Hello,
syzbot found the following crash on:
HEAD commit: 11eef5b2ee47 Clear per-lwp entries whose mount is gone bef..
git tree: netbsd
console output:
https://syzkaller.appspot.com/x/log.txt?x=13483948c00000
dashboard link:
https://syzkaller.appspot.com/bug?extid=0b9692ae0f49f93b7dc7
Unfortunately, I don't have any reproducer for this crash yet.
IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by:
syzbot+0b9692...@syzkaller.appspotmail.com
login: [ 133.0828479] ASan: Unauthorized Access In 0xffffffff80a7f51e: Addr
0xffff920012ed35d4 [4 bytes, read, RedZonePartial]
[ 133.0924945] #0 0xffffffff80a7f51e in in6_print <netbsd>
[ 133.0924945] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.0985923] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.1021765] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.1021765] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.1090254] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.1124449] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.1214289] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.1289961] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.1371350] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.1455398] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.1536718] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.1611820] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.1698627] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.1792983] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.1862483] ASan: Unauthorized Access In 0xffffffff80a7f9ec: Addr
0xffff920012ed35d8 [4 bytes, read, RedZone]
[ 133.1986333] #0 0xffffffff80a7f9ec in in6_print <netbsd>
[ 133.2063160] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.2140351] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.2226987] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.2307787] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.2387424] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.2470396] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.2564569] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.2636549] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.2717619] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.2805710] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.2882838] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.2957292] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.3046822] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.3130214] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.3210118] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d4 [2 bytes, read, RedZonePartial]
[ 133.3341396] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 133.3418222] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.3495694] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.3580780] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.3673749] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.3744321] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.3825981] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.3914871] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.3991507] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.4072271] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.4156028] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.4239925] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.4314291] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.4400564] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.4493619] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.4563531] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d6 [2 bytes, read, RedZonePartial]
[ 133.4694773] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 133.4782920] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.4849636] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.4935280] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.5024108] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.5098515] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.5180567] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.5265181] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.5346631] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.5428319] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.5507095] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.5602751] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.5667957] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.5754259] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.5843871] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.5917684] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d8 [2 bytes, read, RedZone]
[ 133.6041311] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 133.6118262] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.6196141] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.6281375] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.6374423] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.6443672] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.6525554] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.6615478] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.6691459] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.6772683] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.6856618] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.6938320] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.7012332] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.7098545] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.7181996] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.7261541] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35da [2 bytes, read, RedZone]
[ 133.7387082] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 133.7462089] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.7540123] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.7628209] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.7707777] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.7787337] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.7869334] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.7952504] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.8035307] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.8116624] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.8206904] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.8282463] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.8357779] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.8448070] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.8527131] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.8606697] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35dc [2 bytes, read, RedZone]
[ 133.8737427] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 133.8808306] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.8886178] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.8978509] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.9053176] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.9133119] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.9219637] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.9298037] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.9380931] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.9461703] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.9540706] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.9627337] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.9701868] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.9798345] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.9871533] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.9951713] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35de [2 bytes, read, RedZone]
[ 134.0087688] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 134.0154881] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 134.0232645] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 134.0328797] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 134.0401281] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 134.0481321] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 134.0569935] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 134.0647944] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.0730782] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.0811565] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.0890012] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.0976219] #11 0xffffffff80f603ca in sosend <netbsd>
[ 134.1052192] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.1148722] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.1220319] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.1300245] sockaddr_checklen: 0xffff920012ed35c8 bad len af=24
socklen=12 len=28 [inet6: ::]
[ 134.1406529] sockaddr_checklen: 0xffff92016f10f070 bad len af=24
socklen=12 len=28 [inet6: [100:100::9800:0:0:0]:20018]
[ 134.1539954] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35da [1 byte, read, RedZone]
[ 134.1662495] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 134.1738756] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 134.1823784] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 134.1920236] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 134.1997283] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 134.2080456] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.2163420] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.2244268] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.2323636] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.2408733] #9 0xffffffff80f603ca in sosend <netbsd>
[ 134.2482632] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.2569364] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.2652672] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.2740053] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 134.2815443] #14 0xffffffff80265c1e in syscall <netbsd>
[ 134.2890775] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35dc [1 byte, read, RedZone]
[ 134.3013164] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 134.3088586] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 134.3174080] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 134.3270538] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 134.3346784] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 134.3429787] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.3514793] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.3612003] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.3683332] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.3768805] #9 0xffffffff80f603ca in sosend <netbsd>
[ 134.3849258] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.3929205] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.4012268] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.4091971] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 134.4173920] #14 0xffffffff80265c1e in syscall <netbsd>
[ 134.4249772] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35dc [1 byte, read, RedZone]
[ 134.4379721] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 134.4448202] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 134.4528371] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 134.4625701] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 134.4717288] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 134.4790212] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.4873746] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.4958417] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.5037106] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.5123230] #9 0xffffffff80f603ca in sosend <netbsd>
[ 134.5199560] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.5283295] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.5367249] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.5447507] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 134.5537118] #14 0xffffffff80265c1e in syscall <netbsd>
[ 134.5606784] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35df [1 byte, read, RedZone]
[ 134.5730018] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 134.5805906] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 134.5886333] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 134.5984529] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 134.6067609] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 134.6149123] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.6232809] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.6315037] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.6405271] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.6480510] #9 0xffffffff80f603ca in sosend <netbsd>
[ 134.6554650] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.6646357] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.6724947] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.6805437] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 134.6887428] #14 0xffffffff80265c1e in syscall <netbsd>
[ 134.7948370] ASan: Unauthorized Access In 0xffffffff80a7f51e: Addr
0xffff920012ed35d4 [4 bytes, read, RedZonePartial]
[ 134.8093055] #0 0xffffffff80a7f51e in in6_print <netbsd>
[ 134.8189493] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 134.8237712] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 134.8334171] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 134.8430620] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 134.8527071] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 134.8575301] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 134.8671751] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.8768193] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.8816410] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.8912865] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.9009311] #11 0xffffffff80f603ca in sosend <netbsd>
[ 134.9057554] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.9153986] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.9250459] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.9298662] ASan: Unauthorized Access In 0xffffffff80a7f9ec: Addr
0xffff920012ed35d8 [4 bytes, read, RedZone]
[ 134.9443454] #0 0xffffffff80a7f9ec in in6_print <netbsd>
[ 134.9539833] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 134.9588012] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 134.9684462] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 134.9780914] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 134.9877385] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 134.9925637] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.0022050] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.0118537] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.0166716] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.0263163] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.0359615] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.0407855] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.0504313] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.0600735] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.0648963] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d4 [2 bytes, read, RedZonePartial]
