last executing test programs: 2.34892626s ago: executing program 2 (id=61): r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = kqueue() r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f0000000040)={0x17, 0x0, 0x18, &(0x7f0000000080)="3c022e61792eecb07f8aee18e5aa3505d7dbce4235fc3735", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x40]}) ioctl$CIOCCRYPT(r2, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0xffe, &(0x7f00000003c0), 0x0, 0x0, &(0x7f0000000280)}) kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r3 = socket(0x1c, 0x1, 0x0) accept4(r3, &(0x7f00000004c0)=@un=@file={0x100b, 0x0, ""/4105}, &(0x7f0000000000)=0x100b, 0x30000000) setsockopt$sock_int(r3, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r4, 0x80000001, &(0x7f0000000400)="e2", 0x1, [0x0, 0xc9], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x10, @sival_int, @spare=[0x0, 0x0, 0x8000]}}) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) aio_write(&(0x7f0000000140)={r5, 0x40000000006, &(0x7f0000000240)="a3", 0x1, [0x5], 0x0, 0x0, 0x1, {0x0, 0xffffffffffffffff, 0x0}, {0x0, 0x0, @sival_ptr=0x5}}) copy_file_range(r5, &(0x7f0000000000)=0x80000001, r5, 0x0, 0x100000, 0x0) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, 0x0, 0x0) connect$inet6(r3, 0x0, 0x0) sendto$inet(r3, &(0x7f0000000200)="0e", 0xff66, 0x0, 0x0, 0x0) sendmsg$unix(r3, 0x0, 0x20180) readv(0xffffffffffffffff, &(0x7f0000000480), 0x0) r6 = socket(0x1c, 0x10000003, 0x5) fcntl$lock(r6, 0x16, &(0x7f0000000080)={0x570}) openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) shmctl$IPC_RMID(0x0, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1, 0x0, 0x0) cpuset_getaffinity(0x1, 0x3, 0x400000, 0x8, &(0x7f0000000040)) r7 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_waitcomplete(&(0x7f0000000380)=&(0x7f00000002c0)={r7, 0x8, &(0x7f0000000080)="b1fea7691c715158784ce56e5cc96587028dd350d01b25042c8717241f88ca371c2ebc1a81087f67a99171ba2f61164785070e28275276717c8fab94f162d3d91999ac81faf37bab7bd24c3a1d0eef0b97fbe093c33268e03001c9bc4001154383617e0ff8dd7d0ebe95bce8eac802da97f18ee3e71ac1a696161a83eb9e252501419ae23bad", 0x86, [0x8, 0x8], 0x0, 0x4, 0x7, {0x3, 0xa, &(0x7f0000000140)="829bb3d852f5c4f856a6944ddca958393f665a955e49f1951ad70bfed70a13aea1acd4ff16244fe2585d85ace38c1435bde3730222b14490c82864ca0a1716cee3b001c55a49bfe4d4f18e531d9343c07eae971b48067dc23ebbc97332019877ba1ab81fb90dcc21450d29d3b3c1da089a43779693d2f0b8bdbb00619b"}, {0x0, 0xc, @sival_int=0x7, @thr={&(0x7f00000001c0)="3ef30f0f20ae26f2410fd6ce6566440febec463df3e20000dc9d00800000c483394bb0fcffffff02c461fc28b315c10000c4e19414c766410f381e8802f0ffff36f2420f1c02", &(0x7f0000000240)="d8e770837542b420cce9df55cb172b6f5377fd2a997e09bb57b5b9e5fde445cf8251ff971088c2355d78048009dca99c063b05b9507b7b3c5e435414749c414e024cfbb10198dc792547ba8c1eb35930b506b44723e4d808c0ff99ecb4"}}}, &(0x7f00000003c0)={0x1, 0x40000000000000}) 1.893090618s ago: executing program 2 (id=70): open$dir(0x0, 0x200, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0xa, 0x1, './file0\x00'}, 0xa) recvmsg(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000100)=""/242, 0xf2}], 0x1, 0x0}, 0x40) r1 = socket$unix(0x1, 0x2, 0x0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000000200)=@abs={0x8, 0x1, 0x0, 0x3}, 0x8) mlock(&(0x7f0000949000/0x1000)=nil, 0x1000) munlock(&(0x7f0000949000/0x2000)=nil, 0x2000) 1.528719778s ago: executing program 3 (id=74): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r1, 0x0, 0x40040) close(r0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x9, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x0, 0x8, 0xc, 0x8]}, {0x5c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0x0, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x6, 0x2, 0x58, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x6, 0x2, 0x800, 0x0, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0x80000001, 0x538, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x4, 0x1ff, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124442, 0x8, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x40, 0x225, 0x80, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x403, 0x8, 0x3, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x1, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0x10000, 0x4, 0x6, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0x2, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xfffffffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd1, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff5, 0x1, 0x3041, 0x8, 0x6f, 0x7, 0x7, 0x3, 0xfff, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xfffffff8, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc9, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x10000, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xe, 0x0, 0x2, 0x4, 0x400, 0x6, 0xfffffffc, 0xffffffff, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x4, 0x81, 0x8, 0x2, 0x4, 0x6, 0x1, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x7, 0x8, 0x1ff, 0x7ff, 0xa, 0x0, 0x1, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x6, 0x8, 0x1, 0x100, 0x8, 0x0, 0xdffb, 0xa, 0x0, 0x5, 0x4, 0x1a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xfffffffb]}, {0x6, [0x10, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x20000, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0x1000, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000004, 0x7, 0x7fff, 0x0, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x757, 0x14, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x7, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x8, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x280, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x8, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x4, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x401, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x0, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0x3, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x0, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x10009, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x2, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x8, 0xeb7, 0x7, 0x5, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0x10001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) munmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000) mprotect(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r3, &(0x7f00000005c0)={0x0, 