last executing test programs: 4.170734821s ago: executing program 1 (id=154): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$DIOCRADDADDRS(r1, 0xc0184415, &(0x7f0000000a80)={{"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", "00005200090000000000000000fbff0400000000aa0000100033a900"}, 0x0, 0x0, 0x0, 0x1, 0x20000002, 0x8, 0x0, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000100)={'bbr\x00', 0xd09}, 0x24) mount(&(0x7f0000000080)='cd9660\x00', 0x0, 0x0, &(0x7f0000000100)) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20180, &(0x7f0000000180)={0x1c, 0x1c, 0x0, 0xe4e, @rand_addr="ffec83c6f0467e2e4af30815500e5f7b", 0x5}, 0x1c) ioctl$FILEMON_SET_FD(0xffffffffffffff9c, 0xc0045301, &(0x7f0000000000)=r2) r3 = socket$inet6(0x1c, 0x1, 0x0) setsockopt(r3, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r3, 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x2e, &(0x7f00000001c0)={@empty}, 0x14) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x0, 0x8, @loopback, 0x800}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)="0207000302000300000001008f24cec3", 0x10, 0x188, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)="0207000302000300000001008f24cec3", 0x10, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 3.318684823s ago: executing program 1 (id=161): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$DIOCRADDADDRS(r1, 0xc0184415, &(0x7f0000000a80)={{"df4509000000000000006152843806587e7ee1bd3970459cb2cbee8401dfc33320b75ccfd729a25b38df20b45c678215f49f53e09510b4b6914adcbc90ab07184b0ad82cd7384ed6c40686e93601819fb0b534d30b825c4b6f32dd0aeb13594b1d5d6ed4cd50ba75aa99251bd476be7ed22a9b2f9d35db8e7d6672a9caba297d7ca6d23a0605562b94441d0c29b7be1f9685a2536b2a38da8c2d5eb87f3c489a956ed8ee3698d520ef8001008bc3429a67e0865de9152749003cfcabeeda083606cd1decd7b9eac2f2b36dc8848d9ec57747f51da25acd9070f37b11ac8c6f031bea2d6ec44f4222f106f1fbb9711ecce444ef7ffb7edc53bed1149ead739c6d68e8a449eab0e678af021a9b565da5ab53a4d452cc890b61412baaf8ebb313f553cbf95f715ee19e907bb0caed501e48a6651f799b8257d03a2298d92002049ee5b0cc7980794513eda1fe9483c9a7fe0d64bd813e7e4218d8fa8550d94e2341d21d7f410af62c9ea1827e6249af29ce2e96cfc6028576160b54a9622dc58b62a876d399c1094a20683e8e091bd1ed2c7045a949a70a0000000000530eef192c1b713216c8c677fff95d9104097a3da48d674e5fb106e6b1c79639a341f4191044ae3ae1dbc112f1c1574d3cf8fd148326dd5e7d73b6940978413f5198caa090c0a4541775bff5851e09f5d6bfc7bf5b4902a282709216bda29d6c6aa64446aaeead04633f0dcd83c4b8794c6ab96362e9f7780b82e8627f9298430855b151bc2c2f7bc9bfc1c9486388103f62e96bcbd87fec7d2f8b460f5973493a987bbafe8200000000595a645af34a594644dd369be6c42dcc99d9306f5fd7f963675bfe9aa133b7ec8d578f21e878a5f29d56af3887f8b5bc09e1363848e7ad02a9b1a4ad1da369869cfc2103e13588d249b8c0aab32534c4b6f1fbce459ce19f75f5153107c2884c6740bc04843b3f844d147061f4ccbe717d479bd934f8308c560ecd81ad1ded939926794889b64e42c16830c07c99325f0e69c9daeded96af750e3894b819592f9fe1a6ecb7a9b99253ba4e8b4673dd4b14c7da84bd4e020080f18c3d07031cb9501828b6fc6eae4e94717d8cd8d9bd7f4d16653d5ac50a53858493fd7a747e35868ad247ce1865f8397827bdb2ff4dbda235b81813214a96ffc7db32dee1656be4fa080b61aab0b70a0646ef2d98106742fc28efd8c4858c4464b2a3f2c3d9b9df3832af68b77ba8ad698eddae6c38d90709c11b4e962ae43ad62d987a7b292be9c00b4467308bc6c921ef9a4653883602c38c1fba148f3f1e1117ba61e080eb3991d8e8205b8e999adf52ab01cec50ec27d4c11b100", "00005200090000000000000000fbff0400000000aa0000100033a900"}, 0x0, 0x0, 0x0, 0x1, 0x20000002, 0x8, 0x0, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000100)={'bbr\x00', 0xd09}, 0x24) mount(&(0x7f0000000080)='cd9660\x00', 0x0, 0x0, &(0x7f0000000100)) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20180, &(0x7f0000000180)={0x1c, 0x1c, 0x0, 0xe4e, @rand_addr="ffec83c6f0467e2e4af30815500e5f7b", 0x5}, 0x1c) ioctl$FILEMON_SET_FD(0xffffffffffffff9c, 0xc0045301, &(0x7f0000000000)=r2) r3 = socket$inet6(0x1c, 0x1, 0x0) setsockopt(r3, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r3, &(0x7f0000000280)={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x2e, 0x0, 0x0) sendto$inet6(r3, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x0, 0x8, @loopback, 0x800}, 0x1c) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)="0207000302000300000001008f24cec3", 0x10, 0x188, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)="0207000302000300000001008f24cec3", 0x10, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2.859188463s ago: executing program 0 (id=164): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$DIOCRADDADDRS(r1, 0xc0184415, &(0x7f0000000a80)={{"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", "00005200090000000000000000fbff0400000000aa0000100033a900"}, 0x0, 0x0, 0x0, 0x1, 0x20000002, 0x8, 0x0, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000100)={'bbr\x00', 0xd09}, 0x24) mount(&(0x7f0000000080)='cd9660\x00', 0x0, 0x0, &(0x7f0000000100)) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20180, &(0x7f0000000180)={0x1c, 0x1c, 0x0, 0xe4e, @rand_addr="ffec83c6f0467e2e4af30815500e5f7b", 0x5}, 0x1c) ioctl$FILEMON_SET_FD(0xffffffffffffff9c, 0xc0045301, &(0x7f0000000000)=r2) r3 = socket(0x1b, 0x3, 0x0) r4 = socket$inet6(0x1c, 0x1, 0x0) setsockopt(r4, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r4, &(0x7f0000000280)={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x2e, &(0x7f00000001c0)={@empty}, 0x14) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x0, 0x8, @loopback, 0x800}, 0x1c) sendto$inet6(r3, &(0x7f0000000180), 0x0, 0x188, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000180)="0207000302000300000001008f24cec3", 0x10, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 2.737612283s ago: executing program 2 (id=166): socket$inet6_udp(0x1c, 0x2, 0x0) open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000180)={'bbr\x00'}, 0x24) close(0xffffffffffffffff) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1, 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2) fork() setgroups(0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)) sysarch$I386_SET_LDT(0x1, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_group_source_req(r1, 0x29, 0xc, &(0x7f00000004c0)={0x7ff, {{0x1c, 0x1c, 0x2, 0x0, @rand_addr="65cb31df060000a0d7603666ab2f3df4"}}, {{0x1c, 0x1c, 0x1, 0x0, @mcast2}}}, 0xfc) rfork(0x85000) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) sysarch$AMD64_SET_PKRU(0x89, 0x0) r2 = socket(0x1c, 0x1, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) sysarch$I386_GET_IOPERM(0x3, &(0x7f0000000240)) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) sysarch$I386_SET_LDT(0x1, &(0x7f0000000200)={0x1, &(0x7f0000000040)=[{0x8f1f}], 0x1}) getsockopt$inet_mreq(r0, 0x0, 0x18, 0x0, &(0x7f0000003e40)) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', &(0x7f0000000140)="60029ba40b17654701378516e4cde5beff4bb49b7f4a8eb42a6a810a8c7c6e776f226944f21879f180273e20f55c32d5fb000000000000000088fe71ed14272651c3629a468bf96f81", 0xff22) extattr_set_link(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f00000002c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) setrlimit(0x8, &(0x7f0000000000)={0xb35f, 0x800000b35d}) 2.474187935s ago: executing program 1 (id=167): r0 = __specialfd$eventfd(0x1, &(0x7f0000000080)={0x1, 0xfffffffb}, 0x8) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f00000000c0)=0x7, 0x4) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x6b, 0x11, 0x200000000000001, 0xf2}], 0x206, 0x0, 0x1, 0x0) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0xd, 0x0) r2 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_buf(r2, 0x6, 0x402, &(0x7f00000000c0)="08bea7c2", 0x4) r3 = socket(0x1, 0x1, 