[ 135.0793649] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.0890090] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.0986570] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.1034768] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.1131216] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.1227679] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.1275909] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.1372352] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.1468800] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.1565276] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.1613466] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.1709917] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.1806373] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.1854633] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.1951053] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.1999265] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d6 [2 bytes, read, RedZonePartial]
[ 135.2143957] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.2240403] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.2336848] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.2385114] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.2481519] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.2577974] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.2674430] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.2722813] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.2819103] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.2915558] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.2963769] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.3060215] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.3156680] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.3253138] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.3301350] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.3397803] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d8 [2 bytes, read, RedZone]
[ 135.3542489] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.3590723] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.3687153] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.3783621] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.3831826] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.3928273] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.4024737] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.4072944] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.4169415] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.4265857] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.4314074] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.4410522] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.4506991] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.4603443] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.4651648] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.4748121] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35da [2 bytes, read, RedZone]
[ 135.4844567] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.4941002] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.5037488] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.5085803] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.5182124] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.5278573] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.5375039] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.5423248] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.5519695] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.5616174] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.5664371] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.5760825] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.5857295] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.5905541] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.6001953] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.6098399] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35dc [2 bytes, read, RedZone]
[ 135.6194874] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.6291349] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.6387767] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.6435974] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.6532426] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.6628875] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.6725357] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.6773580] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.6870004] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.6966473] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.7014686] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.7111125] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.7207594] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.7255805] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.7352262] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.7448696] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35de [2 bytes, read, RedZone]
[ 135.7545147] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.7641618] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.7738086] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.7834524] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.7882720] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.7979312] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.8075644] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.8123846] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.8220318] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.8316756] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.8364984] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.8461437] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.8557875] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.8654342] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.8702557] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.8799022] sockaddr_checklen: 0xffff920012ed35c8 bad len af=24
socklen=12 len=28 [inet6: ::]
[ 135.8895453] sockaddr_checklen: 0xffff92016f107070 bad len af=24
socklen=12 len=28 [inet6: [100:100::9800:0:0:0]:20018]
[ 135.9040131] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35da [1 byte, read, RedZone]
[ 135.9136593] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 135.9233027] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 135.9329481] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 135.9425927] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 135.9474154] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 135.9570601] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.9667074] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.9763513] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.9811726] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.9908176] #9 0xffffffff80f603ca in sosend <netbsd>
[ 136.0004638] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 136.0101088] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 136.0149304] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 136.0245753] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 136.0342228] #14 0xffffffff80265c1e in syscall <netbsd>
[ 136.0390428] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35dc [1 byte, read, RedZone]