0x0, &(0x7f00000004c0), 0x1000000000000089, &(0x7f0000000540)=""/89, 0x59}, 0x2) dup2(r2, r3) sendto$unix(r2, 0x0, 0x0, 0x0, 0x0, 0x0) kevent(0xffffffffffffffff, &(0x7f0000001d40)=[{0x3, 0xffffffffffffffff, 0x1}], 0x1, 0x0, 0x0, 0x0) aio_waitcomplete(0x0, &(0x7f0000001300)={0x7fffffff}) r4 = open$dir(0x0, 0x0, 0x0) symlinkat(&(0x7f00000005c0)='\x00', r4, 0x0) unlink(0x0) open(0x0, 0x200, 0x0) r5 = kqueue() kevent(r5, &(0x7f0000000080)=[{0x0, 0xfffffffffffffffb, 0x45, 0x1, 0x2ef5, 0x6}], 0x1005, 0x0, 0x37, 0x0) acct(&(0x7f0000000000)='./file0\x00') acct(0x0) kevent(r5, 0x0, 0x0, 0x0, 0x2, 0x0) 1.179392s ago: executing program 0 (id=75): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0x4b, 0x0, 0x0) setrlimit(0x9, &(0x7f0000000100)) socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) (async) kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x100000, 0x0) r3 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_mreqsrc(r3, 0x0, 0x46, &(0x7f0000000080)={@multicast1, @loopback, @local={0xac, 0x14, 0x0}}, 0xc) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) (async) r4 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r4, 0x29, 0x4, &(0x7f0000000000)=0x3, 0x4) (async) setsockopt$inet6_int(r4, 0x29, 0x4, &(0x7f0000000000)=0x3, 0x4) sendto$inet6(r4, &(0x7f00000004c0)="6a3364f80c04449d", 0x8, 0x20089, &(0x7f0000001280)={0x1c, 0x1c, 0x1, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) setsockopt$inet_mreqsrc(r3, 0x0, 0x46, &(0x7f0000000080)={@multicast1, @local={0xac, 0x14, 0x0}, @local={0xac, 0x14, 0x0}}, 0xc) (async) setsockopt$inet_mreqsrc(r3, 0x0, 0x46, &(0x7f0000000080)={@multicast1, @local={0xac, 0x14, 0x0}, @local={0xac, 0x14, 0x0}}, 0xc) syz_emit_ethernet(0x3e, &(0x7f0000000540)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @local={0xac, 0x14, 0x0}, @multicast1}, @icmp=@redirect={0x5, 0x3, 0x0, @remote={0xac, 0x14, 0x0}, {0x5, 0x4, 0x0, 0x1f, 0x6447, 0x64, 0x5, 0xfc, 0x36, 0xc43, @rand_addr=0x5, @rand_addr=0x8}}}}}}) socket(0x1c, 0x1, 0x0) (async) socket(0x1c, 0x1, 0x0) syz_emit_ethernet(0x59, &(0x7f0000001480)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x23, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @remote={0xfe, 0x80, '\x00', 0x0}, [{0x1, 0x1, '!\t\tb5Nd'}, {0x1}]}}}}}}) kqueue() fcntl$getflags(r3, 0x3) (async) fcntl$getflags(r3, 0x3) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x32, 0x0, 0x1030) sendmsg$unix(0xffffffffffffffff, &(0x7f0000002e40)={0x0, 0x0, 0x0}, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) (async) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) syz_emit_ethernet(0x22, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffff0000000000000800450004"]) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000f00)={0xfd7, [{0x3, [0x8, 0x6, 0x7, 0x6, 0x1, 0x0, 0xffffffff, 0x5, 0x80, 0x8, 0x500, 0x8001, 0x2000, 0x80000000, 0x7, 0x0, 0x6, 0x7, 0x2, 0x8, 0xfff, 0x10001, 0x1000, 0x8, 0x4d97, 0xff, 0x101, 0x3, 0x6, 0x304, 0x6, 0x2, 0xfffffff9, 0x7, 0x7, 0xff, 0x10000, 0x2, 0x5, 0x2, 0x1, 0x3, 0x6f, 0x22df, 0x401, 0x7fffffff, 0xa7, 0xc, 0x6, 0x4, 0x9d49, 0xb, 0x8001, 0x6, 0x2, 0x1, 0x7f, 0x2, 0x6, 0x80000000, 0x2, 0x96fc, 0x200, 0x0, 0xfffffc00, 0x8, 0x0, 0x1e780, 0x50, 0x8001, 0x4, 0x9, 0x7, 0xffffffff, 0xfffeffff, 0xee, 0x0, 0x8, 0x7fff, 0x0, 0x2, 0x5b23, 0x4, 0xffffffff, 0x1, 0xf05, 0x9, 0x1, 0x9, 0x80000001, 0x8, 0x9, 0x4, 0x7fffffff, 0x8000, 0x2, 0x8001, 0x8, 0x4, 0x3, 0x6, 0x80, 0xb3ab, 0x9]}, {0x4, [0x4, 0x3, 0x1, 0x3, 0x80000000, 0x4, 0x400, 0xeec, 0xf557, 0x8, 0x7fff, 0x8, 0x8, 0x401, 0xb, 0xa, 0xfad6, 0x8, 0x5, 0x6, 0x40, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0xc77e, 0x8, 0x81, 0xc9, 0xa4, 0xfffffff8, 0x2, 0x921, 0x7fffffff, 0x24, 0x2, 0x370c, 0xb00, 0x4, 0x52a, 0x8, 0x7, 0xff, 0x8, 0x4, 0x370a8713, 0x9, 0x6, 0x428, 0xfffffff8, 0x2, 0x7, 0x4, 0x0, 0x5, 0xffff, 0x81, 0x0, 0x8, 0x9, 0x0, 0x7, 0x3, 0x2, 0x2, 0xff, 0x1, 0x4, 0x3, 0x7, 0x2, 0x6, 0x3, 0xbb, 0xffff, 0x8, 0x4, 0x0, 0x9, 0x7, 0x703, 0x0, 0xfffffff9, 0x9, 0x6, 0x4, 0xb32, 0x4, 0x10, 0x9, 0x40, 0x3, 0x4, 0x91, 0x0, 0x0, 0x7fffffff, 0x8, 0x66f53e15, 0x1, 0x8000, 0x4]}, {0x1, [0x826, 0x1000, 0x9, 0xffff8001, 0x3, 0xffffff77, 0x6, 0x1, 0x7, 0x0, 0x9, 0x6621, 0x5, 0x1, 0x6, 0x0, 0x3, 0x44, 0x5, 0x7f, 0x2, 0x40, 0xe, 0x10001, 0x1, 0xfffffff7, 0x80, 0x6, 0x7, 0xe51, 0x1ff, 0x2, 0x2, 0xf8000000, 0x40, 0x0, 0x400, 0x10000, 0x7, 0x1, 0x8, 0xc03, 0x3, 0x2, 0x122, 0x7, 0xf, 0x7, 0x31c, 0xcbc0, 0x81, 0x0, 0xffffffff, 0xd08, 0x5, 0x7, 0x1, 0x2, 0x8, 0x6d, 0xff, 0x3b, 0x8, 0x8, 0x5834, 0x8, 0x7fff, 0x1, 0x4, 0x0, 0x5, 0x9, 0xaa, 0x0, 0xa, 0x4, 0x80000001, 0x400000, 0x4, 0x7fff, 0x0, 0xdc5, 0x6, 0x4, 0x8, 0x8001, 0x4, 0x9, 0x9, 0x7f, 0x3, 0xd5ca, 0x7, 0x7fff, 0x1, 0x2, 0x80, 0x1d12, 0x3, 0x0, 0xfffffffc, 0xe358, 0x200, 0x5]}, {0x0, [0xfffffff6, 0xb729, 0xa, 0x9, 0x2, 0x5, 0x9, 0x6, 0x40, 0x3fc3, 0x0, 0x3a, 0x72, 0x7ff3, 0x7, 0x2, 0xdcb, 0x81, 0x1, 0x7fffffff, 0x282d, 0x1ff, 0x10000000, 0x89, 0xffff0000, 0x7fff, 0x10, 0x2, 0x3, 0x4, 0xffffffff, 0xde, 0x3ff, 0x0, 0x6cd9, 0x101, 0x7, 0x1000, 0x2, 0x7f, 0x1, 0xe03, 0x7, 0x5, 0x3, 0x2, 0x1, 0x4, 0x1, 0x2, 0x7f, 0x8, 0xf, 0x9, 0x50, 0x5, 0x0, 0x0, 0x93, 0x1, 0x4, 0x2, 0x18, 0x7ff, 0xd, 0x4, 0x5, 0x7c8, 0x9, 0x9f, 0x7f2d, 0x8fa, 0x1, 0xfffffff9, 0x9a9d, 0x5, 0x6, 0x8, 0x2e, 0x6, 0x1, 0x7f, 0x8, 0x5, 0x0, 0x0, 0x2, 0x40, 0x9, 0x7, 0xd5e, 0x1, 0x1ff, 0x7, 0x3ff, 0x10c, 0x7fff, 0x2, 0x7, 0x7, 0x1, 0x6, 0x6, 0x38]}, {0x1ff, [0x2, 0x0, 0x2, 0x2, 0x3e, 0xe, 0x401, 0xb, 0x0, 0x31, 0xad6b, 0x0, 0x5, 0x1ff, 0x3b, 0x9, 0xd, 0x1, 0x574b, 0x9, 0x5, 0xfffffff7, 0x9, 0x3, 0x7, 0x6, 0xa41, 0x6, 0x7, 0x1, 0x3, 0xa, 0xfffffffb, 0x2, 0x5, 0xe0000000, 0x3, 0x80000000, 0x8001, 0xfffffff9, 0x3, 0x2, 0x553, 0x40, 0x6f4, 0x0, 0x6, 0xd, 0x7, 0x2, 0x2, 0x8, 0x100, 0xd, 0x7, 0xfffffff6, 0xc3, 0x7, 0x8, 0x9, 0x0, 0x2000, 0x3ae, 0x40000000, 0x4, 0xc08, 0x8, 0xffffffc0, 0x9, 0x10001, 0x10001, 0x0, 0x3, 0x200, 0x5, 0x5, 0x8, 0x3, 0x1, 0x3, 0x2, 0x5, 0x7186b6e1, 0x7, 0x4, 0x10, 0x8, 0x7, 0xffffffff, 0xffffffff, 0x85f5, 0x0, 0x1, 0x800, 0x5, 0x5, 0x5, 0x80000001, 0x5, 0x8000, 0x3, 0xffffffff, 0x8, 0x1ff]}, {0x7db, [0x5, 0x7, 0x7, 0x9, 0x2, 0x6, 0x80000000, 0xffffffff, 0x6, 0x4, 0x6, 0x67d7, 0x8, 0x10001, 0xfffffffa, 0x2, 0x4, 0x6, 0xfffffe01, 0x8, 