last executing test programs: 2.310477988s ago: executing program 1 (id=89): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xc5) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) kqueue() close(r3) r4 = open$dir(&(0x7f0000000040)='./file0\x00', 0xa08, 0x44) mincore(&(0x7f0000156000/0xc00000)=nil, 0xc00000, &(0x7f0000001640)=""/4096) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffff9c, 0x6, 0x40, 0x0, 0x0) dup2(r4, 0xffffffffffffffff) ppoll(&(0x7f0000000200)=[{}], 0x209b, 0x0, 0x0, 0x0) aio_write(&(0x7f0000000240)={r2, 0x5, &(0x7f0000000300)='_', 0x1, [0x0, 0x20000000], 0x0, 0x0, 0x0, {0xfffffffffffffffe, 0x4000007, 0x0}, {0x2, 0x201, @sigval_int=0x401, @spare=[0x40, 0x3bc, 0x8000000000000000, 0x2, 0x2, 0x2000000002, 0x8]}}) semget(0x0, 0x1, 0x281) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) r6 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r6, 0x0, 0x0, 0x100, &(0x7f0000001180)={0x10, 0x2, 0x0, @loopback}, 0x10) connect$inet(r6, &(0x7f0000000040)={0x10, 0x2, 0x3, @multicast2}, 0x10) sendto$inet(r6, 0x0, 0x0, 0x105, 0x0, 0x0) syz_emit_ethernet(0x17a, &(0x7f0000000340)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x144, 0x0, 0x0, @rand_addr="0000000000000000000000000100", @local={0xfe, 0x80, '\x00', 0x0}, {[@fragment={0x1a, 0x0, 0x0, 0x0, 0x0, 0x2, 0x64}, @dstopts={0x4d, 0x22, '\x00', [@generic={0x6, 0x3c, "de2a2a37d4b7831b21430c7bc74b9e3f331a315b915b7c8eb434077155b36c6a9e14fe69a3728c3779d8b6db919d2a9eab2f0a583643a1a06473755d"}, @padn={0x1, 0x5, [0x0, 0x0, 0x0, 0x0, 0x0]}, @generic={0x7, 0xc8, "5a43cc1fdd8b90ee5962be32d782bbb323d1a79e741bca026c2d1ac883b6011868a5c1c6cd8dc571583365106e8df1c705d66e37a1fa6e9867706b8cbc3a0d0b2fec7d34d620053d50765754c973567d4b2993299f147bd0ba457271c3aae8be7ee504c8304e4116f1d8f5e3c5a7e83bb2a50c7fca53c1504483f4773cb934344b8192b2c145084f00f0d8dda09bcaa83256203251a65d4e5c9b6dccbb971daec0796937ebb0a4cae6cd3a7046f18385a848d191adbbc934be71015ba13e3f1de5584018b806242e"}, @enc_lim={0x4, 0x1, 0x9b}]}, @fragment={0x60, 0x0, 0x6, 0x1, 0x0, 0x9, 0x67}], @tcp={{0x2, 0x2, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r7 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0x2, &(0x7f0000000300)=0xc9, 0x4) aio_write(&(0x7f0000000140)={r5, 0x40000000006, 0x0, 0x0, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sival_ptr=0x4005}}) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) syz_emit_ethernet(0x86, &(0x7f0000000240)=ANY=[@ANYBLOB="8f6f77ede655ffffffffffff86dd605f6ad900503a003bcc3f0600000058132fa13a8be186e3fe8000000000000000000000000000aa0285bfb8a80000006006db3efffe2b00fe8000000000000000000000000000aaff0200000000000000000000000000012b02007300000000000000000000000000000000000000012a000a4967000000"]) getsockopt$inet6_int(r1, 0x29, 0x43, 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc040636a, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_buf(r8, 0x6, 0x402, &(0x7f0000000100)="feffffff", 0x4) lio_listio(0x0, 0x0, 0x0, 0x0) 2.099973075s ago: executing program 1 (id=91): open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) socket(0x2, 0x1, 0x0) (async) r2 = socket(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) posix_fallocate(r1, 0x9, 0x3) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000080)={'rack\x00', 0x6}, 0x24) connect$inet(r2, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000040)={'bbr\x00'}, 0x24) mkdir(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x51) symlinkat(&(0x7f0000000dc0)='./file0\x00', r0, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r3, 0x29, 0x1b, &(0x7f00000001c0), 0x4) (async) setsockopt$inet6_int(r3, 0x29, 0x1b, &(0x7f00000001c0), 0x4) readv(r3, &(0x7f0000000540)=[{&(0x7f0000000040)=""/125, 0x7d}], 0x1) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x10, @empty, 0xfffffffb}, 0x1c) (async) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x10, @empty, 0xfffffffb}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"]) (async) syz_emit_ethernet(0x2a, &(0x7f00000011c0)=ANY=[@ANYBLOB="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"]) rename(&(0x7f0000000980)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) rename(&(0x7f0000000980)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a80)='./file0\x00') (async) rename(&(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a80)='./file0\x00') unlink(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) unlink(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(r0, &(0x7f00000006c0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x10) kqueue() rename(&(0x7f0000000fc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000010c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') bind$unix(0xffffffffffffffff, &(0x7f00000002c0)=@file={0xa, 0x1, './file1\x00'}, 0xa) 1.898520343s ago: executing program 0 (id=94): r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) accept4(r0, 0x0, 0x0, 0x10000000) sendfile(r2, 0xffffffffffffffff, 0xc, 0x8001, 0x0, &(0x7f0000002740), 0x20) 1.897334726s ago: executing program 0 (id=95): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f00000000c0)={0xb, 0x0, 0x18, &(0x7f0000000100)="0b6fac4103e7a00d4689e8090000005aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d86699a, [0x0, 0x0, 0x0, 0x1]}) ioctl$CIOCCRYPT(r0, 0xc0306367, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x4d8e, &(0x7f00000002c0), 0x0, 0x0, 0x0}) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f00000000c0)={0xb, 0x0, 0x18, &(0x7f0000000100)="0b6fac4103e7a00d4689e8090000005aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d86699a, [0x0, 0x0, 0x0, 0x1]}) (async) ioctl$CIOCCRYPT(r0, 0xc0306367, &(0x7f0000000080)={0x0, 0x1, 0x0, 0x4d8e, &(0x7f00000002c0), 0x0, 0x0, 0x0}) (async) 1.830018216s ago: executing program 2 (id=96): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) syz_emit_ethernet(0xfef2, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaa96aaaaaaaaaaaaaaaa08060001080006040001aaaaaaaaaabbac1400aa000000000000e0000003"]) setlogin(&(0x7f0000000380)="49c353fbfb63cb4a9b76b4f3580e2d15661772d09eca0fbb87b2b3db04c4859ad14d") aio_write(&(0x7f0000000240)={r0, 0x80000001, &(0x7f00000008c0)='E', 0x1, [0x3], 0x200000000000000, 0x8, 0x4, {0x81, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562f1, @spare=[0xb5, 0x0, 0x7, 0x9, 0x6, 0x2dc, 0xb66, 0x8]}}) r1 = open$dir(&(0x7f0000000140)='./file0\x00', 0x200, 0x24) r2 = socket(0x1, 0x5, 0x0) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)) setsockopt$sock_int(r2, 0xffff, 0x1001, &(0x7f0000000100)=0x20000, 0x4) write(r2, &(0x7f0000000200)="24bdfa5d1d2873c63e35348295b299ab09dbd0734449c365d05ba166e2fea9aec43050006123339a346f731573d8d508753f95b7688a858b8cf6bbca32ec975d185cfcadf68ed7796e53e0000400007a20746f313da7dc6c5133407dbcafaea3077475df6575658bc77274869b4cf11d1374cacc8af0e650876593f6a8822b437639678a1cc3702368dc70dcf2429a7e1582005bed8a072a9c3310cdeeb79f221bda2b2cce0d51b12ea84e60e401ed6abbac6c034a7d182a13e31f491b6f62414871", 0x20000) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r3, 0x0) r4 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0) copy_file_range(r4, 0x0, r3, &(0x7f0000000080)=0x2ffff, 0xf2, 0x0) preadv(r1, &(0x7f0000000040)=[{&(0x7f0000001280)=""/4081, 0xff1}], 0x1, 0x80000000001) pwritev(r3, 0x0, 0x0, 0x100000001) 1.829755434s ago: executing program 0 (id=97): r0 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r0, &(0x7f0000001140)={0x1c, 0x1c, 0x1, 0x0, @mcast2, 0x2}, 0x1c) sigprocmask(0x0, 0x0, 0x0) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @mcast1, 0x10}, 0x1c) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) cpuset_getid(0x1, 0x7, 0xdfa9, 0x0) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_int(r2, 0x0, 0x13, 0x0, 0x0) open$dir(0x0, 0x40000400000002c2, 0x0) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f0000000040)={0x2a, 0x0, 0x20, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735fbe8e5aa4f4bb674", 0x0, 0x0, 0x0, 0xfdffffff}) ioctl$CIOCCRYPT(r3, 0xc0306367, &(0x7f0000000100)={0x0, 0x1, 0x2, 0xc, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000280)}) pipe2(0x0, 0xd505eb4556f41fdb) ktimer_create(0x0, 0x0, 0x0) aio_waitcomplete(0x0, &(0x7f0000000200)={0x80000000}) cpuset_setid(0x2, 0x0, 0x0) r4 = socket(0x1c, 0x3, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_int(r5, 0x0, 0x17, &(0x7f0000003640), 0x4) writev(r4, 0x0, 0x0) syz_emit_ethernet(0x2d, &(0x7f0000000100)=ANY=[@ANYBLOB="9f4c46624157ffffffffffff08004600001f006a0000010290780000001ce000000207030500111c9078ffdf"]) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) pipe2(0x0, 0x0) poll(0x0, 0x0, 0x9) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') ktimer_create(0x4, &(0x7f0000000280)={0x3, 0x21, @sigval_ptr=0xfffffffffffffff9, @ke_flags=0x4}, &(0x7f00000000c0)=0x0) ktimer_gettime(r6, &(0x7f0000000180)) 1.460678608s ago: executing program 3 (id=98): socket(0x1c, 0x1, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, &(0x7f00000000c0)={0x0, 0x23, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0xfffffff9, 0x0, 0xb1d]}) r0 = open(&(0x7f0000000340)='./file0\x00', 0x300, 0x54) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x28, 0x2, 0x3, @rand_addr=0x10dfa767}, 0x10) flock(r0, 0x1) open(&(0x7f0000000140)='./file1\x00', 0x0, 0x2) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) fcntl$lock(r1, 0x9, &(0x7f0000000040)={0x5, 0x0, 0x7, 0x1000301010005}) r2 = open(&(0x7f00000000c0)='./file0\x00', 0x201, 0x0) fcntl$lock(r2, 0x9, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1000300010005}) flock(r0, 0x8) r3 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80, &(0x7f00000000c0)=0x3, 0x4) bind$inet(r3, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) connect$inet(r3, &(0x7f0000000400)={0x10, 0x2, 0x2, @loopback}, 0x10) chroot(&(0x7f0000000080)='./file0\x00') r4 = socket$inet6_udp(0x1c, 0x2, 0x0) select(0x40, &(0x7f0000000040)={0x9}, 0x0, 0x0, 0x0) fcntl$dupfd(r4, 0x3, 0xffffffffffffffff) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r5, 0x6, 0x2000, &(0x7f0000000180)={'freebsd\x00', 0x10000}, 0x24) execve(0x0, &(0x7f0000000000)=[&(0x7f0000000100)='///'], 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(&(0x7f0000000100)='./file0\x00', 0x49) 1.26986426s ago: executing program 3 (id=99): mkdir(&(0x7f0000000280)='./file0\x00', 0x0) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x5, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r0 = kqueue() freebsd11_kevent(r0, &(0x7f0000000000)=[{}], 0x6a81, 0x0, 0x0, 0x0) bind$inet(0xffffffffffffffff, 0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) chflagsat(r0, 0x0, 0x0, 0x0) open$dir(0x0, 0x200, 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000dc0)='./file0\x00', r1, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r2 = socket$inet6(0x1c, 0x3, 0x7) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_int(r2, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) sendto$inet6(r2, 0x0, 0x0, 0xffff0000, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="fff71fdcedff000080009e000000e216", 0x3}, 0x1c) mkdirat(r1, 0x0, 0x0) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1015, 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x1) rename(&(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a80)='./file0\x00') r3 = semget$private(0x0, 0x4000000009, 0x82) semop(r3, 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) aio_write(&(0x7f0000000140)={r4, 0x0, 0x0, 0x0, [0x40], 0x2, 0x0, 0x1, {0x0, 0x0, 0x0}, {0x0, 0xfffffffe, @sival_ptr=0x239bfffffffffe, @thr={0x0, 0x0}}}) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0xc, &(0x7f0000000040)={@multicast1}, 0xc) r5 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r5, 0x6, 0x29, &(0x7f0000000200)={&(0x7f0000000280)="b3335fed0d68abe8c556f5053529364224a5d5eb196447c9f42692c452cad98b79fb6301aae8527420dd48c089b55068aeb065770c119be5eb6aab4ec7d4a90958e213895d359822d234d09a718eb2f43123f66b", 0x0, &(0x7f00000000c0)="7fe09e516cc9c99ca125e683f6488997551b9f19ce2809df21c798ca5ed6b4eb2e6070999fec761beae56387e889", 0xb, 0x54, 0x0, 0x0, 0x2e, 0x0, 0x0, 0x1, "d41775a7bd067c1e"}, 0x40) semop(r3, &(0x7f00000003c0)=[{0x2, 0x2, 0x1800}, {0x2, 0x2, 0x1000}, {0x4, 0x8, 0x1000}, {0x1, 0xe6, 0x1c00}, {0x0, 0x8000, 0x1800}, {0x2, 0x7, 0x800}, {0x2, 0x0, 0x1800}], 0x7) r6 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r6, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) 1.089934167s ago: executing program 3 (id=100): r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000400), 0x200000, 0x0) ioctl$MDIOCATTACH(r0, 0xc1c06d00, &(0x7f00000000c0)={0x0, 0x20, 0x3, 0x0, 0x8010000, 0x8, 0x8f5, 0x8000000000000000, 0x0, 0x400, 0x0, [0x0, 0x4a5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xfffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x10004, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x10002, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x18, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x141, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, 0x400004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x653, 0x0, 0x2000, 0xfffffffe, 0x0, 0x8e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x768]}) (async) r1 = openat$filemon(0xffffffffffffff9c, &(0x7f0000001400), 0x8, 0x0) (async) r2 = kqueue() kevent(r2, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) (async) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) (async) mount(&(0x7f0000000080)='cd9660\x00', &(0x7f00000000c0)='.\x00', 0x100, &(0x7f0000000100)) (async) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) (async) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) aio_write(&(0x7f0000000280)={r4, 0xfffffffffffffff7, 0x0, 0x0, [0x4, 0x7ff], 0x3, 0x18, 0xffff, {0x534, 0x1, 0x0}, {0x4, 0x1, @sival_int=0x4}}) (async) openat$evdev(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) (async) r5 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x20) lseek(r5, 0x0, 0x0) (async) freebsd11_getdents(r3, &(0x7f0000000180)=""/53, 0x20) (async) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) (async) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) (async) sendto$inet6(0xffffffffffffff9c, &(0x7f0000002700)="6a3364f80c04449d", 0x8, 0x0, &(0x7f0000001280)={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0xfff}, 0x1c) syz_emit_ethernet(0x52, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaa0000977a87a386dd602f5105001c0000fe80000000000000000000000000f9ffffff000569670000004e204e20baced5f70187"]) (async) r6 = kqueue() (async) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r5, 0x2) (async) r7 = socket$inet_udplite(0x2, 0x2, 0x88) socketpair$unix(0x1, 0x1, 0x0, 0x0) r8 = dup2(0xffffffffffffffff, r7) poll(&(0x7f00000002c0)=[{r7, 0x80}, {0xffffffffffffffff, 0x4}, {r8, 0x2}, {r2, 0x8}, {0xffffffffffffffff, 0x1}, {r6, 0x4}, {r1, 0x10}, {r7}, {r3, 0x100}], 0x9, 0x3) (async) readv(0xffffffffffffffff, &(0x7f00000003c0)=[{&(0x7f0000000240)=""/116, 0x74}], 0x1) sendfile(0xffffffffffffffff, r7, 0x0, 0x0, 0x0, 0x0, 0x7) setgroups(0x3, &(0x7f0000000f80)=[0x0, 0xffffffffffffffff, 0x0]) (async) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 1.087927142s ago: executing program 1 (id=101): open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x1fe) r0 = socket$inet_udplite(0x2, 0x2, 0x88) syz_emit_ethernet(0x4e, 0x0) r1 = socket(0x26, 0x2, 0x0) bind(r1, &(0x7f0000000040)=@in6={0x22, 0x1c, 0x3, 0x0, @mcast1}, 0xc) truncate(&(0x7f0000000040)='./file0\x00', 0x9320) r2 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r3 = kqueue() kevent(r3, &(0x7f0000000040), 0x7fffffff, 0x0, 0xfffffffb, 0x0) fork() __cap_rights_get(0x0, 0xffffffffffffffff, 0x0) r4 = kqueue() kevent(r4, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000f00)={0xfd7, [{0x3, [0x8, 0x6, 0x7, 0x6, 0x1, 0x0, 0xffffffff, 0x5, 0x80, 0x8, 0x500, 0x8001, 0x2000, 0x80000000, 0x7, 0x0, 0x6, 0x9, 0x2, 0x8, 0xfff, 0x10001, 0x1000, 0x8, 0x4d97, 0xff, 0x101, 0x3, 0x6, 0x304, 0x6, 0x2, 0xfffffff9, 0x7, 0x7, 0xff, 0x10000, 0x2, 0x5, 0x2, 0x1, 0x3, 0x6f, 0x22df, 0x401, 0x7fffffff, 0xa7, 0xc, 0x6, 0x4, 0x9d49, 0xb, 0x8001, 0x6, 0x2, 0x1, 0x7f, 0x2, 0x6, 0x80000000, 0xd, 0x96fc, 0x200, 0x0, 0xfffffc00, 0x8, 0x0, 0x1e780, 0x50, 0x8001, 0x4, 0x9, 0x7, 0xffffffff, 0xfffeffff, 0xee, 0x0, 0x8, 0x7fff, 0x0, 0x2, 0x5b23, 0x4, 0xffffffff, 0x1, 0xf05, 0x9, 0xffffffff, 0x9, 0x80000001, 0x8, 0x9, 0x4, 0x7fffffff, 0x8000, 0x2, 0x8001, 0x8, 0x4, 0x3, 0x6, 0x80, 0xb3ab, 0x9]}, {0x4, [0x4, 0x3, 0x1, 0x3, 0x80000000, 0x4, 0x400, 0xeec, 0xf557, 0x8, 0x7fff, 0x8, 0x8, 0x401, 0xb, 0xa, 0xfad6, 0x8, 0x5, 0x6, 0x40, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0xc77e, 0x8, 0x81, 0x6, 0xa4, 0xfffffff8, 0x2, 0x921, 0x7fffffff, 0xe4, 0x2, 0x370c, 0xb00, 0x4, 0x52a, 0x8, 0x7, 0xff, 0x8, 0x4, 0x370a8713, 0x9, 0x6, 0x428, 0xfffffff8, 0x2, 0x7, 0x4, 0x0, 0x5, 0xffff, 0x81, 0x0, 0x8, 0x9, 0x0, 0x7, 0x3, 0x2, 0x2, 0xff, 0x1, 0x4, 0x3, 0x7, 0x2, 0x6, 0x3, 0xbb, 0xffff, 0x8, 0x4, 0x0, 0x9, 0x7, 0x703, 0x0, 0xfffffff9, 0x9, 0x6, 0x4, 0xb32, 0x4, 0x10, 0x9, 0x40, 0x3, 0x4, 0x91, 0x0, 0x0, 0x7fffffff, 0x8, 0x6, 0x1, 0x8000, 0x4]}, {0x1, [0x826, 0x1000, 0x9, 0xffff8001, 0x3, 0xffffff77, 0x6, 0x1, 0xfffffffb, 0x0, 0x9, 0x6621, 0x5, 0x1, 0x6, 0x0, 0x3, 0x44, 0x5, 0x7f, 0x2, 0x40, 0xe, 0x10001, 0x1, 0xfffffff7, 0x80, 0x6, 0x7, 0xe51, 0x1ff, 0x2, 0x2, 0xf8000000, 0x40, 0x0, 0x400, 0x10000, 0x7, 0x1, 0x8, 0xc03, 0x3, 0x2, 0x122, 0x7, 0xf, 0x7, 0x31c, 0xcbc0, 0x81, 0x0, 0xffffffff, 0xd08, 0x5, 0x7, 0x1, 0x2, 0x8, 0x6d, 0xfb, 0x3b, 0x8, 0x8, 0x5834, 0x8, 0x7fff, 0x1, 0x4, 0x0, 0x5, 0xb, 0xaa, 0x0, 0xa, 0x4, 0x80000001, 0x0, 0x4, 0x7fff, 0x0, 0xdc5, 0x6, 0x4, 0x8, 0x8001, 0x4, 0x9, 0x9, 0x7f, 0x3, 0xd5ca, 0x7, 0x7fff, 0x1, 0x2, 0x80, 0x1d12, 0x3, 0x0, 0xfffffffc, 0xe358, 0x200, 0x5]}, {0x0, [0xfffffff6, 0xb729, 0xa, 0x9, 0x2, 0x5, 0x9, 0x6, 0x40, 0x3fc3, 0x0, 0x3a, 0x72, 0x7ff3, 0x7, 0x2, 0xdcb, 0x81, 0x1, 0x7fffffff, 0x282d, 0x1ff, 0x10000000, 0x89, 0xffff0000, 0x7fff, 0x10, 0x2, 0x3, 0x4, 0xffffffff, 0xde, 0x3ff, 0x0, 0x6cd9, 0x101, 0x7, 0x1000, 0x2, 0x7f, 0x1, 0xe03, 0x7, 0x5, 0x2, 0x2, 0x1, 0x4, 0x1, 0x2, 0x7f, 0x8, 0xf, 0x9, 0x50, 0x5, 0x4, 0x0, 0x93, 0x1, 0x4, 0x2, 0x18, 0x7ff, 0xd, 0x4, 0x5, 0x7c8, 0x8, 0x9f, 0x7f2d, 0x8fa, 0x1, 0xfffffff9, 0x9a9d, 0x5, 0x6, 0x8, 0x2e, 0x6, 0x1, 0x7f, 0x8, 0x5, 0x0, 0x0, 0x2, 0x40, 0x9, 0x7, 0xd5e, 0x1, 0x1ff, 0x7, 0x3ff, 0x10c, 0x7fff, 0x10000002, 0x7, 0x7, 0x1, 0x6, 0x6, 0x38]}, {0x1ff, [0x2, 0x0, 0x2, 0x2, 0x3e, 0xe, 0x401, 0xb, 0x0, 0x31, 0xad6b, 0x0, 0x5, 0x1ff, 0x3b, 0x9, 0xd, 0x1, 0x574b, 0x9, 0x5, 0xfffffff7, 0x9, 0x3, 0x7, 0x6, 0xa41, 0x6, 0x7, 0x1, 0x3, 0xa, 0xfffffffb, 0x2, 0x5, 0xe0000000, 0x3, 0x80000000, 0x8001, 0xfffffff9, 0x3, 0x2, 0x553, 0x40, 0x6f4, 0x0, 0x6, 0xd, 0x7, 0x2, 0x2, 0x8, 0x100, 0xd, 0x7, 0xfffffff6, 0xc3, 0x6, 0x8, 0x9, 0x0, 0x2000, 0x3ae, 0x40000000, 0x4, 0xc08, 0x8, 0xffffffc0, 0x9, 0x10001, 0x10001, 0x0, 0x3, 0x200, 0x5, 0x5, 0x8, 0x3, 0x1, 0x3, 0x2, 0x5, 0x7186b6e1, 0x7, 0x8, 0x10, 0x8, 0x7, 0xffffffff, 0xffffffff, 0x85f5, 0x0, 0x1, 0x800, 0x5, 0x5, 0x5, 0x80000001, 0x5, 0x8000, 0x3, 0xffffffff, 0x8, 0x1ff]}, {0x7db, [0x5, 0x7, 0x7, 0x9, 0x2, 0x6, 0x80000000, 0xffffffff, 0x6, 0x4, 0x6, 0x67d7, 0x8, 0x10001, 0xfffffffa, 0x2, 0x4, 0x6, 0xfffffe01, 0x8, 0xffffff93, 0x3, 0xa37, 0x3ff, 0x8, 0x7c8, 0x5, 0x101, 0x8, 0x2, 0x1000, 0x0, 0x3ff, 0x1, 0x3, 0x6, 0x1f64d413, 0x5, 0x1, 0xfffffffc, 0xedf, 0x2, 0xc, 0x2, 0x8, 0x0, 0x7, 0x9, 0x149, 0x5, 0x2, 0x5, 0x7fff, 0x0, 0x70, 0x4, 0x2, 0x2, 0x5, 0xba38, 0x2, 0x7, 0x2, 0xfffffffa, 0x2, 0x2, 0x9, 0xdd, 0xff, 0x3, 0x401, 0x200, 0x0, 0x9ad, 0x6, 0x91dc, 0x7fffffff, 0x6, 0xf0ff, 0x4, 0x7, 0xff8, 0x8001, 0x0, 0x10000, 0xe, 0x5, 0x1000, 0x622, 0x7fffffff, 0x2e, 0x4, 0x4, 0x2, 0x5, 0x0, 0xe, 0xffffffff, 0xfffffff7, 0x6, 0x7f, 0x20d4, 0x3, 0x401]}, {0xdb6d, [0x8, 0x1, 0xffff8001, 0x6, 0x9, 0x0, 0x2, 0x6, 0xfffffff2, 0x7f, 0x8, 0x8, 0x7, 0xfffff755, 0x6, 0x9, 0x4, 0x5, 0x50f, 0x100, 0x6, 0x5, 0x3, 0x9e3, 0x7, 0xfff, 0x4, 0x7, 0x9, 0x8, 0x2, 0x0, 0xb4d, 0x2, 0x200, 0x4, 0x5, 0x9, 0x7df, 0x2, 0x7ff, 0x7, 0x1196, 0x2, 0x1afa, 0x7, 0x13, 0x80000001, 0x6f, 0x4, 0x3, 0x1, 0x15, 0x2, 0x4, 0x9, 0x462, 0xf1, 0xffffffca, 0xad58, 0x66d, 0x7, 0x1, 0x1e, 0x5, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfa, 0x701, 0x81, 0xea2, 0x3, 0x7ff, 0x8, 0xb11, 0x3, 0x1000, 0x2, 0x400, 0x1ff, 0x6, 0x101, 0x6, 0xfffffffe, 0x5, 0x1, 0x81, 0x5, 0x3ff, 0x8, 0x8, 0x4, 0x2, 0x4, 0xfffffff9, 0xf, 0x573, 0xb, 0x6, 0x5, 0x7]}, {0x0, [0x6, 0x55f, 0x7fff, 0xad3, 0x4, 0x0, 0x0, 0x6b, 0x9, 0x101, 0x8, 0x3ff, 0x5, 0x40, 0x8, 0x8, 0x9, 0x0, 0x5, 0x0, 0x3, 0x81, 0xfffffffa, 0x9, 0x401, 0xda, 0x6, 0xfffffff7, 0x200, 0x2, 0xb, 0x1, 0x3, 0x2, 0xd7, 0x0, 0x805, 0xffffffff, 0x40, 0x1, 0xd, 0x8001, 0x0, 0xaca, 0x3, 0xff, 0x5c, 0x100, 0x10000, 0x1, 0xffffffff, 0xffff, 0x40, 0x0, 0x914, 0x8, 0x7, 0x8, 0x6, 0x5, 0xa0, 0x231, 0xffff, 0xf1a, 0x100, 0x6, 0x4, 0x7fffffff, 0xc, 0x9, 0x7fff, 0x101, 0x8000, 0x0, 0x3, 0x4, 0x9, 0xffffffff, 0x4, 0x10000, 0x0, 0x4, 0x6, 0xe45, 0x1, 0xd, 0xd7, 0x8000, 0xfffffff7, 0x6, 0x5, 0x200, 0x4, 0x5, 0x7, 0x6, 0x81, 0x8, 0x0, 0x6, 0x4, 0x8, 0xb4f, 0x9]}, {0x3, [0xfffffff5, 0x4, 0x9, 0x401, 0xd97, 0x80000001, 0x0, 0x470, 0x1, 0x6, 0x2, 0x4, 0x2f6229ce, 0x2, 0xa, 0x8, 0x7f, 0x4, 0x34, 0x9, 0x0, 0x5e, 0x7fffffff, 0xd2df, 0x54, 0x8, 0x6, 0x7ff, 0x5, 0x3, 0x6, 0x0, 0xffffffff, 0xffffffff, 0x800003, 0x80000000, 0x9, 0x2, 0x18, 0x8, 0xff, 0x5, 0x9, 0x4, 0xfdb, 0x0, 0x6, 0x0, 0x6, 0x8, 0x2, 0x400, 0x8, 0x0, 0x8, 0x1, 0x401, 0x2400, 0x1, 0x5, 0x7f, 0x7ff, 0x80, 0x1ff, 0x70c, 0xffffffff, 0x4, 0xb8, 0x1d3, 0x7fff, 0x2, 0xd74b, 0x1000, 0x8000, 0xff, 0x6, 0x10, 0xfff, 0x9, 0x1fe0, 0x5, 0x0, 0xffffff80, 0x0, 0xfd9, 0x1000, 0x6, 0xcb4, 0x7b9, 0x6, 0x4, 0x9, 0x4, 0x8, 0xfffffff7, 0x80000000, 0x80000000, 0x7f, 0x800, 0x2, 0x1, 0x1, 0x6, 0x7]}, {0x1, [0x2, 0x6, 0x5, 0x3ff, 0x9, 0x9, 0xfffffff6, 0x3, 0xfffffffd, 0x10000, 0xfffffe01, 0xfffffff7, 0xfffffffc, 0x7fff, 0xffffffb9, 0x32c, 0x9, 0x1, 0x50dc, 0x6, 0x8, 0x8, 0x2e, 0x8a05, 0x7, 0x3, 0xb, 0x1, 0xffff3c32, 0x8001, 0x2, 0xc3e0, 0x2, 0x6e31, 0x3, 0x2, 0x4, 0x8, 0x4, 0xd6, 0xfffffff9, 0x9, 0x9fc, 0x6, 0x81, 0x6, 0xc2ee, 0x6cb, 0x3, 0x35, 0x68, 0xa, 0xe28a, 0x7, 0xff, 0x8, 0x8, 0x1, 0x9f, 0x6, 0x8, 0x2, 0x4, 0xa4, 0x8, 0x7fff, 0x1, 0xfffff001, 0x0, 0x9, 0xa, 0x274, 0x9, 0x5, 0x9a, 0x9c99, 0x81, 0xc, 0x18, 0x7, 0x0, 0x8, 0x10, 0x7, 0x6, 0x8, 0xff, 0x6, 0x7, 0x4, 0x8, 0x2, 0xaa37, 0x8, 0x5, 0x8, 0x1f, 0x4, 0x3, 0x1, 0xd, 0x1, 0xb9, 0x4]}, {0x0, [0x0, 0x5, 0x1, 0xe, 0x8000, 0x3, 0xafc, 0x401, 0x6, 0x8, 0x0, 0x8fa, 0x7f, 0xfffffff6, 0x120000, 0xff, 0xb4, 0xc, 0x6, 0x7ff, 0x5, 0x100, 0x10001, 0x3, 0x9, 0x101, 0xffffffff, 0xc, 0x8001, 0xc, 0x5, 0xa227, 0x5, 0x3ff, 0x1, 0x4, 0x1, 0x8, 0x2277, 0x7, 0xe9, 0x3, 0x1, 0x0, 0x2000, 0x8, 0x6, 0x1, 0x3, 0x3, 0x8, 0x5, 0x400, 0xaec, 0xfffffff7, 0x8c86, 0x9, 0x2, 0x8, 0x8, 0xe, 0xa, 0x3, 0x40, 0x10000, 0x1, 0x46, 0x1, 0x82, 0x5, 0x5, 0x7, 0x184, 0xc3f2, 0xfffffffb, 0x8, 0x3, 0x5, 0xfffffff8, 0x0, 0xa436, 0x81, 0x4, 0x6, 0x7, 0x0, 0x0, 0x3b9, 0xb81a, 0x7, 0x1, 0x3, 0xffffffff, 0x8, 0xe, 0xffffa46a, 0x7fff, 0x0, 0x2, 0x201, 0x4, 0x1, 0x436f95d1, 0x1]}, {0x5, [0x0, 0xffffffff, 0x0, 0x5, 0x7, 0x2, 0x2, 0x7ff, 0x438, 0x2, 0x83, 0x4, 0x8, 0x10001, 0x5e54, 0x4, 0xd, 0x8, 0x4b, 0x3, 0x9, 0x7000000, 0x3, 0x8, 0x1, 0x10001, 0xf39a, 0x17, 0x5, 0xd94f, 0x87a9f2b, 0x4, 0x8, 0x9, 0x6, 0x4, 0x7, 0x4, 0x2, 0x10000, 0x8, 0x4e2, 0x10, 0x0, 0xd, 0x9, 0x0, 0x1, 0x4, 0xda, 0x28, 0x10001, 0x29, 0xff, 0x7, 0x61a, 0x3, 0x6, 0x5, 0x0, 0x3, 0x6, 0x7ff, 0x3b0, 0x8, 0x3, 0xfffffffe, 0x0, 0xc34c, 0xd, 0xe1, 0x5, 0x6, 0x6, 0x8001, 0x3, 0x4, 0x8, 0x69e, 0x4, 0xd, 0x0, 0x3, 0x2, 0x4, 0x0, 0x7fffffff, 0x5, 0x4, 0x5, 0x3, 0x5, 0x2, 0x88, 0x81, 0x6, 0x10001, 0x8, 0x7f, 0x200, 0x0, 0x3, 0x4, 0x8]}, {0x4000000, [0x80, 0x9, 0x0, 0x4, 0x2, 0x2, 0x6, 0x7, 0xff, 0x10001, 0x7, 0x2, 0x3, 0x3, 0x9eca, 0xc9, 0x9, 0xff, 0x7f, 0xfffffff8, 0xa250, 0x6, 0x92, 0xfffff989, 0x3, 0x5, 0x1, 0x4, 0x3, 0x94, 0x1, 0xfffffff9, 0x800, 0x9, 0x2, 0xf8, 0xcca, 0xffffff01, 0x5c, 0x2, 0x10, 0x4, 0xd, 0x15f5, 0x9, 0x7f, 0x5, 0xfffffffa, 0x2, 0x6, 0x8001, 0x9, 0x1, 0x8, 0xc327, 0xfffffffe, 0xea, 0x9, 0x9, 0x8000, 0x2, 0x8000, 0x8, 0x3ff, 0x5, 0x4, 0x5, 0x81d2, 0x4, 0x6, 0x40, 0x9a, 0x5, 0x0, 0x7ff, 0x6, 0x1, 0x718f, 0x3, 0x6, 0x3, 0x4, 0x8, 0x8001, 0x200, 0x802e, 0x2, 0x5, 0x10000, 0x8, 0x101, 0x1, 0xd, 0x9, 0x0, 0x0, 0x7, 0x3, 0xf57a, 0x1ff, 0xff, 0x1, 0x12a, 0x9]}, {0x6, [0x5, 0xfffffc01, 0x6366, 0xf, 0x4, 0x432, 0x3, 0xba6c0000, 0x0, 0x7, 0x4c000000, 0x3, 0xffffffff, 0x3ff, 0x2, 0x4, 0xcc39, 0x473, 0x3, 0x6, 0x3, 0xb, 0x6, 0x0, 0x7ff, 0x6d0, 0x187e9fac, 0x7, 0x18, 0x3, 0x1, 0x2, 0xfffffffb, 0x1, 0x6, 0x4, 0x5, 0x4, 0x8, 0x88, 0x0, 0x80000000, 0xb, 0x4, 0x9, 0x3ff, 0x7, 0xd8b, 0x502e, 0x7, 0x7, 0x4, 0x6, 0xffffffff, 0x8, 0x1, 0x1ff, 0x97f, 0x310, 0x3, 0xcc0, 0x5, 0x169a, 0x10000, 0x43ad4fa3, 0x2, 0x9, 0x6, 0x401, 0xf, 0xffffff7f, 0x4b8a, 0x8, 0x7, 0x8ca9, 0x3, 0x9, 0xd9, 0x374, 0x8, 0x5, 0x4, 0x3, 0x5, 0x7fff, 0x7, 0x800, 0x0, 0x4, 0x10001, 0x80000001, 0x7fff, 0x7, 0xc9, 0x800, 0x9, 0x80, 0x8, 0xd2, 0x2, 0x1, 0x0, 0x8330, 0x9]}, {0x200, [0x784e2393, 0x4, 0x6, 0x9, 0xedf, 0x1, 0x3, 0x101, 0x9, 0x0, 0x101, 0x10, 0xf, 0x1, 0xc5, 0xa588, 0x0, 0xe, 0x6, 0x2, 0x0, 0x8, 0xe, 0xa, 0x8, 0x2, 0x7e, 0x0, 0x6, 0x80000000, 0x77, 0x2, 0x1000, 0x199, 0x2, 0xbf63e0, 0x0, 0xc6, 0x0, 0x400, 0x2, 0x140, 0x5, 0x6, 0x0, 0x9, 0xc7, 0x3c, 0xffffffff, 0x0, 0x5, 0x0, 0x8, 0x3, 0x2, 0x3486238e, 0x0, 0x7, 0xffffffff, 0xd93, 0x6, 0x2, 0x8, 0xfb6, 0x7, 0x5, 0x2, 0x1, 0x1, 0x80000001, 0x9, 0xc, 0x3, 0x8, 0xd6b, 0x36, 0x6, 0xb8, 0x0, 0x9, 0xc, 0x0, 0x7, 0x6, 0x69e1, 0x100, 0x4, 0xfe, 0x4800000, 0x612, 0xfffffff8, 0xbe1, 0xe, 0xffffff7f, 0x5a8, 0x8001, 0x4e8a095, 0x6, 0x9, 0xffffffff, 0x3, 0xbbe, 0x5, 0x50]}]}) dup2(0xffffffffffffffff, 0xffffffffffffffff) r5 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r6 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r6, r5, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) link(&(0x7f0000000940)='./file0\x00', &(0x7f0000000d40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') chflags(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x40000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) dup2(r7, r0) r8 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) r9 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) copy_file_range(r9, &(0x7f0000000000)=0xa, r9, &(0x7f0000000400)=0x8, 0x6, 0x0) sendfile(r8, r0, 0x7, 0xfffffffffffd, 0x0, 0x0, 0x0) openat$kbd(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) 1.029958326s ago: executing program 3 (id=102): openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000, 0x0) (async) r0 = kqueue() kevent(r0, &(0x7f0000000100)=[{0x0, 0xfffffffffffffff9, 0xb, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) (async) socket(0x1c, 0x1, 0x0) (async, rerun: 64) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) (rerun: 64) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) mknodat(r1, &(0x7f0000000480)='./file0\x00', 0x10, 0x0) (async) sendmsg$inet6_sctp(0xffffffffffffffff, 0x0, 0x18c) (async) r2 = socket(0x11, 0x3, 0x0) sendto$unix(r2, &(0x7f00000000c0)="b100050160000000a80000000700000012df8106cfa10500fef96ecfc73fd3357ae36caa0416fa4f376b36acf00b7804be301e4991f7c8cf5f3fc303ebe1aa5323edeb51e2f0ca3ebbc257169ed0d44a699a1f133ea7acb5d602000d7d026ba8af6300371c2102000000720fd38bfbb770c1f5a8aec872ea772ec58904000000008d9800361b1257aba8c500002012010000de5000"/177, 0xb1, 0x0, 0x0, 0x0) (async) getsockopt$inet6_sctp_SCTP_AUTOCLOSE(r2, 0x84, 0x5, &(0x7f00000002c0), &(0x7f0000000300)=0x4) (async, rerun: 32) mprotect(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x4) (rerun: 32) open(&(0x7f0000000180)='./file0\x00', 0x200, 0x0) mount(&(0x7f0000000000), 0x0, 0xc4, 0x0) (async) r3 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) extattr_get_file(0x0, 0x1, &(0x7f0000000280)='\x00', 0x0, 0x0) (async, rerun: 64) mkdirat(r3, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async, rerun: 64) unlink(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r4 = fork() sigqueue(r4, 0x16, @sival_int=0x4) (async, rerun: 32) r5 = getsid(r4) (async, rerun: 32) procctl$PROC_REAP_STATUS(0x0, r4, 0x4, &(0x7f0000000040)) (async) r6 = fcntl$getown(0xffffffffffffffff, 0x5) setpgid(r6, r5) r7 = getppid() r8 = fork() sigqueue(r8, 0x11, @sigval_int) (async) vfork() (async) lio_listio(0x0, 0x0, 0x0, &(0x7f0000000280)={0x1, 0x9, @sigval_int, @spare=[0x80000]}) (async, rerun: 32) setpgid(0x0, r7) (rerun: 32) 960.025613ms ago: executing program 0 (id=103): r0 = socket(0x1c, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f00000001c0)={'rack\x00', 0x3d6}, 0x24) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0x4}, 0x1c) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) fork() syz_emit_ethernet(0x66, &(0x7f0000000100)={@broadcast, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x30, 0x3a, 0x0, @rand_addr="a4d2c5424d6aa513f09721a04f2b8881", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@dest_unreach={0x1, 0x1, 0x0, 0x0, '\x00', {0x0, 0x6, '\x00', 0xdfe0, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @rand_addr="d77f9174e5369e9fbb060c6bbf926394"}}}}}}}) socket$inet6_udp(0x1c, 0x2, 0x0) getsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, 0x0, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) madvise(&(0x7f00009d6000/0x600000)=nil, 0x600000, 0x5) sendto$inet(r0, &(0x7f0000000200)="0e", 0xff66, 0x300, 0x0, 0x0) 959.456057ms ago: executing program 2 (id=104): r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r1) accept4(r0, 0x0, 0x0, 0x10000000) sendfile(r2, 0xffffffffffffffff, 0xc, 0x8001, 0x0, &(0x7f0000002740), 0x20) 739.81387ms ago: executing program 2 (id=105): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80000002, &(0x7f0000000040)="e2", 0x1, [], 0x1, 0x5, 0xfffffffc, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int=0xe, @thr={0x0, 0x0}}}) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x2, 0x3, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r3 = freebsd12_shm_open(&(0x7f00000000c0)='./file0/../file0\x00', 0x200, 0x6908bd7c4cbb1698) fchmod(r3, 0x188) setsockopt(r2, 0x0, 0x6a, 0x0, 0x0) setsockopt$inet_sctp_SCTP_EVENTS(0xffffffffffffffff, 0x84, 0xc, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x300201, 0xd2) undelete(&(0x7f0000000540)='./file0\x00') ktimer_create(0x0, &(0x7f0000000700)={0x3, 0x1d, @sigval_ptr=0x5, @spare=[0x7, 0xf81, 0x1f2a9c89, 0xf54d, 0x800, 0x0, 0x0, 0x453f]}, &(0x7f0000000400)) syz_emit_ethernet(0x58, &(0x7f0000001280)={@local, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x22, 0x3a, 0xff, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@ndisc_ns={0x87, 0x0, 0x0, @mcast1, [{0x2, 0x1, "a2dd8b6d81d74308220780a8"}]}}}}}}) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ksem_init(0x0, 0x0) r4 = socket(0x1, 0x30000003, 0x2) sendto(r4, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) sync() 590.0028ms ago: executing program 0 (id=106): open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r0 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x2000) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x106, 0x0) r2 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) getsockname$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, &(0x7f0000000440)=0x1c) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r3 = openat(r1, &(0x7f0000000000)='./file0\x00', 0x40000, 0x0) aio_write(&(0x7f0000000240)={r3, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x0, 0x1ff], 0x0, 0x0, 0x8000, {0x1, 0x7, 0x0}, {0x0, 0x0, @sival_ptr=0x3ef7}}) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0x8000) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) copy_file_range(r5, 0x0, r5, &(0x7f0000000100)=0x3, 0x1, 0x0) fstatat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300), 0x0) r6 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000000180)=""/184, 0xb8}], 0x1, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) (async) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) (async) unlinkat(r0, &(0x7f0000000000)='./file0\x00', 0x2000) (async) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x106, 0x0) (async) open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) (async) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) (async) getsockname$inet6(r1, &(0x7f0000000400)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, &(0x7f0000000440)=0x1c) (async) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) (async) openat(r1, &(0x7f0000000000)='./file0\x00', 0x40000, 0x0) (async) aio_write(&(0x7f0000000240)={r3, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x0, 0x1ff], 0x0, 0x0, 0x8000, {0x1, 0x7, 0x0}, {0x0, 0x0, @sival_ptr=0x3ef7}}) (async) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) (async) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0x8000) (async) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) (async) copy_file_range(r5, 0x0, r5, &(0x7f0000000100)=0x3, 0x1, 0x0) (async) fstatat(r2, &(0x7f0000000140)='./file0\x00', &(0x7f0000000300), 0x0) (async) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) (async) preadv(r6, &(0x7f0000000000)=[{&(0x7f0000000180)=""/184, 0xb8}], 0x1, 0x0) (async) 524.140525ms ago: executing program 1 (id=107): mkdir(&(0x7f00000000c0)='./file0\x00', 0x10) r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x1b0) rmdir(&(0x7f00000015c0)='./file0\x00') freebsd11_getdents(r0, 0x0, 0x0) syz_emit_ethernet(0x13e, &(0x7f0000000300)=ANY=[@ANYBLOB="aa2aaaaaaaaaf788a33fb3f386dd6083000001082b00fe8000000000000000000000000000bbff0200000000000000000000000000508ebb8347ffad22a1a1013c19000000000000090000000000000062e2c66b6335c8ae55353be0d315b3fed20f4e5d2c8dd1131a7605d5edb6e8af1b63cd3c542cf7bf636107a4bec4e9313d29e483d200b4b4c7ee612d8d6a904564a08fcf8ee5d016534a98939f873e28c82dda397128ce99eb25a11913ebde3fca19b89577aed039e6d88c6c283b55d2ad28254143078eca7a300a49a10aa35e5a225273e12ffca2c3948de9a30e853c2e78fae471059a5c3e50fdd3a340f34c2b0415117e34a69b64b034a9c1041faca20758a4a441e825dd30d8afa17ad333c8779e000000000004019078000000386c3eb4fb7a902a0be69941c1e879775f24b42b0008200100000000000000000000ffff00000000febe71e70e7f32596981056a0fbeecbee0d1e50524fe0296c4c4031a43e033a89dd5d1084e04f46136a1825aad21a0a65985270b43c89afaa2490032836433211bc3ce280279cfbfcdabe3598689cf6e54e086fecaa6eb5b83c2fcd61781afc77631a5f089c95ec531a7a338653422d0a428"]) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, 0xffffffffffffffff, 0x8000000000000000) r1 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8000, 0xc0) setsockopt$sock_linger(r1, 0xffff, 0x80, &(0x7f0000000100)={0x5, 0x6}, 0x8) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r2 = open(&(0x7f0000000080)='./file0\x00', 0x80, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r3, 0x80000001, &(0x7f00000000c0)='w', 0x1, [0x3], 0x200000000000000, 0x6, 0x0, {0x6, 0x20000000008, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562f1, @spare=[0x3, 0x2, 0xb, 0x5, 0xa251, 0x3, 0x4]}}) r4 = open(&(0x7f0000000040)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0x0) preadv(r2, &(0x7f0000001740)=[{&(0x7f0000000740)=""/4096, 0x400004}], 0x1, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) 520.453399ms ago: executing program 2 (id=108): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0xc00, 0x0) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f00000000c0)={0x0, 0x20, 0x0, 0x0, 0x1, &(0x7f0000000040)='p', 0x3, 0xfdffffff, [0x0, 0x1c]}) r1 = socket$inet6(0x1c, 0x3, 0x7) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x2e, 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x9, &(0x7f0000000040)=0x1, 0x4) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x7369a0733676a8) r2 = kqueue() kevent(r2, &(0x7f0000000280)=[{0x3, 0xfffffffffffffffe, 0x80c7, 0x0, 0x203, 0x0, [0x0, 0x80030d5, 0x4, 0x401]}], 0x1, 0x0, 0x0, 0x0) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') sendto$inet6(r1, 0x0, 0x0, 0xffff0000, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @rand_addr="fff71fdcedff000080009e000000e216", 0x3}, 0x1c) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqsrc(r3, 0x0, 0x48, &(0x7f0000000100)={@multicast1, @rand_addr=0x8, @rand_addr=0x2}, 0xc) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x4031, r4, 0x0) setsockopt$inet_mreqn(r3, 0x0, 0xd, &(0x7f0000000000)={@multicast1, @loopback}, 0xc) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f0000000080)={0xfffffff8, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x1f, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x3, 0x0, 0xffffffff, 0x0, 0xffff2eba, 0x0, 0xac5, 0x0, 0x1, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000000, 0xfffffffc, 0x0, 0xfffffff0, 0x0, 0x0, 0x100000, 0x0, 0x6, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe73, 0x400]}) r5 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r6 = open(&(0x7f0000000380)='./file0\x00', 0x80000000000206, 0x4ebfac6bbaf7949) setrlimit(0x8, &(0x7f0000000000)={0xfffffffffffffffb, 0xffffffffffffffff}) select(0x40, &(0x7f00000002c0)={0x6, 0x7, 0x7, 0x9, 0x8, 0x1, 0xfffffffffffffffc, 0xd8}, &(0x7f0000000300)={0x8, 0x800, 0x3, 0x0, 0x51e, 0x1, 0x9, 0x89d}, &(0x7f0000000340)={0x81, 0x7, 0x3, 0x6, 0xd756, 0x8000000000000001, 0x10001, 0x101}, &(0x7f00000003c0)={0x40, 0x9}) fcntl$lock(r6, 0xa, &(0x7f00000019c0)={0x1, 0x0, 0x2000000000000001, 0x2}) select(0xcdc4d1c0670fb18d, 0xfffffffffffffffe, 0x0, 0x0, 0x0) ftruncate(r6, 0x100000001) setsockopt$inet6_int(r5, 0x29, 0x30, &(0x7f00000000c0)=0x1c1c, 0x2d) getsockopt$inet6_int(r5, 0x29, 0x30, 0x0, &(0x7f0000000040)) 518.939628ms ago: executing program 0 (id=109): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0/file0\x00', 0x128) rmdir(&(0x7f00000000c0)='./file0/file0/..\x00') ftruncate(r0, 0x80002) socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r1, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) r2 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) shutdown(r2, 0x1) setsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r1, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) sendmsg$inet6_sctp(r1, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)="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", 0x149}], 0x1, 0x0, 0x0, 0x81}, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000980)={'bbr\x00'}, 0x24) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f00000001c0)={0x6, 0x3}, 0x10) connect$inet6(r3, &(0x7f0000000300)={0x1c, 0x1c, 0x2, 0xfffffffe, @ipv4={'\x00', '\xff\xff', @loopback}, 0x8be}, 0x1c) syz_emit_ethernet(0xb2, &(0x7f0000000740)={@random="3a54680fc4b6", @remote, [], {@ipv6={0x86dd, {0x8, 0x6, "7082d2", 0x7c, 0x20, 0xff, @mcast2, @local={0xfe, 0x80, '\x00', 0x0}, {[@fragment={0x1b, 0x0, 0x3, 0x1, 0x0, 0x14, 0x64}], @generic="33bab4299b12617d38e6d54d714f7b71c105a1fb04fb631f9ee5c33b6ed7903bb4e14eb606f8825caa6567baaa2801d0902f18bf1929a289a47546260bc013e313bcdbea591a0ca0047fe7e81659ac281648c7502f99a8f8da2c70edeb5518f0e73ca32740f0a3bb7489b276bcc841df19a0b4bf"}}}}}) pipe2(&(0x7f0000000080), 0x100004) rfork(0x85000) 429.905311ms ago: executing program 2 (id=110): r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) recvmsg(r0, &(0x7f0000001680)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast2}, 0x1c, &(0x7f00000016c0)=[{&(0x7f00000000c0)=""/41, 0x29}, {&(0x7f0000001840)=""/202, 0xca}, {&(0x7f00000017c0)=""/21, 0x15}, {&(0x7f0000000700)=""/163, 0xa3}, {&(0x7f0000000500)=""/186, 0x6f}, {&(0x7f0000000200)=""/124, 0x7c}, {&(0x7f0000000280)=""/12, 0xc}, {&(0x7f00000002c0)=""/44, 0x34}, {&(0x7f0000000140)=""/75, 0x4b}], 0x9, &(0x7f0000002c40)=""/4093, 0x1009}, 0x82) (async) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$inet6_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r1, 0x84, 0xd, &(0x7f0000000300)=0xa, 0x4) (async) r2 = open(&(0x7f0000000040)='./file0\x00', 0x18289, 0x100) (async) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r3 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) ioctl$MDIOCATTACH(r2, 0xc1c06d00, &(0x7f0000001940)={0x4, 0x7, 0x0, &(0x7f0000001800)='./file0\x00', 0x3, 0x787e, 0xe, 0x9, 0x2, 0x1ff, &(0x7f0000000080)='\x01', [0x2ef, 0xe1ab, 0x0, 0x8000, 0x7, 0x9, 0x200, 0x0, 0xfffffffe, 0x1, 0x7ff, 0x0, 0xc, 0x1, 0x4, 0x0, 0x3, 0xd2f2, 0x0, 0xb5, 0x3, 0x4, 0x2, 0x54e, 0x0, 0x5, 0x7, 0x5, 0x8, 0x4, 0x40, 0x80, 0x8, 0x7ff8000, 0xfff, 0x3, 0x3, 0x3, 0x49c0191f, 0x80, 0x7, 0xc, 0x6, 0x2, 0xc66, 0xfc7, 0xfff, 0xfffffff7, 0x1, 0x3, 0x2, 0x2, 0x9, 0x8, 0xa795, 0x3, 0x1, 0x7fff, 0x1, 0x0, 0x6, 0x4, 0x1, 0x0, 0x9, 0xd90, 0xbb1, 0xfffffffc, 0x4, 0x6, 0xfffffd94, 0x9, 0x2, 0x4, 0x0, 0x4, 0x2, 0x9, 0x4, 0xb, 0x1, 0x5, 0x1, 0x50, 0x1, 0xfffffff1, 0xeb, 0x1, 0x1, 0x5, 0xa, 0x4, 0x3ff, 0x7, 0x100, 0x9]}) (async) r4 = open$dir(&(0x7f0000000100)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f0000000a80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) link(&(0x7f0000000940)='./file0\x00', &(0x7f0000000d40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) rename(&(0x7f0000000600)='./file0\x00', &(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x4, 0x60) (async) socket(0x26, 0x2, 0x0) (async) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1009, 0x0, 0x0) (async) r5 = openat(0xffffffffffffff9c, &(0x7f0000001b00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) (async) setregid(0x0, 0xee00) (async) aio_write(0x0) connectat$unix(r5, r5, &(0x7f00000000c0)=@file={0xa, 0x0, './file0\x00'}, 0xa) (async) r6 = kqueue() (async) accept4(r5, &(0x7f0000000140)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @ipv4={""/10, ""/2, @remote}}, &(0x7f0000000180)=0x1c, 0x10000000) (async) r7 = openat$smbus(0xffffffffffffff9c, &(0x7f0000000200), 0x800, 0x0) fstatat(r7, &(0x7f0000000240)='./file0\x00', &(0x7f0000000480), 0x4200) (async) kevent(r6, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c5, 0x9, [0x5, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) (async) socket(0x1, 0x2, 0x0) syz_emit_ethernet(0x0, 0x0) (async) openat$crypto(0xffffffffffffff9c, &(0x7f0000000380), 0x8, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) socket$inet6_tcp(0x1c, 0x1, 0x0) 381.03599ms ago: executing program 2 (id=111): open(&(0x7f00000000c0)='./file0\x00', 0x201, 0x0) r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_int(r0, 0x0, 0x41, &(0x7f0000000000)=0x3, 0x4) sendto$inet(r0, 0x0, 0x0, 0x20185, &(0x7f00000003c0)={0x10, 0x2, 0x0, @loopback}, 0x10) recvfrom$inet(r0, 0x0, 0xffffffa2, 0xf01f00, 0x0, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x4, 0xd27d43220c7df9b, 0x0) kevent(0xffffffffffffffff, &(0x7f0000000400)=[{0x8, 0xfffffffffffffffb, 0x8000, 0x0, 0x1, 0xffffffffffffffff, [0x9, 0x50, 0x0, 0x6]}], 0x1, 0x0, 0xffffffffffffff98, 0x0) r1 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) socket$inet_sctp(0x2, 0x1, 0x84) openat$crypto(0xffffffffffffff9c, 0x0, 0x100000, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x55, 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) ioctl$MDIOCDETACH(0xffffffffffffffff, 0xc1c06d01, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x8, 0x10000, 0xe12, 0x0, 0x0, 0x1, 0x0, 0x1146, 0x8d, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xdf8, 0xaca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x4, 0x0, 0x40000, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x1, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x8, 0xffffffff, 0x3]}) mount(&(0x7f0000000280)='ntfs\x00', &(0x7f00000002c0)='./file1\x00', 0x48400000, &(0x7f0000000300)="4b123ce226f1e967900fac6edc4320e17a7935f77011730ebff8197d382d263fbaaa3b6652002edb6529daae6b61cae1e5faa6a0f989806d173c1e1c0df563a445c76d97aa929a89f55d7572ca1876b7959b634be2663f80828b2cb2bc6e74467c23e54cb1171938353c48894a757226ef7e437c36dae36d97400a5e74b3ca8c438661270fd8cdfad95bd264be04e72ee2bcae4ab9dbf38c20aab36805f42654111ecd7546669abe9fbb42158afe2edb485159f10d83d2f71d1db1006f95c3da15acf861cd9bf6415c92478d29c6f3651f44") r2 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_TCP_RXTLS_ENABLE(r2, 0x6, 0x29, 0x0, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) rfork(0x85000) r3 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) syz_emit_ethernet(0x89, &(0x7f0000000440)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff3c02099de675d8c6f99ae3d9eedb08d38eb97640800d036f089e3127be7fe33ac7a183823a00d31d3d33343f4d76db6f09000000a62bf857f27a980b9cc4657f7f49f72fc9d805124bbcdca15f07c03a604703013c8f18b0894679550fe90463359f56fb1511d7d36d7029f4cdc59afe33d2200f95f936341345fdc6d8a5a9ecb70dd4c9c06c590e1fb6ca4c14b5556e274eea9b69557aa200a3b46982422eb084a8a0cde58b0dff"]) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) close(r3) 240.037103ms ago: executing program 3 (id=112): open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x92ba593825fd3c1a) (async) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) (async) r1 = openat$kbd(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ioctl$GIO_SCRNMAP(r1, 0x41006b02, &(0x7f00000001c0)) (async) r2 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r3 = socket(0x1c, 0x1, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) (async) syz_emit_ethernet(0x4e, 0x0) (async) bind$inet6(r3, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) (async) sendfile(r0, r3, 0x889b9, 0x0, 0x0, 0x0, 0x11) (async) openat$md(0xffffffffffffff9c, 0x0, 0x800, 0x0) (async) setsockopt$inet6_sctp_SCTP_MAX_BURST(r3, 0x84, 0x19, 0x0, 0x0) (async) r4 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r4, 0xffff, 0x10000, &(0x7f0000000080)=0xb, 0x4) (async) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r5, 0x29, 0xc, 0x0, 0x0) (async) setresuid(0x0, 0xee01, 0x0) (async) r6 = socket$inet6_tcp(0x1c, 0x1, 0x0) r7 = socket$inet6(0x1c, 0x1, 0x0) bind$inet6(r7, &(0x7f0000000080)={0x1c, 0x1c, 0x0, 0x825, @loopback, 0x20}, 0x1c) setsockopt$inet6_int(r6, 0x29, 0x1b, &(0x7f0000000080), 0x4) (async) bind$inet6(r6, &(0x7f0000000040)={0x1c, 0x1c, 0x0, 0x0, @empty, 0x8}, 0x1c) (async) rfork(0x83000) aio_write(0x0) r8 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) write(r8, &(0x7f0000000080)="ba", 0x100000) truncate(&(0x7f0000000080)='./file0\x00', 0x8001) 60.102771ms ago: executing program 3 (id=113): listen(0xffffffffffffffff, 0x7) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) accept4(0xffffffffffffffff, 0x0, 0x0, 0x10000000) sendfile(r1, 0xffffffffffffffff, 0xc, 0x8001, 0x0, &(0x7f0000002740), 0x20) 58.547789ms ago: executing program 1 (id=114): open(&(0x7f0000000080)='./file0\x00', 0x200000, 0x102) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000003dc0)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h', &(0x7f00000007c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f0000000c40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f00000010c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f0000001540)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84U\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00'/1144, &(0x7f0000001b40)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h?\xa9\xbbW:\xa1\x95\xd0\xb8\xcc\x0f<\x88\b\x8a\x1d\xa1\xdc3d\xe7\xec\xa5\xb5(\xfc\xf9\x98\x1d\xc6\x14r\xca\x8d\x03\xca\xf5H\xf9\x8e\x7f\xad\xfan\'\xa8g\xda\x1a\xa3kM\x86\xef:\x92]\xde\xea\xae\xce\x98\x9f9\xe2\vZ%\xc5B\x91[b\xb5X\xed\\\xbd\xbbY@\xc5\xea!\x9a\x92E\x8cZ\xe3/^\xf4\x83\'\b\xdd\xd0\xd4L\xe9P62\xd7f\xf0\xdf\xdd\xc5V\xf7O,T\x90\x19\f\xbf\xf09lz=\x16\xb0\x8e,\xa3UhO\x7fe\xdb\xc35\xf7\x1ed\x9b\x7f\x9b\xf4\xadj} \xffX', &(0x7f0000003900)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h'], &(0x7f0000000100)) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x4bf0004, &(0x7f00000001c0)) 0s ago: executing program 1 (id=115): socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x400, &(0x7f0000000140)=0x3, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) aio_readv(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xfffffffffffffeea, [0xfffffffd], 0x0, 0x8, 0x9, {0x2000000, 0xffffffffffffffff, 0x0}, {0x0, 0x4, @sival_int=0x7ff}}) recvfrom(r0, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) r2 = kqueue() syz_emit_ethernet(0x2a, 0x0) getsockopt$inet6_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x20, &(0x7f0000000080), &(0x7f0000000200)=0x4) r3 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f00000000c0)={'bbr\x00'}, 0x24) connect$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x1ff, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x1c) sendto(r3, 0x0, 0x0, 0x100, &(0x7f0000000200)=@in6={0x1c, 0x1c, 0x1, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x2006}, 0x1c) kevent(r2, &(0x7f0000000240)=[{0x2, 0xfffffffffffffffb, 0x22, 0x40000000, 0x3, 0x9, [0x5, 0x3b, 0x0, 0x1c2aea36]}, {0x973e, 0x5, 0x8080, 0xc, 0x68, 0x1c, [0x4, 0x7fffffff, 0xd, 0xe]}], 0x2, 0x0, 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r4, 0x84, 0x3, &(0x7f0000000340)={0xffff, 0x3, 0x1, 0x3}, 0x8) connect$inet(r4, &(0x7f0000000140)={0x10, 0x2, 0x0, @multicast2}, 0x3c) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x5, 0x5410, 0xffffffffffffffff, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = open$dir(0x0, 0x1, 0x0) copy_file_range(r5, 0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r6 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$sock_timeval(r6, 0xffff, 0x1005, 0x0, 0x0) sendto(r1, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x1, 0x0, 0x0) syz_emit_ethernet(0x7c, &(0x7f0000000000)={@random="c3b58b132350", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "000100", 0x46, 0x3a, 0x0, @rand_addr="f6ec06afdf466c130afc590bdb9e4ff6", @mcast2, {[], @icmpv6=@echo_reply={0x81, 0x0, 0x0, 0x5b66, 0x9, "d530e93adc15098b8b273b3f40b36123d20e12871e52648c8f15429721e644c0b4587875942e125f47565e0d8faa1140d35e2b4a4246d8fb53ece5e00893"}}}}}}) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) rfork(0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.132' (ED25519) to the list of known hosts. Connection to 10.128.0.132 closed by remote host. FreeBSD/amd64 (ci-freebsd-main-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: FreeBSD/amd64 (ci-freebsd-main-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: FreeBSD/amd64 (ci-freebsd-main-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: vnode_pager_putpages: zero-length write at 0 resid 12288 0xfffffe0077663c08: type VREG state VSTATE_CONSTRUCTED op 0xffffffff8371daa0 usecount 5, writecount 3, refcount 35 seqc users 0 hold count flags () flags (VIRF_PGREAD|VMP_LAZYLIST) v_object 0xfffffe00540d8aa8 ref 2 pages 264 cleanbuf 32 dirtybuf 1 lock type ufs: EXCL by thread 0xfffffe005411b780 (pid 859, syz-executor, tid 100160) with exclusive waiters pending with shared waiters pending nlink=1, effnlink=1, size=1048576, extsize=0 generation=d8f35778, uid=0, gid=0, flags=0x119304 ino 83, on dev gpt/rootfs Warning! syz-executor[883] uses SF_SYNC sendfile(2) flag. Please follow up to https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=287348. Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe00585a1800 md1: truncating fractional last sector by 8 bytes if_delmulti_locked: detaching ifnet instance 0xfffffe00077f5800 panic: Assertion done != job_total_nbytes failed at /syzkaller/managers/main/kernel/sys/kern/sys_socket.c:678 cpuid = 0 time = 517 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0xc6/frame 0xfffffe0056c608d0 kdb_backtrace() at kdb_backtrace+0xd0/frame 0xfffffe0056c60a30 vpanic() at vpanic+0x257/frame 0xfffffe0056c60bf0 panic() at panic+0xb5/frame 0xfffffe0056c60cb0 soaio_process_sb() at soaio_process_sb+0x11e2/frame 0xfffffe0056c60ea0 soaio_kproc_loop() at soaio_kproc_loop+0x17b/frame 0xfffffe0056c60ef0 fork_exit() at fork_exit+0xcc/frame 0xfffffe0056c60f30 fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe0056c60f30 --- trap 0xc, rip = 0x82308f93a, rsp = 0x8209a4708, rbp = 0x8209a47f0 --- KDB: enter: panic [ thread pid 903 tid 100091 ] Stopped at kdb_enter+0x6e: movq $0,0x258b817(%rip) db> db> set $lines = 0 db> set $maxwidth = 0 db> show registers cs 0x20 ds 0x3b es 0x3b fs 0x13 gs 0x1b ss 0x28 rax 0x12 rcx 0xfffffe0002bf1850 rdx 0 rbx 0xffffffff82826ac0 .str.27 rsp 0xfffffe0056c60a10 rbp 0xfffffe0056c60a30 rsi 0 rdi 0xffffffff8165a399 printf+0x149 r8 0 r9 0xffffffff r10 0x1 r11 0xfffffe005412d550 r12 0xfffffe00540bc000 r13 0xfffffffffffffffe r14 0xffffffff82826ac0 .str.27 r15 0 rip 0xffffffff8164377e kdb_enter+0x6e rflags 0x46 kdb_enter+0x6e: movq $0,0x258b817(%rip) db>