0x0) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) readv(r4, &(0x7f0000000540)=[{0x0}], 0x1) bind$inet6(r4, &(0x7f0000000140)={0x1c, 0x1c, 0x2, 0x10, @empty, 0xfffffffb}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x1, &(0x7f0000000000)={0x1c, 0x1c, 0x2, 0x7, @remote={0xfe, 0x80, '\x00', 0x0}, 0x2000008}, 0x1c) sendmsg$unix(r3, &(0x7f0000000d00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000ff217db64a00c93235dc384e451844ff00000100000093ed5b05967b660fd6d873f69a0819b8e65d9efe12ee911ade61634ea35704d5af46044e7ecc25444dd1148635895e33b075db8aebb8d41f80ddc7a17acd", @ANYRES32=r1, @ANYRES16=r1, @ANYRES32=r3], 0x18, 0x80}, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000000180)=ANY=[@ANYBLOB="fffffffffbffaaaaaaaaaaaa86dd60cc58da00280000fe8000000000050000000000000000aaff0200000000000000000000000000012c000003000000003a00000000000000880090780300"/94]) ioctl$KDGETMODE(r3, 0x40046676, 0x22e00000) 2.060788832s ago: executing program 0 (id=168): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1, 0x1, 0x4) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0xfffffc00, 0x8, 0x8, 0x9, 0x9}, 0x14) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) getsockopt$inet6_sctp_SCTP_EVENT(r0, 0x84, 0x1e, &(0x7f0000000180)={r1, 0xe, 0x87}, &(0x7f00000001c0)=0x8) r2 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) freebsd11_stat(&(0x7f0000000000)='./file0\x00', 0x0) fcntl$lock(r2, 0x16, &(0x7f0000000080)={0x570}) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x11a) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = fcntl$dupfd(r4, 0x0, r4) sendfile(r3, r5, 0x0, 0x400000000000, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0, 0x10) r6 = openat$kbd(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) kqueue() openat$kbd(0xffffff9c, &(0x7f0000000080), 0x40, 0x0) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00001) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) socket(0x1, 0x1, 0x4) (async) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0xfffffc00, 0x8, 0x8, 0x9, 0x9}, 0x14) (async) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) (async) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000100)={0x0, 0x5}, &(0x7f0000000140)=0x8) (async) getsockopt$inet6_sctp_SCTP_EVENT(r0, 0x84, 0x1e, &(0x7f0000000180)={r1, 0xe, 0x87}, &(0x7f00000001c0)=0x8) (async) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) (async) freebsd11_stat(&(0x7f0000000000)='./file0\x00', 0x0) (async) fcntl$lock(r2, 0x16, &(0x7f0000000080)={0x570}) (async) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) (async) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) (async) open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x11a) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) (async) fcntl$dupfd(r4, 0x0, r4) (async) sendfile(r3, r5, 0x0, 0x400000000000, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0, 0x10) (async) openat$kbd(0xffffff9c, &(0x7f0000000000), 0x20000, 0x0) (async) kqueue() (async) openat$kbd(0xffffff9c, &(0x7f0000000080), 0x40, 0x0) (async) ioctl$KDGETMODE(r6, 0x40046676, 0x22e00001) (async) 1.929019474s ago: executing program 3 (id=170): fhstatfs(&(0x7f0000000000)={{[0x0, 0xd]}, {0x8, 0xfff, "79eb2199efa5ffc125933bd631905bac"}}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) r1 = getuid() setreuid(r0, r1) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = fcntl$dupfd(r2, 0x3, r3) writev(r4, &(0x7f0000000540)=[{&(0x7f0000000580)="50c8063ae12db90decb10c928b0485a3d184f1efbcc1a87e850cd3389dd0bae96d4bd619b41454a64f451843e9f14019f72765f11685e430fb75eaf6e3377a841c56b9538c20b53fbe847eac5685b7238348145040fe9aed30523e3a0495ea81f1299715f49b415bdf1ac665d2f9301894eec819e4eebcdc4c81f4f52c4a42397588c3a9c434e0437ad4ec4e0521d475998676ccd3f660734e0e5de1bc7cfc441856b854b7ec53f17ebb7e1dec6d22a840ca7078ecf6e83e7a9f9071c98542", 0xbf}, {&(0x7f0000000100)="d62ccac59133a5c8cab307976ab1f0edcfa993e345a8f96f2b4cd7720ea9ba6d9b0e02670df48724fd36da35eef75ca2f4a0e2e6c48d714f343569f2", 0x3c}, {&(0x7f0000000140)="abd464df87f1adf3469e12faa68f3a77876e27b8033a07043cf77e52dd80878f92566d12d00ae69c54227bbf9f6c893851d142d729a231bc5dd658716332a49fdd06481a5666a8deee11c165e4afd95c8245d7ca6c82efa8b76ca6789cb00c04206ef9696dba1496adbfe446caaf72928a65022ffa82b72255688eda450088fc8110d95f641b7315168fef0a6d71cdf629583468e2ca34daf4", 0x99}, {&(0x7f0000000200)="4b53f0dc799c7b850339adbbba2c32becba097d381a37f40c96c51579826d6caa8d59bf5b3d42f267cf4f1f6a7825937ab897b5d24ba2feeef444491abaf35ef5abeaaf68e83ba2ada87be58a60b10cef0c1bbd7482655db47e81690c16f50914843b52523677f82c326f1a09d84ad8dd060e82232c19458e18ad2630cc85579504e9b5ff7b951e058ae49964f8dda8d00200ba14de022d5af77cd6c4e6994275a5653e71a0f1ba199bfca7437d4d973408de3c688488ff0ae825b4d5f13b71f9aa4ffa162bd260483796fa1b44af7abfd408290f5102abb11ec3f2169e55db400b31dbe69a3191683a1d1fd3a9851801b", 0xf1}, {&(0x7f0000000300)="6172275f439516e9ff0c732684f18d23b07ce4541d2189b859a0dfdda86ed739f1c9dc791ff06afffaf430c7a94c92c06a96981a81244b6b1efdf8cffac16a8abecdb91ee2584073eb9caea479e5fe0320ce7e64cf33bf197df9b457c3d058306d5a57b18a4ed6ccb587c88cca35d9118f9cdd422f3867d10fdf5bbdb3f0837f969c54756b01a090310e4d33d03af124f95f8c59e915309a2dbfcfece4023e892ea04d352601a7b8c19b654c9caada", 0xaf}, {&(0x7f00000003c0)="e389e3a3fef26a8544c91551b3f5dbbbf10266263019a96c3ecc6bca268f9bec2817e25c75a2ec720d5eafd41b87108a76293f8b7eab98339dd52c84cf15e66222fbc6f7899444e4a4fd208aec6f90ac7b43b9b55d2fd4930ab5b2", 0x5b}, {&(0x7f0000000440), 0xfd53}, {&(0x7f0000000480)="7dc5ec7304fac17258d65d4e0f68874751d70dc9412500197c8eb472f7a7ea324a34348717bfde3afb771cdf1c256dc5929c3947a1d3acd83ed082bdeb9b972c1e39556e5702dba61c1547dc275b5536612f030eb4a2d4eaffaab4add1cde8e05beb380a90f9e746932c62095ab50edca7ae8090fff8e5a904924fe53753c6c2d1695cf847138a45f9bc4c97", 0x8c}], 0x8) 1.909098352s ago: executing program 3 (id=171): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) (async) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) aio_readv(&(0x7f0000000580)={r1, 0xfffffffffffffffe, 0x0, 0x0, [0x0, 0xfffffff7], 0x7fff, 0x0, 0xa, {0xffffffff, 0xfffffffe, 0x0}, {0x1, 0x1f, @sival_ptr=0xf9f, @spare=[0xc98, 0x2, 0x5, 0x1, 0x7, 0x4, 0x5, 0x2]}}) setsockopt$inet_mreqsrc(r0, 0x0, 0x46, &(0x7f0000000080)={@multicast2, @remote={0xac, 0x14, 0x0}, @loopback}, 0xc) (async) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f0000000180)={@multicast2, @remote={0xac, 0x14, 0x0}}, 0xc) (async) setsockopt$inet_mreqn(r0, 0x0, 0xd, &(0x7f0000000040)={@multicast2, @local={0xac, 0x14, 0x0}}, 0xc) (async) r2 = socket(0x1, 0x1, 0x0) (async) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="b1000501600000e9df0000c181", 0xd, 0x808, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async) r3 = socket(0x11, 0x3, 0x9) sendto$unix(r3, &(0x7f0000000000)="b1000504000004000000000001000000331c13fecea10500fef96ec0c72fd3357ae30200004e3003000000acf20b7804be38164991f7c8cf5f882b297be1aa0500000051e2f0ad3ebbc257699a1f139b672f4d335c223e7d0c032bfa896443a42102000000720fd18bfbb670c1f5a872c881ea6e2ec5890400000000008000361b4cc702fac500002021fbfa0c0f00008abfba221554f4e0f668246c0900000008e371a3f8343712051eea040000000000", 0xb1, 0x0, 0x0, 0x0) ioctl$FILEMON_SET_PID(0xffffffffffffffff, 0xc0045302, 0x0) (async) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x200000, 0x2) openat(r4, &(0x7f00000002c0)='./file0\x00', 0x200201, 0x6a) (async) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) (async) r5 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r5, 0x0) (async) r6 = open$dir(&(0x7f0000000140)='./file0\x00', 0x10000, 0x9) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x3, 