0xffffff93, 0x3, 0xa37, 0x3ff, 0x8, 0x7c8, 0x5, 0x101, 0x8, 0x2, 0x1000, 0x0, 0x3ff, 0x1, 0x3, 0x6, 0x1f64d413, 0x5, 0x1, 0xfffffffc, 0xedf, 0x2, 0xc, 0x2, 0x8, 0x0, 0x7, 0x9, 0x149, 0x5, 0x2, 0x5, 0x7fff, 0x0, 0x70, 0x4, 0x2, 0x2, 0x5, 0xba38, 0x2, 0x7, 0x2, 0xfffffffa, 0x2, 0x2, 0x9, 0xdd, 0xff, 0x3, 0x401, 0x200, 0x0, 0x9ad, 0x6, 0x91dc, 0x7fffffff, 0x6, 0xf0ff, 0x4, 0x7, 0xff8, 0x8001, 0x0, 0x10000, 0xe, 0x5, 0x1800, 0x622, 0x7fffffff, 0x2e, 0x4, 0x4, 0x2, 0x5, 0x0, 0xe, 0xffffffff, 0xfffffff7, 0x6, 0x7f, 0x20d4, 0x3, 0x401]}, {0xdb6d, [0x8, 0x1, 0xffff8001, 0x6, 0x9, 0x0, 0x2, 0x6, 0xfffffff2, 0x7f, 0x8, 0x8, 0x7, 0xfffff755, 0x6, 0x9, 0x4, 0x5, 0x50f, 0x100, 0x6, 0x5, 0x3, 0x9e3, 0x7, 0xfff, 0x4, 0x7, 0x9, 0x8, 0x2, 0x0, 0xb4d, 0x2, 0x200, 0x4, 0x5, 0x9, 0x7df, 0x2, 0x7ff, 0x7, 0x1196, 0x2, 0x1afa, 0x7, 0xf, 0x80000001, 0x8, 0x4, 0x3, 0x1, 0x5, 0x2, 0x4, 0x9, 0x462, 0xf1, 0xffffffca, 0xad58, 0x66d, 0x7, 0x1, 0x1e, 0x5, 0x2, 0x0, 0x0, 0x5, 0x0, 0xfa, 0x701, 0x81, 0xea2, 0x3, 0x7ff, 0x8, 0xb11, 0x3, 0x1000, 0x2, 0x400, 0x1ff, 0x6, 0x101, 0x6, 0xfffffffe, 0x5, 0x1, 0x81, 0x5, 0x3ff, 0x8, 0x4, 0x4, 0x2, 0x4, 0xfffffff9, 0xf, 0x573, 0xb, 0x6, 0x5, 0x7]}, {0x0, [0x6, 0x55f, 0x7fff, 0xad3, 0x4, 0x0, 0x0, 0x6b, 0x9, 0x101, 0x8, 0x3ff, 0x5, 0x40, 0x8, 0x8, 0x9, 0x0, 0x5, 0x0, 0x3, 0x81, 0xfffffffa, 0x9, 0x401, 0xda, 0x6, 0xfffffff7, 0x200, 0x2, 0xb, 0x1, 0x3, 0x2, 0xd7, 0x0, 0x805, 0xffffffff, 0x40, 0x1, 0xd, 0x8001, 0x0, 0xaca, 0x3, 0xff, 0x5c, 0x100, 0x10000, 0x1, 0xffffffff, 0xffff, 0x40, 0x0, 0x914, 0x8, 0x7, 0x8, 0x6, 0x5, 0xa0, 0x231, 0xffff, 0xf1a, 0x100, 0x6, 0x4, 0x7fffffff, 0xc, 0x9, 0x7fff, 0x101, 0x8000, 0x0, 0x3, 0x4, 0x9, 0xffffffff, 0x4, 0x10000, 0x0, 0x4, 0x6, 0xe45, 0x1, 0xd, 0xd7, 0x8000, 0xfffffff7, 0x6, 0x5, 0x200, 0x4, 0x5, 0x7, 0x5, 0x81, 0x8, 0x0, 0x6, 0x4, 0x8, 0xb4f, 0x9]}, {0x3, [0xfffffff5, 0x4, 0x9, 0x401, 0xd97, 0x80000001, 0x0, 0x470, 0x1, 0x6, 0x2, 0x4, 0x2f6229ce, 0x2, 0xa, 0x8, 0x3, 0x4, 0x34, 0x9, 0x0, 0x5e, 0x7fffffff, 0xd2df, 0x54, 0x8, 0x6, 0x7ff, 0x5, 0x3, 0x6, 0x0, 0xffffffff, 0xffffffff, 0x3, 0x80000000, 0x9, 0x2, 0x18, 0x8, 0xff, 0x5, 0x9, 0x4, 0xfdb, 0x0, 0x6, 0x0, 0x6, 0x8, 0x2, 0x400, 0x8, 0x0, 0x8, 0x1, 0x401, 0x2400, 0x1, 0x5, 0x7f, 0x7ff, 0x80, 0x1ff, 0x70c, 0x9, 0x4, 0xb9, 0x1d3, 0x7fff, 0x2, 0xd74b, 0x1000, 0x8000, 0xff, 0x6, 0x10, 0xfff, 0x9, 0x1fe0, 0x5, 0x0, 0xffffff80, 0x0, 0xfd9, 0x1000, 0x6, 0xcb4, 0x7b9, 0x6, 0x8b, 0x9, 0x4, 0x8, 0xfffffff7, 0x80000000, 0x80000000, 0x7f, 0x800, 0x2, 0x1, 0x1, 0x6, 0x7]}, {0x1, [0x2, 0x6, 0x5, 0x3ff, 0x9, 0x9, 0xfffffff6, 0x3, 0xfffffffd, 0x10000, 0xfffffe01, 0xfffffff7, 0xfffffffc, 0x7fff, 0xffffffb9, 0x32c, 0x9, 0x1, 0x50dc, 0x6, 0x8, 0x8, 0x2e, 0x8a05, 0x7, 0x3, 0xb, 0x1, 0xffff3c32, 0x8001, 0x2, 0xc3e0, 0x2, 0x6e31, 0x3, 0x2, 0x4, 0x8, 0x4, 0xd6, 0xfffffff9, 0x9, 0x9fc, 0x6, 0x81, 0xffffffc0, 0xc2ee, 0x6cb, 0x3, 0x35, 0x68, 0x6, 0xe28a, 0x7, 0xff, 0x8, 0x8, 0x1, 0x9f, 0x6, 0x8, 0x2, 0x4, 0xa4, 0x8, 0x7fff, 0x1, 0xfffff001, 0x0, 0x9, 0xa, 0x274, 0x9, 0x5, 0x9a, 0x9c99, 0x81, 0xc, 0x18, 0x7, 0x0, 0x8, 0x10, 0x7, 0x6, 0x8, 0xff, 0x6, 0x7, 0x4, 0x8, 0x2, 0xaa37, 0x8, 0x5, 0x8, 0x1f, 0x4, 0x2, 0x1, 0xd, 0x1, 0xb9, 0x4]}, {0x0, [0x0, 0x5, 0x1, 0xe, 0x8000, 0x3, 0xafc, 0x401, 0x6, 0x8, 0x0, 0x8fa, 0x7f, 0xfffffff6, 0x120000, 0xff, 0xb4, 0xc, 0x6, 0x7ff, 0x5, 0x100, 0x10001, 0x3, 0x9, 0x101, 0xffffffff, 0xc, 0x8001, 0xc, 0x5, 0xa227, 0x5, 0x3ff, 0x1, 0x4, 0x1, 0x8, 0x2277, 0x7, 0xe9, 0x3, 0x1, 0x0, 0x2000, 0x8, 0x6, 0x1, 0x3, 0x3, 0x8, 0x5, 0x400, 0xaec, 0xfffffff7, 0x8c86, 0x9, 0x3, 0x8, 0x8, 0xe, 0xa, 0x3, 0x40, 0x10000, 0x1, 0x46, 0x1, 0x82, 0x5, 0x5, 0x7, 0x184, 0xc3f2, 0xfffffffb, 0x8, 0x3, 0x5, 0xfffffff8, 0x0, 0xa436, 0x81, 0x4, 0x6, 0x7, 0x0, 0x0, 0x3b9, 0xb81a, 0x7, 0x1, 0x3, 0xffffffff, 0x8, 0xe, 0xffffa46a, 0x7fff, 0x0, 0x2, 0x201, 0x4, 0x1, 0x436f95d4, 0x1]}, {0x5, [0x0, 0xffffffff, 0x0, 0x5, 0x7, 0x2, 0x2, 0x7ff, 0x438, 0x2, 0x83, 0x4, 0x8, 0x10001, 0x5e54, 0x4, 0xd, 0x8, 0x4b, 0x3, 0x9, 0x7000000, 0x3, 0x8, 0x1, 0x10001, 0xf39a, 0x17, 0x5, 0xd94f, 0x87a9f2b, 0x4, 0x8, 0x9, 0x6, 0x4, 0x7, 0x4, 0x2, 0x10000, 0x8, 0x4e2, 0x10, 0x0, 0xd, 0x9, 0x0, 0x1, 0x4, 0xda, 0x28, 0x10001, 0x29, 0xff, 0x7, 0x61a, 0x3, 0x6, 0x5, 0x0, 0x3, 0x6, 0x7ff, 0x3b0, 0x8, 0x3, 0x2, 0x0, 0xc34c, 0xd, 0xe1, 0x5, 0x6, 0x6, 0x8001, 0x3, 0x4, 0x8, 0x69e, 0x4, 0xd, 0x0, 0x3, 0x2, 0x4, 0x0, 0x7fffffff, 0x5, 0x4, 0x5, 0x3, 0x5, 0x2, 0x88, 0x81, 0x6, 0x10001, 0x8, 0x7f, 0x200, 0x0, 0x3, 0x4, 0x8]}, {0x4000000, [0x80, 0x9, 0x4af, 0x4, 0x2, 0x2, 0x6, 0x7, 0xff, 0x10001, 0x7, 0x2, 0x3, 0x3, 0x9eca, 0xc9, 0x9, 0xff, 0x7f, 0xfffffff8, 0xa250, 0x6, 0x92, 0xfffff989, 0x3, 0x5, 0x1, 0x4, 0x3, 0x94, 0x1, 0xfffffff9, 0x800, 0x9, 0x2, 0xf8, 0xcca, 0xffffff01, 0x5c, 0x2, 0x10, 0x4, 0xd, 0x15f5, 0x9, 0x7f, 0x5, 0xfffffffa, 0x2, 0xe0000000, 0x8001, 0x9, 0x1, 0x8, 0xc327, 0xfffffffe, 0xea, 0x9, 0x9, 0x8000, 0x2, 0x8000, 0x8, 0x3ff, 0x5, 0x4, 0x5, 0x81d2, 0x4, 0x6, 0x40, 0x9a, 0x5, 0x0, 0x7ff, 0x6, 0x1, 0x718f, 0x3, 0x6, 0x3, 0x4, 0x8, 0x8001, 0x200, 0x802e, 0x2, 0x5, 0x10000, 0x8, 0x101, 0x1, 0xd, 0x9, 0x0, 0x0, 0x7, 0x3, 0xf57a, 0x1ff, 0xff, 0x1, 0x12a, 0x9]}, {0x6, [0x5, 0xfffffc01, 0x6366, 0xf, 0x4, 0x432, 0x3, 0xba6c0000, 0x0, 0x7, 0x4c000000, 0x3, 0x0, 0x3ff, 0x2, 0x4, 0xcc39, 0x473, 0x3, 0x6, 0x3, 0xb, 0x6, 0x0, 0x7ff, 0x6d0, 0x187e9fac, 0x7, 0x18, 0x3, 0x1, 0x2, 0xfffffffb, 0x1, 0x6, 0x4, 0x5, 0x4, 0x8, 0x88, 0x0, 0x80000000, 0xb, 0x4, 0x9, 0x3ff, 0x7, 0xd8b, 0x502e, 0x7, 0x7, 0x4, 0x6, 0xffffffff, 0x8, 0x1, 0x1ff, 0x97f, 0x310, 0x3, 0xcc0, 0x5, 0x169a, 0x10000, 0x43ad4fa3, 0x2, 0x9, 0x6, 0x401, 0xf, 0xffffff7f, 0x4b8a, 0x8, 0x7, 0x8ca9, 0x3, 0x9, 0xd7, 0x374, 0x8, 0x5, 0x4, 0x3, 0x5, 0x7fff, 0x7, 0x800, 0x0, 0x4, 0x10001, 0x80000001, 0x7fff, 0x7, 0xc9, 0x800, 0x9, 0x80, 0x8, 0xd2, 0x2, 0x1, 0x0, 0x8330, 0x9]}, {0x200, [0x784e2393, 0x4, 0x6, 0x9, 0xedf, 0x1, 0x3, 0x101, 0x9, 0x0, 0x101, 0x10, 0xf, 0x1, 0xc5, 0xa588, 0x0, 0xe, 0x6, 0x2, 0x0, 0x8, 0xe, 0xa, 0x8, 0x2, 0x7e, 0x0, 0x6, 0x80000000, 0x77, 0x2, 0x1000, 0x199, 0x2, 0xbf63e0, 0x0, 0xc6, 0x0, 0x400, 0x2, 0x140, 0x5, 0x6, 0x0, 0x9, 0xc7, 0x3c, 0xffffffff, 0x0, 0x5, 0x0, 0x8, 0x3, 0x2, 0x3486238e, 0x0, 0x7, 0xffffffff, 0xd93, 0x6, 0x2, 0x8, 0xfb6, 0x7, 0x5, 0x2, 0x1, 0x1, 0x80000001, 0x9, 0xc, 0x3, 0x8, 0xd6b, 0x36, 0x6, 0xb8, 0x0, 0x9, 0xc, 0x0, 0x7, 0x6, 0x69e1, 0x100, 0x4, 0xfe, 0x4800000, 0x612, 0xfffffff8, 