Warning: Permanently added '10.128.10.46' (ECDSA) to the list of known hosts. 2019/09/22 06:37:55 fuzzer started 2019/09/22 06:37:55 dialing manager at 10.128.0.248:55565 2019/09/22 06:37:55 syscalls: 496 2019/09/22 06:37:55 code coverage: enabled 2019/09/22 06:37:55 comparison tracing: enabled 2019/09/22 06:37:55 extra coverage: support is not implemented in syzkaller 2019/09/22 06:37:55 setuid sandbox: support is not implemented in syzkaller 2019/09/22 06:37:55 namespace sandbox: support is not implemented in syzkaller 2019/09/22 06:37:55 Android sandbox: support is not implemented in syzkaller 2019/09/22 06:37:55 fault injection: support is not implemented in syzkaller 2019/09/22 06:37:55 leak checking: support is not implemented in syzkaller 2019/09/22 06:37:55 net packet injection: enabled 2019/09/22 06:37:55 net device setup: support is not implemented in syzkaller login: Expensive timeout(9) function: 0xffffffff8113c990(0) 0.008522870 s 06:39:22 executing program 0: 06:39:22 executing program 1: r0 = open$dir(&(0x7f0000000800)='./file0\x00', 0x40000400000002c2, 0x0) ftruncate(r0, 0x0) preadv(r0, &(0x7f0000000600)=[{&(0x7f0000000100)=""/37, 0xfffffde0}], 0x1, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x611, 0x0) 06:39:22 executing program 2: r0 = accept4(0xffffffffffffffff, &(0x7f0000000000)=@un=@abs={0x8}, &(0x7f0000000040)=0x8, 0x0) setsockopt$inet6_sctp_SCTP_ADAPTATION_LAYER(r0, 0x84, 0x8, &(0x7f0000000080)={0x5}, 0x4) r1 = fcntl$getown(0xffffffffffffff9c, 0x5) fcntl$setown(0xffffffffffffff9c, 0x6, r1) r2 = dup2(0xffffffffffffffff, r0) getsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffffff, 0x84, 0x2, &(0x7f00000000c0)={0x0, 0x3, 0x8000, 0x3f, 0x1, 0x4}, &(0x7f0000000100)=0x14) getsockopt$inet6_sctp_SCTP_PR_ASSOC_STATUS(r2, 0x84, 0x108, &(0x7f0000000140)={r3, 0x7, 0x0, 0x6, 0x2}, &(0x7f0000000180)=0x18) getsockopt$inet6_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffff9c, 0x84, 0x15, &(0x7f00000001c0)={0x0, 0x3}, &(0x7f0000000200)=0x8) setsockopt$inet6_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x903, &(0x7f0000000240)={r5, 0x8001, 0x87}, 0x8) setsockopt$inet_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x903, &(0x7f0000000280)={0x0, 0x7ff, 0x4a}, 0x8) setsockopt$inet6_sctp_SCTP_ADD_STREAMS(r2, 0x84, 0x903, &(0x7f00000002c0)={0x0, 0x1, 0xfffffffffffffb11}, 0x8) setsockopt$inet6_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xb, &(0x7f0000000300)={0x1, 0x8, 0x1000, 0x100000000, 0x0, 0x75df000000, 0x6e6, 0x100, r4}, 0x20) r6 = socket$inet_udplite(0x2, 0x2, 0x88) pwritev(r6, &(0x7f0000000700)=[{&(0x7f0000000340)="ce4809a6e5ffe82bd7bdb5605df735e8e31342eecc23f3ee543f054c80a4fe1fee07cfe7afd094c43e03245a7837a4411ecd1dae0de18e46c0d557972da27cd9024bbae68828d483b002fa62737f7a3828c27b44306cef3bbb80697ce2896dc1568c3172dfbdcdf969bf5990bedf7f0da407013987660f89de1f2ec4893c9ccf7bf7adf50057d3b0d18b44fc01a3c5e26326531c5b6efd293ce593a84fe19a0dc804bd8efcd3e60e9f79ef922e8480a7696e4878d49df4fbff60bd976cb3e6183723b77f907d22a24fbd4612a536953486507cb3434d8012a84b212502cb4a82a090dd3f4d4abbb38a69dbf9d8e4f75b4d27460c741309d9", 