last executing test programs: 33.292593117s ago: executing program 1 (id=70): r0 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x40000400001803c1, 0x0) open$dir(0x0, 0x40, 0x3) syz_emit_ethernet(0x56, &(0x7f0000000000)=ANY=[@ANYBLOB]) vfork() lio_listio(0x0, 0x0, 0x0, &(0x7f0000000140)={0x1, 0x9, @sigval_ptr=0x2, @thr={0x0, 0x0}}) socket$inet(0x2, 0x2, 0x0) profil(&(0x7f00000006c0)="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", 0x187, 0x401, 0x5) bind$inet6(0xffffffffffffffff, 0x0, 0x0) listen(0xffffffffffffffff, 0x5) accept4(0xffffffffffffffff, 0x0, 0x0, 0x20000000) aio_waitcomplete(0x0, 0x0) socket(0x1c, 0x1, 0x0) socket(0x1c, 0x1, 0x0) r1 = openat$bpf(0xffffff9c, &(0x7f0000000080), 0x80, 0x0) getresuid(&(0x7f0000000000), 0x0, 0x0) ioctl$BIOCSETF(r1, 0x80084267, &(0x7f0000000140)={0x0, 0x0}) kqueue() connect$inet6(0xffffffffffffffff, 0x0, 0x0) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f00000021c0), 0x200000, 0x0) ioctl$BIOCSRTIMEOUT(r2, 0x8010426d, &(0x7f0000002b40)={0x100000001}) fork() mlock(&(0x7f000067a000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) syz_emit_ethernet(0x8e, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0xf0f75}], 0x1, 0x0) ftruncate(r0, 0x80002) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r3, 0x0) lchflags(&(0x7f0000000140)='./file0\x00', 0x4) fspacectl(r3, 0x1, &(0x7f0000000040)={0x3f7, 0xa}, 0x0, 0x0) 32.420211997s ago: executing program 1 (id=74): r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x32, &(0x7f0000000280)=ANY=[], 0x8) (async) setsockopt$inet6_MCAST_LEAVE_GROUP(r0, 0x29, 0x51, &(0x7f0000000380)={0x1, {{0x1c, 0x1c, 0x3, 0x0, @mcast1}}}, 0x88) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) fork() (async) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) (async) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) r3 = socket(0x11, 0x10000000000003, 0x0) setsockopt$sock_int(r3, 0xffff, 0x8000, 0x0, 0x0) (async) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000000)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0xfffffffffffffe64) getsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000000)={0x0, 0x3200, 0x40000004, 0x3, r4}, &(0x7f00000000c0)=0x10) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x1c, 0x2, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, 0x7e}}, r4, 0x6, 0x1000, 0x28d, 0x8, 0x4, 0x8}, 0x98) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x7, &(0x7f0000000280)={@in={{0x10, 0x2, 0x3, @multicast2}}, r4}, 0x88) getsockopt$inet6_sctp_SCTP_MAXSEG(r2, 0x84, 0xe, &(0x7f0000000100)={r4, 0x6b5}, &(0x7f0000000140)=0x8) (async, rerun: 64) syz_emit_ethernet(0x7e, 0x0) (async, rerun: 64) getsockopt$sock_timeval(0xffffffffffffffff, 0xffff, 0x1005, &(0x7f00000001c0), &(0x7f0000000200)=0x10) (async, rerun: 64) r5 = open$dir(&(0x7f0000000840)='./file1\x00', 0x200, 0x0) (rerun: 64) setitimer(0x0, &(0x7f0000000040)={{0x7bfffffe, 0x26}, {0x0, 0xcfe}}, 0x0) (async) pwritev(r5, &(0x7f0000000080), 0x1, 0x1ffffffffffc) (async, rerun: 64) r6 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) (rerun: 64) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x10, 0x2, 0x3}, 0x10) (async) listen(r3, 0xf) (async) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r6, 0x0) (async) r7 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000300), 0x200000, 0x0) ioctl$CIOCGSESSION2(r7, 0xc040636a, &(0x7f0000000080)={0x10, 0x1d, 0x1, &(0x7f0000000740)='\x00', 0x1, &(0x7f00000000c0)='\"', 0x1000, 0x7d86619b, [0x0, 0x9, 0xc]}) (async, rerun: 64) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async, rerun: 64) mkdir(&(0x7f0000000300)='./file0\x00', 0x76) (async) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x0, 0x0) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) 32.330243594s ago: executing program 1 (id=75): socket$inet6_udp(0x1c, 0x2, 0x0) socket$inet6_udp(0x1c, 0x2, 0x0) open$dir(&(0x7f00000001c0)='./file0\x00', 0x488200, 0x176) r0 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f00000006c0)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') __specialfd$inotify(0x2, &(0x7f00000001c0)={0x100000}, 0x4) (async) r1 = __specialfd$inotify(0x2, &(0x7f00000001c0)={0x100000}, 0x4) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x25000430) r2 = kqueue() kevent(r2, &(0x7f0000000000)=[{0x5, 0xffffffffffffffff, 0x3, 0x4f, 0x8020000010, 0x0, [0x0, 0x319, 0x3, 0x10000404]}], 0x1, 0x0, 0x0, 0x0) (async) kevent(r2, &(0x7f0000000000)=[{0x5, 0xffffffffffffffff, 0x3, 0x4f, 0x8020000010, 0x0, [0x0, 0x319, 0x3, 0x10000404]}], 0x1, 0x0, 0x0, 0x0) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) (async) extattr_set_link(&(0x7f00000000c0)='./file0\x00', 0x1, &(0x7f00000001c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c', 0x0, 0x0) extattr_delete_link(&(0x7f0000000040)='./file0\x00', 0x1, &(0x7f00000003c0)='\x90\xcf\xa3+\x00-=\\5\x81\xb2(\x8c&\xd9D\xbe\x97\xc7\"\xde\"\rZ\x04\x1eC\xd3\xcb&\xb6\xc9:PM\x16SU\xef\xe8\xd6T\\\x93\x1f\xce\x19\xa1#Y\x1c\f\xfa\\07\x11\xd1=\xb1\xc5\x9d\xb6M|\xc6@\x11H\xc4\x04\xaeQ\xffi\\\xa6?\xf2\x01O\xd6\xcc\xed[a\xf8u}\xad\x9a\xb8\x1d\x11\a\xa4\xf4o\xce \xe7\xafsZ\xb1.P\xa5\xc6.\xe9\"w$\x0f\xda\x81f\x83M&\x99\xcfn\xae\xe1p\x14\x95\xef\xabb9x\\\a\xf6\xcap\xbf\xe8?\xf5D\xad@\xe3\x13\xb3\xea\xecS\x1c6\xb4\xd9\xd7$/\x8bU\xe1\x88/C\xba\xb4}\x88\'+X\xf2R\xe1\x14\x81Q\xc0\xfb\x0f\xc8n\xa2\xecq\x94\xcf&\xcc\xe3\x11\xe1\xe2Q\xbc\xd4.4\xc1\xed\xac\xa8\x95\xb8\x99\xe7\x1c') r3 = semget(0x2, 0x0, 0x200) __semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f0000000100)=&(0x7f0000000080)) (async) __semctl$IPC_STAT(r3, 0x0, 0x2, &(0x7f0000000100)=&(0x7f0000000080)) 32.220258128s ago: executing program 1 (id=76): socket$inet6_sctp(0x1c, 0x1, 0x84) kqueue() mprotect(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x5) fork() openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x8, 0x0) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1014, 0x0, 0xffffffffffffff7e) r0 = open(0x0, 0x80000000000206, 0x0) ftruncate(r0, 0x3862) fspacectl(0xffffffffffffffff, 0x1, 0x0, 0x0, 0x0) open$dir(&(0x7f0000000140)='./file0\x00', 0x40000, 0x110) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0xb05, 0x3, &(0x7f0000000180)={&(0x7f0000000040), 0x0, 0x0}, 0x0, 0x1c) setuid(0xffffffffffffffff) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r1, 0x6, 0x27, &(0x7f0000000140)={&(0x7f0000000080)="00b2c06df480cf", 0x0, &(0x7f0000000040), 0xb, 0x7, 0x0, 0x7, 0x0, 0x0, 0x3, 0x3, "00ff03ff8e3500"}, 0x40) sendto$inet(r1, &(0x7f0000000200)="727f4c98e6e3b6d62e0c003ba2e66dba9106d9b78a10424b958051429e1dce150e1970605333c5f442aa7ab1e26f9aecabf014a76c0000e800000000009d7f894e966364166f5f775c7ecdeb286802ca29fce95abf9c6afcd165c4b1e5", 0x5d, 0x0, 0x0, 0x0) linkat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0xffffffffffffffff, 0x0, 0x4000) shmat(0x0, &(0x7f0000002000/0x3000)=nil, 0x0) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000100)={0x1, 0x0, 0x0, 0x7fffffff}) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x7, 0x11, 0xffffffffffffffff, 0x0) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) rfork(0x85000) r2 = openat$bpf(0xffffff9c, &(0x7f0000000000), 0x800, 0x0) ioctl$BIOCLOCK(r2, 0x2000427a) ioctl$BIOCSETZBUF(r2, 0x800c4281, 0x0) kqueue() socket$inet_sctp(0x2, 0x1, 0x84) r3 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x8, 0x0) ioctl$CIOCGSESSION2(r3, 0xc040636a, &(0x7f0000000440)={0x28, 0x0, 0x18, &(0x7f00000000c0)="3c9e89526b1700b07f82ee18e15b4e73e47f022de5aa3505", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0x0, 0xc]}) 32.029607164s ago: executing program 1 (id=79): r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_int(r0, 