0xbe1, 0xe, 0xffffff7f, 0x5a8, 0x8001, 0x4e8a095, 0x6, 0x9, 0xffffffff, 0x3, 0xbbe, 0x5, 0x50]}]}) posix_fallocate(r2, 0x68, 0x5) (async) posix_fallocate(r2, 0x68, 0x5) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) thr_new(&(0x7f0000001440)={0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, [0x3, 0x3, 0xc5a8]}, 0x68) r5 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r5, 0x29, 0xc, &(0x7f0000000000)=ANY=[], 0x18) 1.088987884s ago: executing program 0 (id=76): syz_emit_ethernet(0x2e, &(0x7f0000001bc0)={@random="9f4c4662c957", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x68, 0x0, 0x1, 0x2, 0x0, @rand_addr=0x7, @multicast2}, @icmp=@generic={0x11, 0x8, 0x0, "e00000012e000000"}}}}}) 1.088467482s ago: executing program 0 (id=77): socket$inet6_sctp(0x1c, 0x1, 0x84) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000300)={0x1, 0xaf36}, 0xc) sendmsg$inet6_sctp(r0, &(0x7f0000000740)={&(0x7f0000000380)=@in6={0x1c, 0x1c, 0x2, 0x87, @local={0xfe, 0x80, '\x00', 0x0}, 0x10}, 0x1c, &(0x7f0000000680)=[{&(0x7f00000003c0)="8cd9b8", 0x3}], 0x1, 0x0, 0x0, 0x108}, 0x20003) ktrace(&(0x7f0000000200)='./file0\x00', 0x4, 0xd27d43220c7df9b, 0x0) open(0x0, 0x710, 0x0) mount(0x0, 0x0, 0x374bf11b86eb833a, &(0x7f00000001c0)) connect$inet6(0xffffffffffffffff, 0x0, 0x0) socket$inet6_sctp(0x1c, 0x5, 0x84) kqueue() setsockopt$inet_MCAST_LEAVE_GROUP(0xffffffffffffffff, 0x0, 0x51, &(0x7f0000000500)={0x18b, {{0x10, 0x2, 0x1, @multicast2}}}, 0x84) kevent(0xffffffffffffffff, &(0x7f0000000040), 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) bind$inet6(r1, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) __semctl$IPC_STAT(0x0, 0x0, 0x2, &(0x7f0000001000)=0x0) syz_emit_ethernet(0x2e, &(0x7f0000000000)={@local, @empty, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=0xfffffffc, @multicast1, {[@rr={0x7, 0x3, 0x7}]}}, @udp={{0x1, 0x3, 0x1}}}}}}) syz_emit_ethernet(0x2a, &(0x7f0000000240)=ANY=[@ANYBLOB="ffffffffffff10000000000008060001080006040001aaaaaaaaaabbac140344"]) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x802d, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x8001, 0x0) rfork(0x86020) 1.087602876s ago: executing program 0 (id=78): symlink(&(0x7f0000000400)='./file2aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000000c0)='./file2aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') chflags(&(0x7f0000000080)='./file0\x00', 0x4) mkdirat(0xffffffffffffff9c, &(0x7f0000001940)='./file2aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async) mkdirat(0xffffffffffffff9c, &(0x7f0000001940)='./file2aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f00000003c0)={'rack\x00'}, 0x24) execve(0x0, &(0x7f00000001c0), 0x0) socket$inet6(0x1c, 0x2, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) (async) socket$inet6_udp(0x1c, 0x2, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000440)=[{0x4d, 0xfffffffffffffffe, 0xc0, 0x4, 0x0, 0x8, [0x1, 0x0, 0x8, 0x2]}], 0x1, 0x0, 0x0, 0x0) freebsd11_kevent(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x6a81, 0x0, 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) (async) r2 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x50, &(0x7f0000000380)={0x6, {{0x1c, 0x1c, 0x1, 0x0, @mcast1}}}, 0x88) (async) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x50, &(0x7f0000000380)={0x6, {{0x1c, 0x1c, 0x1, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}}, 0x108) (async) setsockopt$inet6_group_source_req(r2, 0x29, 0x54, &(0x7f00000004c0)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}}, 0x108) setsockopt$inet6_group_source_req(r2, 0x29, 0x55, &(0x7f0000000180)={0x6, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}, {{0x1c, 0x1c, 0x2, 0x0, @mcast1}}}, 0x108) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f0000000040)={0x17, 0x24, 0x8, &(0x7f0000000100)="3c022e61792eecb0", 0x0, 0x0, 0x1, 0xfdffffff, [0x0, 0x4]}) sendmsg$inet_sctp(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)=@in6={0x1c, 0x1c, 0x3, 0x7, @loopback, 0x6}, 0x1c, 0x0}, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x8000, 0x0) socketpair(0x1c, 0x10000000, 0x1, &(0x7f00000002c0)) (async) socketpair(0x1c, 0x10000000, 0x1, &(0x7f00000002c0)={0xffffffffffffffff}) getpeername$unix(r4, &(0x7f0000000300)=@abs={0x8}, &(0x7f0000000340)=0x8) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x1) (async) freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x1) cpuset_setdomain(0x0, 0x0, 0x0, 0x8, &(0x7f0000000000), 0x1) (async) cpuset_setdomain(0x0, 0x0, 0x0, 0x8, &(0x7f0000000000), 0x1) r5 = socket$inet6(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_PKTINFO(r5, 0x29, 0x2e, &(0x7f0000000240)={@empty}, 0x14) sigaction(0x14, &(0x7f0000000000)={0x0, 0x1f, {[0x0, 0x0, 0x80000001, 0xc]}}, 0x0) (async) sigaction(0x14, &(0x7f0000000000)={0x0, 0x1f, {[0x0, 0x0, 0x80000001, 0xc]}}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) (async) socket$inet_udplite(0x2, 0x2, 0x88) 1.038868125s ago: executing program 0 (id=79): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f00000003c0)="3884bafed0fac8e8dd131d7f1633e60795db358c2cb7b9b22e2c4dd89eea3e338e", 0x21, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0x31, &(0x7f0000000000)=ANY=[@ANYRES16], 0x1010) setsockopt$sock_splice(r2, 0xffff, 0x1023, &(0x7f0000000040)={r2, 0x100000003, {0x9, 0x8}}, 0x20) r3 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, 0x0, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN(r3, 0x6, 0x469, &(0x7f0000000040)={0x6, "50afe2c27f64c6559500ab4a3cff00"}, 0x14) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = openat$crypto(0xffffffffffffff9c, &(0x7f00000002c0), 0x8000, 0x0) ioctl$CIOCGSESSION2(r5, 0xc040636a, &(0x7f00000000c0)={0x17, 0x1e, 0x20, &(0x7f00000001c0)="0000ac4103f48e8d7b066db952c14a4908afe5de0300000000000000743c7eaa", 0x0, 0x0, 0x1000, 0x7d86699a, [0x0, 0x9, 0x7f]}) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r4, 0x6, 0x27, &(0x7f0000000040)={&(0x7f0000000080)="00b2c06df480cfe19f0da47ac0235414", 0x0, &(0x7f00000000c0)="d7", 0xb, 0x10, 0x0, 0x7, 0x1, 0x0, 0x3, 0x3, "716cffffffffffff"}, 0x40) sendmsg$unix(r4, &(0x7f0000000240)={&(0x7f0000000100)=@file={0x13, 0x0, './file0/file0/..