last executing test programs: 15.139956584s ago: executing program 0 (id=5): rfork(0x6010) rfork(0x80000) mlock(&(0x7f0000ff3000/0x3000)=nil, 0x3000) madvise(&(0x7f0000eee000/0x4000)=nil, 0x4000, 0x1) munmap(&(0x7f00008b2000/0x1000)=nil, 0x1000) mprotect(&(0x7f00003fd000/0xc00000)=nil, 0xc00000, 0x0) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) munlockall() ioctl$DIOCCLRIFFLAG(0xffffffffffffff9c, 0xc028445a, &(0x7f0000000140)={0x10, &(0x7f0000000080)="770382728def4c87bd3b46b90e202a3324ce6fdd1aadc063ad4ed8e502be2a7696eb8b66f1551d3a77bd631ca62bcf5f544979217a40d91f89624eaf7f32e91338c1b713acbaefece9609ecc3974f70db3e032dbc5193ce247547908faa4fa0694e3999f9de0adf01714e9809ec72b84084760e3c2cbf15f4f8615e8170843dd0213ae029f6cc3c0ebb311c5c49d23985368ef70fd7e6ffcafa4ce5643ff64660568d18cdd", 0xdb, 0x1e, 0x6}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) setresgid(0xee00, 0xee01, 0x0) setregid(0x0, 0xffffffffffffffff) r0 = fork() procctl$PROC_TRAPCAP_CTL(0x0, r0, 0x9, &(0x7f0000000100)=0x1) 15.131332837s ago: executing program 0 (id=7): setuid(0xee01) r0 = open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r1 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_PKTINFO(r1, 0x29, 0x2e, 0x0, 0x0) sendto(r1, 0x0, 0x0, 0x0, &(0x7f0000000080)=@in6={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) sendto(r1, &(0x7f0000000dc0)="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", 0x579, 0x0, &(0x7f0000000480)=@in6={0x1c, 0x1c, 0x2, 0x9, @local={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c) freebsd11_statfs(&(0x7f0000000240)='./file0\x00', &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) fstat(r0, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000005c0)={{r2, 0x0, 0x0, r4, 0x1e3, 0x8, 0x0, 0x4}, 0x1, 0x2, 0x7, 0x3, 0x0, 0x0, 0x4}) r5 = getuid() setuid(r5) setreuid(r2, r5) r6 = fork() r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000540), 0x1, 0x0) socket$bt_sco(0x24, 0x5, 0x89) socket$inet_sctp(0x2, 0x1, 0x84) ioctl$DIOCADDADDR(r7, 0xc4704434, &(0x7f0000000040)) ioctl$DIOCCHANGERULE(r7, 0xcbe0441a, &(0x7f0000000000)="84e89cedfbabd2ea0c2ab131b29f2fbc37794a3e0ecc63014959e360ad00280f0ffcd1a9ece0117b363f24ab284d1a54b2f5020df0bbf89caac008d1a6a05503b41e50040ba3fba7c0783f1f4e9f95b232d2f519a887ba9412b8d434e13252b8f3d653f3b18e2478c8f44fd58667d5947f626c4304e0f5f64d38417faab73f451d95b7dcf86bd7aa0f05e44d89c86a45a2fc4303a20462db8328d13dd6d26113960cca715eab918341019396d0e54e52adc89ea06dc20329026474065d88e1482a7db0c5fcfc9896d64ff76d56becf3950abb6895f7e07cb3170ea1f5f") procctl$PROC_TRAPCAP_CTL(0x0, r6, 0x9, &(0x7f0000000100)=0x1) freebsd10_pipe(&(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) seteuid(r3) close(r8) __specialfd$eventfd(0x1, &(0x7f0000000000)={0x2, 0x1}, 0x8) r9 = kqueue() kevent(r9, &(0x7f0000000040)=[{0x0, 0xfffffffffffffffe, 0x8001, 0x4, 0x0, 0x5}], 0x1, 0x0, 0x0, 0x0) rfork(0x3060) syz_emit_ethernet(0x3a, &(0x7f0000000140)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08004600002c000000000006907800000006e0003199d9b18c15e67d500001010200000e00907800000000000000000000000100000000"]) 15.068722918s ago: executing program 0 (id=10): r0 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) mkdirat(r0, &(0x7f0000000440)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) open(&(0x7f00000001c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0, 0xd2) r1 = kqueue() kevent(r1, &(0x7f0000001d40)=[{0x3, 0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0, [0x4]}], 0x1, 0x0, 0x0, 0x0) r2 = kqueue() open$dir(&(0x7f0000000180)='./file0\x00', 0x40000400000002c6, 0x0) extattr_set_link(&(0x7f0000000700)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_set_link(&(0x7f00000006c0)='./file0\x00', 0x1, &(0x7f0000000400)='\x87\xac\xd4\x9f\x03C\xc3O\f\x89\xb3W\x9b\x8e\xbb\xd7(\xa315K\x14\x9fM{\x02U\x97AH\xb6\xee\xfc\xd1R\xa6B\xab\xf9Z>\x82I\nN\xe87\xce(\xd5\x7f\x14 \x8eDG\xf1o\xddi\x97\x94U\xb5\xa1\xa2,\xb18,\x04\'uw\xf3\x05<\x93hgp\x99a\xdc-\xe8', 0x0, 0x0) extattr_set_link(&(0x7f0000000080)='./file0\x00', 0x1, &(0x7f00000000c0)='}\\[\xd7)(.#\x00', 0x0, 0x0) kevent(r2, &(0x7f00000004c0)=[{0x4, 0xffffffffffffffff, 0x1, 0x8, 0xfffffffffffffff9, 0x8, [0x4, 0x60f9, 0x3f, 0x77ad]}], 0x1, 0x0, 0x0, 0x0) rename(&(0x7f0000000100)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', &(0x7f0000000180)='./file0\x00') pipe2(0xffffffffffffffff, 0x4) 14.754689801s ago: executing program 0 (id=14): r0 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) extattr_delete_link(0x0, 0x2, &(0x7f00000000c0)='(,+%\x00') pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) fork() ftruncate(0xffffffffffffffff, 0x7ffe) kqueue() r1 = socket(0x26, 0x2, 0x0) aio_write(&(0x7f0000001400)={r1, 0xffffffffffffff7f, 0x0, 0x0, [0x40, 0x1000], 0x6, 0x6, 0x7fff, {0x5, 0xc1a, 0x0}, {0x0, 0xc, @sival_ptr=0x5, @thr={0x0, 0x0}}}) ioctl$DIOCIGETIFACES(0xffffffffffffffff, 0xc0284457, 0x0) symlink(&(0x7f0000000180)='./file2\x00', &(0x7f00000001c0)='\x00') socket$inet_tcp(0x2, 0x1, 0x0) poll(0x0, 0x0, 0xfff) r2 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_int(r2, 0x0, 0x38, 0x0, 0x0) socket(0x1b, 0x3, 0x0) r3 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_buf(r3, 0x6, 0x40, 0x0, &(0x7f0000001040)) shm_rename(&(0x7f0000000100)='./file2\x00', &(0x7f0000000140)='./file1\x00', 0x2) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r4 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x10) truncate(&(0x7f0000000040)='./file0\x00', 0xaa480) pwritev(r4, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) 13.793009923s ago: executing program 0 (id=23): setitimer(0x2, 0x0, &(0x7f0000000080)) r0 = socket$inet6_udp(0x1c, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344}, 0x5, 0x5) syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x28, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff, @multicast1}, @tcp={{0x1, 0x3, 0x41424344, r2, 0x0, 0x0, 0x5, 0x4, 0xa}}}}}}) syz_extract_tcp_res(&(0x7f0000000000)={0x41424344}, 0x5, 0x5) syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x28, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x1ff, @multicast1}, @tcp={{0x1, 0x3, 0x41424344, r3, 0x0, 0x0, 0x5, 0x4, 0xa}}}}}}) syz_emit_ethernet(0xa1, &(0x7f0000000940)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "15f2ff", 0x6b, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x2, 0x0, r2, r3, 0x0, 0x0, 0x6, 0x8, 0x1, 0x0, 0xfff9, {[@sack_perm={0x4, 0x2}]}}, {"92a6720a4a4df741aa7478c5067be016a2ab845a9e098055bcf8c3b021d5e013510949152c6a3896909b48522d4c74159c875d8978931a1c3d921090da8d12d45a9f548a5e89baf47953d9aca988378d5b66a0"}}}}}}}) r4 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r4, &(0x7f00000001c0)='./file1\x00', 0x0) open$dir(&(0x7f0000000b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) symlink(&(0x7f0000000300)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000440)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r5 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r5, &(0x7f0000000c80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x10) symlink(&(0x7f00000001c0)='.\x02/file1/file0\x00', &(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') unlink(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') unlink(&(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') freebsd11_mknod(&(0x7f0000000280)='./file0\x00', 0x672cda28f543e327, 0x3) rename(&(0x7f0000000fc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f00000010c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') rename(&(0x7f0000000040)='./file1\x00', &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') kevent(0xffffffffffffffff, &(0x7f0000000280)=[{0x6, 0xfffffffffffffffa, 0x0, 0x8, 0x5, 0x2, [0x18, 0x9, 0xfffffffffffffffb, 0x3]}], 0x1, 0x0, 0x0, 0x0) r6 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r6, 0x29, 0x31, &(0x7f0000000140)=ANY=[@ANYRES16], 0x1010) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r6, 0x6, 0x2000, &(0x7f0000000000)={'bbr\x00', 0x80000001}, 0x24) sendto(r6, 0x0, 0x0, 0x0, &(0x7f0000000480)=@in6={0x1c, 0x1c, 0x2, 0x9, @local={0xfe, 0x80, '\x00', 0x0}, 0x4}, 0x1c) writev(r1, &(0x7f0000000280), 0x26) 13.629958516s ago: executing program 0 (id=24): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20, 0x0, 0x28, 0x2000c}, 0x200) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x42) recvfrom(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 13.61950887s ago: executing program 32 (id=24): socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000002c0)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x20, 0x0, 0x28, 0x2000c}, 0x200) recvmsg(r0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x42) recvfrom(r0, 0x0, 0x0, 0x2, 0x0, 0x0) 1.988530121s ago: executing program 4 (id=245): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_FASTOPEN(r0, 0x6, 0x401, &(0x7f0000000000)={0x8, "fdba527698e0ec8f4a54e9630e73031d"}, 0x14) pwritev(r0, &(0x7f0000000440)=[{&(0x7f0000000040)="b396053d4e715f58b4774f20d31a4c726b77fda165698f122ac2079950aeeb57ade682a01744432b8eb457df504d76b0f00f69240f90a0cee30c680223d4c817c16c20da60e141d7e2eec1947dc4dd96b625bd54d581371e681577327afa933034b2a96d30a419b4f6a32bb5a82d", 0x6e}, {&(0x7f00000000c0)="ab58babd0f27993c67", 0x9}, {&(0x7f0000000100)="a205e0393933dc80eaf645d7c88ec503e6121cbee4e9880dd2ed6dbf01bf7a2bbada04f7e7da6ad03163f68d78596503af0c1ad9c3ff8eb7446fd14e07ed82d4d92c24ee33e4415842a486978b4cc01a52b274a0046bb7a5f531011976c3478e0b5e966acdd6ae3d026e64a14784703872d87b9f274d7ac82a9dfa5220217975716d7385c5814461b77c3361c9a64f8bf458fb58ef6d1048aca9781c406a371a5146350a7101361a844a0e43b065e1966eb435a17cd8ef2a2d17b9c39cbc92a7c445d60a0d4584205e1fe484a2273a13fa9ef89a246e810d4a4c30554de7", 0xde}, {&(0x7f0000000200)="38171284ba4e6bc3ee81bc1df025a143d20104647f53948f6b6c322665bf59d52da2d6ca5adf01b42eccc7b669548e40dc3f7dca29523dd70dea13cf6247ce0f17c941d3a0e6abb3eb5a99525624d945ede7e1c2cd3ad19ed235", 0x5a}, {&(0x7f0000000280)="004326c2e9f57882f6f8b1b8c84f2c16ef9acdfa4090b61961f8a62e8f75987247c5b823611688d38a6b", 0x2a}, {&(0x7f00000002c0)="2cd3d3b61fefd8aea31b56061067351e82b5c44158037b0c5f4af72c6ab1334932bf902dac4602f2fef466cf1be867fff6c6d3e64a7910d4c6d155caf22594dba9a5ac79e486b50e141ae58b5485112a3607ca", 0x53}, {&(0x7f0000000340)="b91afe1f13e17f27e769305b7ca821f2192e39188148a1a9e858cabf1e8cc8c069518e9f62bcf36ca300a8a56ebbb407cda38e102620b7fad61843c3b740d38c9a7fe886059798d8baf9218906b60cd0851eb240ee6a70a18212d92fb88c2957579eab9da58a347faeefd8d564e00caca6cdefff287668e3d153701085d0", 0x7e}, {&(0x7f00000003c0)="21998b2ffedeea53c8d94489d22eeb98cc954e333f061f4af4303b06f5919fad3379c4939a4ceeec0558045e752ed8d4e2460011e05c599e0655ec4efe71f9f4cf957d862637735dc296db1ac8f0641d54cf5fd9af70d982825020426406d96af125e236be12c06ffe8a4287ed39fdedb1d83289fb", 0x75}], 0x8, 0x200) r1 = accept(r0, 0x0, &(0x7f00000004c0)) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000500)={@remote={0xac, 0x14, 0x0}, @remote={0xac, 0x14, 0x0}}, 0x8) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) sendto$inet(r1, &(0x7f0000000540)="e2001edc4922710ea98020bcc140fcb0aa699ce5c04112dc880cfb3dd814904641a402081ac9a9a44dae88c23cfbc07630c5af927e95de1bad7b52a68f2bf7c40fc98f8607b4006acc87c74ff2c21a1eb3d480af043dc0701f3b44c3b8", 0x5d, 0x80, &(0x7f00000005c0)={0x10, 0x2, 0x1}, 0x10) mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2) setsockopt$inet6_tcp_TCP_FASTOPEN(r1, 0x6, 0x401, &(0x7f0000000600)={0x1, "7159d800d5ba4c2c8545a216b6e6e7bd"}, 0x14) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) flock(r3, 0x4) r4 = openat$md(0xffffffffffffff9c, &(0x7f0000000640), 0x2000000, 0x0) ioctl$MDIOCATTACH(r4, 0xc1c06d00, &(0x7f0000000700)={0xfffffff7, 0x8065, 0x0, &(0x7f0000000680)='./file0\x00', 0x5, 0x99, 0x6, 0x10, 0xffff, 0xff, &(0x7f00000006c0)='\x82\x00', [0xe5d, 0x7, 0x40, 0x1, 0x3, 0x81, 0x5, 0x7, 0xf09, 0x10, 0x0, 0x1, 0x1, 0x4, 0x1000, 0x5, 0x10000, 0x7, 0x7, 0x2, 0xa096, 0x9, 0x1c4, 0x100, 0x3062, 0x1, 0x8, 0x10, 0x4, 0x3, 0x1, 0x5, 0x2, 0x685f, 0x80, 0x3, 0x7, 0xb3, 0x1, 0x2, 0x7, 0x8, 0x80, 0x7, 0x2, 0x0, 0xffffff11, 0x81, 0xfffffffb, 0x9, 0x0, 0x0, 0x6, 0xb03, 0x7, 0x0, 0x4, 0x1, 0x80, 0x7fe, 0x8, 0x7ff, 0xff, 0xdcd, 0x10001, 0x713, 0x5, 0xffffff7f, 0x7f, 0x1, 0x1, 0x100, 0x6, 0x5, 0x80000001, 0x10, 0x60, 0x7, 0x1, 0x81, 0x6, 0x3, 0x1, 0xaa, 0x1ff, 0x1, 0x6, 0x10, 0xffffff73, 0x1ff, 0x1, 0x8, 0x80000000, 0x587, 0xc, 0x93]}) r5 = getsid(0x0) procctl$PROC_STACKGAP_CTL(0x0, r5, 0x11, &(0x7f00000008c0)=0x3) ioctl$MDIOCDETACH(r4, 0xc1c06d01, &(0x7f0000000980)={0x5, 0x5, 0x3, &(0x7f0000000900)='./file0\x00', 0x15e, 0x0, 0x0, 0x10000, 0xf6ae, 0x6, &(0x7f0000000940)='%\x00', [0x2, 0x60, 0x2, 0x4, 0x0, 0x1000, 0x1, 0x6, 0xfffff801, 0x5, 0x4, 0x9, 0xdc8, 0x6, 0x9, 0x400, 0x2c5, 0x8, 0x3, 0x9, 0x29000000, 0x1, 0x10, 0x2, 0x5, 0x92, 0x100, 0xfffffff8, 0x8, 0x4, 0xf, 0x7, 0x3, 0xc, 0x10, 0x6, 0x9, 0x4, 0x2, 0x5, 0x80000001, 0x3, 0x3, 0x400, 0xdfb, 0x2, 0x400, 0x1, 0xff, 0x0, 0x7, 0x4, 0xffffff7f, 0x4, 0x8, 0x2, 0x3, 0x4, 0x6, 0x2, 0x2, 0x6, 0xcd16, 0x0, 0x8, 0xfff, 0x7, 0x401, 0x6, 0x6, 0x3, 0x2, 0x0, 0x8bb9, 0xd, 0xd91, 0x878, 0x3, 0x7, 0x8, 0x3, 0xdb11, 0x9, 0xa, 0x8, 0x5, 0xa0, 0x2, 0xb8f, 0x2, 0x9, 0x7, 0x2, 0x401, 0x0, 0x7]}) mkdir(&(0x7f0000000b40)='./file1\x00', 0x40) access(&(0x7f0000000b80)='./file0\x00', 0x0) r6 = dup2(r3, r2) mprotect(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x5) openat$crypto(0xffffffffffffff9c, &(0x7f0000000bc0), 0x100000, 0x0) ioctl$DIOCRTSTADDRS(r6, 0xc4504449, &(0x7f0000000c80)={{"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", "d58ed738bf70af8a5495c8bff3efb2eec204fcd77c0c59578f66d4bceeac17f4", 0x5, 0x6e}, &(0x7f0000000c00)="98984feeca12ea9da5dfc43d1632cf6fb987f4be17ef6346aa2cb65d1a19f693f8cf08891a101c8cc1660d707475b54f66002f4c36964f2601dd8b1823627f3172b70f3b9022", 0xd, 0x7, 0xa5d4, 0x5, 0x8, 0x1, 0x7, 0x9}) aio_cancel(r0, &(0x7f0000001380)={r3, 0x80000000000000, &(0x7f0000001100)="52f3d39d781eae7722589858d1f77e8c26f4f44c298d606f7faef0a9d096f844fa6ff89e03fa79538501f305e49b027ea4c989ba589a5f1c24ebbe77e243c8b9e454f655f5035f2f8b102d8f", 0x4c, [0xd47d, 0xffffffff], 0x83, 0x8, 0x5, {0xffffffffffff3fa5, 0x62, &(0x7f0000001180)="0a55d65483b8d84be5966100e5470559fd6853a72cae105f1b7f89f3c096a9c6a24d6b13ba42341808a1cc359778940a2dec658e2e263abf497bdb4aea61210b50ed2a5fe342dfe2c59fc8dbf6bd935d9016736447d3ef892ddf9a2a34b4dcebd62c07ee06ec9fd9750b0539865c6dc0e171098f47ac50a6862f687ebc29a3b5c3f29fdb8ccbbe6cb287570dad05fab18818aeb35874b316b61bb1fbd0ebdd6d3f9fb35a2bd923b6a1457ecf409bc0480d0ff7b62df66de12de6808c9a015f9578ef"}, {0x0, 0x1, @sival_int=0x54e1, @thr={&(0x7f0000001280)="c4a299077000f240abc44209df090f3acc4e00ec36653e440f01c1c44265455200c461d168d2f20f1a52e0c4c17173f52047c0d600", &(0x7f00000012c0)="4253a0c11167f1f5a2ccab8c1076dd909cff8d6c88d81ba9ac15d25abcaf134239bd75a626ce3422f59ccc079a763e8c2285dba420ae0f4a799a49eb0ac333661590dc31bf9cffbded5dd407d73ca13b103289e76a25f2acd4df8f2147274f4f2d0c6919f25a38d495ba27e5d7b6a7173b3075616ce86642a2e2959ff1314f880a9abeed8bd4354e7d27f3316d69b09c73db73e18522aee5241c"}}}) execve(&(0x7f0000001440)='./file1\x00', &(0x7f00000014c0)=[&(0x7f0000001480)='\x00'], &(0x7f0000001580)=[&(0x7f0000001500)='%\x00', &(0x7f0000001540)='^%\x00']) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f00000015c0)=0x3dd4, 0x4) sendto$inet6(r6, &(0x7f0000001600)="0ac1dceaf31cbb2ef3b51ee0bcf8847339b70748815c16d6ce2b85b722f5013f18a08829fc4a5b4ef04a52d139a6bf2c8131713dd24b9e921dfb2ceca6a7c9f1dae9d2048978c985bc4b10ed8707620f6943be98fc0a1b27fd7cf28eaec79a6aba6e31d73486dcccbb49c09aed9b8a5a34dbbc543bf8ed934a576fbef65f64dbb4abf03197edb00583e422121549c01ce089bc7af8742f3d5619ab428ffd60715bf228e8c648c0365ee7801be89b51e4ffcb864b62e3d12a15d6582ba0132b43", 0xc0, 0x84, &(0x7f00000016c0)={0x1c, 0x1c, 0x2, 0x34a, @mcast2, 0x5}, 0x1c) rfork(0x1000) symlinkat(&(0x7f0000001700)='./file0\x00', r6, &(0x7f0000001740)='./file0\x00') ioctl$CRIOGET(0xffffffffffffffff, 0xc0046364, &(0x7f00000017c0)=0x3) 1.940094948s ago: executing program 4 (id=246): symlink(&(0x7f0000000300)='./file0\x00', &(0x7f00000002c0)='.\x02\x00') mkdir(&(0x7f0000001040)='./file0\x00', 0x1) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, &(0x7f0000000140)) r0 = open$dir(&(0x7f0000000100)='.\x00', 0x80000, 0x1c1) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x8, 0x0) r3 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r3, 0x29, 0x68, &(0x7f0000000080)={{0x1c, 0x1c, 0x1, 0x1, @loopback, 0x7fffffff}, {0x1c, 0x1c, 0x0, 0x400000, @local={0xfe, 0x80, '\x00', 0x0}, 0x2}, 0x0, [0x8800, 0xfffffffd, 0x0, 0x6, 0x1, 0x0, 0x0, 0x5e]}, 0x5c) setsockopt$inet6_IPV6_RTHDR(r3, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) sendto$inet6(r3, 0x0, 0x0, 0x20101, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x3ee, @rand_addr="00008000ffe40000800400446daff500"}, 0x1c) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f0000000440)={0x28, 0x0, 0x18, &(0x7f00000000c0)="3c9e89526b1700b07f82ee18e15b4e73e47f022de5aa3505", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x0, 0xc]}) ioctl$CIOCCRYPT(0xffffffffffffffff, 0xc0306367, &(0x7f0000000300)={0x0, 0x2, 0x40, 0x8203, &(0x7f0000000000), 0x0, 0x0, 0x0}) mkdirat(r1, &(0x7f00000001c0)='./file1\x00', 0x4) renameat(r0, &(0x7f0000000040)='./file1\x00', r1, &(0x7f0000000180)='./file0\x00') sync() sigaction(0x14, &(0x7f0000000000)={0x0, 0x0, {[0x0, 0x1, 0x800, 0x1]}}, &(0x7f00000001c0)={0x0}) sync() chmod(&(0x7f0000000140)='./file1\x00', 0x10) 1.630129841s ago: executing program 4 (id=248): open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xb8) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreq(r0, 0x0, 0xc, &(0x7f0000000000)={@multicast2, @loopback}, 0x8) freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x100000, 0x4a) open$dir(&(0x7f0000000000)='./file0\x00', 0x1, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000000)=[{0x3, 0xffffffffffffffff, 0xc0c3, 0x80000000, 0x0, 0x0, [0x0, 0x1ccf, 0x2, 0x9]}], 0x1, 0x0, 0x0, 0x0) getsockopt$inet_buf(r0, 0x0, 0x4a, &(0x7f0000000040)=""/4096, &(0x7f0000001040)=0x1000) truncate(&(0x7f0000000080)='./file0\x00', 0x8001) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x202, 0x0) vfork() copy_file_range(r2, &(0x7f0000000000)=0x80000001, r2, 0x0, 0x100000, 0x0) 1.395528584s ago: executing program 3 (id=254): r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) freebsd11_mknodat(0xffffffffffffffff, &(0x7f0000000780)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x2000, 0x1) fchflags(r0, 0x0) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0x40, &(0x7f0000000040)='hd\x00', 0x3) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0x40, &(0x7f0000000100)='cubic\x00', 0xe1) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000300)={@in6={{0x1c, 0x1c, 0x3, 0x5, @ipv4, 0x4}}, r1, 0x1ef, 0x62, 0x18c, 0x2, 0x6, 0x3}, 0x98) 1.340034717s ago: executing program 3 (id=256): openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r0 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r0, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, 0x0, &(0x7f0000001080)) minherit(&(0x7f0000013000/0x4000)=nil, 0x4000, 0x0) fork() freebsd11_mknodat(r0, &(0x7f0000000040)='./file0\x00', 0x8000, 0x5) 1.219959621s ago: executing program 3 (id=258): mincore(&(0x7f0000000000/0xc00000)=nil, 0xc00000, &(0x7f0000000000)=""/62) cpuset_getdomain(0x2, 0x2, 0xffffffffffffffff, 0x20, &(0x7f0000000000), &(0x7f0000000080)) sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000004c0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x16d) mount(0x0, &(0x7f00000000c0)='.\x00', 0x1c8, &(0x7f0000000380)) chown(&(0x7f0000000140)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) cpuset(0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$md(0xffffffffffffff9c, &(0x7f0000000400), 0x200000, 0x0) syz_emit_ethernet(0xf6, &(0x7f0000000240)=ANY=[@ANYBLOB="73663a7032bd1950dff5257a96aadae4ad8f65439272fa8ea1ba7260e1d77bec3456f3ca95acfce8cc9e50247483c0d7b3ac5c3b92e894e2438fd89f4f347fa1f802d383f3fa3edac8e8676f3c453ed23137ccf22fe80a94ff02bbebe3454ee84dc8776e13aa053c7091666f24eb63c90b2206695707177568ec1fbd8de18e74c50f5ba35ee2196b2463984bb9bfb2020829f55e52134c691e50728b18d8c399d02340ead38589b16d089257bc794d1dbb98aa7cf2da5d3b707d2cbe5ed1513b5c89f03e34bf4588243fb4175e4d187f3ad1f3b897d0b2e149d5da2fc2487e02256c9b17abb476eecf1a286c4c74795114aa5acc1a"]) ioctl$MDIOCATTACH(r2, 0xc1c06d00, 0x0) ioctl$DIOCRADDADDRS(0xffffffffffffffff, 0xc0184415, &(0x7f0000000a80)={{"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", "0920cf14d501a846a22d8eb300fbff0400000000000000001000"}, 0x0, 0x9, 0x0, 0xf7b2, 0x20000002, 0xb, 0x0, 0xffffffffffffffff}) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f00000000c0)={0x10, 0x26, 0x5, &(0x7f00000004c0)='\x00\x00\x00\x00\x00', 0x0, 0x0, 0x0, 0x7d86699a}) openat$smbus(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) open$dir(&(0x7f0000000240)='./file0\x00', 0x40000400000002c2, 0x0) getpeername$inet(r1, &(0x7f0000000100)={0x10, 0x2, 0xffffffffffffffff, @broadcast}, &(0x7f0000000340)=0x10) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r4, 0x80000004, &(0x7f0000000300)="e2", 0x1, [], 0x1, 0x18, 0x6, {0x6, 0x918d, 0x0}, {0x0, 0x0, @sival_int=0xe, @thr={0x0, 0x0}}}) r5 = open(&(0x7f0000000580)='./file0\x00', 0x80400000000206, 0x48) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r5, 0x60000000) truncate(&(0x7f0000000140)='./file0\x00', 0x3) r6 = kqueue() kevent(r6, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x1}], 0x1, 0x0, 0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x3, 0xffffffffffffffff) r7 = socket(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f00000001c0)={0x10, 0x2, 0x2, @loopback}, 0x10) 1.218728698s ago: executing program 2 (id=259): freebsd11_mknod(0x0, 0x6000, 0x9) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) setpriority(0x2, 0x0, 0xfffffffc) select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x8001}) socketpair$unix(0x1, 0x5, 0x0, 0x0) (async) socketpair$unix(0x1, 0x5, 0x0, 0x0) freebsd10_pipe(&(0x7f0000000540)) (async) freebsd10_pipe(&(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) cap_rights_limit(r1, &(0x7f0000000140)=[0x20000207fffffe0, 0x400000000000001]) socket$inet6_sctp(0x1c, 0x1, 0x84) (async) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) freebsd11_getfsstat(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x1d8, 0x0) setresuid(0x0, r3, 0xffffffffffffffff) __semctl$SEM_STAT(0x0, 0x4, 0xa, &(0x7f0000000140)=&(0x7f0000000100)) (async) __semctl$SEM_STAT(0x0, 0x4, 0xa, &(0x7f0000000140)=&(0x7f0000000100)={{0x0}}) setreuid(r3, r4) (async) setreuid(r3, r4) setsockopt$inet6_sctp_SCTP_MAXSEG(r2, 0x84, 0xe, &(0x7f0000000040)={0x0, 0x21}, 0x8) pread(0xffffffffffffffff, 0x0, 0x0, 0x0) bind(r2, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) r5 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0x68, &(0x7f0000000080)={{0x1c, 0x1c, 0x1, 0x1, @loopback, 0x7fffffff}, {0x1c, 0x1c, 0x2, 0x400000, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x0, [0x9, 0xfffffffd, 0x0, 0x7, 0x1, 0x9, 0x0, 0x5e]}, 0x5c) (async) setsockopt$inet6_MRT6_ADD_MFC(r5, 0x29, 0x68, &(0x7f0000000080)={{0x1c, 0x1c, 0x1, 0x1, @loopback, 0x7fffffff}, {0x1c, 0x1c, 0x2, 0x400000, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x0, [0x9, 0xfffffffd, 0x0, 0x7, 0x1, 0x9, 0x0, 0x5e]}, 0x5c) setsockopt$inet6_IPV6_RTHDR(r5, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) (async) setsockopt$inet6_IPV6_RTHDR(r5, 0x29, 0x30, &(0x7f0000000080)=ANY=[], 0x38) sendto$inet6(r5, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x3ee, @rand_addr="000000000000008dbcf8bb009600"}, 0x1c) socket$inet_tcp(0x2, 0x1, 0x0) (async) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$sock_timeval(r6, 0xffff, 0x1009, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) sendto$inet6(r2, &(0x7f00000002c0)="6642104bbc937f5c9a6b8b0bc4e4800755a75d41ffeea54a7e3fabdc34e8412b7428f7d98edd44ec8ca199224b12b54822966b369be3a1f24ba878f9b234ed93787baa8ad45eb78e8709fe284cd34676271fc46c243d2c0d98d8413b15b6b4b85fe4552df10f74f1b4ef65e04da02772b18f511e57e5038e8cbc99e7711d7013e4025981069d93c50e9194b60b114e158785c5fbfa644b690c517e8f2a350053cc3ce58f06ff938e4bb436323fa300aa64d5c25d", 0xfd96, 0x10d, 0x0, 0xffffffffffffffac) 949.553106ms ago: executing program 1 (id=262): r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r0, 0x6, 0x27, &(0x7f0000000200)={&(0x7f0000000140)="0e0035930ced83c85dcd48ca2a90053a", 0x0, &(0x7f0000000500)='\x00@', 0xb, 0x10, 0x0, 0x12, 0x2, 0x0, 0x3, 0x3, "14052350d8c77477"}, 0x40) r1 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000380), 0x10000, 0x0) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f00000000c0)={0x10, 0x25, 0x8, &(0x7f0000000100)="0b6fac41a00d4689", 0x0, 0x0, 0x0, 0x7d86699a, [0x0, 0x8, 0x2]}) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r0, 0x6, 0x27, &(0x7f0000000180)={&(0x7f0000000040)="71f7f8dadce1df0758d343d35bd18574920f85ffc816f18a7213e4f75c48d8b631820599315d0c68bcf4c630975607080789dc699c4768cfadc25bf46a703caf5c52bb6f22486e3a1f9d6561c17f0924e79d12ca57a1ae400c3abb57ad11daabfd0462a1f8c5f55520c2c2fd25445544cc291a2305bc83127ed733f52563e18f23e7a2", 0x0, 0x0, 0x29, 0x83, 0x0, 0x1a, 0x0, 0x0, 0x3, 0x2, "91d92eee2f556902"}, 0x40) r2 = socket$inet6(0x1c, 0x2, 0x0) r3 = socket$inet6_udplite(0x1c, 0x2, 0x88) unmount(&(0x7f00000000c0)='./file0\x00', 0x8000100) bind$inet6(r2, &(0x7f0000000280)={0x1c, 0x1c, 0x0, 0x9, @empty, 0x1000000}, 0x1c) connect$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="03060000000032f98be669ba1e0700", 0x1}, 0x1c) setsockopt(r2, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) bind$inet6(r2, &(0x7f0000000040)={0x1c, 0x1c, 0x3, 0x7, @rand_addr="00000000000100", 0x10000a27}, 0x1c) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x2e, &(0x7f00000005c0)={@ipv4={'\x00', '\xff\xff', @multicast1}}, 0x14) connect$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x1, 0x8, @empty, 0xfffffffe}, 0x1c) r4 = open$dir(&(0x7f0000000100)='./file1\x00', 0x40000400000002c2, 0x180) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r6, 0x0) setsockopt(r6, 0x0, 0x3, &(0x7f0000000000)="f1010100", 0x4) sendto$unix(r5, &(0x7f00000002c0)="9e1918", 0x3, 0x0, 0x0, 0x0) lseek(r4, 0x40000054, 0xd7ac6ee800d227db) socket$inet_tcp(0x2, 0x1, 0x0) (async) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r0, 0x6, 0x27, &(0x7f0000000200)={&(0x7f0000000140)="0e0035930ced83c85dcd48ca2a90053a", 0x0, &(0x7f0000000500)='\x00@', 0xb, 0x10, 0x0, 0x12, 0x2, 0x0, 0x3, 0x3, "14052350d8c77477"}, 0x40) (async) openat$crypto(0xffffffffffffff9c, &(0x7f0000000380), 0x10000, 0x0) (async) ioctl$CIOCGSESSION2(r1, 0xc040636a, &(0x7f00000000c0)={0x10, 0x25, 0x8, &(0x7f0000000100)="0b6fac41a00d4689", 0x0, 0x0, 0x0, 0x7d86699a, [0x0, 0x8, 0x2]}) (async) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r0, 0x6, 0x27, &(0x7f0000000180)={&(0x7f0000000040)="71f7f8dadce1df0758d343d35bd18574920f85ffc816f18a7213e4f75c48d8b631820599315d0c68bcf4c630975607080789dc699c4768cfadc25bf46a703caf5c52bb6f22486e3a1f9d6561c17f0924e79d12ca57a1ae400c3abb57ad11daabfd0462a1f8c5f55520c2c2fd25445544cc291a2305bc83127ed733f52563e18f23e7a2", 0x0, 0x0, 0x29, 0x83, 0x0, 0x1a, 0x0, 0x0, 0x3, 0x2, "91d92eee2f556902"}, 0x40) (async) socket$inet6(0x1c, 0x2, 0x0) (async) socket$inet6_udplite(0x1c, 0x2, 0x88) (async) unmount(&(0x7f00000000c0)='./file0\x00', 0x8000100) (async) bind$inet6(r2, &(0x7f0000000280)={0x1c, 0x1c, 0x0, 0x9, @empty, 0x1000000}, 0x1c) (async) connect$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="03060000000032f98be669ba1e0700", 0x1}, 0x1c) (async) setsockopt(r2, 0x29, 0x40, &(0x7f0000000000)="77941fc7", 0x4) (async) bind$inet6(r2, &(0x7f0000000040)={0x1c, 0x1c, 0x3, 0x7, @rand_addr="00000000000100", 0x10000a27}, 0x1c) (async) setsockopt$inet6_IPV6_PKTINFO(r2, 0x29, 0x2e, &(0x7f00000005c0)={@ipv4={'\x00', '\xff\xff', @multicast1}}, 0x14) (async) connect$inet6(r2, &(0x7f0000000140)={0x1c, 0x1c, 0x1, 0x8, @empty, 0xfffffffe}, 0x1c) (async) open$dir(&(0x7f0000000100)='./file1\x00', 0x40000400000002c2, 0x180) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000280)) (async) shutdown(r6, 0x0) (async) setsockopt(r6, 0x0, 0x3, &(0x7f0000000000)="f1010100", 0x4) (async) sendto$unix(r5, &(0x7f00000002c0)="9e1918", 0x3, 0x0, 0x0, 0x0) (async) lseek(r4, 0x40000054, 0xd7ac6ee800d227db) (async) 740.031953ms ago: executing program 1 (id=263): r0 = open(&(0x7f00000002c0)='.\x00', 0x100000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @random="37c62de26bf2", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x1, 0x0, @broadcast, @multicast2, {[@timestamp={0x44, 0x4}]}}, @icmp=@timestamp_reply}}}}) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r2 = open$dir(&(0x7f0000000080)='.\x00', 0x4, 0x0) mkdirat(r2, &(0x7f0000000100)='./file1\x00', 0x0) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') renameat(r3, &(0x7f0000000200)='./file1\x00', r3, &(0x7f0000000140)='./file0/file0\x00') __getcwd(&(0x7f0000000440)=""/79, 0xfffffffffffffdf7) r4 = __specialfd$inotify(0x2, &(0x7f0000000040)={0x4}, 0x4) inotify_add_watch_at(r4, r1, &(0x7f0000000080)='./file0\x00', 0x84000008) 273.169805ms ago: executing program 4 (id=264): socketpair(0x1, 0x1, 0x2, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f00000002c0)=0x4, 0x4) (async) aio_write(&(0x7f0000001a80)={r1, 0x80000000, &(0x7f0000001940)="d282", 0x2, [0xffffffff, 0xa], 0x1, 0x18, 0x2, {0x3, 0x5, 0x0}, {0x0, 0x2, @sival_int=0x9, @spare=[0x1, 0x5, 0x3a58, 0xa, 0xd, 0x9, 0x4, 0xfffffffffffffffc]}}) (async) ioctl$MDIOCATTACH(0xffffffffffffffff, 0xc1c06d00, &(0x7f0000000800)={0x200, 0x30, 0x2, 0x0, 0x2, 0x9, 0x7, 0x10000000000, 0x7ff, 0x1, 0x0, [0x3f2efc55, 0x8, 0xfffffc00, 0x3, 0x6, 0xde90, 0xfffffffe, 0x200, 0x7, 0xe88, 0x3, 0x1, 0x7fff, 0x30b, 0x3, 0x10000, 0xfff, 0x400, 0x80000001, 0x6, 0x6, 0x20000, 0xffffffff, 0x80000000, 0x2, 0xe4c, 0x2, 0x7, 0x8000, 0xf, 0xa, 0xc, 0x3, 0x5, 0xffff, 0xfffffffd, 0xfffffff2, 0x4, 0x9, 0x6, 0x9, 0x7d1, 0x7, 0x1, 0xffffff00, 0x0, 0x5, 0x81, 0x10000, 0xe, 0x1, 0x5, 0x9, 0x87, 0xe, 0x80000000, 0x0, 0x0, 0x2, 0x8, 0x4, 0x5, 0xb4d, 0x9, 0x4, 0x2, 0xfffffffb, 0x7ff, 0x7, 0x6, 0x0, 0x6, 0xfffffffa, 0xfffffffb, 0x1, 0x8, 0xf, 0x7f, 0x6, 0x0, 0x8000, 0x7, 0x7fff, 0x5, 0xfffffffa, 0x8000, 0x8, 0x401, 0x7, 0x102, 0x3, 0x0, 0x8, 0x80000000, 0x4d4ff12, 0x87]}) (async) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) (async) r2 = socket(0x1c, 0x1, 0x0) sendto(r2, 0x0, 0x0, 0x20101, &(0x7f0000000080)=@in={0x10, 0x2, 0x2, @local={0xac, 0x14, 0x0}}, 0x10) (async) r3 = socket$inet6_udplite(0x1c, 0x2, 0x88) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r3, 0x29, 0x23, &(0x7f0000000ac0)={0x48, 0x1, '\x00', [@ra={0x5, 0x2, 0x8}, @ra={0x5, 0x2, 0x5}]}, 0x10) setsockopt$inet6_buf(r3, 0x29, 0x19, 0x0, 0x0) (async) recvmsg(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) (async) socket(0x1c, 0x10000000, 0x9f) 265.961896ms ago: executing program 3 (id=265): r0 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000240), 0x8, 0x0) ioctl$CIOCGSESSION2(r0, 0xc040636a, &(0x7f0000000440)={0x19, 0x0, 0x10, &(0x7f0000000200)="3c9e89526b1f00b07f8aee18e5aa3505", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x9, 0x0, 0x80000001]}) rfork(0x3060) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) thr_new(&(0x7f0000000280)={0x0, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [0x2, 0x4000000000000007, 0x91c]}, 0x68) ioctl$CIOCCRYPT(r0, 0xc0306367, &(0x7f0000000080)={0x0, 0x2, 0x100, 0xb6ae, &(0x7f0000000600), 0x0, &(0x7f0000000100), &(0x7f0000000100)}) 265.380335ms ago: executing program 2 (id=266): socket$inet_tcp(0x2, 0x1, 0x0) ksem_open(&(0x7f0000000980), &(0x7f00000009c0)='/dev/kbd\x00', 0x200, 0x19c, 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20001, &(0x7f0000000040)={0x10, 0x2, 0x3, @remote={0xac, 0x14, 0x0}}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="9f4c4662c957", @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x68, 0x0, 0x1, 0x2, 0x0, @multicast1, @multicast2=0xe0000001}, @icmp=@generic={0x16, 0xa, 0x0, "e0000000"}}}}}) setsockopt$inet_tcp_int(r0, 0x6, 0x22, &(0x7f0000000000)=0xffffffff, 0x4) open$dir(&(0x7f0000000240)='./file0\x00', 0x400000, 0x0) r1 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) posix_fadvise(r1, 0x0, 0x800000006, 0x5) pwritev(r1, &(0x7f0000001700)=[{&(0x7f0000000000)="1098", 0x2}], 0x1, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f00000003c0), 0x400000, 0x0) fpathconf(r2, 0x9) ktimer_create(0x0, 0x0, &(0x7f0000000440)) ktimer_create(0x0, 0x0, &(0x7f0000000440)) ktimer_create(0x0, 0x0, &(0x7f0000000140)) ktimer_create(0x0, 0x0, &(0x7f0000000440)) ktimer_create(0xf, 0x0, &(0x7f0000000440)) ktimer_create(0x4, 0x0, &(0x7f0000000000)) ktimer_create(0x0, 0x0, &(0x7f00000000c0)) ktimer_create(0x0, 0x0, &(0x7f0000000000)) ktimer_create(0x0, 0x0, &(0x7f0000000180)) ktimer_create(0x0, 0x0, &(0x7f0000000440)) ktimer_create(0x0, 0x0, &(0x7f0000000200)) ktimer_create(0x0, 0x0, &(0x7f0000000080)) ktimer_create(0x0, 0x0, &(0x7f0000000440)) ktimer_create(0x0, 0x0, &(0x7f0000000000)) ktimer_create(0x0, 0x0, &(0x7f0000000000)) ktimer_create(0x4, 0x0, &(0x7f00000000c0)) ktimer_create(0x0, 0x0, &(0x7f00000012c0)) ktimer_create(0x0, 0x0, &(0x7f0000001940)) 263.836719ms ago: executing program 2 (id=267): r0 = open(&(0x7f00000000c0)='./file0\x00', 0x615, 0x0) unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x48000101) ioctl$CIOCCRYPT(r0, 0xc0306367, &(0x7f0000001300)={0x6, 0x1, 0x5, 0x1, &(0x7f0000001040)="e2c8422f3f60c08a0a7af647b007f668db813eef84452a587882b6707e07779c2b9c6ec55fa7633f74fa24d115a474286fdccb80b8244984ca2ac4276b22a7ed74a8f9b36366fc4db7e027eae21501aff8798e328a3a2fe858bc16faba525ad3e97257ed79f5e9ff4ad6a1438855a7be3743a08b239d84225f8defed25d86065550f341c398580097c5d487bd5651ad17a9b3434d649a95459d47f3ff5d1c701212a9c14b48cc4088ca7b64dd63f03137ea51df8e4df50a895677c8eaf8e17313dd5f86548a28602d484ab964d5efaf27ff0f2e6af7a44b0e00beb00900a238295899b62b40b8f4790f07b4ac5569b5ec8847952", &(0x7f0000001140)="c490e03a83131708b96a811ea503c6d1b7f97d8538763e34903a2898d59fba1dce5ea2c15ecde8727dec532a37dd1c09c4c7891edb9494c1d48fd5cc96948a5a6fcb0b4080c563519df561f24a61fa5a26795e", &(0x7f00000011c0)="6b3834347de472c785ead237364570e2539dfe6fb731d1a05b1537df64cd00919db46c9108609869b1262a94e88aa935a0d3284278cdcce195585d8bd736436ccc46938ed36b508ac6b3dfd81b65854cc9ab836cea831a3e5b1049d6c2663a58661ab7cff6afb10a30bc674ea178aa072e59b166343c2ede0bf61dbf1e97c6aeaa8da41c879ba8ae4e6a63d2e9ea2ff78ca1cdc7f4d101ed6f4f4a644f7295969fcc76a44d3f43783cf7c10180f84ba3ecacf5693de6c25765d4ecf26879380d256ade8531e179f94d4065fbbbb0385cd0", &(0x7f00000012c0)="bf90183f6825fd184a20b444"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) symlink(&(0x7f0000000080)='.\x00', 0x0) 262.97033ms ago: executing program 1 (id=268): r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) mprotect(&(0x7f0000bfd000/0x400000)=nil, 0x400000, 0x2) setsockopt$inet_int(r0, 0x0, 0x42, &(0x7f0000000040)=0x9, 0x4) r1 = kqueue() ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5}], 0x1, 0x0, 0x0, 0x0) flock(r1, 0x2) r2 = socket$inet6(0x11, 0x3, 0x0) sendto$inet6(r2, &(0x7f0000000000)="00200302", 0x2000, 0x0, 0x0, 0x0) syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x28, 0x0, 0x0, 0x5, 0x6, 0x0, @rand_addr=0x8001ff, @local={0xac, 0x14, 0x0}}, @tcp={{0x1, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x2, 0xa7}}}}}}) 259.836729ms ago: executing program 3 (id=269): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000000)={0x7, 0x3f, 0x1}, 0x8) (async, rerun: 32) shmat(0xffffffffffffffff, &(0x7f0000fff000/0x1000)=nil, 0x0) (async, rerun: 32) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_INITMSG(r1, 0x84, 0x3, &(0x7f0000000040), &(0x7f0000000080)=0x8) (async) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x18, &(0x7f00000000c0), &(0x7f0000000100)=0x4) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, &(0x7f0000000180)=@abs={0x8, 0x1, 0x0, 0x3}, 0x8) (async) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x102, &(0x7f0000000500)={0x0, 0x14, "191f46669934a620e0b0cb8b5426ef5338470b14"}, &(0x7f0000000540)=0x1c) sendmsg$inet_sctp(r0, &(0x7f00000005c0)={&(0x7f00000001c0)=@in={0x10, 0x2, 0x0, @remote={0xac, 0x14, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000200)="d03c1622b95e20efa8498637ffb000d57c365025ae5390af00656c27127149f0faa4a701b64a8cce768415bbb3f7f2303dfff2cbb840546cadf44edf0a9411cb485af738c5078459fccc45794213686974a01d95c887486b5f8cdc0093b063c31c3f90c639f7d5d658009f9e266b3c2c43eaa93e857aacd83ed759ae1f888904ad760579f1dac1d7b8cd33bea88491946be0df63fc7bcf852c3c566345bc87df5781a26641dda4030e8f142c17079e74395b5e68466698fa7fb1c8519ba70496fa", 0xc1}, {&(0x7f0000000300)="2770cd7db6a7c461637a086aeb315738072a919b255a7a26a1a8ee72", 0x1c}, {&(0x7f0000000340)="1b1c8bd92f2bb36d9219e573fe239f9075c32b7fc81c6d879285ec26f319ffcaab8e2d6a1607bfc88e1ef54a52c01be5252b6f3bc6b32c27502ca96e16a60e5c7ee6b83e29d4aa3f828ef26c29cfe73a651e27431054cb84b85f6e731c8707a6c0f75f74a4b9486d9ba75d75298212ecc1bfc02342ceeeefa337728ede51b4ada5a94530a0ba720e1c5078ab02", 0x8d}, {&(0x7f0000000400)="1c943e93c82539f3969f97cbb17f7271774c04e04b5001896744a6d90e4db1cc4e0b5e7406d61e83f77603bdd216c4a22396ace1921d55a1fcbc3ab4b36c3a0b739cb4e4bfd88a5836f983cdb7c79fadd776091a8382482fccea1e8dd2a3dd6b3f53cc11b7bb8adbecba58db59f73cb348d85cae2cdd32b3a9f4ab04ddf7648b4008f886fa40b077b5ea5cccab6d7b7d86ac24918583b1beff41439151eaccf5f527402eef04115c", 0xa8}], 0x4, &(0x7f0000000580)=[@sndrcv={0x2c, 0x84, 0x2, {0x81, 0x6, 0x500, 0x0, 0xa2, 0x3, 0x4, 0xfffffffb, r3}}], 0x2c, 0x2000c}, 0x0) (async) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000600), &(0x7f0000000640)=0x4) setsockopt$inet6_sctp_SCTP_REMOTE_UDP_ENCAPS_PORT(r1, 0x84, 0x24, &(0x7f0000000680)={r3, @in={{0x10, 0x2, 0x1, @local={0xac, 0x14, 0x0}}}, 0x100}, 0x90) (async) getpeername$inet(r0, &(0x7f0000000740)={0x10, 0x2, 0xffffffffffffffff, @local}, &(0x7f0000000780)=0x10) (async) r4 = accept(r0, &(0x7f00000007c0)=@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @local}, &(0x7f0000000800)=0x1c) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r4, 0x84, 0x11, &(0x7f0000000840)=0xffff, 0x4) (async, rerun: 64) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) (async, rerun: 64) r5 = fhopen(&(0x7f0000000880)={{[0x3, 0x401]}, {0x1, 0x1, "667c8a5c5f9acacc1eacfb958954dc8f"}}, 0x80) bind$unix(r5, &(0x7f00000008c0)=@abs={0x8, 0x0, 0x0, 0x1}, 0x8) (async) r6 = openat(0xffffffffffffff9c, &(0x7f0000000900)='./file0\x00', 0x80, 0x20) ioctl$EVIOCGID(r6, 0x40084502, &(0x7f0000000940)) getsockopt$inet6_udplite(r4, 0x88, 0x2, &(0x7f0000000980), &(0x7f00000009c0)=0x4) shmctl$IPC_RMID(0xffffffffffffffff, 0x0) select(0x40, &(0x7f0000000a00)={0x6, 0x7fffffffffffffff, 0xd, 0x1, 0x4, 0x9, 0x3, 0xfffffffffffffffe}, &(0x7f0000000a40)={0x4, 0x9, 0x8000, 0xf, 0x3ff, 0xdb, 0x10000, 0xffff}, &(0x7f0000000a80)={0x0, 0x80, 0x7902, 0x9, 0x4, 0x2, 0x100, 0x100000001}, &(0x7f0000000ac0)={0x9, 0x6}) (async, rerun: 32) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000000b00)={0x80000000, 0x25ccf002}, 0x10) (async, rerun: 32) getsockopt$inet6_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r5, 0x84, 0xd, &(0x7f0000000b40), &(0x7f0000000b80)=0x4) (async, rerun: 64) r7 = socket$unix(0x1, 0x5, 0x0) (rerun: 64) sendmsg$unix(r7, &(0x7f0000000e00)={&(0x7f0000000bc0)=@abs={0x8, 0x1, 0x0, 0x1}, 0x8, &(0x7f0000000dc0)=[{&(0x7f0000000c00)="99a5b4a35acd08c7a0596518ec7834177d69efd53dea78ac786f72b52d174ab60be3c12c72e1f2bb78b6bfa53d45ecc1f573e58488f66f0ce6e6b59c90b977a1", 0x40}, {&(0x7f0000000c40)="7c3948f0835a01ef56b3eb5f616792f23d7ea82a77e0b17ab383e9ed3cf940de65bc60740c2786f0f29ade5d9c0553fbce59391fbfdbdd1e0a2cd7ec64294fee146e06ba6e0141f7b2dddec1002afaea2651fc218a3acaf7e94fa20fb7e58d69fc268902455dda85b2110880a4d160c17bd03da60d84fa4d4ea54015fec96882fa81b5900887ea", 0x87}, {&(0x7f0000000d00)="5bdf7798a0c23da0cba8bfadd13b763f906750ebb5d5a64df273ffee9681cfef9df56091366547a51574e659fa853edd7230eb23f497af79d90b402c4c49602d0bc29de30b84e8f47caf61227c50b56d609b6f6025bf4cef528e413166b7f6257a0392efe28271f019c4cc24ad4cb80cb9cf49208f3eb2a335f204953ac3445a198b7da8e65b4b697e6702baa60449fcf9c5ebe5fd7b0fa37365100ea9", 0x9d}], 0x3, 0x0, 0x0, 0x88}, 0xb) r8 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r8, 0x84, 0x22, &(0x7f0000000e40)={0x0, 0x0, r3}, 0xc) connect$inet6(r5, &(0x7f0000000e80)={0x1c, 0x1c, 0x1, 0xfff, @local={0xfe, 0x80, '\x00', 0x0}, 0x3}, 0x1c) 259.568205ms ago: executing program 2 (id=270): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r1 = open$dir(&(0x7f0000000080)='.\x00', 0x2000000, 0x0) mkdir(&(0x7f0000000340)='./file\x00', 0x0) mkdir(&(0x7f00000000c0)='./file/file0\x00', 0x160) rmdir(&(0x7f0000000000)='./file1\x00') r2 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) open$dir(&(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x0) r3 = openat$md(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) ioctl$MDIOCATTACH(r3, 0xc1c06d00, &(0x7f00000008c0)={0x0, 0x0, 0x3, 0x0, 0x1000, 0x6, 0x6, 0x0, 0x1, 0x2, 0x0, [0x4, 0xa9, 0x80000001, 0x10, 0x3, 0x0, 0x800, 0x1, 0x8001, 0x4, 0xeb0c7322, 0x8, 0x8000, 0x0, 0x7, 0x3, 0x1, 0x1, 0x0, 0x7ff, 0x1, 0x5, 0x9, 0xa, 0x4, 0x0, 0x9c078fa, 0x2, 0x400, 0xd9, 0xb, 0x0, 0x40, 0xf, 0x10000, 0x7, 0xd0f, 0x4, 0x1, 0x1, 0x1, 0x400, 0xe, 0x59b, 0x800, 0x9, 0x3, 0x9, 0x9, 0x7, 0x5, 0x0, 0x6, 0x5, 0x1, 0x4, 0x4, 0x80000000, 0x1, 0x3, 0x9, 0x3, 0x7, 0x7, 0x6, 0x9, 0x2, 0xa87e, 0x423, 0x85a8, 0x3, 0x2, 0x8, 0x9f0, 0xfff, 0xc93, 0x0, 0x0, 0x7, 0xf27, 0x64a5, 0x8, 0x1ff, 0x3, 0x7f, 0x4, 0x4, 0x4, 0x7, 0x1, 0x1, 0x7, 0x1, 0xd5, 0x5, 0xffff]}) mkdirat(r2, &(0x7f00000001c0)='./file1\x00', 0x0) ioctl$DIOCRADDADDRS(r0, 0xc4504443, &(0x7f0000000380)={{"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", "e7613c034c62d719fce0e8a1c152b680993eacfa5bace76f8a188bc75e3b61ae", 0xe, 0x1}, &(0x7f0000000100)="04c659cb0ce89c10379a9291ff33d8dbadeaa34f40d14c1ca91ddcaa983fa0b1f2f85c3606392bb513b713b45ec1125e45ebe58a8bb8d57c95df17ca06682c251d45cdc4b8a9a5f34f6c6a165d3197669f1175ec491aa2c89ae6b96fa77cd09dafe42134b452adfcb482d3301896cc00fff12428f220c192bb9f144bcb11b92e47ceaecc35c9f88984e7dbac2e5b547b73fd01b12dce0d5a6bd3b09adce80518899ebac7e657f2d031c7bbe3255d08de5075ccfeb2449ef5b0ca7a6d246a", 0x2, 0x8000000000000001, 0x3, 0x2, 0x9, 0x5, 0x3, 0x7fffffff}) fdatasync(r1) 258.521063ms ago: executing program 1 (id=271): r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_int(r0, 0x29, 0x30, &(0x7f00000000c0)=0x1c1c, 0x4) r1 = socket(0x1c, 0x4, 0x2) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000100)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) r3 = socket$inet6_udplite(0x1c, 0x2, 0x88) bind$inet6(r3, &(0x7f0000000040)={0x1c, 0x1c, 0x2, 0x1, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x5}, 0x1c) r4 = socket$inet6(0x1c, 0x1, 0x0) setsockopt(r4, 0x29, 0x3f, &(0x7f0000000000)="77941fc7", 0x4) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r2, 0x84, 0xa, 0x0, 0x0) setsockopt$inet6_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, &(0x7f0000000000)={r5, 0x4, 0x5, [0x9, 0x4, 0x9, 0x4, 0x6]}, 0x12) getsockopt$inet6_tcp_int(r1, 0x6, 0x8, 0x0, &(0x7f0000000080)) 253.434133ms ago: executing program 3 (id=272): mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x1010, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) sigsuspend(&(0x7f0000000000)={[0xffff, 0xfffffffb, 0x5, 0xc]}) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r0 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x20) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) r1 = socket(0x1c, 0x20000000, 0xfd) bind$inet6(r1, 0x0, 0x0) connect$inet6(r1, 0x0, 0x0) r2 = open$dir(0x0, 0x200, 0xa) sendfile(r2, r1, 0x0, 0x400000000000, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0xa) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = fcntl$dupfd(r5, 0x0, r4) sendfile(r3, r6, 0x1, 0x400000000000, 0x0, 0x0, 0xf) r7 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r7, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) fpathconf(r7, 0x3b) kqueue() rfork(0x17000) r8 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x18) pwritev(r8, &(0x7f0000000080), 0x0, 0x0) r9 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f00000006c0)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r10 = __specialfd$inotify(0x2, &(0x7f00000001c0)={0x100000}, 0x4) inotify_add_watch_at(r10, r9, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x25000430) unlink(&(0x7f0000000000)='./file0\x00') fspacectl(0xffffffffffffffff, 0x1, &(0x7f0000000040)={0x200003ff, 0x7ffffffffffffc00}, 0x0, 0x0) open(&(0x7f0000000b40)='./file0\x00', 0x7843d88b80d1cecd, 0x100) 238.114942ms ago: executing program 4 (id=273): fhstatfs(0x0, 0x0) r0 = socket(0x1, 0x3, 0xff) sendto$unix(r0, &(0x7f0000000140)="b100050390000700050008000700ca900f0e08fece6ef0ffffffffffff3fd335095b6fb0090085b292f20ecfe36da004be781e4991f7addf5f882b2b7be1aa7923ed00f4c8b2ca3ebbc259699a1f132e27acb5d602000d7d026ba8af63ff37282934e4fd89720fd3872babfbb77008f5a872c881ff7cc53c894303b22f310b404f36a00f90006ee01be657aea8c5f50000020000000000000f0200a371a3f80000008000800000010000000000e30000004df7f9a2461baf17fe3bb7a220bacac7d28400761441c6d4a91756743a0c0952fa03649c524e3eeef0535a45ff1c64e8aff64c301b737a8e2dadd44dccc1cba3e4", 0xf2, 0x0, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x400, 0x0) 180.110149ms ago: executing program 1 (id=274): r0 = open(&(0x7f0000000040)='./file0\x00', 0x18289, 0x110) r1 = kqueue() kevent(r1, &(0x7f0000000000)=[{0x3, 0xffffffffffffffff, 0x103, 0xc0000045, 0xfffffffffffffff8, 0x0, [0x40000000000, 0x0, 0x0, 0x4]}], 0x1, &(0x7f0000000080)=[{}], 0x1, 0x0) r2 = fcntl$dupfd(r0, 0x0, r0) write(r2, &(0x7f00000004c0)="96", 0x1) r3 = socket(0x1c, 0x5, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x81, @remote={0xfe, 0x80, '\x00', 0x0}, 0x5}, 0x1c) bind$unix(r3, &(0x7f0000000080)=@abs={0x8, 0x1c}, 0x1c) r4 = getpgrp(0x0) r5 = socket(0x1c, 0x3, 0x0) connect$inet6(r5, &(0x7f0000000380)={0x1c, 0x1c, 0x2, 0x46, @mcast1, 0x2}, 0x1c) fcntl$setown(r5, 0x6, r4) rfork(0x3060) write(r0, &(0x7f00000004c0)="b96abcf5ac7cffa09ea845315c0d853a14", 0xffffff1c) r6 = socket(0x1c, 0x1, 0x0) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r7, &(0x7f0000000100)={0x1c, 0x1c, 0x0, 0xf, @local={0xfe, 0x80, '\x00', 0x0}, 0x6}, 0x1c) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x105, &(0x7f0000000280)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) setsockopt$inet6_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x901, &(0x7f0000000000)={r8, 0x4, 0x5, [0x9, 0x4, 0x9, 0x4, 0x6]}, 0x12) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0xa, &(0x7f00000000c0)={@in6={{0x1c, 0x1c, 0x1, 0x4, @local={0xfe, 0x80, '\x00', 0x0}, 0x7ff}}, r8, 0x129, 0xb1, 0x4, 0x3, 0x5}, 0x98) 179.559605ms ago: executing program 4 (id=275): r0 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x0) r1 = open(&(0x7f00000002c0)='.\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000000)='./file0\x00', 0x0) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x20000000, &(0x7f0000000140)) r2 = open$dir(&(0x7f0000000100)='.\x00', 0x80000, 0x1c1) __semctl$SEM_STAT(0xffffffffffffffff, 0x1, 0xa, &(0x7f0000000300)=&(0x7f0000000280)) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r3, &(0x7f00000001c0)='./file1\x00', 0x4) renameat(r2, &(0x7f0000000040)='./file1\x00', r3, &(0x7f0000000180)='./file0\x00') link(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000240)='./file0\x00') sync() symlink(&(0x7f0000000140)='./file1\x00', &(0x7f0000000200)='./file2\x00') sync() 77.082605ms ago: executing program 2 (id=276): r0 = socket$inet6(0x1c, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="ff070a791b4375202b5c2baf2781e604"}, 0x1c) connect$inet6(r0, &(0x7f00000000c0)={0x1c, 0x1c, 0x1, 0x0, @rand_addr="00000000002df5db62000500", 0x78c5}, 0x1c) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x825, @loopback, 0x20}, 0x1c) extattr_get_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f0000000080)='\\{-*!.$.^!\':`\x00', &(0x7f0000002100)=""/4096, 0x1000) r2 = socket$inet6_udp(0x1c, 0x2, 0x0) r3 = socket$inet6(0x1c, 0x3, 0x0) connect$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x2, @mcast1, 0x3}, 0x1c) syz_emit_ethernet(0x5e, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaf788a33fb3f386dd60c3200000283c00feffffff000000000000000000000002ff02"]) setsockopt$inet6_IPV6_HOPOPTS(r2, 0x29, 0xc, &(0x7f0000000000)=ANY=[], 0x18) sendmsg(r2, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000001ac0), 0x0, &(0x7f0000003400)=[{0x70, 0x1, 0x7ff, "cdd523e132006754f1904fea5a4147d797fa1cf6893fa2673e37b3f17ada33b94562e89d11fe530ae470e62d0000000000000000a63ebaf4519c3cede58fe46edd6cf291d3a24e49a6547e314d22c4a39aee4cfcca83a2b95b0bee"}, {0xf0, 0x29, 0x6, "06be8845544e9dc1f24c3cfdce58e36e3b98a5f7b01ab9767e7b52df1e0ba8159ac698d5fa9a406945581ae8c7751a841bef41e6590bf52038dd099d646a23e6ec2bd9551eaa1f55d2ee5c073b4522eac866a1a6ffb820c8b56f29c1d561d5047ab799d4cbb2af309d8af3f8d3dfa609f0ec6dd020196e4a19168f07c11aa1f49af142820fbcc188e8c01568c0bd7b4dbbb10a1cd157256fa9615fc6e0f73a4cffdc139460537a5281b6536fdbd37b4a91f02c2cfecffa4d33356e3ac4971c88c7f05312bbe52c5cc9a5128cc42067fe15a6ebc546d779b506"}, {0x20, 0x98, 0x101, "25272d9c5fa350a4eb3c"}, {0x98, 0x88, 0xfff, "a05b4685f47a3fcedc718e0a2ef7cfd7185ca549b63f392d4834f3a57f8bcecb224675d6d4ca129e656f4188f985570c7d67360b663602bd4f4282af303a23b7cf3372ee84b57ef7e5ef32966d30fcbdf6fc7e5e3bc2228fa6afa79716d90fcd8a12c8617c9c7fef50708f56146713c3f80111e9e960762251da6957fe34d04302e354056b719b82"}, {0xf0, 0xffff, 0x7, "6b080f2c04ba42a77f91d943e4d7422bab8aaeb559cf09d0f10ad56aeb40d2cdf3e6a38ad7a3f3f7b012c2c83855f676500c93be70ab78c0f0e7891de22fbbd0c0e8448947dcce7c9efaf8852a1dad3d0e5d396b574103493e986c5e8447401b294ff7048ce3740f00ec02611961797b0eccff158de908dd601cb2e21bb8f0f5fc82a46b6fca34affa7576840e2439e6ec4a01e1fe6eeddbcc7a4a54a9c75033f3f6060241b259d58e3cf807996519f6bb37b9083d6402a44a9ae4824ece70c0e91a5559df52d10040f97c4e6ae01b7ecd25ab510c706f8412361907ce"}], 0x308}, 0x18d) utimes(0x0, &(0x7f0000000040)={{0x9, 0x8000000000000000}, {0xfffffffffffffff9}}) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000000100)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h', &(0x7f00000007c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f0000000c40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f00000010c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f0000001540)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84U\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00'/1144, &(0x7f0000001b40)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h?\xa9\xbbW:\xa1\x95\xd0\xb8\xcc\x0f<\x88\b\x8a\x1d\xa1\xdc3d\xe7\xec\xa5\xb5(\xfc\xf9\x98\x1d\xc6\x14r\xca\x8d\x03\xca\xf5H\xf9\x8e\x7f\xad\xfan\'\xa8g\xda\x1a\xa3kM\x86\xef:\x92]\xde\xea\xae\xce\x98\x9f9\xe2\vZ%\xc5B\x91[b\xb5X\xed\\\xbd\xbbY@\xc5\xea!\x9a\x92E\x8cZ\xe3/^\xf4\x83\'\b\xdd\xd0\xd4L\xe9P62\xd7f\xf0\xdf\xdd\xc5V\xf7O,T\x90\x19\f\xbf\xf09lz=\x16\xb0\x8e,\xa3UhO\x7fe\xdb\xc35\xf7\x1ed\x9b\x7f\x9b\xf4\xadj} \xffX', &(0x7f0000003900)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h'], &(0x7f0000000100)) 76.632134ms ago: executing program 1 (id=277): r0 = open(&(0x7f00000002c0)='.\x00', 0x100000, 0x0) mkdirat(r0, &(0x7f0000000000)='./file0\x00', 0x0) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) syz_emit_ethernet(0x3a, &(0x7f0000000000)={@local, @random="37c62de26bf2", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x1, 0x0, @broadcast, @multicast2, {[@timestamp={0x44, 0x4}]}}, @icmp=@timestamp_reply}}}}) open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000080)='.\x00', 0x4, 0x0) mkdirat(r2, &(0x7f0000000100)='./file1\x00', 0x0) r3 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) chdir(&(0x7f0000000040)='./file0\x00') renameat(r3, &(0x7f0000000200)='./file1\x00', r3, &(0x7f0000000140)='./file0/file0\x00') __getcwd(&(0x7f0000000440)=""/79, 0xfffffffffffffdf7) r4 = __specialfd$inotify(0x2, &(0x7f0000000040)={0x4}, 0x4) inotify_add_watch_at(r4, r1, &(0x7f0000000080)='./file0\x00', 0x84000008) 0s ago: executing program 2 (id=278): open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mprotect(&(0x7f0000d48000/0x2000)=nil, 0x2000, 0x4) syz_emit_ethernet(0x1b2, &(0x7f0000000980)=ANY=[@ANYBLOB="aaaaaaaaaaaa1002b97c52cb86dd64cd0bd0017c33fffe8000000000000000000000000000bbfe8000000000000000000000000000bb520c000000000000c2040000de2b01483f7ac2f2e769ddda23d2aa8dc0f745c8f09030b4c41e73bf9c418b74"]) r0 = socket$inet6(0x1c, 0x2, 0x0) bind$inet6(r0, &(0x7f0000000280)={0x1c, 0x1c, 0x1, 0x3, @empty, 0x7ff}, 0x1c) sendmsg(r0, &(0x7f00000003c0)={&(0x7f0000000240)=@in6={0x1c, 0x1c, 0x2, 0x5086, @rand_addr="fe518a579260882e45bfbe23e816fa1c", 0x9}, 0x1c, 0x0, 0x0, 0x0}, 0x20080) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x1, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_opts(r2, 0x0, 0x1, &(0x7f00000002c0)="ee08665d19ac14d5e51348771197a7728420aef61715f7b1c3d4b3830c921bf0817a0000000000006a89dbdf", 0x2c) sendto$inet(r2, 0x0, 0x5c, 0x1, 0x0, 0x0) (async) sendto$inet(r2, 0x0, 0x5c, 0x1, 0x0, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') (async) unlink(&(0x7f00000000c0)='./file0\x00') kmq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x1}) (async) kmq_notify(0xffffffffffffffff, &(0x7f0000000040)={0x1}) ioctl$DIOCCHANGERULE(r1, 0xcbe0441a, &(0x7f0000000040)) (async) ioctl$DIOCCHANGERULE(r1, 0xcbe0441a, &(0x7f0000000040)) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.136' (ED25519) to the list of known hosts. UDP6: M_MCAST is set in a unicast packet. if_delmulti_locked: detaching ifnet instance 0xfffffe0058741400 Connection to 10.128.1.136 closed by remote host. FreeBSD/amd64 (ci-freebsd-main-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: FreeBSD/amd64 (ci-freebsd-main-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: if_delmulti_locked: detaching ifnet instance 0xfffffe0058740c00 if_delmulti_locked: detaching ifnet instance 0xfffffe0058741c00 FreeBSD/amd64 (ci-freebsd-main-4.us-central1-b.c.syzkaller.internal) (ttyu0) login: md1: truncating fractional last sector by 2 bytes pid 1138 (syz-executor), jid 0, uid 0: exited on signal 11 (no core dump - coredumpsize limit is 0) arp: packet with invalid infiniband address length 6 received on tap2 WARNING pid 1198 (syz-executor): ioctl sign-extension ioctl 2000004218456b ip6_pcbopts: all specified options are cleared. panic: tcp_input_with_port: unspecified destination v4 address cpuid = 0 time = 1767252167 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0xc6/frame 0xfffffe0056d55530 kdb_backtrace() at kdb_backtrace+0xd0/frame 0xfffffe0056d55690 vpanic() at vpanic+0x257/frame 0xfffffe0056d55850 panic() at panic+0xb5/frame 0xfffffe0056d55910 tcp_input_with_port() at tcp_input_with_port+0x25dc/frame 0xfffffe0056d55bb0 tcp_input() at tcp_input+0x1f/frame 0xfffffe0056d55bd0 ip_input() at ip_input+0xaa2/frame 0xfffffe0056d55cf0 swi_net() at swi_net+0x2b8/frame 0xfffffe0056d55d90 ithread_loop() at ithread_loop+0x4ec/frame 0xfffffe0056d55ef0 fork_exit() at fork_exit+0xcc/frame 0xfffffe0056d55f30 fork_trampoline() at fork_trampoline+0xe/frame 0xfffffe0056d55f30 --- trap 0, rip = 0, rsp = 0, rbp = 0 --- KDB: enter: panic [ thread pid 12 tid 100033 ] Stopped at kdb_enter+0x6e: movq $0,0x2587a77(%rip) db> db> set $lines = 0 db> set $maxwidth = 0 db> show registers cs 0x20 ds 0x3b es 0x3b fs 0x13 gs 0x1b ss 0x28 rax 0x12 rcx 0xfffffe0002bf1850 rdx 0 rbx 0xffffffff8283c160 .str.27 rsp 0xfffffe0056d55670 rbp 0xfffffe0056d55690 rsi 0 rdi 0xffffffff81664139 printf+0x149 r8 0 r9 0xffffffff r10 0x1 r11 0x2f r12 0xfffffe0007821780 r13 0xfffffffffffffffe r14 0xffffffff8283c160 .str.27 r15 0 rip 0xffffffff8164d41e kdb_enter+0x6e rflags 0x46 kdb_enter+0x6e: movq $0,0x2587a77(%rip) db>