last executing test programs: 44.329891059s ago: executing program 0 (id=49): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) ftruncate(r0, 0x80002) connectat$unix(r0, 0xffffffffffffff9c, &(0x7f0000000000)=@file={0x10, 0x1, './file0/file0\x00'}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r2, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) connect$inet(r2, &(0x7f00000000c0)={0x34, 0x2, 0x2, @rand_addr=0xfffffffe}, 0x10) aio_error(&(0x7f0000000440)={r0, 0x3ff, &(0x7f0000000340)="85459704950212c688348d0e9ac5a0674809c3d0b58df7fa07a2545428897492360f88f405faae9e2c6427de24ca7214639f08e38de491e63af9bf3d91e752c57fc144a3bd78d3445f915ee49935c4256c21f151ee8584a64084274a5ce260a09a8edf7b212c17553764fd1b3c8003cda87b65182fda5667bb4f0fec76c2666933b0b99db7d6f2fefe2a4e2d2cca413f9ed62ce96a8b99f885d76f37f8c8cec5c1a65db4c03718e7bb7fa99b5d751d7271591cbbd033ce9f8d7a48441c194cfe7c6df6e3d4f095bf1e7c75a9895f4f26bea275fc912ac0b7bcd2314701089f4f3cfe029c8d4dbe", 0xe7, [0x2, 0xffffa063], 0x5, 0x8, 0x10, {0x2, 0x1, &(0x7f0000000180)="da3e2ac2926825d0d43d2c2735807bc21cc03dcbc7f1f18048f32a3b6e7a5f413f74f4bbf3b63b359bf9e3efcc0d7b755afa64244b615ded0b8afcd136f42e28fa4bac05b939bbd8fe89e89c8d17572fba92c101a5c7acc3a5f06949e9"}, {0x0, 0xa, @sigval_ptr=0x8000000000000000, @ke_flags=0x2}}) sendmsg$inet6_sctp(r2, &(0x7f00000002c0)={&(0x7f0000000280)=@in={0x10, 0x2, 0x1, @multicast2}, 0x10, &(0x7f0000000100)=[{&(0x7f00000005c0)="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", 0x149}], 0x1, 0x0, 0x0, 0x81}, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000980)={'bbr\x00'}, 0x24) connect$inet(0xffffffffffffffff, &(0x7f0000000140)={0x10, 0x2, 0x0, @rand_addr=0x7fffffff}, 0x10) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000300)={0x1c, 0x1c, 0x2, 0xfffffffe, @loopback, 0x8be}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f00000005c0)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x12, 0x1c, 0x0, 0x0, 0x0, 0x1, 0x0, @local={0xac, 0x14, 0x0}, @multicast1}, @icmp=@mask_request={0x11, 0x0, 0x0, 0x5}}}}}) pipe2(&(0x7f0000000080), 0x100004) sendmsg$inet6_sctp(r1, &(0x7f0000001a80)={0x0, 0x0, &(0x7f0000001880)=[{&(0x7f0000000240)='g', 0x1}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="300000008400000009000000ac1400bb100000008400000009000000e00000021000000084"], 0x4c, 0x185}, 0x9) rfork(0x85000) 43.5499023s ago: executing program 0 (id=51): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x54, &(0x7f0000000900)={0x6, {{0x10, 0x2, 0x1}}, {{0x51, 0x2, 0x1, @multicast2}}}, 0x108) syz_emit_ethernet(0x6a, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd60a3cdba77010000fe80000000000000000000000000f2a9ff020000000000000000000000000001020090"]) 43.35992388s ago: executing program 0 (id=53): r0 = socket$inet6(0x1c, 0x2, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x100, 0x69) truncate(&(0x7f0000000040)='./file0\x00', 0xb) r1 = openat$md(0xffffffffffffff9c, &(0x7f0000000540), 0x8000, 0x0) ioctl$MDIOCATTACH(r1, 0xc1c06d00, &(0x7f0000000600)={0x5, 0xff, 0x2, &(0x7f0000000580)='./file0\x00', 0x2, 0x5, 0xfffffff9, 0x1, 0x4, 0x4, &(0x7f00000005c0)='\x00', [0x5, 0x101, 0x8, 0x0, 0x3, 0xf6e6, 0x3, 0xc, 0xfffffffa, 0x6, 0x6c43659a, 0x80, 0x4, 0x1000, 0x7, 0x9000, 0xd, 0x8, 0x6, 0x6, 0xffff456b, 0x7fffffff, 0x6, 0x4, 0x5, 0x7fff, 0xb50, 0x5a46, 0x7, 0x1, 0x5, 0x3, 0xa0, 0x6, 0x7, 0x1, 0xfffffff7, 0xea9, 0x96, 0xffffbfb6, 0x10, 0x9, 0x5, 0xd7d, 0x6, 0xa, 0xf8, 0x67d54332, 0x7, 0x2, 0x9, 0x2, 0x4, 0x8000000, 0x1, 0xf3a, 0x5, 0x7, 0xf54, 0x1, 0x400, 0x1, 0x1, 0x10000, 0x7f, 0x5, 0x1, 0xe9, 0x9, 0x7, 0x59eb, 0x101, 0x4, 0x3, 0x1ea, 0x6, 0x1, 0x7fd, 0xfffffff9, 0xfffffffb, 0x8, 0x6, 0x9, 0x7, 0x3c5a, 0x81, 0x1ff, 0x4, 0xffff3b70, 0x9, 0x7fffffff, 0x6, 0x1, 0x100, 0x41, 0x16cb]}) r2 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r3) open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) r6 = socket$unix(0x1, 0x2, 0x0) bind$unix(r6, &(0x7f0000000000)=@file={0xa, 0x1, './file0\x00'}, 0xa) sendfile(r2, r5, 0x1, 0x400000000000, 0x0, 0x0, 0xf) r7 = socket(0x1c, 0x1, 0x0) setsockopt(0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000100)='\t', 0x1) writev(0xffffffffffffffff, &(0x7f00000002c0)=[{&(0x7f0000000080)="76e5eac907f9ccf7a251ceddcec7d6aa45cffe2c63a56077123a276d3ba4e9d17eb3eb5db12a3783a8e0620d357de1fe04fa9465b5bd1286e9624dec06a00c222f", 0x41}], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) symlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='.\x00') open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) bind$inet6(r7, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) connect$inet6(r7, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) syz_emit_ethernet(0x2a, &(0x7f00000023c0)={@random="57001000", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x65, 0x0, 0x1, 0x2, 0x0, @empty, @multicast1=0xe0170001}, @icmp=@generic={0x12, 0x2, 0x0, "e0170001"}}}}}) truncate(&(0x7f0000000440)='./file0\x00', 0x403) sendfile(r2, r7, 0x200, 0x1, 0x0, 0x0, 0x25) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="ff070a791b4375202b5c2baf2781e604"}, 0x1c) utimensat(0xffffffffffffffff, 0x0, &(0x7f0000003000)={{0x3, 0x40800000000}, {0x3, 0x10001}}, 0x0) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="00000000002df5db62000500", 0x78c5}, 0x1c) r8 = socket(0x2, 0x1, 0x0) setsockopt$sock_int(r8, 0xffff, 0x1002, &(0x7f00000002c0)=0x3ff, 0x4) sendto$inet(r8, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x28, 0x2, 0x3, @rand_addr=0x10dfa767}, 0x10) execve(&(0x7f0000000100)='./file0\x00', &(0x7f0000000480)=[&(0x7f0000000240)='\x00', &(0x7f0000000280)='\x00', &(0x7f0000000300)='\x00', &(0x7f0000000340)='b}}[/S@\x00', &(0x7f0000000400)='\xff\xff\xff\xff\xff\xff'], &(0x7f0000000500)=[&(0x7f00000004c0)='\x00']) 42.799920927s ago: executing program 0 (id=55): rfork(0x12050) ktrace(&(0x7f0000001140)='./file1\x00', 0x4, 0x804, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x8}) rfork(0x1000) r0 = openat(0xffffffffffffff9c, &(0x7f0000001100)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x0, 0x0}, {0x0, 0x0, @sival_int, @spare=[0x0, 0x0, 0x0, 0x0, 0x0, 0x101]}}) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f0000000000)={0x29, 0xe, 0x1000, &(0x7f0000000080)="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", 0x4a, &(0x7f0000001080)="9b7048c9cae6443762e7d91250786d7339efd162eb017fc9de082b6bf06bfdd42bfa9943facb642a8600e9f2788619fdd27fbffb2b18a3c44625f02cc710c37231e521fcd50d8da83161", 0x1, 0x2913, [0x5, 0x5, 0x6, 0xffffffff]}) 42.06031306s ago: executing program 0 (id=56): r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) r1 = __specialfd$inotify(0x2, &(0x7f0000000000)={0x4}, 0x4) fcntl$getown(r1, 0x5) ftruncate(r0, 0x3862) (async, rerun: 64) r2 = open$dir(&(0x7f00000016c0)='./file0\x00', 0xa182fdacd32160a9, 0x0) (async, rerun: 64) freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x672cda28f543e327, 0x3) (async) lchown(&(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x0) (async) freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) (async) setuid(0x0) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x6, 0x1010, 0xffffffffffffffff, 0x0) (async, rerun: 32) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0x1010, 0xffffffffffffffff, 0x0) (async, rerun: 32) cap_rights_limit(r3, 0x0) (async, rerun: 64) cap_rights_limit(r4, &(0x7f0000000580)=[0x20000207fffffdc, 0x400000000000005]) (rerun: 64) openat(r4, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) (async, rerun: 32) r5 = kqueue() (rerun: 32) kevent(r5, 0x0, 0x0, 0x0, 0x0, 0x0) symlink(&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') kqueue() (async, rerun: 32) kevent(0xffffffffffffffff, &(0x7f0000000000), 0x20b89, 0x0, 0xffff3955, 0x0) (rerun: 32) mknodat(0xffffffffffffff9c, 0x0, 0x100, 0x0) (async) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) (async) getsockopt$inet6_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0xf, 0x0, 0x0) (async, rerun: 32) sendmsg(0xffffffffffffffff, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000380)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) (rerun: 32) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r6, 0x8004745b, &(0x7f0000000080)) (async) r7 = socket$inet6_udp(0x1c, 0x2, 0x0) (async) socket$inet6_tcp(0x1c, 0x1, 0x0) lio_listio(0x1, &(0x7f0000000080)=[{0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0, [0x8100, 0x7], 0x5, 0x1, 0x9, {0x4000000000000004, 0xffff, 0x0}, {0x3, 0x15, @sival_ptr=0x1, @spare=[0xffffffff, 0xb, 0x8, 0x100, 0x8, 0x3, 0x1000, 0x8]}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x2, 0x10000], 0x9, 0x8, 0xb, {0x7, 0x1000000b, 0x0}, {0x4, 0xfffffffe, @sigval_ptr=0x2, @thr={0x0, 0x0}}}, {r2, 0xfffffffffffffffd, 0x0, 0x0, [0x7, 0x40], 0x6, 0x5, 0x1, {0x7b, 0x9, 0x0}, {0x3, 0x10, @sival_int, @ke_flags=0x403f}}], 0x3, 0x0) setsockopt$inet6_group_source_req(r7, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0xfffffffffffffcfb, 0x1c, 0x3, 0x21596174, @mcast2, 0xfffffffc}}, {{0x1c, 0x1c, 0x3, 0x2, @empty, 0x68}}}, 0x108) (async) setsockopt$inet6_group_source_req(r7, 0x29, 0x53, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @mcast2}}, {{0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2}}}, 0x108) 41.807884725s ago: executing program 0 (id=61): r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) freebsd11_fhstatfs(&(0x7f0000000040)={{[0xffff, 0x10000]}, {0x5, 0x100, "0128ae26e70000000000a000080500"}}, 0x0) sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000000)={0x0, 0xd, 0xf8}) sysarch$I386_GET_IOPERM(0x3, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) open$dir(&(0x7f00000003c0)='./file0\x00', 0x1, 0x171) semop(0x0, 0x0, 0x0) __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000240)=[0x24, 0xe]) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x89c]}], 0x1, 0x0, 0x0, 0x0) kqueue() socket$inet_sctp(0x2, 0x1, 0x84) openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r2, 0x3862) r3 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r3, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r3, r4) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x2, 0x25) r6 = semget$private(0x0, 0x2, 0x3c0) __semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000340)=&(0x7f0000000300)={{0x0, 0x0, 0x0, 0x0, 0x18f, 0x0, 0x0, 0x4}, 0x6, 0x3, 0x0, 0x0, 0xc237, 0xc}) __semctl$GETALL(r6, 0x0, 0x6, &(0x7f0000000100)) __semctl$IPC_STAT(r6, 0x0, 0x2, &(0x7f00000001c0)=&(0x7f0000000100)) fhopen(&(0x7f0000000080)={{[0x5c8951ac, 0x3bea9983]}, {0xf, 0x2, "fe020000fd1604001a00"}}, 0x2) sendfile(r5, r4, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200), 0x0, 0x0}, 0x0, 0x14) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "cc58da", 0x18, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[@routing={0x3a}], @icmpv6=@ni={0x8c}}}}}}) socket$inet6_udp(0x1c, 0x2, 0x0) 41.788833377s ago: executing program 32 (id=61): r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) freebsd11_fhstatfs(&(0x7f0000000040)={{[0xffff, 0x10000]}, {0x5, 0x100, "0128ae26e70000000000a000080500"}}, 0x0) sysarch$I386_SET_IOPERM(0x4, &(0x7f0000000000)={0x0, 0xd, 0xf8}) sysarch$I386_GET_IOPERM(0x3, &(0x7f0000000040)) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x2, 0x0, @loopback}, 0x1c) open$dir(&(0x7f00000003c0)='./file0\x00', 0x1, 0x171) semop(0x0, 0x0, 0x0) __semctl$SETALL(0x0, 0x0, 0x9, &(0x7f0000000240)=[0x24, 0xe]) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x89c]}], 0x1, 0x0, 0x0, 0x0) kqueue() socket$inet_sctp(0x2, 0x1, 0x84) openat$crypto(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) ftruncate(r2, 0x3862) r3 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r3, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) bind$inet6(r3, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) connect$inet6(r3, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r4 = socket$inet_udplite(0x2, 0x2, 0x88) dup2(r3, r4) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x2, 0x25) r6 = semget$private(0x0, 0x2, 0x3c0) __semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000340)=&(0x7f0000000300)={{0x0, 0x0, 0x0, 0x0, 0x18f, 0x0, 0x0, 0x4}, 0x6, 0x3, 0x0, 0x0, 0xc237, 0xc}) __semctl$GETALL(r6, 0x0, 0x6, &(0x7f0000000100)) __semctl$IPC_STAT(r6, 0x0, 0x2, &(0x7f00000001c0)=&(0x7f0000000100)) fhopen(&(0x7f0000000080)={{[0x5c8951ac, 0x3bea9983]}, {0xf, 0x2, "fe020000fd1604001a00"}}, 0x2) sendfile(r5, r4, 0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200), 0x0, 0x0}, 0x0, 0x14) syz_emit_ethernet(0x4e, &(0x7f0000000140)={@broadcast, @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "cc58da", 0x18, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[@routing={0x3a}], @icmpv6=@ni={0x8c}}}}}}) socket$inet6_udp(0x1c, 0x2, 0x0) 19.406149494s ago: executing program 2 (id=7): syz_extract_tcp_res(&(0x7f0000000040)={0x41424344, 0x41424344}, 0x531, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3, @empty=0xe0000000}, 0x10) rfork(0x1000) syz_emit_ethernet(0x151, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) syz_emit_ethernet(0x76, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa70080000000708004416002e0068000100519078ac1400aaffffffffd404d32a940600000006830702ac1400bb9406000000f8830b0600000000ac1400bb008323000000000000000001ffffffffac1400bb0000000000004e204e23", @ANYRES32=r0, @ANYRES32=0x41424344, @ANYBLOB="614001ff9078000603030600"]) syz_extract_tcp_res(&(0x7f0000000000), 0x6, 0x79) 16.526654417s ago: executing program 2 (id=7): syz_extract_tcp_res(&(0x7f0000000040)={0x41424344, 0x41424344}, 0x531, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3, @empty=0xe0000000}, 0x10) rfork(0x1000) syz_emit_ethernet(0x151, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaf7bf474271478100340086dd638d4f8c01172e0000000000000000000000000000000000bd4d69050e7412c63f32ca42e9f7412811000000000000000401010401090000160000000002000005020007040104003800000500000000fe8000000000000000000000000000aa5806004000000000fe8000000000000000000000a18500000000000000000000728cb8caf66e0000000000000001ff0200000000000000000000000000012800000000000000000100010200000063000000000000004c0600440000000000000000000000000000000000000001ff020000000000000000000000000001fe80000000000000002200089078068250dceb17487770acfe7ea3442ac0619f83df73162ad05d2161cdef9d86e23438ee0f223b46e06c0bc809c969a15c79b7d635fe5f1b04e569b4f2cde99ae78ba0339116021207eb7bd4fbe2346d000000000000000000007b5a2d67dd526e"]) syz_emit_ethernet(0x76, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa70080000000708004416002e0068000100519078ac1400aaffffffffd404d32a940600000006830702ac1400bb9406000000f8830b0600000000ac1400bb008323000000000000000001ffffffffac1400bb0000000000004e204e23", @ANYRES32=r0, @ANYRES32=0x41424344, @ANYBLOB="614001ff9078000603030600"]) syz_extract_tcp_res(&(0x7f0000000000), 0x6, 0x79) 12.663162912s ago: executing program 2 (id=7): syz_extract_tcp_res(&(0x7f0000000040)={0x41424344, 0x41424344}, 0x531, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3, @empty=0xe0000000}, 0x10) rfork(0x1000) syz_emit_ethernet(0x151, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) syz_emit_ethernet(0x76, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa70080000000708004416002e0068000100519078ac1400aaffffffffd404d32a940600000006830702ac1400bb9406000000f8830b0600000000ac1400bb008323000000000000000001ffffffffac1400bb0000000000004e204e23", @ANYRES32=r0, @ANYRES32=0x41424344, @ANYBLOB="614001ff9078000603030600"]) syz_extract_tcp_res(&(0x7f0000000000), 0x6, 0x79) 8.975074188s ago: executing program 4 (id=169): openat$bpf(0xffffff9c, &(0x7f0000000280), 0x1, 0x0) msgrcv(0x0, 0x0, 0x0, 0x2, 0x800) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) nanosleep(&(0x7f0000000100)={0xfffffffffffffffd, 0x50}, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f00000000c0)={0x15, 0x0, 0x18, &(0x7f0000000000)="0b6fac4103f48e8d08afe5de81d4755aedaacdd4743c7eaa", 0x0, 0x0, 0x0, 0x7d86699a}) ioctl$CIOCCRYPT(r2, 0xc0306367, &(0x7f0000000180)={0x0, 0x2, 0x0, 0x10000, &(0x7f0000000100), 0x0, 0x0, 0x0}) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r3, 0x0, 0x2, 0x0, 0x0) r4 = socket(0x11, 0x10000000000003, 0x0) setsockopt$sock_int(r4, 0xffff, 0x8000, 0x0, 0x0) r5 = socket$inet6_sctp(0x1c, 0x1, 0x84) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0xfffffffffffffe64) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDR_INFO(r5, 0x84, 0x101, &(0x7f0000000380)={@in6={{0x1c, 0x1c, 0x2, 0x5, @remote={0xfe, 0x80, '\x00', 0x0}, 0x8000}}, r6, 0x1, 0x4819f9df, 0x4, 0x8362, 0x80000003}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x900, &(0x7f00000001c0)={r6, 0x4}, &(0x7f0000000200)=0x8) r7 = dup2(r1, r2) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) getpgrp(0xffffffffffffffff) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) sync() sync() open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r8 = getpid() ktrace(&(0x7f0000000000)='./file0\x00', 0x0, 0x100, r8) getitimer(0x1, 0x0) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) bindat$unix(r0, r7, &(0x7f0000000140)=@file={0x10, 0x1, './file0/file0\x00'}, 0x10) rmdir(&(0x7f0000000300)='./file0/file0\x00') 8.936122124s ago: executing program 2 (id=7): syz_extract_tcp_res(&(0x7f0000000040)={0x41424344, 0x41424344}, 0x531, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3, @empty=0xe0000000}, 0x10) rfork(0x1000) syz_emit_ethernet(0x151, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) syz_emit_ethernet(0x76, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa70080000000708004416002e0068000100519078ac1400aaffffffffd404d32a940600000006830702ac1400bb9406000000f8830b0600000000ac1400bb008323000000000000000001ffffffffac1400bb0000000000004e204e23", @ANYRES32=r0, @ANYRES32=0x41424344, @ANYBLOB="614001ff9078000603030600"]) syz_extract_tcp_res(&(0x7f0000000000), 0x6, 0x79) 6.71264954s ago: executing program 4 (id=170): setresgid(0xee00, 0x0, 0x0) setresgid(0xffffffffffffffff, 0x0, 0x0) cpuset(0xffffffffffffffff) freebsd11_fstat(0xffffffffffffff9c, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r1 = msgget(0x2, 0x4) getresgid(&(0x7f0000000280), &(0x7f00000002c0)=0x0, &(0x7f0000000300)) freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) cap_rights_limit(r4, &(0x7f0000000140)=[0x20008207fffffd9, 0x400000000000001]) sendmsg$unix(r3, &(0x7f00000050c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x9) r5 = fcntl$getown(0xffffffffffffffff, 0x5) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000340)={{0x0, 0x0, 0x0, r2, 0xa8, 0x8, 0x0, 0x5}, 0x4, 0x4, 0x9, 0x8, 0xffffffff00000001, 0x7fffffff, 0xffffffffffffffff, r5}) setregid(r0, r2) 6.696029869s ago: executing program 1 (id=171): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x3, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) (async) socket$inet(0x2, 0x4000000000000001, 0x0) syz_emit_ethernet(0x96, &(0x7f0000000640)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6041799100603a000000000000000000000000000000fe8000000000000000000000000000aa040090780000000060fed9f60fff2b0000000000000000000000000000000000fe8000000000000000000000000000aa2cf501fc00000000370400f40000000000000000000000000000ffffffffffffda10e2c9c2375d7d7ea7f86a2c7d4b0184467f558b3b3940f1348f8c5c56fe328ae3b3f31f023eb1ab8b24b9a628d233a60000"]) (async) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000340)={r1, 0x80000001, &(0x7f0000000300)="e2", 0x1, [], 0x0, 0x0, 0x0, {0x0, 0x7, 0x0}}) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) (async) open(&(0x7f00000000c0)='./file0\x00', 0x400000, 0xffffffffffffff7c) chown(0x0, 0x0, 0x0) posix_fadvise(0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x2) (async) r2 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r3, 0x0) (async) r4 = __specialfd$eventfd(0x1, &(0x7f0000000a00)={0x487, 0x4}, 0x8) writev(r4, &(0x7f0000001a00)=[{&(0x7f0000001940)="32d7d76065c81cf1", 0x8}], 0x1) (async) sendto$unix(r1, &(0x7f0000000140)="a8", 0x1, 0x88, &(0x7f0000000180)=@file={0xa, 0x0, './file0\x00'}, 0xa) truncate(&(0x7f0000000000)='./file0\x00', 0x80) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x3e, 0x20104}, 0x0) cpuset_setaffinity(0x1, 0x2, 0x0, 0x94, &(0x7f0000000040)) rfork(0x96014) (async) sync() (async) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) (async) r5 = socket(0x1c, 0x2, 0x3) ktimer_create(0x4, 0x0, &(0x7f0000000100)=0x0) aio_read(&(0x7f0000000580)={r5, 0x2, &(0x7f0000000240)="34dac1b6bc6ce8185d92f5ae043c99c9e3ef9e38240357b1edbd0bf5c919b4f336c3b733a78ec6f8cb7be04037f6e8238beed0ba1bc21fba95b58e02a6ad90a492cdbc2bbfe15a85e378eff9eadff1a2ae427af0e9f1ffdc19ab6e32f0e0b790f143b2149f30edbce1ee5ed33972728e6aa27c5f5dc3ea0bdd2003824e4372038cd9a057db7d9324e0f8aa8a60da74acc0ef8114", 0x94, [0x5, 0x5], 0x1, 0x8, 0xa, {0x5, 0x9, &(0x7f0000000400)="c23e745fa2be07cdb704ef4ee1468c9dea8775bfeaafc1ed368dcfaf23e7a04175ec"}, {0x1, 0x20, @sival_int=0x3ae9, @ke_flags=0xe520423b21b053a2}}) (async) syz_emit_ethernet(0x2e, &(0x7f0000000080)={@local, @broadcast, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @local={0xac, 0x14, 0x0}, @remote={0xac, 0x14, 0x0}, {[@ssrr={0x89, 0x3}]}}, @icmp=@info_request={0xf, 0x0, 0x0, 0x5, 0x9}}}}}) (async) ktimer_gettime(r6, 0x0) (async) ktimer_settime(0x0, 0x1, &(0x7f00000001c0)={{0xe1a, 0x1ff}, {0x6, 0x8}}, &(0x7f0000000200)) 6.18529574s ago: executing program 4 (id=173): socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r1, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000380), 0x10000, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f00000000c0)={0x16, 0x23, 0x20, &(0x7f0000000100)="0b6fac4103e7a00d4689e808d0d4755aedaacdd4743c7eaa2c7300d05fe86026", 0x0, 0x0, 0x0, 0x7d86699a}) ioctl$CIOCCRYPT(r2, 0xc0306367, &(0x7f0000000640)={0x0, 0x1, 0x0, 0x8060, &(0x7f00000002c0), 0x0, 0x0, 0x0}) close(r0) r3 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x110) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r4 = socket$inet6(0x1c, 0x3, 0x0) setsockopt$inet6_int(r4, 0x29, 0xa, &(0x7f0000000080), 0x4) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r5 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r5, r3, &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20000410) r6 = open$dir(&(0x7f0000000240)='.\x00', 0x200000, 0x0) r7 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) r8 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r9 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r9, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) kevent(0xffffffffffffffff, 0xfffffffffffffffe, 0x8, &(0x7f0000000300)=[{}], 0x1, 0x0) r10 = socket(0x1c, 0x1, 0x0) bind$inet6(r10, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0xbc0, @loopback, 0x7}, 0x1c) connect$inet6(r10, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) sendfile(r8, r10, 0x4, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_splice(r10, 0xffff, 0x1023, &(0x7f0000000040)={r10, 0x0, {0x1, 0x4}}, 0x20) rfork(0x85000) open(0x0, 0x205, 0x0) ioctl$BIOCSRTIMEOUT(0xffffffffffffffff, 0x8010426d, 0x0) semop(0x0, &(0x7f0000001080)=[{0x1, 0x4, 0x1000}], 0x2aaaaaaaaaaaae03) sendmsg$inet6_sctp(0xffffffffffffffff, 0x0, 0x2008f) inotify_add_watch_at(r7, r6, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xa1000420) 6.181851902s ago: executing program 3 (id=174): r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0xa, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) mount(&(0x7f0000000000), 0x0, 0x0, 0x0) setgroups(0x0, 0x0) access(&(0x7f0000000680)='./file0\x00', 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x0) unlink(&(0x7f0000001080)='./file0\x00') rfork(0x85000) cpuset_setdomain(0x2, 0x1, 0xffffffffffffffff, 0x20, &(0x7f0000000040)={[0x1]}, 0x3) kevent(0xffffffffffffffff, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) freebsd11_fhstatfs(0x0, 0x0) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f00000002c0)={0x240c, 0x690d, 0x7fffffff}) cpuset_getdomain(0x1, 0x2, 0x8, 0x20, &(0x7f00000002c0), &(0x7f0000000240)) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000f40)=""/218) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f0000000040)={0x0, 0x1e, 0x0, 0x0, 0x1, &(0x7f00000002c0)='h', 0x400000, 0x8d800000, [0x0, 0x2]}) 5.792530159s ago: executing program 3 (id=175): syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@redirect={0x5, 0x0, 0x0, @remote={0xac, 0x14, 0x0}, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x0}, @broadcast}}}}}}) syz_extract_tcp_res(&(0x7f0000000080), 0x9, 0x9) r0 = open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) r1 = socket(0x1c, 0x1, 0x0) bind$inet6(r1, &(0x7f00000000c0)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) connect$inet6(r1, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) sendto(r1, &(0x7f00000013c0)="33a5dcf1721ea2a9211baf4e05612899fd6a71854a3bbb78018306e3a52e9d8d5d4ce9c3ff9793003ed43b0a49df4b906d17bc0d22f4f8510f66e81f52a7f6ab50f42147905696b6e951ab4d64680173be979ed74925d1c2ec63cd54ac11bc7fa7171bcab91765695586637f9a3512d464d4e82124890dfbe8256312da6c0bd0c410822d3ced803b72bfd8ec1b54f1bcccdeb7a9ee23b33144910875d1533d1c3e41242fd7", 0xa5, 0x81, 0x0, 0x0) sendfile(r0, r1, 0xeba, 0x20000000000, 0x0, 0x0, 0x11) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000a00)="b10005019000e80303481bc75786ca900f0e08fecea11ea8fef96e", 0x1b, 0x20080, 0x0, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) kmq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x4}) ioctl$DIOCCHANGERULE(r2, 0xcbe0441a, &(0x7f0000000040)) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r4 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r4, &(0x7f0000000140)={0x10, 0x2, 0x0, @remote={0xac, 0x14, 0x0}}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000180)=0x8) r6 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r6, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="60000000ffff000003000000", @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="10001000", @ANYRES32=0x0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="20000000ffff000001000000", @ANYRES32, @ANYRES32], 0x8c}, 0x0) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f00000001c0)={@in={{0x10, 0x2, 0x1, @loopback}}}, 0x88) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x21, &(0x7f00000001c0)={0x0, 0x2020, 0x8e8, 0xfffffe01, r5}, &(0x7f0000000200)=0x10) rename(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='./file0\x00') r7 = socket$inet_tcp(0x2, 0x1, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0xfd7) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) rfork(0x1000) sendto(r7, 0x0, 0x0, 0x80, 0x0, 0x0) freebsd11_fstat(r1, &(0x7f0000000000)) setsockopt$inet_mreqsrc(r3, 0x0, 0x48, &(0x7f0000000100)={@broadcast, @multicast1, @loopback}, 0xc) 5.710167779s ago: executing program 1 (id=176): r0 = socket$inet(0x2, 0x1, 0x6) syz_emit_ethernet(0x2e, &(0x7f0000000000)={@random="9f4c4662c957", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x20, 0x68, 0x0, 0x1, 0x2, 0x0, @rand_addr=0x7, @multicast2=0xe0000001}, @icmp=@generic={0x11, 0x88, 0x0, '\x00\x00\x00\x00\x00\x00\x00\x00'}}}}}) listen(r0, 0x0) mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) select(0x40, &(0x7f0000000040)={0x97c, 0x1, 0x5, 0x5, 0x2, 0x9, 0x4, 0x9db4}, &(0x7f00000000c0)={0x6, 0x8, 0x2, 0x9, 0x4, 0xff, 0x4, 0x100000001}, &(0x7f0000000100)={0x8, 0x7, 0x68, 0x3, 0x5, 0x8623, 0x4, 0xdc4}, &(0x7f0000000140)={0x8, 0x101}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) setsockopt$inet_int(r1, 0x0, 0x4b, &(0x7f0000000080)=0x2, 0x4) fstat(r0, &(0x7f00000004c0)) 5.560027594s ago: executing program 4 (id=177): socket$inet6_sctp(0x1c, 0x5, 0x84) r0 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r0, 0x0) recvmsg(r0, &(0x7f0000000500)={&(0x7f0000000080)=@in={0x10, 0x2, 0xffffffffffffffff, @multicast1}, 0xffffffffffffffbf, &(0x7f00000003c0)=[{&(0x7f00000002c0)=""/106, 0x6a}, {&(0x7f0000000340)=""/109, 0x6d}], 0x2, &(0x7f0000000540)=""/240, 0xf0}, 0x80) r1 = kqueue() open(&(0x7f00000000c0)='./file0\x00', 0x201, 0x0) lio_listio(0x0, 0x0, 0xfd40, &(0x7f0000002c00)={0x1, 0x413, @sigval_int, @ke_flags}) setitimer(0x40000, &(0x7f0000000280)={{}, {0x1}}, 0x0) ktrace(&(0x7f0000000200)='./file0\x00', 0x4, 0xd27d43220c7df9b, 0x0) kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) r2 = socket(0x2, 0x1, 0x0) r3 = socket$inet6_sctp(0x1c, 0x1, 0x84) listen(r3, 0xb7c5) freebsd10_pipe(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) close(r4) accept4(r3, 0x0, 0x0, 0x0) aio_cancel(r5, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x1, &(0x7f0000000040)=0x7, 0x4) socket$inet_sctp(0x2, 0x1, 0x84) openat$crypto(0xffffffffffffff9c, 0x0, 0x100000, 0x0) r6 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_group_source_req(r6, 0x29, 0x55, 0x0, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x2000000, 0x0) ioctl$MDIOCDETACH(0xffffffffffffffff, 0xc1c06d01, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x3, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x8, 0x10000, 0xe12, 0x0, 0x0, 0x1, 0x0, 0x1146, 0x8d, 0x0, 0x0, 0x0, 0x8000, 0x40000, 0x0, 0x0, 0xdf8, 0xaca, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x4, 0x3, 0x40000, 0x0, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, 0x0, 0x0, 0x1, 0x6, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffd9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xfffffff7, 0x80000000, 0x0, 0x0, 0x0, 0x3, 0xffffffff, 0x3]}) ioctl$BIOCFEEDBACK(0xffffffffffffffff, 0x8004427c, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x10040) socket(0x1c, 0x1, 0x0) openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) 5.557145476s ago: executing program 1 (id=178): syz_emit_ethernet(0x4e, &(0x7f0000000100)=ANY=[@ANYRESOCT=0x0]) symlink(&(0x7f0000000080)='.\x00', &(0x7f0000000240)='./file0\x00') syz_emit_ethernet(0xfef2, &(0x7f0000001740)=ANY=[@ANYBLOB="86c6bb25da5d173f8aaaaaaaaaaaaaaaaaaaaaaaaa08060001080006040001aaaaaaaaaabbac1400aa007ae53166f7758b45bbd0ba99200dafc69098f1ad953a88152c19a7a80465268e1a90a811a98991c635229814cedad126d6269efa7c553487756b689ea43d937e8d0954ef7bc117d1ac2c254b5686325a95fae7970f9df72493398595699d26fed8b6452275e426899ed57d28e3a73e3eeb484b31834ef4ec72e7ead7899658b00cb2a7304e15f907182febafeef39108c5516aef970e1b94e9261e"]) unlink(&(0x7f0000000040)='./file0\x00') open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0xe) symlink(&(0x7f0000000080)='./file0\x00', &(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r0 = open$dir(&(0x7f0000000240)='.\x00', 0x400000, 0x1c4) r1 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r1, r0, &(0x7f00000005c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x20000410) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = kqueue() kevent(r3, &(0x7f0000000280)=[{0x0, 0xfffffffffffffff9, 0x8009, 0x40000000, 0xe8c5, 0xd6fa, [0x0, 0x0, 0xa, 0x40000200000000]}, {0x6, 0xfffffffffffffff4, 0x4082, 0x8, 0x1, 0x4, [0x2, 0x0, 0x1, 0x4a31]}, {0xc, 0xfffffffffffffffa, 0xc0, 0x10, 0x3, 0x0, [0x7, 0x8, 0xa62, 0x81]}, {0x5, 0xffffffffffffffff, 0x90, 0x2, 0x2, 0x5, [0x0, 0x80, 0x16, 0x3]}, {0x7, 0xfffffffffffffff5, 0x41, 0x20, 0x1, 0xe, [0x8, 0x8, 0xef4e]}, {0x5, 0xffffffffffffffff, 0x4, 0x2, 0x1, 0xfffffffffffffffe, [0x0, 0x3, 0x9, 0x8000]}, {0x100009, 0xfffffffffffffff8, 0x68, 0x80000400, 0x9, 0x4, [0xcc1, 0x9, 0x3, 0xfffffffffffffffe]}], 0x7, 0x0, 0x0, 0x0) mount(0x0, 0x0, 0x4000050, 0x0) sigaction(0x6, &(0x7f0000000200)={&(0x7f0000000340)="f30f2dadad000000c4e1f55f9b00080000f08794a0e4553810c4e2e5bf51c63e263e660f380755b1c4e189c1a240490000c481fe700600660f3a41828bcf0000def3ec326de3516cb69989999908", 0x8, {[0xfffff801, 0x50e5, 0xfffffffe]}}, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000002c0)="f6aba91bebb5f6e7eb965d00c146a92e1d207f9b70474d8074e3f3eb6d6d25c648b74d0b0798f9484545b4cf5c2bbb56138cfe8cf42ec2f3952a31ab7c129c8a744626f5d3428730b788c02793a9483794183b093b0595d3243f092f69ecda68a0aabb9e29c044b298ecd37f95911f93c2147b17180a63b598430ed1257f67670570f4fdedcadb", 0x87}], 0x1, 0x3) lio_listio(0x0, 0x0, 0x0, &(0x7f0000000a00)={0x1, 0x6, @sival_ptr, @spare=[0x101, 0x3, 0x0, 0x2e1, 0x7, 0x3, 0x5, 0x8]}) setgroups(0x0, &(0x7f0000000280)) r4 = socket$unix(0x1, 0x2, 0x0) sendmsg$unix(r4, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000880)=ANY=[@ANYBLOB="60000000ffff000003"], 0x8c, 0xebe8c28519378e35}, 0x0) setgroups(0x0, 0x0) sysarch$I386_CLEAR_PKRU(0xd, 0x0) syz_emit_ethernet(0x2106, &(0x7f0000000140)=ANY=[@ANYRES32=r2]) close(0xffffffffffffffff) r5 = kqueue() kevent(r5, &(0x7f0000000000), 0x20b89, 0x0, 0xffff3955, 0x0) fork() sendto$unix(0xffffffffffffffff, &(0x7f0000000140)="b10005019000e80348031bc75786ca900f0e08fecea11ea8fef96e", 0x1b, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 5.430048603s ago: executing program 3 (id=179): setsockopt$inet6_sctp_SCTP_RTOINFO(0xffffffffffffffff, 0x84, 0x1, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000140), 0x200, 0x0) r1 = kqueue() syz_emit_ethernet(0x3e, &(0x7f00000001c0)=ANY=[@ANYBLOB]) kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000080)={@random="8f6f77ede655", @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "5f6ad9", 0x48, 0x3a, 0x0, @rand_addr="3bcc3f0600000058132fa13a8be186e3", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "06c33e", 0x0, 0x2b, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, [@dstopts={0x2b, 0x1, '\x00', [@pad1, @pad1, @padn, @ra={0x5, 0x2, 0x1}]}]}}}}}}}) r2 = socket$inet6(0x1c, 0x1, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x19, &(0x7f0000000040)='z', 0x30dd458e3b66443e) freebsd11_mknod(0x0, 0x1000, 0x0) r3 = open$dir(&(0x7f0000000400)='./file0\x00', 0x40000400000002c6, 0x0) fcntl$lock(r3, 0x16, &(0x7f0000000000)={0x570}) socket$inet6_udp(0x1c, 0x2, 0x0) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r4, 0x29, 0x52, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x100000}}, {{0x1c, 0x1c, 0x1, 0x246, @ipv4, 0x2}}}, 0x108) setrlimit(0x7, &(0x7f00000001c0)={0x1}) setreuid(0xee00, 0x0) fork() cpuset(&(0x7f0000000140)) socket$inet6_udp(0x1c, 0x2, 0x0) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) sync() 5.122845746s ago: executing program 2 (id=7): syz_extract_tcp_res(&(0x7f0000000040)={0x41424344, 0x41424344}, 0x531, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3, @empty=0xe0000000}, 0x10) rfork(0x1000) syz_emit_ethernet(0x151, &(0x7f0000000380)=ANY=[@ANYBLOB="aaaaaaaaaaaaf7bf474271478100340086dd638d4f8c01172e0000000000000000000000000000000000bd4d69050e7412c63f32ca42e9f7412811000000000000000401010401090000160000000002000005020007040104003800000500000000fe8000000000000000000000000000aa5806004000000000fe8000000000000000000000a18500000000000000000000728cb8caf66e0000000000000001ff0200000000000000000000000000012800000000000000000100010200000063000000000000004c0600440000000000000000000000000000000000000001ff020000000000000000000000000001fe80000000000000002200089078068250dceb17487770acfe7ea3442ac0619f83df73162ad05d2161cdef9d86e23438ee0f223b46e06c0bc809c969a15c79b7d635fe5f1b04e569b4f2cde99ae78ba0339116021207eb7bd4fbe2346d000000000000000000007b5a2d67dd526e"]) syz_emit_ethernet(0x76, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa70080000000708004416002e0068000100519078ac1400aaffffffffd404d32a940600000006830702ac1400bb9406000000f8830b0600000000ac1400bb008323000000000000000001ffffffffac1400bb0000000000004e204e23", @ANYRES32=r0, @ANYRES32=0x41424344, @ANYBLOB="614001ff9078000603030600"]) syz_extract_tcp_res(&(0x7f0000000000), 0x6, 0x79) 2.335374813s ago: executing program 4 (id=180): symlink(&(0x7f00000003c0)='.\x00', &(0x7f0000000140)='./file0\x00') open(&(0x7f0000000080)='./bus\x00', 0x10280, 0x9) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) open$dir(&(0x7f0000000200)='./bus\x00', 0x1, 0x1a8) getegid() socket$inet_icmp_raw(0x2, 0x3, 0x1) __realpathat(r0, &(0x7f0000000080)='./bus\x00', &(0x7f0000000140)=""/5, 0x5, 0x0) r1 = kqueue() r2 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x50, &(0x7f00000000c0)={0x5, {{0x1c, 0x1c, 0x0, 0x0, @rand_addr="ff356b6b700f76a2ac1ff23b4d26661b", 0x100000}}, {{0x1c, 0x1c, 0x1, 0x246, @ipv4, 0x2}}}, 0x108) r3 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) mmap(&(0x7f0000119000/0x3000)=nil, 0x3000, 0x0, 0x12, r3, 0xa000000000000000) kevent(r1, &(0x7f0000000040), 0x7fffffff, 0x0, 0xfffffffb, 0x0) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x5) fork() fcntl$lock(0xffffffffffffffff, 0xc, 0xfffffffffffffffe) __cap_rights_get(0x0, 0xffffffffffffffff, 0x0) kqueue() r4 = kqueue() kevent(r4, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000f00)={0xfd7, [{0x3, [0x8, 0x6, 0x7, 0x6, 0x1, 0x0, 0xffffffff, 0x5, 0x80, 0x8, 0x500, 0x6, 0x2000, 0x80000000, 0x7, 0x0, 0x6, 0x7, 0x2, 0x0, 0xfff, 0x10001, 0x1000, 0x8, 0x4d97, 0xff, 0x101, 0x3, 0x6, 0x308, 0x6, 0x2, 0xfffffff9, 0x7, 0x7, 0xff, 0x10000, 0x2, 0x5, 0x2, 0x1, 0x3, 0x6f, 0x22df, 0x401, 0x7fffffff, 0xa7, 0xc, 0x6, 0x4, 0x9d49, 0xb, 0x8001, 0x6, 0x2, 0x1, 0x7f, 0x2, 0x6, 0x80000000, 0x2, 0x96fc, 0x200, 0x0, 0xfffffc00, 0x8, 0x0, 0x1e780, 0x50, 0x8001, 0x4, 0x9, 0x7, 0xffffffff, 0xfffeffff, 0xee, 0x0, 0x8, 0x7fff, 0x0, 0x2, 0x5b23, 0x4, 0xffffffff, 0x1, 0xf05, 0x9, 0xffffffff, 0x9, 0x80000001, 0x8, 0x9, 0x4, 0x7fffffff, 0x8000, 0x2, 0x8001, 0x8, 0x4, 0x3, 0x6, 0x80, 0xb3ab, 0x9]}, {0x4, [0x4, 0x3, 0x1, 0x3, 0x80000000, 0x4, 0x400, 0xeec, 0xf557, 0x8, 0x7fff, 0x8, 0x8, 0x401, 0xb, 0xa, 0xfad6, 0x8, 0x5, 0x6, 0x40, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0xc77e, 0x8, 0x81, 0xc9, 0xa4, 0xfffffff8, 0x2, 0x921, 0x7fffffff, 0x24, 0x2, 0x370c, 0xb00, 0x4, 0x52a, 0x8, 0x7, 0xff, 0x8, 0x4, 0x370a8713, 0x9, 0x6, 0x428, 0xfffffff8, 0x2, 0x7, 0x4, 0x0, 0x5, 0xffff, 0x81, 0x0, 0x8, 0x9, 0x0, 0x7, 0x3, 0x2, 0x2, 0xff, 0x1, 0x4, 0x3, 0x7, 0x2, 0x6, 0x3, 0xbb, 0xffff, 0x8, 0x4, 0x0, 0x9, 0x7, 0x703, 0x0, 0xfffffff9, 0x9, 0x6, 0x4, 0xb32, 0x4, 0x10, 0x9, 0x40, 0x3, 0x4, 0x91, 0x0, 0x0, 0x7fffffff, 0x8, 0x66f53e15, 0x1, 0x8000, 0x4]}, {0x1, [0x826, 0x1000, 0x9, 0xffff8001, 0x3, 0xffffff77, 0x6, 0x1, 0x7, 0x0, 0x9, 0x6621, 0x5, 0x1, 0x6, 0x10, 0x3, 0x44, 0x5, 0x7f, 0x2, 0x40, 0xe, 0x10001, 0x1, 0xfffffff7, 0x80, 0x6, 0x7, 0xe51, 0x1ff, 0x2, 0x2, 0xf8000000, 0x40, 0x0, 0x400, 0x10000, 0x7, 0x1, 0x8, 0xc03, 0x3, 0x2, 0x122, 0x7, 0xf, 0x7, 0x31c, 0xcbc0, 0x81, 0x0, 0xffffffff, 0xd08, 0x5, 0x7, 0x1, 0x2, 0x8, 0x6d, 0xfb, 0x3b, 0x8, 0x8, 0x5834, 0x8, 0x7fff, 0x1, 0x4, 0x0, 0x5, 0x9, 0xaa, 0x0, 0xa, 0x4, 0x80000001, 0x0, 0x4, 0x7fff, 0x0, 0xdc5, 0x6, 0x4, 0x8, 0x8001, 0x4, 0x9, 0x9, 0x7f, 0x3, 0xd5ca, 0x7, 0x7fff, 0x1, 0x2, 0x80, 0x1d12, 0x3, 0x0, 0xfffffffc, 0xe358, 0x200, 0x5]}, {0x0, [0xfffffff6, 0xb729, 0xa, 0x9, 0x2, 0x5, 0x9, 0x6, 0x40, 0x3fc3, 0x0, 0x38, 0x72, 0x7ff3, 0x7, 0x2, 0xdcb, 0x81, 0x1, 0x7fffffff, 0x282d, 0x1ff, 0x10000000, 0x89, 0xffff0000, 0x7fff, 0x10, 0x2, 0x3, 0x4, 0xffffffff, 0xde, 0x3ff, 0x0, 0x6cd9, 0x101, 0x7, 0x1000, 0x2, 0x7f, 0x1, 0xe03, 0x7, 0x5, 0x3, 0x4, 0x1, 0x4, 0x1, 0x2, 0x7f, 0x8, 0xf, 0x9, 0x50, 0x5, 0x0, 0x0, 0x93, 0x1, 0x4, 0x2, 0x18, 0x7ff, 0xd, 0x4, 0x5, 0x7c8, 0x9, 0x9f, 0x7f2d, 0x8fa, 0x1, 0xfffffff9, 0x9a9d, 0x7f, 0x6, 0x8, 0x2e, 0x6, 0x1, 0x7f, 0x8, 0x5, 0x0, 0x0, 0x2, 0x40, 0x9, 0x7, 0xd5e, 0x1, 0x1ff, 0x7, 0x3ff, 0x10c, 0x7fff, 0x2, 0x7, 0x7, 0x1, 0x6, 0x6, 0x38]}, {0x1ff, [0x2, 0x0, 0x2, 0x2, 0x3e, 0xe, 0x401, 0xb, 0x0, 0x31, 0xad6b, 0x0, 0x5, 0x1ff, 0x3b, 0x9, 0xd, 0xfffff915, 0x574b, 0x9, 0x5, 0xfffffff7, 0xb, 0x3, 0x7, 0x6, 0xa41, 0x6, 0x7, 0x1, 0x3, 0xa, 0xfffffffb, 0x2, 0x5, 0xe0000000, 0x3, 0x80000000, 0x8001, 0xfffffff9, 0x3, 0x2, 0x553, 0x40, 0x6f4, 0x0, 0x6, 0xd, 0x7, 0x2, 0x2, 0x8, 0x100, 0xd, 0x7, 0xfffffff6, 0xc3, 0x6, 0x8, 0x9, 0x0, 0x2000, 0x3ae, 0x40000000, 0x4, 0xc08, 0x8, 0xffffffc0, 0x9, 0x10001, 0x10001, 0x0, 0x3, 0x200, 0x5, 0x5, 0x100008, 0x3, 0x1, 0x3, 0x2, 0x5, 0x7186b6e1, 0x7, 0x4, 0x10, 0x8, 0x7, 0xffffffff, 0xffffffff, 0x85f5, 0x0, 0x1, 0x800, 0x5, 0x5, 0x5, 0x80000001, 0x5, 0x8000, 0x3, 0xffffffff, 0x8, 0x1ff]}, {0x7db, [0x5, 0x7, 0x7, 0x9, 0x2, 0x6, 0x80000000, 0xffffffff, 0x6, 0x4, 0x6, 0x67d7, 0x8, 0x10001, 0xfffffffa, 0x2, 0x4, 0x6, 0xfffffe01, 0x8, 0xffffff93, 0x3, 0xa37, 0x3ff, 0x8, 0x10007c8, 0x5, 0x101, 0x8, 0x2, 0x1000, 0x0, 0x3ff, 0x1, 0x3, 0x6, 0x1f64d413, 0x5, 0x1, 0xfffffffc, 0xedf, 0x2, 0xc, 0x2, 0x8, 0x0, 0x7, 0x9, 0x149, 0x5, 0x2, 0x5, 0x7fff, 0x0, 0x70, 0x4, 0x2, 0x2, 0x5, 0xba38, 0x2, 0x7, 0x2, 0xfffffffa, 0x2, 0x2, 0x9, 0xdd, 0xff, 0x3, 0x401, 0x200, 0x0, 0x9ad, 0x6, 0x91dc, 0x7fffffff, 0x6, 0xf0ff, 0x4, 0x7, 0xff8, 0x8001, 0x0, 0x10000, 0xe, 0x5, 0x1000, 0x622, 0x6, 0x2e, 0x4, 0x4, 0x2, 0x5, 0x0, 0xe, 0xffffffff, 0xfffffff7, 0x6, 0x7f, 0x20d4, 0x3, 0x401]}, {0xdb6d, [0x8, 0x1, 0xffff8001, 0x6, 0x9, 0x0, 0x2, 0x6, 0xfffffff2, 0x7f, 0x8, 0x8, 0x7, 0xfffff755, 0x6, 0x9, 0x4, 0x5, 0x50f, 0x100, 0x6, 0x5, 0x3, 0x9e3, 0x7, 0xfff, 0x4, 0x7, 0x9, 0x8, 0x2, 0x0, 0xb4d, 0x2, 0x200, 0x4, 0x5, 0x9, 0x7df, 0x2, 0x7ff, 0x7, 0x1196, 0x2, 0x1afa, 0x7, 0xf, 0x80000001, 0x8, 0x4, 0x3, 0x1, 0x5, 0x5, 0x4, 0x9, 0x462, 0xf1, 0xffffffca, 0xad58, 0x66d, 0x7, 0x1, 0x1e, 0x5, 0x2, 0xfffffffe, 0x0, 0x5, 0x0, 0xfa, 0x701, 0x81, 0xea2, 0x3, 0x7ff, 0x8, 0xb11, 0x3, 0x1000, 0x2, 0x400, 0x1ff, 0x6, 0x101, 0x6, 0xfffffffe, 0x5, 0x1, 0x81, 0x5, 0x3ff, 0x8, 0x4, 0x4, 0x2, 0x4, 0xfffffff9, 0xf, 0x573, 0xb, 0x6, 0x5, 0x7]}, {0x0, [0x6, 0x55f, 0x7fff, 0xad3, 0x4, 0x0, 0x0, 0x6b, 0x9, 0x101, 0x8, 0x3ff, 0x5, 0x40, 0x8, 0x8, 0x9, 0x0, 0x5, 0x0, 0x3, 0x81, 0xfffffffa, 0x9, 0x401, 0xda, 0x6, 0xfffffff7, 0x200, 0x2, 0xb, 0x1, 0x3, 0x2, 0xd7, 0x0, 0x805, 0xffffffff, 0x40, 0x1, 0xd, 0x8001, 0x0, 0xaca, 0x3, 0xff, 0x5c, 0x100, 0x10000, 0x1, 0xffffffff, 0xffff, 0x40, 0x0, 0x914, 0x8, 0x7, 0x8, 0x2, 0x5, 0xa0, 0x231, 0x2ffff, 0xf1a, 0x100, 0x6, 0x4, 0x7fffffff, 0xc, 0x9, 0x7fff, 0x101, 0x8000, 0x0, 0x3, 0x4, 0x9, 0xffffffff, 0x4, 0x10000, 0x0, 0x4, 0x6, 0xe45, 0x1, 0xd, 0xd7, 0x9, 0xfffffff7, 0x6, 0x5, 0x200, 0x4, 0x5, 0x7, 0x5, 0x81, 0x8, 0x0, 0x6, 0x4, 0x8, 0xb4f, 0x9]}, {0x3, [0xfffffff5, 0x4, 0x9, 0x401, 0xd97, 0x80000001, 0x0, 0x470, 0x1, 0x6, 0x2, 0x4, 0x2f6229ce, 0x2, 0xa, 0x8, 0x7f, 0x4, 0x34, 0x9, 0x0, 0x5e, 0x7fffffff, 0xd2df, 0x54, 0x8, 0x6, 0x7ff, 0x5, 0x3, 0x6, 0x0, 0xffffffff, 0xffffffff, 0x3, 0x80000000, 0x9, 0x2, 0x18, 0x8, 0xff, 0x5, 0x9, 0x4, 0xfdb, 0x0, 0x6, 0x0, 0x6, 0x8, 0x2, 0x400, 0x8, 0x0, 0x8, 0x1, 0x401, 0x2400, 0x1, 0x5, 0x7f, 0x7ff, 0x80, 0x1ff, 0x70c, 0x9, 0x4, 0xb8, 0x1d3, 0x7fff, 0x2, 0xd74b, 0x1000, 0x8000, 0xff, 0x6, 0x10, 0xfff, 0x9, 0x1fe0, 0x5, 0x0, 0xffffff80, 0x0, 0xfd9, 0x1000, 0x6, 0xcb4, 0x7b9, 0x6, 0x4, 0x9, 0x4, 0x8, 0xfffffff7, 0x80000000, 0x80000000, 0x7f, 0x800, 0x2, 0x1, 0x1, 0x6, 0x7]}, {0x1, [0x2, 0x6, 0x5, 0x3ff, 0x9, 0x9, 0xfffffff6, 0x3, 0xfffffffd, 0x10000, 0xfffffe01, 0xfffffff7, 0xfffffffc, 0x7fff, 0xffffffb9, 0x32c, 0x9, 0x1, 0x50dc, 0x6, 0x8, 0x8, 0x2e, 0x8a05, 0x7, 0x3, 0xb, 0x1, 0xffff3c32, 0x8001, 0x2, 0xc3e0, 0x2, 0x6e31, 0x3, 0x2, 0x4, 0x8, 0x4, 0xd6, 0x0, 0x9, 0x9fc, 0x6, 0x81, 0xffffffc0, 0xc2ee, 0x6cb, 0x3, 0x35, 0x68, 0x6, 0xe28a, 0x7, 0xff, 0x8, 0x8, 0x1, 0x9f, 0x6, 0x8, 0x2, 0x4, 0xa4, 0x8, 0x7fdf, 0x1, 0xfffff001, 0x0, 0x9, 0xa, 0x274, 0x9, 0x5, 0x9a, 0x9c99, 0x81, 0xc, 0x18, 0x7, 0x0, 0x8, 0x10, 0x7, 0x6, 0x8, 0xff, 0x6, 0x7, 0x4, 0x8, 0x2, 0xaa37, 0x8, 0x5, 0x8, 0x1f, 0x4, 0x2, 0x1, 0xd, 0x1, 0xb9, 0x4]}, {0x0, [0x0, 0x5, 0x1, 0xe, 0x8000, 0x3, 0xafc, 0x401, 0x6, 0x8, 0x0, 0x8fa, 0x7f, 0xfffffff6, 0x120000, 0xff, 0xb4, 0xc, 0x6, 0x7ff, 0x5, 0x100, 0x10001, 0x3, 0x9, 0x101, 0xffffffff, 0xc, 0x8001, 0xc, 0x5, 0xa227, 0x5, 0x3ff, 0x1, 0x4, 0x1, 0x8, 0x2277, 0x7, 0xe9, 0x3, 0x1, 0x0, 0x2000, 0x8, 0x6, 0x1, 0x3, 0x3, 0x8, 0x5, 0x400, 0xaec, 0xfffffff7, 0x8c86, 0x9, 0x0, 0x8, 0x8, 0xe, 0xa, 0x3, 0x40, 0x10080, 0x1, 0x46, 0x1, 0x82, 0x5, 0x5, 0x7, 0x184, 0xc3f2, 0xfffffffb, 0x8, 0x3, 0x5, 0xfffffff8, 0x0, 0xa436, 0x81, 0x4, 0x6, 0x7, 0x0, 0x0, 0x3b9, 0xb81a, 0x7, 0x1, 0x3, 0xffffffff, 0x8, 0xe, 0xffffa46a, 0x7fff, 0x0, 0x2, 0x201, 0x4, 0x1, 0x436f95d4, 0x1]}, {0x5, [0x0, 0xffffffff, 0x0, 0x5, 0x7, 0x2, 0x2, 0x7ff, 0x438, 0x2, 0x83, 0x4, 0x8, 0x10001, 0x5e54, 0x4, 0xd, 0x8, 0x4b, 0x3, 0x9, 0x7000000, 0x3, 0x8, 0x1, 0x10001, 0xf39a, 0x17, 0x5, 0xd94f, 0x87a9f2b, 0x4, 0x8, 0x9, 0x6, 0x4, 0x7, 0x4, 0x2, 0x10000, 0x8, 0x4e2, 0x10, 0x0, 0xd, 0x9, 0x0, 0x1, 0x4, 0xda, 0x28, 0x10001, 0x29, 0xff, 0x7, 0x61a, 0x3, 0x6, 0x5, 0x0, 0x3, 0x6, 0x7ff, 0x3b0, 0x4, 0x3, 0x2, 0x0, 0xc34c, 0xd, 0xe1, 0x5, 0x6, 0x6, 0x8001, 0x3, 0x80000001, 0x8, 0x69e, 0x4, 0xd, 0x0, 0x3, 0x2, 0x4, 0x0, 0x7fffffff, 0x5, 0x0, 0x5, 0x3, 0x5, 0x2, 0x88, 0x81, 0x6, 0x10001, 0x8, 0x7f, 0x200, 0x0, 0x3, 0x4, 0x8]}, {0x4000000, [0x80, 0x9, 0x0, 0x4, 0x2, 0x2, 0x6, 0x7, 0xff, 0x10001, 0x7, 0x2, 0x3, 0x3, 0x9eca, 0xc9, 0x9, 0xff, 0x7f, 0xfffffff8, 0xa250, 0x6, 0x92, 0x6, 0x3, 0x5, 0x1, 0x4, 0x3, 0x94, 0x1, 0xfffffff9, 0x800, 0x9, 0x2, 0xf8, 0xcca, 0xffffff01, 0x5c, 0x2, 0x10, 0x4, 0xd, 0x15f5, 0x9, 0x4, 0x5, 0xfffffffa, 0x2, 0xe0000000, 0x8001, 0x9, 0x1, 0x8, 0xc327, 0xfffffffe, 0xea, 0x9, 0x9, 0x8000, 0x2, 0x8000, 0x8, 0x3ff, 0x5, 0x4, 0x5, 0x81d2, 0x4, 0x6, 0x40, 0x9a, 0x5, 0x0, 0x7ff, 0x6, 0x1, 0x718f, 0x3, 0x6, 0x3, 0x4, 0x8, 0x8001, 0x200, 0x802e, 0x2, 0x5, 0x10000, 0x8, 0x101, 0x1, 0xd, 0x9, 0x0, 0x0, 0x7, 0x3, 0xf57a, 0x1ff, 0xff, 0x1, 0x12a, 0x9]}, {0x6, [0x5, 0xfffffc01, 0x6366, 0xf, 0x4, 0x432, 0x3, 0xba6c0000, 0x0, 0x7, 0x4c000000, 0x3, 0x0, 0x3ff, 0x2, 0x4, 0xcc39, 0x473, 0x3, 0x6, 0x3, 0xb, 0x6, 0x0, 0x7ff, 0x6d0, 0x187e9fac, 0x7, 0x18, 0x3, 0x1, 0x2, 0xfffffffb, 0x1, 0x6, 0x4, 0x5, 0x4, 0x8, 0x88, 0x0, 0x80000000, 0xb, 0x4, 0x9, 0x40, 0x7, 0xd8b, 0x502e, 0x7, 0x7, 0x4, 0x6, 0xffffffff, 0x8, 0x1, 0x1ff, 0x97f, 0x310, 0x3, 0xcc0, 0x5, 0x169a, 0x10000, 0x43ad4fa3, 0x2, 0x9, 0x6, 0x401, 0xf, 0xffffff7f, 0x4b8a, 0x8, 0x7, 0x8ca9, 0x3, 0x9, 0xd7, 0x374, 0x8, 0x5, 0x4, 0x3, 0x5, 0x7fff, 0x7, 0x800, 0x0, 0x4, 0x10001, 0x80000001, 0x7fff, 0x7, 0xc9, 0x800, 0x9, 0x80, 0x8, 0xd2, 0x2, 0x1, 0x0, 0x8330, 0x9]}, {0x200, [0x784e2393, 0x4, 0x6, 0x9, 0xedf, 0x1, 0x3, 0x101, 0x9, 0x0, 0x101, 0x10, 0xf, 0x1, 0xc5, 0xa588, 0x0, 0xe, 0x6, 0x2, 0x0, 0x8, 0xe, 0xa, 0x8, 0x2, 0x7e, 0x0, 0x6, 0x80000000, 0x77, 0x2, 0x1000, 0x199, 0x2, 0xbf63e0, 0x0, 0xc6, 0x0, 0x400, 0x2, 0x140, 0x5, 0x6, 0x0, 0x9, 0xc7, 0x3c, 0xffffffff, 0x0, 0x5, 0x0, 0x8, 0x3, 0x2, 0x3486238e, 0x0, 0x7, 0xffffffff, 0xd93, 0x6, 0x2, 0x8, 0xfb6, 0x7, 0x5, 0x2, 0x1, 0x1, 0x80000001, 0x9, 0xc, 0x3, 0x8, 0xd6b, 0x36, 0x6, 0xb8, 0x0, 0x9, 0xc, 0x0, 0x7, 0x6, 0x69e1, 0x100, 0x4, 0xfe, 0x4800000, 0x612, 0xfffffff8, 0xbe1, 0xe, 0xffffff7f, 0x5a8, 0x8001, 0x4e8a095, 0xe, 0x9, 0xffffffff, 0x3, 0xbbe, 0x5, 0x50]}]}) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000200)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaabb86dd6000001500882cffe1aaa2241dc0fb000000000000000178ff02000000000000000000000000000102009078000000066718deb30000710100000000000000000000000000000001000000000000000000000000000000000606000400000000000000000000000000000000000000010000007e5b4ae23edc63d1208f5a21d2df5300000000000000000000000001ff01000000000000000000000000000170000700000000004b0200050000000000"]) write(0xffffffffffffffff, &(0x7f00000000c0)="d5", 0xfde7) dup2(0xffffffffffffffff, 0xffffffffffffffff) poll(&(0x7f00000003c0), 0x0, 0x0) syz_emit_ethernet(0x2e, &(0x7f0000000080)=ANY=[@ANYBLOB="9f4c4662c957ffffffffffff08004500007f200068000001029078000000f1df000001117465ad1c00000000000000"]) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4b, &(0x7f00000001c0)=0xffffffff, 0x4) posix_fallocate(r5, 0x0, 0x8) posix_fallocate(r5, 0x0, 0x10007) 2.328676753s ago: executing program 1 (id=181): pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x200000000000032f, &(0x7f0000000040)=[{}]}) mkdirat(0xffffffffffffffff, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(&(0x7f0000000080)='./file0\x00', 0x0) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') cpuset_setid(0x2, 0xffffffffffffffff, 0x0) cpuset(&(0x7f0000000300)) r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendmsg$inet6_sctp(r0, &(0x7f0000000080)={&(0x7f0000000340)=@in6={0x0, 0x1c, 0x2, 0x3, @local={0xfe, 0x80, '\x00', 0x0}, 0x9}, 0x10, &(0x7f0000000300)=[{&(0x7f0000000100)="1f6765946d212f8112ba7b115a0262b63d48a648f4b402f42e12dcde5f96bf73bc4d7fb1"}, {&(0x7f0000000200)="3f1aef3032bdc2ce299b8d334e1b6cb17100bbc22eb5e8d3a46b0c8e988c5a0234fd6e1718a0937bc35e162d97cb8c310411f6609740bb5a7a27654eb874458fe470fd79a290769666b8e5f92d29e6194a34949ab9e5c88f52baa6eadb2b0e34df73bd591164e533e42adbc2a3cd79463d8e4f5327269d649250924121c97cb98f5603f59f8f4c35ffac66002ef7a87bfc656ab94dfaf7d01be9fe860bdd6ec0", 0xa0}], 0x2, &(0x7f0000000500)=ANY=[@ANYBLOB="140000008400000001000000400000268b0ed8917daa43b979e92e09590006000300300000008400000008000000050000002c00000084000000020000000300e5f8351700eaa5202300000000000005000000010000000800ff0006010000226de70e19e151d17a2a5514b1afb68d708584de53a81469bbdef2e9c920afc4d638169cc5d001b98d3a334e1a912f6db070d56d27aa0c6068d435ac8436e8b8af73df3970673ff96b9bee60b35418d3cec258cf3ca1776d8a7101270e55c43b6427428a4a511d193b471b62488e87b917a7017511dd6ae6f8c8d51d8de9c3a774e4398bccdc22f663ddbdd1c65b052e70ae45b6bf9cf38b98bf886414157aede57f4b26f49d066bfd320933140bd13aff7e5d181261f570ad051651b73b6db3efebfa6081ad9efb5005c31f8ece9ca63d5c7101d221304501aea72c76a8854415cf7bec0cbec500db9a080bff1f4282c86bf6f4dfa3ae72f9f6cd24431aa6ef9c85147c964954ff6c369117a5da029819f6c1a9de74f7cb849dc8607ad7c600aafa55054980642b9b5ddc02233f76801ac64045db606fc1f04ad3c79883f41dd15ef3b8c0d1055e2e2977911b3b1fde762f95216b50740fb604e8b1a613e13a5080e60d7bcbd0fa885aaf28f88007b97d137c5b1cb77cb20d3220e217c98975d09501c1fc7bee37934d7b63652f2da1211cf5689aa8753957a8125211a2f7506a4b01d5b5568bf6cd8b7c", @ANYBLOB="14000000840000000700000001000000db070000", @ANYBLOB="2c0000008400000002000000d800810020000000ff0f000008000000ffffff7f42a2000002000000", @ANYRES32=0x0, @ANYRESOCT, @ANYRES16], 0x90, 0x20014}, 0x0) 2.319403256s ago: executing program 3 (id=182): socket$inet6_udplite(0x1c, 0x2, 0x88) getsockname(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000001b00)={r0, 0x80000001, &(0x7f0000000040)="e2", 0x1, [0x40000, 0x21ff], 0x0, 0x0, 0x0, {0x0, 0x4, 0x0}, {0x0, 0x18, @sival_ptr=0x400, @spare=[0x1, 0x2, 0x0, 0x33518c07, 0xdca4, 0x7fffffff, 0x6]}}) openat$filemon(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) shmat(0x0, &(0x7f0000ffd000/0x1000)=nil, 0x2000) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x2, 0x0, @remote={0xac, 0x14, 0x0}}, 0x10) cap_rights_limit(0xffffffffffffffff, 0xffffffffffffffff) r2 = kqueue() freebsd11_kevent(r2, 0x0, 0x0, &(0x7f0000001ac0), 0x0, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$MDIOCATTACH(r3, 0xc1c06d00, &(0x7f0000000780)={0x0, 0x2, 0x0, 0x0, 0x10001, 0x8, 0x6, 0x0, 0x0, 0x0, 0x0, [0x2, 0xfffffffe, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, 0xfffffffb, 0xf22, 0x0, 0x6, 0x0, 0x0, 0x0, 0x10001, 0x0, 0x0, 0x46d, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x8, 0xffffffff, 0x0, 0x2, 0x14, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x6, 0x0, 0x2000, 0x4, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x9, 0x0, 0x5]}) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1a, 0x0, 0x0) rfork(0x3000) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000140)=ANY=[@ANYBLOB="ffffffffffff00000000000008004500005c0000000000019078e0000002e00000020b00907800007e004000000200000004ffffff7f7f000001ac1400aa891700ac1400bb00000000ffffffffac1400bbac1400bb830300890f000000000600000000e0000002000000"]) sync() aio_waitcomplete(0x0, 0x0) ioctl$MDIOCDETACH(0xffffffffffffffff, 0xc1c06d01, 0x0) socket$unix(0x1, 0x1, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r5 = socket$inet6_udplite(0x1c, 0x2, 0x88) sendto$inet6(r5, 0x0, 0x0, 0x40181, &(0x7f0000000080)={0x1c, 0x1c, 0x2, 0x201, @remote={0xfe, 0x80, '\x00', 0x0}}, 0x1c) syz_emit_ethernet(0x4a, &(0x7f00000005c0)={@local, @remote, [], {@ipv4={0x800, {{0xa, 0x4, 0x0, 0x12, 0x3c, 0x0, 0x0, 0x0, 0x1, 0x0, @local={0xac, 0x14, 0x0}, @multicast1, {[@generic={0x0, 0xf, "c2519f21a4b2125b7e9f091b61"}, @rr={0x7, 0x3, 0x4}]}}, @icmp=@timestamp={0xd, 0x0, 0x0, 0x3, 0x2, 0x7ff, 0x4, 0xfffffffc}}}}}) socketpair(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) recvfrom(r6, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) 1.199416373s ago: executing program 4 (id=183): r0 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r1 = open$dir(&(0x7f00000001c0)='./file0\x00', 0xa182fdacd32160a9, 0x0) socket$inet6_udplite(0x1c, 0x2, 0x88) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f00000004c0)=@file={0xa, 0x1, './file0\x00'}, 0xa) r3 = accept4$inet6(r0, 0x0, &(0x7f0000000040), 0x20000000) mkdir(&(0x7f0000001040)='./file0\x00', 0x1) r4 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) r5 = socket$inet6_tcp(0x1c, 0x1, 0x0) getsockopt$inet6_buf(r5, 0x29, 0x32, 0x0, &(0x7f0000000000)) freebsd11_fstatat(r4, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200), 0x200) accept$inet6(r3, &(0x7f00000000c0)={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @mcast1}, &(0x7f0000000100)=0x1c) r6 = socket$inet6_sctp(0x1c, 0x1, 0x84) r7 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$BIOCLOCK(r7, 0x2000427a) ioctl$BIOCSETZBUF(r7, 0x800c4281, 0x0) r8 = kqueue() r9 = socket$inet_sctp(0x2, 0x1, 0x84) r10 = openat$crypto(0xffffffffffffff9c, 0x0, 0x8, 0x0) ioctl$CIOCGSESSION2(r10, 0xc040636a, &(0x7f0000000440)={0x28, 0x0, 0x18, &(0x7f00000000c0)="3c9e89526b1700b07f82ee18e15b4e73e47f022de5aa3505", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x0, 0xc]}) r11 = fcntl$dupfd(r10, 0x11, r9) ioctl$CIOCCRYPT(r11, 0xc0306367, &(0x7f0000000300)={0x0, 0x2, 0x40, 0x8203, &(0x7f0000000000), 0x0, &(0x7f0000000040)}) kevent(r8, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x0, 0x0) setsockopt$inet6_sctp_SCTP_FRAGMENT_INTERLEAVE(r6, 0x84, 0x10, &(0x7f0000000000)=0x6, 0x4) r12 = openat$md(0xffffffffffffff9c, &(0x7f0000000700), 0x800, 0x0) ioctl$MDIOCATTACH(r12, 0xc1c06d00, &(0x7f0000000500)={0x0, 0x7, 0x1, 0x0, 0x5, 0x2, 0xfffffffc, 0x5, 0x3dc, 0x401, &(0x7f0000000780)='/dev/input/eventN\x00', [0x81, 0x8e, 0x5, 0x10005, 0x7fb, 0x4, 0x2, 0x6c, 0x181, 0x757, 0x3d4a, 0x4, 0x4, 0x6, 0x9, 0x8187, 0x6, 0x7, 0x0, 0x7f, 0x3ff, 0x4, 0xebf1, 0x5, 0x2, 0x2, 0x1, 0x1, 0x9, 0x10000, 0x10be, 0x7, 0x0, 0x5, 0xfffffffe, 0x8, 0x8, 0x51, 0x6, 0x7f, 0x0, 0x7, 0xa04, 0x5, 0x4, 0x1, 0x8, 0x1, 0x2, 0x3, 0xfffffff0, 0x2, 0x1000, 0x1, 0xc, 0x7f, 0x8, 0x7, 0x81, 0x8, 0x5, 0x5683, 0x9, 0x4, 0x3, 0xfffffff8, 0x8, 0x10001, 0x1, 0x200, 0x5, 0x1, 0x80000001, 0x6, 0x9, 0x2, 0x3, 0x5, 0x81, 0x2, 0x2b7, 0x1, 0x8, 0x5, 0x2e94, 0xdb, 0x0, 0x38b378fa, 0xb, 0xfff, 0x0, 0x7fff, 0x2, 0x2, 0x0, 0x9]}) mkdir(&(0x7f0000000300)='./file2/file0\x00', 0xc2) 1.079885278s ago: executing program 1 (id=184): setresgid(0xee00, 0xee01, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000080)={'freebsd\x00', 0x4}, 0x24) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = kmq_open(&(0x7f0000000080)='./file0\x00', 0x200, 0x102, 0x0) fchown(r0, 0x0, 0x0) r1 = getegid() r2 = getegid() setresgid(0x0, r2, r2) fstat(r0, 0x0) setresgid(0x0, r1, r1) select(0x0, 0x0, 0x0, 0x0, 0x0) thr_suspend(&(0x7f0000000000)={0xfffffffffffffffe, 0x6}) mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x40000) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) msync(&(0x7f0000860000/0x600000)=nil, 0x600000, 0x2) madvise(&(0x7f00009d6000/0x600000)=nil, 0x600000, 0x3) mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0e99db6de761f86, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f00000007c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f00000010c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', 0x0, &(0x7f0000002c80)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10\a\x00b\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsK2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85\x81=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,e\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h?\xa9\xbbW:\xa1\x95\xd0\xb8\xcc\x0f<\x88\b\x8a\x1d\xa1\xdc3d\xe7\xec\xa5\xb5(\xfc\xf9\x98\x1d\xc6\x14r\xca\x8d\x03\xca\xf5H\xf9\x8e\x7f\xad\xfan\'\xa8g\xda\x1a\xa3kM\x86\xef:\x92]\xde\xea\xae\xce\x98\x9f9\xe2\vZ%\xc5B\x91[b\xb5X\xed\\\xbd\xbbY@\xc5\xea!\x9a\x92E\x8cZ\xe3/^\xf4\x83\'\b\xdd\xd0\xd4L\xe9P62\xd7f\xf0\xdf\xdd\xc5V\xf7O,T\x90\x19\f\xbf\xf09lz=\x16\xb0\x8e,\xa3UhO\x7fa\x95iJ\xc8\xe8\xa3A\x7f\x9b\xf4\xadj} \xffX\x877\x11\r\x12ZS*\xae\xac\x04\xda\r\xa6d\xd9\xc1\xef\xa1R\xee\xf2\xd7\x02j\xf4\xc9\x93\xf2\xd8D\xb3y\xd1\xfe\xba\x17\xb9\xd9\xc6\xbb\xd7\x91\xd2\x822\x86\x94\x03\xd8\x9b\x1d#Q6\x00\\*\xeb!*\xae\xfd\xcf\xcd\xc6\xe5\xbb\xb0\xb1\x90\x89\x90\x02\xfc\x9c\x1fq\xb6S>X\xfe\ni\x82eg\x8e\xb0\x9dn\xb1\x84\x97{\xb7\x956\xbbm\xb6\xd4*\xd7<\n\xb7\x10\xc0\xab\x17\x87\"\xd0\xd3\xeb= \xf9\xf6\xe2'], &(0x7f0000000580)=[&(0x7f0000000100)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84U\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f00000026c0)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h?\xa9\xbbW:\xa1\x95\xd0\xb8\xcc\x0f<\x88\b\x8a\x1d\xa1\xdc3d\xe7\xec\xa5\xb5(\xfc\xf9\x98\x1d\xc6\x14r\xca\x8d\x03\xca\xf5H\xf9\x8e\x7f\xad\xfan\'\xa8g\xda\x1a\xa3kM\x86\xef:\x92]\xde\xea\xae\xce\x98\x9f9\xe2\vZ%\xc5B\x91[b\xb5X\xed\\\xbd\xbbY@\xc5\xea!\x9a\x92E\x8cZ\xe3/^\xf4\x83\'\b\xdd\xd0\xd4L\xe9P62\xd7f\xf0\xdf\xdd\xc5V\xf7O,T\x90\x19\f\xbf\xf09lz=\x16\xb0\x8e,\xa3UhO\x7fe\xdb\xc35\xf7\x1ed\x9b\x7f\x9b\xf4\xadj} \xffX']) mprotect(&(0x7f0000d9c000/0x4000)=nil, 0x4000, 0x2) 1.074221557s ago: executing program 3 (id=185): r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$BIOCLOCK(r1, 0x2000427a) select(0x40, &(0x7f0000000080)={0x0, 0x8000000000000001, 0x8, 0x100000001, 0xffff, 0x8000000000000000, 0x2, 0x8}, &(0x7f0000000100)={0xfa, 0x2, 0x8, 0x276374ce, 0x7, 0x8001, 0x4}, &(0x7f0000000140)={0x3, 0x7, 0x2, 0x8, 0x9, 0x2, 0xb85, 0x3}, &(0x7f00000002c0)={0x6, 0x9}) ioctl$BIOCSETZBUF(r1, 0x800c4281, 0x0) r2 = kqueue() r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = semget$private(0x0, 0x3, 0x8) semop(r4, &(0x7f0000000440)=[{0x2, 0xffff}], 0x1) semop(r4, &(0x7f0000000480)=[{0x2, 0x46, 0x1000}], 0x1) r5 = openat$crypto(0xffffffffffffff9c, 0x0, 0x8, 0x0) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, &(0x7f0000000000)={0xb, 0x25, 0x43, &(0x7f0000000340)="0b6b59ff030300000089e808d09a8a46dbe8d754f7205f53332dcada273c5a3fa0da60f9feeaea89e9f0078999b206773fb01b870fbfddc1b6e0a8709cfec89bb0f4c6", 0x0, 0x0, 0x0, 0x7d86699a, [0x3, 0x201, 0x0, 0x3]}) ioctl$CIOCCRYPT(r6, 0xc0306367, &(0x7f0000000180)={0x0, 0x1, 0xfffe, 0x10, &(0x7f0000000600), 0x0, 0x0, &(0x7f00000006c0)}) ioctl$CIOCGSESSION2(r5, 0xc040636a, &(0x7f0000000440)={0x28, 0x0, 0x18, &(0x7f00000000c0)="3c9e89526b1700b07f82ee18e15b4e73e47f022de5aa3505", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x0, 0xc]}) r7 = fcntl$dupfd(r5, 0x11, r3) ioctl$CIOCCRYPT(r7, 0xc0306367, &(0x7f0000000300)={0x0, 0x2, 0x40, 0x8203, &(0x7f0000000000), 0x0, &(0x7f0000000040)}) kevent(r2, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) open(&(0x7f0000000000)='\x00', 0x6000000, 0x105) socket(0x1, 0x1, 0xea) setsockopt$inet6_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000000)=0x6, 0x4) r8 = openat$md(0xffffffffffffff9c, &(0x7f0000000700), 0x800, 0x0) ioctl$MDIOCATTACH(r8, 0xc1c06d00, &(0x7f00000007c0)={0x0, 0x7, 0x1, 0x0, 0x5, 0x2, 0xfffffffc, 0x5, 0x3dc, 0x401, &(0x7f0000000400)='/dev/input/eventN\x00', [0x81, 0x8e, 0x5, 0xf79, 0x7ff, 0x4, 0x2, 0x6c, 0x181, 0x757, 0x3d4a, 0x4, 0x4, 0x6, 0x9, 0x8187, 0x2, 0x7, 0x0, 0x83, 0x3ff, 0x4, 0xebf1, 0x5, 0xfffffffe, 0x2, 0x2, 0x1, 0x9, 0x10000, 0x10be, 0x7, 0x0, 0x5, 0xfffffffe, 0x8, 0x4, 0x51, 0x6, 0x7f, 0x0, 0x7, 0xa04, 0x5, 0x4, 0x1, 0x8, 0x1, 0x2, 0x3, 0xfffffff0, 0x2, 0x1000, 0x1, 0xc, 0x7f, 0x8, 0x7, 0x83, 0x8, 0x5, 0x5687, 0x9, 0x4, 0x3, 0xfffffff8, 0x8, 0x10001, 0x1, 0x200, 0x5, 0x1, 0x80000041, 0x6, 0x9, 0x2, 0x2, 0x5, 0x81, 0x2, 0x2b7, 0x1, 0x8, 0x5, 0x1002e94, 0xdb, 0x0, 0x38b378fa, 0xb, 0xfff, 0x0, 0x7fff, 0x2, 0x10000, 0x0, 0x9]}) r9 = socket(0x1c, 0x1, 0x0) bind$inet6(r9, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r9, 0x29, 0x1b, &(0x7f0000000040), 0x4) mkdir(&(0x7f0000000300)='./file2/file0\x00', 0xc2) rename(&(0x7f00000000c0)='./file2\x00', 0x0) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) 500.012875ms ago: executing program 3 (id=186): r0 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r2 = socket(0x1c, 0x1, 0x0) bind$inet6(r2, &(0x7f00000000c0)={0x62, 0x1c, 0x3, 0xfffffffb, @loopback}, 0x1c) r3 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r3, 0x0) ftruncate(r3, 0x107d2) fspacectl(r3, 0x1, &(0x7f0000000100)={0x0, 0xffff}, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty, 0xfffffffc}, 0x1c) mount(&(0x7f0000000040)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r4 = open$dir(&(0x7f0000000240)='./file0\x00', 0x2000000, 0x126) sendto$inet6(r2, &(0x7f0000000280), 0x0, 0x20001, 0x0, 0x0) sendfile(r4, r2, 0x1, 0x0, 0x0, 0x0, 0x19) mount(&(0x7f0000000000)='msdosfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f00000001c0)) open$dir(&(0x7f00000016c0)='./file0\x00', 0x40000, 0xa0) open$dir(0x0, 0x202, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) procctl$PROC_PROTMAX_STATUS(0x0, 0x0, 0x10, &(0x7f0000000080)) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000040)='./file0\x00') chdir(&(0x7f0000000080)='./file0/file0/..