Warning: Permanently added '10.128.10.39' (ECDSA) to the list of known hosts. 2019/04/09 11:32:51 fuzzer started 2019/04/09 11:32:51 dialing manager at 10.128.0.248:25387 2019/04/09 11:32:51 syscalls: 438 2019/04/09 11:32:51 code coverage: enabled 2019/04/09 11:32:51 comparison tracing: enabled 2019/04/09 11:32:51 extra coverage: support is not implemented in syzkaller 2019/04/09 11:32:51 setuid sandbox: support is not implemented in syzkaller 2019/04/09 11:32:51 namespace sandbox: support is not implemented in syzkaller 2019/04/09 11:32:51 Android sandbox: support is not implemented in syzkaller 2019/04/09 11:32:51 fault injection: support is not implemented in syzkaller 2019/04/09 11:32:51 leak checking: support is not implemented in syzkaller 2019/04/09 11:32:51 net packet injection: enabled 2019/04/09 11:32:51 net device setup: support is not implemented in syzkaller 11:33:02 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100000) getsockopt$inet_sctp_SCTP_EVENT(0xffffffffffffffff, 0x84, 0x1e, &(0x7f0000000040)={0x0, 0x7, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r1, 0x84, 0x102, &(0x7f00000000c0)={r2, 0x8e, "26b964200a95c0a4f02379be31cbd269802eade84759bf875a39db80244bf5187f53193105b978b41ecc72a429be691973cb274cb370983fa22b8724ecccfb6da11ed6a34d0bb85c3a584aadc8cc700934f87024730c85f81c34a128de0230c988e4f8e20ddaa4dd43250ba7eb50f5bcdfd2925e1f0365d94725337c302be4fc3e7506cba4dca8e7369bcdb58c23"}, &(0x7f0000000180)=0x96) pipe2(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r5 = fcntl$getown(r4, 0x5) fcntl$lock(r0, 0xd, &(0x7f0000000200)={0x3, 0x1, 0x3, 0x1, r5}) getsockopt$inet_sctp_SCTP_EXPLICIT_EOR(r3, 0x84, 0x1b, &(0x7f0000000240), &(0x7f0000000280)=0x4) pipe2(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100000) getsockopt$inet6_sctp_SCTP_AUTOCLOSE(r7, 0x84, 0x5, &(0x7f0000000300), &(0x7f0000000340)=0x4) getsockopt$inet6_sctp_SCTP_MAX_BURST(r6, 0x84, 0x19, &(0x7f0000000380)={r2, 0x8}, &(0x7f00000003c0)=0x8) pwritev(r7, &(0x7f0000000700)=[{&(0x7f0000000400)="833d46a6835c7d93c95790fdbc97c16d322e59922ff6b30e7f1e40f29c24e9d39ba0f41c40620073e7052e1b29d428f54bc3d4decfbe4a8232522a7dc41c75be7b72c4bf37b4bf2fff9c15bf4a950c321625311e909c71819f3b6aabf75c9e7c3010a4fa0c28e0d453a7263c0cfd92261c0da948c4ac9cd52e5bebf3d3bd89f5697c783c1af2a7ea4fd53ce56867e2a2bc180156b44f7b4b4c4ae4e4182f95095e7a6451eb7e5168f95b959587a38dfc341ced2d0d445eda5d7ea630b6e3ada3eb63ecd6e3ed21a8ac9a1a4bb076859a712ca8161a809b7ee9050940d32ec7b77c6a8482fcbba305be091b0aeeb3", 0xee}, {&(0x7f0000000500)="4eb8aee7e122fdb403883d556012af3d21bda2af175b238e920b2ab160c4cea501f222a4dcfec7d695c527d6bc63db3162337d2eef79604553d86fba63a3e8929237fbfff084c2f6af768eab26f16f002dc9d6e5c25c723f0fdcc1d472de34a762e7f6b2f87f3fc5ed0e16b34b75a52d0f4478471214bf2f81a20e40edb5777725700105c2b6078eb7c731d2cca2834996ccdb1496161c04db44324c9345e42f44fd9d880f0a273e6906429ee01b016e2ebc2a141d68ee1674969855b16f3834e59e511de6ebf286cffee2a040ffc8557fc9b5f97d4d93d2cda31a3c3bdccad7", 0xe0}, {&(0x7f0000000600)="d813b6a98da47d28255453c9bf7dd49367103d7a517c64294439070fddb0e6b5aee1b8e17ac4d4bfe6979b9f2bae0344d29877cf0a5144c0e5031e3c5b938c1ccca186dbce8d20564324e514e3f9688262b681b18942df4c77405ec8c0a78d713b9bcdf24621f8d3572cc8aecc7d8802b7da6f33082893ec904f7312e31f69780bc762c8f08f9367c7cf616272ee096a522f8c499655ebcaae75b9a7d487a1746efb2094de70733f3329c050176c41b06405369e0cbcd3f105fac2ed471d749c995e19486f2f58084fc2", 0xca}], 0x3, 0x0) setrlimit(0x4, &(0x7f0000000740)={0x9, 0x7}) fcntl$setstatus(r7, 0x4, 0x10004) getsockopt$inet_sctp_SCTP_AUTO_ASCONF(r3, 0x84, 0x18, &(0x7f0000000780), &(0x7f00000007c0)=0x4) r9 = open(&(0x7f0000000800)='./file0\x00', 0x10180, 0x61) setsockopt$sock_timeval(r9, 0xffff, 0xcf54af4722adb967, &(0x7f0000000840)={0xffffffffffffff30, 0x20}, 0x10) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r7, 0x84, 0x12, &(0x7f0000000880)={0x3}, 0x1) setsockopt$inet_msfilter(r0, 0x0, 0x4a, &(0x7f00000008c0)={@local={0xac, 0x14, 0x0}, @rand_addr=0x1, 0x0, 0x5, [@multicast1, @empty, @multicast1, @local={0xac, 0x14, 0x0}, @empty]}, 0x24) fcntl$setflags(r4, 0x2, 0x1) getsockopt$sock_accept_filter(r7, 0xffff, 0x1000, &(0x7f0000000900), &(0x7f0000000a00)=0x100) setsockopt$inet_sctp_SCTP_MAXSEG(r4, 0x84, 0xe, &(0x7f0000000a40)={r2, 0x3}, 0x8) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r0, 0x84, 0x1d, &(0x7f0000000a80)={r8, 0x7}, 0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r7, 0x84, 0xb, &(0x7f0000000ac0)={0x2, 0x4, 0x0, 0x3b3e, 0x9, 0x3ff, 0x800, 0x1, r2}, 0x20) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x105, &(0x7f0000000b00)={0x2, [0x0, 0x0]}, &(0x7f0000000b40)=0xc) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r7, 0x84, 0x901, &(0x7f0000000b80)={r8, 0x9, 0x4, [0x0, 0x2, 0x4, 0x2ed]}, &(0x7f0000000bc0)=0x10) setsockopt$inet6_sctp_SCTP_PEER_ADDR_THLDS(r7, 0x84, 0x23, &(0x7f0000000c00)={@in={{0x2, 0x2, @rand_addr=0xdd}}, r10, 0x9, 0x52c}, 0x94) setsockopt$inet6_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000000cc0)=0x4, 0x4) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r6, 0x84, 0x8003, &(0x7f0000000d40)={r10, &(0x7f0000000d00)=[@in={0x2, 0xffffffffffffffff, @rand_addr}, @in6={0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f0000000d80)=0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r7, 0x84, 0x104, &(0x7f0000000dc0), &(0x7f0000000e00)=0x4) shmget(0x3, 0x2000, 0x400, &(0x7f0000ffb000/0x2000)=nil) 11:33:02 executing program 1: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x110200, 0x8) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000040)={0x3, [0x6, 0x6, 0x401]}, 0xa) getsockopt$inet6_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000080)={0x0, 0x48f0, 0xf, 0x2, 0x7}, &(0x7f00000000c0)=0x18) getsockopt$inet6_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000100)={r1, 0x1f}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000180)={0xfffffffffffffffd, 0x1, 0x1800, 0xfffffffffffffff8, 0x7, 0x4, 0x3bc67fbe, 0x2802000000000000, r2}, 0x20) getsockopt$inet_tcp_int(r0, 0x6, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x902, &(0x7f0000000240)=r1, 0x4) getsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xb, &(0x7f0000000280)={0x6, 0x6, 0x1400, 0x5, 0x0, 0x1, 0x3f, 0x7, r2}, &(0x7f00000002c0)=0x20) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000300)={r3, 0x81, 0x5}, &(0x7f0000000340)=0xc) recvfrom$inet(r0, &(0x7f0000000380), 0x0, 0x40082, &(0x7f00000003c0)={0x2, 0x0}, 0x10) writev(r0, &(0x7f0000000440)=[{&(0x7f0000000400)="6bc975092e5c98", 0x7}], 0x1) getsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000480)={0x1, 0xf104e8c6639b0d84, 0x5, 0x3ff, r3}, &(0x7f00000004c0)=0x10) listen(r0, 0xffffffffffffffc1) recvfrom$inet(r0, &(0x7f0000000500)=""/137, 0x89, 0x2, &(0x7f00000005c0)={0x2, 0x2, @remote={0xac, 0x14, 0x0}}, 0x10) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000600)={r4, 0x99, "7d0577bfa91a601fb6732315271f08a5caf46a740db8ab12bb507153d30562bb4ecc7908aa21e2af105b2119ecb294ec9175d4b8e4bfd4c1db8531bd216176632d290aaa6eaf982177357ddd5668406274e3943467150a240a10785c15a28cb2a2af60ab1479f219297af202c1eb0a8021530d1282fb1dc0a40488eade5dda0cc6f81d365fe6e6cf3cd10f118babf399434390105512d926fe"}, &(0x7f00000006c0)=0xa1) setsockopt$sock_int(r0, 0xffff, 0x4000, &(0x7f0000000700)=0xebf, 0x4) r5 = open(&(0x7f0000000740)='./file0\x00', 0x0, 0x4a) getsockopt$inet6_sctp_SCTP_PARTIAL_DELIVERY_POINT(r0, 0x84, 0x11, &(0x7f0000000780), &(0x7f00000007c0)=0x4) fchmod(r0, 0x153) linkat(r5, &(0x7f0000000800)='./file0/file0\x00', r5, &(0x7f0000000840)='./file0\x00', 0x400) setsockopt$inet6_sctp_SCTP_RTOINFO(r5, 0x84, 0x1, &(0x7f0000000880)={r3, 0x1, 0xfffffffffffffff9, 0xffff}, 0x10) pwritev(r5, &(0x7f0000000ac0)=[{&(0x7f00000008c0)="e3ef48094ec1743fbd1ce95a9fa055f22d2c0cf147f64898cc4782bba7d1fc82fe600433b58bd52725db3febfcb67804b21807b7c3ca2fac24eaa365bdc7ad5295f35f4d53b208cf5786fb82c048351c9507830e0f1604114a98b56804bcb0244efbad11e55c54fa7cabed3890", 0x6d}, {&(0x7f0000000940)="29fa57c0e568b8863be08dfc836166706017da361b1ffd97358a1379f29800cd3e003964d4ee7b8d10ed49ff0de5b840981bc9f8ccda8a4abdec91594ac8f380e783d64d614c64572c7d1dda447a957ca47dfa419a037f2aa70b04bce574a6f96a2343e8dfa497a75db29ed9c7f48e4cf67252e814e8be53a90d56e0b58105e88c7a55aae82d998f9afb21da3295671188f2ecb606a9d1d9f13b94a05248ef03b4821d1d45baa958f1e6a9d35471ffa4050486267f0f703c", 0xb8}, {&(0x7f0000000a00)="51b6445e800bbcae75cb404a581132c7d597631fdd46541a845041cfa66ccd040484743bd1", 0x25}, {&(0x7f0000000a40)="67f31ea67243653ea6957b98a670690ce5ca5d", 0x13}, {&(0x7f0000000a80)="f5b998171417d23e3bae41fd77d129b2616ac1f96bd848764b", 0x19}], 0x5, 0x0) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r5, 0x84, 0x901, &(0x7f0000000b40)={r1, 0x9, 0x1, [0x9]}, 0xa) getsockopt$sock_linger(r5, 0xffff, 0x80, &(0x7f0000000b80), &(0x7f0000000bc0)=0x8) fchmod(r5, 0x40) fstat(r0, &(0x7f0000000c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) freebsd11_lstat(&(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchown(r0, r6, r7) getsockopt$inet6_sctp_SCTP_EXPLICIT_EOR(r0, 0x84, 0x1b, &(0x7f0000000dc0), &(0x7f0000000e00)=0x4) setsockopt$sock_linger(r0, 0xffff, 0x80, &(0x7f0000000e40)={0x100, 0x80}, 0x8) 11:33:02 executing program 2: freebsd10_pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_udp(r0, 0x11, 0x1, &(0x7f0000000040)=0x5, 0x4) sendto$inet6(r1, &(0x7f0000000080)="afdfa3731e90088f5d8572685bab112086ec08c4880034c513a078feed1d2e1c53d6d5fe9773e28189297faff4b9748c13ad362a9490573dca25a24b28c3a047ef8e8692d5c7ebe533c7f8ec031a85b230899dd6bb889cecac6983ace4b3d1a5d2802d1c0a001c3f041b13f5de536164fddac9f22e74b8f3df92cc0b64d89fe8a6f7d356bee04cc2725754bb86c0838e6befd113b921", 0x96, 0x20000, &(0x7f0000000140)={0x1c, 0x1, 0x8000, @loopback}, 0x1c) read(r1, &(0x7f0000000180)=""/165, 0xa5) poll(&(0x7f0000000240)=[{r0, 0x6}, {r1, 0x104}, {r1, 0x1c1}, {r0, 0x104}, {r0, 0x1}, {r1, 0x104}], 0x6, 0x3) getsockopt$inet6_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000280)={0x0, 0xe, 0xfffffffffffffff9}, &(0x7f00000002c0)=0xc) setsockopt$inet6_sctp_SCTP_BINDX_ADD_ADDR(r1, 0x84, 0x8001, &(0x7f0000000380)={r2, &(0x7f0000000300)=[@in6={0x1c, 0x2, 0x9f0, @remote={0xfe, 0x80, [], 0x0}, 0xa963}, @in6={0x1c, 0x3, 0x0, @loopback, 0xfffffffffffffe00}, @in6={0x1c, 0x0, 0x1, @local={0xfe, 0x80, [], 0x0}, 0x9}, @in={0x2, 0x2, @broadcast}, @in={0x2, 0x0, @local={0xac, 0x14, 0x0}}]}, &(0x7f00000003c0)=0x10) r3 = msgget(0x3, 0x6) listen(r1, 0x7) getsockopt$inet6_sctp_SCTP_DISABLE_FRAGMENTS(r1, 0x84, 0x9, &(0x7f0000000400), &(0x7f0000000440)=0x4) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000480)={@in={{0x2, 0x2, @rand_addr=0x6}}, r2, 0x81d3, 0x882a, 0x2, 0x20, 0x7fffffff, 0xfffffffffffffbff}, 0xa0) r4 = dup(r0) syz_execute_func(&(0x7f0000000540)="0f9a132e660f72d7006667f20f2b37c4e2d128c2c4a35d49960d000000c641d82de55c0000c4e2018c64a8ad660f3a60bb0500000005d9fc65470fbccf") mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x7, 0x80012, r4, 0x0) unlink(&(0x7f0000000580)='./file0\x00') getsockopt$inet6_sctp_SCTP_FRAGMENT_INTERLEAVE(r1, 0x84, 0x10, &(0x7f00000005c0), &(0x7f0000000600)=0x4) getsockopt$inet6_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000640)={r2, 0x9, 0xe21}, &(0x7f0000000680)=0xc) setsockopt$inet_sctp_SCTP_MAXSEG(r1, 0x84, 0xe, &(0x7f00000006c0)={r2, 0x600000000000}, 0x8) r6 = getpgid(0x0) getpgid(r6) futimesat(r0, &(0x7f0000000700)='./file0\x00', &(0x7f0000000740)={{0xc8, 0xba58}, {0x6, 0x401}}) getsockopt$inet_tcp_buf(r4, 0x6, 0x20, &(0x7f0000000780)=""/254, &(0x7f0000000880)=0xfe) getsockopt$inet6_sctp_SCTP_ASSOCINFO(r4, 0x84, 0x2, &(0x7f00000008c0)={r2, 0x6, 0xf31c, 0x7, 0x1000, 0xa1}, &(0x7f0000000900)=0x14) recvmsg(r0, &(0x7f0000000ac0)={&(0x7f0000000940)=@in6, 0x1c, &(0x7f0000000980), 0x0, &(0x7f00000009c0)=""/238, 0xee}, 0x0) getsockopt$inet6_sctp_SCTP_AUTO_ASCONF(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000b00), &(0x7f0000000b40)=0x4) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x21, &(0x7f0000000b80)={0x1000, 0x0, 0x9, 0x53c, r7}, 0x10) msgctl$IPC_RMID(r3, 0x0) getsockopt$inet_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000bc0)={r5, 0x8, 0x7731, 0x43, 0xff, 0x1, 0x8, 0x9, {@in6={{0x1c, 0x3, 0x33, @empty, 0x9}}, r5, 0x5, 0xffff, 0xfff, 0xffffffff, 0x3}}, &(0x7f0000000c80)=0xb0) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000cc0)={r8, 0x62d, 0x800, 0x9, 0x80, 0x8000}, &(0x7f0000000d00)=0x14) setsockopt$inet6_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000d40)={r2, 0x3}, 0x8) 11:33:02 executing program 3: munlockall() r0 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000000)) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x103, &(0x7f0000000040)={0x0, 0x28, "ed0eaa2c8e76bbf937c7762013c74e1a770abe9c3ad0362b94fd56e4d3ca139e113bb69b3155c69a"}, &(0x7f0000000080)=0x30) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f00000000c0)={r1, 0x1}, 0x8) r2 = msgget(0x0, 0x144) chmod(&(0x7f0000000100)='./file0\x00', 0x1) r3 = dup(r0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000140)={@in={{0x2, 0x0, @broadcast}}, r1}, &(0x7f0000000200)=0x8c) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000240)={r1, 0x4}, 0x8) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0x69, &(0x7f0000000280)={{0x1c, 0x3, 0x0, @empty, 0x8000}, {0x1c, 0x0, 0x2, @loopback, 0xfff}, 0x3, [0x5, 0x800, 0x1000, 0x10001, 0x7, 0x2, 0x6, 0x61]}, 0x5c) r5 = socket$inet6(0x1c, 0x1, 0xac6) symlink(&(0x7f0000000300)='./file0\x00', &(0x7f0000000340)='./file0\x00') setsockopt$inet_sctp_SCTP_RTOINFO(r3, 0x84, 0x1, &(0x7f0000000380)={r4, 0xdf, 0x5, 0xffffffffffffff8a}, 0x10) r6 = socket$inet6_udplite(0x1c, 0x2, 0x88) getsockopt$inet6_int(r6, 0x29, 0x1b, &(0x7f00000003c0), &(0x7f0000000400)=0x4) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r3, 0x84, 0x108, &(0x7f0000000440)={r4, 0xfffffffffffffffb, 0x0, 0x0, 0x100000001}, &(0x7f0000000480)=0x18) getsockopt$inet6_sctp_SCTP_PR_SUPPORTED(r5, 0x84, 0x26, &(0x7f00000004c0)={r7, 0xa98}, &(0x7f0000000500)=0x8) clock_settime(0x4, &(0x7f0000000540)={0x7, 0x8}) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7, &(0x7f0000000580)={@in={{0x2, 0x2}}, r4}, 0x8c) write(r0, &(0x7f0000000640)="8bb418c22de17534db0123a771f75fce824f577980c809c80918b04034d5b56939d7e2cf835dbd8660ebe5eb04193cd72b55e70e50b4f1e6b4e0288f346775ebc49a969a1e5ef66ff4155b22e6ade8591bc30beecad55dbf04d307866593b986d7a89c281566ecf43ad67d0ab9646ac9ed16000ff2feca07e1615608552130e71f886f230ca48452e877dee2566be84d5f5dfe622eee6c2c74d82351b1d9681304cbbdf95ec9c60232cea44c810684d3b5ab15b8288c577f519ac57a4ed4a096bc743f0498510f4d0727e5de8de15332f2ea91f583c899de36e1c56337d029d0a7fd758352d5ec580a61279911379d617fb8f6", 0xf3) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r3, 0x84, 0xa, &(0x7f0000000740)={@in6={{0x1c, 0x3, 0x3ff, @local={0xfe, 0x80, [], 0x0}, 0x5}}, r4, 0x0, 0x56a, 0x100, 0xac8, 0x1, 0x3}, &(0x7f0000000800)=0x98) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x26, &(0x7f0000000840)={r4, 0x9aa}, &(0x7f0000000880)=0x8) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r0, 0x84, 0x5, &(0x7f00000008c0)=0x7, 0x4) writev(r3, &(0x7f0000000c80)=[{&(0x7f0000000900)="7242cab091b9e30b348df49949413a8e31f08c1a4ee092efbb6f896154c7ae2f59472e6239a35d15cc95310def2df7dfea4ad1f5e820f8847585f02641d410f9f66b86a476fdbaff743f2fb428c8d803656c50f9d9cbe366c3475f255ef0e7f47bb5", 0x62}, {&(0x7f0000000980)="ead8d67c710035cff333fee8eda7042d922a6ab2086dc069df90ca2aae4b5dca8a0ce2b9b7c4bcc177229b655b6e190991b9b08419a94af96d5fbd65327c13b30aca9f46d77f373c24b669e8de224de19449e273d74248ee7004efedbe087d8792105d1be7bd1d9a65515021551b7d9f24a1628906a3d9733428ada27889a78076319d6291a777c0a21e3a65547c6732e2bbf1e11460ef8574b20eef028260e225cec06a65636cd9494379", 0xab}, {&(0x7f0000000a40)="93ba5ac3fcbb74c1c94eb27b11710074e9d8d5407dd5a673a39e2cf304166798e2541f583e3e5cca9983dbf19276856930ec57150ee0986c9e0f9bf0d305e5355c0136028e07fba5c26eafa0809f8e82b7e5cd05b9e4cd01c38f28defdf48ba84f0db3cb392d84c72265b612bc6e0bf94b88807ba248955ed8a9b73feec98cdc39c9f7ffe4050a689e25d57ced595fba38df0bc48855d09aafcfcc230ad21e5a086a335c6465c12654d7d2e02ba8ec77745c2f9b70c75165249b2162ef81e341d11766", 0xc3}, {&(0x7f0000000b40)="7e1e8d466a0d4fc6a4a7f169f72e02892317da76d5b3e1a32313457894841ab2eca526", 0x23}, {&(0x7f0000000b80)="bcd3ce3e3aff13da7a6f7305b1784c0478933ef0443fad3e7d8ba1abe69fefb3f71dd6ff82c9a095e2cbbf5dbec7237cfac27eeb4ee0a3e2e892439a15b1b6e358f9ae30a4f291bd96c4afda4bc0ddb231e7f5f25a23ab9ed3005411e75e39fe6316cf96c715e541371bfb94ee04a83ed1712ba8d09777bdc1296d2f558b3d57374522eee1f36bc997cf5f92b64f5d96fd063f01e26b8104f12738bc9fadb9b136595030533784f7742434bf9066fdd8e159a9589304c37288cfb4f5f9a0b7c19ec0236106f3420ad9d666f6f6470b", 0xcf}], 0x5) clock_gettime(0xf, &(0x7f0000000d00)) r9 = socket(0x17, 0x3, 0x9) msgctl$IPC_INFO(r2, 0x3, &(0x7f0000000d40)=""/28) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r3, 0x84, 0x23, &(0x7f0000000d80)={@in={{0x2, 0x3}}, r8, 0x4, 0x800, 0x9}, 0x94) setsockopt$inet6_MCAST_JOIN_GROUP(r3, 0x29, 0x50, &(0x7f0000000e40)={0xfffffffffffffffa, {{0x1c, 0x2, 0xffffffff80000000, @empty, 0x5}}}, 0x88) r10 = getpgid(0xffffffffffffffff) r11 = getuid() freebsd11_stat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r13 = getpid() getresuid(&(0x7f0000001240)=0x0, &(0x7f0000001280), &(0x7f00000012c0)) r15 = getgid() r16 = fcntl$getown(r3, 0x5) freebsd11_lstat(&(0x7f0000001300)='./file0\x00', &(0x7f0000001340)={0x0, 0x0, 0x0, 0x0, 0x0}) getgroups(0x1, &(0x7f00000013c0)=[0xffffffffffffffff]) r19 = fcntl$getown(r6, 0x5) getresuid(&(0x7f0000001400), &(0x7f0000001440)=0x0, &(0x7f0000001480)) getresgid(&(0x7f00000014c0)=0x0, &(0x7f0000001500), &(0x7f0000001540)) sendmsg$unix(r3, &(0x7f00000016c0)={&(0x7f0000000f00)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000001140)=[{&(0x7f0000000f40)="ac76156287ad839fab259f60bf73eba2336956d57ff26b093864c0ea30a1b3b74ed9625022d9e1fcacddc5e3a07fbaafd1e51580a6d7f592679c10cd827e426e9ede0542004ca908f3", 0x49}, {&(0x7f0000000fc0)="9141ef0d826f6fee39818fe48994d6cb3b9d8db61b", 0x15}, {&(0x7f0000001000)="893913fe70caf72d40067e7870db603d600a7c5655d07785217eb4b62968736fbabe7c375e9d885cad5ac73fd4129b7a2482", 0x32}, {&(0x7f0000001040)="d60dba87431ab5197a060a045c084e8c108661b581565fd2646e9dbc48abfd83b7e33ddd6be165386e28a1faada7998c1885fbb42b7049a4126b784e6ab8bd9fb8d65714836cbdd5786ed3dea0412fd884d505af59400779f42bbd96d46d8d4100480fa5a7d1744286929e00492bf3311f604992878cc417eab015766127f212b0d618acc3ec7fe024ae9683be70f7abe44a5fdae398d18e4e5b2cf1b7bbadbc099c8c061d797c2dbd33f52388c087d601b2c28365d63c1dce82f8d4bee36eb7cee4b9f24473d60275c9939ad85490389a7b35053900a486b256c217cb712ff905b8fb", 0xe3}], 0x4, &(0x7f0000001580)=[@cred={0x20, 0xffff, 0x2, r10, r11, r12}, @cred={0x20, 0xffff, 0x2, r13, r14, r15}, @cred={0x20, 0xffff, 0x2, r16, r17, r18}, @rights={0x38, 0xffff, 0x1, [r6, r9, r3, r5, r5, r0, r0, r5, r0]}, @rights={0x20, 0xffff, 0x1, [r0, r6, r6, r9]}, @cred={0x20, 0xffff, 0x2, r19, r20, r21}, @rights={0x30, 0xffff, 0x1, [r5, r6, r5, r5, r5, r0, r5]}], 0x108, 0x20008}, 0x0) 11:33:02 executing program 0: semget$private(0x0, 0x1, 0x0) semget(0xffffffffffffffff, 0x4, 0x0) r0 = socket$inet6_udp(0x1c, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x3, 0xffffffffffffffff) socket$inet6_udp(0x1c, 0x2, 0x0) execve(0x0, 0x0, &(0x7f00000004c0)=[&(0x7f0000000400)='\x00', &(0x7f0000000440)='\x00']) writev(r1, &(0x7f0000000280), 0x26) writev(r1, &(0x7f0000000100), 0x100000000000005d) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r1, 0x84, 0x901, 0x0, 0x0) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(0xffffffffffffffff, 0x84, 0x8003, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000000000)={0x0, 0x7, 0x7ff}, &(0x7f0000000180)=0xc) getsockopt$inet6_sctp_SCTP_NODELAY(0xffffffffffffffff, 0x84, 0x4, 0x0, 0x0) connect$inet(r1, &(0x7f0000000080)={0x2, 0x2, @multicast1}, 0x10) setsockopt$inet6_sctp_SCTP_AUTH_DELETE_KEY(0xffffffffffffffff, 0x84, 0x16, 0x0, 0x85) renameat(r1, &(0x7f00000000c0)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') r2 = open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) truncate(0x0, 0x100) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x7fff}, 0x0) lseek(r2, 0x0, 0x1000000000003) fcntl$setflags(0xffffffffffffffff, 0x2, 0x0) setsockopt$inet_sctp_SCTP_REUSE_PORT(r1, 0x84, 0x1c, &(0x7f00000001c0)=0xfffffffffffffffc, 0x4) rmdir(&(0x7f0000000200)='./file0\x00') semop(0x0, &(0x7f0000000040)=[{0x0, 0x20, 0x800}, {0x0, 0x0, 0x1000}], 0x2) execve(0x0, 0x0, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN(r2, 0x6, 0x401, &(0x7f0000000240)={0x0, "21127e2260e85700c9fd085ba9e2757b"}, 0x14) 11:33:02 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_msfilter(r0, 0x0, 0x4a, &(0x7f0000000000)={@broadcast, @multicast1, 0x3, 0x4, [@rand_addr=0x2, @multicast2, @multicast1, @loopback]}, 0x20) setsockopt$inet_mreq(r0, 0x0, 0xd, 0x0, 0x0) 11:33:02 executing program 2: r0 = socket(0x2, 0x10000001, 0x84) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000000c0)={0x9}, 0x10) writev(r0, &(0x7f0000000300)=[{&(0x7f0000000180)="cc", 0x1}], 0x1) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f0000000040)={0x0, 0x101}, &(0x7f0000000080)=0x8) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f0000000140)={0x7, 0x2000, 0x8000000000000000, 0x0, r1}, 0xfe06) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x1203, &(0x7f00000001c0)={0x0, 0x1}, 0x14f) sendto$inet(r0, &(0x7f0000000100)='%', 0x1, 0x0, 0x0, 0x0) sendto(r0, &(0x7f0000000200)='P', 0x1, 0x0, 0x0, 0x0) 11:33:02 executing program 1: r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) truncate(&(0x7f0000000180)='./file0\x00', 0x208020001) lseek(r0, 0x0, 0x1000000000003) poll(&(0x7f0000000140)=[{r0}], 0x1, 0x0) mincore(&(0x7f0000ffd000/0x1000)=nil, 0x1000, &(0x7f00000004c0)=""/240) poll(&(0x7f00000000c0)=[{r0}], 0x1, 0x0) poll(&(0x7f0000000400)=[{r0, 0x8}, {r0, 0x4c3b049bcec7faca}], 0x2, 0x6) r1 = socket(0x1b, 0x3, 0x0) r2 = msgget(0x3, 0x10) msgrcv(r2, &(0x7f0000001940)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000004c4bcbfca010b360000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000084b0d894c0289db5e9eb1300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ccf97991e43d4daaf775b2de110f40200bdf05a5bb899cd06f51986435de11fc0b0c66128675e648f2dc0dd46ea6dc6d27d5a54dc12f6aec59bb1606a13971632426f63cdd39ff704f14c6778726f8b607d021f9853bfb6acd40f4cedcc4e2cd8ac04d3cea15f5b17c61f6066d31a3d80ad63b1dc1b88e873ef8d6bf8c95bafa5ef6aec30cde8aa424a7878012fa8f675c285c71911ae80621a89f1abbc6965440dd9757c9a4e761176e3b12731ef00000000000000000000002c0ffaeaff2faaaf6fcd47fa8d1a39bb6825b1bb0947f810433d653614a4b58436bbbc5ec5f13fe267d347d1b91b87edea5accec272a0149a8f874f8112577023893a9f44d19bccc261960dc0fa1b0940ee682617a7fc7b8d36fd6d0528dc249217cf4ec73f7032d918a089b966cce336196a1decd0c1bd2c04f4a3801144f468f73cb59a4d9634c4f8b03ebed68a5c894a2d2e1b83aa4182cb129cbc7e4ca984fb5df7b0153"], 0x1, 0x2, 0x1000) execve(&(0x7f0000000000)='./file0\x00', &(0x7f0000000340)=[&(0x7f0000000040)='-%\x00', &(0x7f0000000100)='(\xd3&\x00', &(0x7f0000000280)='(\x00', &(0x7f00000002c0)='\x00', &(0x7f0000000300)='\x00'], &(0x7f00000003c0)=[&(0x7f0000000380)='\x00']) getsockopt$inet6_sctp_SCTP_RTOINFO(r1, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x6, 0x2, 0x96f000000000000}, &(0x7f00000001c0)=0x10) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000200)={r3, 0x6}, &(0x7f0000000240)=0x8) 11:33:02 executing program 3: r0 = socket(0x2, 0x10000001, 0x84) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) sendto(r0, &(0x7f0000000140)='%', 0x1, 0x0, 0x0, 0x0) setsockopt$inet6_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x6}, 0xb) setsockopt$inet6_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x0, 0x80000001}, 0x10) recvmsg(r0, &(0x7f0000000540)={0x0, 0xffffff0b, &(0x7f00000004c0), 0x1000000000000281, 0x0}, 0x0) shutdown(r0, 0x1) setrlimit(0x8, &(0x7f0000000040)={0x7, 0x95}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) pipe2(&(0x7f0000000140), 0x0) dup(r1) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000080)={0x3, 0x1437, 0x0}, &(0x7f00000000c0)=0xc) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x102, &(0x7f0000000180)={r2, 0xd, "fce5f16bb25802ef9503b27c57"}, &(0x7f00000001c0)=0x15) 11:33:03 executing program 3: r0 = open(&(0x7f0000000080)='./file0\x00', 0x7fd, 0x0) getsockopt$inet6_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000000)={0x0, 0x1}, &(0x7f0000000280)=0x4) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000100)={0x0, 0x4, 0x1, [0x6]}, &(0x7f0000000140)=0xa) getsockopt$inet6_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000180)=ANY=[@ANYRES32=r1, @ANYBLOB="9e0600003de30000ff0f0000fcff0300d07d000002004e20ac1400aa00"/156, @ANYRES32=r2, @ANYBLOB="0700000000080000000400000400000009000000"], &(0x7f0000000240)=0xb8) truncate(&(0x7f0000000380)='./file0\x00', 0x800000001) lseek(r0, 0x0, 0x1000000000003) poll(&(0x7f00000000c0)=[{r0}], 0x200000000000000b, 0x0) setsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f00000002c0)={@in6={{0x1c, 0x0, 0x9, @empty, 0x80}}, r1}, 0x84) socketpair$unix(0x1, 0x5, 0x0, 0x0) pipe2(0x0, 0x0) 11:33:04 executing program 0: open$dir(&(0x7f0000000280)='./file1\x00', 0x100000, 0x14) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file1\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x0) poll(&(0x7f00000000c0)=[{r0, 0x2000}], 0x1, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0/file0\x00', 0x0) r1 = socket(0x40000, 0x1, 0x401) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000000)={0x0, 0x382a}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f0000000240)={r2, 0xfffffffffffffc00}, 0x8) rename(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000040)='./file1\x00') 11:33:05 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xffffffffffffff86, &(0x7f00000000c0)=ANY=[@ANYRES16=r1], 0x9, 0x1}, 0xfffffffffffffffe) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040), 0xffffffffffffffe5}, 0x100) 11:33:05 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x5d, &(0x7f0000000000)="75420da0e3f4a40a357205d172e08e7e30810099f16966e8557b4c20ba00d437878815c4ab89e4066131bbb483", 0x2d) r1 = dup2(r0, r0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x400, 0x1) 11:33:05 executing program 2: r0 = socket(0x11, 0x4, 0x5) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(0xffffffffffffffff, 0x84, 0x108, &(0x7f0000000500)={0x0, 0x9, 0xf, 0xbea, 0x1ff}, &(0x7f0000000540)=0x18) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000580)={r1, 0x6, 0x1, [0x2]}, 0xa) r2 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) truncate(&(0x7f0000000080)='./file0\x00', 0x60801fffe) lseek(r2, 0x0, 0x1000000000003) poll(&(0x7f00000000c0)=[{r2}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r2, 0x84, 0x102, &(0x7f0000000380)=ANY=[@ANYRES32=0x0, @ANYBLOB="810000002523c5749cbb067ff5bc1012e82ecd710e91f8038a9e0e18d05f6da52ac1297511da97f1e3c0d1a003a372b3fdecea1753f79afc46454a54f67f4ef7b8a7add299186826927ecfc86f1d6ba094ed3dafd7cac638763db8daa78b5ece48d6c45990bbcea8fc11a3ab52bb5848016401f6d7cf10617c002aba1dfa05d5c9b68119fc"], 0x0) setsockopt$inet_sctp_SCTP_EXPLICIT_EOR(r2, 0x84, 0x1b, &(0x7f0000000040)=0x7f, 0x4) lseek(r2, 0x0, 0x5) setsockopt$inet_sctp_SCTP_RECVRCVINFO(r2, 0x84, 0x1f, &(0x7f0000000140)=0x80000001, 0x4) openat(r2, &(0x7f0000000300)='./file0\x00', 0x0, 0x40) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000000)={r1, 0xf9, 0x2, [0x7fff, 0x7]}, &(0x7f0000000100)=0xc) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xb, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2, 0x0, 0x1970, 0x8, 0x0, 0x0}, &(0x7f00000001c0)=0x20) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r0, 0x84, 0x8003, &(0x7f0000000280)={r4, &(0x7f0000000240)=[@in={0x2, 0xffffffffffffffff, @multicast1}, @in6={0x1c, 0xffffffffffffffff, 0x0, @local}]}, &(0x7f00000002c0)=0x10) setsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r2, 0x84, 0x21, &(0x7f0000000200)={0x1c, 0x20, 0xb4a, 0x8b1, r5}, 0x10) setsockopt$inet6_sctp_SCTP_FRAGMENT_INTERLEAVE(0xffffffffffffffff, 0x84, 0x10, 0x0, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xb, &(0x7f0000000440)={0x5, 0x3, 0x1d10, 0x5, 0x8, 0xffeb, 0x6, 0x10001, r3}, &(0x7f00000004c0)=0x20) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x15, 0x0, 0x0) 11:33:05 executing program 1: r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) fcntl$dupfd(r0, 0x11, r0) ftruncate(r0, 0x400000000101) r1 = open$dir(&(0x7f0000000700)='./file0\x00', 0x202, 0x0) mmap(&(0x7f0000ff9000/0x3000)=nil, 0x3000, 0x7, 0x11, r1, 0x0) mlock(&(0x7f0000ff8000/0x4000)=nil, 0x4000) ftruncate(r1, 0x0) msync(&(0x7f0000ff8000/0x4000)=nil, 0x4000, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000040)="239360a2ece1505246b5", 0xa}], 0x1) sigaltstack(&(0x7f0000ff9000/0x2000)=nil, 0x0) 11:33:06 executing program 0: open$dir(&(0x7f0000000280)='./file1\x00', 0x100000, 0x14) r0 = open$dir(&(0x7f0000000080)='.\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file1\x00', 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x0) poll(&(0x7f00000000c0)=[{r0, 0x2000}], 0x1, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0/file0\x00', 0x0) r1 = socket(0x40000, 0x1, 0x401) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x19, &(0x7f0000000000)={0x0, 0x382a}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x29, &(0x7f0000000240)={r2, 0xfffffffffffffc00}, 0x8) rename(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000040)='./file1\x00') 11:33:06 executing program 0: r0 = open$dir(&(0x7f00000002c0)='./file0/file0\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000200)='./file1\x00', 0x0) freebsd11_mknodat(r0, &(0x7f0000000240)='./file1\x00', 0xc000, 0x9) openat(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', 0x408, 0x9) rmdir(&(0x7f0000000000)='./file1\x00') socket$unix(0x1, 0x7, 0x0) open$dir(&(0x7f0000000140)='./file0/file0\x00', 0x100088, 0x0) mkdirat(r0, &(0x7f0000000180)='./file0\x00', 0x0) poll(&(0x7f00000000c0)=[{r0, 0x2000}], 0x1, 0x0) mkdirat(r0, &(0x7f0000000100)='./file0/file0\x00', 0x0) rename(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000040)='./file1\x00') 11:33:11 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x34) freebsd11_lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setuid(0xee01) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x20003, 0x4) fchdir(r0) 11:33:11 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x23, &(0x7f0000000080)={@in={{0x2, 0x0, @rand_addr=0x7}}, 0x0, 0x2, 0xa0f, 0x4}, &(0x7f0000000000)=0x94) setsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000140)={@in6={{0x1c, 0x0, 0x2, @empty, 0x2}}, r1, 0x3, 0x1, 0x308, 0x10001, 0x0, 0x24000000}, 0x98) setsockopt$inet6_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0xb) getsockopt$inet6_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000280), &(0x7f00000002c0)=0xb) 11:33:11 executing program 1: munmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000) mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) syz_execute_func(&(0x7f0000000340)="91cd8080000c6969ef69dc00d98a20d0d00fd1b02db5d900000070e4c653fb0f450fbd27a95ff965be3c3b6446ddcb01ef8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f5776c16161787886c401fe5ff6a9c1460000e1b1ac45e22c892a0f00009d9f") munmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000) r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_mreqsrc(r0, 0x0, 0x4e, &(0x7f0000000000)={@loopback, @local, @rand_addr}, &(0x7f0000000040)=0xc) mlock(&(0x7f0000a4a000/0x1000)=nil, 0x1000) 11:33:11 executing program 2: r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0xffffffffffffffff, @local}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000100), &(0x7f0000000140)=0x8) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100000) bind(r1, &(0x7f0000000040)=@in6={0x1c, 0x1, 0x20, @remote={0xfe, 0x80, [], 0x0}, 0x33}, 0x1c) clock_gettime(0x3ffffffffffff9, 0x0) accept$inet(r1, &(0x7f0000000180), &(0x7f00000001c0)=0x10) 11:33:11 executing program 3: mkdir(&(0x7f0000000240)='./file0\x00', 0x34) freebsd11_lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)) setuid(0xee01) r0 = open$dir(&(0x7f0000000040)='./file0\x00', 0x20003, 0x4) fchdir(r0) 11:33:11 executing program 2: r0 = open(&(0x7f0000000040)='./file0\x00', 0x4000000615, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r0, 0x0) write(r0, &(0x7f0000000080)="4aa6a4cf198751a847050d9a895ee47d077573c68621a713c593fb2a914a605ac25f185fd08170f135af0118d2ed0663dc65ead1a4791b1b2cdd724ee68db4712335581abca732d75be78cbe3e60d42e34c1f56705aeab02ef1231e6ba9768ddcbe7bb65475a22b4567419a72e9b7c17f2777f45b661f8947e41a1139ea5f32cb3e0d6e536c4b42d90d91c5341162c4f8189fbf1440d5b86c7a96bed1a388eb067de8605c4276dab60152589773bed66f2430266d7476382fbadadc3b94f64839180fd80778747e4d40bf4abc53f06f51aca", 0xd2) execve(0x0, &(0x7f0000000340), 0x0) 11:33:11 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) getsockopt$inet6_sctp_SCTP_HMAC_IDENT(r0, 0x84, 0x14, &(0x7f0000000000)={0x2, [0x3, 0xff]}, &(0x7f0000000040)=0x8) r1 = socket(0x2, 0x10000001, 0x84) setsockopt$inet6_sctp_SCTP_DELAYED_SACK(r1, 0x84, 0xf, &(0x7f0000001400)={0x0, 0x7, 0xee68}, 0xc) 11:33:11 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x800, 0x80) getsockopt$inet_sctp_SCTP_RTOINFO(0xffffffffffffff9c, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x20, 0x4, 0x800}, &(0x7f00000000c0)=0x10) setsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000100)={r1, 0xffffffff, 0x80000000}, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r2 = semget(0x3, 0x2, 0x410) r3 = getegid() freebsd11_fstat(r0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000002c0), &(0x7f0000000300)=0x0, &(0x7f0000000340)) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000380)={{0x100, 0x0, r3, r4, r5, 0x100, 0x4}, 0x80000000, 0x6}) r6 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r6, 0x0, 0x100000000000000a, &(0x7f0000000040)='\x00', 0x1) 11:33:11 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) r2 = dup(r1) pwritev(r2, &(0x7f0000000100)=[{&(0x7f00000002c0)="dd", 0x1}], 0x1, 0x0) fdatasync(r1) fcntl$setstatus(r2, 0x4, 0x10044) read(r2, &(0x7f0000000000)=""/175, 0x6d999) sendfile(r2, r0, 0x0, 0x0) dup2(r1, r0) 11:33:11 executing program 0: r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x21, &(0x7f00000000c0)={0x2, 0x3000, 0x10001, 0x51, 0x0}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000080)={r1, 0x1}, 0x8) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000002c0)=0x8) setsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x32, &(0x7f0000000040)={r2, 0x40}, 0x8) 11:33:11 executing program 2: syz_execute_func(&(0x7f0000000080)="91cd8080000c6969ef69dc00d98a20d0d00fd1b02db5d900000070e4c653fb0fa95ff965be3c3b6446ddcb0bef8f69289bd19d670f381d6a2f67450f483bd1d97c7c63460f5776c16161787896c401fe5ff6a9c1460000e1b1ac45e22c892a0f0000009f") wait4(0x0, 0x0, 0x9, 0x0) 11:33:11 executing program 0: open(&(0x7f0000000000)='./file0\x00', 0x1c8, 0x4) freebsd11_mknod(&(0x7f0000000500)='./file0\x00', 0xe008, 0x0) mkdir(&(0x7f0000000040)='./file0\x00', 0x80) 11:33:11 executing program 1: getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0xa, &(0x7f00000003c0)=ANY=[@ANYBLOB="1c00000000000000fe80000000000000000000000000e9a902"], 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x4, 0x180) linkat(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f00000000c0)='./file0\x00', 0x0) r2 = socket$inet6_tcp(0x1c, 0x1, 0x0) r3 = dup(r2) connect$unix(r3, &(0x7f00000003c0)=@abs={0xf64cb340ce081cac, 0x3}, 0x1c) 11:33:11 executing program 0: r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x100) setsockopt$inet6_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x12, &(0x7f0000000040)={0x100}, 0x1) r1 = socket$inet6_udp(0x1c, 0x2, 0x0) setsockopt$inet6_int(r1, 0x29, 0x40, 0x0, 0x0) login: Fatal trap 9: general protection fault while in kernel mode cpuid = 0; apic id = 00 instruction pointer = 0x20:0xffffffff81165145 stack pointer = 0x28:0xfffffe001fa6d610 frame pointer = 0x28:0xfffffe001fa6d650 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 819 (syz-executor.3) trap number = 9 panic: general protection fault cpuid = 0 time = 1554809591 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe001fa6d2e0 vpanic() at vpanic+0x1e0/frame 0xfffffe001fa6d340 panic() at panic+0x43/frame 0xfffffe001fa6d3a0 trap_fatal() at trap_fatal+0x4c6/frame 0xfffffe001fa6d420 trap() at trap+0xba/frame 0xfffffe001fa6d540 calltrap() at calltrap+0x8/frame 0xfffffe001fa6d540 --- trap 0x9, rip = 0xffffffff81165145, rsp = 0xfffffe001fa6d610, rbp = 0xfffffe001fa6d650 --- unp_dispose() at unp_dispose+0xa5/frame 0xfffffe001fa6d650 sofree() at sofree+0x42c/frame 0xfffffe001fa6d6b0 soclose() at soclose+0x5b3/frame 0xfffffe001fa6d730 _fdrop() at _fdrop+0x3a/frame 0xfffffe001fa6d760 closef() at closef+0x27d/frame 0xfffffe001fa6d7f0 fdescfree_fds() at fdescfree_fds+0xbd/frame 0xfffffe001fa6d840 fdescfree() at fdescfree+0x58a/frame 0xfffffe001fa6d900 exit1() at exit1+0x780/frame 0xfffffe001fa6d970 sys_sys_exit() at sys_sys_exit+0xd/frame 0xfffffe001fa6d980 amd64_syscall() at amd64_syscall+0x436/frame 0xfffffe001fa6dab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe001fa6dab0 --- syscall (1, FreeBSD ELF64, sys_sys_exit), rip = 0x44f3ca, rsp = 0x7fffffffec58, rbp = 0x1 --- KDB: enter: panic [ thread pid 819 tid 100121 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why