Warning: Permanently added '10.128.0.233' (ECDSA) to the list of known hosts. 2019/03/20 17:34:14 fuzzer started 2019/03/20 17:34:14 dialing manager at 10.128.0.248:37560 2019/03/20 17:34:14 syscalls: 1 2019/03/20 17:34:14 code coverage: enabled 2019/03/20 17:34:14 comparison tracing: enabled 2019/03/20 17:34:14 extra coverage: support is not implemented in syzkaller 2019/03/20 17:34:14 setuid sandbox: support is not implemented in syzkaller 2019/03/20 17:34:14 namespace sandbox: support is not implemented in syzkaller 2019/03/20 17:34:14 Android sandbox: support is not implemented in syzkaller 2019/03/20 17:34:14 fault injection: support is not implemented in syzkaller 2019/03/20 17:34:14 leak checking: support is not implemented in syzkaller 2019/03/20 17:34:14 net packet injection: enabled 2019/03/20 17:34:14 net device setup: support is not implemented in syzkaller 17:34:23 executing program 0: r0 = accept4$inet(0xffffffffffffff9c, &(0x7f0000000000)={0x2, 0xffffffffffffffff, @loopback}, &(0x7f0000000040)=0x10, 0x30000000) getsockopt$inet_udplite(r0, 0x88, 0x6, &(0x7f0000000080), &(0x7f00000000c0)=0x4) r1 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000140)={0x0, &(0x7f0000000100)=[@in6={0x1c, 0xffffffffffffffff, 0x0, @remote}, @in6]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_EVENT(r0, 0x84, 0x1e, &(0x7f00000001c0)={r2, 0x0, 0x4}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_DELAYED_SACK(r0, 0x84, 0xf, &(0x7f0000000240)={r2, 0x9, 0x3}, &(0x7f0000000280)=0xc) getsockopt$inet_mreq(r0, 0x0, 0xd, &(0x7f00000002c0)={@empty, @broadcast}, &(0x7f0000000300)=0x8) recvmsg(r0, &(0x7f0000000b00)={&(0x7f0000000340)=@in6={0x1c, 0xffffffffffffffff, 0x0, @local}, 0x1c, &(0x7f0000000980)=[{&(0x7f0000000380)=""/170, 0xaa}, {&(0x7f0000000440)=""/238, 0xee}, {&(0x7f0000000540)=""/115, 0x73}, {&(0x7f00000005c0)=""/2, 0x2}, {&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000640)=""/169, 0xa9}, {&(0x7f0000000700)=""/186, 0xba}, {&(0x7f00000007c0)=""/19, 0x13}, {&(0x7f0000000800)=""/181, 0xb5}, {&(0x7f00000008c0)=""/161, 0xa1}], 0xa, &(0x7f0000000a40)=""/136, 0x88}, 0x2) r4 = semget$private(0x0, 0x2, 0x80) __semctl$GETALL(r4, 0x0, 0x6, &(0x7f0000000b40)=""/150) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000c00), &(0x7f0000000c40)=0x8) getsockopt$inet_sctp_SCTP_REUSE_PORT(r0, 0x84, 0x1c, &(0x7f0000000c80), &(0x7f0000000cc0)=0x4) getsockopt$inet_sctp_SCTP_EVENTS(r0, 0x84, 0xc, &(0x7f0000000d00), &(0x7f0000000d40)=0xb) r5 = getpid() wait4(r5, &(0x7f0000000d80), 0x2, 0x0) setsockopt$inet_mreq(r0, 0x0, 0xd, &(0x7f0000000dc0)={@local={0xac, 0x14, 0x0}, @multicast2}, 0x8) socket$inet_icmp_raw(0x2, 0x3, 0x1) r6 = open(&(0x7f0000000e00)='./file0\x00', 0x2, 0x1b1) getsockopt$inet6_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r6, 0x84, 0xd, &(0x7f0000000e40), &(0x7f0000000e80)=0x4) freebsd11_lstat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) wait4(r5, &(0x7f0000000f80), 0x0, 0x0) getsockopt$inet6_sctp_SCTP_ENABLE_STREAM_RESET(r6, 0x84, 0x900, &(0x7f0000000fc0)={r3, 0x6}, &(0x7f0000001000)=0x8) recvfrom(r1, &(0x7f0000001040)=""/222, 0xde, 0x1, &(0x7f0000001140)=@un=@abs={0x1, 0x0, 0x0}, 0x8) setregid(r7, r7) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x102, &(0x7f0000001180)={r2, 0x4d, "b27125766f15940d117ae49a4f094c00ec2ac6902bbe2e3bae7525afff5a6c6619b658c3d9efd08b0614421a627c8b153a5a9c8b3dd5de5cc7a2b4bce8d9aa1d584d7b2e2d17eed0b8c6dd200f"}, &(0x7f0000001200)=0x55) r10 = socket$inet6_icmp(0x1c, 0x2, 0x3a) getsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x1, &(0x7f0000001240)={r9, 0x0, 0x7, 0xffffffff}, &(0x7f0000001280)=0x10) getsockopt$inet6_sctp_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x102, &(0x7f00000012c0)={r8, 0x92, "5a5ad8bdb8413979386ec0f01bb7bcfd2ad142050abc592c9208194fa346aff5616f77dfb6973b651331dd9dcee9afadde684bb95a0c63b45bdc2eea436147651b5734e891030aa3faff94f3d300d1cb2257a5b507882121baf9ad01300b6bbbedd6baaa7a7148063babd7b59eb8a987ef214146b16023c2190ca4ff0d5067641f891f14926b97f1bfcb29da9fb3c74244be"}, &(0x7f0000001380)=0x9a) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r6, 0x84, 0x15, &(0x7f00000013c0)={r2, 0x9391}, &(0x7f0000001400)=0x8) getsockname(r10, &(0x7f0000001440)=@in={0x2, 0xffffffffffffffff, @multicast1}, &(0x7f0000001480)=0x10) 17:34:23 executing program 1: r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0xffffffffffffffff, @multicast2}, &(0x7f0000000040)=0x10, 0x20000000) ftruncate(r0, 0x189) r1 = dup2(r0, r0) getsockopt$inet6_sctp_SCTP_REUSE_PORT(r1, 0x84, 0x1c, &(0x7f0000000080), &(0x7f00000000c0)=0x4) getsockname$inet(r0, &(0x7f0000000100)={0x2, 0xffffffffffffffff, @loopback}, &(0x7f0000000140)=0x10) getsockopt$inet6_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x8, &(0x7f0000000180), &(0x7f00000001c0)=0x4) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x100004) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x105, &(0x7f0000000240)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000280)=0x28) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r3, 0x84, 0xb, &(0x7f00000002c0)={0x8001, 0xff, 0x200, 0x100, 0x7, 0x10000, 0xe2f, 0x0, r6}, &(0x7f0000000300)=0x20) poll(&(0x7f0000000340)=[{r3, 0x1}, {r1, 0x1d5}, {r1, 0x2000}, {r2, 0x2044}, {r2, 0x14}, {r1, 0x118}], 0x6, 0x3) setsockopt$inet6_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x1d, &(0x7f0000000380)={r6, 0xb6}, 0x8) freebsd11_stat(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)) r12 = semget$private(0x0, 0x4, 0x211) __semctl$GETPID(r12, 0x1, 0x4, &(0x7f0000000480)=""/217) setsockopt$inet6_tcp_TCP_CONGESTION(r3, 0x6, 0x40, &(0x7f0000000580)='hd\x00', 0x3) bind$inet6(r2, &(0x7f00000005c0)={0x1c, 0x1, 0x6, @remote={0xfe, 0x80, [], 0x0}, 0x8001}, 0x1c) setsockopt$inet_tcp_TCP_FASTOPEN(r3, 0x6, 0x401, &(0x7f0000000600)={0x4, "0f9977829bb4e036cf2d4f2accb97d30"}, 0x14) __semctl$SETALL(r12, 0x0, 0x9, &(0x7f0000000640)=[0x8000, 0x4]) setsockopt$inet6_sctp_SCTP_BINDX_REM_ADDR(r3, 0x84, 0x8002, &(0x7f0000000700)={r7, &(0x7f0000000680)=[@in6={0x1c, 0x0, 0x3, @empty, 0x965c}, @in6={0x1c, 0x0, 0x1, @local={0xfe, 0x80, [], 0x0}, 0x1ff}, @in6={0x1c, 0x1, 0x1, @local={0xfe, 0x80, [], 0x0}, 0x7}]}, &(0x7f0000000740)=0x10) listen(r1, 0x5) setsockopt$inet6_sctp_SCTP_AUTH_KEY(r1, 0x84, 0x13, &(0x7f0000000780)={r4, 0x7fff, 0x89, "890b4f12f0efa86a64d7bc140f359ee1b5e09218fceb9d755ef0d0bf7b4f807d8818ab1f57ead434a1664c0dafe263a5fd49569b23255764309939ea0fae56299bef0738242600bd3e7811eb167144cf9158c4f4a0158aac2bde9887e8bbba81f1fd10a9bb41080791741345bf2b69cac347bf78ab6efeee20de87ba1184665f5a1a13016fb7975f61"}, 0x91) open(&(0x7f0000000840)='./file0\x00', 0x8, 0x8) poll(&(0x7f0000000880)=[{r2, 0x2000}], 0x1, 0x4) accept4$inet(r1, &(0x7f00000008c0)={0x2, 0xffffffffffffffff, @multicast2}, &(0x7f0000000900)=0x10, 0x0) setsockopt$inet6_sctp_SCTP_BINDX_REM_ADDR(r3, 0x84, 0x8002, &(0x7f00000009c0)={r10, &(0x7f0000000940)=[@in6={0x1c, 0x3, 0x7, @local={0xfe, 0x80, [], 0x0}, 0xdbe}, @in6={0x1c, 0x2, 0x7fff, @empty, 0x6}, @in={0x2, 0x0, @broadcast}, @in6={0x1c, 0x1, 0x8000, @local={0xfe, 0x80, [], 0x0}, 0xffffffffffffffc0}, @in={0x2, 0x0, @multicast2}]}, &(0x7f0000000a00)=0x10) setsockopt$inet6_sctp_SCTP_RECONFIG_SUPPORTED(r3, 0x84, 0x29, &(0x7f0000000a40)={r11, 0x1}, 0x8) setsockopt$inet6_sctp_SCTP_MAX_BURST(r2, 0x84, 0x19, &(0x7f0000000a80)={r5, 0x9}, 0x8) msync(&(0x7f0000ff6000/0x9000)=nil, 0x9000, 0x2) setsockopt$inet6_sctp_SCTP_RTOINFO(r3, 0x84, 0x1, &(0x7f0000000ac0)={r9, 0x100000001, 0x8, 0x1200000000}, 0x10) getsockopt$inet6_sctp_SCTP_MAXSEG(r2, 0x84, 0xe, &(0x7f0000000b00)={r8, 0x4}, &(0x7f0000000b40)=0x8) 17:34:23 executing program 2: r0 = getpid() r1 = getpgrp(r0) freebsd10_pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setown(r3, 0x6, r1) fcntl$setown(r2, 0x6, r0) chroot(&(0x7f0000000040)='./file0\x00') setsockopt$inet_tcp_TCP_CONGESTION(r3, 0x6, 0x40, &(0x7f0000000080)='htcp\x00', 0x5) getsockopt$inet6_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0xb3, 0xffffffff, 0x800, 0x401, 0x2c}, &(0x7f0000000100)=0x14) setsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000140)={r4, 0x6}, 0x8) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r2, 0x84, 0x8, &(0x7f0000000180), 0x4) getsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(r2, 0x84, 0x22, &(0x7f00000001c0)={0x3, 0x6, r4}, &(0x7f0000000200)=0xc) setsockopt$inet_sctp_SCTP_EVENTS(r2, 0x84, 0xc, &(0x7f0000000240)={0x1, 0x6, 0x2, 0x200, 0x9, 0x3, 0xffffffffffff1bb7, 0x6eace6be, 0x2, 0x808000000000000, 0x7}, 0xb) getsockopt$inet6_sctp_SCTP_PR_STREAM_STATUS(r2, 0x84, 0x107, &(0x7f0000000280)={r4, 0x5664, 0xf, 0x1, 0x8}, &(0x7f00000002c0)=0x18) setsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x15, &(0x7f0000000300)={r5, 0x9}, 0x8) write(r3, &(0x7f0000000340)="7548dca461592c21ee7513ff0226d62f587f722b1fa63b0d44d3f517e8dc951fd788e86c341bdb0eb1eee3d426bc23a1ac070c73ccaa863f19591aa346576b289ce1dbe6dd9b57d9d25c3c12308c5fc7a57b3f7dccaf721e2a65bd45bf6d7872f57c1b19327513d10b51a599ef0bf7f630dc8d4692f484bc2c247e064d71a5ef6d44f214016e0e6ba3b55f0adb1ebffb9ce3bc77313fe32d84", 0x99) getsockopt$inet6_sctp_SCTP_ADAPTATION_LAYER(r3, 0x84, 0x8, &(0x7f0000000400), &(0x7f0000000440)=0x4) getsockopt$inet_sctp_SCTP_RTOINFO(r2, 0x84, 0x1, &(0x7f0000000480)={r6, 0x4, 0x7ff, 0x7}, &(0x7f00000004c0)=0x10) getsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x21, &(0x7f0000000500)={0x2, 0x20, 0x401, 0x10001, r4}, &(0x7f0000000540)=0x10) write(r2, &(0x7f0000000580)="215eb03c022dceb00e765fae08accdc9151d26b88066e7f784d0685757c3266bcd1ac792166ae3b9a3a7", 0x2a) mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) setsockopt$inet_sctp_SCTP_INITMSG(r3, 0x84, 0x3, &(0x7f00000005c0)={0x5, 0x200000000000000, 0x8, 0x4}, 0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r3, 0x84, 0x902, &(0x7f0000000600)=r5, 0x4) fstat(r2, &(0x7f0000000640)) getsockopt$inet6_sctp_SCTP_CONTEXT(r2, 0x84, 0x1a, &(0x7f0000000740)={r7, 0x7c57}, &(0x7f0000000780)=0x8) setsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(r3, 0x84, 0x15, &(0x7f00000007c0)={r8, 0x7f}, 0x8) bind$inet6(r2, &(0x7f0000000800)={0x1c, 0x2, 0x0, @empty, 0x1b8}, 0x1c) setsockopt$inet_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f0000000840)={@in={{0x2, 0x0, @remote={0xac, 0x14, 0x0}}}, r4}, 0x8c) recvmsg(r2, &(0x7f0000000ec0)={&(0x7f0000000900)=@un=@abs, 0x8, &(0x7f0000000d80)=[{&(0x7f0000000940)=""/200, 0xc8}, {&(0x7f0000000a40)=""/251, 0xfb}, {&(0x7f0000000b40)=""/85, 0x55}, {&(0x7f0000000bc0)=""/95, 0x5f}, {&(0x7f0000000c40)=""/73, 0x49}, {&(0x7f0000000cc0)=""/181, 0xb5}], 0x6, &(0x7f0000000e00)=""/151, 0x97}, 0x40000) getpeername$inet6(r2, &(0x7f0000000f00)={0x1c, 0xffffffffffffffff, 0x0, @loopback}, &(0x7f0000000f40)=0x1c) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x108, &(0x7f0000000f80)={r8, 0x800, 0x2, 0x7f, 0x9}, &(0x7f0000000fc0)=0x18) 17:34:24 executing program 3: r0 = open(&(0x7f0000000000)='./file0\x00', 0x10000, 0x0) getsockname(r0, &(0x7f0000000040)=@un=@file={0x0, ""/98}, &(0x7f00000000c0)=0x64) getsockopt$inet6_sctp_SCTP_EVENT(r0, 0x84, 0x1e, &(0x7f0000000100)={0x0, 0xd, 0x1ff}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_RESET_ASSOC(r0, 0x84, 0x902, &(0x7f0000000180)=r1, 0x4) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f00000001c0)={r1, 0x1, 0xa, [0x42790c04, 0x5380, 0x1000, 0x66ae, 0x4, 0x3, 0x7a72cb, 0x4, 0x100000000, 0x5]}, 0x1c) getsockopt$inet_mreqsrc(r0, 0x0, 0x47, &(0x7f0000000200)={@broadcast, @loopback, @loopback}, &(0x7f0000000240)=0xc) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x108, &(0x7f0000000280)={r1, 0x59, 0x3, 0x5, 0x4}, &(0x7f00000002c0)=0x18) execve(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440)=[&(0x7f0000000340)='&{-}\x00', &(0x7f0000000380)=').}\'(\x00', &(0x7f00000003c0)='{!:!}^!\x00', &(0x7f0000000400)='!\x00'], &(0x7f00000004c0)=[&(0x7f0000000480)='-\x00']) setsockopt$inet6_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000500)={r1, 0xd, 0x9, 0x8, 0x101, 0x5}, 0x14) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000540)={r2, 0xfee, 0x7, [0x1f, 0x9, 0x1, 0x2, 0xffff, 0x6, 0x4]}, 0x16) getsockopt$inet6_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x105, &(0x7f0000000580)={0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f00000005c0)=0x1c) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f0000000600)={r3, 0x6a6, 0x2, [0x8, 0x9]}, 0xc) r7 = socket$inet_icmp(0x2, 0x2, 0x1) getsockopt$inet_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f0000000640), &(0x7f0000000680)=0x8) shmget(0x2, 0x4000, 0x8, &(0x7f0000ffc000/0x4000)=nil) getsockopt$inet6_sctp_SCTP_GET_LOCAL_ADDRESSES(r0, 0x84, 0x8004, &(0x7f0000000740)={r5, &(0x7f00000006c0)=[@in={0x2, 0xffffffffffffffff, @remote}, @in6, @in6={0x1c, 0xffffffffffffffff, 0x0, @remote}]}, &(0x7f0000000780)=0x10) setsockopt$inet_sctp_SCTP_REUSE_PORT(r0, 0x84, 0x1c, &(0x7f00000007c0)=0x6a72fb54, 0x4) setsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x8, &(0x7f0000000800)={0x5}, 0x4) setsockopt$inet_sctp_SCTP_BINDX_REM_ADDR(r0, 0x84, 0x8002, &(0x7f00000008c0)={r3, &(0x7f0000000840)=[@in={0x2, 0x1, @multicast2}, @in={0x2, 0x0, @multicast2}, @in6={0x1c, 0x3, 0x80000001, @remote={0xfe, 0x80, [], 0x0}, 0x3}, @in={0x2, 0x1, @loopback}, @in={0x2, 0x0, @multicast2}, @in={0x2, 0x3, @remote={0xac, 0x14, 0x0}}, @in={0x2, 0x3, @multicast1}]}, &(0x7f0000000900)=0x10) setsockopt$inet6_sctp_SCTP_REUSE_PORT(r0, 0x84, 0x1c, &(0x7f0000000940)=0x80000001, 0x4) getsockname$inet(r7, &(0x7f0000000980)={0x2, 0xffffffffffffffff, @multicast2}, &(0x7f00000009c0)=0x10) getsockname$inet6(r0, &(0x7f0000000a00)={0x1c, 0xffffffffffffffff, 0x0, @loopback}, &(0x7f0000000a40)=0x1c) getsockopt$inet6_sctp_SCTP_STATUS(r0, 0x84, 0x100, &(0x7f0000000a80)={r6, 0x2, 0x81, 0x5, 0x1, 0x0, 0x400, 0x800, {@in6={{0x1c, 0x3, 0x3, @empty, 0x7fffffff}}, r4, 0x1f, 0x8, 0x80, 0x400, 0x8001}}, &(0x7f0000000b40)=0xb0) shutdown(r7, 0x0) setsockopt$inet_sctp_SCTP_I_WANT_MAPPED_V4_ADDR(r7, 0x84, 0xd, &(0x7f0000000b80)=0x1, 0x4) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r0, 0x84, 0x8003, &(0x7f0000000c40)={r1, &(0x7f0000000bc0)=[@in6={0x1c, 0xffffffffffffffff, 0x0, @loopback}, @in={0x2, 0xffffffffffffffff, @loopback}, @in6={0x1c, 0xffffffffffffffff, 0x0, @local}, @in={0x2, 0xffffffffffffffff, @rand_addr}, @in6={0x1c, 0xffffffffffffffff, 0x0, @loopback}]}, &(0x7f0000000c80)=0x10) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000cc0)={r9, 0x19dbd2b9}, &(0x7f0000000d00)=0x8) connect$inet6(r0, &(0x7f0000000d40)={0x1c, 0x2, 0xfff, @loopback, 0xff}, 0x1c) getsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x10, &(0x7f0000000d80), &(0x7f0000000dc0)=0x4) getsockopt$inet6_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x103, &(0x7f0000000e00)={r8, 0x9, "c9f8524c9c8c643110"}, &(0x7f0000000e40)=0x11) 17:34:24 executing program 3: mlock(&(0x7f0000a00000/0x600000)=nil, 0x600000) mprotect(&(0x7f00007eb000/0x600000)=nil, 0x600000, 0x0) msync(&(0x7f0000d45000/0x4000)=nil, 0x4000, 0x2) mprotect(&(0x7f0000a00000/0x600000)=nil, 0x600000, 0x4000000001) sigaltstack(&(0x7f0000cb7000/0x1000)=nil, 0x0) r0 = accept(0xffffffffffffffff, &(0x7f0000000000)=@un=@file={0x0, ""/108}, &(0x7f0000000080)=0x6e) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x105, &(0x7f00000000c0)={0x4, [0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000100)=0x14) getsockopt$inet6_sctp_SCTP_INITMSG(r0, 0x84, 0x3, &(0x7f00000001c0), &(0x7f0000000200)=0x8) getsockopt$inet6_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x900, &(0x7f0000000140)={r1, 0x7}, &(0x7f0000000180)=0x8) 17:34:24 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = dup(r0) getsockopt$inet6_sctp_SCTP_CONTEXT(r0, 0x84, 0x1a, &(0x7f00000000c0)={0x0, 0x6}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0x101, &(0x7f0000000140)={@in6={{0x1c, 0x3, 0xc1e, @remote={0xfe, 0x80, [], 0x0}, 0x1f}}, r2, 0x9, 0x7fff, 0x0, 0x1, 0x9}, &(0x7f0000000200)=0x98) r4 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r4, 0x84, 0x24, &(0x7f0000000080)=0x1c00, 0x4) freebsd10_pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r5, 0x84, 0xb, &(0x7f0000000240)={0x8000, 0x0, 0x100, 0x8000, 0x1000, 0x7c32, 0x1, 0x1ff, r3}, 0x20) bind(r5, &(0x7f0000000040)=@un=@file={0x0, './file0\x00'}, 0xa) panic: pmap_demote_pde: page table page for a wired mapping is missing cpuid = 1 time = 1553103264 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe00212846b0 vpanic() at vpanic+0x1e0/frame 0xfffffe0021284710 panic() at panic+0x43/frame 0xfffffe0021284770 pmap_demote_pde_locked() at pmap_demote_pde_locked+0x1288/frame 0xfffffe0021284840 pmap_remove() at pmap_remove+0x5c8/frame 0xfffffe00212848d0 vm_map_protect() at vm_map_protect+0x666/frame 0xfffffe0021284940 sys_mprotect() at sys_mprotect+0xcc/frame 0xfffffe0021284980 amd64_syscall() at amd64_syscall+0x436/frame 0xfffffe0021284ab0 fast_syscall_common() at fast_syscall_common+0x101/frame 0xfffffe0021284ab0 --- syscall (198, FreeBSD ELF64, nosys), rip = 0x412e5a, rsp = 0x7fffdfffdf38, rbp = 0x3 --- KDB: enter: panic [ thread pid 771 tid 100119 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why