0x0, 0x44, &(0x7f0000001600)=0xa5, 0x4) bind$inet(r0, &(0x7f00000000c0)={0x10, 0x2, 0x1, @loopback}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x4, &(0x7f0000000080)={0x10, 0x2, 0x1, @loopback}, 0x10) recvfrom$inet(r0, 0x0, 0x3, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) mknodat(r1, &(0x7f0000000040)='./file0\x00', 0xe100, 0x0) r2 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) fchflags(r1, 0x8) inotify_add_watch_at(r3, r2, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) 31.759089625s ago: executing program 1 (id=81): socket$inet6_sctp(0x1c, 0x1, 0x84) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000000)=@file={0xa, 0x1, './file0\x00'}, 0xa) setuid(0xffffffffffffffff) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000440)={0xb, 0xf, 0x10, &(0x7f0000000140)="3c9e89526b1f00b07f8aee18e5aa3505", 0x0, 0x0, 0x4000000, 0xfdffffff, [0x0, 0x2, 0x0, 0x80002]}) r5 = fcntl$dupfd(r4, 0x11, r3) ioctl$CIOCCRYPT(r5, 0xc0306367, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x90, &(0x7f0000000480), 0x0, &(0x7f0000000180), 0x0}) ktrace(0x0, 0x5, 0x40000424, 0xffffffffffffffff) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r6 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r6, &(0x7f0000000080)=[{&(0x7f0000000340)="b9a67fcc81af6c3a23fd7b4b6630c1047c7006b371556c428034669b55c211265de7b3d21d8f64eae6c49c50802eca12503c29df0b54f2d586b1173c186308e3c28acd6545f895d0fcac41d25575c0a8926227a4ae0c13983f051942b1aaa5c635b67ff71fbb7de235ea455c92bdaa2386579ef7cbba64379619b8744b65f55ef0b1d88896a238de4e5d7059245f01d8fb013246983d2ee17da2ec27511c4f67fe117b48fa82b9be7e", 0xa9}], 0x1, 0x0) r7 = openat$bpf(0xffffff9c, 0x0, 0x400000, 0x0) r8 = fcntl$dupfd(r7, 0x11, 0xffffffffffffff9c) bind$inet(r8, &(0x7f0000000100)={0x10, 0x2, 0x2, @loopback}, 0x10) r9 = kqueue() kevent(r9, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0xa3e8b29008fa8d71, 0x8, 0xe8c5, 0x0, [0x8000000, 0x0, 0x7, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r10 = socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r10, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x0) connect$bt_rfcomm(r11, 0x0, 0x0) 31.623838742s ago: executing program 32 (id=81): socket$inet6_sctp(0x1c, 0x1, 0x84) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) r1 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1001, &(0x7f00000000c0)=0x101, 0x4) r2 = socket$unix(0x1, 0x2, 0x0) bind$unix(r2, &(0x7f0000000000)=@file={0xa, 0x1, './file0\x00'}, 0xa) setuid(0xffffffffffffffff) r3 = socket$inet_sctp(0x2, 0x1, 0x84) r4 = openat$crypto(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$CIOCGSESSION2(r4, 0xc040636a, &(0x7f0000000440)={0xb, 0xf, 0x10, &(0x7f0000000140)="3c9e89526b1f00b07f8aee18e5aa3505", 0x0, 0x0, 0x4000000, 0xfdffffff, [0x0, 0x2, 0x0, 0x80002]}) r5 = fcntl$dupfd(r4, 0x11, r3) ioctl$CIOCCRYPT(r5, 0xc0306367, &(0x7f0000000300)={0x0, 0x2, 0x0, 0x90, &(0x7f0000000480), 0x0, &(0x7f0000000180), 0x0}) ktrace(0x0, 0x5, 0x40000424, 0xffffffffffffffff) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffff9c, 0x0) r6 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r6, &(0x7f0000000080)=[{&(0x7f0000000340)="b9a67fcc81af6c3a23fd7b4b6630c1047c7006b371556c428034669b55c211265de7b3d21d8f64eae6c49c50802eca12503c29df0b54f2d586b1173c186308e3c28acd6545f895d0fcac41d25575c0a8926227a4ae0c13983f051942b1aaa5c635b67ff71fbb7de235ea455c92bdaa2386579ef7cbba64379619b8744b65f55ef0b1d88896a238de4e5d7059245f01d8fb013246983d2ee17da2ec27511c4f67fe117b48fa82b9be7e", 0xa9}], 0x1, 0x0) r7 = openat$bpf(0xffffff9c, 0x0, 0x400000, 0x0) r8 = fcntl$dupfd(r7, 0x11, 0xffffffffffffff9c) bind$inet(r8, &(0x7f0000000100)={0x10, 0x2, 0x2, @loopback}, 0x10) r9 = kqueue() kevent(r9, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0xa3e8b29008fa8d71, 0x8, 0xe8c5, 0x0, [0x8000000, 0x0, 0x7, 0x3ffffffffffffd]}], 0x1, 0x0, 0x0, 0x0) close(0xffffffffffffffff) r10 = socket(0x1c, 0x1, 0x0) select(0x0, 0x0, 0x0, 0x0, 0x0) connect$inet6(r10, 0x0, 0x0) openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x800, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1, 0x0) connect$bt_rfcomm(r11, 0x0, 0x0) 9.460147961s ago: executing program 0 (id=167): openat(0xffffffffffffffff, &(0x7f0000000a40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000000, 0xe833e02be249e7a4) open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) execve(0x0, &(0x7f00000002c0), 0xffffffffffffffff) r0 = kqueue() kevent(r0, &(0x7f0000000100)=[{0xd03, 0xffffffffffffffff, 0x80a9, 0xffffff, 0x4, 0xfffffffffffffffe, [0xffffffffffffffff, 0x2, 0x3, 0xa00000000]}], 0x1, 0x0, 0xffc6, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r1, 0x80000001, &(0x7f0000000300)="47441afa678677", 0x7, [0x3], 0x200000000000000, 0x6, 0x0, {0x6, 0x9, 0x0}, {0x0, 0x6, @sigval_int=0x1, @spare=[0x3, 0xfffffffffffffffe, 0xb, 0x5, 0x6e00000000000000, 0x6, 0x4]}}) r2 = open$dir(&(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x140) dup2(r1, r2) open$dir(&(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x40, 0x58) r3 = open(&(0x7f0000000340)='./file0\x00', 0x0, 0x0) flock(r3, 0x3) socket(0x1, 0x5, 0xdb) r4 = open(&(0x7f00000000c0)='./file0\x00', 0x200000, 0x28) r5 = open$dir(&(0x7f0000000140)='./file0\x00', 0x8110, 0x0) r6 = open(&(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x40, 0x0) flock(r4, 0x3) flock(r0, 0x7) dup2(r6, r3) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') readlinkat(0xffffffffffffff9c, &(0x7f0000000100)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0xb4) r7 = open(&(0x7f00000001c0)='./file0\x00', 0x2f9, 0x0) rfork(0x85000) r8 = open(&(0x7f0000000040)='./file0\x00', 0x80400000000206, 0x0) cap_rights_limit(0xffffffffffffffff, &(0x7f0000000140)=[0x20000207fffffdc, 0x400000000000001]) ppoll(&(0x7f0000000200)=[{r6, 0x20}, {r7, 0x8}, {0xffffffffffffffff, 0x100}, {0xffffffffffffffff, 0x8}, {r7, 0x40}, {r5, 0x4}], 0x6, 0x0, 0x0, 0x0) __semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000140)=0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x1010, r8, 0x2) pipe2(&(0x7f0000000000), 0x0) 7.784766989s ago: executing program 0 (id=168): r0 = open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f0000000280)="fabd83", 0x3}], 0x1, 0x0) open$dir(&(0x7f00000016c0)='./file0\x00', 0x1, 0xa0) mount(0x0, 0x0, 0x0, &(0x7f00000000c0)="35bf33baee71d8a68674a31ee54818dcc65ff6c32c5eb531e6dbe2bc6236d3981e288786f2f9a8a3252db260f999f154315d5f8877175bd785ad4fa995422150afb39d83") setgroups(0x3e, &(0x7f0000000100)) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) r2 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000380), 0x10000, 0x0) ioctl$CIOCGSESSION2(r2, 0xc040636a, &(0x7f00000000c0)={0x16, 0x23, 0x20, &(0x7f0000000100)="0b6fac4103e7a00d4689e808d0d4755aedaacdd4743c7eaa2c7300d05fe86026", 0x0, 0x0, 0x0, 0x7d86699a}) ioctl$CIOCCRYPT(r2, 0xc0306367, &(0x7f0000000640)={0x0, 0x1, 0x0, 0x8060, &(0x7f00000002c0), 0x0, 0x0, 0x0}) aio_write(&(0x7f0000000340)={r1, 0x80000001, &(0x7f0000000300)="e2", 0x1, [0xfffffffe, 0xffffffff], 0x0, 0x0, 0xf, {0x5, 0x7, 0x0}, {0x0, 0x0, @sival_int, @spare=[0x9, 0x9, 0xf, 0x2, 0x100000000, 0xd24, 0x10000, 0x6b]}}) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) mlockall(0x2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r3, 0x0) sync() openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) r4 = open(&(0x7f0000000140)='./file0\x00', 0x2, 0x4) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0xf000000) mount(&(0x7f0000000000)='ufs\x00', &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000140)) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) preadv(r5, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) r6 = getegid() unmount(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x48000101) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x5) execve(&(0x7f0000000080)='./file0\x00', &(0x7f0000000080), 0x0) chown(&(0x7f0000000200)='./file0\x00', 0x0, r6) socket(0x26, 0x2, 0x0) 7.670000354s ago: executing program 2 (id=171): aio_suspend(0xffffffffffffffff, 0x0, 0x0) pipe2(0x0, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mreqn(r0, 0x0, 0x9, &(0x7f0000000000)={@multicast1, @multicast2}, 0x28) bindat$unix(r0, 0xffffffffffffff9c, &(0x7f0000000000)=@abs={0x8, 0x0, 0x0, 0x3}, 0x8) 7.609817921s ago: executing program 2 (id=172): r0 = open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) symlink(&(0x7f00000002c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000e40)='./file1\x00') open$dir(0x0, 0x200, 0x40) r1 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000040)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000000c0)=0x1c) symlinkat(&(0x7f00000002c0)='\x00', r1, &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) r4 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f00000006c0)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r5 = __specialfd$inotify(0x2, &(0x7f00000001c0)={0x100000}, 0x4) inotify_add_watch_at(r5, r4, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x25000430) open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, &(0x7f0000000080)={0x95f8, [{0x566e, [0xee0d, 0xd871, 0x7, 0xff, 0x7fff, 0x2, 0xfffffff7, 0xaa8, 0x7ff, 0x9, 0xfffffffc, 0x9, 0x7, 0x6219848d, 0x515, 0x8, 0x5, 0x0, 0x0, 0x3, 0x0, 0xf, 0xd6, 0x8, 0x1de, 0xfffffffb, 0x5, 0x2, 0x7f, 0x10001, 0x9, 0x6, 0x3, 0x5, 0x4, 0x5, 0x4, 0x401, 0x7, 0xba5c, 0xe8c, 0x80000001, 0x8, 0xfffffffd, 0x3, 0xedf, 0x1, 0xffffffff, 0x4c04, 0x4, 0x3, 0x10001, 0xffffffde, 0x0, 0x10, 0x400, 0x715, 0x7e1, 0x4, 0xd, 0xa, 0xa09, 0x2, 0x3, 0x4, 0x5131, 0x4, 0x1, 0xbe9a, 0xfff, 0x731, 0x9, 0xbc, 0xb, 0x400c74f, 0x0, 0x9, 0x5, 0x4, 0x101, 0xfffffff8, 0x2, 0x0, 0x5, 0x5229, 0x9, 0x7, 0xfffffffb, 0x81, 0x8001, 0xf, 0x5, 0x3, 0x0, 0x1, 0x0, 0x5, 0xe0, 0x7ff, 0x2, 0x0, 0x8, 0xc, 0x8]}, {0x5c, [0x15, 0x6, 0x4, 0xbae, 0x2, 0x4, 0x86f13b53, 0x401, 0x1000, 0x7, 0x6, 0x7, 0x7fff, 0x0, 0x5, 0x400, 0x9, 0x96a9, 0xbe, 0xfffffffe, 0xb, 0x8, 0xae0, 0x6, 0x7, 0x40000, 0x40, 0x9, 0x7fff, 0x3, 0x200000, 0x7, 0x0, 0x5, 0x3b5, 0x6, 0x2, 0x58, 0x2, 0x1, 0xffffff00, 0x4, 0x4, 0x6, 0x3, 0x3, 0x8, 0x100, 0x0, 0x907, 0x101, 0x9, 0x6, 0xc95, 0x6, 0xc, 0x4, 0x2, 0xb, 0x3eb, 0x0, 0x7fff, 0x0, 0xff8, 0x9, 0x7, 0x8, 0x8, 0x61a, 0x2, 0x80000001, 0x90fd, 0x6, 0xd, 0x6eed, 0x0, 0x4, 0x1, 0x7, 0x5, 0x0, 0x10001, 0x40000010, 0x80000001, 0x9, 0x4b2, 0x50c4, 0x7fffffff, 0x2, 0x0, 0x7, 0x5, 0x1000, 0x0, 0x8, 0x6, 0x2, 0x1, 0x3, 0x1, 0x3ff, 0x1000, 0x1, 0x4]}, {0x0, [0x1, 0x6, 0x3, 0x2, 0x800, 0x0, 0xff, 0x6, 0x7, 0x3, 0xe, 0x1, 0xdd, 0x538, 0x7bac, 0xa, 0xd, 0x9, 0x10001, 0x8, 0x8, 0xff, 0x6, 0x2, 0x800000, 0x2, 0x4, 0x8, 0x4, 0xb, 0x9, 0x1, 0x3, 0xfff, 0x343d3543, 0x400000, 0xfffffff8, 0x9, 0xa87f, 0x800, 0x7, 0x2, 0x1, 0xdb4, 0x101, 0xb369000, 0x9, 0x92, 0x6, 0x0, 0x98, 0x3d104cbc, 0x52, 0x8, 0xc, 0x0, 0x0, 0x3, 0x3, 0x1, 0x1000, 0x8001, 0xfff, 0x17e7, 0x8, 0x7, 0x6, 0x0, 0x5, 0xf10, 0x5, 0x1, 0xffffffb8, 0x7fff, 0x9, 0xfffffffd, 0xfffffffe, 0x3158, 0x5, 0x2, 0x8, 0x36d5, 0x9, 0x1, 0xfffffffb, 0x2, 0x8, 0x8000, 0x5, 0x3, 0x1, 0xfffffffd, 0x4, 0x1, 0xfffffff7, 0x40, 0x6, 0x3, 0x6, 0x1ff, 0x4, 0x9, 0x9, 0x39]}, {0x3, [0x7, 0x5, 0x8, 0xfc, 0x12, 0xd683, 0x8, 0x5, 0x8, 0xadd, 0x5, 0xdb, 0x80000001, 0xc, 0x0, 0xfffffff7, 0xffffffff, 0x2, 0x5, 0x2, 0x3eb3, 0x0, 0x7, 0x7, 0x7, 0x6, 0x5, 0x7673faf3, 0x0, 0x9, 0x1, 0x2, 0xffffffff, 0x1, 0x4f124442, 0x8, 0x0, 0x2, 0x8007, 0x190, 0x5, 0x3, 0x1, 0x800, 0x9, 0x9, 0x3, 0x7, 0x5, 0x7, 0x8, 0x7, 0x0, 0x10001, 0x1, 0x0, 0x7ff, 0xe, 0x9, 0x2df, 0x7, 0x7fffffff, 0x80000001, 0x4, 0x3, 0x3, 0x4, 0x496a, 0x7, 0x7fffffff, 0x74, 0x2, 0x9, 0x3, 0x6, 0xf3, 0x1, 0xa3, 0x49c, 0xec8, 0x100, 0x3, 0x6, 0x9, 0x2, 0x0, 0x6, 0x6, 0x9, 0x1, 0x0, 0x5, 0xa, 0x2, 0x4, 0x3b, 0x3, 0x40, 0x225, 0x80, 0x4, 0x4, 0x7fff, 0x2]}, {0xe8bc, [0x5, 0x4, 0x8, 0x5, 0x4, 0x80, 0x9, 0x1ff, 0xfff, 0xfffffff9, 0x1ff, 0x1, 0x800, 0x80000000, 0x8, 0x7, 0x7ff, 0x6, 0x8, 0x9, 0xe92, 0x8, 0x13, 0x2, 0x0, 0x7f, 0x401, 0x8, 0x7, 0x8, 0x4, 0x5, 0xffffe6ff, 0x7, 0x80000000, 0x6f88, 0x2, 0x9, 0x7f, 0xa5de, 0x0, 0x8, 0x3, 0x800, 0x5, 0x403, 0x54, 0x80, 0xf, 0x3ff, 0x8, 0xfffffffa, 0x9, 0x0, 0x800, 0x8, 0x1, 0x4, 0x6, 0x8, 0x3, 0x5, 0x5, 0x2, 0x1, 0xb26, 0x6, 0x81, 0x1, 0x101, 0x3, 0x2, 0x6, 0x200, 0x4, 0x5, 0x3, 0x2, 0x1ff, 0x3, 0x1, 0x800, 0x5, 0x7, 0x468, 0x7f, 0x94, 0x7, 0x6, 0x3, 0x8, 0x7ff, 0xfffffffe, 0x10000, 0x4, 0x4b, 0x435c9460, 0x3ff, 0x7ff, 0x4b, 0x40, 0x0, 0x5, 0x7]}, {0x3, [0x7, 0x2, 0x1, 0x5, 0xf, 0x40, 0x6, 0x1000, 0x4, 0x3, 0x5, 0x8, 0x1, 0x5, 0xa, 0x81, 0x7, 0x8, 0x8, 0x6, 0x80000000, 0x60, 0x0, 0xd2, 0x1, 0x9, 0x10001, 0x6, 0xc, 0x6, 0x200, 0x5, 0x3, 0x52fd0a00, 0x8, 0x3, 0xfffff1b2, 0x1d, 0x8, 0xff, 0x2000, 0x4b, 0x808f, 0x5, 0xb, 0xfffffffa, 0x3, 0x7ff, 0x430c, 0x1000, 0xb35, 0x0, 0x3, 0x9, 0x1ff, 0x6, 0x400000, 0x5, 0x10001, 0x1, 0x6, 0x1, 0xffff, 0x10, 0x0, 0x9, 0x3, 0xce94, 0x4, 0x0, 0xfffffc01, 0x80, 0x200007ff, 0x2, 0x3, 0x4, 0x8, 0x400, 0x8, 0x81, 0xfffffff7, 0x9, 0x6, 0x7ff, 0x7, 0x0, 0x124f8, 0x7fffffff, 0x6, 0x8, 0x9, 0x80000000, 0x6, 0x7, 0x4ab464c, 0x5, 0x0, 0x10, 0x7f, 0x1, 0x5, 0x9, 0x5b8b7924, 0x7ac5]}, {0xffffff7f, [0x1, 0x4, 0x131f, 0x1, 0x8, 0x6, 0x0, 0x7, 0x3, 0x3, 0x1, 0x200, 0x4a2, 0x49, 0xfd, 0xd0, 0x39e, 0x3, 0x5, 0xffff, 0x2c, 0x3, 0x3, 0x9, 0xffffffff, 0x7, 0xffffffff, 0x4, 0xc, 0x9, 0x263, 0xabd1, 0x3, 0x2, 0x9, 0x6, 0xb7af, 0x6, 0x2, 0x6, 0x1ff, 0x7, 0x10000, 0x2, 0x80000000, 0x4, 0xfffffff5, 0x1, 0x3041, 0x8, 0x6f, 0x2, 0x7, 0x3, 0xfff, 0x1, 0x8, 0x1, 0x5, 0x52, 0x3, 0x80, 0xe5, 0x7, 0x3f, 0x10, 0x6, 0x1, 0x4, 0xfffffff8, 0x4, 0x8001, 0x4220c0b8, 0xfff, 0xfffffff1, 0x6, 0x6, 0x80, 0x6, 0xc9, 0x2, 0x7, 0x52, 0x8000, 0xc, 0x6, 0x5, 0xe, 0x9, 0x8, 0x1, 0x5, 0x5, 0x7, 0x5, 0x6, 0x1d33945, 0xd, 0x8, 0x9fc, 0xffff, 0x4, 0x5, 0x8]}, {0xfffffffa, [0x1ff, 0x2b, 0x9, 0x1, 0x7, 0x3, 0x1, 0x2, 0x80, 0x10000, 0x8, 0xae, 0x7, 0x3, 0x2, 0x6, 0x2, 0x42, 0xec7, 0x0, 0x3, 0x1, 0x9, 0x8, 0x7, 0xfff, 0x3, 0x8d4, 0x7ca, 0x5, 0x283, 0xd3b2, 0x4, 0x8, 0xfffffffe, 0x4, 0x9, 0x7ff, 0x200, 0x1, 0x1, 0x4, 0x40, 0x9, 0x40, 0x7, 0xc, 0x3, 0x1, 0x6, 0x10000, 0x6, 0x2, 0x7fffffff, 0xfffffff1, 0x0, 0xffff9594, 0x6, 0x2, 0x6ef, 0x1, 0x3, 0x0, 0x40, 0xfffffffe, 0x1, 0x3, 0xb28a, 0x1, 0x80000001, 0x800, 0x30e, 0x7b, 0x2, 0x5, 0x9, 0x7ff, 0x5, 0x7, 0x1, 0x9, 0x100000c, 0x6, 0x1, 0x272, 0xc, 0x0, 0x2, 0x4, 0x400, 0x5, 0xfffffffc, 0xffffffff, 0xd, 0x19d, 0x5, 0xf0, 0x8, 0x4, 0x9, 0x4, 0xe6dc, 0x8, 0x1ff0]}, {0x0, [0x9, 0x5, 0x314, 0x1, 0x7, 0x7f, 0x9, 0x4, 0x79, 0x0, 0x7ff, 0x10e, 0xffff, 0x0, 0x80000000, 0x7, 0x1000, 0x3ff, 0x3, 0xf7, 0x0, 0x0, 0x40000000, 0x5, 0xfffffff7, 0xfffffffe, 0x1ff, 0x2, 0x3, 0x1, 0x2, 0x1, 0x4, 0x81, 0x8, 0x2, 0x4, 0x6, 0x1, 0x6, 0xffff, 0x1, 0xf, 0x3, 0x2, 0x6, 0x7, 0xa, 0x1ff, 0x7ff, 0x4, 0x0, 0x8, 0x7, 0xc0, 0xf58f, 0x1000, 0x0, 0x3, 0x7ff, 0xfe0, 0x3, 0x400007, 0x8, 0x9, 0x3, 0x1, 0x1, 0x5, 0x3, 0x1000, 0xfffffff7, 0x1ff, 0xffffffff, 0x4, 0x8001, 0x1, 0x8, 0x0, 0x6, 0x8, 0x1, 0x100, 0x8, 0x0, 0xd7fb, 0xa, 0x0, 0x5, 0x4, 0x1a0, 0x2, 0x5, 0x0, 0x6, 0x1ff, 0x40, 0x5, 0x4, 0xbc, 0x8, 0x5, 0x7, 0xfffffffb]}, {0x6, [0x10, 0x40, 0x1, 0x253, 0x8, 0x8, 0x8, 0x1, 0x7, 0x8, 0x3, 0x60, 0x7ff00000, 0x80, 0x8, 0x2, 0x2, 0x6, 0x80, 0x1ff, 0x8, 0x0, 0x529b, 0x3, 0x0, 0x5, 0x0, 0xfffffffa, 0x1000, 0xa, 0x9, 0xf, 0x5, 0x7, 0x5, 0x0, 0x2, 0x2, 0x5, 0x7, 0x9, 0x4, 0x7, 0xb, 