\x00'}, 0xfffffffffffffee9, &(0x7f0000000200)=[{&(0x7f0000000380)}], 0x1, &(0x7f0000000480)=ANY=[@ANYRES16=r3, @ANYRES16=r2, @ANYRES64=r2, @ANYRESHEX=r1, @ANYRESOCT=r0, @ANYRESHEX=r3, @ANYRESOCT=0x0, @ANYRESDEC=0x0, @ANYRES32=r5], 0xe0}, 0x20080) openat$md(0xffffffffffffff9c, &(0x7f0000000300), 0x200, 0x0) r6 = kqueue() kevent(r6, &(0x7f0000000380)=[{0xc8, 0xffffffffffffffff, 0x4007, 0x8, 0x0, 0x0, [0x3]}], 0x1, 0x0, 0x0, 0x0) r7 = kqueue() kevent(r7, &(0x7f0000000000), 0x10000, 0x0, 0xfc, 0x0) rfork(0x3060) socket$inet6_sctp(0x1c, 0x0, 0x84) r8 = open$dir(&(0x7f0000000280)='./file0/file0/..\x00', 0x40000, 0x100) openat(r8, &(0x7f0000000340)='./file0\x00', 0x400000, 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) chroot(&(0x7f0000000080)='./file0/file0/..\x00') rmdir(&(0x7f0000000140)='./file0/file0/..\x00') recvmsg(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/32, 0x20}, {0x0, 0x37}, {0x0}], 0x3, 0x0}, 0x0) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) mincore(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) munmap(&(0x7f0000001000/0x3000)=nil, 0x3000) 959.093818ms ago: executing program 2 (id=80): procctl$PROC_REAP_ACQUIRE(0x0, 0x0, 0x2, 0x0) procctl$PROC_REAP_ACQUIRE(0x0, 0x0, 0x2, 0x0) 945.47126ms ago: executing program 2 (id=82): mkdir(&(0x7f00000001c0)='./file1\x00', 0x0) r0 = open$dir(&(0x7f0000000300)='.\x00', 0x10, 0x4a) setgid(0xffffffffffffffff) setgroups(0x0, 0x0) fchmod(r0, 0xf3) setuid(0xffffffffffffffff) openat$bpf(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)='./file0\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x26, 0x2, 0x0) bind(r1, &(0x7f0000000040)=@in6={0x22, 0x1c, 0x3, 0x0, @mcast1}, 0xc) r2 = socket(0x26, 0x2, 0x0) bind(r2, &(0x7f0000000040)=@in6={0x22, 0x1c, 0x3, 0x0, @mcast1}, 0xc) 848.908151ms ago: executing program 2 (id=83): r0 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x8) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) mkdirat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0) ioctl$KDSETLED(0xffffffffffffffff, 0x20044b42) socket$inet6_sctp(0x1c, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, 0x0, 0x8) r2 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r2, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) bind$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto(r2, &(0x7f0000000300)="bd799e87c4f3fbb70e031a32e847ecd8618fd7559b8eb014271f3e8c45a0dfb1913f63cd5268c2fe02e551b59199d8cbe384e79af9db31a9d2b799825a948d555d06b1", 0x43, 0x4, &(0x7f0000000380)=@in6={0x1c, 0x1c, 0x3, 0x400, @empty, 0xff}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f00000001c0)={'bbr\x00', 0x1}, 0x24) connect$inet6(r2, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0x1000000}, 0x1c) ppoll(&(0x7f0000000000)=[{r2, 0x188}, {r2}, {0xffffffffffffffff, 0x4}], 0x3, 0x0, 0x0, 0x0) sendto$inet(r2, &(0x7f0000000200)="0e", 0xff66, 0x0, 0x0, 0x0) cpuset(&(0x7f0000000280)) r3 = msgget$private(0x0, 0x20) msgsnd(r3, &(0x7f0000000580)=ANY=[@ANYBLOB="0300000000000000c5e94674dbd3604cde5c3557da6461341b1f80b87c9e9c0a41a1995000000100000000002b3895e0140869a1845fe194ac26f999f83cbdb241ab396b30c0d5d524ba717d8e5c5e2f873559783e450b4d87abe348cb20ebf83ab0ce789d687b03d617130b6a3e0bf33ecadaf63e98edbca150cb3de62df94a1f79cc369b90ec5facaa60d5ca5a4ded1918d96acaea78f5f7951089753cb55a6af68c2b946892077b0a8638debf61b65a6c8afb148b9fdf67be3d2e54590795cd2d00a13d86a58397e4da069add2e957d8a46d7ca639f510dae9b9b82d818"], 0x6d, 0x0) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000001c0)) r4 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x80000, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r4, 0xfff) acct(&(0x7f00000000c0)='./file0\x00') 728.932084ms ago: executing program 1 (id=84): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) ioctl$DIOCGETSTATES(r0, 0xc0104419, &(0x7f0000000040)="0139ccb54b3dd2f0122d1d19d149e27235cc1f29561118032c1f3719b95da2b08fb236004cd85ec94d52d031f02d99eb2761568a09ce14fc") syz_emit_ethernet(0x2a, &(0x7f0000000680)=ANY=[@ANYBLOB="ffffffffff79000000000000695287db08004500001cb438463300019078ac1400bbe0000001fa009078", @ANYRESOCT=r0]) r1 = kqueue() clock_settime(0x0, &(0x7f0000000000)) clock_settime(0x4, &(0x7f0000000280)={0xca9a3c, 0xd}) kevent(r1, &(0x7f0000000040)=[{0x100000000, 0xfffffffffffffff5, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0x8000, 0x1000, 0x9]}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x2, 0x6) syz_emit_ethernet(0x46, &(0x7f0000000600)=ANY=[@ANYBLOB="fffffffffffb000000000046080045000038000000000001f8ffffffffffffff000103059078000000044673000a006708000614000900000000e000000188020000e095c496"]) setsockopt$sock_int(r2, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) kqueue() aio_error(&(0x7f0000000880)={r1, 0x9, &(0x7f00000002c0)="e760e92f7061c6475bea2ac3c793327e42aee189a63ad97d1e55df6ccacd1c1bac82f5d8d1d16a15e9104689b3999e6153518d92850f297d9e88f0ff7a87c66292229738614134bdea27abb2c61943a2d4d7264fade3b134e51237a9564bf5c218041e1825d865b05fc7042b35c782d4626c7e1565da05159187a53ac11014cb59a52c577d819ff65485c6c784ffa71d8466b83d81263e", 0x97, [0x24000, 0x7], 0x3, 0x4, 0xfffffff9, {0x6, 0x100000000, &(0x7f0000000380)="e880ea439ca143cca054c6be5dbd53d65d4d7151f037659844ed2ca10adedb8494375dd374aa2d72fd97498ae097b685db70ea8a3a6d67bf824184e32e712dd8c7a0bf1aa2f195e9c69706f1b296d266af9992815135a1f40de5b50ae95232801d4e5dfab3d915cca8b386ed445f0c0c98623580f90412b3b7c5b8b04b9b27df99c6336751bdd21bc7dbb7e75040099d53eb06abbe9d4760265f0bd89d74585eedad520a62a288bdabbac2c4b1718fe69a9a38"}, {0x3, 0xe, @sival_int=0x100}}) open(0x0, 0x0, 0xe) bind$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_DSTOPTS(r2, 0x29, 0x32, &(0x7f0000000440)=ANY=[@ANYBLOB="4b000000000000005e14d27daba95365cc2179b5f237b45fb12598ba7f8b5b200b3e12d76a6d3773d5fbd65351bc8844f7d4631a89c3408ba69c2453ef3b5c645fc3419d6753bf1fc5c1ccca4ed96f648830b59be65b4b369b4bc17950742291345ffe96923fb5087eb9"], 0x8) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@local, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x48, 0x3a, 0x0, @rand_addr="3bcc2629a17a6c58afb8877c8be162e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x11, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, [@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}) 728.607176ms ago: executing program 1 (id=85): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r0, 0x6, 0x27, &(0x7f0000000680)={&(0x7f0000000100)="ddcc48a72777e18b9f0da47ac02354145c39f763e2823cef467d50b9eba90215fea101c8fb1adb0f443c53fc9ee6e34258", 