0xf8}, {&(0x7f0000000440)="a43b454b7851e6037bd8e07ffda5805cdb7c668b248261386f4585e307aa0e8a452bd860953dbf65ca38a613102b9d40ce939ebb1609e01b877c6a87df87f7471a83959fe73b3c600fb242aac80c50aeed35f284c4bb8e3b843364d9002b6225dc72f4124aa0f01c5a4b805f62fe8f60727e9f2754a709b1925a31887bc8da05f5fd50f0c4c8b22e06e9b42dfc577cf178defeecc781104158741ab445b15e258f9441d51830ab9acc1b21e52443be4a50546e6f54156133489ff3d7cea277f9829c6ff0fecae8ca9cd797c9666e821a95d6008d00c717a4c45405", 0xdb}, {&(0x7f0000000540)="867cd495c5670721bae9aff19e93e95f15099cd05511a63eac23c41e67184a444465189fc08a78d19cd3dffade8d23b4d2f6f7c6cf6d6360ef879aebd5192719cd4bab40b3026077b13786dc2051b951d87469368a1ed3b804196ed63c3e0f4f578aed85101af4c9f824428b4999dce290fdff6f9279a28c80d4a3d33c57c6cd24b35f2295eb520dc43520831c8fb0bee1c283d4a8ddf65de2dfe87d3e6eb3a104dce0177dbe155b76f06162eff6c77eed357d2ca1920e92e6603be878faedd2ae141f1a5bd7ef133bf7ca80499d6548acc1990f0f79", 0xd6}, {&(0x7f0000000640)="efca390a5ca1a4ac3a2cdac22fc6e047d413056dec408efc08b7621b7d9506cb225103e720a7869c46a4d273d008f8740ca41c27b653dc1b837d775ba7ca2d74d7441eefc8d0cff2bd597d6b62daabfc3b1f970475b7c333d7939d2068f3e61a15a77ceeda8d83716a63aaace7a586186e18180d7868e560dff1e1d6e888b1f3657ad45d33f90472fd7634810dbf64954466b891efc9792b5162d27d6c671b0f04995694226545bd343844bb", 0xac}], 0x4, 0x0) r7 = dup2(r0, 0xffffffffffffff9c) getsockopt$inet6_sctp_SCTP_ASSOCINFO(r7, 0x84, 0x2, &(0x7f0000000740)={r3, 0x52, 0x6, 0xfffffffffffffff9, 0x9b0, 0x1}, &(0x7f0000000780)=0x14) r8 = socket$inet6_icmp(0x1c, 0x2, 0x3a) fcntl$setstatus(r8, 0x4, 0x24f1e0f59b8be965) pipe2(&(0x7f00000007c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x80000) ioctl$DIOCRADDTABLES(r9, 0xc450443d, &(0x7f00000008c0)={{"348d21591aeef6063b4b986d5b31051fb9cc0116d7cf92d92e448ee8b41b93f1060852e0464734d20c0630e47724771525a3be3a511939cd80bed06c68b102aa18bf4d73d776c741f36504130c8e194311c7edbf783bde44db126ed3182fbdb573038e1e32dcb0b6ed3e4555480f9e07406438adafbc2bddc31e9a5e4fef613475b648dd09439aa356196847920e0e0ececc46284b6c875a63cdd0dc330ede43f0235cf53d04efefff77e3b8d6383cb5fa08b21f6bba102ae8819c7b53ca91d441e3c70d311eebcb119bf620751233b25d787b08f71fce308354cda19ef0dcd0588099c75dc01ab989b665c6b10ebcc6774b8c6e154e1f96c94fd5590e2bf1e0bedffdf22c58b26e4447be0a08aa8af15edd6b18b7fccedf8479b94c0f5f0de637378b16724ec0f33b1e3a5567a150111da79a61722ca86fba84001eb625399630807aae4d8d10034eca5c36b515739bb927384a4e8466927afec2a5b8b8c9461dd3f6b3a0bf0ff14a48ffaf61143775178f812324feff02bad55feddbe55643d9b33441a524c9cff9ead4ed3b6a73dfacd05d130b7e1adec245e2381685cb678c392e20d348a8a7f1674288a067e572e1118b50db5719966ced51713b47a29f5fa7f057a684292842f6fa0560b3aa82b517cc50be258366a06ecfef24e810aae6de853b6c8d6434e91543971ac9413ea2d6ec00e36dc5b3101ed9cb0b6e43f50a325656f6a54bcb1a1c89d29f372b22a56c996ba6718c2d14ab6cf8ca51d1784e921b85cd7aa9e66e15c8539ef2327e6409cb530dea4c2dbf25ecb9142da90924e93168ac6622bbed4dc5075c37c183a8d09f0e2b9c4e3b32a81325fd239ea728db815238458aa1dd136c1dd7bdd883121feace8333983e36d830b4caf5053d7d6a6fc76b59d10b08eab9d61252fa7ce698ed865adff14a8dca573d9f3d148b9ef9443589d3bf0e43c659eec730c9dd2e7af9a65cb28c83ba603b5bb75d1c59766f30be2c8c0e07d5b2429a81da4fe20498559f13d161ec47dc5549f4c1e81f39fef5d59359c8da7f08b562fe32f7de762d06d1a7f3e7c702b9f177a5f90d3261fecb2a04d25cc42bf4d6af0347243dfdbd51c21107cf334db797dc9d310b6d066d79ca8a923d9ec90bcbe10bfe032ff0c99a12a59cab2d3a3cb766437bc28afefdd0281327a4d6e425eb9dc7d0f32055b05846b6cbfceb0bc2a7d3324e177f63a6c2cb66de0b9283f0b31cd08715fc8594f3394f06240f1a96607b7ce5a30fba9d365d1c4327d35c712d98561b0723e518cce2f414c88c90080970fc4be92bfc61463b136be23f14e9000c5212d8ceb3d74492b9ef66390c066c11a79076e7b1252e9a666ca4d6cbb9109c6fefd334e8f79354bd2c8ec8dc349f1d7fd81d289538d9fac3dca05bd61bca90b367a195f097110154ad378a206240cbe7c99a83", "da19509bd92e454291de8a6bee44ed4ea7821e68c9b17d6512f7a5e784e5ee14", 0x5c40}, &(0x7f0000000800)="38f00df8dd0c99fbf0ca1ba8ea0e7504079f09d194427ed4d12f85b96460eafeb396d8dbb4f4bdf0f70c0ac6fe53ab074eeb019716079495460b5e70bdebfd11693df30c1f3defe87d6ea100638fa019c1b3f9ed9325e2eafe6dae63081985f043476870e7f8492a41c6ff252b0d1680784816d0b6da551065a7becf92fb9b6f72d861a715e8280ffe30f0ba01aa35297dd74491434c782344cf7f1389069bf3b1cefeabdbaefc6edb92752c509e58befead8e3796b3960ab1707a5403", 0x6e9, 0x4, 0x6, 0x2, 0x3ff, 0x2, 0x3cc, 0x65a0}) unlink(&(0x7f0000000d40)='./file0\x00') r10 = socket$unix(0x1, 0xa5c8eced0dcb9253, 0x0) r11 = getpgid(0xffffffffffffffff) fcntl$setown(r10, 0x6, r11) r12 = socket(0x82d29ebfc3cbd1a3, 0x3, 0x3) fsync(r12) r13 = socket$inet_sctp(0x2, 0xd, 0x84) getsockopt$inet6_sctp_SCTP_GET_PEER_ADDRESSES(r9, 0x84, 0x8003, &(0x7f0000000dc0)={0x0, &(0x7f0000000d80)=[@in6={0x1c, 0x1c, 0xffffffffffffffff, 0x0, @local}]}, &(0x7f0000000e00)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRESSES(r13, 0x84, 0x8003, &(0x7f0000000e80)={r14, &(0x7f0000000e40)=[@in={0x10, 0x2, 0xffffffffffffffff, @broadcast}]}, &(0x7f0000000ec0)=0x8) r15 = open(&(0x7f0000000f00)='./file0\x00', 0x100, 0x20) ioctl$DIOCCHANGERULE(r15, 0xcbe0441a, &(0x7f0000000f40)="b9207adc655d36444502db79812942b3be3d") 06:39:22 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x200, &(0x7f0000ffe000/0x2000)=nil) r1 = dup2(0xffffffffffffffff, 0xffffffffffffff9c) getsockopt$inet6_sctp_SCTP_AUTO_ASCONF(r1, 0x84, 0x18, &(0x7f0000000000), &(0x7f0000000040)=0x4) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000080)=""/69) r2 = accept$inet(0xffffffffffffff9c, 0x0, &(0x7f0000000100)) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r2, 0x84, 0x901, &(0x7f0000000140)={0x0, 0x0, 0x5, [0x6, 0x4, 0x6, 0x1, 0x520]}, 0x12) getsockopt$inet_sctp_SCTP_GET_LOCAL_ADDRESSES(0xffffffffffffffff, 0x84, 0x8004, &(0x7f00000001c0)={0x0, &(0x7f0000000180)=[@in={0x10, 0x2, 0xffffffffffffffff, @multicast2}]}, &(0x7f0000000200)=0x8) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x108, &(0x7f0000000240)={r3, 0xfffffffffffffffc, 0x3, 0x40}, &(0x7f0000000280)=0x18) ioctl$DIOCRINADEFINE(r1, 0xc450444d, &(0x7f0000000300)={{"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", "f7889ff2c07dab933a72e7255a463e8113b4b7e26c5da784337facca620bb65e", 0x252, 0x1ff}, &(0x7f00000002c0)="4f2b32f2ccc23f2aa741434a", 0x9, 0x1f, 0x6ed, 0x400, 0x40, 0x1, 0xce6, 0x9}) r5 = fcntl$dupfd(0xffffffffffffffff, 0x11, 0xffffffffffffff9c) getsockopt$inet6_sctp_SCTP_PEER_ADDR_PARAMS(r5, 0x84, 0xa, &(0x7f0000000780)={@in6={{0x1c, 0x1c, 0x3, 0x3ff, @ipv4={[], [], @multicast2}, 0x3}}, 0x0, 0x10000, 0x9, 