0x101, 0x8, 0x4, 0xfb8e, 0xf3b, 0x4, 0x7, 0x8, 0x8, 0x7, 0x5, 0x4, 0x4, 0x5, 0xfffffff9, 0x2, 0x8, 0x3, 0x2, 0x400, 0x6, 0x7, 0x9bc7, 0x80000000, 0x8, 0x1, 0x200, 0x4, 0xc, 0x6, 0xc2c4, 0x5, 0x5, 0x7, 0x6, 0xf, 0x80, 0x3, 0xfffffffd, 0x20000000, 0x21, 0x2, 0x1, 0x3, 0x80, 0x1, 0x4, 0x7d7, 0x9, 0x4, 0x7f, 0x0, 0x7ff, 0x7fff, 0x1, 0x8a6, 0xfffffff9, 0x1, 0x6, 0x4]}, {0xc0, [0x3f04, 0xf, 0xfffffff7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x9, 0x6, 0x7fffffff, 0x0, 0xfffffffe, 0x7fff, 0x0, 0x0, 0x400000, 0x2, 0xe, 0x401, 0x6, 0x800, 0x7, 0x9, 0x40, 0x0, 0x5144b3ea, 0x694, 0x4, 0x7fe, 0x99, 0x81, 0x5, 0x4, 0x3, 0x0, 0x3ff, 0x1000, 0x9, 0x6, 0x40, 0x8, 0x1, 0xf, 0x1, 0x8, 0x5627aa48, 0x5, 0x4455, 0xfffffffd, 0x1000, 0x7, 0x3, 0x8, 0x0, 0x3, 0x7, 0xffff0000, 0x7ffffffd, 0x7, 0x7fff, 0x0, 0x3, 0x2, 0x9, 0xe, 0x3, 0x7, 0x0, 0xa, 0x3, 0x54d, 0x100, 0x8, 0x3ff, 0x8, 0xfffffffd, 0xffffe64b, 0x400, 0x9, 0x200, 0x3, 0x7, 0x9, 0x40, 0x8, 0x9, 0x2, 0xb0000000, 0x3, 0xb, 0x400000, 0x99, 0xeae, 0xe8, 0xfffffc00, 0xd8b5, 0x4, 0x9, 0xf, 0x2ab, 0x5, 0x8000]}, {0x0, [0x7, 0x44f, 0x4, 0x9, 0x4, 0xffffffff, 0x6, 0xffffffed, 0x7f, 0x7, 0x3, 0x4, 0x80000001, 0x1, 0xdf96, 0x10000, 0x2, 0xc1e, 0x1000, 0x9, 0x6, 0x9b6, 0x404000, 0x1, 0x5, 0x7f, 0x0, 0x2, 0xf, 0x80, 0x8f7, 0x6, 0x2, 0x7f, 0xf7b2, 0x4, 0x0, 0xfffffff7, 0x6, 0x8, 0x1, 0x4, 0xfffff800, 0x8, 0x7, 0x7, 0x14, 0x10, 0x9, 0x7, 0x80, 0xffffffff, 0x10, 0x800, 0x3, 0x3ff, 0xb7, 0x5, 0x4, 0x4, 0x0, 0x8, 0x8001, 0x1, 0x2800000, 0x2e0, 0x10000, 0x8, 0x3, 0x800, 0x1, 0x7f, 0x9, 0x6, 0x10001, 0x8, 0x92, 0x40a54e46, 0x1, 0x7, 0x1ff, 0x1, 0x4, 0x7fff, 0x0, 0xf16, 0x800, 0x1, 0x0, 0x6, 0x1, 0x3a2, 0xf769, 0x80000001, 0x6, 0xc0000, 0x8, 0xfffffff2, 0x7fffffff, 0x400, 0xb, 0x9, 0xffffffff, 0xffff]}, {0x5, [0x10000, 0x5, 0x25a, 0x1, 0x6, 0x2, 0x8, 0xfffffffd, 0x6, 0x3, 0x5, 0x100, 0x1, 0x5, 0x27c, 0x10000, 0x0, 0xfffffff3, 0x1, 0x7, 0xfffffff7, 0xfd4, 0x3ff, 0x7, 0x8, 0x1, 0x1, 0xf, 0x6, 0x0, 0x100, 0x0, 0xe296, 0x0, 0x8000, 0xffffa59e, 0x7, 0x1, 0x4, 0x4, 0x100, 0x8, 0x1ca, 0x2, 0x5, 0x8, 0xfffffff9, 0xa, 0x52b, 0xe, 0x4, 0xfffffff9, 0x5f, 0x5, 0x8, 0xfffffff7, 0x2, 0x4, 0x6, 0x0, 0x5, 0x3, 0x7, 0xff, 0x10a, 0x7, 0x6, 0x1ff, 0x1, 0x4, 0x0, 0x4, 0x6, 0x401, 0x4a1, 0x5, 0x8001, 0x7, 0x6f, 0xc1f6, 0x2, 0x6, 0x1, 0x7, 0xff, 0x9, 0x43d, 0x2, 0xffef, 0x1, 0x7, 0x9a, 0x7ff, 0xb9, 0x800, 0x3, 0xc, 0xffffffff, 0x5, 0x7, 0x9, 0x7ff, 0x32, 0x7]}, {0x6, [0x1, 0x5, 0xcd4, 0xb0, 0x1000, 0x8, 0xfff, 0x8, 0x6, 0xc, 0x4a, 0x9, 0x74, 0x6, 0xa, 0x75e7, 0x4, 0x0, 0x8, 0x3, 0x4, 0x1ff, 0x4, 0x80, 0x7, 0x7, 0x8, 0xaa9, 0x0, 0x7, 0xd46, 0x7, 0x5, 0x80000000, 0x9, 0x4f9b3d50, 0x800, 0x3, 0x8, 0x8, 0xdd62, 0x25ae, 0x0, 0x7, 0xfffffff9, 0x450, 0x3, 0x5, 0x2271, 0x1, 0x2, 0x1, 0x3, 0x7fffffff, 0x0, 0x3, 0xc, 0x86, 0x0, 0xb959, 0x200, 0x8, 0x5, 0x2, 0x92ad, 0x1, 0x2, 0x38e, 0x7ff, 0x10, 0x7f, 0x8, 0x5, 0x7, 0xf, 0x86, 0x2, 0x5, 0x8001, 0x0, 0x3, 0x78aa0000, 0x0, 0x0, 0x8, 0x84e1, 0xd934, 0xe000, 0x8, 0xb5d, 0x9, 0x7ff, 0x4, 0x0, 0x4, 0xfffffff8, 0x1, 0x13, 0xecb, 0x1000, 0x10, 0x0, 0x80000001, 0x3]}, {0x3, [0x1, 0x8, 0x3, 0xc, 0x0, 0xf91, 0x4, 0x7, 0x4, 0x6, 0xfff, 0x6, 0xfffffffa, 0xa000, 0xfffffff9, 0x80, 0x1, 0x1, 0xff, 0x3, 0xf, 0x3, 0x70f, 0x100, 0x2, 0x2, 0xe3, 0x1, 0x7, 0x7fffffff, 0x1, 0x9, 0x5, 0x7, 0x9, 0xa, 0xf4, 0x1, 0x2, 0x1, 0x80000000, 0x4, 0xfffffffe, 0x1, 0x2, 0x401, 0x8, 0x8, 0x1, 0x7, 0xf2, 0x8, 0x7fffffff, 0x10001, 0x8, 0x4, 0x9, 0x5, 0x13f7, 0x779, 0x9, 0xffffffff, 0x0, 0x8, 0xeb7, 0x7, 0x9, 0x10000, 0x3, 0x4, 0x7fffffff, 0x6, 0x8, 0x7, 0x6cec, 0x10001, 0x3, 0x7, 0xb2, 0x1, 0x1, 0x5, 0x9, 0x3, 0x2, 0x5508c39c, 0x7, 0x5b3, 0x1, 0x400, 0x7, 0x1, 0x4, 0x2, 0x3, 0xe, 0x4, 0x2, 0x7, 0xffffffff, 0x50, 0x9, 0x0, 0x3]}]}) ppoll(&(0x7f0000000040)=[{0xffffffffffffffff, 0x46}], 0x860, 0x0, 0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r3, 0x84, 0x8004, &(0x7f0000000140)={r2, &(0x7f0000000100)=[@in6={0x1c}]}, &(0x7f00000001c0)=0x10) open$dir(&(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x200, 0x6) symlinkat(&(0x7f0000000dc0)='./file0\x00', r1, &(0x7f0000000ec0)='./file1aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') mkdirat(r1, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4f) rename(&(0x7f0000000d80)='./file0\x00', &(0x7f0000000180)='./file1\x00') mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r6 = socket(0x1c, 0x1, 0x13) r7 = socket$inet6_sctp(0x1c, 0x5, 0x84) sendto$inet6(r7, &(0x7f0000000300)="ca", 0x1, 0x0, &(0x7f00000003c0)={0xfffffffffffffc20, 0x1c, 0x3, 0x0, @loopback}, 0x1c) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r6, 0x6, 0x2000, &(0x7f00000001c0)={'bbr\x00', 0x3da}, 0x24) connect$inet6(r6, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) r8 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$sock_int(r8, 0xffff, 0x10, &(0x7f0000000080)=0xb6, 0x4) connect$inet(r8, &(0x7f0000000000)={0x10, 0x2, 0x3, @loopback}, 0x10) sendmsg$unix(r6, &(0x7f0000001440)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000840)="fa", 0x1}], 0x1, 0x0, 0x0, 0x80}, 0x0) 5.65328381s ago: executing program 0 (id=174): openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) (async) mlock(&(0x7f0000ffc000/0x2000)=nil, 0x2000) clock_gettime(0x10, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) (async) r1 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1014, 0x0, 0x0) (async) r2 = open(0x0, 0x80000000000206, 0x0) ftruncate(r2, 0x3862) (async) fspacectl(0xffffffffffffffff, 0x1, &(0x7f0000000080)={0x7, 0x7cfe1424}, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x40000, 0x110) sendfile(r3, 0xffffffffffffffff, 0xb00, 0x40, &(0x7f0000000000)={&(0x7f0000000040)=[{&(0x7f0000000200)="aa09", 0x2}], 0x1, 0x0}, 0x0, 0x0) (async) setuid(0xffffffffffffffff) (async) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_TXTLS_ENABLE(r4, 0x6, 0x27, &(0x7f0000000140)={&(0x7f0000000080)="00b2c06df480cfe19f0da47ac0235414", 0x0, &(0x7f0000000040)="cf", 0xb, 0x10, 0x0, 0x7, 0x1, 0x0, 0x3, 0x3, "00ff03ff8e3500"}, 0x40) sendto$inet(r4, &(0x7f0000000200)="727f4c98e6e3b6d62e0c003ba2e66dba9106d9b78a10424b958051429e1dce150e1970605333c5f442aa7ab1e26f9aec", 0x30, 0x0, &(0x7f0000000280)={0x10, 0x2, 0x0, @broadcast}, 0x10) (async) linkat(0xffffffffffffff9c, &(0x7f0000000000)='\x00', 0xffffffffffffffff, 0x0, 0x4000) (async) r5 = shmat(0x0, &(0x7f0000001000/0x3000)=nil, 0x1000) shmdt(r5) r6 = fcntl$getown(0xffffffffffffffff, 0x5) procctl$PROC_REAP_KILL(0x0, r6, 0x6, &(0x7f0000000100)={0x1, 0x0, r6, 0x7fffffff, r6}) (async) openat$md(0xffffffffffffff9c, &(0x7f00000001c0), 0x400, 0x0) (async) open(0x0, 0x80000000000206, 0x0) r7 = open$dir(0x0, 0x202, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x7, 0x11, r7, 0x0) (async) chmod(&(0x7f00000000c0)='./file0\x00', 0x0) (async) chflags(&(0x7f0000000100)='./file0\x00', 0x20006) rfork(0x85000) bindat(r2, r0, &(0x7f0000000180)=@in={0x10, 0x2, 0x3, @remote={0xac, 0x14, 0x0}}, 0x10) 5.649091709s ago: executing program 2 (id=175): r0 = socket$unix(0x1, 0x5, 0x0) fchmod(r0, 0x17) r1 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x9e) pwritev(r1, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) r2 = socket$bt_hci(0x24, 0x3, 0x86) r3 = socket(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x4, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FUNCTION_BLK(r3, 0x6, 0x2000, &(0x7f0000000040)={'rack\x00'}, 0x24) connectat(r2, r3, &(0x7f00000009c0)=@in6={0x1c, 0x1c, 0x0, 0x10004009, @mcast1, 0x7fff}, 0x1c) r4 = openat$bpf(0xffffffffffffff9c, &(0x7f0000002ec0), 0x800, 0x0) ioctl$BIOCSETFNR(r4, 0x80104282, &(0x7f0000000100)={0x0, 