\x00') setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x33, &(0x7f0000000140)={0xa, 0x2, 0x0, 0x1, 0x0, [@local={0xfe, 0x80, '\x00', 0x0}]}, 0x18) bind(0xffffffffffffffff, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2, 0x0, @empty, 0x2}, 0x1c) ktrace(&(0x7f0000000200)='./file0\x00', 0x4, 0xd27d43220c7df9b, 0x0) cap_enter() bindat$unix(0xffffffffffffff9c, 0xffffffffffffffff, &(0x7f0000000240)=@file={0xa, 0x1, './file0\x00'}, 0xa) 234.207043ms ago: executing program 2 (id=7): syz_extract_tcp_res(&(0x7f0000000040)={0x41424344, 0x41424344}, 0x531, 0x1) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) bind$inet(r1, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$sock_int(r2, 0xffff, 0x10000, &(0x7f0000000340)=0xff, 0x4) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) bind$inet(r2, &(0x7f0000000000)={0x10, 0x2, 0x3, @empty=0xe0000000}, 0x10) rfork(0x1000) syz_emit_ethernet(0x151, &(0x7f0000000380)=ANY=[@ANYBLOB="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"]) syz_emit_ethernet(0x76, &(0x7f0000000080)=ANY=[@ANYBLOB="aaaaaaaaaaaa70080000000708004416002e0068000100519078ac1400aaffffffffd404d32a940600000006830702ac1400bb9406000000f8830b0600000000ac1400bb008323000000000000000001ffffffffac1400bb0000000000004e204e23", @ANYRES32=r0, @ANYRES32=0x41424344, @ANYBLOB="614001ff9078000603030600"]) syz_extract_tcp_res(&(0x7f0000000000), 0x6, 0x79) 0s ago: executing program 1 (id=187): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) r1 = socket$unix(0x1, 0x5, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0\x00', 0x62) select(0x40, &(0x7f0000000000)={0xd2, 0x3, 0x4, 0xffffffffffff86d6, 0x1, 0x6, 0xdb4, 0x202fc110}, 0x0, 0x0, &(0x7f0000000a80)={0xfffffffffffffbff, 0x9}) pwritev(r1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) open(&(0x7f0000000380)='./file1\x00', 0x2, 0x0) getsockopt$inet6_sctp_SCTP_DELAYED_SACK(0xffffffffffffff9c, 0x84, 0xf, 0x0, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000040)="c8", 0x1}], 0x1, 0x0}, 0x0) freebsd10_pipe(&(0x7f0000000040)={0xffffffffffffffff}) ioctl$DIOCNATLOOK(r2, 0x8004745b, &(0x7f0000000080)) socket(0x1c, 0x1, 0x0) ktimer_create(0x4, 0x0, 0x0) r3 = kqueue() kevent(r3, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) r4 = socket(0x2, 0x3, 0x2) openat$filemon(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) setsockopt$inet_tcp_int(r4, 0x6, 0x8, 0x0, 0x0) vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f00000047c0)={0x1, 0x8, @sival_ptr, @spare}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) kevent(0xffffffffffffffff, &(0x7f0000000000)=[{0x4, 0xfffffffffffffffe, 0x8085, 0x1, 0x0, 0x0, [0x0, 0x0, 0x0, 0x1]}], 0x1, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x6, 0x0}) sysarch$I386_GET_LDT(0x0, &(0x7f0000000000)={0x0, 0x0}) open$dir(&(0x7f0000000180)='./file1\x00', 0x10000, 0x81) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)={0x6b3, 0x1}) bind$inet(r4, &(0x7f00000001c0)={0x10, 0x2, 0x2}, 0x10) setsockopt$inet_tcp_int(r4, 0x6, 0x22, 0x0, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.0.56' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe00077e8800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP ifaddr cache = 0xfffffe006e511780 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 tap2: link state changed to DOWN tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP vnode_pager_putpages: zero-length write at 0 resid 4096 0xfffffe006e59c528: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83716b20 usecount 0, writecount 0, refcount 35 seqc users 0 hold count flags () flags (VIRF_PGREAD|VI_DOINGINACT|VMP_LAZYLIST) v_object 0xfffffe005410aaa8 ref 0 pages 264 cleanbuf 12 dirtybuf 21 lock type ufs: EXCL by thread 0xfffffe0054113780 (pid 865, syz-executor, tid 100142) nlink=1, effnlink=1, size=1048576, extsize 0 generation=3ac61825, uid=0, gid=0, flags=0x60091 ino 94, on dev gpt/rootfs ifaddr cache = 0xfffffe006e511600 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP ifaddr cache = 0xfffffe0059ad9900 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff800 tap2: link state changed to DOWN tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP Expensive callout(9) function: 0xffffffff81a3fea0(0xfffffe007772c000) 0.006700547 s arp: packet with unknown hardware format 0x217 received on tap3 ifaddr cache = 0xfffffe0059ad9c00 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP Warning! syz-executor[923] uses SF_SYNC sendfile(2) flag. Please follow up to https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=287348. To be removed in FreeBSD 16 ifaddr cache = 0xfffffe005860a180 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 if_delmulti_locked: detaching ifnet instance 0xfffffe006ddff000 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: link state changed to UP ifaddr cache = 0xfffffe0059ad9a80 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 tap2: link state changed to DOWN tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP vnode_pager_putpages: zero-length write at 0 resid 131072 0xfffffe0077709528: type VREG state VSTATE_CONSTRUCTED op 0xffffffff83716b20 usecount 7, writecount 4, refcount 35 seqc users 0 hold count flags () flags (VIRF_PGREAD|VV_MD|VMP_LAZYLIST) v_object 0xfffffe00540e78b8 ref 1 pages 264 cleanbuf 12 dirtybuf 21 lock type ufs: EXCL by thread 0xfffffe0054102780 (pid 962, syz-executor, tid 100278) nlink=1, effnlink=1, size=1048576, extsize 0 generation=a9e3f417, uid=0, gid=0, flags=0x40008 ino 116, on dev gpt/rootfs ifaddr cache = 0xfffffe0059ad9900 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP ifaddr cache = 0xfffffe0059ad9480 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP syz-executor uses obsolete way to create divert(4) socket ifaddr cache = 0xfffffe006e511600 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP ifaddr cache = 0xfffffe0059ad9900 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 if_delmulti_locked: detaching ifnet instance 0xfffffe006de00800 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP ifaddr cache = 0xfffffe006e510000 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058572000 tap2: link state changed to DOWN WARNING pid 1071 (syz-executor): ioctl sign-extension ioctl ffffffff80000000 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP ifaddr cache = 0xfffffe006e510000 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058571800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571800 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0058571800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571800 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP attempted source route from 172.20.3.170 to 172.20.3.170 ifaddr cache = 0xfffffe006e50fa80 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP md3: truncating fractional last sector by 1 bytes ifaddr cache = 0xfffffe006e50f900 is deleted tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP ifaddr cache = 0xfffffe006e510000 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP ifaddr cache = 0xfffffe006e50fa80 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe006de00000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570800 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP Accounting enabled arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) ifaddr cache = 0xfffffe006e50f900 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP ktrace write failed, errno 27, tracing stopped for pid 762 ktrace write failed, errno 27, tracing stopped for pid 1 ktrace write failed, errno 27, tracing stopped for pid 766 ktrace write failed, errno 27, tracing stopped for pid 764 ktrace write failed, errno 27, tracing stopped for pid 942 ip6_ctloutput: mbuf limit hit ifaddr cache = 0xfffffe006e50f300 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 tap2: link state changed to DOWN if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058571000 md4: truncating fractional last sector by 1 bytes tap2: Ethernet address: 58:9c:fc:10:62:8a tap2: link state changed to UP ifaddr cache = 0xfffffe006e50f900 is deleted if_delmulti_locked: detaching ifnet instance 0xfffffe0058570000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570000 tap2: link state changed to DOWN SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: too many calls in output slot=64 (errno 1: Operation not permitted) SYZFAIL: child failed (errno 0: No error: 0) SYZFAIL: repeatedly failed to execute the program proc=2 req=7 state=3 status=67 (errno 35: Resource temporarily unavailable) ktrace write failed, errno 27, tracing stopped for pid 758 ktrace write failed, errno 27, tracing stopped for pid 760 ktrace write failed, errno 27, tracing stopped for pid 681 pid 1234 (syz-executor), jid 0, uid 0: exited on signal 8 (no core dump - coredumpsize limit is 0) if_delmulti_locked: detaching ifnet instance 0xfffffe0058570000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058570000