0x410, 0xffffffffffffffff, 0x0) (async) preadv(r6, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) r7 = socket(0x1b, 0x3, 0x0) sendto$inet6(r7, &(0x7f0000000180)="0216000302000300000001008fc30d4e", 0x10, 0x188, 0x0, 0x0) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) 1.872685883s ago: executing program 2 (id=172): syz_emit_ethernet(0x32, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffff"]) openat$ptmx(0xffffff9c, &(0x7f0000000e00), 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000002280)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000007240)={&(0x7f00000022c0)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x104}, 0x100) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) r2 = msgget$private(0x0, 0x8) msgsnd(r2, &(0x7f0000000100)=ANY=[], 0x4, 0x800) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r3, 0xc030636a, &(0x7f0000000040)={0x28, 0x0, 0x10, &(0x7f0000000100)="ec7b000000800008000180a5a2519798", 0x0, 0x0, 0x7fff, 0xfdf9ff81, [0x0, 0x6, 0x5]}) ioctl$CIOCCRYPT(r3, 0xc01c6367, &(0x7f00000000c0)={0x0, 0x2, 0x4, 0x0, 0x0, 0x0, &(0x7f0000000800), &(0x7f0000000800)}) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) execve(0x0, &(0x7f00000000c0)=[&(0x7f0000000080)='//\x00'], 0x0) 1.870778293s ago: executing program 0 (id=180): r0 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) fchmod(r0, 0x8) (async) fchmod(r0, 0x8) r1 = socket(0x1c, 0x1, 0x0) r2 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f0000000140)=0xe4, 0x4) syz_emit_ethernet(0x3a, &(0x7f0000000100)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08004600002cfffc000000c49078ffffff59f4604395d383ff000000018900000800000005"]) setgroups(0x0, &(0x7f0000000000)) syz_emit_ethernet(0x56, &(0x7f00000001c0)=ANY=[@ANYBLOB="a8aac824829866290ba5ffff86225a2000000014000ab2000900000000ff0200000000000000000000000000018800907800000012fecbce499d7fdfe8143606000000000000800000000000bb030121094debf6f2"]) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) (async) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) (async) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) writev(r3, &(0x7f0000000000)=[{&(0x7f0000000080)='%', 0x1}], 0x1) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, 0x0) (async) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc040636a, 0x0) execve(0x0, &(0x7f0000000000), 0x0) (async) execve(0x0, &(0x7f0000000000), 0x0) getsockopt$inet_int(0xffffffffffffffff, 0x0, 0x43, 0x0, 0x0) ioctl$KDGETMODE(r1, 0x40046676, 0x22e00000) sendto(0xffffffffffffffff, &(0x7f0000000100)="4951641fb887", 0x6, 0x80, 0x0, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) socket(0x1c, 0x10000000, 0x0) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) (async) sysarch$I386_SET_LDT(0x1, &(0x7f0000000040)={0x0, &(0x7f0000000000), 0x20000000000000bc}) pipe2(&(0x7f0000000080), 0x0) r5 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x18) (async) open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x18) r6 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) inotify_add_watch_at(r5, r6, &(0x7f0000000280)='.\x00', 0x204) open$dir(&(0x7f0000000180)='.\x00', 0x0, 0x4) (async) r7 = open$dir(&(0x7f0000000180)='.\x00', 0x0, 0x4) freebsd11_getdents(r7, &(0x7f0000000000)=""/45, 0x2d) (async) freebsd11_getdents(r7, &(0x7f0000000000)=""/45, 0x2d) ioctl$EVIOCRMFF(r6, 0x20044581) 1.787047018s ago: executing program 2 (id=173): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x8000, 0x0) ioctl$DIOCRADDADDRS(r1, 0xc0184415, &(0x7f0000000a80)={{"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", "00005200090000000000000000fbff0400000000aa0000100033a900"}, 0x0, 0x0, 0x0, 0x1, 0x20000002, 0x8, 0x0, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000100)={'bbr\x00', 0xd09}, 0x24) mount(&(0x7f0000000080)='cd9660\x00', 0x0, 0x0, &(0x7f0000000100)) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20180, &(0x7f0000000180)={0x1c, 0x1c, 0x0, 0xe4e, @rand_addr="ffec83c6f0467e2e4af30815500e5f7b", 0x5}, 0x1c) ioctl$FILEMON_SET_FD(0xffffffffffffff9c, 0xc0045301, &(0x7f0000000000)=r2) r3 = socket(0x1b, 0x3, 0x0) r4 = socket$inet6(0x1c, 0x1, 0x0) bind$inet6(r4, &(0x7f0000000280)={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x2e, &(0x7f00000001c0)={@empty}, 0x14) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x0, 0x8, @loopback, 0x800}, 0x1c) sendto$inet6(r3, &(0x7f0000000180)="0207000302000300000001008f24cec3", 0x10, 0x188, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000180)="0207000302000300000001008f24cec3", 0x10, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 1.699112548s ago: executing program 0 (id=174): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$DIOCRADDADDRS(r1, 0xc0184415, &(0x7f0000000a80)={{"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", "00005200090000000000000000fbff0400000000aa0000100033a900"}, 0x0, 0x0, 0x0, 0x1, 0x20000002, 0x8, 0x0, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000100)={'bbr\x00', 0xd09}, 0x24) mount(&(0x7f0000000080)='cd9660\x00', 0x0, 0x0, &(0x7f0000000100)) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20180, &(0x7f0000000180)={0x1c, 0x1c, 0x0, 0xe4e, @rand_addr="ffec83c6f0467e2e4af30815500e5f7b", 0x5}, 0x1c) ioctl$FILEMON_SET_FD(0xffffffffffffff9c, 0xc0045301, &(0x7f0000000000)=r2) r3 = socket$inet6(0x1c, 0x1, 0x0) setsockopt(r3, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r3, &(0x7f0000000280)={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r3, 0x29, 0x2e, &(0x7f00000001c0)={@empty}, 0x14) sendto$inet6(r3, 0x0, 0x0, 0x0, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)="0207000302000300000001008f24cec3", 0x10, 0x188, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, &(0x7f0000000180)="0207000302000300000001008f24cec3", 0x10, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 1.599158399s ago: executing program 1 (id=175): r0 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0xaa) mmap(&(0x7f0000029000/0x800000)=nil, 0x800000, 0x3, 0x20011, r0, 0x0) r1 = socket(0x1c, 0x1, 0x0) listen(r1, 0xd) r2 = dup2(r1, r1) ioctl$DIOCCHANGERULE(r2, 0x40046677, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) rfork(0x15050) bind$inet6(0xffffffffffffffff, &(0x7f0000000140)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) r3 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_udplite(r3, 0x88, 0x2, &(0x7f0000000040)=0xa, 0x4) fork() extattr_get_file(0x0, 0x0, &(0x7f0000000100)='*(([\'\x00', 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 1.595161856s ago: executing program 1 (id=176): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x8000, 0x0) ioctl$DIOCRADDADDRS(r1, 0xc0184415, &(0x7f0000000a80)={{"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", "00005200090000000000000000fbff0400000000aa0000100033a900"}, 0x0, 0x0, 0x0, 0x1, 0x20000002, 0x8, 0x0, 0xffffffffffffffff}) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000100)={'bbr\x00', 0xd09}, 0x24) mount(&(0x7f0000000080)='cd9660\x00', 0x0, 0x0, &(0x7f0000000100)) r2 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r2, &(0x7f0000000280)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) sendto$inet6(r2, 0x0, 0x0, 0x20180, &(0x7f0000000180)={0x1c, 0x1c, 0x0, 0xe4e, @rand_addr="ffec83c6f0467e2e4af30815500e5f7b", 0x5}, 0x1c) ioctl$FILEMON_SET_FD(0xffffffffffffff9c, 0xc0045301, &(0x7f0000000000)=r2) r3 = socket(0x1b, 0x3, 0x0) r4 = socket$inet6(0x1c, 0x1, 0x0) setsockopt(r4, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r4, &(0x7f0000000280)={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r4, 0x29, 0x2e, &(0x7f00000001c0)={@empty}, 