0x0, &(0x7f0000000180)="0000d2ae0355c3481e328856bd59dad6a5a0", 0x29, 0x10, 0xfffffffffffffd8a, 0x0, 0xfe89, 0x0, 0x3, 0x3, "000004f9910700"}, 0x38) freebsd11_mknod(&(0x7f0000000080)='./file1\x00', 0x1000, 0x0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0x0, 0x185, &(0x7f0000000280)={0x10, 0x2, 0x1, @local={0xac, 0x14, 0x0}}, 0x10) r2 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x26, &(0x7f0000000000)={0x0, 0xe}, &(0x7f0000000040)=0x8) setsockopt$inet6_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x26, &(0x7f0000000140)={r3, 0x1}, 0x8) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @remote, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x12, 0x3c, 0x0, 0x0, 0x0, 0x1, 0x0, @local={0xac, 0x14, 0x0}, @multicast1, {[@generic={0x82, 0xf, "c2519f21a4b2125b7e9f091b61"}, @rr={0x7, 0x3, 0x4}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x3, 0x2, 0x7ff, 0x4, 0xfffffffc}}}}}) readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000180)=""/50, 0x32}], 0x1) open$dir(&(0x7f0000000180)='./file1\x00', 0x10000, 0x80) open(&(0x7f0000000180)='./file1\x00', 0x1, 0xc2) 716.35024ms ago: executing program 3 (id=86): ktimer_create(0x0, 0x0, &(0x7f0000000140)) fork() r0 = open(&(0x7f0000000040)='./file0\x00', 0x18289, 0x110) getsockname$unix(r0, 0x0, &(0x7f0000000100)) r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000003000/0x1000)=nil) munmap(&(0x7f00008b2000/0x1000)=nil, 0x1000) r2 = shmat(r1, &(0x7f00008f3000/0x1000)=nil, 0x7000) r3 = shmget$private(0x0, 0x11000, 0x0, &(0x7f0000fec000/0x11000)=nil) shmat(r3, &(0x7f0000fed000/0x4000)=nil, 0x7000) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) r4 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_int(r4, 0xffff, 0x100, &(0x7f0000000000), &(0x7f00000000c0)=0x4) shmdt(r2) copy_file_range(r0, &(0x7f0000000080)=0x5, r0, &(0x7f00000000c0)=0xffffffffffff2aff, 0x4, 0x0) mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) munlockall() socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x12, 0x1c, 0x2, 0x0, 0x0, 0x1a, 0x0, @local={0xac, 0x14, 0x0}}, @icmp=@info_reply={0x10, 0x0, 0x0, 0xfff, 0x1d}}}}}) 588.83815ms ago: executing program 1 (id=87): setuid(0xffffffffffffffff) r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_int(r0, 0x0, 0x18, 0x0, 0x0) r1 = semget(0x2, 0x2, 0x151) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000089000/0x3000)=nil, 0x3000, 0x1, 0x10, r2, 0x800b) pwritev(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)="b77dfa31850205838c06da6706ebd7695f81a58c6742aebbf97d51db8b881216de00c41b934c9c646a0100f0c2bc2694ff3d953882b698ecf781e5cd6fbd08a00151f7696fc4435ee2fff12984cf22b123927a30c636980e75bc921da3ca4a3cba65c2834b9c240acfc0c440342a0912109cebd24825f22dc2037f62", 0x7c}, {&(0x7f0000000280)}, {&(0x7f00000004c0)="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", 0x439}], 0x3, 0xed5) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1001, 0x0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r3, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000380), 0x10000, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f00000000c0)={0x16, 0x0, 0x20, &(0x7f0000000100)="0b6fac4103e7a00d4689e808d0d4755aedaacdd4743c7eaa2c7300d05fe86026", 0xfda0, 0x0, 0x0, 0x7d86699a}) ioctl$CIOCCRYPT(r4, 0xc0306367, &(0x7f0000000640)={0x0, 0x2, 0x0, 0x60, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000140)}) rfork(0x83000) writev(r2, &(0x7f0000000440)=[{&(0x7f0000000300)="31a3f30459b9fbeeffba8e71746986a2bc", 0x11}, {&(0x7f0000000340)="187f622ffc178a1f14bd7db0a8f9c0da59fd14f4f1b303247b0b4137282092aa03f6a74f2dfe388019f7745e46581aa410cd9db3702e25751633f2911ed6ea2d33459653d171abd2693e1e650728164c7ef55afa123c6e356868619889a00c21de8188fb0a37f3b453a6a151b2b4681b3e20c35fabc77e4fb13253c9fe4c9110a334677adf6178a20890cec9a78bb05e75ad56efa00ab31f85017a7a8f15518f81730772e9594e3fb6a3a7f5aae0e558952948a6f741a33accbf61029046811d3122a1bdc23ec8faf1ddd629f6a67e32235fcc97462296ca14b28fee016af90262", 0xe1}, {&(0x7f0000000b00)="86e970ad397a39d120bb5cd160206da011ff0f71b85a8f9a583bae1e6290cb7579547dd0fa76b5c1a87a59c36ac06945d2c009623aea4fed7a94a20b6b6d863e94c64fd253d8589fa891", 0x4a}], 0x3) freebsd11_fstatfs(r2, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) setreuid(0xee00, r5) freebsd11_lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = geteuid() getgroups(0x1, &(0x7f00000002c0)=[0x0]) __semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000840)=&(0x7f0000000800)={{r5, r6, r7, r8, 0x0, 0x7, 0x0, 0x37e0b346}, 0x5, 0x40, 0x0, 0x0, 0x4, 0x6}) setuid(r7) clock_gettime(0x1, &(0x7f0000000380)) r9 = open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) extattr_set_fd(r9, 0x1, &(0x7f0000000040)=':$&{\x00', 0x0, 0x0) ioctl$DIOCIGETIFACES(0xffffffffffffffff, 0xc0184413, 0x0) mmap(&(0x7f000008c000/0x4000)=nil, 0x4000, 0x3, 0x1010, 0xffffffffffffffff, 0x0) rfork(0x90010) setrlimit(0x7, &(0x7f0000000040)={0x1}) 518.695491ms ago: executing program 3 (id=88): syz_emit_ethernet(0x2a, &(0x7f0000000380)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@generic={0x9076b84913279bfa, 0x0, 0x0, "13fd4f8e"}}}}}) r0 = kqueue() clock_settime(0x0, &(0x7f0000000000)) clock_settime(0x4, &(0x7f0000000280)={0xca9a3c, 0xd}) kevent(r0, &(0x7f0000000040)=[{0x100000000, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1, [0x0, 0x0, 0x1000, 0x9]}], 0x1, 0x0, 0xfffffffffffffdc3, 0x0) socket(0x11, 0x3, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000600)=ANY=[@ANYBLOB="fffffffffffb000000000000080045000038000000000001f8ffffffffffffff000103059078000000044673000a00670800061400"]) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000003dc0)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h', &(0x7f00000007c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f0000000c40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f00000010c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f0000001540)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84U\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00'/1144, &(0x7f0000001b40)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h?\xa9\xbbW:\xa1\x95\xd0\xb8\xcc\x0f<\x88\b\x8a\x1d\xa1\xdc3d\xe7\xec\xa5\xb5(\xfc\xf9\x98\x1d\xc6\x14r\xca\x8d\x03\xca\xf5H\xf9\x8e\x7f\xad\xfan\'\xa8g\xda\x1a\xa3kM\x86\xef:\x92]\xde\xea\xae\xce\x98\x9f9\xe2\vZ%\xc5B\x91[b\xb5X\xed\\\xbd\xbbY@\xc5\xea!\x9a\x92E\x8cZ\xe3/^\xf4\x83\'\b\xdd\xd0\xd4L\xe9P62\xd7f\xf0\xdf\xdd\xc5V\xf7O,T\x90\x19\f\xbf\xf09lz=\x16\xb0\x8e,\xa3UhO\x7fe\xdb\xc35\xf7\x1ed\x9b\x7f\x9b\xf4\xadj} \xffX', &(0x7f0000003900)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h'], &(0x7f0000000100)) select(0x40, &(0x7f0000000080)={0x8, 0x49e, 0x7, 0x2, 0x10001, 0x4, 0x8, 0x3}, &(0x7f0000000100)={0x3, 0x5e1e02b0, 0x5, 0x5, 0x0, 0xffffffffffffffff, 0x99, 0xfffffffffffffff8}, &(0x7f0000000140)={0x2, 0x4, 0x5, 0x5, 0x3, 0x8000000000000001, 0x8, 0x81}, &(0x7f0000000180)={0x9, 0x80000000}) kqueue() aio_error(&(0x7f0000000880)={r0, 0x9, 0x0, 0x0, [0x24000, 0x7], 0x3, 0x4, 0xfffffff9, {0x6, 0x100000000, &(0x7f0000000380)="e880ea439ca143cca054c6be5dbd53d65d4d7151f037659844ed2ca10adedb8494375dd374aa2d72fd97498ae097b685db70ea8a3a6d67bf824184e32e712dd8c7a0bf1aa2f195e9c69706f1b296d266af9992815135a1f40de5b50ae95232801d4e5dfab3d915cca8b386ed445f0c0c98623580f90412b3b7c5b8b04b9b27df99c6336751bdd21bc7dbb7e75040099d53eb06abbe9d4760265f0bd89d74585eedad520a62a288bdabbac2c4b171"}, {0x3, 0xe, @sival_int=0x100}}) r1 = open(0x0, 0x0, 0xe) bind$inet6(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_IPV6_DSTOPTS(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000440)=ANY=[@ANYBLOB="4b000000000000005e14d27daba95365cc2179b5f237b45fb12598ba7f8b5b200b3e12d76a6d3773d5fbd65351bc8844f7d4631a89c3408ba69c2453ef3b5c645fc3419d6753bf1fc5c1ccca4ed96f648830b59be65b4b369b4bc17950742291345ffe96923fb5087eb9"], 0x8) syz_emit_ethernet(0x7e, &(0x7f0000000240)={@random="7efb73d0f376", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x48, 0x3a, 0x0, @rand_addr="3bcc2629a17a6c58afb8877c8be162e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x7e03, {0x0, 0x6, "06c33e", 0x0, 0x11, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, [@routing={0x0, 0x2, 0x0, 0x0, 0x0, [@loopback]}]}}}}}}}) chdir(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) setreuid(0xee00, 0x0) r2 = getuid() socket$unix(0x1, 0x2, 0x0) ktimer_settime(0x0, 0x1, &(0x7f0000000200)={{}, {0x2, 0x6}}, 0x0) setreuid(0x0, r2) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) readlinkat(r1, &(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a40)=""/82, 0x52) 460.309474ms ago: executing program 0 (id=89): r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) select(0x40, &(0x7f0000000140)={0x80000001, 0x0, 0x1000, 0x0, 0x8, 0xc0, 0x4, 0x2}, 0x0, 0x0, &(0x7f0000000200)={0x7, 0x3560}) readv(r0, &(0x7f0000000140), 0x0) ftruncate(r0, 0x3863) setsockopt$inet6_sctp_SCTP_CONNECT_X(r0, 0x84, 0x8007, &(0x7f00000000c0)={0xfffffffb, &(0x7f0000000000)=[@in={0x10, 0x2, 0x3, @multicast1}, @in6={0x1c, 0x1c, 0x0, 0x7, @rand_addr="4f2ee75fb194296a2568ef3a9a82d916", 0x9}, @in6={0x1c, 0x1c, 0x2, 0x8, @rand_addr="df52e4b7729395de9e6b54a4742dd9b4", 0xa}, @in6={0x1c, 0x1c, 0x2, 0xfffffc5f, @local={0xfe, 0x80, '\x00', 0x0}, 0xf}, @in={0x10, 0x2, 0x3, @remote={0xac, 0x14, 0x0}}]}, &(0x7f0000000100)=0x10) extattr_delete_link(&(0x7f00000001c0)='./file0\x00', 0x1, &(0x7f0000000240)='\\\x00') setrlimit(0x7, 0x0) clock_nanosleep(0x0, 0x1, &(0x7f0000000180)={0xfffffffffffff801, 0x3235a645}, 0x0) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x3, 0xffffffffffffffff) execve(0x0, 0x0, &(0x7f0000000280)=[&(0x7f0000000080)='\x00', &(0x7f0000000480)='\x00']) writev(r2, &(0x7f0000000280), 0x26) write(r2, &(0x7f00000004c0)="96", 0x1) 460.065726ms ago: executing program 3 (id=90): r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000440)=@in6={0xfffffffffffffdd8, 0x1c, 0x2, 0x8, @loopback, 0x4}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040)={@in6={{0x1c, 0x1c, 0x1, 0x2, @loopback, 0x3}}, 0x0, 0x4, 0x0, 0x315}, 0x98) sendmsg$inet6_sctp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000001c0)="1dc9b313", 0xfdaf}], 0x1, 0x0, 0x42, 0x20188}, 0x0) 459.633355ms ago: executing program 1 (id=91): mkdir(&(0x7f0000001040)='./file0\x00', 0x1) (async) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x10000, 0x0) (async) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file1\x00', 0x0) renameat(r1, &(0x7f0000000200)='./file1\x00', r1, &(0x7f0000000140)='./file0/file0\x00') (async) renameat(r0, &(0x7f0000000340)='./file0/file0\x00', r1, &(0x7f0000000380)='./file1\x00') (async, rerun: 64) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (rerun: 64) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f00000000c0)={0x0, 0x23, 0xfffffffffffffd30, 0x0, 0x0, 0x0, 0x0, 0x7d86699a, [0x0, 0x800000, 0x0, 0xfffffffc]}) (async) renameat(r0, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000180)='./file0\x00') 249.177786ms ago: executing program 3 (id=92): r0 = open(&(0x7f0000000240)='./file0\x00', 0x205, 0x7000000) fcntl$lock(r0, 0x8, &(0x7f0000000080)={0x3, 0x0, 0x4c1, 0x369000000, 0xffffffffffffffff}) 138.995879ms ago: executing program 1 (id=93): open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r0 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000dc0)='./file0\x00', r0, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(r0, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f00000005c0)='\x00', r1, &(0x7f0000000c80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) rename(&(0x7f0000000980)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000a80)='./file0\x00') rename(&(0x7f0000000d80)='./file0\x00', 0x0) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x1000000000000000) open(&(0x7f00000000c0)='./file0\x00', 0x205, 0x0) utimes(&(0x7f00000000c0)='./file1\x00', 0x0) 138.496441ms ago: executing program 3 (id=94): setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) setitimer(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) syz_emit_ethernet(0x7e, &(0x7f00000008c0)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x12, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @local={0xac, 0x14, 0x0}, @multicast1}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0xf7, 0x0, {0x15, 0x4, 0x0, 0x2f, 0x7ae, 0x66, 0x1, 0x1, 0x48, 0x0, @broadcast, @empty, {[@timestamp={0x44, 0x10, 0x9, 0x1, 0x4, [{[@multicast1], 0xa0b3}, {}]}, @rr={0x7, 0x3, 0x3}, @rr={0x7, 0x17, 0x1, [@local={0xac, 0x14, 0x0}, @empty, @rand_addr=0x2, @multicast2, @local={0xac, 0x14, 0x0}]}, @rr={0x7, 0x7, 0x4, [@multicast2]}, @timestamp={0x44, 0xc, 0x5, 0x3, 0x1, [{[], 0x9}, {[], 0x80000001}]}]}}}}}}}) renameat(r0, &(0x7f0000000040)='./file1\x00', 0xffffffffffffffff, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x0, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) freebsd11_stat(0x0, 0x0) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r2, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @empty, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000180)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) openat$bpf(0xffffff9c, 0x0, 0x400000, 0x0) r3 = kqueue() utimes(&(0x7f0000000140)='./file1\x00', &(0x7f00000001c0)={{0x4, 0x5}, {0x5}}) kevent(r3, &(0x7f0000000600)=[{0x9, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c6, 0x0, [0x0, 0x0, 0x7, 0x3ffffffffffffd]}, {0x0, 0xfffffffffffffffb, 0xe048, 0x1, 0x1, 0x1, [0xffffffffffffff7f, 0xec, 0x40]}, {0x5, 0x4, 0x8000, 0x0, 0x200000000000, 0xffffffff00000, [0x1, 0x7eba, 0x10001, 0x1]}, {0x3, 0xfffffffffffffff3, 0x4, 0xc0000000, 0x3ff, 0x9, [0x2, 0x2, 0x8, 0xb]}, {0x8, 0xfffffffffffffff3, 0x42, 0x40000000, 0x1, 0x7f, [0xa9b, 0x7b3, 0x5, 0x53dcd669]}, {0x100000000, 0xfffffffffffffff5, 0x21, 0x0, 0x7, 0x1ff, [0x5, 0x5, 0x10, 0xfaf]}, {0xb, 0xfffffffffffffffd, 0x4, 0xc0000000, 0x4, 0x5, [0x7, 0x7fff, 0x8, 0x2]}], 0x7, 0x0, 0x0, 0x0) r4 = socket(0x2, 0x1, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x10, 0x2, 0x1, @rand_addr=0x7ffffffe}, 0x10) r5 = open$dir(&(0x7f00000001c0)='./file0\x00', 0x40000400000002c2, 0xca0706ee3fd5d6f6) r6 = openat$filemon(0xffffffffffffff9c, &(0x7f0000000180), 0x1, 0x0) ioctl$FILEMON_SET_FD(r6, 0xc0045301, &(0x7f0000000000)=r5) r7 = setsid() ioctl$FILEMON_SET_PID(r6, 0xc0045302, &(0x7f00000002c0)=r7) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) sendto$inet(r4, &(0x7f00000000c0)="342f108251437ffc078eed5d1811267d9d23dc75599fcbe3f249e7aece8878bff8eaf70de2d1a887a1fa42253e38c9b2db2ad60e0b372e35a7ad0ca78249e2f109052e5f1177fe6f05108dcb26509897532c41d72f92e622bfa78ee7a8bd9cae300a98f3f6c4578317", 0x69, 0x0, &(0x7f0000000000)={0x10, 0x2, 0x2, @multicast2}, 0x10) shutdown(r4, 0x1) freebsd10_pipe(&(0x7f00000005c0)) 591.95µs ago: executing program 1 (id=95): r0 = kqueue() kevent(r0, &(0x7f0000000080)=[{0x0, 0xfffffffffffffffb, 0x45, 0x1, 0x2ef5, 0x6}], 0x1005, 0x0, 0x37, 0x0) kevent(r0, 0x0, 0x0, 0x0, 0x2, 0x0) 0s ago: executing program 2 (id=96): ktimer_create(0x4, 0x0, &(0x7f00000001c0)=0x0) ktimer_settime(r0, 0x0, &(0x7f0000000200)={{0x1}, {0x1, 0x2a21}}, 0x0) ktimer_settime(r0, 0x0, &(0x7f0000000340)={{0x5, 0x10001}, {0x4, 0x19f7}}, &(0x7f00000003c0)) procctl$PROC_REAP_ACQUIRE(0x0, 0x0, 0x2, 0x0) r1 = getpgrp(0x0) r2 = semget$private(0x0, 0x0, 0x169) __semctl$GETNCNT(r2, 0x4, 0x3) r3 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r3, 0x29, 0x6b, 0x0, 0x0) rtprio(0x1, r1, &(0x7f00000000c0)={0x3, 0x8017}) sigwaitinfo(&(0x7f0000000000)={[0x1000, 0x73cf46c8, 0x4d65, 0x8]}, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @sigval_int, @poll}) execve(0x0, &(0x7f00000001c0)=[&(0x7f0000000200)='.)(#./:+\\}@{[\x00\x90\x8f}8\tC\x8bH\xee)jj\x0f8l\tc\xfax\xfb8\x13]\x13\x82\xeb\x9f\x90\x97y^x\xf0\xb22\x8b5[\xba\x17\xff\f\x93J,}\xac8Xm\x8a\xd5'], 0x0) sigqueue(r1, 0x7f, @sigval_ptr=0x3) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.226' (ED25519) to the list of known hosts. ktrace write failed, errno 27, tracing stopped for pid 845 ktrace write failed, errno 27, tracing stopped for pid 748 ktrace write failed, errno 27, tracing stopped for pid 746 ktrace write failed, errno 27, tracing stopped for pid 335 ktrace write failed, errno 27, tracing stopped for pid 745 ktrace write failed, errno 27, tracing stopped for pid 744 ktrace write failed, errno 27, tracing stopped for pid 741 ktrace write failed, errno 27, tracing stopped for pid 747 ktrace write failed, errno 27, tracing stopped for pid 736 ktrace write failed, errno 27, tracing stopped for pid 743 ktrace write failed, errno 27, tracing stopped for pid 686 ktrace write failed, errno 27, tracing stopped for pid 424 ktrace write failed, errno 27, tracing stopped for pid 811 ktrace write failed, errno 27, tracing stopped for pid 1 ktrace write failed, errno 27, tracing stopped for pid 738 ktrace write failed, errno 27, tracing stopped for pid 823 ktrace write failed, errno 27, tracing stopped for pid 682 ktrace write failed, errno 27, tracing stopped for pid 338 ktrace write failed, errno 27, tracing stopped for pid 742 ktrace write failed, errno 27, tracing stopped for pid 740 ktrace write failed, errno 27, tracing stopped for pid 830 ktrace write failed, errno 27, tracing stopped for pid 846 ktrace write failed, errno 27, tracing stopped for pid 836 ktrace write failed, errno 27, tracing stopped for pid 847 ktrace write failed, errno 27, tracing stopped for pid 849 ktrace write failed, errno 27, tracing stopped for pid 850 FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20000 Accounting enabled Accounting disabled ip6_pcbopts: all specified options are cleared. if_delmulti_locked: detaching ifnet instance 0xfffffe0058d20000 FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: Accounting enabled Accounting disabled lock order reversal: 1st 0xfffffe0077c7be30 ufs (ufs, lockmgr) @ /syzkaller/managers/main/kernel/sys/kern/vfs_subr.c:3385 2nd 0xffffffff830019c0 proctree (proctree, sx) @ /syzkaller/managers/main/kernel/sys/kern/subr_prf.c:189 lock order proctree -> ufs established at: #0 0xffffffff81652dc1 at witness_checkorder+0x781 #1 0xffffffff814b98d6 at lockmgr_lock_flags+0x1d6 #2 0xffffffff81d816bb at ffs_lock+0x18b #3 0xffffffff822de26b at VOP_LOCK1_APV+0x6b #4 0xffffffff817b61ae at _vn_lock+0x14e #5 0xffffffff817b6a58 at vn_close1+0x1e8 #6 0xffffffff814ab34a at ktrops+0x41a #7 0xffffffff814aaacd at sys_ktrace+0xa7d #8 0xffffffff8212196f at amd64_syscall+0x4af #9 0xffffffff820c689b at fast_syscall_common+0xf8 lock order ufs -> proctree attempted at: #0 0xffffffff81653c92 at witness_checkorder+0x1652 #1 0xffffffff81544f6f at _sx_slock_int+0x13f #2 0xffffffff816105dd at uprintf+0x14d #3 0xffffffff81dad9bf at ufs_rmdir+0xdf #4 0xffffffff822dd0b1 at VOP_RMDIR_APV+0xe1 #5 0xffffffff817ab227 at kern_frmdirat+0x8a7 #6 0xffffffff8212196f at amd64_syscall+0x4af #7 0xffffffff820c689b at fast_syscall_common+0xf8 Accounting enabled SYZFAIL: child stopped status=127 (errno 35: Resource temporarily unavailable) FreeBSD/amd64 (ci-freebsd-main-3.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect