f8", 0xb, 0x90, 0x0, 0x1c, 0x80, 0x0, 0x3, 0x3, '\x00\x00@\x00'}, 0x40) (async) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r5 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) shmat(r5, &(0x7f0000ffa000/0x3000)=nil, 0x4000) r6 = shmget$private(0x0, 0x11000, 0x114, &(0x7f0000fec000/0x11000)=nil) r7 = shmat(r6, &(0x7f0000747000/0x4000)=nil, 0xde4d8bed9278713d) shmdt(r7) 551.701654ms ago: executing program 0 (id=212): setresgid(0xee00, 0xee01, 0x0) r0 = getegid() setresgid(0x0, r0, r0) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_MCAST_LEAVE_GROUP(r1, 0x0, 0x51, &(0x7f0000000000)={0x0, {{0x10, 0x2, 0x3, @broadcast}}}, 0x88) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_int(r2, 0x0, 0x1b, &(0x7f00000000c0)=0x3, 0x4) r3 = openat$bpf(0xffffffffffffff9c, &(0x7f0000001940), 0x200, 0x0) ioctl$BIOCLOCK(r3, 0x2000427a) ioctl$BIOCGRTIMEOUT32(r3, 0x4008426e, &(0x7f0000000040)) socket$inet_sctp(0x2, 0x0, 0x84) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) r4 = kqueue() kevent(r4, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x3, [0xffffffffffffffff, 0x8, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x1, 0x84) r5 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r5, 0xffff, 0x1003, 0x0, &(0x7f0000000040)) cpuset_getid(0x1, 0x2, 0x2a3e, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x8000, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0xc) kqueue() mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) open(&(0x7f00000000c0)='./file0\x00', 0x80400000000286, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x4c) writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x807, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xf, 0xc74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x9, 0x9, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x4, 0x5, 0xe0, 0x7ff, 0x2, 0x3, 0x8, 0xc, 0x8]}, {0x4005c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0x0, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x7f33c58a, 0x2, 0x58, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0xfffffffe, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1002, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x800, 0x7f, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x538, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x1b0, 0x8, 0x10000, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x3, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0xfffffffe, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x7, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1ff, 0x4, 0x9, 0x5, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x3, 0xffffffff, 0x1, 0x4f124442, 0x8, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0x2, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x1, 0x3b, 0x0, 0x42, 0x225, 0x81, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x1, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0xb, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0x10000, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0x2, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1f4, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xffffdffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x4000009, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x2, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x9, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd1, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff5, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x3, 0xfff, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x6, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xfffffff8, 0x4, 0x8000, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc9, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x10000, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff0, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x400, 0x5, 0xfffffffc, 0xffffffff, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x7, 0x81, 0x8, 0x2, 0x4, 0x6, 0x1, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x7, 0x8, 0x1ff, 0x7ff, 0xa, 0x0, 0x1, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x6, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x1a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xfffffffb]}, {0x9, [0x3, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0xff, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x20009, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x401, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0x1000, 0x9, 0x6, 0x3d, 0x8, 0x1, 0xf, 0x3, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x0, 0x3, 0x2, 0x0, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x40000009, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x0, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x1000008, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0xfffffffd, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x4, 0x6, 0x0, 0x5, 0x3, 0x7, 0x100000ff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x401, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x0, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x0, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x8, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0x3, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x1, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x2, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x20000, 0x8, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x5, 0x6cec, 0x10001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x5, 0x84) 313.109589ms ago: executing program 3 (id=213): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f0000000040)={0x29, 0x0, 0x1f, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735fbe8e5aa4f4bb6", 0x0, 0x0, 0x0, 0xfdfffffb, [0x8, 0x400000]}) 120.200707ms ago: executing program 3 (id=214): procctl$PROC_REAP_ACQUIRE(0x0, 0x0, 0x2, 0x0) r0 = fork() fork() procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f00000003c0)={0x13, 0x2, r0, 0x6}) r1 = socket(0x26, 0x2, 0x0) dup2(r1, r1) readv(r1, &(0x7f0000001680)=[{&(0x7f0000002780)=""/4104, 0x1008}], 0x1) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000180)={0x13, 0x1, 0xffffffffffffffff}) r2 = socket$inet6(0x1c, 0x2, 0x0) setsockopt(r2, 0x29, 0x40, &(0x7f0000000000)="60c6eabb", 0x4) open(&(0x7f0000000040)='./file0\x00', 0x205, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @remote={0xac, 0x14, 0x0}}, 0x10) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8ca, 0x0, [0xfffffffffffffffc, 0x400000000, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) extattr_get_file(&(0x7f00000001c0)='./file0\x00', 0x5, &(0x7f0000000240)='\x00', &(0x7f0000000280)=""/169, 0xa9) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r5, 0x0, 0x2, 0x0, 0x0) open$dir(0x0, 0x4, 0x180) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) socket(0x2, 0x1, 0x0) sendmsg$unix(r3, &(0x7f0000000640)={&(0x7f0000000080)=@file={0xa, 0x1, './file0\x00'}, 0xa, &(0x7f0000000600)=[{&(0x7f0000000340)="02b56b9776e8ff3cec11c1415e033c523762b885bef755212c810c5ee4a862ed23700e61c65a7d2ef5b26fcc172ee31bdbafcaff4d5a4f16190c47edb54279eb702874481204ce7ee2da31fc2493c76163b881d4e7f457a629117c86ae4afb6bc3277a2ec7245b1ac5b29eb770647da4b28a308a3f4a5170624a91214a9188c3d28330a07c7da9af8445a9c266e2d148e35468b49fd43c991323", 0x9a}, {&(0x7f0000000400)="c8d154153b52d1ed26e5bc90ce91ac181d20848db05ad269d092c136515b935ef34df8f88e121f6d533f33eeb635329ab6f71990307ebdf84dbb8c70a4e35950a27dc8a0465a66f39d9510063c5f9df7152f31174cc91be5307c21a2a0060d0259380d107741ad8e552d9a1e2cd7f5f7beb6fac39289f8dbfe59867009af978e67e47f7854596e8d550538b35672f38f615bbc5e661c11fb0017934544256c1f1681f8d1830e5853b36bd560936f93805744553eac1d5cdef4b1287c440f9684087d60d773669eb9bb7f246c3715c4080ebef280c911354bf6a704", 0xdb}, {&(0x7f0000000500)="a9e15c22e9a4cff9bf7824c271fc5680e6e976dfa3d825ca253c5d14420e6834b09e6aeeddce51e56f7302f4538d1ad097f8a24cd5b4c928b64974fbd406681c15f7fa4cff38f1813a", 0x49}, {&(0x7f0000000580)="7339f9513f66528e00794a1adb183cb3d7afcb328fd2", 0x16}], 0x4, 0x0, 0x0, 0x8}, 0x20089) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) fcntl$getown(0xffffffffffffffff, 0x5) getsockopt$inet6_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x0, 0x8, 0x650, 0xfffc, 0x2}, &(0x7f0000000100)=0x14) bind$inet6(r2, &(0x7f0000000180)={0x1c, 0x1c, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}}, 0x1c) 74.952818ms ago: executing program 2 (id=215): kqueue() socket$inet6(0x1c, 0x3, 0x81) r0 = socket(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20100, &(0x7f0000000200)={0x10, 0x2, 0x2, @rand_addr=0x7ffffffe}, 0x10) setsockopt$sock_splice(r0, 0xffff, 0x1023, &(0x7f0000000040)={r0, 0x0, {0x0, 0x6}}, 0x20) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) r2 = kqueue() kevent(r2, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x80) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) fspacectl(r1, 0x1, &(0x7f0000000040)={0x3ff, 0x7ffffffffffffc00}, 0x0, 0x0) r4 = shmget$private(0x0, 0x9000, 0x0, &(0x7f0000ff7000/0x9000)=nil) r5 = shmat(r4, &(0x7f0000ffc000/0x2000)=nil, 0x4000) shmat(r4, &(0x7f0000ff9000/0x1000)=nil, 0x5000) shmdt(r5) open$dir(0x0, 0x110ac0, 0x82) ksem_init(0x0, 0xfffffffc) getsockopt$inet6_sctp_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000640)={0x0, 0x3}, &(0x7f0000000680)=0x8) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) truncate(&(0x7f00000000c0)='./file0\x00', 0x80008) openat(r3, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r6 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) setresuid(0x0, 0xee01, 0x0) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r7, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r8 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r8, 0x29, 0x1b, &(0x7f00000001c0), 0x4) bind$inet6(r8, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x0, @empty}, 0x1c) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r6, 0x84, 0xa, 0x0, 0x0) 0s ago: executing program 1 (id=57): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) acct(&(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_mreqn(r1, 0x0, 0x1, 0xfffffffffffffffe, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0xfffeffff, @rand_addr="caeb33aca447afcbebbfb477a3b36ba3", 0x7}, 0x1c) r2 = shmget$private(0x0, 0x3000, 0x1e0, &(0x7f0000001000/0x3000)=nil) setuid(0xffffffffffffffff) open$dir(&(0x7f0000000640)='./file0\x00', 0x200, 0x72) setresgid(0x0, 0xee01, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x8001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r3, 0x80000003, 0x0, 0x0, [0x20, 0xfffff48f], 0x401, 0x0, 0x2, {0xfffffffffffffffe, 0x7, 0x0}, {0x0, 0xfffffffd, @sival_int, @ke_flags=0xc000}}) rfork(0x3060) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344}, 0x5, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000040)={@broadcast, @random="0010000800", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0xfb, 0xffffff84, 0x0, @remote={0xac, 0x14, 0x0}, @remote={0xac, 0x14, 0x0}}, @tcp={{0x2, 0x3, 0x41424344, r4, 0x0, 0x0, 0x5}}}}}}) mprotect(&(0x7f0000192000/0x4000)=nil, 0x4000, 0x5) munmap(&(0x7f00002bd000/0x3000)=nil, 0x3000) fork() mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344, 0x41424344}, 0x1, 0x401) syz_emit_ethernet(0x11a, &(0x7f0000000300)={@random="ef258162e50c", @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x31, 0x10c, 0x67, 0x401, 0x4, 0x11, 0x0, @local={0xac, 0x14, 0x0}, @rand_addr=0x8, {[@end, @end]}}, @tcp={{0x0, 0x1, 0x41424344, r5, 0x0, 0x0, 0x5, 0x0, 0x23b, 0x0, 0x6}, {"418be4171739917c58e244038e9f67e762df616dda83e57778e106ac2e723df807c2cd59707637925481c17ccc93e2aaac721515481ffb077e6eedf12e57a3ac4e2d9df24be04a5f6e8a4b32fb48c5edac24dff592d5f953dcbc6162b93b00513fb0435b016169348814685f25d59818e4aef3c51cffbcbfd53c8445c831ee9f0c6a9cc96b61ae3820c5d95224a77a961839cf6949d7cc1eaf1751059600429183fa4cccca2d20630f9e290d83adf3301f60386f9ae8645a20900e207cd5eca87e5d80a889da5ac06c743b6fbdccba1fa048124b29ed744cfc52654cddbbb86e"}}}}}}) syz_emit_ethernet(0x76, &(0x7f00000000c0)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "000200", 0x40, 0x6, 0x0, @rand_addr="0000000000000000000000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x1, 0x2, 0x41424344, r5, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, {[@mss={0x2, 0x4, 0x3}, @mss={0x2, 0x4, 0x1}, @mss={0x2, 0x4, 0x8}, @sack={0x5, 0x2}, @mss={0x2, 0x4, 0x7}, @sack_perm={0x4, 0x2}, @generic={0x5, 0x11, "a05646940fb9d38ac868ab1e288926"}, @sack={0x5, 0x6, [0x6]}]}}}}}}}}) syz_emit_ethernet(0x21a, &(0x7f00000003c0)={@empty, @remote, [{[], {0x8100, 0x4, 0x0, 0x4}}], {@ipv6={0x86dd, {0x0, 0x6, "648ac5", 0x1e0, 0x28, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}, @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6c, 0xe, 0x0, 0x6, 0x0, [@loopback, @local={0xfe, 0x80, '\x00', 0x0}, @mcast1, @mcast2, @empty, @local={0xfe, 0x80, '\x00', 0x0}, @remote={0xfe, 0x80, '\x00', 0x0}]}, @dstopts={0x10, 0x2, '\x00', [@ra={0x5, 0x2, 0x1}, @pad1, @jumbo={0xc2, 0x4, 0x9}, @jumbo={0xc2, 0x4, 0xffffffff}, @pad1]}, @routing={0x3b, 0x6, 0x0, 0x7, 0x0, [@ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}, @mcast1, @mcast2]}], @tcp={{0x0, 0x2, r4, r5, 0x1, 0x0, 0x12, 0x1, 0x6, 0x0, 0x6, {[@md5sig={0x13, 0x12, "4240de985ba51dae175af82b89242a22"}, @eol, @mss={0x2, 0x4, 0x3}, @nop, @eol, @eol, @fastopen={0x22, 0x3, "03"}, @sack_perm={0x4, 0x2}, @nop, @generic={0x8, 0x11, "5296f4049ce5609eac17ab7f4f43ff"}]}}, {"63e6b1c4ffcfd60ed5ab13001aed8f4edf199df6177553503f03d9b6ba937e5f94db8122cdbf29eb635178fd30fccc90551fb7e1b964b08c0ee93a48294d9e7578ae9c633b3bdca96ea3dea4e4c43cf31cce4716ca558a1465b7cd52ca05059522d4d711ea68f74981f309c42d4ca86190fff6ccc70c236507365d494d586c211dc83783480d11fdf06c449e0f58a1ee272e2d8d7d6a30df89b49fd74b803ff9bcd7f94dc6b032d0e2b5dff5222fe192ede44cb8cb7fc4ed7967926fb10993074d77301ec589cc89"}}}}}}}) aio_waitcomplete(0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000200)='*'], 0x0) shmctl$IPC_SET(r2, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0xffffffffffffffff, 0x0, 0xd, 0xc70, 0x0, 0x2}, 0x80, 0xffff, 0x7, 0x80, 0x0, 0x0, 0x8}) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r1, 0x84, 0x23, &(0x7f0000000180)={@in6={{0x1c, 0x1c, 0x3, 0x1ff, @empty, 0x3}}, 0x0, 0x9, 0xb, 0x2}, &(0x7f0000000040)=0x90) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000100)={0xcf14, 0x400, 0x1, 0x0, r6}, 0x10) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.13' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe0058d21000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 May 19 07:31:30 ci-freebsd-main-9 kernel: nd6_na_input: duplicate IP6 address fe80:4::2aa Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d21000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe4000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 Expensive callout(9) function: 0xffffffff81a99710(0) 0.003740098 s if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d21000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 Expensive callout(9) function: 0xffffffff81a99710(0) 0.017230739 s if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3800 vnode_pager_putpages: zero-length write at 0 resid 12288 0xfffffe006f0971b8: type VREG state VSTATE_CONSTRUCTED op 0xffffffff837157c0 usecount 0, writecount 0, refcount 35 seqc users 0 hold count flags () flags (VIRF_PGREAD|VI_DOINGINACT|VMP_LAZYLIST) v_object 0xfffffe005496fc98 ref 0 pages 264 cleanbuf 12 dirtybuf 21 lock type ufs: EXCL by thread 0xfffffe0054990740 (pid 1166, syz-executor, tid 100519) nlink=1, effnlink=1, size=1048576, extsize 0 generation=c94f475a, uid=0, gid=0, flags=0x20006 ino 157, on dev gpt/rootfs if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058d1f800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe2800 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=1 req=57 state=3 status=67 (errno 35: Resource temporarily unavailable) FreeBSD/amd64 (ci-freebsd-main-9.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0007fe3000 Password: Login incorrect login: show registers Password: Login incorrect login: ps Jan 1 09:07:02 ci-freebsd-main-9 login[748]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect