NetBSD/amd64 (ci2-netbsd-kubsan-1.c.syzkaller.internal) (console) Dec 16 20:22:57 ci2-netbsd-kubsan-1 getty[580]: /dev/ttyE3: Device not configured login: Dec 16 20:22:57 ci2-netbsd-kubsan-1 getty[564]: /dev/ttyE2: Device not configured Warning: Permanently added '10.128.0.189' (ECDSA) to the list of known hosts. 2019/12/16 20:23:05 fuzzer started 2019/12/16 20:23:05 dialing manager at 10.128.0.105:41667 2019/12/16 20:23:06 syscalls: 215 2019/12/16 20:23:06 code coverage: enabled 2019/12/16 20:23:06 comparison tracing: enabled 2019/12/16 20:23:06 extra coverage: support is not implemented in syzkaller 2019/12/16 20:23:06 setuid sandbox: support is not implemented in syzkaller 2019/12/16 20:23:06 namespace sandbox: support is not implemented in syzkaller 2019/12/16 20:23:06 Android sandbox: support is not implemented in syzkaller 2019/12/16 20:23:06 fault injection: support is not implemented in syzkaller 2019/12/16 20:23:06 leak checking: support is not implemented in syzkaller 2019/12/16 20:23:06 net packet injection: support is not implemented in syzkaller 2019/12/16 20:23:06 net device setup: support is not implemented in syzkaller 2019/12/16 20:23:06 concurrency sanitizer: support is not implemented in syzkaller 2019/12/16 20:23:06 devlink PCI setup: support is not implemented in syzkaller 20:23:08 executing program 0: r0 = socket(0x18, 0x0, 0x2) bind$inet6(r0, 0x0, 0x0) 20:23:09 executing program 1: r0 = semget$private(0x0, 0x207, 0x0) semctl$SETVAL(r0, 0xbb7ad47da3a70bbf, 0x10, 0x0) 20:23:09 executing program 2: r0 = socket(0x2000000015, 0x80005, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0}, 0x1c) sendto$inet6(r0, 0x0, 0xffc, 0x0, &(0x7f00000010c0)={0xa, 0x0}, 0x1c) 20:23:09 executing program 3: r0 = socket(0x2000000015, 0x80005, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0}, 0x1c) sendto$inet6(r0, 0x0, 0x1a000, 0x0, &(0x7f00000010c0)={0xa, 0x0}, 0x1c) 20:23:09 executing program 4: r0 = socket$inet6(0xa, 0x22000000002, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0}, 0x1c) connect$inet6(r0, &(0x7f00000004c0)={0xa, 0x0}, 0x1c) 20:23:09 executing program 5: r0 = socket(0x2000000015, 0x80005, 0x0) bind$inet6(r0, &(0x7f0000000000)={0xa, 0x0}, 0x1c) sendto$inet6(r0, 0x0, 0x100000, 0x0, &(0x7f00000010c0)={0xa, 0x0}, 0x1c) 20:23:11 executing program 4: 20:23:11 executing program 4: 20:23:11 executing program 0: 20:23:11 executing program 3: 20:23:11 executing program 4: 20:23:11 executing program 3: 20:23:11 executing program 0: 20:23:11 executing program 3: chdir(&(0x7f0000000000)='./file0\x00') mkdir(&(0x7f0000000340)='./file0\x00', 0x0) chdir(&(0x7f0000000140)='./file0\x00') symlink(&(0x7f00000001c0)='./file0/file0\x00', &(0x7f0000000200)='./file0/file0\x00') chroot(&(0x7f0000000380)='./file0/file0\x00') open(&(0x7f0000000480)='./file0\x00', 0x0, 0x0) 20:23:11 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x2070e, 0x0) syz_emit_ethernet(0x0, &(0x7f0000000080)) munmap(&(0x7f0000109000/0x3000)=nil, 0x3000) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0xb0041, 0x40) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000380)="ef17008e6d769584bd1613ccd8c4db241430ac1580e18f913c32a2bc19cbba77753fd1dffb63e455b5bc5c1ee1fa68496d5f1dfdc9d8e87d749053ebb3000e03483040ce45ed6dceb67ed93c43b3e8365ebe3bb5f7702b2d375da584d17372de44d1470bd99926b3a18cd1321e3620eaa2a3ea11db7478831814ebaf62b46cd83a6cd0ffb01fa14dd78605783671c2299e4038cf77a800f99fe2b69a766c01f1e956415d0dc55e96aec535de25c45dfc4a5914682c26fbf09a693ad4f297dfb12195c1ffeff5", 0xfe92}], 0x1) 20:23:11 executing program 5: open(0x0, 0x2070e, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) socket(0x0, 0x0, 0x0) lseek(r0, 0xa0, 0x2) semget(0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x1, 0x4, 0x0) r1 = semget$private(0x0, 0x7, 0x80) semop(r1, &(0x7f0000000240), 0x6) semop(r1, &(0x7f0000000140), 0x2aaaaaaaaaaaaae4) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000040)=""/154) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) writev(r2, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0xa10, 0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(r1, 0x3, 0x8, &(0x7f0000000180)=0xe84) ftruncate(r2, 0x80000001) 20:23:11 executing program 4: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) r0 = fcntl$getown(0xffffffffffffffff, 0x5) posix_spawn(r0, 0x0, &(0x7f0000000140)={0x1, 0x0, 0x0}, 0x0, 0x0, 0x0) 20:23:11 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000200)='/', 0x0, 0x0) fchmod(r0, 0x20) getdents(r0, 0x0, 0x217) 20:23:11 executing program 0: r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffd000/0x3000)=nil) shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000080)=""/54) shmctl$IPC_RMID(r0, 0x0) r1 = socket(0x18, 0x2, 0x0) socket(0x18, 0x0, 0x9) getsockopt$sock_int(r1, 0xffff, 0x1000, 0x0, 0x0) 20:23:11 executing program 2: chmod(&(0x7f0000000000)='./file0\x00', 0x0) mknod$loop(&(0x7f0000000280)='./file0/file0/file0\x00', 0x0, 0x1) r0 = fcntl$dupfd(0xffffffffffffffff, 0xa, 0xffffffffffffffff) getpeername$unix(0xffffffffffffffff, &(0x7f0000000040)=@abs, &(0x7f0000000080)=0x8) open(&(0x7f0000000240)='./file1\x00', 0x2, 0xc0) open$dir(&(0x7f0000000140)='./file0\x00', 0x1020020, 0x10) paccept(r0, &(0x7f00000000c0)=@in6, &(0x7f0000000100)=0xc, 0x20000000) lstat(&(0x7f0000000180)='./file1\x00', &(0x7f00000001c0)) 20:23:11 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x4c0700, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) clock_gettime(0x3, &(0x7f0000000140)) writev(r2, &(0x7f00000001c0), 0x2d5) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r3, 0x0, 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00', 0x400) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x55ad85fd40ecec69, 0xa11, r2, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0, 0x0) madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) 20:23:11 executing program 3: r0 = open(0x0, 0x1, 0x0) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) writev(r1, &(0x7f0000000640)=[{&(0x7f0000000140)='#', 0x1}], 0x1) r2 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000013000/0x4000)=nil, 0x4000, 0x3, 0x10, r2, 0x0, 0x0) open$dir(&(0x7f0000001240)='./file0\x00', 0x42000400000002c1, 0x0) r3 = open$dir(&(0x7f0000001240)='./file0\x00', 0x0, 0x0) r4 = dup(r3) socket(0x1f, 0x2, 0xf8) fsync(r4) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000200)="d659fe05", 0x4}, {&(0x7f00000000c0)="3e988a6661725338ddc719d867e4a04dbfc617ca12c0aebed44b58b873e143d48380", 0x22}, {&(0x7f0000000180)="123e07c3253b1dc18e169fe77a28bc293a8cf3d9687cf71522c4356f88d5137d5f619b4b4f9ad55a1b4bede6c8a1927b99bbc3a5ef7a178a2a85af303222f103fee2552a", 0x44}], 0x3, 0x0) 20:23:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) _lwp_getprivate() setsockopt(r1, 0x0, 0x80, &(0x7f0000000040)="0d46d791", 0x4) sendmsg$unix(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) recvmsg(r1, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=""/71, 0x47}, 0x0) [ 40.6261213] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 611 command syz-executor.4) 20:23:12 executing program 1: socket(0x22, 0x3, 0x0) select(0x40, &(0x7f0000000040)={0xfff}, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r0, 0x0, 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r1, 0x0, 0x0, 0x0) fcntl$dupfd(r1, 0xc, r0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x80, 0x0) pread(r2, 0x0, 0x0, 0x0) getdents(r2, &(0x7f0000000080)=""/7, 0x7) 20:23:12 executing program 4: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x4c0700, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x0, 0x2) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) clock_gettime(0x3, &(0x7f0000000140)) writev(r2, &(0x7f00000001c0), 0x2d5) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r3, 0x0, 0x0, 0x0) linkat(r0, &(0x7f0000000040)='./file0\x00', r3, &(0x7f00000000c0)='./file0\x00', 0x400) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x55ad85fd40ecec69, 0xa11, r2, 0x0, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r1, 0x0, 0x0) madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) [ 40.7561493] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 611 command syz-executor.4) 20:23:12 executing program 5: open(0x0, 0x2070e, 0x0) r0 = socket$unix(0x1, 0x0, 0x0) socket(0x0, 0x0, 0x0) lseek(r0, 0xa0, 0x2) semget(0x0, 0x0, 0x0) semctl$GETPID(0x0, 0x1, 0x4, 0x0) r1 = semget$private(0x0, 0x7, 0x80) semop(r1, &(0x7f0000000240), 0x6) semop(r1, &(0x7f0000000140), 0x2aaaaaaaaaaaaae4) rename(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='./file0\x00') semctl$IPC_STAT(r1, 0x0, 0x2, &(0x7f0000000040)=""/154) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x2) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) writev(r2, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x4, 0xa10, 0xffffffffffffffff, 0x0, 0x0) semctl$SETVAL(r1, 0x3, 0x8, &(0x7f0000000180)=0xe84) ftruncate(r2, 0x80000001) 20:23:12 executing program 3: link(&(0x7f00000000c0)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0x0) mknod$loop(&(0x7f0000000000)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38//file0\x00', 0xc000, 0x0) [ 40.9861710] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 105 command syz-executor.3) 20:23:12 executing program 2: syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="280000000000010001"], 0x9}, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r1, 0x0, 0x0, 0x0) mknodat(r1, &(0x7f0000000080)='./file0\x00', 0x1000, 0x8001) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x900000000000000, &(0x7f0000000000), 0x28}, 0x0) 20:23:12 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) symlink(&(0x7f0000000080)='./file0/file1\x00', &(0x7f00000000c0)='./file0/file1\x00') msgget(0x1, 0x50) r0 = msgget$private(0x0, 0x2d) msgsnd(r0, &(0x7f0000000c80)={0x1, "2e1100b0df6d7fcf409def1a1fc1ed341c5533b89b0603ae37c860fe2c09c110ff00f45709d664539e1e381f35071f061ac0e16f328dca5d39656da02489672db6d19f37405111e97aa998473f0e8d1e8f3b32b99730931041cfd6c2df99a9d60031c125814bb6ee11e303000000b33d0000000049ad4ae8d462fcf5fa3b57806356cdb615f058b0fed6706a4d152ed0cea438f8387c3440ba6ba9cc08452fc04250db61cf3bcacfe9d34b6a31de9d05a5615416a1e222dcba8dee9f0cdc7527d27e8a15b700000000000000000000000000000000cd846e9ea6bfe963e86814a576b24813ddfa8130a04b4ad6d8791c698df63e5e23fa327326484829f3f7769669e325cd2485e172bf12"}, 0x44b, 0x800) r1 = getuid() lchown(&(0x7f00000000c0)='./file0\x00', r1, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) bind$unix(r2, &(0x7f0000000600)=ANY=[@ANYBLOB="0100cb000000001e9233614b000daa40245f6811c4c2e3ebd8e60cab9cd3ca30b1211b628c066f3831f33a21d5a67f769a6c9696a4d54ffd1041ba49e4bf89d999458ab740317ce546bac7b2ed39d55f2286471b8eff6eb1ebb20d1e6548ae2112da861ea482b868ccdc6a04d0796548851151c9fb6d984020b61ce9568f9d68df3629c650204d66b067000000000000ec9e616fb559d44980001978f512752017cea2b4b466a60d30e4febfd1ed3d6a3f871647b3571294d63a09a4d8c6e116ec58cf8ee579280e81aca58240c72606ab5ab60f07372975fe9dd53e38b174c86c0463e7c55902fce66fed6c38c154e95fb600000000000000000000000000000000e4a34d4d96a81e5d14794b77d6e913e6486466f0636e8f88357363d9e6dfd0f33a6595932aef95aa44af2d237c39580867012c9f6e0cd20306a6"], 0xc) syz_extract_tcp_res$synack(&(0x7f0000000040), 0x1, 0x0) getsockname$unix(r2, 0x0, 0x0) [ 41.1161879] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 682 command syz-executor.4) 20:23:12 executing program 1: r0 = open$dir(&(0x7f0000001240)='./file0\x00', 0x42000400000002c1, 0x0) accept(0xffffffffffffff9c, 0x0, 0x0) r1 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000013000/0x4000)=nil, 0x4000, 0x3, 0x10, r1, 0x0, 0x0) mmap(&(0x7f0000012000/0x3000)=nil, 0x3000, 0x0, 0x1410, r0, 0x0, 0x0) mlock(&(0x7f0000013000/0x2000)=nil, 0x2000) __clone(0x0, 0x0) ptrace(0x0, 0x0, 0x0, 0x0) semop(0x0, 0x0, 0x0) geteuid() socketpair$unix(0x1, 0x5, 0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000300)) socketpair$unix(0x1, 0x0, 0x0, 0x0) r2 = semget$private(0x0, 0x0, 0x0) semop(0x0, 0x0, 0x0) semop(r2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, 0x0, &(0x7f0000000180)) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) getpgrp() ptrace(0x0, 0x0, 0x0, 0x0) ptrace(0x0, 0x0, 0x0, 0x0) socket(0x1f, 0x5, 0x2) socket$inet(0x2, 0x3, 0x0) socket(0x1f, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) r3 = socket(0x0, 0x0, 0x0) dup2(r3, 0xffffffffffffffff) socket(0x0, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$inet(0x2, 0x0, 0x0) socket(0x1f, 0x5, 0x0) semget$private(0x0, 0x0, 0x0) semop(0x0, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080), 0x0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) r4 = semget$private(0x0, 0x0, 0x0) r5 = semget$private(0x0, 0x0, 0x0) semctl$IPC_SET(r5, 0x0, 0x1, 0x0) socketpair$unix(0x1, 0x0, 0x0, 0x0) semop(0x0, 0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) semctl$IPC_RMID(r4, 0x0, 0x0) msgctl$IPC_SET(0x0, 0x1, 0x0) r6 = getuid() setuid(r6) r7 = semget$private(0x0, 0x4, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r8, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r10 = semget$private(0x0, 0x7, 0x0) semop(r10, &(0x7f0000000240), 0x0) semop(r10, &(0x7f0000000240), 0x6) semctl$SETVAL(r10, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r10, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r11, r9, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) semctl$IPC_SET(r7, 0x0, 0x1, &(0x7f0000000080)={{0x7fffff, r6, 0xffffffffffffffff, 0x0, r11}, 0x100000000000000}) semop(0x0, &(0x7f0000001040)=[{0x0, 0x1, 0x1000}], 0x1) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, 0x0, 0x0) semctl$IPC_SET(0x0, 0x0, 0x1, 0x0) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) 20:23:12 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e5"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) listen(r1, 0x0) r2 = socket(0x2, 0x1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r3, 0xa, 0xffffffffffffffff) setsockopt$inet6_MRT6_DEL_MFC(r3, 0x29, 0x69, &(0x7f0000000080)={{0x18, 0x3, 0x9, 0xa61}, {0x18, 0x2, 0xfffffff9, 0x6}, 0x0, [0x1ff, 0xfffffffb, 0x6, 0x800, 0x3f, 0xff, 0xfffffff8, 0x35]}, 0x3c) connect$unix(r2, &(0x7f0000000000), 0x10) write(r2, &(0x7f0000000100)="b85d0435a6bb3036404af2", 0x348) sendto$inet(r2, &(0x7f0000000040)='+', 0x7e, 0x5, 0x0, 0x0) 20:23:12 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) listen(r1, 0x0) r2 = socket(0x2, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00.ofihe0\x00'], 0x10) sendto$inet6(r2, &(0x7f00000003c0)="d0777ee68b65342359659f512d40929dbd6f6b2bf2652f334584412f31506994f62b2be119248cb2213846caef60491d46dde67a98d3ea9756bdf003c9ff25d1794701ba4d2d59019ab53993b1f85c17f7ae2e7b22504f48167b26fb838a5ce0455e646164cd68a82fa77269cbb2a41a531c5f27f910247cede971515cc2eecc72759507e54f99dc618b27ddc33ba523e40a21f9b50aa0d306460c4667b220d2c43bbe5f2097a042d7cb3469459a1713065e233399eb32edd76fdc4a190f3d7907fbe1c23b39c9aa6c3410976a2b2e09868b819daa3f6427a690", 0x65b14912384ee8fa, 0x7, 0x0, 0xffffffe5) r3 = accept$unix(r1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3) readv(r3, &(0x7f0000003e40)=[{&(0x7f00000000c0)=""/228, 0xe4}], 0x1) [ 41.4362355] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 643 command syz-executor.1) 20:23:12 executing program 5: __clone(0x1480, 0x0) r0 = socket(0x2, 0x10000000, 0x1) r1 = fcntl$getown(r0, 0x5) ptrace(0x5, r1, &(0x7f0000000000), 0x0) 20:23:13 executing program 5: mkdir(&(0x7f0000000240)='.\x00', 0x0) rename(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00') 20:23:13 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2020231, 0x0) writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000000), 0x2cfea}], 0x1000000000000013) writev(r0, &(0x7f0000000280), 0x0) write(r0, 0x0, 0x454) preadv(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000040)=""/251, 0xfb}, {&(0x7f0000000380)=""/4096, 0x1000}, {&(0x7f0000000140)=""/23, 0x17}], 0x3, 0x1) 20:23:13 executing program 4: r0 = socket(0x18, 0x3, 0x0) setsockopt$sock_linger(0xffffffffffffffff, 0xffff, 0x80, &(0x7f0000000280)={0x248}, 0x0) getsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)=""/32, &(0x7f0000000180)=0x20) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7, 0x3}, 0x8) r1 = open(&(0x7f0000000080)='./file0\x00', 0x2fc, 0x0) r2 = msgget(0x1, 0x1) r3 = open(&(0x7f0000000180)='./file0\x00', 0x60e, 0x0) pwritev(r3, &(0x7f0000000500)=[{&(0x7f0000000540)="f6c8aa26b6d3f750c44255e21cdbf5d9ff41398bab8493de896aa9c0d574ddbc8eb988c4c2c226e85feec434405a5a70de00026463fc95d80afd578bbd3a958fc73ed2d4dd3ba29b3eaf7205a9dfa59a9469a186f3be373ff9daba9d0000000080000000d63d35230d97e75e6618b9db05f7a7b0ed4309d3f2a78ed6c305a987a7cd523c1c64972793eb693e7c1781aef8b09563ee15cd7d85ee7770314672345071187a7517f041b53e9572c89d0b000000000000000000000000002b5beb34363598498a55396ad580d8a5af6e1661ec24c3a4e05385e37aed04714750c18d7c4a0f30028f56d637dcc8df66c2d2ac682fb0a456eff0c77ccb6a93af5582d5da97fc756daa18507e2080e2b456c4450ce44623c548f30c0adf6e56e6fdbeb2ec1315e936488af832afe2a39c205af4b8600bf5a98ac8f721a8dbb486ac0b85cc1fd2a9c122050a27727a6ed871a32ed8cf788f8f556eedef1aa7eb9aba45834e07b1d1fe3240114b27629aec5c8f75c0271d30ec5b665ff66af51ad5ca90973f3900", 0x183}, {&(0x7f0000000400)="23e0f32107104cdddc39acc4942e8fc6667b843823fad92ca0f1cbd5d46aa918f87b3af926180b1f2c831a3f7e46e24252f36d1eed8198acfc66ea75a3fc1c2d3778eec491cf829e5d91a20742d9f143698977a5c77549986ad511d3821729bc27bc7caf276ba13a52d2a7ed909b42eaebbda17985f5c0800b2a80011d164b3984dbc2331987f0812952150b3821abdaddecde418fd74df344bc2a5b1d97b794b226ed1738b419853fe1629a7fcb9383ee661f2b99b5705600fca8d28920d68cb7ac5c5ab2c709659fc6b0d519e4b446939cb5c585aaf76bfe97313a64acdfccb67f9410bf6ffba321", 0xe9}], 0x2, 0x20) r4 = msgget$private(0x0, 0x0) r5 = socket(0x18, 0x2, 0x0) setsockopt$sock_int(r5, 0xffff, 0x400, 0x0, 0x0) r6 = socket(0x18, 0x2, 0x0) setsockopt$sock_int(r6, 0xffff, 0x400, 0x0, 0x0) r7 = socket(0x18, 0x2, 0x0) setsockopt$sock_int(r7, 0xffff, 0x400, 0x0, 0x0) socket(0x18, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1007, 0x0, 0x0) r8 = socket(0x18, 0x2, 0x0) setsockopt$sock_int(r8, 0xffff, 0x200, 0x0, 0x0) msgsnd(r4, &(0x7f0000000800)=ANY=[], 0x0, 0x800) getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000001440)={0x0, 0x0}, &(0x7f0000000340)=0xc) r10 = __clone(0x0, 0x0) ptrace(0x9, r10, 0x0, 0x800000000000000) ptrace(0x2a, r10, &(0x7f0000000040), 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f0000000380)={{0x8, r9, 0x0, 0x0, 0x0, 0x40}, 0x8000040000, 0x131b, r10}) getgroups(0x3, &(0x7f0000000300)=[0x0, 0x0, 0xffffffffffffffff]) r11 = open(&(0x7f0000000180)='./file1\x00', 0x60e, 0x4) pwritev(r11, &(0x7f0000000000)=[{&(0x7f00000001c0)="f6c8aa26b6d3f750c44255e21cdbf5d9ff41398bab84937a896aa9c0d574dd6da7aeb2711eac09a8c305a545bc8eb988c4c2c226e85feec434405a5a70de00026463fc95d80afd578bbd3a958fc73e9b3eaf7205a9dfa59a9469a186f3be373ff9daba9d805db5ac9c4dccf0d65135230d97e75e6618b9df05eea7b0ed4309d3f2a78ed6c305a987a7cd523c1c64972793eb693e7c17f0acf8b09563ee68d29e944c1884e04672345071187a7517f041b53e9572c89d0b", 0xb7}, {&(0x7f0000000400)="23e0f32107104cdddc39acc4942e8fc6667b843823fad92ca0f1cbd5d46aa918f87b3af926180b1f2c831a3f7e46e24252f36d1eed8198acfc66ea75a3fc1c2d3778eec491cf829e5d91a20742d9f143698977a5c77549986ad511d3821729bc27bc7caf276ba13a52d2a7ed909b42eaebbda17985f5c0800b2a80011d164b3984dbc2331987f0812952150b3821abdaddecde418fd74df344bc2a5b1d97b794b226ed1738b419853fe1629a7fcb9383ee661f2b99b5705600fca8d28920d68cb7ac5c5ab2c709659fc6b0d519e4b446939cb5c585aaf76bfe97313a64acdfccb67f9410bf6ffba321", 0xe9}], 0x2, 0x6) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r11, 0x0, 0x0) r12 = msgget$private(0x0, 0x0) msgsnd(r12, &(0x7f0000000040)=ANY=[@ANYBLOB="00000000080000003882f6e6be1a658dbef672773c0cc65c853c84a5beefe4c4b2ff445c3c10cf9e65d0e420e50db943c16ebdb6eae3298b497c57dd37c4dedbde3a3280a47675e91dd4243f3eec65c5edbf45b82c7ebc5069480d8ab3749c71320fb11c0f8bc9b712b188"], 0x6b, 0x800) getsockopt$sock_cred(r11, 0xffff, 0x11, &(0x7f00000002c0)={0x0, 0x0}, &(0x7f0000000340)=0xacaa6bb69c464387) msgctl$IPC_SET(r12, 0x1, &(0x7f0000000100)={{0x200, r13, 0x0, 0x0, 0x0, 0x40}, 0x8000040000, 0x131b, 0x0, 0x0, 0x4}) 20:23:13 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r0, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r2 = semget$private(0x0, 0x7, 0x0) semop(r2, &(0x7f0000000240), 0x0) semop(r2, &(0x7f0000000240), 0x6) semctl$SETVAL(r2, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r3, r1, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) r4 = getuid() setuid(r4) r5 = semget$private(0x0, 0x4, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r6, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r8 = semget$private(0x0, 0x7, 0x0) semop(r8, &(0x7f0000000240), 0x0) semop(r8, &(0x7f0000000240), 0x6) semctl$SETVAL(r8, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r8, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r8, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r9, r7, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000080)={{0x7fffff, r4, 0xffffffffffffffff, 0x0, r9}, 0x100000000000000}) chown(&(0x7f0000000000)='./file0\x00', r1, r9) openat(0xffffffffffffffff, &(0x7f0000000100)='/', 0x0, 0x0) 20:23:13 executing program 5: r0 = _lwp_self() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x1000, 0xffffffffffffffff) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2, 0x0) rename(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='./file0\x00') r2 = open(&(0x7f00000000c0)='./file0\x00', 0x201, 0x0) writev(r2, &(0x7f0000000580)=[{&(0x7f0000000140)="83", 0x1}], 0x1) r3 = getuid() setuid(r3) r4 = semget$private(0x0, 0x1, 0xc8a) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$SO_PEERCRED(r5, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r8 = semget$private(0x0, 0x7, 0x0) semop(r8, &(0x7f0000000240), 0x0) semop(r8, &(0x7f0000000240), 0x6) semctl$SETVAL(r8, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r8, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r8, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r9, r7, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000080)={{0x7fffff, r3, 0xffffffffffffffff, 0x0, r9}, 0x100000000000000}) seteuid(r3) fcntl$setstatus(r6, 0x4, 0x4) socket$unix(0x1, 0x1, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) _lwp_wakeup(r0) accept$unix(r2, &(0x7f0000000000)=@abs, &(0x7f0000000080)=0x8) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r10, 0xa, 0xffffffffffffffff) connect$inet6(r10, &(0x7f0000000180)={0x18, 0x3, 0x100e, 0x8}, 0xc) 20:23:13 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x4c0700, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x48002, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) preadv(r0, &(0x7f0000001480), 0x0, 0x0) open$dir(&(0x7f0000000040)='./file0\x00', 0x8, 0x10) [ 42.0363201] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 399 command syz-executor.4) [ 42.0763288] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 643 command syz-executor.1) 20:23:13 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r1 = open$dir(&(0x7f0000001240)='./file0\x00', 0x42000400000002c1, 0x0) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)="8f93f28b9ea5b15ce6104cc8b0e25e3ceadd12bc5604a2e2a354841fedc63c72956d05ce098b26e8ea9625c768cc4bea397cdd982441bb5e3a41257b82bc4488802f0644a6f9336813790acbe83a56b2531d272ea351b79120b94307cf9cdf532614d52ff512bbb30c20b4", 0xcd}], 0x1, 0x0) fchmod(r1, 0x0) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) 20:23:13 executing program 4: r0 = shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000000)=""/55) r1 = __clone(0x0, 0x0) ptrace(0x9, r1, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace(0xc, r1, &(0x7f0000000000), 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) fcntl$lock(r2, 0x7, &(0x7f0000000080)={0x2, 0x1, 0x3, 0x0, r1}) [ 42.2563533] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 399 command syz-executor.4) 20:23:13 executing program 4: setrlimit(0x6, &(0x7f0000000000)) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) flock(r1, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x55ad85fd40ecec69, 0xa11, r0, 0x0, 0x0) 20:23:13 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)) readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000003c0)=""/4096, 0x1000) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) r1 = shmget$private(0x0, 0x4000, 0x81, &(0x7f0000ffc000/0x4000)=nil) shmat(r1, &(0x7f0000ffc000/0x4000)=nil, 0x2000) mknod(&(0x7f00000000c0)='./file0\x00', 0x8021, 0x136) 20:23:13 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)) listen(r1, 0x0) r2 = socket(0x2, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00.ofihe0\x00'], 0x10) sendto$inet6(r2, &(0x7f00000003c0)="d0777ee68b65342359659f512d40929dbd6f6b2bf2652f334584412f31506994f62b2be119248cb2213846caef60491d46dde67a98d3ea9756bdf003c9ff25d1794701ba4d2d59019ab53993b1f85c17f7ae2e7b22504f48167b26fb838a5ce0455e646164cd68a82fa77269cbb2a41a531c5f27f910247cede971515cc2eecc72759507e54f99dc618b27ddc33ba523e40a21f9b50aa0d306460c4667b220d2c43bbe5f2097a042d7cb3469459a1713065e233399eb32edd76fdc4a190f3d7907fbe1c23b39c9aa6c3410976a2b2e09868b819daa3f6427a690", 0x65b14912384ee8fa, 0x7, 0x0, 0xffffffe5) r3 = accept$unix(r1, 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3) readv(r3, &(0x7f0000003e40)=[{&(0x7f00000000c0)=""/228, 0xe4}], 0x1) 20:23:13 executing program 0: mlock(&(0x7f0000001000/0x2000)=nil, 0x800000) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xb, 0x1c11, 0xffffffffffffffff, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r0, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffff9c, r0) fchroot(r1) 20:23:14 executing program 2: mknod(&(0x7f0000000180)='./file0\x00', 0x1ffb, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r1, 0x0, 0x0, 0x0) fsync(r1) lseek(r0, 0x0, 0x0) 20:23:14 executing program 1: r0 = semget(0x2, 0x0, 0x400) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000001c0)=""/14) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) sendto$inet(r1, &(0x7f0000000200)="0066776d0f60b048f6098c3b01e779009a7f674ce7b37ea800a2647e", 0x1c, 0x1619303609c4d832, 0x0, 0x0) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='.\x00') stat(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)) r2 = open$dir(&(0x7f0000000140)='./file0\x00', 0x200000, 0x20) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r3, 0xa, 0xffffffffffffffff) getpeername$unix(r3, &(0x7f0000000240)=@file={0x0, ""/15}, &(0x7f00000002c0)=0x11) faccessat(r2, &(0x7f0000000180)='./file0\x00', 0x0, 0x0) 20:23:14 executing program 2: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r0, 0x0, 0x0, 0x0) r1 = dup(r0) fcntl$getflags(r1, 0x3) clock_nanosleep(0x0, 0x0, &(0x7f0000000100), &(0x7f0000000180)) 20:23:14 executing program 4: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2020231, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x100000000000023d) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x11, r0, 0x0, 0x0) r1 = __clone(0x0, 0x0) ptrace(0x9, r1, 0x0, 0x0) mlock(&(0x7f0000001000/0x1000)=nil, 0x1000) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000240), 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace(0x5, r1, &(0x7f0000001180), 0x0) semctl$IPC_RMID(0x0, 0x0, 0x0) socket(0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r2, 0xa, 0xffffffffffffffff) shmget(0x3, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) getsockopt$SO_PEERCRED(r2, 0xffff, 0x11, &(0x7f0000000000), 0xc) 20:23:14 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$inet_opts(r1, 0x0, 0x200000000000c, &(0x7f0000000180)="ea00005c00000001", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:14 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$inet_opts(r1, 0x0, 0x200000000000c, &(0x7f0000000180)="ea00005c00000001", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:14 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$inet_opts(r1, 0x0, 0x200000000000c, &(0x7f0000000180)="ea00005c00000001", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x4) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) getsockopt$SO_PEERCRED(r0, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0xc) r3 = getuid() setuid(r3) semget$private(0x0, 0x4, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r4, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r6 = semget$private(0x0, 0x7, 0x0) semop(r6, &(0x7f0000000240), 0x0) semop(r6, &(0x7f0000000240), 0x6) semctl$SETVAL(r6, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r6, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r7, r5, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000080)={{0x7fffff, r3, 0xffffffffffffffff, 0x0, r2, 0x10}, 0x100000000000000, 0x0, 0xfffffffffffffffd}) setuid(r3) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r8, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r10 = semget$private(0x0, 0x7, 0x0) semop(r10, &(0x7f0000000240), 0x0) semop(r10, &(0x7f0000000240), 0x6) semctl$SETVAL(r10, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r10, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r11, r9, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) r12 = getuid() setuid(r12) r13 = semget$private(0x0, 0x4, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r14, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r16 = semget$private(0x0, 0x7, 0x0) semop(r16, &(0x7f0000000240), 0x0) semop(r16, &(0x7f0000000240), 0x6) semctl$SETVAL(r16, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r16, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r16, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r17, r15, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) semctl$IPC_SET(r13, 0x0, 0x1, &(0x7f0000000080)={{0x7fffff, r12, 0xffffffffffffffff, 0x0, r17}, 0x100000000000000}) semctl$IPC_SET(r13, 0x0, 0x1, &(0x7f0000000100)={{0x44af, r1, 0x0, r9, 0xffffffffffffffff, 0x92, 0x6}, 0x2, 0x6, 0x2}) chdir(&(0x7f00000000c0)='./file0\x00') 20:23:14 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) r1 = accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$inet_opts(r1, 0x0, 0x200000000000c, &(0x7f0000000180)="ea00005c00000001", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:14 executing program 1: getrlimit(0x5, &(0x7f0000000080)) sendto(0xffffffffffffffff, &(0x7f0000000140)="2a78cf925c0c3df1fd83932574b6d60bf1", 0x11, 0x0, &(0x7f0000000180)=@in={0x2, 0x1}, 0xc) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r1 = fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) bind$inet(r0, &(0x7f0000000380)={0x2, 0x2}, 0xc) r2 = socket(0x18, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="82022e2f66696c653000ff31a299ca042e37f7a8ad6b3e910c411d6c6aa98d8851fa8a0f45ca76571b873ce0fbd6a900000041acc3cf740e70530000000000000000000000000098490d077aaf9544666aa81d54b9f85142108e909d7e3b3bbac0459f6ab0"], 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=[@rights={0x10, 0x7}], 0x10}, 0x0) r3 = dup2(r0, r1) sendto(r3, &(0x7f0000000200)="06c5a53be3cdb4e39015e50f14d2908c6f86efa04d1135b2849819efb7682aa5ce6b492b300bb58ff0", 0x29, 0x10, &(0x7f0000000400)=@in={0x2, 0x1}, 0xc) connect$unix(r2, &(0x7f0000000340)=@file={0x0, './file0\x00'}, 0xa) getsockname$unix(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000c700000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000100"/110], &(0x7f0000000040)=0x6e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) write(r5, &(0x7f0000000300)="5d37628b19bf13a42d276bc5f325733cb9f0c979763f0622aad0f59b", 0x1c) r6 = open(&(0x7f0000000280)='./file0\x00', 0x1804c, 0x111) linkat(r4, &(0x7f0000000240)='./file0\x00', r6, &(0x7f00000002c0)='./file0\x00', 0x400) r7 = socket(0x18, 0x400000002, 0x0) close(r7) r8 = socket(0x18, 0x3, 0x0) connect$unix(r8, &(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0xa) write(r7, &(0x7f0000000000)="baf2a3ac324f5d5b", 0x20f) 20:23:14 executing program 3: open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0xfffffffffffffffd) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000000340)="06d072e7b16924a9cef1b3d4232e3b53d45fec454fe18698900fef82091c80f1e949b8343b758e999e2b6611faae1682ac3535fe8fe748350c9aac0a", 0x3c}], 0x1) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2088621, 0x0) writev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f0000000000), 0x2cfea}], 0x1000000000000013) writev(r0, &(0x7f0000000280), 0xd) r1 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) writev(r1, &(0x7f0000000640)=[{&(0x7f0000000680)="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", 0x450}], 0x1) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r2, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r3, 0xa, 0xffffffffffffffff) getsockopt$SO_PEERCRED(r3, 0xffff, 0x11, &(0x7f0000000000)={0x0, 0x0}, 0xc) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$dupfd(r5, 0xa, 0xffffffffffffffff) bind$inet(r5, &(0x7f00000001c0)={0x2, 0x3}, 0x29) r7 = getuid() setuid(r7) r8 = semget$private(0x0, 0x4, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r9, 0xa, 0xffffffffffffffff) getsockopt$SO_PEERCRED(r6, 0xffff, 0x11, &(0x7f0000001140), 0x325) r10 = semget$private(0x0, 0x7, 0x0) semop(r10, &(0x7f0000000240), 0x0) semop(r10, &(0x7f0000000240), 0x6) semctl$SETVAL(r10, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r8, 0x0, 0x1, &(0x7f0000000080)={{0x7fffff, r7, 0xffffffffffffffff, 0x0, r11}, 0x100000000000000}) getgroups(0x2, &(0x7f0000000100)=[r11, 0xffffffffffffffff]) fchown(r2, r4, r12) 20:23:15 executing program 4: clock_getres(0x40000000, &(0x7f0000000080)) open(&(0x7f0000000040)='./file0\x00', 0x2070e, 0x0) munmap(&(0x7f0000109000/0x3000)=nil, 0x3000) r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0xb0041, 0x0) writev(r0, &(0x7f0000000000)=[{&(0x7f0000000380)="ef17008e6d769584bd1613ccd8c4db241430ac1580e18f913c32a2bc19cbba77753fd1dffb63e455b5bc5c1ee1fa68496d5f1dfdc9d8e87d749053ebb3000e03483040ce45ed6dceb67ed93c43b3e8365ebe3bb5f7702b2d375da584d17372de44d1470bd99926b3a18cd1321e3620eaa2a3ea11db7478831814ebaf62b46cd83a6cd0ffb01fa14dd78605783671c2299e4038cf77a800f99fe2b69a766c01f1e956415d0dc55e96aec535de25c45dfc4a5914682c26fbf09a693ad4f297dfb12195c1ffeff5", 0xfe92}], 0x1) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x80) mknod$loop(&(0x7f0000000140)='./file1\x00', 0x6000, 0x0) 20:23:15 executing program 0: mlock(&(0x7f0000001000/0x2000)=nil, 0x800000) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xb, 0x1c11, 0xffffffffffffffff, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r0, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffff9c, r0) fchroot(r1) 20:23:15 executing program 1: socket(0x0, 0x0, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) pwritev(r0, &(0x7f0000000140)=[{&(0x7f00000004c0)="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", 0x188}], 0x1, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) chmod(&(0x7f0000000000)='./file0\x00', 0x9a) rename(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000006c2, 0x0) 20:23:15 executing program 2: r0 = socket(0x18, 0x3, 0x0) r1 = socket(0x18, 0x10000000, 0x0) connect$unix(r1, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) dup2(r1, r0) fchdir(r0) listen(r0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r2, 0xa, 0xffffffffffffffff) accept(r2, &(0x7f0000000000)=@in, &(0x7f0000000040)=0xc) 20:23:15 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) accept$inet(0xffffffffffffffff, &(0x7f0000000040), &(0x7f0000000080)=0xc) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:15 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x2070e, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2020231, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)="92", 0x1}], 0x1) utimes(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)={{0x8001, 0x6bf}, {0x41, 0x1}}) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0, 0x0) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) writev(r2, &(0x7f0000000340), 0x0) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x6) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000080)=""/105) [ 44.1566290] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 563 command syz-executor.1) 20:23:15 executing program 4: r0 = __clone(0x0, &(0x7f0000001f00)="eac68242c44a9cadb81ba372c9838633b76e967e135fe393feed261318704ad8") r1 = socket(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r2, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r4 = semget$private(0x0, 0x7, 0x0) semop(r4, &(0x7f0000000240), 0x0) semop(r4, &(0x7f0000000240), 0x6) semctl$SETVAL(r4, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r4, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r5, r3, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) r6 = getuid() setuid(r6) r7 = semget$private(0x0, 0x4, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r8, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r10 = semget$private(0x0, 0x7, 0x0) semop(r10, &(0x7f0000000240), 0x0) semop(r10, &(0x7f0000000240), 0x6) semctl$SETVAL(r10, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r10, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r11, r9, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) semctl$IPC_SET(r7, 0x0, 0x1, &(0x7f0000000080)={{0x7fffff, r6, 0xffffffffffffffff, 0x0, r11}, 0x100000000000000}) setsockopt$sock_cred(r1, 0xffff, 0x11, &(0x7f00000010c0)={0x0, r3, r11}, 0xc) wait4(r0, &(0x7f0000001040), 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getgid() r13 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r13, 0x0, 0xfffffffffffffd8f, 0x0, &(0x7f0000e68000)={0x2, 0x0}, 0x0) r14 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r14, 0x0, 0xfffffffffffffd8f, 0x0, &(0x7f0000e68000)={0x2, 0x0}, 0x0) fcntl$dupfd(r13, 0xc, r14) sendmsg$unix(r12, &(0x7f0000000240)={0x0, 0x3d4, &(0x7f0000000340), 0x37f, 0x0, 0xfffffffffffffd57}, 0x0) r15 = msgget$private(0x0, 0x0) msgrcv(r15, &(0x7f0000000000)={0x0, ""/4096}, 0x1008, 0x3, 0x0) msgsnd(r15, &(0x7f0000001080)=ANY=[@ANYBLOB="0100000000000000e386bda0079dfb98d22b6923c61a38faa10a4d9cdca3470f0cef24dbb70002ec2fc141959100"/60], 0x31, 0x800) msgrcv(r15, &(0x7f00000000c0)={0x0, ""/84}, 0x5c, 0x1, 0x800) 20:23:15 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x7) ptrace(0x9, 0x0, 0x0, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1000, &(0x7f0000000180), 0x1) wait4(0x0, 0x0, 0x0, 0x0) ptrace(0xd, 0x0, &(0x7f0000000000), 0x8) getpgid(0x0) shmat(0x0, &(0x7f0000001000/0x2000)=nil, 0x0) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1004, &(0x7f0000000100)=0x10004, 0x4) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000200), 0xc) ptrace(0x9, 0x0, 0x0, 0x400000020000000) getpgid(0x0) getuid() r0 = __clone(0x0, 0x0) ptrace(0x9, r0, 0x0, 0x400000020000000) getegid() __clone(0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt(r1, 0x0, 0x4, &(0x7f0000000080)=""/66, &(0x7f0000000140)=0x42) getuid() 20:23:15 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:15 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:15 executing program 5: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:16 executing program 5: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:16 executing program 5: setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) [ 44.7467074] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 374 command syz-executor.3) [ 44.9367391] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 374 command syz-executor.3) 20:23:16 executing program 0: open$dir(&(0x7f0000000000)='./file0\x00', 0x4c0700, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c2, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x55ad85fd40ecec69, 0x410, r1, 0x0, 0xfffffffffffffffc) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0, 0x0) madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r2, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000080)='./file0\x00') 20:23:16 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) [ 45.1667661] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 739 command syz-executor.0) 20:23:16 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket(0x1f, 0x3, 0x0) listen(r2, 0x0) getsockopt$sock_cred(r2, 0xffff, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000300)=0xc) r4 = __clone(0x0, 0x0) ptrace(0x9, r4, 0x0, 0x400000020000000) r5 = getpgid(r4) r6 = shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) shmat(r6, &(0x7f0000001000/0x2000)=nil, 0x0) r7 = socket(0x2, 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r7, r8) getsockname$unix(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000100000000000000000000900"/56], &(0x7f0000000040)=0x38) getsockopt$sock_cred(r0, 0xffff, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000380)=0xc) r10 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r10, 0xffff, 0x1004, &(0x7f0000000100)=0x10004, 0x4) getsockopt$SO_PEERCRED(r10, 0xffff, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0xc) r12 = getuid() r13 = __clone(0x0, 0x0) ptrace(0x9, r13, 0x0, 0x400000020000000) r14 = getpgid(r13) r15 = shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) shmat(r15, &(0x7f0000001000/0x2000)=nil, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r17 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r17, 0xffff, 0x1004, &(0x7f0000000100)=0x10004, 0x4) getsockopt$SO_PEERCRED(r17, 0xffff, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x1) r19 = getuid() setreuid(0x0, r19) r20 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) shmctl$IPC_SET(r15, 0x1, &(0x7f00000002c0)={{0x0, r16, r18, r19, r20, 0xa0, 0x1f}, 0x2, 0x7fff, r14, r21, 0x1000, 0x8, 0x5}) setreuid(0x0, r19) r22 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) shmctl$IPC_SET(r6, 0x1, &(0x7f00000002c0)={{0x0, r9, r11, r12, r22, 0xa0, 0x1f}, 0x2, 0x7fff, r5, r23, 0x1000, 0x8, 0x5}) fchown(r0, r3, r11) readv(0xffffffffffffffff, &(0x7f0000002a80)=[{&(0x7f0000001680)=""/230, 0xe6}], 0x1) readv(r0, &(0x7f00000006c0), 0x325) writev(r1, &(0x7f0000001980)=[{&(0x7f0000001c00)="b426652889b178ebce91f988753e32ee65525659197452117a5d2e962fc3608386fdb450862af17c3dcaf2915a4dd93bd6511cbc9c8eaba240e3552a13f588442d8d86f43f6698bab04a9dd0503a28ee335547ff56d057ee9bd5377565bf8d35f5dff40081979e93c4cbbe6a0c73313e0797c044a695f619908341e1988996ddd4c642f8320484605a4a2a081a9b907cc1d63fc29d83b86a44395d7a35288ca69487fc6b50518510c94174ef5838474a0d8747a8b8f4adfcecb58315a07b4cf827011a8fe65afa7a30a2527acde3cfee5907eb37cb922de747cf6acf7a5f375e5807d1145b6a7c", 0xfffffee9}], 0x1) r24 = open(&(0x7f0000000180)='./file1\x00', 0x60e, 0x4) pwritev(r24, &(0x7f0000000000)=[{&(0x7f00000001c0)="f6c8aa26b6d3f750c44255e21cdbf5d9ff41398bab84937a896aa9c0d574dd6da7aeb2711eac09a8c305a545bc8eb988c4c2c226e85feec434405a5a70de00026463fc95d80afd578bbd3a958fc73e9b3eaf7205a9dfa59a9469a186f3be373ff9daba9d805db5ac9c4dccf0d65135230d97e75e6618b9df05eea7b0ed4309d3f2a78ed6c305a987a7cd523c1c64972793eb693e7c17f0acf8b09563ee68d29e944c1884e04672345071187a7517f041b53e9572c89d0b", 0xb7}, {&(0x7f0000000400)="23e0f32107104cdddc39acc4942e8fc6667b843823fad92ca0f1cbd5d46aa918f87b3af926180b1f2c831a3f7e46e24252f36d1eed8198acfc66ea75a3fc1c2d3778eec491cf829e5d91a20742d9f143698977a5c77549986ad511d3821729bc27bc7caf276ba13a52d2a7ed909b42eaebbda17985f5c0800b2a80011d164b3984dbc2331987f0812952150b3821abdaddecde418fd74df344bc2a5b1d97b794b226ed1738b419853fe1629a7fcb9383ee661f2b99b5705600fca8d28920d68cb7ac5c5ab2c709659fc6b0d519e4b446939cb5c585aaf76bfe97313a64acdfccb67f9410bf6ffba321", 0xe9}], 0x2, 0x6) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r24, 0x0, 0x0) r25 = msgget$private(0x0, 0x0) msgsnd(r25, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000000000073dbcae665b0c012223a88f5c8a150f421a7ee5aea13f44d3bfaed553a692ba516b53f363fdd4dca2f18880e98c06d9ec43195fa04abbecce9c9dadfe83b5e4a96023a1c40ec39839ceb1446fb55d4dfed9b934a16f0e2f933db8cc39520ba64e7e2f5343eb67daa6fb151a5086e627fcf193182dea60379ac59084f755dc57a6dae19f37c1b73d165373b7827e2202aef51abd7f9e1a7ee613f2100c05665ba29e305238e49be842fb7c6c5e1c43c5e421c14293bbe79e189f58d5b97c4394e35838d455a6b583452af6df553be0c0bcf3c7a07cb6d77d5c1a4dd41e7403033dcd675d5d940cac0000000000"], 0xf5, 0x800) 20:23:16 executing program 2: select(0x0, 0x0, &(0x7f0000000040), 0x0, &(0x7f00000000c0)={0x0, 0x2710}) mlockall(0x1) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0}, 0xc) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) getsockopt$sock_cred(r1, 0xffff, 0x11, &(0x7f0000000100)={0x0, 0x0, 0x0}, &(0x7f0000000140)=0xc) chown(&(0x7f0000000000)='./file0\x00', r0, r2) vfork() 20:23:16 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:16 executing program 4: r0 = __clone(0x0, &(0x7f0000001f00)="eac68242c44a9cadb81ba372c9838633b76e967e135fe393feed261318704ad8") r1 = socket(0x2, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r2, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r4 = semget$private(0x0, 0x7, 0x0) semop(r4, &(0x7f0000000240), 0x0) semop(r4, &(0x7f0000000240), 0x6) semctl$SETVAL(r4, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r4, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r4, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r5, r3, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) r6 = getuid() setuid(r6) r7 = semget$private(0x0, 0x4, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r8, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r10 = semget$private(0x0, 0x7, 0x0) semop(r10, &(0x7f0000000240), 0x0) semop(r10, &(0x7f0000000240), 0x6) semctl$SETVAL(r10, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r10, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r10, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r11, r9, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) semctl$IPC_SET(r7, 0x0, 0x1, &(0x7f0000000080)={{0x7fffff, r6, 0xffffffffffffffff, 0x0, r11}, 0x100000000000000}) setsockopt$sock_cred(r1, 0xffff, 0x11, &(0x7f00000010c0)={0x0, r3, r11}, 0xc) wait4(r0, &(0x7f0000001040), 0x40, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getgid() r13 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r13, 0x0, 0xfffffffffffffd8f, 0x0, &(0x7f0000e68000)={0x2, 0x0}, 0x0) r14 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r14, 0x0, 0xfffffffffffffd8f, 0x0, &(0x7f0000e68000)={0x2, 0x0}, 0x0) fcntl$dupfd(r13, 0xc, r14) sendmsg$unix(r12, &(0x7f0000000240)={0x0, 0x3d4, &(0x7f0000000340), 0x37f, 0x0, 0xfffffffffffffd57}, 0x0) r15 = msgget$private(0x0, 0x0) msgrcv(r15, &(0x7f0000000000)={0x0, ""/4096}, 0x1008, 0x3, 0x0) msgsnd(r15, &(0x7f0000001080)=ANY=[@ANYBLOB="0100000000000000e386bda0079dfb98d22b6923c61a38faa10a4d9cdca3470f0cef24dbb70002ec2fc141959100"/60], 0x31, 0x800) msgrcv(r15, &(0x7f00000000c0)={0x0, ""/84}, 0x5c, 0x1, 0x800) [ 45.5668290] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 842 command syz-executor.3) 20:23:17 executing program 1: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x1f}}, 0x0) 20:23:17 executing program 5: r0 = socket$inet(0x2, 0x0, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:17 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000, 0x0) execve(&(0x7f0000000840)='./file0\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r0, 0x0, 0x0, 0x0) faccessat(r0, &(0x7f0000000040)='./file0\x00', 0xc0, 0x0) 20:23:17 executing program 5: socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) [ 45.6768423] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 739 command syz-executor.0) 20:23:17 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0}, 0xc) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r1 = socket(0x2, 0x1, 0x0) bind(r1, &(0x7f0000000100)=@in6={0x18, 0x1, 0x2, 0x8}, 0x1e8) r2 = dup(r1) listen(r2, 0x0) r3 = socket(0x2, 0x1, 0x0) connect$unix(r3, &(0x7f0000000000)=@file={0x0, './file0\x00'}, 0x10) shutdown(r3, 0x2) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) 20:23:17 executing program 5: socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:23:17 executing program 1: open$dir(&(0x7f0000000000)='./file0\x00', 0x4c0700, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x48002, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0, 0x0) r2 = open$dir(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) preadv(r2, &(0x7f0000000040), 0x100000000000017c, 0x0) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x2) pread(r3, 0x0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r4, 0xa, 0xffffffffffffffff) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r5, 0xa, 0xffffffffffffffff) getsockopt$sock_cred(r5, 0xffff, 0x11, &(0x7f00000002c0)={0x0}, &(0x7f0000000300)=0xc) r7 = getuid() setuid(r7) r8 = semget$private(0x0, 0x4, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r9, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r11 = semget$private(0x0, 0x7, 0x0) semop(r11, &(0x7f0000000240), 0x0) semop(r11, &(0x7f0000000240), 0x6) semctl$SETVAL(r11, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r11, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r11, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r12, r10, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) semctl$IPC_SET(r8, 0x0, 0x1, &(0x7f0000000080)={{0x7fffff, r7, 0xffffffffffffffff, 0x0, r12}, 0x100000000000000}) r13 = getegid() setsockopt$sock_cred(r4, 0xffff, 0x11, &(0x7f0000000440)={r6, r7, r13}, 0xc) writev(r3, &(0x7f0000000140)=[{&(0x7f00000001c0)="9c06f9ae6d8448b64e14ed2ab12953a84e1f946d0e80ba650ab07c260bd002b077187883669a45dd5c141448cc813ec0b3d41351229dfe6716a27c63513ef65a7109699d8e6b3455b6a6517eec15c004590f8a4fb5657bbd52b0ecbbc5d1f4264c102f550fd5abdaea38ca4bd44691b558a93c54d19157ab0ad153d300e82b8a200db5b78d7101adfec28ed400b51529058ef431455f3954ba435e278aebc66fe9c0a00fd214e23b12460cd7fef72a63ce5e2033b071fd44132f291ea7b541f7f10a961fbeaa35f464886d07241292fdacd0", 0xd2}, {&(0x7f0000000040)="1a1b394ca3dc5a287761c4573c454eed57cf84dc43103a7192ad082fba629ccc633a7c95348e0c7bb7699ba56ec40ed051bf14e79264256d3d946a24230679aeabb91796d650f06ea07e74d66de7b08c2d9b1b6c37ddcd1de3b8ccb73f0650ef5ca864a9986e4f801910067f01238eacb57516e2be01779e57a0e8dec4fcb93aa77d75480b9f", 0x86}, {&(0x7f0000000380)="b8277f366642de7853028cc7d74a54fa55d1efb23df063c704473b9b6ac474175c12ebe5ca3475d528fed0fffe1187af5c5e1fad41473852476a537e59891bac67f6e47ca5698bac6294ce3243e7d87198cf6750ab7e140541c95ece96a2198a97011a472463202c7b7ded0be16d892edf350b61d414a03ce2bfba97e2ade738f788cceef690450c844edf7bdb78a2ea", 0x90}], 0x3) 20:23:17 executing program 0: semop(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r0, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r2 = semget$private(0x0, 0x7, 0x0) semop(r2, &(0x7f0000000240), 0x0) semop(r2, &(0x7f0000000240), 0x6) semctl$SETVAL(r2, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r2, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r3, r1, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) r4 = getuid() setuid(r4) r5 = semget$private(0x0, 0x4, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r6, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r8 = semget$private(0x0, 0x7, 0x0) semop(r8, &(0x7f0000000240), 0x0) semop(r8, &(0x7f0000000240), 0x6) semctl$SETVAL(r8, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r8, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r8, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r9, r7, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) semctl$IPC_SET(r5, 0x0, 0x1, &(0x7f0000000080)={{0x7fffff, r4, 0xffffffffffffffff, 0x0, r9}, 0x100000000000000}) r10 = getuid() setuid(r10) r11 = semget$private(0x0, 0x4, 0x800) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$SO_PEERCRED(r12, 0xffff, 0x11, &(0x7f0000001140)={0x0, 0x0}, 0xfffffffffffffdf4) r14 = semget$private(0x0, 0x7, 0x0) semop(r14, &(0x7f0000000240), 0x0) semop(r14, &(0x7f0000000240), 0x6) semctl$SETVAL(r14, 0x0, 0x8, &(0x7f0000000000)=0x1) semctl$IPC_RMID(r14, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f0000000180)=0xc) semctl$IPC_SET(r14, 0x0, 0x1, &(0x7f0000000300)={{0x9, 0x0, r15, r13, 0x0, 0x9, 0xb}, 0x8, 0x2, 0xe97}) semctl$IPC_SET(r11, 0x0, 0x1, &(0x7f0000000080)={{0x7fffff, r10, 0xffffffffffffffff, 0x0, r15}, 0x100000000000000}) semctl$IPC_SET(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)={{0x67, r1, r9, 0xffffffffffffffff, r15, 0x42, 0x7}, 0x6, 0x7910, 0x4}) 20:23:17 executing program 3: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = socket(0x1f, 0x3, 0x0) listen(r2, 0x0) getsockopt$sock_cred(r2, 0xffff, 0x11, &(0x7f0000000280)={0x0, 0x0}, &(0x7f0000000300)=0xc) r4 = __clone(0x0, 0x0) ptrace(0x9, r4, 0x0, 0x400000020000000) r5 = getpgid(r4) r6 = shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) shmat(r6, &(0x7f0000001000/0x2000)=nil, 0x0) r7 = socket(0x2, 0x2, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup2(r7, r8) getsockname$unix(r8, &(0x7f0000000000)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000100000000000000000000900"/56], &(0x7f0000000040)=0x38) getsockopt$sock_cred(r0, 0xffff, 0x11, &(0x7f0000000140)={0x0, 0x0}, &(0x7f0000000380)=0xc) r10 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r10, 0xffff, 0x1004, &(0x7f0000000100)=0x10004, 0x4) getsockopt$SO_PEERCRED(r10, 0xffff, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0xc) r12 = getuid() r13 = __clone(0x0, 0x0) ptrace(0x9, r13, 0x0, 0x400000020000000) r14 = getpgid(r13) r15 = shmget(0xffffffffffffffff, 0x2000, 0x0, &(0x7f0000000000/0x2000)=nil) shmat(r15, &(0x7f0000001000/0x2000)=nil, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x11, &(0x7f0000000180)={0x0, 0x0}, &(0x7f00000001c0)=0xc) r17 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r17, 0xffff, 0x1004, &(0x7f0000000100)=0x10004, 0x4) getsockopt$SO_PEERCRED(r17, 0xffff, 0x11, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x1) r19 = getuid() setreuid(0x0, r19) r20 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) shmctl$IPC_SET(r15, 0x1, &(0x7f00000002c0)={{0x0, r16, r18, r19, r20, 0xa0, 0x1f}, 0x2, 0x7fff, r14, r21, 0x1000, 0x8, 0x5}) setreuid(0x0, r19) r22 = getegid() getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) shmctl$IPC_SET(r6, 0x1, &(0x7f00000002c0)={{0x0, r9, r11, r12, r22, 0xa0, 0x1f}, 0x2, 0x7fff, r5, r23, 0x1000, 0x8, 0x5}) fchown(r0, r3, r11) readv(0xffffffffffffffff, &(0x7f0000002a80)=[{&(0x7f0000001680)=""/230, 0xe6}], 0x1) readv(r0, &(0x7f00000006c0), 0x325) writev(r1, &(0x7f0000001980)=[{&(0x7f0000001c00)="b426652889b178ebce91f988753e32ee65525659197452117a5d2e962fc3608386fdb450862af17c3dcaf2915a4dd93bd6511cbc9c8eaba240e3552a13f588442d8d86f43f6698bab04a9dd0503a28ee335547ff56d057ee9bd5377565bf8d35f5dff40081979e93c4cbbe6a0c73313e0797c044a695f619908341e1988996ddd4c642f8320484605a4a2a081a9b907cc1d63fc29d83b86a44395d7a35288ca69487fc6b50518510c94174ef5838474a0d8747a8b8f4adfcecb58315a07b4cf827011a8fe65afa7a30a2527acde3cfee5907eb37cb922de747cf6acf7a5f375e5807d1145b6a7c", 0xfffffee9}], 0x1) r24 = open(&(0x7f0000000180)='./file1\x00', 0x60e, 0x4) pwritev(r24, &(0x7f0000000000)=[{&(0x7f00000001c0)="f6c8aa26b6d3f750c44255e21cdbf5d9ff41398bab84937a896aa9c0d574dd6da7aeb2711eac09a8c305a545bc8eb988c4c2c226e85feec434405a5a70de00026463fc95d80afd578bbd3a958fc73e9b3eaf7205a9dfa59a9469a186f3be373ff9daba9d805db5ac9c4dccf0d65135230d97e75e6618b9df05eea7b0ed4309d3f2a78ed6c305a987a7cd523c1c64972793eb693e7c17f0acf8b09563ee68d29e944c1884e04672345071187a7517f041b53e9572c89d0b", 0xb7}, {&(0x7f0000000400)="23e0f32107104cdddc39acc4942e8fc6667b843823fad92ca0f1cbd5d46aa918f87b3af926180b1f2c831a3f7e46e24252f36d1eed8198acfc66ea75a3fc1c2d3778eec491cf829e5d91a20742d9f143698977a5c77549986ad511d3821729bc27bc7caf276ba13a52d2a7ed909b42eaebbda17985f5c0800b2a80011d164b3984dbc2331987f0812952150b3821abdaddecde418fd74df344bc2a5b1d97b794b226ed1738b419853fe1629a7fcb9383ee661f2b99b5705600fca8d28920d68cb7ac5c5ab2c709659fc6b0d519e4b446939cb5c585aaf76bfe97313a64acdfccb67f9410bf6ffba321", 0xe9}], 0x2, 0x6) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r24, 0x0, 0x0) r25 = msgget$private(0x0, 0x0) msgsnd(r25, &(0x7f0000000040)=ANY=[@ANYBLOB="0100000000000000073dbcae665b0c012223a88f5c8a150f421a7ee5aea13f44d3bfaed553a692ba516b53f363fdd4dca2f18880e98c06d9ec43195fa04abbecce9c9dadfe83b5e4a96023a1c40ec39839ceb1446fb55d4dfed9b934a16f0e2f933db8cc39520ba64e7e2f5343eb67daa6fb151a5086e627fcf193182dea60379ac59084f755dc57a6dae19f37c1b73d165373b7827e2202aef51abd7f9e1a7ee613f2100c05665ba29e305238e49be842fb7c6c5e1c43c5e421c14293bbe79e189f58d5b97c4394e35838d455a6b583452af6df553be0c0bcf3c7a07cb6d77d5c1a4dd41e7403033dcd675d5d940cac0000000000"], 0xf5, 0x800) [ 46.2169192] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 559 command syz-executor.1) [ 46.2269193] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 842 command syz-executor.3) [ 46.3069346] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 559 command syz-executor.1) [ 46.5269622] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 338 command syz-executor.3) 20:24:16 executing program 2: 20:24:16 executing program 0: r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r0, 0x0, 0x0, 0x0) fcntl$getflags(r0, 0x3) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000000c0)="071400000f370025ff", 0x9) r1 = socket(0x18, 0x2, 0x0) connect$unix(r1, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) socket$inet6(0x18, 0x5, 0x1f) r2 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r2, 0x0, 0x0, 0x0) r3 = open$dir(&(0x7f0000000100)='./file0\x00', 0x400c1, 0x10a) renameat(r2, &(0x7f0000000080)='./file0\x00', r3, &(0x7f0000000140)='./file0\x00') pipe(&(0x7f0000000280)={0xffffffffffffffff}) msgctl$IPC_RMID(0xffffffffffffffff, 0x0) write(0xffffffffffffffff, &(0x7f0000000180)="097a0ae019502a88e68495ff9d193e24cf67e7ec64523db6d9f6db52fb5e342689085943d5a8f9d0acab87ef0a45bb4d12633905f15030447ee5ab0fd4185549697c04aef3cd2408d99cb8c80f8127a0c9695a7a3e9d400a704bc804b5f50f90844d282d2296f44a33d17c447cb2437fc94d90aefa58ba107a7809527e4ef51b9cd654018472d4a81509e1b2352e3a38d6bd8cd2939a2e2926918832e60f51de5b040b91d3e4d1f56abdc6e4da1d9e", 0xaf) socket$inet(0x2, 0x40000000, 0x1f) fcntl$dupfd(r4, 0xa, 0xffffffffffffffff) getsockname(r4, &(0x7f0000000000)=@in6, &(0x7f0000000040)=0xc) 20:24:16 executing program 5: socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x200000000000d, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:24:16 executing program 1: madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r0, 0x0, 0x0, 0x0) mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x4, 0xa11, r0, 0x0, 0x2) 20:24:16 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x201, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r1, 0x0, 0x0, 0x0) r2 = __clone(0x0, 0x0) r3 = __clone(0x0, 0x0) ptrace(0x9, r3, 0x0, 0x0) ptrace(0x5, r3, &(0x7f0000001180), 0x0) ptrace(0x9, r3, 0x0, 0x9) ptrace(0x5, r2, &(0x7f0000001180), 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6000, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') setsockopt$sock_int(r0, 0xffff, 0x80, &(0x7f0000000240)=0x6, 0x4) r4 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r4, 0x0, 0x0, 0x0) r5 = __clone(0x0, 0x0) ptrace(0x9, r5, 0x0, 0x0) ptrace(0x5, r5, &(0x7f0000001180), 0x0) r6 = posix_spawn(r2, &(0x7f0000000000)='.-.$^,/\x00', &(0x7f0000000080)={0x9, 0x0, &(0x7f0000000040)=@dup={0x1, r4, {0x2}}}, &(0x7f0000000140)={0x20, r5, {0x800}, 0xf9, {[0x7a, 0x3, 0x80000000, 0x556]}, {[0x2, 0x2, 0x2, 0x80000001]}}, &(0x7f0000000180)=['/![\x00', '$)(@-.\x00', '%\x00', '&)\x00'], &(0x7f00000001c0)=['\x00', '-\x00', '(\x00']) fcntl$lock(r1, 0x0, &(0x7f0000000200)={0x3, 0x0, 0x31, 0xfff, r6}) fcntl$lock(r0, 0x7, &(0x7f0000000280)) 20:24:16 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x110602, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r0, 0xa, 0xffffffffffffffff) getsockname(r0, &(0x7f0000000040)=@in, &(0x7f00000000c0)=0xc) open$dir(&(0x7f0000000100)='./file0\x00', 0x1, 0x1) fchownat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0xffffffffffffffff, 0xffffffffffffffff, 0x200) 20:24:17 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:24:17 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:24:17 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x0, &(0x7f0000000000)="ea00005c00000001", 0x8) 20:24:17 executing program 1: 20:24:17 executing program 4: 20:24:17 executing program 0: semctl$SETVAL(0x0, 0xbb7ad47da3a70bbf, 0x10, 0x0) 20:24:18 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) r1 = socket(0x2, 0x1000000008002, 0x0) connect$unix(r1, &(0x7f0000001100)=ANY=[@ANYBLOB="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"/2115], 0x10) dup2(r1, r0) r2 = dup(r0) sendto$inet6(r2, 0x0, 0x0, 0x0, 0x0, 0x0) 20:24:18 executing program 2: setuid(0xee01) setgroups(0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) sendto(r1, &(0x7f0000000340)="a65fac65deffcdd6b12a1ccb0a49b80bc81dcd2c7fb0", 0x16, 0x3, &(0x7f0000000380)=@in={0x2, 0x0}, 0xc) pread(r0, 0x0, 0x1e9, 0x1) open$dir(&(0x7f00000003c0)='./file0\x00', 0xc20683, 0x80) pwritev(r0, &(0x7f00000002c0)=[{&(0x7f0000000000)="8c64507dd9b0247f3e2b18061132c9e4d32354491b473e2829cf428d6c2e0fa182ab1f257d33a5bebfa061afbc2ad6", 0x2f}, {&(0x7f0000000040)="158b6a32e5c7185fd09c9e9b097f931894", 0x11}, {&(0x7f0000000080)="aaac076d35ff7f3b64ed3dc41980a0e32434cde4c054eebd1ac3409bfa1d0b44676cd4", 0x23}, {&(0x7f00000000c0)="dc4449a33b12122caf3bcb1657f6d4bc4b0049dae07ddd751ca7a355d743bb43e7ff78c9", 0xc}, {&(0x7f0000000400)="67d28355408783528de135367eae8f1e711412ed8601208dd4b3125b75a10935876079166775a0b09d6cfa651f6a11a43ffd7b6e15a1ee3a4ebfb080cb0201c32e6ff408cb44bc59e909d47eb3c388ff9d930905a37ff6ddd83332673579d8c6662bf15ad9f44527fff1c5668083206c0a0db78b95a4b5b91aef19a03732fcd964d500"/143, 0x8f}, {&(0x7f0000000180)="fc1c99a73784a5ca23ed47937d61d5c924a78f6bc439c67e315b2b4477c34da2e7327653b2ffad5718660c12c30a358567b8868a6e6d6a5ca699", 0x3a}, {&(0x7f00000001c0)="1536dbc73ac731642ca976addb3a1f29803906b5c0c2d7ec850afaf173b85401028a49ccaeeb5f99ef3be26a47a1cc2f8157c8372ce3cda13bd34fc80524b9a60783d666f06d540b42822a", 0x4b}, {&(0x7f0000000280)="c36ff5a350caae100fa6813ab0c252b46805045d7be4c1fde719051d85c04cdb78a4bce1b286f7c3b4c30795a077f39ea08d91a3c4647fc96057eec5d973d6", 0x3f}], 0x8, 0x800) 20:24:18 executing program 1: open(&(0x7f00000000c0)='./file0\x00', 0x201, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r1, 0x0, 0x0, 0x0) r2 = __clone(0x0, 0x0) r3 = __clone(0x0, 0x0) ptrace(0x9, r3, 0x0, 0x0) ptrace(0x5, r3, &(0x7f0000001180), 0x0) ptrace(0x9, r3, 0x0, 0x9) ptrace(0x5, r2, &(0x7f0000001180), 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6000, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') setsockopt$sock_int(r0, 0xffff, 0x80, &(0x7f0000000240)=0x6, 0x4) r4 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r4, 0x0, 0x0, 0x0) r5 = __clone(0x0, 0x0) ptrace(0x9, r5, 0x0, 0x0) ptrace(0x5, r5, &(0x7f0000001180), 0x0) r6 = posix_spawn(r2, &(0x7f0000000000)='.-.$^,/\x00', &(0x7f0000000080)={0x9, 0x0, &(0x7f0000000040)=@dup={0x1, r4, {0x2}}}, &(0x7f0000000140)={0x20, r5, {0x800}, 0xf9, {[0x7a, 0x3, 0x80000000, 0x556]}, {[0x2, 0x2, 0x2, 0x80000001]}}, &(0x7f0000000180)=['/![\x00', '$)(@-.\x00', '%\x00', '&)\x00'], &(0x7f00000001c0)=['\x00', '-\x00', '(\x00']) fcntl$lock(r1, 0x0, &(0x7f0000000200)={0x3, 0x0, 0x31, 0xfff, r6}) fcntl$lock(r0, 0x7, &(0x7f0000000280)) 20:24:18 executing program 3: open(&(0x7f00000000c0)='./file0\x00', 0x201, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r1, 0x0, 0x0, 0x0) r2 = __clone(0x0, 0x0) r3 = __clone(0x0, 0x0) ptrace(0x9, r3, 0x0, 0x0) ptrace(0x5, r3, &(0x7f0000001180), 0x0) ptrace(0x9, r3, 0x0, 0x9) ptrace(0x5, r2, &(0x7f0000001180), 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x6000, 0xffffffffffffffff) link(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00') setsockopt$sock_int(r0, 0xffff, 0x80, &(0x7f0000000240)=0x6, 0x4) r4 = open$dir(&(0x7f0000000000)='./file0\x00', 0x2088611, 0x0) pread(r4, 0x0, 0x0, 0x0) r5 = __clone(0x0, 0x0) ptrace(0x9, r5, 0x0, 0x0) ptrace(0x5, r5, &(0x7f0000001180), 0x0) r6 = posix_spawn(r2, &(0x7f0000000000)='.-.$^,/\x00', &(0x7f0000000080)={0x9, 0x0, &(0x7f0000000040)=@dup={0x1, r4, {0x2}}}, &(0x7f0000000140)={0x20, r5, {0x800}, 0xf9, {[0x7a, 0x3, 0x80000000, 0x556]}, {[0x2, 0x2, 0x2, 0x80000001]}}, &(0x7f0000000180)=['/![\x00', '$)(@-.\x00', '%\x00', '&)\x00'], &(0x7f00000001c0)=['\x00', '-\x00', '(\x00']) fcntl$lock(r1, 0x0, &(0x7f0000000200)={0x3, 0x0, 0x31, 0xfff, r6}) fcntl$lock(r0, 0x7, &(0x7f0000000280)) 20:24:18 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, 0x0, 0x0) 20:24:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f00000006c0)) 20:24:19 executing program 4: socketpair(0x1, 0x20000000, 0xfc, 0x0) r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000040)=0xc) connect$inet6(r0, &(0x7f0000000080)={0x18, 0x3, 0x4, 0xd8}, 0xc) 20:24:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, 0x0, 0x0) 20:24:19 executing program 0: madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0) madvise(&(0x7f0000003000/0x2000)=nil, 0x2000, 0x0) r0 = open$dir(&(0x7f0000001240)='./file0\x00', 0x42000400000002c1, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r1, 0xa, 0xffffffffffffffff) accept(r1, &(0x7f0000000000)=@in6, &(0x7f0000000040)=0xc) pwritev(r0, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0) 20:24:19 executing program 4: pipe(&(0x7f0000000440)={0xffffffffffffffff}) fcntl$dupfd(r0, 0xa, r0) r1 = accept$unix(r0, &(0x7f0000000100)=@file={0x0, ""/108}, &(0x7f0000000180)=0x6e) connect$unix(0xffffffffffffffff, &(0x7f0000000200)=@abs={0x1, 0x0, 0x1}, 0x8) socketpair(0x10, 0x5, 0x7, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) fchmod(r2, 0x108) getsockopt$SO_PEERCRED(r1, 0xffff, 0x11, &(0x7f00000001c0), 0xc) mkdir(&(0x7f0000000040)='./file0\x00', 0x18) link(&(0x7f0000000080)='./file0\x00', 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) rmdir(&(0x7f00000000c0)='./file0\x00') fcntl$dupfd(r3, 0xa, 0xffffffffffffffff) r4 = paccept(r3, 0x0, &(0x7f0000000000), 0x10000000) connect(r4, &(0x7f00000002c0)=ANY=[@ANYBLOB="00002e2f66696c6530004c13526c3bc4a51d8fb42c6092b91e7bab4b8a3cfb4fe26148eb8163348e2cf3548fbbe27eb807ef8600b95d49d3ea7f10a2ccc84ab6e13e2df4533c4decec0809bfbb155d081f325ce868f65ab8ddf208826b94c5bf3689250e4b2907882b4862e9fe382d4df4ba11293adc71ac23fa650a03debb254bef08031d48fb794d87f6a5a924d4864518892630d038acf5f74407b56fedbcf6b6ace6853d651e9f14cafe244477982224c995d54e6d849eab73fe832b0cbfd2a34aa31f7ac6b706bee5b9110e"], 0xa) r5 = socket$unix(0x1, 0x1, 0x0) fchmod(r5, 0x5) 20:24:19 executing program 5: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, 0x0, 0x0) 20:24:19 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x2070e, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x2020231, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000380)="92", 0x1}], 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2, 0x10, r0, 0x0, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) fcntl$dupfd(r2, 0xa, 0xffffffffffffffff) setsockopt$sock_linger(r2, 0xffff, 0x80, &(0x7f0000000140)={0x6, 0x1b97}, 0x8) r3 = open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) writev(r3, &(0x7f0000000340)=[{&(0x7f0000000180), 0x81700}], 0x1000000000000013) madvise(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x6) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000080)=""/105) [ 108.5058600] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 623 command syz-executor.0) [ 108.7259003] WARNING: defaulted mmap() share type to MAP_PRIVATE (pid 623 command syz-executor.0) [ 108.8058953] panic: kernel diagnostic assertion "pg->offset >= nextoff" failed: file "/syzkaller/managers/netbsd-kubsan/kernel/sys/miscfs/genfs/genfs_io.c", line 972 [ 108.8221599] cpu0: Begin traceback... [ 108.8459019] vpanic() at netbsd:vpanic+0x2aa [ 108.8959117] kern_assert() at netbsd:kern_assert+0x63 [ 108.9459101] genfs_do_putpages() at netbsd:genfs_do_putpages+0xbfb [ 109.0059173] VOP_PUTPAGES() at netbsd:VOP_PUTPAGES+0x112 [ 109.0559291] ffs_write() at netbsd:ffs_write+0xd08 [ 109.1059323] VOP_WRITE() at netbsd:VOP_WRITE+0x108 [ 109.1759440] vn_write() at netbsd:vn_write+0x277 [ 109.2359514] do_filewritev.part.1() at netbsd:do_filewritev.part.1+0x415 [ 109.2859628] sys_writev() at netbsd:sys_writev+0x54 [ 109.3359688] sys___syscall() at netbsd:sys___syscall+0x1c8 [ 109.3959751] syscall() at netbsd:syscall+0x29a [ 109.4159779] --- syscall (number 198) --- [ 109.4159779] Skipping crash dump on recursive panic [ 109.4309336] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:153:24, member access within misaligned address 0x3 for type 'struct x86_64_frame' which requires 8 byte alignment [ 109.4519420] Faulted in mid-traceback; aborting... [ 109.4569197] fatal breakpoint trap in supervisor mode [ 109.4569197] trap type 1 code 0 rip 0xffffffff8021dd9d cs 0x8 rflags 0x286 cr2 0x20000140 ilevel 0 rsp 0xffff9280b2ce6b10 [ 109.4727051] curlwp 0xffff8b46cbb1ea60 pid 623.4 lowest kstack 0xffff9280b2ce42c0 Stopped in pid 623.4 (syz-executor.0) at netbsd:breakpoint+0x5: leave ? breakpoint() at netbsd:breakpoint+0x5 db_panic() at netbsd:db_panic+0xd1 vpanic() at netbsd:vpanic+0x2aa isAlreadyReported() at netbsd:isAlreadyReported HandleTypeMismatch.part.1() at netbsd:HandleTypeMismatch.part.1+0xcc HandleTypeMismatch() at netbsd:HandleTypeMismatch+0x7b db_nextframe() at netbsd:db_nextframe+0x6f6 db_stack_trace_print() at netbsd:db_stack_trace_print+0x2c4 db_panic() at netbsd:db_panic+0x8b vpanic() at netbsd:vpanic+0x2aa kern_assert() at netbsd:kern_assert+0x63 genfs_do_putpages() at netbsd:genfs_do_putpages+0xbfb VOP_PUTPAGES() at netbsd:VOP_PUTPAGES+0x112 ffs_write() at netbsd:ffs_write+0xd08 VOP_WRITE() at netbsd:VOP_WRITE+0x108 vn_write() at netbsd:vn_write+0x277 do_filewritev.part.1() at netbsd:do_filewritev.part.1+0x415 sys_writev() at netbsd:sys_writev+0x54 sys___syscall() at netbsd:sys___syscall+0x1c8 syscall() at netbsd:syscall+0x29a --- syscall (number 198) --- [ 109.4800719] Skipping crash dump on recursive panic [ 109.4800719] panic: UBSan: Undefined Behavior in /syzkaller/managers/netbsd-kubsan/kernel/sys/arch/amd64/amd64/db_machdep.c:154:14, member access within misaligned address 0x3 for type 'struct x86_64_frame' which requires 8 byte alignment [ 109.4800719] Faulted in mid-traceback; aborting... [ 109.4800719] fatal breakpoint trap in supervisor mode [ 109.4800719] trap type 1 code 0 rip 0xffffffff8021dd9d cs 0x8 rflags 0x286 cr2 0x20000140 ilevel 0x8 rsp 0xffff9280b2ce5810 [ 109.4800719] curlwp 0xffff8b46cbb1ea60 pid 623.4 lowest kstack 0xffff9280b2ce42c0 Stopped in pid 623.4 (syz-executor.0) at netbsd:breakpoint+0x5: leave