0x0}) statfs(&(0x7f00000006c0)='./file0\x00', &(0x7f00000014c0)) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0xffffffffffffff6f) r5 = kqueue() kevent(r5, &(0x7f0000000080)=[{0x0, 0xfffffffffffffffb, 0x45, 0x10, 0x2ef5, 0x6}], 0x1, 0x0, 0x0, 0x0) acct(&(0x7f0000000000)='./file0\x00') unmount(&(0x7f0000000040)='./file1/file0\x00', 0x400000) chdir(&(0x7f00000001c0)='./file0\x00') 3.44379911s ago: executing program 0 (id=177): r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81706}], 0x1000000000000013) getdirentries(r0, 0x0, 0x0, 0x0) (async) close(r0) freebsd11_getfsstat(&(0x7f0000000600), 0x1d8, 0x2) (async) syz_emit_ethernet(0x211, &(0x7f0000001c40)=ANY=[@ANYBLOB="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"]) (async) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) munmap(&(0x7f0000001000/0x2000)=nil, 0x2000) (async) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r2, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) (async) connect$inet6(r2, &(0x7f0000000080)={0x1c, 0x1c, 0x3, 0x0, @loopback}, 0x1c) setsockopt$inet6_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x903, &(0x7f0000000300)={0x0, 0x4, 0x42}, 0x8) mmap(&(0x7f0000002000/0x1000)=nil, 0x1000, 0x3, 0x410, 0xffffffffffffffff, 0x4) ioctl$CIOCGSESSION2(r1, 0xc040636a, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x200, 0x8c) (async) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) link(&(0x7f0000000940)='./file0\x00', &(0x7f0000000d40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) setuid(0xee01) (async) r3 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) (async) r4 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) inotify_add_watch_at(r4, r3, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) open(&(0x7f0000000800)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x400000, 0x41) (async) cpuset_setaffinity(0x3, 0x0, 0x0, 0x0, 0x0) (async) execve(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=[&(0x7f0000003dc0)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h', &(0x7f00000007c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f0000000c40)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f00000010c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f0000001540)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84U\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00'/1144, &(0x7f0000002580)='gcB\xca+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\f\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\xebF\xe1\xaaF\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84\x82\xb2\xd4(\x1d\x04\xf2\x8e\xd2\f\xf3a\x873\xdc\a0\xe9\x80\x12 \x98\v\xe9\x8a\xdfU\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\x96\x9f\xcc\xd8\xaa\t\x90\xae\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95\x00\x00\x00\x00\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83k\xa82\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xcbd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e\x1f\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xf5\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-5\x87\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\xe1#+\xd8\xe1\xfa\xa6\xd1>\x98\xe4(\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86\x81&)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00\x1b\xe7:\xc0\xff\xbf\n\xe9\xc1\x8f\xdc\x1b\xd0\xf0z\xfaK\xc8\xd63\xc7\xe7K\x9d\xfa@q=\xbfE\xad1\x87\xb4Uy\xd9\xca\xc5\xc2\x87\xb6h?\xa9\xbbW:\xa1\x95\xd0\xb8\xcc\x0f<\x88\b\x8a\x1d\xa1\xdc3d\xe7\xed\xa5\xb5(\xfc\xf9\x98\x1d\xc6\x14r\xca\x8dn\x82\xc6c{\x0e\x1c\r\x86L]\x1d+/\x03\xca\xf5H\xf9\x8e\x7f\xad\xfan\'\xa8g\xda\x1a\xa3kM\x86\xef:\x92]\xde\xea\xae\xce\x98\x9f9\xe2\vZ%\xc5B\x91[b\xb5X\xed\\\xbd\xbbY@\xc5\xea!\x9a\x92E\x8cZ\xe3/^\xf4\x83\'\b\xdd\xd0\xd4L\xe9P62\xd7f\xf0\xdf\xdd\xc5V\xf7O,T\x90\x19\f\xbf\xf09lz=\x16\xb0\x8e,\xa3UhO\x7fe\xdb\xc35\xf7\x1ed\x9b\x7f\x9b\xf4\xadj} \xffX'], &(0x7f0000000640)=[&(0x7f00000001c0)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84U\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00', &(0x7f0000002100)='gcB\xc6+\xbf\xcc_\x81 \xd5\xb9\x93L9\x87\x84K\xb9!\x0eX czg\x14\xec*\xed\xa6u\xc4\x14*\xdb_\xe8\\\x96\n\xa6)\v\xf9 \xddb|\xe7\x14\x82\xc3\x90\xf9\r?i\x86Lpw\xba\xe1\v\x1a9G\x04\fpfP\xcf\xee<:C\x1e\\\x1f&\xaf\xea?\x91\a\xea\x8d\x05\x83aJ\xf0v\xc0q\x84\x93il\v\x03\b\xadT\a\x14\xd7\xd5u\x84U\xd1\x1f\x9b\x1d2mRQ\xea\x90\xa0m#\xa4\x1dy\x9d\xe9\xfa\x06\xa27\x9d;\xe4\xb4\x86\xa7&\xa9c6\x1b\x8d\xa6$\x82\x1b\x9a\x82\xc0o/\x8c\x97\xb9BJh\x9f\xb2\"\x95j\xd7PN\x89\x7f\xc8AB\xc7}T\xbe\xf1\xe7\xe2\xad\xdd\xc2\xb7\xe8Ac*v\xf7\x16\x8fe\xef\x84\xf5k\xa9\xeb\xebt\xc3\xf1f\xca\x04*\xec\xfa\xe5b\xeb\xb4\x99\xefSv\x82\xe2\xe3\x02)sP%Z\xad\x83\xda\xbe2\xa9\xf2\x04\xda\nU\x84\xc2\xe3E\xc1\xd8L\xb1r\xb0\xdaH\xf2{\xf6~\x0f\xb9\xdd.\x06W\xd7\x1dG<\x1e\f2c\xf4\xa0d\x11\x88\xee\xcc\x18(\rap\x98?\xb1$\xe9\xe9+\xa6\xfb\xb1\xc61\xf1\xe7m\x91]]\xb26\xbfA\x86\f\xda\fi\xc8\xefl&*\"_^5\xd1 H\x17\xf0\xa7\x83}\x92W\xeb\xe5\xa3\xcc\a\x10dxb\xc2\x13mNP\xac]\xc2\xc1\xa8\x1df_\xcax\xbd\xf4m\x1e\x18occU\xb6\\\xf5\xf3\xeb\xa3\x98\f1\x8b\x99\xf0P\x8e\x1b\xe3\x9e\xb9\x0f\xf9\xb0\xadd\x9d=d\x94\xec\xceQx\xdb\xf6zG!3\xd7\x05\xf0=k\xb7vo?1H\x86\x192\xb2&\xa5\x9d\xd7\xbc\x85\a\xfer\x14\x0e\xd9=\xa6\xa1\x03cz>R\x11\xba\xf9\x17\r\x98\ap\xda-\xb0R\t\x93.r/\xce\xa4\rK\xcb\x1aO\x03z$\xbeYvYn\xddI\xe7\x13\x8f\x15\xefL\xba`\x9d\xea\xed\xf0)s\x12r\x9b\xf2&\xf2-\xc6\xec\x96\x19\xc9\xd7\xda\x06\xba\x87\x18\xef+\xcdp\x95\xef\xd9\xb9s\x8b\xf3\x8b\x88<\xa0\xa3\xad\x8c\xaf&iMM\xc5>\xa7v\x17\xdf \xca\x86#\xa7*\xecl\xbfp\xc3x\xc3\xc1r\xbe7\xb5\xa3\xf11[`\xcb7z\xa0P\xd5p\xe9\xddC\xc0\x80=\xd9y\x01\x1c\xe7\x1cdN\xd5x\x89\xc9\xc0\xc4{\x01\xa6o\x9ceZ\xe1\xfa0?\x94\x1f\x9aQ\xf0Lf\x1e\x17A@\x06\x89\xadg+$/V\r\xc9oQ=k\xa0\xa6\\\x00\x99\x94\x10dy\x7f\xd1\xd2\xd04\x96\b\x80/\x9a\xfc\a\'\x83\xb8\xcd\xb1\xf5#\tr\xb4\xc4\x929\x01\xee\xe6\n\x8ba\xde\xdbsAzG\xe86\xfe\x83\x1d\xb3K2\xf0\x8f\xde\x85\x00M&\x00\x00O\x86\xec2/\xea\xe6$(L\x85\xf8Y\xcf,\xa3\x87^\xe1\xd8F\xe4AJ\xaa\x1f\xe9\xff?\x9aF\x97M\x80\xe9LR\xdc\x9f~\xce\xb5\xef\x14M\f#>O\xb44LB\xc6a\x82\xc5\x107\xae\xdb\v\xf7\xc4k\xab\xf8:\x1fj\xa2vf)\xee\xab\xb3C\x92\x8e\x80\xb1\x01\x85\xb1v\xae*\xa7])n)+\xd9\xcf\xe9\x9ag\x8a*u\xe4e?\xf9\x93\x93u\xd2M\xfd\xa1\xc5\xff\xd9\x15-\xabH\x90\x04\xea\x88\"\xfe\v\x1d\xa5}H\xee\xc7\x94\xdb\x02\xf7\t\x92\t5\x1e\xd6~R\x9e\xb5NV)\xa6\x1ff\xde\xbf\x97V\x87\v\x94\xb4\xb0\x7f3\xa3\x85c=\xb0\x8ab\x06\xfa\xe9\xb3\x1d\xc9.\x8br\xf9\xde\xd6\xe6\x14O\xc8\xff3ZA\xea\xd4\xa9]7\xd8\xed\xc6\xdf\x01\xb3\n8\xbf\xbe\x1e\v\x18\xd9\xb3+X4\xb5S\xe7\xf6oO;\xc5\xc8-\x9e\xb5\xbe\x97\xb4k\xd2n\xfa\xd1\x82\x16\xea\x93\xc7\xb3?\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb7\xf2K\xe9\xcf\xc6y\xb00\xe0\xa0\f\xef\x02\xd5 (S\xffhY\"\x83\x05M\x0f\v\xec0B\xa9\xd7\x80\xdaL\xa2Q\x8c\xde\x17* \xf5)tk\xb6\xb9\x86?\x1a\xff\xdc\xecP\xd1w1\xf4a\x00r\x06,\x86S\x11)\xf4\x16W\xd6\x86\x10\x02\x15mod\x854\xd4\'^\xb6\xe9f\xd6:\xfc5%\x16\xc5\xa5\xf1\x11k\xdd{\xaai\x8a\xde\xa6\x18,H\xd8\xe5\xf5g\xe7U\\(\x01\xc5\xde\x1d\x8acHf\x86`9qV|=\xbb\xd1\x95\x0f\x86\xffa\xb1\xdb\x82l\xc3\xcf\x88\xeeJ\xda\x8b0f\xac\xc2n\xd1\')\xf2\xaf\xc0\x06\x01\xb4b\xef\xa8!\xf9\n\xf7{C\xdc`h\b6>\x171\x16\x89\xa8\xe9OC\x7f\xb1\x1c\xd4\xd5\xa7\x7f\xfd\xa8Y\xf0s_\xfb\x00']) r5 = openat$md(0xffffff9c, &(0x7f00000001c0), 0x40, 0x0) freebsd11_fstatfs(r5, &(0x7f0000000800)) (async) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x5) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000440), 0x40, 0x0) copy_file_range(r3, &(0x7f0000000140)=0xff, r3, &(0x7f00000019c0)=0x100, 0x7, 0x0) (async) ioctl$CIOCCRYPT(r6, 0x80044401, &(0x7f0000000640)={0x0, 0x1, 0x0, 0x8060, 0x0, 0x0, 0x0, 0x0}) 3.44327965s ago: executing program 2 (id=178): r0 = socket(0x2, 0x1, 0x0) socketpair(0x17, 0x20000000, 0x0, &(0x7f0000000780)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_MCAST_LEAVE_GROUP(r3, 0x29, 0x51, &(0x7f0000000240)={0x1, {{0x1c, 0x1c, 0x3, 0x0, @mcast1}}}, 0x88) r4 = kqueue() kevent(r4, &(0x7f0000000000), 0x20b89, 0x0, 0xffff3955, 0x0) fork() setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x28) r5 = kqueue() kevent(r5, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) sendmsg$inet6_sctp(0xffffffffffffffff, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0) r6 = open$dir(&(0x7f0000000840)='./file1\x00', 0x40000400000002c2, 0x0) setitimer(0x0, &(0x7f0000000040)={{0x7bfffffe, 0x26}, {0x0, 0xcfe}}, 0x0) pwritev(r6, &(0x7f0000000080), 0x0, 0x0) r7 = open(&(0x7f0000000480)='./file1\x00', 0x4, 0x102) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x7, 0x12, r7, 0x0) open$dir(0x0, 0x40000400000002c2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(&(0x7f0000000000)='ufs\x00', 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2) recvfrom(r1, &(0x7f0000000100)=""/255, 0xfffffe24, 0x860, 0x0, 0x0) sendto(r2, &(0x7f0000000300)="0814883b798a67b633dd655bfa79ba05a408668b60c756793771929bc45ba2e1394d73283f697c37f72fa0c8d04d7759b7647eaeff609a37718d7486c33859d34a2c4bba320cb5d08fc26730cab962b608c632c8cc923deb54e2461942717d99412dc946c342204ba361a3bb877a4446b3ba0c00"/128, 0x4a15fa9c8a077d79, 0x100, 0x0, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) dup2(r1, r2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x10, 0x2, 0x1, @rand_addr=0x8}, 0x10) socket$inet(0x2, 0x1, 0x0) 3.442608987s ago: executing program 3 (id=179): r0 = kqueue() kevent(r0, &(0x7f0000000040), 0x7fffffff, 0x0, 0xfffffffb, 0x0) fork() ioctl$PIO_DEADKEYMAP(0xffffffffffffffff, 0x20006b09, 0x0) setsockopt$inet_mreq(0xffffffffffffffff, 0x0, 0xf, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x200201, 0x0) aio_write(0x0) (async) fspacectl(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) (async) fhopen(&(0x7f0000000000)={{[0x10004, 0x7]}, {0xd8, 0xffc0, "080f8c9fdeff730c06948d12f9c50b95"}}, 0x40000) (async) socket$inet6_udp(0x1c, 0x2, 0x0) kevent(r0, &(0x7f0000000240)=[{0xffffffffffffff87, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c9, 0x6, [0x0, 0xf1, 0x3, 0x9]}], 0x1, 0x0, 0x0, 0x0) mincore(&(0x7f0000156000/0xc00000)=nil, 0xc00000, &(0x7f0000001640)=""/4096) 3.070069012s ago: executing program 3 (id=180): mkdir(&(0x7f0000000000)='./file0/file0\x00', 0x0) readv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)=""/255, 0xff}], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x5, 0x1010, 0xffffffffffffffff, 0x0) getpeername(r0, 0x0, &(0x7f0000000040)) mount(&(0x7f0000000080)='ufs\x00', &(0x7f00000000c0)='.\x00', 0x0, &(0x7f0000000100)) 1.030915204s ago: executing program 0 (id=181): r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f00000005c0)={r1, 0x80000001, &(0x7f0000000300)="dbcabea0538e18848c61521d04e2", 0xe, [0x0, 0x9], 0x0, 0x0, 0xfffffffd, {0x0, 0x7, 0x0}, {0x0, 0x0, @sival_int, @ke_flags=0x9fc040a3bd851cca}}) open(0x0, 0x80000000000206, 0x0) r2 = kqueue() kevent(r2, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) (async) r3 = open(&(0x7f0000000480)='./file0\x00', 0x80400000000206, 0x0) r4 = socket(0x1c, 0x1, 0x0) sendmsg$inet_sctp(r4, &(0x7f00000004c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3, 0x406, @loopback}, 0x1c, &(0x7f00000003c0)=[{&(0x7f0000000500)="182a187d094b09d5c2da5cb8b9e2629e18cc9e3f6a7690dabf8beb4abc1aa91a8f6646c64bdc3faf4d4aeece25e52ccfd49df6d49097189852e4fa84bd736151cdc165065d080000b71be2ced1dcaf7a729c730eea0600000000000000c94492ca6327e640d79c969f9b78f9235da433e80ac467889eadd506ccd40d703ae975e8fec78719d96b11828506baa1e92f506ed50ebe15e12e5d7da0b71b919682456af4c711ff34ffd5cc133a95774922c8e038fd622f", 0xb5}, {0x0}], 0x2, 0x0, 0x0, 0x149}, 0x0) (async) writev(r4, 0x0, 0x0) r5 = socket(0x1c, 0x1, 0x0) setsockopt$sock_int(r5, 0xffff, 0x1001, 0x0, 0x0) (async) ktrace(0x0, 0x4, 0x106, 0x0) (async) bind$inet6(r5, 0x0, 0x0) (async) connect$inet6(r5, &(0x7f0000000180)={0x1c, 0x1c, 0x3, 0x0, @empty}, 0x1c) (async) r6 = socket$inet_udplite(0x2, 0x2, 0x88) truncate(&(0x7f0000000080)='./file0\x00', 0x7ffe) dup2(r5, r6) r7 = open$dir(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) sendfile(r7, r6, 0x17, 0x0, 0x0, 0x0, 0x14) (async, rerun: 32) freebsd11_fstatat(r4, 0x0, &(0x7f00000000c0), 0x0) (async, rerun: 32) ioctl$KDGETMODE(r4, 0x40046676, 0x22e00000) (async) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r3, 0x0) (async, rerun: 64) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) (async, rerun: 64) write(r3, &(0x7f0000000080)="ba", 0x100000) 1.029477084s ago: executing program 2 (id=182): r0 = kqueue() kevent(r0, &(0x7f0000000040), 0x7fffffff, 0x0, 0xfffffffb, 0x0) ioctl$OPIO_KEYMAP(0xffffffffffffff9c, 0x8a026b07, 0x0) r1 = kqueue() kevent(r1, &(0x7f0000000040)=[{0xe, 0xfffffffffffffff9, 0x8009, 0x8, 0xe8c8, 0x0, [0x0, 0x2]}], 0x1, 0x0, 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r2 = open$dir(&(0x7f0000000240)='./file2\x00', 0x1, 0x0) mkdirat(r2, &(0x7f0000000140)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mkdir(&(0x7f0000001040)='./file0\x00', 0x1) r3 = open$dir(&(0x7f00000003c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2000000, 0x101) r4 = open$dir(&(0x7f00000000c0)='./file0\x00', 0x80, 0x4) mkdirat(r4, &(0x7f00000001c0)='./file1\x00', 0x0) fdatasync(r3) renameat(r4, &(0x7f0000000200)='./file1\x00', r4, &(0x7f0000000140)='./file0/file0\x00') renameat(r3, &(0x7f0000000340)='./file0/file0\x00', r4, &(0x7f0000000380)='./file1\x00') renameat(r3, &(0x7f0000000040)='./file1\x00', r4, &(0x7f0000000180)='./file0\x00') r5 = open$dir(&(0x7f0000000080)='.\x00', 0x4, 0x0) r6 = openat$crypto(0xffffffffffffff9c, &(0x7f0000000000), 0x200, 0x0) ioctl$CIOCGSESSION2(r6, 0xc040636a, &(0x7f0000000040)={0x19, 0x0, 0x10, &(0x7f0000000080)="3c022e61793eece1c4ca3d18e5aa3545", 0x0, 0x0, 0x0, 0xfdffffff, [0x0, 0x0, 0xffffffff, 0x401]}) ioctl$CIOCCRYPT(r6, 0xc0306367, &(0x7f0000001300)={0x0, 0x1, 0x0, 0x17, &(0x7f00000002c0), 0x0, 0x0, &(0x7f0000000280)}) r7 = open$dir(&(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x0) renameat(r7, &(0x7f0000000e40)='./file1\x00', r5, &(0x7f0000000e80)='./file0\x00') r8 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) symlinkat(&(0x7f0000000940)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', r8, &(0x7f0000000840)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r9 = open$dir(&(0x7f0000000100)='.\x00', 0x0, 0x0) mkdirat(r9, &(0x7f0000000a80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) open$dir(&(0x7f00000011c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x80, 0x1) link(&(0x7f0000000100)='./file0\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') open$dir(&(0x7f0000000040)='.\x00', 0x8, 0x10) 1.029065357s ago: executing program 3 (id=183): freebsd11_mknod(&(0x7f00000000c0)='./file0\x00', 0x1000, 0x0) r0 = socket$inet6_tcp(0x1c, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200, &(0x7f00000000c0)=0xc96, 0x4) getsockopt$inet6_tcp_int(r0, 0x6, 0x200, 0xffffffffffffffff, &(0x7f0000000100)) openat$md(0xffffffffffffff9c, &(0x7f0000000040), 0x4, 0x0) open$dir(&(0x7f0000000200)='./file0\x00', 0x100000, 0x4a) open$dir(&(0x7f0000000000)='./file0\x00', 0x1, 0x0) r1 = kqueue() freebsd11_kevent(r1, &(0x7f0000001a40)=[{0x3, 0xfffffffffffffff8, 0x81, 0x20, 0x9, 0x5}], 0x1, &(0x7f0000001ac0)=[{}], 0x1, 0x0) 680.266294ms ago: executing program 3 (id=184): r0 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r1 = __specialfd$inotify(0x2, &(0x7f0000000180)={0x4}, 0x4) r2 = open$dir(&(0x7f0000000240)='.\x00', 0x0, 0x0) r3 = __specialfd$inotify(0x2, &(0x7f0000000180), 0x4) cpuset_getdomain(0xe96e66809bf18621, 0x1, 0xffffffffffffffff, 0x20, &(0x7f0000000280), 0x0) (async) cpuset_getdomain(0xe96e66809bf18621, 0x1, 0xffffffffffffffff, 0x20, &(0x7f0000000280), 0x0) cpuset_setdomain(0x3, 0x4, 0xe096, 0x20, &(0x7f0000000040)={[0x6, 0x23, 0x8, 0x10]}, 0x1) inotify_add_watch_at(r3, r2, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) inotify_add_watch_at(r1, r0, &(0x7f0000000280)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x21000430) rfork(0x83000) (async) rfork(0x83000) 190.406173ms ago: executing program 3 (id=185): r0 = socket(0x1c, 0x1, 0x0) setsockopt$inet_tcp_TCP_FUNCTION_BLK(r0, 0x6, 0x2000, &(0x7f0000000400)={'rack\x00', 0x100}, 0x24) (async, rerun: 32) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, 0x1}, 0x1c) (async, rerun: 32) setsockopt$inet_tcp_TCP_FUNCTION_BLK(0xffffffffffffffff, 0x6, 0x2000, &(0x7f0000000080)={'bbr\x00'}, 0x24) (async) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) kmq_notify(0xffffffffffffffff, &(0x7f0000000240)={0x4, 0xf, @sival_int=0x9, @ke_flags}) (async) kqueue() mount(&(0x7f0000000000), 0x0, 0x0, 0x0) (async) mknodat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x1000, 0x0) (async, rerun: 32) access(0x0, 0x0) (rerun: 32) r1 = kqueue() (async) procctl$PROC_REAP_KILL(0x0, 0x0, 0x6, &(0x7f0000000180)={0x8, 0x1, 0xffffffffffffffff, 0xfffffffc}) (async) sysarch$I386_CLEAR_PKRU(0xd, &(0x7f00000002c0)={0x240c, 0x690d, 0x7fffffff}) r2 = shmget$private(0x0, 0x3000, 0xd8, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_STAT(r2, 0x2, &(0x7f0000000f40)=""/218) r3 = socket$bt_rfcomm(0x24, 0x1, 0x88) recvmsg(r3, &(0x7f0000000480)={&(0x7f0000000200)=@in={0x10, 0x2, 0xffffffffffffffff, @rand_addr}, 0x10, &(0x7f0000000280)=[{&(0x7f0000000340)=""/246, 0xf6}], 0x1, &(0x7f0000000740)=""/171, 0xab}, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(0x0) (async) close(r1) (async) setsid() (async) symlink(&(0x7f0000000800)='./file0\x00', &(0x7f0000000240)='./file0\x00') extattr_set_link(0x0, 0x0, 0x0, &(0x7f0000000080)="c18fc680b3c6918deed1673857825ebf44fe4eaff354ae887a4f323487a0d2e80d2649a028cfd533e4de8d937527cf5fbb283d674f84971befb8d9f376d5e7c7", 0x40) (async, rerun: 64) freebsd11_getfsstat(&(0x7f0000000840)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x1f5, 0x1) (rerun: 64) chown(&(0x7f00000001c0)='./file0\x00', r4, 0x0) r5 = open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000600)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) (async, rerun: 32) symlinkat(&(0x7f0000000700)='./file0\x00', r5, &(0x7f00000004c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async, rerun: 32) unlink(&(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') (async) open$dir(&(0x7f0000000000)='.\x00', 0x0, 0x100) 50.001119ms ago: executing program 3 (id=186): r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r0, 0x80000001, &(0x7f00000004c0)='E', 0x1, [0x3, 0x10000000], 0x200000000000000, 0x20, 0x0, {0x4, 0x7, 0x0}, {0x0, 0x20000005, @sigval_int=0x2e5562ef}}) (async) r1 = open(&(0x7f0000000480)='./file0\x00', 0x200000, 0xd2) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x12, r1, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x0) pwritev(r2, &(0x7f0000000040)=[{&(0x7f00000003c0)="9dbbe935274643bfca8d0dd8a5a6dd32cb27434b181849961eb6eccb82ebcca55e087eb66aa5272019eba915fb32b319cbf703460e38c90a1e7e87183095b41a6e57709884fa95afaca2245dfad1ca96127dc203a39b0aa54a84e84098df11bf", 0x60}, {&(0x7f0000000500)="0a3094016702d1279e8090098dd79df8712f4ba9168fed73637275b00c54946ccf118f04a1fc7c87c1f910c9e896787c6ed99b6b3a388443dd3ce51c229484f7dfefb28f7a15ae7e71a669de936a14f541e1861a0e171bba5567247e62c12c136affe3f42cf8911fea78669ea81d91947d035dfb9c6f7fd5bde73b337cb101409a14c47cf1e430eb190d43796d76928376c6647cb3d88e92ab6454cf57989418", 0xa0}, {&(0x7f00000005c0)="792c4b1ceec18f4f9770ac1992c3de92a25e5f46f3f411a139da7e22f5a6f002c0dcecc2231e7d5f22d7a6ad90effd4284d26c566e3ee283e0df8a1f2fec59a5d2522bfe98a28494b99f1f16caa1eb2fcf6050284dabb7f7489ab13f612f36f2d10cbc8fdca4a71583a651e1c84a21d0d30186e8a5211965548a15ab369d708b6a14b9a26fa2e4189d8caa2eb895b1f1a7ac1644974b0ce59cbb99467a124820617051d5ecc40a1e90dc41be2e9e5128258ac014514e9f6991c2db2a5f7416410f20910d2807d79993dfda722c55ba0782d2ab", 0xd3}, {&(0x7f00000006c0)="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", 0x1000}], 0x4, 0x9) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x1, 0x24) pwritev(r3, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) (async) preadv(r2, &(0x7f0000001780)=[{&(0x7f0000000180)=""/184, 0x1b133353141e377d}], 0x10000000000000d1, 0x0) (async) readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000340)=""/65, 0x41}], 0x1) (async, rerun: 64) r4 = shmget(0x2, 0x3000, 0x218, &(0x7f000019c000/0x3000)=nil) (async, rerun: 64) fstat(r0, &(0x7f00000017c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) (async) getfsstat(&(0x7f00000018c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}, 0x928, 0x3) (async) cpuset_setdomain(0x2, 0x9, 0x186a1, 0x20, &(0x7f0000000080)={[0x1]}, 0x1) r7 = fork() freebsd11_lstat(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) msgctl$IPC_SET(0x0, 0x1, &(0x7f00000015c0)={{0x0, 0x0, r8, r9, 0x2c, 0x4, 0x0, 0xa}, 0xc13, 0x8, 0x1, 0xffff, 0x8, 0xdfbd, r7, r7}) procctl$PROC_REAP_KILL(0x2, 0xffffffffffffffff, 0x6, &(0x7f00000016c0)={0x4800, 0x9, 0xffffffffffffffff, 0xa570, 0xffffffffffffffff}) (async) r11 = getsid(0xffffffffffffffff) shmctl$IPC_SET(r4, 0x1, &(0x7f0000002200)={{r5, 0xffffffffffffffff, r6, r9, 0x40, 0x1ff, 0x0, 0x6a85}, 0xa01f, 0x2, 0x3ff, 0x1, r10, r11, 0xd}) 49.183368ms ago: executing program 2 (id=187): socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_sctp(0x1c, 0x5, 0x84) (async) r0 = kqueue() kevent(r0, &(0x7f0000000040)=[{0x0, 0xfffffffffffffff9, 0x9, 0x8, 0xe8c5, 0x0, [0x0, 0x0, 0x7, 0x40000000000000]}], 0x1, 0x0, 0x0, 0x0) socket(0x1c, 0x1, 0x0) (async) syz_emit_ethernet(0x52, &(0x7f0000001480)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "ae029d", 0x1c, 0x3a, 0xff, @rand_addr="78042000000014000001000000086500", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @remote={0xfe, 0x80, '\x00', 0x0}, [{0x1}, {0x1}]}}}}}}) r1 = socket(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f0000000180)={0x10, 0x2, 0x0, @loopback}, 0x10) syz_emit_ethernet(0x52, &(0x7f0000000140)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "2f5105", 0x1c, 0x0, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x6, 0x0, 0x0, 0x3}], @tcp={{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}) (async) cpuset_setaffinity(0x3, 0x4, 0x20, 0x8, &(0x7f0000000380)={[0x2]}) kqueue() (async) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x200201, 0x0) aio_write(&(0x7f0000000240)={r2, 0x80000001, &(0x7f0000000140), 0x0, [0x3], 0x200000000000000, 0x8, 0x0, {0x1, 0x7, 0x0}, {0x0, 0x20080005, @sigval_int=0x2e5562ec, @ke_flags=0xc088}}) open$dir(0x0, 0x20, 0x0) (async) rfork(0x1000) (async) r3 = open(&(0x7f0000000100)='./file0\x00', 0x200000, 0x2) fcntl$lock(r3, 0xb, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x100000002}) (async, rerun: 32) socket$inet_udplite(0x2, 0x2, 0x88) (async, rerun: 32) r4 = open(0x0, 0x80400000000206, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x3, 0x20011, r4, 0x0) r5 = open$dir(&(0x7f0000000100)='./file0\x00', 0x10000, 0x4) posix_fadvise(r5, 0x0, 0xbd9f, 0x5) (async, rerun: 32) readv(r5, 0x0, 0x0) (rerun: 32) open(&(0x7f0000000080)='./file0\x00', 0x80000000000209, 0x0) fork() (async) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0) 0s ago: executing program 0 (id=188): r0 = accept(0xffffffffffffff9c, &(0x7f0000000000)=@in={0x10, 0x2, 0xffffffffffffffff, @loopback}, &(0x7f0000000040)=0x10) setsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(r0, 0x84, 0x1b, &(0x7f0000000080)=0xffffffff, 0x4) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = socket$inet6_sctp(0x1c, 0x0, 0x84) getsockopt$inet6_sctp_SCTP_INITMSG(r2, 0x84, 0x3, &(0x7f00000000c0), &(0x7f0000000100)=0x8) aio_error(&(0x7f0000000400)={r1, 0x7, &(0x7f0000000140)="843fe8fac71fa14bcd871c4706d5229c5678bcb3d88e6ee028c19e802d0370c78d489ac34562afa999fe9b688a3d82542ff042c721247b12da4a45b717ebc05cfdb0a7ddeba971a88711c9bf7a9cd2233d7b352a06b3d8625fe0bdc85fd24ec679e31b7dad5162b3ed6a239451ce55d641021ba616b4597bd24cd0f96f1002bc98b7ade2ca302bd57d18b206", 0x8c, [0x80, 0x3], 0x9, 0x6, 0xe7, {0xd, 0x100000001, &(0x7f0000000200)="0f2c1a962640493e0f23b9c0bb48ee2eaff69b98bdc67cc7b9b6103d6c8f8b4aba27ff57e9b3364ca2ba33e580d7a90b8d757246ce44c503b29e5bfb4e004207ab04b415a1054e7410fd9a232ce284dae0e29098750f8a2c62c65fb9789f2c9f8883b55c16b99994af336dff3761bca7ff07bba3080616f49a743f71f1b91264b928a854ad17fe1d822c3b682bedf83fc485ac873994e63d14a441e6c77a3d6b8890"}, {0x4, 0x15, @sival_ptr=0x31, @thr={&(0x7f00000002c0)="410f0153ed40dac5c4233144c3d7c462fd30c2660feffc660fe8b20080000045811300000000660f66487b26f2430f5cf0c4015dfd5100", &(0x7f0000000300)="34056c7471cf7f19194ff32f37f0e659cb0dd6c9ed131144e51812f66bb072b6922086cd2a62be333088d48e2b36be06e62aba447664910b8b565dcc22ebeab788c7e248b9b2cdc011e765812518342aadc026cbee46966d94c0c615db20af16a25905fcb518f6dd98eb7f7ccc200ec0d41d4cef6f17c73b87fc701deef4b05faf336bc87121e07a3830c525b075048a2adb2c92258acefa82f53ede7dd6ee7e8b5489ea4969d0b92964ff478ea1325a3a7180163425b1301309fc4451fe9c45c682b237bd6920e180032d25c2"}}}) lchflags(&(0x7f00000004c0)='./file0\x00', 0x20200) nanosleep(&(0x7f0000000500)={0xe, 0x6}, &(0x7f0000000540)) sendto$inet6(r2, &(0x7f0000000580)="bbf9b038154962afea4979ce84f0937590a3a40f18b93231f100f9", 0x1b, 0x0, &(0x7f00000005c0)={0x1c, 0x1c, 0x1, 0x4, @empty, 0x3}, 0x1c) close(r2) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x10, &(0x7f0000000600), &(0x7f0000000640)=0x4) r3 = socket$inet6_udplite(0x1c, 0x2, 0x88) extattr_get_fd(r3, 0x3, &(0x7f0000000680)='\x00', &(0x7f00000006c0)=""/82, 0x52) mkdir(&(0x7f0000000740)='./file0\x00', 0x100) getsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x1a, &(0x7f0000000780)={0x0, 0x5}, &(0x7f00000007c0)=0x8) getsockopt$inet6_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000800)={r4, 0x2, 0x8}, &(0x7f0000000840)=0xc) r5 = open$dir(&(0x7f0000000880)='./file0\x00', 0x200, 0xc) socket$bt_rfcomm(0x24, 0x1, 0x88) r6 = dup(r1) freebsd11_fhstatfs(&(0x7f00000008c0)={{[0x4, 0x2]}, {0x200, 0x7ff, "8e1e971551a7dd6b7c34e93c91c222f1"}}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [], 0x0, 0x0}) r8 = dup(r3) sysarch$I386_SET_LDT(0x1, &(0x7f0000000b40)={0xa, &(0x7f0000000b00)=[{0x8}, {0xffffffffffffc575}], 0x2}) execve(&(0x7f0000000b80)='./file0\x00', &(0x7f0000000d40)=[&(0x7f0000000bc0)='\x00', &(0x7f0000000c00)='\x00', &(0x7f0000000c40)='5[%[%\x00', &(0x7f0000000c80)=':\x00', &(0x7f0000000cc0)='/\x00', &(0x7f0000000d00)='\x00'], &(0x7f0000000f40)=[&(0x7f0000000d80)='\x00', &(0x7f0000000dc0)='\x00', &(0x7f0000000e00)='\x00', &(0x7f0000000e40)='\x00', &(0x7f0000000e80)='\x00', &(0x7f0000000ec0)='\x00', &(0x7f0000000f00)='\xc0/.*\x00']) rmdir(&(0x7f0000000f80)='./file0\x00') bindat$unix(r5, r6, &(0x7f0000000fc0)=@file={0xa, 0x0, './file0\x00'}, 0xa) setitimer(0x1, &(0x7f0000001000)={{0x3, 0x10}, {0x0, 0x8}}, 0x0) ioctl$MDIOCRESIZE(r8, 0xc1c06d04, &(0x7f00000010c0)={0x73e, 0x1e, 0x7, &(0x7f0000001040)='./file0\x00', 0x4, 0x2, 0x1ff, 0x8000000000000000, 0x8, 0x6, &(0x7f0000001080)='\x00', [0xc1c, 0x5, 0x7, 0x1, 0x7ff, 0x9, 0xd7c9, 0x200000, 0x800, 0xee5, 0xff, 0x5, 0xfd, 0x9, 0x6a3, 0x9, 0x2, 0x4, 0x364, 0x3ff, 0x8, 0xb3, 0x5, 0x53, 0x9, 0x0, 0x401, 0x0, 0x5, 0x3, 0x1, 0x30ea95fd, 0x81, 0x0, 0xfffffffc, 0x1, 0x5, 0x4, 0xffffffff, 0x2, 0x6, 0x9, 0x1, 0xb, 0x35, 0x6, 0x2, 0x6, 0xe, 0x0, 0xdf0, 0x6, 0x400, 0xfffffffa, 0xfff, 0x6, 0x69, 0xb, 0x10001, 0x5, 0x81, 0x6, 0xc0d5, 0x7, 0xe0, 0x0, 0x1, 0x0, 0x8, 0xe5, 0x7, 0x2, 0xcdf, 0x7f, 0x2, 0xa, 0x101, 0x8, 0x5, 0x4, 0x5, 0x9, 0x10000, 0x0, 0x28000, 0x80, 0x101, 0x4, 0x4, 0x6806, 0xe, 0x2, 0xffff, 0x3, 0x6, 0x7]}) syz_emit_ethernet(0x35, &(0x7f0000001280)={@empty, @random="6cb970a76253", [], {@ipv4={0x800, {{0x7, 0x4, 0x1, 0x1, 0x27, 0x68, 0x2, 0x8, 0xe, 0x0, @remote={0xac, 0x14, 0x0}, @empty, {[@rr={0x7, 0x7, 0x7, [@broadcast]}]}}, @icmp=@echo_reply={0x0, 0x0, 0x0, 0x66, 0x10, "d9e973"}}}}}) fcntl$setstatus(r0, 0x4, 0x4) chown(&(0x7f00000012c0)='./file0\x00', r7, 0x0) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.85' (ED25519) to the list of known hosts. Warning! syz-executor[865] uses SF_SYNC sendfile(2) flag. Please follow up to https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=287348. if_delmulti_locked: detaching ifnet instance 0xfffffe0058575800 ip6_pcbopts: all specified options are cleared. pid 735 (sh), jid 0, uid 0: exited on signal 6 (core dumped) pid 861 (rtsol), jid 0, uid 0: exited on signal 6 (core dumped) pid 337 (dhclient), jid 0, uid 0: exited on signal 6 (core dumped) tap4: Ethernet address: 58:9c:fc:10:d3:96 pid 866 (rtsol), jid 0, uid 0: exited on signal 6 (core dumped) tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: Ethernet address: 58:9c:fc:10:d3:96 if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: Ethernet address: 58:9c:fc:10:d3:96 md0: truncating fractional last sector by 8 bytes Out of ktrace request objects. arp: from 00:00:00:00:00:00: addr len: new 0, i/f 6 (ignored) pid 747 (getty), jid 0, uid 0: exited on signal 6 (core dumped) FreeBSD/amd64 (ci-freebsd-main-1.us-central1-b.c.syzkaller.internal) (ttyu0) login: pid 745 (getty), jid 0, uid 0: exited on signal 6 (core dumped) tap4: Ethernet address: 58:9c:fc:10:d3:96 pid 746 (getty), jid 0, uid 0: exited on signal 6 (core dumped) pid 743 (getty), jid 0, uid 0: exited on signal 6 (core dumped) pid 739 (getty), jid 0, uid 0: exited on signal 6 (core dumped) pid 742 (getty), jid 0, uid 0: exited on signal 6 (core dumped) pid 741 (getty), jid 0, uid 0: exited on signal 6 (core dumped) pid 744 (getty), jid 0, uid 0: exited on signal 6 (core dumped) pid 740 (getty), jid 0, uid 0: exited on signal 6 (core dumped) tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: Ethernet address: 58:9c:fc:10:d3:96 Expensive callout(9) function: 0xffffffff819a33d0(0) 0.002309315 s if_delmulti_locked: detaching ifnet instance 0xfffffe0007a46800 tap4: Ethernet address: 58:9c:fc:10:d3:96 if_delmulti_locked: detaching ifnet instance 0xfffffe0058575000 md1: truncating fractional last sector by 1 bytes tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: Ethernet address: 58:9c:fc:10:d3:96 tap4: Ethernet address: 58:9c:fc:10:d3:96 ifconfig: interface tap4 does not exist kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) kldload: can't load if_tap: module already loaded or in kernel SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) SYZFAIL: repeatedly failed to execute the program proc=4 req=82 state=1 status=67 (errno 9: Bad file descriptor) FreeBSD/amd64 (ci-freebsd-main-1.us-central1-b.c.syzkaller.internal) (ttyu0) login: Expensive callout(9) function: 0xffffffff81494ae0(0xfffffe006dde3000) 0.003264813 s set $lines = 0 Password: Login incorrect login: show registers Password: Login incorrect login: ps Password: Login incorrect login: show malloc Password: Login incorrect show all tcpcbs/bl