0xa, 0x497cf48, 0x0, 0x20}, &(0x7f0000000840)=0x98) munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) r7 = socket$inet6_sctp(0x1c, 0xa, 0x84) getsockopt$inet6_sctp_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x29, &(0x7f0000000880)={r4, 0x80000000}, &(0x7f00000008c0)=0x8) mkdir(&(0x7f0000000900)='./file0\x00', 0x34) getsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffff9c, 0x84, 0x22, &(0x7f00000009c0)={0x1, 0x3ff, 0x0}, &(0x7f0000000a00)=0xc) getsockopt$inet6_sctp_SCTP_CONTEXT(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000000a40)={0x0, 0x3}, &(0x7f0000000a80)=0x8) getsockopt$inet_sctp_SCTP_STATUS(r2, 0x84, 0x100, &(0x7f0000000ac0)={r9, 0x3ff, 0x6, 0xfffffffeffffffff, 0xfffffffffffff152, 0x1, 0x7ff, 0x100000000, {@in={{0x10, 0x2, 0x1}}, r10, 0x7fffffff, 0x0, 0xfeea, 0x12b5555d, 0x6}}, &(0x7f0000000b80)=0xb8) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r12 = open$dir(&(0x7f0000000bc0)='./file0\x00', 0x200, 0x188) fchmodat(r12, &(0x7f0000000c00)='./file0\x00', 0x40) geteuid() freebsd11_stat(&(0x7f0000000c40)='./file0/file0\x00', &(0x7f0000000c80)) r13 = open(&(0x7f0000000d00)='./file0\x00', 0x100, 0x108) setsockopt$inet6_sctp_SCTP_ENABLE_STREAM_RESET(r13, 0x84, 0x900, &(0x7f0000000d40)={r4, 0x2}, 0x8) chdir(&(0x7f0000000d80)='./file0\x00') r14 = accept$inet(0xffffffffffffff9c, &(0x7f0000000dc0)={0x10, 0x2, 0xffffffffffffffff, @remote}, &(0x7f0000000e00)=0x10) setsockopt$inet_sctp_SCTP_RESET_STREAMS(r14, 0x84, 0x901, &(0x7f0000000e40)={r8, 0x4c9, 0x1, [0x6]}, 0xa) setsockopt$inet6_sctp_SCTP_SET_PEER_PRIMARY_ADDR(r7, 0x84, 0x6, &(0x7f0000000e80)={@in={{0x10, 0x2, 0x3, @local={0xac, 0x14, 0x0}}}, r6}, 0x8c) r15 = accept4$inet(r2, 0x0, &(0x7f0000000f40), 0x20000000) getsockopt$inet_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x2, &(0x7f0000000f80)={r11, 0x80000000, 0x2, 0x5, 0x5, 0x38000}, &(0x7f0000000fc0)=0x14) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r15, 0x84, 0x26, &(0x7f0000001000)={r16}, &(0x7f0000001040)=0x8) 06:39:23 executing program 1: poll(&(0x7f0000000680)=[{}], 0x1cb, 0xee) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f00000001c0)={{0xffffffff2840029c}}) 06:39:23 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) shutdown(r0, 0x0) bind$unix(r0, &(0x7f0000000000)=@file={0x1}, 0x6e) listen(r0, 0x0) accept(r0, 0x0, 0x0) 06:39:23 executing program 3: 06:39:23 executing program 0: poll(0x0, 0x0, 0xfa) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000000)={{0xffffffff284002a6}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000080)={{0xffffffff284002a2}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000080)={{0xffffffff2840029d}}) r0 = socket$inet6_sctp(0x1c, 0xd19c421370f47b1d, 0x84) socketpair(0x10, 0x3, 0xba2, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r2, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @local={0xfe, 0x80, [], 0x0}}, 0x1c) r3 = dup2(r2, r2) r4 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r4, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @local={0xfe, 0x80, [], 0x0}}, 0x1c) dup2(r4, r4) r5 = open(&(0x7f0000000000)='./file0\x00', 0x604, 0x0) poll(&(0x7f0000000140)=[{}, {r5}], 0x2, 0xee) r6 = open(&(0x7f0000000000)='./file0\x00', 0x604, 0x0) poll(&(0x7f0000000140)=[{}, {r6}], 0x2, 0xee) r7 = open(&(0x7f0000000000)='./file0\x00', 0x604, 0x0) poll(&(0x7f0000000140)=[{}, {r7}], 0x2, 0xee) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r7, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000000580)=0xfffffffffffffe94) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x19, &(0x7f0000000200)={r8}, &(0x7f0000000240)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f00000001c0)={r8, 0x40}, &(0x7f0000000280)=0x8) r9 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r9, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @local={0xfe, 0x80, [], 0x0}}, 0x1c) r10 = dup2(r9, r9) r11 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r11, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @local={0xfe, 0x80, [], 0x0}}, 0x1c) r12 = dup2(r11, r11) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r12, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0x19, &(0x7f0000000200)={r13}, &(0x7f0000000240)=0x8) getsockopt$inet6_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x21, &(0x7f0000000040)={0xe7, 0x20, 0x1, 0xffff, r13}, &(0x7f0000000540)=0x10) r15 = semget$private(0x0, 0x4, 0x100) __semctl$GETALL(r15, 0x0, 0x6, &(0x7f0000000140)=""/172) __semctl$SEM_STAT(r15, 0x0, 0xa, &(0x7f0000000440)=""/216) getsockopt$inet6_sctp_SCTP_RESET_STREAMS(r0, 0x84, 0x901, &(0x7f00000002c0)=ANY=[@ANYRES32=r14, @ANYBLOB="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"], &(0x7f0000000180)=0xc) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f00000000c0)={{0xffffffff2840029b}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000080)={{0xffffffff2840029a}}) 06:39:23 executing program 2: poll(&(0x7f00000000c0)=[{}], 0x1, 0x8000000000000e7) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f00000000c0)={{0xffffffff284002a6, 0xffffffffffffffff}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000080)={{0xffffffff284002de}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000080)={{0xffffffff284002a3}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000080)={{0xffffffff284002a2}}) r0 = semget$private(0x0, 0x4, 0x100) __semctl$GETALL(r0, 0x0, 0x6, &(0x7f0000000140)=""/172) r1 = geteuid() setresuid(0x0, 0xffffffffffffffff, r1) r2 = semget(0x2, 0x1, 0x390) r3 = getgid() r4 = geteuid() getresgid(0x0, &(0x7f0000000400)=0x0, &(0x7f0000000440)) r6 = socket$unix(0x1, 0x5, 0x0) r7 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r7, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/90, 0x5a}], 0x1, 0x0}, 0x0) r8 = getpgid(0xffffffffffffffff) r9 = geteuid() setresuid(0x0, 0xffffffffffffffff, r9) r10 = semget(0x2, 0x1, 0x390) r11 = getgid() r12 = geteuid() getresgid(0x0, &(0x7f0000000400)=0x0, &(0x7f0000000440)) __semctl$IPC_SET(r10, 0x0, 0x1, &(0x7f0000000480)={{0x0, 0x0, r11, r12, r13, 0x110, 0xca}, 0x800, 0x4}) r14 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r14, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/90, 0x5a}], 0x1, 0x0}, 0x0) r15 = dup(r14) r16 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r16, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/90, 0x5a}], 0x1, 0x0}, 0x0) r17 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r17, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/90, 0x5a}], 0x1, 0x0}, 0x0) r18 = socket$inet_icmp_raw(0x2, 0x3, 0x1) recvmsg(r18, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000000080)=""/90, 0x5a}], 0x1, 0x0}, 0x0) r19 = socket$inet6(0x1c, 0x4, 0x1) pipe2(&(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x37fdf83251dcf658) r21 = getpgid(0x0) wait4(r21, &(0x7f00000003c0), 0x3, &(0x7f0000000400)) wait4(r21, &(0x7f0000000640), 0x1, &(0x7f0000000680)) r22 = getpgrp(r21) r23 = getgid() r24 = geteuid() getresgid(0x0, &(0x7f0000000400)=0x0, &(0x7f0000000440)) __semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000480)={{0x0, 0x0, r23, r24, r25, 0x110, 0xca}, 0x800, 0x4}) sendmsg$unix(r6, &(0x7f0000000580)={&(0x7f0000000380)=@abs={0x8, 0x1, 0x0, 0x0}, 0x8, &(0x7f00000003c0), 0x0, &(0x7f0000000500)=[@rights={0xc}, @rights={0x10, 0xffff, 0x1, [r7]}, @cred={0x18, 0xffff, 0x2, r8, r9, r11}, @rights={0x24, 0xffff, 0x1, [r15, r16, r17, r18, r19, r20]}, @cred={0x18, 0xffff, 0x2, r22, r4, r23}], 0x70, 0x109}, 0x100) r26 = fcntl$dupfd(0xffffffffffffff9c, 0x11, 0xffffffffffffffff) poll(&(0x7f0000000240)=[{r26, 0x2}, {0xffffffffffffff9c, 0x100}], 0x2, 0x6) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000480)={{0x0, 0x0, r3, r4, r5, 0x110, 0xca}, 0x800, 0x4}) r27 = geteuid() setresuid(0x0, 0xffffffffffffffff, r27) r28 = geteuid() setresuid(0x0, 0xffffffffffffffff, r28) fstat(r26, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setreuid(r28, r29) freebsd11_lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) __semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000040)={{0x5, r1, r5, r27, r30, 0x138, 0x1000}, 0x6, 0x3ff, 0x4}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000200)={{0xffffffff28400309}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f00000000c0)={{0xffffffff284002a1}}) 06:39:23 executing program 1: 06:39:23 executing program 3: 06:39:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) fcntl$setstatus(r0, 0x10, 0x80000000002c00) 06:39:23 executing program 1: r0 = msgget$private(0x0, 0x0) msgsnd(r0, 0xfffffffffffffffe, 0x0, 0x0) 06:39:23 executing program 1: poll(&(0x7f00000001c0)=[{}, {}], 0x2, 0xf8) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000000)={{0xffffffff2840029d}}) __semctl$IPC_STAT(0xffffffffffffffff, 0x0, 0x2, &(0x7f00000000c0)=""/32) r0 = open(&(0x7f0000000000)='./file0\x00', 0x604, 0x0) poll(&(0x7f0000000140)=[{}, {r0}], 0x2, 0xee) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @local={0xfe, 0x80, [], 0x0}}, 0x1c) r2 = dup2(r1, r1) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x3, 0x0, @local={0xfe, 0x80, [], 0x0}}, 0x1c) r4 = dup2(r3, r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f00000016c0)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r2, 0x84, 0x19, &(0x7f0000000200)={r5}, &(0x7f0000000240)=0x8) getsockopt$inet6_sctp_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x22, &(0x7f0000000100)={0x1, 0x200, r5}, &(0x7f0000000140)=0xc) getsockopt$inet6_sctp_SCTP_ASSOCINFO(0xffffffffffffff9c, 0x84, 0x2, &(0x7f0000000180)={0x0, 0x0, 0x1, 0x6, 0x2, 0x5}, &(0x7f0000000200)=0x14) setsockopt$inet6_sctp_SCTP_DISABLE_FRAGMENTS(r4, 0x84, 0x9, &(0x7f0000000340)=0x100000001, 0x4) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0x100, &(0x7f0000000240)={r6, 0xffffffffffffff80, 0x5, 0x100000001, 0x6, 0x47, 0xfffffffffffffff8, 0x1, {@in={{0x10, 0x2, 0x2, @remote={0xac, 0x14, 0x0}}}, r7, 0x745a, 0x1, 0x1800000000000000, 0x3, 0x6a6a}}, &(0x7f0000000300)=0xb8) freebsd10_pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DIOCGETTIMEOUT(r8, 0xc008441e, &(0x7f00000003c0)={0x8, 0x8b8}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000040)={{0xffffffff284002cb}}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000080)={{0xffffffff2840029a}}) 06:39:23 executing program 3: poll(0x0, 0x0, 0xff) r0 = semget(0x1, 0x0, 0x200) r1 = getegid() r2 = semget(0x2, 0x1, 0x390) r3 = getgid() r4 = geteuid() getresgid(0x0, &(0x7f0000000400)=0x0, &(0x7f0000000440)) __semctl$IPC_SET(r2, 0x0, 0x1, &(0x7f0000000480)={{0x0, 0x0, r3, r4, r5, 0x110, 0xca}, 0x800, 0x4}) r6 = semget(0x2, 0x1, 0x390) r7 = getgid() r8 = geteuid() freebsd11_stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140)) getresgid(0x0, &(0x7f0000000400)=0x0, &(0x7f0000000440)) __semctl$IPC_SET(r6, 0x0, 0x1, &(0x7f0000000480)={{0x0, 0x0, r7, r8, r9, 0x110, 0xca}, 0x800, 0x4}) __semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000100)={{0x40, 0xffffffffffffffff, r1, r4, r7, 0x68, 0x100000000}, 0x9, 0xfff, 0x8}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000040)={{0xffffffff284002b8, 0x0, 0x0, 0x0, r1, 0x4}, 0x0, 0x10000, 0x9}) __semctl$IPC_SET(0x0, 0x0, 0xa, &(0x7f0000000080)={{0xffffffff2840029e}}) Fatal trap 12: page fault while in kernel mode cpuid = 1; apic id = 01 fault virtual address = 0x0 fault code = supervisor write data, page not present instruction pointer = 0x20:0xffffffff811611aa stack pointer = 0x0:0xfffffe0022cab5e0 frame pointer = 0x0:0xfffffe0022cab6b0 code segment = base 0x0, limit 0xfffff, type 0x1b = DPL 0, pres 1, long 1, def32 0, gran 1 processor eflags = interrupt enabled, resume, IOPL = 0 current process = 816 (syz-executor.2) trap number = 12 panic: page fault cpuid = 1 time = 1569134364 KDB: stack backtrace: db_trace_self_wrapper() at db_trace_self_wrapper+0x47/frame 0xfffffe0022cab240 vpanic() at vpanic+0x1e0/frame 0xfffffe0022cab2a0 panic() at panic+0x43/frame 0xfffffe0022cab300 trap_fatal() at trap_fatal+0x4de/frame 0xfffffe0022cab380 trap_pfault() at trap_pfault+0x9f/frame 0xfffffe0022cab3f0 trap() at trap+0x44b/frame 0xfffffe0022cab510 calltrap() at calltrap+0x8/frame 0xfffffe0022cab510 --- trap 0xc, rip = 0xffffffff811611aa, rsp = 0xfffffe0022cab5e0, rbp = 0xfffffe0022cab6b0 --- uipc_send() at uipc_send+0x2da/frame 0xfffffe0022cab6b0 sosend_generic() at sosend_generic+0x747/frame 0xfffffe0022cab770 sosend() at sosend+0xc6/frame 0xfffffe0022cab7e0 kern_sendit() at kern_sendit+0x33d/frame 0xfffffe0022cab890 freebsd32_sendmsg() at freebsd32_sendmsg+0x268/frame 0xfffffe0022cab970 ia32_syscall() at ia32_syscall+0x46a/frame 0xfffffe0022cabab0 int0x80_syscall_common() at int0x80_syscall_common+0x9c/frame 0x8142fdb KDB: enter: panic [ thread pid 816 tid 100129 ] Stopped at kdb_enter+0x6a: movq $0,kdb_why