0x14) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x1c, 0x1c, 0x0, 0x8, @loopback, 0x800}, 0x1c) sendto$inet6(r3, &(0x7f0000000180)="0207000302000300", 0x8, 0x188, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000180)="0207000302000300000001008f24cec3", 0x10, 0x0, 0x0, 0x0) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 1.049221971s ago: executing program 3 (id=177): open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x1fe) truncate(&(0x7f0000000040)='./file0\x00', 0x2) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x176) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) sendfile(r0, r2, 0x0, 0x400001000000, 0x0, 0x0, 0x10) 1.048522617s ago: executing program 3 (id=178): mkdir(&(0x7f0000000040)='./file0\x00', 0x0) (async) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000500), 0x82, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000040)={0x19, 0x0, 0x20, &(0x7f0000000140)="ec7b00ff42435eaa17463d8f48d4383b2d09c12d10b500"/32, 0x0, 0x0, 0x1, 0xfdf9ff88, [0x0, 0x0, 0x20000, 0x9087]}) (async) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000000)={0x0, 0x2, 0x0, 0x7f, &(0x7f00000012c0), 0x0, &(0x7f00000012c0), &(0x7f0000001240)}) (async) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x12d) select(0x0, 0x0, &(0x7f0000001a00)={0x5, 0x9, 0x1b, 0x1, 0x5, 0x94, 0x80, 0x5f7}, &(0x7f0000001a40)={0x5, 0xa7, 0xfffffffffffffffb, 0x5f2, 0x4, 0xbae7, 0x81, 0xd}, &(0x7f0000001a80)={0x1, 0x6}) (async) setitimer(0x1, &(0x7f0000001b40)={{0x3, 0xfffffff0}, {0x0, 0xf7}}, 0x0) (async) mkdirat(r1, &(0x7f0000000180)='./file1\x00', 0x0) (async) mount(&(0x7f0000000080)='ufs\x00', &(0x7f00000000c0)='./file1\x00', 0x400404, &(0x7f0000000140)) (async) r2 = socket(0x1b, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000180)="0204000202000300000000009fc30d4e", 0x10, 0x188, 0x0, 0x0) (async) bind$unix(0xffffffffffffffff, &(0x7f0000000040)=@file={0xa, 0x1, './file0\x00'}, 0xa) (async) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) __cap_rights_get(0x0, r3, &(0x7f0000000080)) (async) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=@file={0x5, 0x1, './file0\x00'}, 0xa) (async) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0xc74f, 0x0, 0x9, 0x5, 0x9d84, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x5, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x58bc, 0x3, 0x0, 0x1, 0x0, 0x5, 0xff, 0x7ff, 0x2, 0x1, 0x8, 0xc, 0x8]}, {0x4005c, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0xfffffffc, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x1, 0x0, 0x5, 0x3b5, 0x7f33c58a, 0x2, 0x58, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x109, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x6, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x7, 0x6, 0x2, 0x800, 0x7f, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x2, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x1, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffa, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0xc, 0xfc, 0x12, 0x80d683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x8, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912094, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124446, 0x7, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x670bb443, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x2, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x42, 0x225, 0x81, 0x5, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x2, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x101, 0xb26, 0x8, 0x81, 0x1, 0x101, 0x3, 0x3, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0x2, 0xfffe, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0xb730, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0xffffffff, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x401, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xffffdffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xfffd, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x1, 0x8, 0x3fe, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x5, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0x400, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff8, 0x1, 0x3041, 0x8, 0x8, 0x7, 0x7, 0x3, 0x7, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xe, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x8001, 0xc8, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x40]}, {0xfffffffa, [0x1ff, 0x8, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x1, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x2, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x9, 0xb28a, 0x1, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0xa, 0x7ff, 0x2005, 0x6, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x402, 0x5, 0xfffffffc, 0x0, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x9, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0xc, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0xfffffffc, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x7, 0x3, 0x8, 0x2, 0x4, 0x6, 0x2, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x1360000, 0x8, 0x80000000, 0x7ff, 0xa, 0x0, 0xfffffffd, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1002, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x5, 0x0, 0x4, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x41a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xdc]}, {0x6, [0x3, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x2, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0x401, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8c, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x7, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x9, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x0, 0x4, 0x7f, 0x0, 0x7ff, 0xa, 0x3, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x40000009, 0x6, 0x7fffffff, 0x0, 0xfffffffb, 0x7fff, 0x5, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0xffff8001, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3fb, 0xffe, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0x40, 0x80000000, 0x7, 0x7fff, 0x4, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0x0, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x6, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x9, 0x5, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x1000008, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x6, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x404, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0xfffffffe, 0x6, 0x1, 0x6, 0xff, 0x9, 0x43d, 0x2, 0x6, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x9, 0xc, 0x4a, 0x6, 0x74, 0x6, 0xa, 0x8, 0x4, 0x0, 0x8, 0x4, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0xfffffffd, 0x2, 0x1, 0xe0, 0x7fffffff, 0x0, 0x3, 0xffffffd4, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x10, 0x7, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x3ff, 0x3, 0x78aa0000, 0x0, 0x1, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0xa, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x7, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x3, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x48, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x5, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0xfffd, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x0, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0xd, 0x4, 0x3]}]}) r4 = socket(0x1c, 0x1, 0x0) link(&(0x7f0000001940)='./file0\x00', &(0x7f0000001980)='./file1\x00') (async) bind$inet6(r4, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x1ff, @empty, 0x5}, 0x1c) (async) listen(r4, 0xd) syz_emit_ethernet(0x56, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa86dd00000100002000ff0427290384487dfb114d2cdb1c2e523b8a000000000000bbfe800000000000000000000000006ba006400003", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="600200439078000004020000"]) (async) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@file={0xa, 0x1, './file0\x00'}, 0xa) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) (async) open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) (async) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x1a38, 0x0) (async) __getcwd(&(0x7f0000000100)=""/3, 0x3) (async) socket(0x1c, 0x1, 0x0) (async) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001880)=ANY=[@ANYBLOB="10000000ffff000006"], 0x10}, 0x0) (async) socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) 1.010749177s ago: executing program 3 (id=179): mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x6) fhstat(&(0x7f0000000140)={{[0x5c8951ac, 0x33ea9983]}, {0x800, 0xf, "0008000000000e00eeffffffaf6c80f8"}}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) getresuid(0x0, &(0x7f0000000040)=0x0, 0x0) sync() setresuid(r1, 0x0, r1) chdir(&(0x7f0000000080)='./file0\x00') fhstatfs(&(0x7f0000000180)={{[0xdd1d66ce, 0x8001]}, {0x5b7, 0x801e, "100307000300000000001c006e3df600"}}, &(0x7f00000003c0)) freebsd11_mknod(&(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x672cda28f543e327, 0x3) chdir(&(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') pipe2(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) setsockopt$inet6_group_source_req(r0, 0x29, 0x54, &(0x7f0000000e00)={0x1, {{0x1c, 0x1c, 0x1, 0x9, @mcast2, 0x6}}, {{0x1c, 0x1c, 0x1, 0x8, @ipv4, 0xfffffffc}}}, 0xfc) freebsd11_fstat(r2, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat$bpf(0xffffff9c, &(0x7f0000000000), 0x0, 0x0) mount(&(0x7f0000000000), 0x0, 0x8400004, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r4 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000300)={0x1c, 0x1c, 0x1, 0x0, @mcast1, 0x7}, 0xe4) sendto$inet6(r4, 0x0, 0x0, 0x20000, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x100, @mcast2}, 0x1c) fchflags(r4, 0x113) socket(0x17, 0x2, 0x0) fchown(r2, r1, r3) lchown(&(0x7f0000000300)='./file0\x00', r1, 0xee00) chown(&(0x7f0000000380)='./file0\x00', r1, r3) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) listen(0xffffffffffffffff, 0x14040000) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x100, &(0x7f0000000d00)=0x400, 0x4) sendto$inet(r5, 0x0, 0x0, 0xc, &(0x7f00000001c0)={0x10, 0x2, 0x0, @remote={0xac, 0x14, 0x0}}, 0x10) 942.274881ms ago: executing program 2 (id=181): r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) freebsd11_mknod(&(0x7f0000000380)='./file0\x00', 0x2000, 0x801) lio_listio(0x0, &(0x7f0000000080)=[{0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x0, [0x101, 0x7], 0x5, 0x5, 0x9, {0x0, 0x9, 0x0}, {0x4, 0x12, @sival_ptr=0x1, @spare=[0xfffffffd, 0x8, 0xd83, 0x100, 0xa, 0xe0e00000, 0x1000, 0x8]}}, {0xffffffffffffffff, 0x0, 0x0, 0x0, [0x2, 0x10000], 0x9, 0x8, 0xf, {0x4, 0x10000009, 0x0}, {0x4, 0x1, @sival_ptr=0x8}}, {0xffffffffffffffff, 0xf, 0x0, 0x0, [0x7, 0x40], 0x6, 0x6, 0x100, {0x7f, 0x9, 0x0}, {0x3, 0x10, @sival_ptr=0xffffffff, @ke_flags=0x6}}, {0xffffffffffffffff, 0xd, 0x0, 0x0, [0x0, 0x7fffffdc], 0xcbbb, 0xe204ebbace928c63, 0x3, {0x88, 0x3, 0x0}, {0x3, 0x1a, @sigval_int=0x10be223e}}], 0x4, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r2 = socket(0x1c, 0x1, 0x0) r3 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x32, &(0x7f0000000300)=ANY=[], 0x8) getsockopt$inet6_buf(r3, 0x29, 0x32, &(0x7f0000002040)=""/4096, &(0x7f0000000040)=0x1000) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x100, @mcast2}, 0x1c) syz_emit_ethernet(0x5eb, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"]) ioctl$KDGETMODE(r2, 0x40046676, 0x22e00000) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) 895.759206ms ago: executing program 0 (id=182): extattr_set_link(&(0x7f0000000000)='./file0\x00', 0x1, &(0x7f0000000040)='\xb7,\x00', &(0x7f0000000080)="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", 0x1000) r0 = dup(0xffffffffffffffff) setsockopt$inet_group_source_req(r0, 0x0, 0x54, &(0x7f0000001080)={0x2, {{0x10, 0x2, 0x2, @loopback}}, {{0x10, 0x2, 0x1, @remote={0xac, 0x14, 0x0}}}}, 0x104) r1 = open(&(0x7f00000011c0)='./file0\x00', 0x4, 0x0) fspacectl(r1, 0x0, &(0x7f0000001200)={0x3, 0x6}, 0x0, &(0x7f0000001240)) ppoll(&(0x7f0000001280)=[{r1, 0x2}, {r0, 0x1}, {r1, 0x10}, {r1, 0x40}], 0x4, &(0x7f00000012c0)={0xfffffff8, 0x8}, &(0x7f0000001300)={[0x1, 0x5c86d877, 0x81, 0x6]}, 0x10) execve(&(0x7f0000001340)='./file0\x00', &(0x7f0000001580)=[&(0x7f0000001380)='\xb7,\x00', &(0x7f00000013c0)='\xb7,\x00', &(0x7f0000001400)=')(!!}]:(%-*]-\x00', &(0x7f0000001440)='+!(\x00', &(0x7f0000001480)='#-&\\#\x00', &(0x7f00000014c0)='-/\x00', &(0x7f0000001500)='\x00', &(0x7f0000001540)='}(\x00'], &(0x7f0000001700)=[&(0x7f00000015c0)='\xb7,\x00', &(0x7f0000001600)='\x00', &(0x7f0000001640)='e}\xdd\'/\'^]%),[:\x00', &(0x7f0000001680)='.]-\x00', &(0x7f00000016c0)='\xb1*]U,\x00']) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000001740)={0x0, 0x1910, 0xc6c, 0x9, 0x0}, &(0x7f0000001780)=0x10) ioctl$KDGETMODE(r1, 0x40044b09, 0x3) r3 = dup(r1) r4 = accept4$unix(r3, &(0x7f00000017c0)=@file={0x26, 0x0, ""/36}, &(0x7f0000001800)=0x26, 0x10000000) openat$crypto(0xffffff9c, &(0x7f0000001840), 0x80, 0x0) r5 = open$dir(&(0x7f0000001880)='./file0\x00', 0x400, 0x104) faccessat(r5, &(0x7f00000018c0)='./file0\x00', 0x2, 0xf9b804c1f8c2ac2c) freebsd11_stat(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)={0x0, 0x0, 0x0, 0x0, 0x0}) fstatfs(r1, &(0x7f00000019c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, r7) setsockopt(r4, 0xfffffffa, 0x4, &(0x7f0000002300)="2431a439bcc07798288ff3c953c4abadfe760186601e9c2dd91148fa9cfdaeed5d344618396401b86627979cb0ff9870c6708c928d381cb7302af03daec5a94ff8547b429baeaff7ef9bfb7a8fd8af71653a7b5b0ff464c00a2fa2623c6755cb04622c236f87dd6759", 0x69) unlink(&(0x7f0000002380)='./file0\x00') statfs(&(0x7f00000023c0)='./file0\x00', &(0x7f0000002400)) r8 = __specialfd$eventfd(0x1, &(0x7f0000002d40)={0x7, 0xff}, 0x8) ioctl$KDGETREPEAT(r8, 0x40084b67, &(0x7f0000002d80)) r9 = open$dir(&(0x7f0000002dc0)='./file0\x00', 0x10000, 0xa3) linkat(r9, &(0x7f0000002e00)='./file0/file0\x00', r1, &(0x7f0000002e40)='./file0\x00', 0x0) setsockopt$inet6_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x26, &(0x7f0000002e80)={r2, 0x42c7}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r8, 0x84, 0x12, &(0x7f0000002ec0)={0x9}, 0x1) setsockopt$inet6_sctp_SCTP_RECVRCVINFO(r0, 0x84, 0x1f, &(0x7f0000002f00)=0xfffffff7, 0x4) socket(0x10, 0x10000000, 0x4) freebsd11_statfs(&(0x7f0000002f40)='./file0\x00', &(0x7f0000002f80)) fcntl$getflags(r8, 0x1) 798.963626ms ago: executing program 0 (id=183): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket(0x1c, 0x1, 0x0) freebsd10_pipe(0x0) sendfile(r0, 0xffffffffffffffff, 0x8, 0x2, &(0x7f0000000ec0)={&(0x7f0000000140)=[{&(0x7f0000000800)="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", 0xff}, {&(0x7f00000000c0)="5557314029e39feccbdfe1b94950ccd9d5a7", 0x12}, {&(0x7f0000000900)="ea30d60e62446c65fcb7f8b5d6781e056046d755d7ebb382ba94bc891d4c6ed445de787af8a4898d3a8d50aba41efa199aa82f52dfcc0d42c2db878fefbdf619713d5ad887f0c72402771edca74ebf28a6e6747e728cd1eb65d18ebe6f290e9e0b53f4e130dd8716aa392b4e9ae201825d0853fe6de46cc5c0b102936d0f9feca0a76c380b393d94d26c4501efd1f57d60356fce95ca3e", 0x97}], 0x3, &(0x7f0000000e80)=[{&(0x7f00000009c0)="1e83fb9de188c9d1179f6dddcf0a1d73f7d1b0fc507a083f82233142f5ff8c015657f97b59c2777d1cd9b80808ab1a996e35a2ecbed67d459e47008d679a22f33803ccb0cfc40c25dbf7e7ab59b51da77d4963950b02d25a137a1746f54ec46425bf7080700745b52bf1cc86a693f47b9f41db0d269fe78429b2d30b168738128d5c890d7a1a1d4df9e07fa158255ad7b4375996a63423ecabd2167dc01fb09ced8269b8a09ab2eeb153070d89de8418d88f92047ca0e3", 0xb7}, {&(0x7f0000000a80)="79afac122421ecfb900e65e9f63ee47fed4b9ef2d2735d8c610fc1691b1610626d1a400e8ed6fee633d1d15199fd86955803e05c74a456c72e480c8bcf5c56bf9e0acc6ff8e3fc", 0x47}, {&(0x7f0000000b00)="689d542b0aac770a01de47a2bf2fba6c83bd2cd47a2c4f4db4785bc0926d259cac2c819d3fbd78391162bc56308c7a64068c0d57135cfe248942f4b461d6ba263484912bda6c3f1a6931486d6536e1cb84f279fe390a41ce122354138e80206d799e395a2daaede2fc73aec9c60e629303804998533d12f0450e8a06307448e5f1c74e11d6f538de281c2547935378acecc8073a07cf8a48f5cc2ab571d8bad7783090702df7ecac", 0xa8}, {&(0x7f0000000bc0)="07ce2dab4d588d6592cf6a9d58d962b32ca36b277c3452af4618aeac7566a4c8fb9a0b01f1553c3ecd299801a7df5a7cefc0cc60a6ed3ae414ba99f0a7a791b933f5f9ffcd7900a378c993d81ade67eb64614de0a0856764564d1ee4a081ea4ba031bb3f858fdd1bc6b8dc97dcdc909db6cccecdc6", 0x75}, {&(0x7f0000000c40)="5cb20142f986e0c6f5a293ef83a4002bee81ac8238eb14f62a66d0781a0c73c4189150f0d090cf44e48656541b5ba45326f619911d349fe866f060d4c2544dc4909ea6e711d82f964be53f7d70e881debc7e5fede2e289740521c08abb567bfe65720c451b9b5fa7f93cd36106bb6e0ced58d783a0784a0f5e4a5f034870f9eee231ee7ae4fe1373a8ffd56dc5d94b8ba4eb453ee1fa09379bc63eae1c54", 0x9e}, {&(0x7f0000000d00)="839cf143eccede536d7f784d1c1cd7d8f8ecb9c3fc9fb6555823197c0b738938ada9395acd393231261a6207db11278fe6d116b0c7572da6b55eb2a0672cee54ccd1a162f86380c4f4f3515d41693ba69ec6cd90b3a60c389cc2caa56e851b0045a52736cfae03fb422dde8f2fdb8daebf1f1b830715b7c5dcd664c1d53efdb284d9b0629460b84cf2951885a6dbd01bd8", 0x91}, {&(0x7f0000000dc0)="4089b240fb65ffbdb8afd05dd26d2493fb7b42a896abcd577f80213fbcedf49c8934f029b90bdb2a9d691f1e79f699fe449edfa5919b25914863d311c17031cf5e8f1409d0f6f9968b4c9ae75998f1ecd2c0b874952c2b873be9f727ed73bd8d07532602291f42e66412a5b94ed8273b54a8d3feaa29d2b29c9d3696ce968c365277d50ec8b6656a156a2dadce31cae2df22e74aa8d1cf054513ad910738f22e26f7efa409e1f1db376b825487d27e5c833d5efcd461ab0b2dcdbfbebf", 0xbd}], 0x7}, &(0x7f0000000f00), 0x19) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f00000001c0)="ed", 0x1) readv(r3, &(0x7f0000000440)=[{0x0, 0x1}], 0x1) sendmsg(r1, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)=ANY=[@ANYBLOB="0c0003000036090000914c9ec4c7a3d4ccca13ef4848afc7c314c148acbfdc"], 0xc}, 0x88) ioctl$OPIO_DEADKEYMAP(0xffffffffffffffff, 0x862a6b09, &(0x7f00000001c0)={0x3, [{0x9, "305fa35305dac0ad2945ead39aad84cad2338867cfe71383d13204fc5c13d7238ff696efb62260c687be8ca879d83c20788fe7d4ec79df164926ed4f4c63c37139ae1a9751f7acae746e53525eac59e3620c31c45323194b38588f6ad29b94ff04b1f43193dbf1c5"}, {0x9, "66ac518458d8ccdef96b1795ff3dba7fc882cfba6dbb05386ac989f5f3780d3450973c7883c4915af85c391b4e7f3cb5d4e8eb289ae583023dba915d02cf63fcf892484d8b5f245005419ff41d865954e2be4fa841bbced477a586be55eae972b4e57e0a2bb119bf"}, {0x80, "6d2bf0bbde7669451d62017965e507e744fc4d3594f3e7dcbfefc8009df3e01071b338d6e3e6bd05ff979f2549a0771c9583d2d29ec81dbd6c2ab428e9e46c7475528c8474c8efa5ec65226545fdb4b58edf7bf983241b648a2532ff494aa2f2fa732322fa5663d1"}, {0x0, "32c448321e5d96011ee8c967e2ed3a933d7fa8e1f8c30036b8b6f9a174361d5240da3b66ebbb7731aed82cedd02702e1ec9f3facd90e7ab3f7129bcb9e99055ba5518b8b253ee01630e9242e7a06abf09a59576cdeaeb347d37dc18459db0261ed6a2829983c3dcc"}, {0x2, "3309a92303823e12424a6a38e93818c62b2150003540a44b0e707826549076a54a73e805da71693f508560845b7f66204ae2261e3abd31f18146418a4bfe59d3a34b48935f0b438d63b56efdec97ae9ae27e1881a9b8f6bbe42e8c3fd2548245aa17083dc2d211aa"}, {0x9, "da6f282b85eac0815657781aa6f24412f57d175f61818574f3bf84288fde9da4f2dedc9fbc9cddf0aee34f9c3b4f886b0e0e94d6174d0cde0bbf4709bc641566b70dc7c5e778c90b47d269bcb255b44c59ad48d7caf2884c82ffef3a80a6c50d477b71d4732b25b9"}, {0xfd, "0b3f0abfe9dd82d1ed5584833c82dad4ea0efdcc1dab90f7f9eb9f62e8941feddb0712e19cbb058a02cd91ea731cd46e7e84848d02fcd060387d5adf6a76a3b7e048fbdbbdbc3b780e1497666c9f61c5c63c87eb6cca6ccb629b89a0af0498343a08360ac003bdbf"}, {0xe6, "66ec98d4f3845c49cf02aa8b8445eb90593126593c788d6e606aece12abbc7372a282134eedc92e2be914c6f32b6ef46fedd531b41c836eb9c75da1b20582a19dcc213ad9615795cd07f73f1907c918403508fd8927fc4adb4e3e73c609929e32aa317a8e9ecd5fc"}, {0xc, "8319526cec91fbecbecfdf189bb2010e3b2853c476ad67e689156d80f010af3975e4f795267c1cf7f8ec07b6780c963d0452f1073b19d30c3d4eeb1e701567278ea5ae166f902db2a199035cca3d3f1be14e4888777cbbb1a6bdd84443d7506a24c43adc0b4a142f"}, {0x2, "86998766e3fb1b8e3ffebc94e6a50cb56196de584a781f1335194b2508e09a9527735e345940fa8bc362953bc972872e5b100f9c5731969f933a3b93c49d0b17b2a9325c9ae0c39bdfd9914071a06012aa122efca5581be2671e16a8ef99d63a2824fb8ed872bab7"}, {0x6, "cd65245673b9daa3dc123e7d60883e1773031cd13991893aa8db4023b991e3ded3fa33e0da7bfb968ae41328a5bcb32869fb57090312ed43e9730665c2242a9030186e9ca9d838696deb0f18f30b25e3ee8bd83281d585d45f6c93343b9022861a2a141ba0fee646"}, {0x1, "27232eec751e7821b663976f54eeb8a924ea88f2ab40d0d4f97babeb27649d518b52c13e97ef6095300eee15f2ded96a1be91d468364e9b5e97013c23b3f6fbb8f1bb22db38ae841720ab29801df45f5bba2a7090f1a3ae343c81daed6b21037f10cb3e9120b6cb8"}, {0xd, "54138d67ee9712efd832454530a136679d99957ef86971bab76c08cd1a4023d4df7033e5fe4c98e165cad5225ad514cc92b9fdf949f7152373dfbcca02a573cf70a529760eb11ef79b13c8214d75581b08fc1c67cfb60ddd551b31835b5babfa27464f724bcc48d8"}, {0xf4, "f32c1b33bf52943aec5f00a9709daae63f1bb1c5019933894253d095d5b905b1be42bc058cd4e30e058cd2de01fa5954a6483ee20b091da322664f6c8a6baa3326b0456fb67e3be005c059a754ae00c4c8a6362d16dcb22807da1ca956e60159ed70388a9f0388f5"}, {0x5, "b7a958dbc9f9796f25ac4b9b5eaa8234d683f5519791b79ff46edb861af6e7875b307724ee17b7cc99a3ef1eaec1e08f04ee9af44aeab2a12ed7efda2cd6aeecc83378eec8718884efd1b72dd5fadbb8fc52cf683f3f4724a5c86011ebcd5c4328a2c99a517a8eb5"}]}) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) rfork(0x22000) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x17, 0x0, 0x18, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798d25cd0a9cfbc8c96", 0x0, 0x0, 0x7fffffff, 0xfdffff85, [0x1, 0x0, 0xffc, 0x4000]}) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x48000101) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) symlink(&(0x7f00000004c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) writev(r5, &(0x7f0000000200)=[{&(0x7f0000000100)="19", 0x3a4e1e905c56cdb7}], 0x1) ioctl$KDGETMODE(r0, 0x40046676, 0x22e00000) 751.816756ms ago: executing program 1 (id=184): ppoll(0x0, 0x0, 0x0, 0x0, 0x0) rtprio(0x0, 0x0, &(0x7f0000000740)={0x3, 0x1}) r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r0, 0xc030636a, &(0x7f0000000080)={0x17, 0x0, 0x10, &(0x7f0000000000)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0x0, 0xfdffff85, [0x0, 0x0, 0xfff]}) ioctl$CIOCCRYPT(r0, 0xc01c6367, &(0x7f0000000280)={0x0, 0x1, 0x0, 0x40, &(0x7f0000000140), 0x0, 0x0, &(0x7f0000001400)}) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) lpathconf(&(0x7f0000000180)='./file0\x00', 0xc) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) r2 = socket(0x1c, 0x1, 0x0) accept4(r2, 0x0, 0x0, 0x20000000) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x3, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x2, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c02, 0x1, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0x0, 0xc74f, 0x0, 0x9, 0x5, 0x9d84, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x5, 0x7, 0xfffffffb, 0x1, 0x8001, 0xf, 0x4, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x1, 0x8, 0xc, 0x8]}, {0x8000, [0x5, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0xfffffffc, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x7f33c58a, 0x2, 0x58, 0x2, 0xff, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x5, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x10, 0x80000001, 0x9, 0x4b2, 0x100, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x4, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x100, [0x1, 0x6, 0x6, 0x2, 0x800, 0x7f, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x2, 0x7bac, 0xa, 0x10, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x1, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x4, 0x0, 0x98, 0x3d104cc0, 0x52, 0x8, 0xc, 0x0, 0x437, 0x3, 0x3, 0x1, 0x1000, 0x200000, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x2, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x5a912096, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124446, 0x7, 0x0, 0x2, 0x7, 0x190, 0x5, 0x3, 0x1, 0x800, 0xb, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec0, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x42, 0x225, 0x81, 0x4, 0x4, 0x7fff, 0x3]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0xffff, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x3ff, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x7, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x7, 0x7ff, 0xfffffffe, 0xfffe, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0xb730, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x6, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xffffdffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x82, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x24f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x7, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x5, 0x3, 0x0, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd4, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x200, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff8, 0x1, 0x3041, 0xc, 0x6f, 0x7, 0x7, 0x3, 0x7, 0x5, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x5, 0x4, 0xe, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0x7, 0x6, 0x6, 0x80, 0x6, 0xc8, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0x9, 0x8, 0x9fc, 0x8, 0x4, 0x5, 0x40]}, {0xfffffffa, [0x1ff, 0x8, 0x792aff98, 0xc42, 0x7, 0x3, 0x1, 0x2, 0x80, 0x1, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x0, 0x42, 0xec7, 0x0, 0x3, 0x4, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x100, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x54, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0x94, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x9, 0xb28a, 0x463, 0x80000001, 0x4, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0xc, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x402, 0x5, 0xfffffffc, 0x0, 0xcd9f, 0x19d, 0x5, 0xf0, 0x6, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x5, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0xe, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x1, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x7, 0x81, 0x8, 0x2, 0x4, 0x6, 0x2, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x1360000, 0x8, 0x1ff, 0x7ff, 0xa, 0x0, 0xfffffffd, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x7, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1002, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x4, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x41a0, 0x2, 0x4, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xdc]}, {0x6, [0x3, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x0, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x800, 0x1, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x7, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0xfe, 0x8, 0x4, 0x9, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xcff9, 0x2, 0x9cb, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x9, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x2, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x1000, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x0, 0x2, 0xe, 0x401, 0x8, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0xffe, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x0, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x80000000, 0x7, 0x7fff, 0x4, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x412, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x0, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2a8, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0x0, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b1, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x4, 0x14, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x6, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x7, 0x10001, 0x1000008, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf76b, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x2, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x6, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x404, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffff, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x4, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0xe0, 0x7fffffff, 0x0, 0x3, 0xffffff48, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7fe, 0x10, 0x7f, 0xbe15, 0x5, 0x7, 0xf, 0x86, 0x40000002, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x1, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0x3, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x3, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x5, 0xeb7, 0x7, 0x9, 0x10000, 0x2, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0x7, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0x3, 0x50, 0x9, 0x0, 0x3]}]}) sendto(r1, &(0x7f0000001940)="df9c86d8a588327c423b164c706a466bc8", 0x11, 0x8, &(0x7f00000019c0)=@un=@abs={0x8, 0x0, 0x0, 0x0}, 0x8) r3 = socket(0x1b, 0x3, 0x0) sendto$inet6(r3, &(0x7f0000000280)="020b1a01020000008feba277fce00d", 0xf, 0x184, 0x0, 0x0) ioctl$KDGETMODE(0xffffffffffffffff, 0x40046676, 0x22e00000) truncate(&(0x7f0000000000)='./file0\x00', 0xffffffff) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000100), 0x8, 0x0) ioctl$CIOCGSESSION2(r4, 0xc030636a, &(0x7f0000000080)={0x15, 0x0, 0x10, &(0x7f0000000000)="ec7b0000f2feff03000000000000007f", 0x0, 0x0, 0x0, 0xfdffef85}) ioctl$CIOCCRYPT(r4, 0xc01c6367, &(0x7f0000000140)={0x0, 0x1, 0x0, 0x10000, &(0x7f0000000180), 0x0, 0x0, 0x0}) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x200000, 0x0) syz_emit_ethernet(0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) clock_nanosleep(0x8, 0x1, &(0x7f0000000240)={0x4, 0x34000000}, 0x0) ioctl$CIOCGSESSION2(0xffffffffffffffff, 0xc030636a, &(0x7f0000000080)={0x17, 0x8, 0x0, 0x0, 0x0, 0x0, 0x7fffffff, 0xfdffff85, [0x1, 0x5, 0xffc, 0x4000]}) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) open(&(0x7f0000000380)='./file0\x00', 0x205, 0x0) setresuid(0xee01, 0xee01, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 169.122538ms ago: executing program 3 (id=185): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = kqueue() r1 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r1, 0xffff, 0x20, &(0x7f00000002c0), &(0x7f0000000340)=0x4) r2 = socket$inet6(0x1c, 0x2, 0x0) r3 = socket$inet6(0x1c, 0x2, 0x0) r4 = socket$inet_icmp(0x2, 0x2, 0x1) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r5, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) msync(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2) sendto(r4, &(0x7f0000000680)="77f6aca41c3b6f46c9dedf10e240c39b49343da70926790976dec1b3d11cdbf179cdcde746248ccb3319fe2a9c585fee1a12db9524034dc785b1de9957781b100018768571354c0c646c756f08aff6f73fb831ba311183dce1f8175f234b670ab41f0c2461b16e2b883942533c8bdb6fb0dc7265af98172820972fb809e46669128bd3d1a305c9c163c892ad7a937557e0f48e0bc1670838cc9dcd7f7044c50e1dc2a55355b1d2de17d8a6ad987162b102bc03a8c239f5c0b1cfd6568a7ac8631fa6e92daa5af27c79f1f16259e2b9bf26286f7a71b058a3e142649080f56049a416e2bb5b61799ba896adfd5b00ce36701c5d8cd89b", 0xf6, 0x20080, &(0x7f0000000780)=@un=@file={0xa, 0x1, './file0\x00'}, 0xa) bind$inet6(r3, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x20005, @mcast1, 0x4}, 0x1c) bind$inet6(r2, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x5, @mcast1, 0x3}, 0x1c) rfork(0x85000) kevent(r0, &(0x7f0000000380)=[{0x4, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, [0x0, 0x5, 0x0, 0x3]}, {0x4, 0xfffffffffffffffe, 0xc700, 0x1, 0x3, 0x2, [0x4c, 0x0, 0x7fff]}], 0x2, 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000040)='!#/\'+@)-.\'^&\xdd\x83\x00', &(0x7f0000000100)='-\x00', &(0x7f0000000140)='{{/\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='(\'\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='\x00'], &(0x7f0000000640)=[&(0x7f0000000400)=')*\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='!]!\x11\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='^\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='\x00']) 160.495611ms ago: executing program 32 (id=185): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)) r0 = kqueue() r1 = socket(0x1c, 0x1, 0x0) getsockopt$sock_int(r1, 0xffff, 0x20, &(0x7f00000002c0), &(0x7f0000000340)=0x4) r2 = socket$inet6(0x1c, 0x2, 0x0) r3 = socket$inet6(0x1c, 0x2, 0x0) r4 = socket$inet_icmp(0x2, 0x2, 0x1) r5 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x2, 0x11, r5, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) msync(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x2) sendto(r4, &(0x7f0000000680)="77f6aca41c3b6f46c9dedf10e240c39b49343da70926790976dec1b3d11cdbf179cdcde746248ccb3319fe2a9c585fee1a12db9524034dc785b1de9957781b100018768571354c0c646c756f08aff6f73fb831ba311183dce1f8175f234b670ab41f0c2461b16e2b883942533c8bdb6fb0dc7265af98172820972fb809e46669128bd3d1a305c9c163c892ad7a937557e0f48e0bc1670838cc9dcd7f7044c50e1dc2a55355b1d2de17d8a6ad987162b102bc03a8c239f5c0b1cfd6568a7ac8631fa6e92daa5af27c79f1f16259e2b9bf26286f7a71b058a3e142649080f56049a416e2bb5b61799ba896adfd5b00ce36701c5d8cd89b", 0xf6, 0x20080, &(0x7f0000000780)=@un=@file={0xa, 0x1, './file0\x00'}, 0xa) bind$inet6(r3, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x20005, @mcast1, 0x4}, 0x1c) bind$inet6(r2, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x5, @mcast1, 0x3}, 0x1c) rfork(0x85000) kevent(r0, &(0x7f0000000380)=[{0x4, 0xfffffffffffffffe, 0x1, 0x0, 0x0, 0x0, [0x0, 0x5, 0x0, 0x3]}, {0x4, 0xfffffffffffffffe, 0xc700, 0x1, 0x3, 0x2, [0x4c, 0x0, 0x7fff]}], 0x2, 0x0, 0x0, 0x0) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000300)=[&(0x7f0000000040)='!#/\'+@)-.\'^&\xdd\x83\x00', &(0x7f0000000100)='-\x00', &(0x7f0000000140)='{{/\x00', &(0x7f0000000180)='\x00', &(0x7f00000001c0)='\x00', &(0x7f0000000200)='(\'\x00', &(0x7f0000000240)='\x00', &(0x7f0000000280)='\x00'], &(0x7f0000000640)=[&(0x7f0000000400)=')*\x00', &(0x7f0000000440)='\x00', &(0x7f0000000480)='\x00', &(0x7f00000004c0)='!]!\x11\x00', &(0x7f0000000500)='\x00', &(0x7f0000000540)='\x00', &(0x7f0000000580)='^\x00', &(0x7f00000005c0)='\x00', &(0x7f0000000600)='\x00']) 59.375318ms ago: executing program 2 (id=187): open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x1fe) truncate(&(0x7f0000000040)='./file0\x00', 0x2) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x176) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = fcntl$dupfd(r1, 0x0, r1) sendfile(r0, r2, 0x0, 0x400002000000, 0x0, 0x0, 0x10) 9.152498ms ago: executing program 2 (id=188): r0 = socket(0x11, 0x3, 0x0) sendto$unix(r0, &(0x7f0000000180)="b10005039000000005b108000500ca900f0e08fece6ef0ffffffffffff3fd335095b6fb0090085b292f20ecfe36da004be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5000000020000000000000f0200a371a3f80000008000800000010000000000e3000000", 0xb1, 0x0, 0x0, 0x0) (async) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0xb) (async) r1 = open(&(0x7f00000002c0)='.\x00', 0x400000, 0x0) (async) r2 = __specialfd$inotify(0x2, &(0x7f0000000000)={0x100004}, 0x4) inotify_add_watch_at(r2, r1, &(0x7f0000000080)='./file0\x00', 0x27000722) (async) r3 = kqueue() kevent(r3, &(0x7f0000000280)=[{0x3, 0xffffffffffffffff, 0x4011, 0x0, 0x400000000000, 0x2, [0xfffffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) shm_rename(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='./file0\x00', 0x1) rmdir(&(0x7f0000000040)='./file0\x00') r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_int(r4, 0x0, 0x1b, &(0x7f0000000280)=0x2, 0x4) (async) r5 = socket(0x1c, 0x1, 0x0) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$CIOCGSESSION2(r6, 0xc030636a, &(0x7f0000000080)={0x17, 0x25, 0x10, &(0x7f0000000180)="ec7b00000900ff2425c1f0a58b519798", 0x0, 0x0, 0x7fffffff, 0xfff, [0x1, 0x0, 0xffc, 0x4000]}) (async) ioctl$KDGETMODE(r5, 0x40046676, 0x22e00000) 0s ago: executing program 4 (id=186): pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f00000004c0)="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", 0xfffffffffffffdc0}], 0x0) readv(0xffffffffffffff9c, &(0x7f0000000280)=[{&(0x7f0000000240)=""/53, 0x35}, {&(0x7f0000000100)=""/41, 0x29}, {&(0x7f0000000040)=""/19, 0x13}, {&(0x7f00000001c0)=""/39, 0x27}], 0x4) r1 = socket(0x26, 0x2, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r2 = freebsd12_shm_open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) r3 = socket$inet_sctp(0x2, 0x1, 0x84) recvmsg(r3, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) shmat(0x0, &(0x7f000078e000/0x1000)=nil, 0x7000) r4 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x25) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r4, 0x2000) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x40003) sendmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x9) sysarch$I386_SET_LDT(0x1, 0x0) inotify_add_watch_at(r4, r4, 0x0, 0x40000008) mmap(&(0x7f000000f000/0x1000)=nil, 0x1000, 0x0, 0x12, r2, 0x8000000880000) setresgid(0xee00, 0xee01, 0x0) r5 = getegid() setresgid(r5, 0x0, r5) r6 = shmget$private(0x0, 0x3000, 0x124, &(0x7f00005c8000/0x3000)=nil) shmat(r6, &(0x7f00005c5000/0x4000)=nil, 0x7000) shmctl$SHM_LOCK(r6, 0xb) fork() r7 = openat$filemon(0xffffff9c, &(0x7f0000000000), 0x100142, 0x0) ioctl$FILEMON_SET_FD(r7, 0xc0045301, &(0x7f00000000c0)=r1) rfork(0x3060) ioctl$EVIOCGRAB(r0, 0x20044590) msync(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2) fork() kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.4' (ED25519) to the list of known hosts. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 Jan 25 05:51:36 ci-freebsd-i386-2 kernel: arp: from aa:aa:aa:aa:aa:bb: addr len: new 0, i/f 6 (ignored) Out of ktrace request objects. if_delmulti_locked: detaching ifnet instance 0xfffffe00077c3000 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741800 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 if_delmulti_locked: detaching ifnet instance 0xfffffe00077c4c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 Jan 25 05:51:42 ci-freebsd-i386-2 syslogd: last message repeated 1 times FreeBSD/amd64 (ci-freebsd-i386-2.us-central1-b.c.syzkaller.internal) (ttyu0) login: set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Jan 25 05:57:01 ci-freebsd-i386-2 login[747]: 2 LOGIN FAILURES ON ttyu0 Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl