Warning: Permanently added '10.128.0.93' (ECDSA) to the list of known hosts. 2020/01/13 05:07:15 fuzzer started 2020/01/13 05:07:15 dialing manager at 10.128.0.105:39543 2020/01/13 05:07:15 syscalls: 215 2020/01/13 05:07:15 code coverage: enabled 2020/01/13 05:07:15 comparison tracing: enabled 2020/01/13 05:07:15 extra coverage: support is not implemented in syzkaller 2020/01/13 05:07:15 setuid sandbox: support is not implemented in syzkaller 2020/01/13 05:07:15 namespace sandbox: support is not implemented in syzkaller 2020/01/13 05:07:15 Android sandbox: support is not implemented in syzkaller 2020/01/13 05:07:15 fault injection: support is not implemented in syzkaller 2020/01/13 05:07:15 leak checking: support is not implemented in syzkaller 2020/01/13 05:07:15 net packet injection: support is not implemented in syzkaller 2020/01/13 05:07:15 net device setup: support is not implemented in syzkaller 2020/01/13 05:07:15 concurrency sanitizer: support is not implemented in syzkaller 2020/01/13 05:07:15 devlink PCI setup: support is not implemented in syzkaller 05:07:22 executing program 0: r0 = socket(0x10, 0x2, 0x6) accept$unix(0xffffffffffffff9c, &(0x7f0000000000)=@abs, &(0x7f0000000040)=0x8) r1 = accept$unix(r0, &(0x7f0000000080)=@abs, &(0x7f00000000c0)=0x8) connect$unix(r1, &(0x7f0000000100)=@abs={0x1, 0x0, 0x3}, 0x8) getpeername$unix(r1, &(0x7f0000000140)=@abs, &(0x7f0000000180)=0x8) chroot(&(0x7f00000001c0)='./file0\x00') mkdir(&(0x7f0000000200)='./file0\x00', 0x50) openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x8b02941ae95a8719, 0xa) mkdir(&(0x7f0000000280)='./file0\x00', 0x180) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4) r2 = accept(0xffffffffffffff9c, &(0x7f00000002c0)=@in, &(0x7f0000000300)=0xc) setsockopt$sock_timeval(r2, 0xffff, 0x100c, &(0x7f0000000340)={0x4, 0x9}, 0x10) r3 = open(&(0x7f0000000380)='./file0\x00', 0x40, 0x20) pipe2(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}, 0x400000) linkat(r3, &(0x7f00000003c0)='./file0\x00', r5, &(0x7f0000000440)='./file0\x00', 0x400) getsockname$unix(r1, &(0x7f0000000480)=@file={0x0, ""/60}, &(0x7f00000004c0)=0x3e) r6 = socket$inet(0x2, 0x3, 0x7) recvfrom(r6, &(0x7f0000000500)=""/4096, 0x1000, 0x40, &(0x7f0000001500)=@in={0x2, 0x2}, 0xc) r7 = accept$unix(r5, 0x0, &(0x7f0000001540)) accept$unix(r7, &(0x7f0000001580)=@file={0x0, ""/4096}, &(0x7f00000025c0)=0x1002) execve(&(0x7f0000002600)='./file0\x00', &(0x7f00000027c0)=[&(0x7f0000002640)='.\x00', &(0x7f0000002680)='\x00', &(0x7f00000026c0)='@\x00', &(0x7f0000002700)='#[\x00', &(0x7f0000002740)='{$\x00', &(0x7f0000002780)='\x00'], &(0x7f0000002a40)=[&(0x7f0000002800)='@!\x00', &(0x7f0000002840)='#\x00', &(0x7f0000002880)='{\x00', &(0x7f00000028c0)='{+\x00', &(0x7f0000002900)='\x00', &(0x7f0000002940)='\x00', &(0x7f0000002980)='\x00', &(0x7f00000029c0)='\\+$\x00', &(0x7f0000002a00)='}h\x00']) r8 = paccept(r4, 0x0, &(0x7f0000002ac0), 0xe8000000) accept(r8, &(0x7f0000002b00)=@in, &(0x7f0000002b40)=0xc) r9 = openat(0xffffffffffffffff, &(0x7f0000002b80)='./file0\x00', 0x20000, 0x8) r10 = open(&(0x7f0000002c00)='./file0\x00', 0x1000000, 0x40) renameat(r9, &(0x7f0000002bc0)='.\x00', r10, &(0x7f0000002c40)='./file0\x00') r11 = openat(0xffffffffffffffff, &(0x7f0000002c80)='./file0\x00', 0x80, 0x10) setsockopt(r11, 0x1, 0x7, &(0x7f0000002cc0), 0x0) dup(0xffffffffffffffff) shmget(0x2, 0x8000, 0x0, &(0x7f0000ff8000/0x8000)=nil) 05:07:23 executing program 1: r0 = semget$private(0x0, 0xe41774bee993d1d, 0x1c) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f0000000000)=""/175) r1 = socket(0x6, 0x10000000, 0xfa) getsockname$inet6(r1, &(0x7f00000000c0), &(0x7f0000000100)=0xc) r2 = semget(0x1, 0x0, 0x31) semctl$GETPID(r2, 0x3, 0x4, &(0x7f0000000140)=""/205) setsockopt$sock_int(r1, 0xffff, 0x104, &(0x7f0000000240)=0x8000, 0x4) r3 = socket$inet6(0x18, 0x3, 0x19) recvfrom$inet6(r3, &(0x7f0000000280)=""/176, 0xb0, 0x841, &(0x7f0000000340)={0x18, 0x1, 0x8, 0x58e}, 0xc) r4 = semget(0x3, 0x1, 0x80) semop(r4, &(0x7f0000000380)=[{0x2, 0x0, 0x1c00}, {0x1b4ee27c95bc7e75, 0x9, 0x1800}, {0x4, 0x80, 0x1000}, {0x4, 0xff, 0x1000}, {0x2, 0x5, 0x1000}, {0x4, 0x1, 0x1800}], 0x6) r5 = semget$private(0x0, 0x0, 0x108) semctl$GETNCNT(r5, 0x4, 0x3, &(0x7f00000003c0)=""/116) r6 = semget(0x1, 0x1, 0x20c) _lwp_suspend(0xffffffffffffffff) semctl$GETVAL(r5, 0x0, 0x5, &(0x7f0000000440)=""/214) madvise(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x6) getgroups(0x6, &(0x7f0000000540)=[0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0]) getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000580)={0x0, 0x0, 0x0}, &(0x7f00000005c0)=0xc) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000640)=0xc) getgroups(0x3, &(0x7f0000000680)=[r7, r8, r9]) r10 = open$dir(&(0x7f00000006c0)='./file0\x00', 0x400000, 0x1) r11 = fcntl$dupfd(0xffffffffffffff9c, 0xc, 0xffffffffffffffff) renameat(r10, &(0x7f0000000700)='./file0\x00', r11, &(0x7f0000000740)='./file0\x00') r12 = msgget$private(0x0, 0x4c) msgctl$IPC_RMID(r12, 0x0) fchdir(0xffffffffffffffff) semctl$GETALL(r6, 0x0, 0x6, &(0x7f0000000780)=""/216) r13 = socket(0x1f, 0x4, 0x81) recvfrom$inet6(r13, &(0x7f0000000880)=""/68, 0x44, 0x0, 0x0, 0x0) 05:07:23 executing program 2: getrlimit(0x9, &(0x7f0000000000)) r0 = socket$inet(0x2, 0x4, 0x6) pwritev(r0, &(0x7f0000000340)=[{&(0x7f0000000040)="62220e14e7fe16fe5a2747d04d5203f9d255ea47aae9cc9f839e2259620b26f447f68116083ae939500b965646a42e2c47e6df96c4f1955f3b82fa3a4cb135ee188c45753885632efe596af8320e26ba066a1badd34d50f74aea57d63f6b411e92d59b941ad4e756b541a1d4e5eb3bdc09c51ec68bab7ac927fc866da23900a8a3631462e9da5cb80b46518e5afb1b123f88356ed21f7b93e64373ef83e82c1825686dc372483608bbc31f534c52201b47", 0xb1}, {&(0x7f0000000100)="92df08550e02be237d0e7142beba4039ec0dd39b7cadc98ff134a2e49d83337427fcad96b7e5c243a78233feca1c4c11c0", 0x31}, {&(0x7f0000000140)="e34fff76f5a0c8ff40550ec4fcb1dafcdd16057ea5c0f61c125ea1448ba4cb2455e57b9ce36d09f4975f7bc9b73bd7c0f6e08c7fe805bdfbed792c2c5bd0e00b198a829cdb47ce8eb44be31e2f8d941738a617fe0e19baaa4c80381df6c7ceb1a05cc1c0cb6ddaf78067ac282b27864df657a9d1b3008d48608d5fecd82dd3ced916a6796d2104d17e4772ebcac1cc162682745e6f82f6d9affa7949a237fbd0238d6c72cd7b7b100e7dc694", 0xac}, {&(0x7f0000000200)="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", 0xfe}, {&(0x7f0000000300)="531dc7b9240369939d53f3ff19377dfc443d91e9af8f0fa1542ec6357d180a16ba07f20ae49c0199a80c7d3eb7150116b96dd9c0fe3e97", 0x37}], 0x5, 0xe30c) r1 = socket$inet6(0x18, 0x20000000, 0x3) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0x66, &(0x7f00000003c0)={0x200, 0x1, 0x8, 0x0, 0x3}, 0xc) r2 = getpid() wait4(r2, &(0x7f0000000400), 0x4, &(0x7f0000000440)) r3 = socket$inet(0x2, 0xa3f950fe9a8825a2, 0x7f) setsockopt$sock_linger(r3, 0xffff, 0x80, &(0x7f0000000500)={0x2, 0x6}, 0x8) r4 = accept$inet(0xffffffffffffff9c, &(0x7f0000000540), &(0x7f0000000580)=0xc) setsockopt$sock_linger(r4, 0xffff, 0x80, &(0x7f00000005c0)={0x1ff}, 0x8) sendto$inet6(r1, &(0x7f0000000600)="b96f30a6e703e9176de2603b9626c60aae4795f33e5e87a355385050369bb8ef2e3fb69c955833", 0x27, 0x3, &(0x7f0000000640)={0x18, 0x2, 0x1ff, 0x78}, 0xc) r5 = shmget$private(0x0, 0x2000, 0x492, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_STAT(r5, 0x2, &(0x7f0000000680)=""/4096) socketpair(0x18, 0x1, 0x7, &(0x7f0000001680)) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0x68, &(0x7f00000016c0)={{0x18, 0x0, 0x6, 0x8}, {0x18, 0x3, 0x5, 0x5}, 0x5, [0x400, 0x2, 0x4, 0x91f, 0x80000000, 0x7fffffff, 0x5, 0x2]}, 0x3c) mkdir(&(0x7f0000001700)='./file0\x00', 0x48) nanosleep(&(0x7f0000001740)={0xffffffffffffff55, 0x1}, &(0x7f0000001780)) r6 = socket$inet6(0x18, 0x1, 0x9) getsockopt$sock_int(r6, 0xffff, 0x2000, &(0x7f00000017c0), &(0x7f0000001800)=0x4) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) getpeername$inet(0xffffffffffffffff, &(0x7f0000001840), &(0x7f0000001880)=0xc) pipe2(&(0x7f00000018c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x8) accept$unix(r7, &(0x7f0000001900)=@file={0x0, ""/108}, &(0x7f0000001980)=0x6e) r8 = fcntl$dupfd(r1, 0xc, r7) sendto$inet6(r8, &(0x7f00000019c0)="4d80f9b17de432fce49c75bb03bdf04230a853df9c6805f4423435803f941ffafaa04de472e9cfe7f132d9d5f1571b0e6cd42cdae238ca59b3dc8f343f5a021a6535fd5c5eacb8a9c69ffbeafaf51833e8a90daa55743f426b309bcbbb3d99fad9", 0x61, 0x2, &(0x7f0000001a40)={0x18, 0x0, 0x8001, 0x400}, 0xc) r9 = accept$unix(0xffffffffffffff9c, &(0x7f0000001a80)=@abs, &(0x7f0000001ac0)=0x8) fcntl$lock(r9, 0xf, &(0x7f0000001b00)={0x4, 0x2, 0x400, 0x50, r2}) getppid() socket$unix(0x1, 0x1, 0x0) 05:07:23 executing program 3: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) readlinkat(r0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)=""/40, 0x28) r1 = open(&(0x7f0000000080)='./file0/file0\x00', 0x800, 0x197) fchmodat(r1, &(0x7f00000000c0)='./file0\x00', 0x10c, 0x400) r2 = accept$inet6(r0, &(0x7f0000000100), &(0x7f0000000140)=0xc) r3 = __clone(0x800, &(0x7f0000000180)="5404d730bfc2debc71aa6007b23f4306b1953ad72e62e79bd0cfd612507ea5fef705223d67772f33986387493bd624995d3140e271ef561b6956dd44e5c4a39d011ffe4678988c70fc9b5d07e2ad1ec16f409662882ef6e4b3b04e5c6960610d926fef0f435e064cc1718ebe531af5834722d3bd6060b775db276ea9f43e52a88a73942ee13254d64170802a6666c6ed0643b6ebf1f2236ebf00be2f7df224f59a") fcntl$setown(r2, 0x6, r3) _lwp_ctl(0x200, &(0x7f0000000280)=&(0x7f0000000240)={0x5, 0xffffffff}) fsync(r1) _lwp_self() getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, &(0x7f00000002c0)={0x0, 0x0}, 0xc) r5 = getegid() getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) r7 = fork() shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000380)={{0x81, r4, r5, r6, 0xffffffffffffffff, 0x40}, 0x5, 0x2, r7, r3, 0x4, 0x2, 0x1}) r8 = dup(r1) fdatasync(r8) r9 = accept$unix(r0, 0x0, &(0x7f0000000400)) bind(r9, &(0x7f0000000440)=@un=@abs={0x44fa98af3f537f42, 0x0, 0x2}, 0x8) r10 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_timeval(r10, 0xffff, 0x100c, &(0x7f0000000480), &(0x7f00000004c0)=0x10) r11 = fcntl$dupfd(r2, 0x0, r2) mmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x10, r11, 0x0, 0x3) r12 = semget(0x3, 0x2, 0x20) semop(r12, &(0x7f0000000500)=[{0x2, 0xff}], 0x1) getpid() r13 = accept(r9, &(0x7f0000000540)=@in6, &(0x7f0000000580)=0xc) close(r13) r14 = paccept(r0, &(0x7f00000005c0)=@un=@file={0x0, ""/108}, &(0x7f0000000640)=0x6e, 0x0) fcntl$getflags(r14, 0x1) 05:07:23 executing program 4: r0 = dup(0xffffffffffffffff) r1 = __clone(0x4200, &(0x7f0000000380)="93fc7db6f1e76a5819f3dec87589158baf2d4caeda375b31c0d315cb846733b76bbaf61ceb9a4b06e470e20bf66ea99e102b43d8ffdc6794632350bc1723624faeda65f33d650fa4acd6b5aaeb5f22da7ba06bf1b3c84b3ae0cee228fa9a6daacc522ec1ed53f958f0f18f037525b3b59b6b7173fda52f6f0f2538fa14e3a750e155dee2e9aea4ff67d120a3787dbd68d883ad0babbfa69bfe03b7bddca4278250062dc965ea29f0732c1279f5085ae755e64715e284ac5af9d76ea52e918aa946fc") r2 = geteuid() getgroups(0x7, &(0x7f0000000480)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff]) r4 = __clone(0xff, &(0x7f00000004c0)="56d46ba1fbe395948deea4c8967f9d64302c3d6d00beb6402af3468e38b649c5b15103ab45bd5e37a088af2cd11764ec0de416779a854d4c3e0954fb6c338f0a68310a7854fda555fe0210830eb6c07b7c62f888e57624f11256a4e47e3fd9da4be8c4d3086d509b625b09ddadb075f181d79d6a9cc66dc8fda0be711aa0e332e7") getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000580)={0x0, 0x0}, &(0x7f00000005c0)=0xc) r6 = getgid() r7 = accept$inet6(0xffffffffffffffff, &(0x7f0000000600), &(0x7f0000000640)=0xc) socketpair(0x6, 0x0, 0x81, &(0x7f0000000680)={0xffffffffffffffff}) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r10 = openat(0xffffffffffffff9c, &(0x7f00000006c0)='./file0\x00', 0x10, 0x142) r11 = socket(0x1f, 0x3, 0x4) r12 = socket$inet(0x2, 0x3, 0x1) r13 = dup(0xffffffffffffff9c) r14 = accept$inet(0xffffffffffffffff, &(0x7f0000000700), &(0x7f0000000740)=0xc) r15 = socket$inet(0x2, 0xaf1061497d849c78, 0x0) r16 = fcntl$getown(0xffffffffffffff9c, 0x5) r17 = getuid() getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000780)={0x0, 0x0, 0x0}, 0xc) r19 = getpid() r20 = getgid() r21 = openat(0xffffffffffffffff, &(0x7f00000007c0)='./file0\x00', 0x1160410, 0x20) r22 = socket$unix(0x1, 0x2, 0x0) r23 = open(&(0x7f0000000800)='./file0\x00', 0x0, 0x28) r24 = socket$inet6(0x18, 0x5, 0x40) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000840)={0x0}, 0xc) r26 = geteuid() getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000880)={0x0, 0x0, 0x0}, &(0x7f00000008c0)=0xc) pipe(&(0x7f0000000900)={0xffffffffffffffff, 0xffffffffffffffff}) r29 = socket(0xb, 0x3c9dc0a7a73b3426, 0xff) pipe(&(0x7f0000000940)={0xffffffffffffffff}) r31 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) sendmsg$unix(r0, &(0x7f0000000ac0)={&(0x7f0000000000)=@file={0x0, './file0\x00'}, 0xa, &(0x7f0000000340)=[{&(0x7f0000000040)="ddfdf636fb2c4d2ced6f2ed0ced401747adea4df5b965e482f6d88285300491f1c521acd9f6d167a168bb0cd26677744e4b462b1b77799e6dce8c71170e6e3c809d435e9017f96c920d62f373e4cfe730a7903a06479bdfb10aa9add84817c087956272e67201a416112c6995ea552dd37b01e1b56520b94d8401122f6b82b3da0472da2d231b47b57a386304de17c8e377986f749454477af52", 0x9a}, {&(0x7f0000000100)="1419fa9e927c62a38189c55de64cd1c5457c5bcad1d5904c5568f0138b39a2e60f58bf0de178de3ce752613556", 0x2d}, {&(0x7f0000000140)="8e9ec1f5096b84193a557ff0cf2e008dbe4eb388889dbfc6a6c77ece1c3a89d199ef5dee658fe1098774ca348ae80a938df5ebfce29b4590e0eea27a7002b6bc12663ec5c60a3796ea34e5cc4d580150646c1b94c2b94c62aa0341f5e20934db0a20b64865a98ed571248889018e383ac55f213e43c11a2aabfe05be46f8df9b240852cb098844fa9850e115db8b40a32c42af7d66baaf0c5697873aa559efbd072e8ecb76cd476fbc4e08a2dbd78134e92becab16f00c4980e6a0af27d6b1c54f8237120b09f71d9fa103c051d1dd52cd440c76478a7df38093c127", 0xdc}, {&(0x7f0000000240)="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", 0xfb}], 0x4, &(0x7f0000000980)=[@cred={0x20, 0xffff, 0x2, r1, r2, r3}, @cred={0x20, 0xffff, 0x2, r4, r5, r6}, @rights={0x38, 0xffff, 0x1, [r7, r8, r9, r10, r11, r12, r13, r14, r15]}, @cred={0x20, 0xffff, 0x2, r16, r17, r18}, @cred={0x20, 0xffff, 0x2, r19, 0x0, r20}, @rights={0x20, 0xffff, 0x1, [r21, r22, r23, r24]}, @cred={0x20, 0xffff, 0x2, r25, r26, r27}, @rights={0x20, 0xffff, 0x1, [r28, r29, r30, r31]}], 0x118}, 0x0) 05:07:23 executing program 5: r0 = open(&(0x7f0000000000)='./file0\x00', 0x20082, 0x11) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0xc) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0xc) fchown(r0, r1, r4) r5 = socket$inet(0x2, 0x10000000, 0x0) pwritev(r5, &(0x7f00000001c0)=[{&(0x7f00000000c0)="facc69fdd266294be7eeace8f75ddbe8750c233a790f2246b7f06da74117e52d1ac2d2699a15c023098d7f2b70132ee6385dd4d4ac5c4dff9a2fbdb749914e579ea3d3e68fe98d82f901997c094ec2787fcf9824b4b359c3aa1ec733c543146714a54bf79b3d3778204bd62cb94627f091635947778d5f056b3bf3d61e7099712783f6baa976e0a7b365454c46cbc5b80452a4c9e107f350ba6d21a360c4b3173f856edd4c9fec575621e0ba5b37a6e9d391b290fd3a78c9488c4a63509d457825631979", 0xc4}], 0x1, 0x1) r6 = accept(0xffffffffffffffff, &(0x7f0000000200)=@un=@abs, &(0x7f0000000240)=0x8) recvfrom$unix(r6, &(0x7f0000000280)=""/163, 0xa3, 0x1, &(0x7f0000000340)=@abs={0x0, 0x0, 0x0}, 0x8) r7 = msgget$private(0x0, 0x50) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0xc) r9 = getuid() msgctl$IPC_SET(r7, 0x1, &(0x7f00000003c0)={{0xfffffffe, 0xffffffffffffffff, r8, r9, r4, 0x30}, 0x1aa, 0x97, r3, 0x0, 0x9, 0x8, 0x81, 0x57}) r10 = socket$unix(0x1, 0x2, 0x0) getsockname$unix(r10, &(0x7f0000000440)=@file={0x0, ""/4096}, &(0x7f0000001480)=0x1002) r11 = fcntl$dupfd(0xffffffffffffffff, 0xc, r10) write(r11, &(0x7f00000014c0)="e03015f931a2695199e08225efaeaa0d41671d9ec5baae48472c89d0e41204799b208a311c7061b493405be4861cb8aab3ffa8740c557752b2336cb58d831a71cbe53ce43a88fef152113abfeee8f862d0c9bd4f6e78b5bd137dccfd767e0e349461ecb46575de7b8f7fbc7397b4d56c3a1cc97b57371f933e3fc739eda335c35b88a97a97aa7fcddb42a471f0bcc5ea56c1e01ae669a125daf1857a09fd999c5caef9e3b281b7fcbd2c09292e47ff3b79bb02b8a5251772a2c4d1ec63d9a5739f842d6c955ee6cb8155f6d34a59efb8b4a52e20f84a129372d4501fb466", 0xde) r12 = shmget$private(0x0, 0x2000, 0x10c, &(0x7f0000ffd000/0x2000)=nil) r13 = getuid() getgroups(0x4, &(0x7f00000015c0)=[0x0, 0x0, r2, 0x0]) r15 = geteuid() r16 = getpid() shmctl$IPC_SET(r12, 0x1, &(0x7f0000001600)={{0x10000, r13, r14, r15, r8, 0x90, 0xfff}, 0x3, 0x2, r16, r3, 0x9, 0x8, 0x7}) getsockopt$sock_timeval(r5, 0xffff, 0x0, &(0x7f0000001680), &(0x7f00000016c0)=0x10) r17 = open(&(0x7f0000001700)='./file0\x00', 0x400, 0x40) getsockopt$SO_PEERCRED(r17, 0xffff, 0x11, &(0x7f0000001740), 0xc) r18 = dup2(0xffffffffffffff9c, r0) getsockname$unix(r18, &(0x7f0000001780)=@abs, &(0x7f00000017c0)=0x8) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x3000) _lwp_create(&(0x7f0000001800)={0x4, 0x0, {[0x10000, 0x1, 0x5, 0x88f]}, {0x1, 0x4, 0x783248dbdde1f88e}, {0xffffffffffffffba, 0x1, '+\xb1\x00'}}, 0x40, &(0x7f0000001880)) sendmsg$unix(r18, &(0x7f0000001a40)={&(0x7f00000018c0)=@file={0x1, './file0\x00'}, 0xa, &(0x7f0000001a00)=[{&(0x7f0000001900)="f9a8121fb2aa2dba34f14906b3e7f4c344c95494ab24dbb3c8465831c84ee716e0803fcbf86684f6a4c971977719fdab8fa3312d601930fac250f2", 0x3b}, {&(0x7f0000001940)="6cfcbc519bfbf8a313720b0733d5d4c44481869a4c3705a8e3f70d7f78339f0077dfbc3616f974b778e0542d6bd00ada4ee2903cd38580da519ae7e448cc0d95c92641092cfd4a0632f67969d3c60133c130e3d98cc2d7e54c44771cfeb5f8c34b0f47604197e4ae723baceefcaac1e68ebd06eeccfdd3cca130810e4bfcb6641125566392e02d9819e34bf5c9c22b5271283bfbaff2e88edf9bd160d177913a05738bcc33a93aef0cafc08f30110e34606adbf3e8", 0xb5}], 0x2}, 0xc00) 05:07:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xc0148, 0x46) getdents(r0, &(0x7f0000000080)=""/39, 0x27) linkat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) execve(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)=[&(0x7f0000000100)='\x00', &(0x7f0000000140)='}-}%\x00', &(0x7f0000000180)='\xb9+\x00', &(0x7f00000001c0)=')\x00', &(0x7f0000000200)=',-}\x00'], &(0x7f0000000500)=[&(0x7f0000000280)='\x00', &(0x7f00000002c0)='[\x00', &(0x7f0000000300)='-\x00', &(0x7f0000000340)='\xbdt\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)='%^\x00', &(0x7f0000000400)='{\\%\x00', &(0x7f0000000440)='-:\x00', &(0x7f0000000480)='}\\\x93', &(0x7f00000004c0)='\x00']) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x1, 0x0) setsockopt$sock_timeval(r1, 0xffff, 0x1006, &(0x7f0000000000), 0x10) 05:07:27 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYRESOCT=0x0], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x2001000000009, &(0x7f0000000000)="3c380652", 0x4) 05:07:27 executing program 3: mkdir(&(0x7f0000000180)='./file1\x00', 0x0) chroot(&(0x7f0000000080)='./file0\x00') rmdir(&(0x7f0000000000)='./file1\x00') execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 05:07:27 executing program 1: open(&(0x7f0000000480)='./file0\x00', 0x80000000000304, 0xffffffffffffffff) open(&(0x7f0000000000)='./file0\x00', 0x408440, 0x2) r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) writev(r0, &(0x7f0000002800)=[{&(0x7f0000000680)="9aa7ac52974ded472b8375ff3cd0e368379f59242174ea47e8140e8394fa56927ce9b850cc9d516f124d9dd8730ac579a7ad6860c26ee73488ef3dae62aeb71c", 0x40}, {0x0}], 0x2) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 05:07:27 executing program 2: r0 = shmget$private(0x0, 0x1000, 0x40, &(0x7f0000ffd000/0x1000)=nil) shmat(r0, &(0x7f0000ffc000/0x3000)=nil, 0x1000) setrlimit(0x9, &(0x7f0000000200)) socket(0x1d, 0x3, 0x0) 05:07:27 executing program 2: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0xcc9e, 0xe, &(0x7f0000000000)="6386a05bbd8d2fecf0d282795c24f7a36741b9755fc9549dd8d9b15e81a29fd98aeb6aa497f48036ceaf059858691accd66e2bcda128b0ec12b6c302", 0x3c) 05:07:27 executing program 0: symlink(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') r0 = socket$inet(0x2, 0x2, 0x0) sendmsg(r0, &(0x7f0000000440)={&(0x7f0000000000)=@in6={0x18, 0x2}, 0xc, 0x0, 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="500000000000000095f0994402000000"], 0x10}, 0x1) 05:07:27 executing program 2: r0 = shmget$private(0x0, 0x3000, 0x1cb, &(0x7f0000ffc000/0x3000)=nil) shmat(r0, &(0x7f0000ffe000/0x1000)=nil, 0x1000) r1 = socket$inet(0x2, 0x40000000, 0x80) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000000)=""/66, &(0x7f0000000080)=0x42) mknod(&(0x7f00000000c0)='./file0\x00', 0xc000, 0x1000) r2 = shmat(r0, &(0x7f0000fff000/0x1000)=nil, 0x2000) shmdt(r2) r3 = semget$private(0x0, 0x3, 0x0) semctl$IPC_RMID(r3, 0x0, 0x0) r4 = shmget(0x0, 0x4000, 0x520, &(0x7f0000ffa000/0x4000)=nil) shmat(r4, &(0x7f0000ffd000/0x2000)=nil, 0x1000) r5 = semget$private(0x0, 0x0, 0x201) semctl$GETPID(r5, 0x1, 0x4, &(0x7f0000000100)=""/90) r6 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_linger(r6, 0xffff, 0x80, &(0x7f0000000180), &(0x7f00000001c0)=0x8) semctl$GETNCNT(r5, 0x1, 0x3, &(0x7f0000000200)=""/206) getrlimit(0x8, &(0x7f0000000300)) semget$private(0x0, 0xee54344ccc798d5f, 0x4a5) shmget(0x2, 0x2000, 0x20, &(0x7f0000ffe000/0x2000)=nil) setsockopt$inet_opts(r1, 0x0, 0x1, &(0x7f0000000340)="e8eca437b19aac33e87b94cee172d9b36282e35eeef601b71910ae8292fa5bb405fcbfde3d48950e5c88cbd53813630a50f82715e95a53a8a6c0bb71beaab32dc3118592591184c4361512035014ca5bc683d1947e18108cad5c106ad3fd46e99dd7694f71ec19a59658c7c2791fe5d7ebc2fad2d8e3170171770ad64b2846ec8144d05ce9b27f77a9e590d4c6a63f103e2d3868a4b1c03c12f4955c001b554cc5c09d0b205295a0d95ac132c0c33e0c6142f63f51086604b9b0125941170e6627f5e684d446f5a2ce26b4313ae23fc72cc69657382ab2e9ff0b7c5af118f3be254ebec11643", 0xe6) getsockopt$inet_opts(r1, 0x0, 0x0, &(0x7f0000000440)=""/109, &(0x7f00000004c0)=0x6d) r7 = socket(0x1f, 0x10000001, 0x3) setsockopt$inet_opts(r7, 0x0, 0x1, &(0x7f0000000500)="8e5774e799c05a84864e", 0xa) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000540)="b2c18336c7e525d60ba7a0c2362a2eca7701856dee0a9c32d165436da310b4d1b775822acf7a3952c6faaece2fa5d11c004b20a6c2fc3e6dca576920795bd50e602253357d7667cf7ce42526fddbdc3bd9f7935111f1988f322b4bf800f4693aeb79fe5e7925869bc8c0b8b88217e3cd4605b52558217f2b7cbde5710629c286c86e226300898696387f2a19a4ffd92c997c50e659d1f4bb699a871c540ed51c65ace6695c105a42bcff3f5d035fe5a9a7d749f5af3fd389b0", 0xb9) r8 = semget(0x1, 0x1, 0x100) semctl$SETVAL(r8, 0x2, 0x8, &(0x7f0000000600)=0xfffffffc) r9 = semget(0x3, 0x0, 0x10) semop(r9, &(0x7f0000000640), 0x0) r10 = semget$private(0x0, 0x1, 0x10) semctl$GETVAL(r10, 0x2, 0x5, &(0x7f0000000680)=""/250) 05:07:27 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) madvise(&(0x7f0000552000/0x3000)=nil, 0x3000, 0x0) clock_nanosleep(0x0, 0x0, &(0x7f0000000000), &(0x7f0000000080)) 05:07:28 executing program 3: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x4000040000118302, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x400004000153812e, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x80011, r1, 0x0, 0x0) write(r0, &(0x7f0000000780)="089267d3ff4f0b87969f", 0x100ad) r2 = socket(0x22, 0x3, 0x0) setsockopt(r2, 0x0, 0x0, 0x0, 0x0) connect$inet(r2, &(0x7f0000000040)={0x2, 0x1}, 0xc) login: [ 66.1671762] panic: Mutex error: rw_vector_enter,312: spin lock held [ 66.1671762] lock address : 0xffff9c800d92a3c0 type : spin [ 66.1671762] initialized : 0xffffffff81199249 [ 66.1671762] shared holds : 0 exclusive: 1 [ 66.1671762] shares wanted: 0 exclusive: 0 [ 66.1671762] current cpu : 1 last held: 1 [ 66.1671762] current lwp : 0xffff9c8011ae4700 last held: 0xffff9c8011ae4700 [ 66.1671762] last locked* : 0xffffffff811af858 unlocked : 0xffffffff81235379 [ 66.1671762] owner field : 0x0000000000010700 wait/spin: 0/1