[ 136.0535127] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 136.0583328] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 136.0679781] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 136.0776228] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 136.0872695] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 136.0920902] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 136.1017352] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 136.1113831] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 136.1162030] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 136.1258477] #9 0xffffffff80f603ca in sosend <netbsd>
[ 136.1354948] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 136.1403162] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 136.1499602] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 136.1596054] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 136.1644278] #14 0xffffffff80265c1e in syscall <netbsd>
[ 136.1740734] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35dc [1 byte, read, RedZone]
[ 136.1885418] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 136.1933627] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 136.2030093] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 136.2126529] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 136.2222995] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 136.2271210] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 136.2367729] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 136.2464121] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 136.2512330] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 136.2608775] #9 0xffffffff80f603ca in sosend <netbsd>
[ 136.2705278] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 136.2753457] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 136.2849909] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 136.2946374] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 136.2994581] #14 0xffffffff80265c1e in syscall <netbsd>
[ 136.3091045] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35df [1 byte, read, RedZone]
[ 136.3187480] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 136.3283926] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 136.3380385] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 136.3476843] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 136.3525061] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 136.3621504] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 136.3717957] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 136.3814424] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 136.3862631] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 136.3959084] #9 0xffffffff80f603ca in sosend <netbsd>
[ 136.4055538] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 136.4103757] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 136.4200204] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
06:29:04 executing program 3:
r0 = semget(0x0, 0x2, 0x100)
semctl$GETZCNT(r0, 0x1, 0x7, &(0x7f0000000000)=""/176)
semget(0x3, 0x3, 0x402)
r1 = geteuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f00000000c0)={<r2=>0x0, 0x0, <r3=>0x0}, 0xc)
r4 = getuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f0000000100)={0x0, 0x0, <r5=>0x0}, 0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000140)={{0x1000, r1, r3, r4, r5,
0x92, 0x8}, 0x5, 0x20, 0x7})
r6 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0),
&(0x7f0000000200)=0xc)
sendmsg(r6, &(0x7f00000008c0)={&(0x7f0000000240)=@in6={0x18, 0x0,
0xfffffffffffffff7, 0x4}, 0xc,
&(0x7f0000000540)=[{&(0x7f00000004c0)="be1cbcad5f17fc8a409c162eef56c43b1427c10ad37b046057b9b2522c4341bb41c510f5de7976711d7bae61b182f5f517ce0f746d0f0a20c95c937824bdbe82222b619a6819ef3b",
0x48}], 0x1, 0x0}, 0x2)
getuid()
r7 = fcntl$dupfd(r6, 0xc, r6)
sendmsg(r7,
&(0x7f0000000d00)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0xa,
&(0x7f0000000a80)=[{&(0x7f0000000940)="bc2979", 0x3},
{&(0x7f0000000980)="84ec6f127e1623f8aa8fa07c9ebc0a6f40dfe8ba98761bf867ec69fcce85500ccade82b058e818b49e0b47e274ee75cee944e20fcbd8aaedbb9a5f8ef69cf0d5ba49e2ba6350074915d0522f38c7acba2c3bfc2eee2f2f1ed995d29a87cf80a19812f6f655ddd040131ac191573bde72d3050e21430cf8cd2460265fc88d1264552186ff2dfc5b324fa0f6da049d7147330bcdfa4b079d8b0b9a9483f46c2d704e041ad962ae0f2f5221c56bb964bd3134696f5483f3452cbfc3dcbe86459babd2c7ebf1d8cf10a1c24ac5cda611df9c1a705927cd774d810b9f713844aca7e1f9725642459e9106b3c0468f8ffe9a718416",
0xf2}], 0x2, &(0x7f0000000ac0)=[{0xd0, 0x100,
0x6, "3fcd14f569f252017dbc999341224e9de37d57f0cb7b45b2051a5dd68a7082d5310e1ec1d0867672d6ceecc70bbd503bd339baee461cd6dcb90a84c864654d317ace2fd217c9c4dc06b69c431422b19661d8dcfd74d8fa34aef1bdef74810a7a34d06328af8e7f37f846d1af871c3309ba5ef86f322ccf52ccc989b3f642c2f4c30e7f9c1f848fa8f54a9ba02a3555d8fbe13630afa094790340a67f7b1d24412142845fea7810f88d1633824b9334385a4fcc9e06d044ac2b244bfe849da818"},
{0xf0, 0xffff,
0x2, "4c11385e8609520456d1dc078aaaed55e67ae2f5a9aa3ad1cb8851754093d84399adecbc967f3655dabcaff7b8ed497671aa7ab464e6b254e837b94d1494e5e4b09e0f852718fd6dde3fb18804813407e0ee930ddeecdfaa5af857bfc8eb7c9faf38733b62645cab0df08dcd48c3d71e92b62a1ff6dfa2d7cb4f092730e9a2b49523e784a5688dbed2cecc1d0972c5bc0d87a41a4d47ef7b8bfbf3de3d913a8e318b79ba13b91dc125aa789ee5afcd7d0d6d3fd399e1a9c71a4584f0d7116c28e4b890dd08f08f68f72e7d638faa2a97c7252a9244c4f19300a7de8ed3"},
{0x50, 0x101,
0x5, "b34d1aa82fd223e9cd0a1a14d5d16c45c2f3e4a184bf45e6dd55c07c1aeb8fd43a2e96c8e570b65f28456b5e768e7f0d087f00b2032ca78184f2f358c21501"}],
0x210}, 0x0)
accept$unix(r7, &(0x7f0000000d40)=@abs, &(0x7f0000000d80)=0x8)
geteuid()
setsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f0000000dc0)={r2, r4, r5}, 0xc)
r8 = msgget$private(0x0, 0x1)
msgctl$IPC_STAT(r8, 0x2, &(0x7f0000000e00)=""/122)
r9 = fcntl$dupfd(r7, 0x0, r7)
r10 = getuid()
getsockopt$SO_PEERCRED(r9, 0xffff, 0x11, &(0x7f0000000e80), 0xc)
getpeername$inet6(r9, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000f40)={{0x9, r10, r5, r1, r5,
0x21, 0xed}, 0x8000, 0x61, 0x6614dd80})
06:29:04 executing program 1:
r0 = paccept(0xffffffffffffffff, &(0x7f0000000000)=@un=@file={0x0, ""/67},
&(0x7f0000000080)=0x45, 0xac159c788919e7bc)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
pwritev(r1,
&(0x7f0000000100)=[{&(0x7f00000000c0)="1104a0cf3592bf2bebf5e08a84e91dd3c684d4288cd6dd5cb535d4",
0x1b}], 0x1, 0x0)
getdents(r1, &(0x7f0000000140)=""/89, 0x59)
mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x10, r1, 0x0, 0x0)
r2 = semget$private(0x0, 0x2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x90, r1, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
getpeername(r0, &(0x7f00000001c0)=@in, &(0x7f0000000200)=0xc)
getdents(r1, &(0x7f0000000240)=""/4096, 0x1000)
semctl$GETNCNT(r2, 0x3, 0x3, &(0x7f0000001240)=""/219)
execve(&(0x7f0000001340)='./file0\x00',
&(0x7f00000014c0)=[&(0x7f0000001380)='-\x00', &(0x7f00000013c0)='\x00',
&(0x7f0000001400)='\\#!\x00', &(0x7f0000001440)='![&}.\x00',
&(0x7f0000001480)='@\x00'],
&(0x7f00000015c0)=[&(0x7f0000001500)='-\'[:$\x00',
&(0x7f0000001540)='\x00', &(0x7f0000001580)='\x00'])
r3 = dup(r0)
flock(r3, 0x3)
semget(0x3, 0x1, 0x100)
fchmodat(r3, &(0x7f0000001600)='./file0\x00', 0x110, 0x600)
symlink(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='./file0\x00')
semctl$SETVAL(r2, 0x6, 0x8, &(0x7f00000016c0)=0xfffffffffffffeff)
ftruncate(r1, 0x1)
getsockname$inet(r3, &(0x7f0000001700), &(0x7f0000001740)=0xc)
poll(&(0x7f0000001780)=[{r1, 0x20}, {r1, 0x20}, {r3, 0x8}, {r0, 0x40}],
0x4, 0xffff)
recvfrom$inet(r3, &(0x7f00000017c0)=""/81, 0x51, 0x2,
&(0x7f0000001840)={0x2, 0x3}, 0xc)
bind$unix(r3, &(0x7f0000001880)=@abs={0x0, 0x0, 0x0}, 0x8)
r4 = fcntl$getown(r1, 0x5)
fcntl$lock(r1, 0x7, &(0x7f00000018c0)={0x1, 0x3, 0x808, 0x1f, r4})
sendto$unix(r3,
&(0x7f0000001900)="7880d2895506d4b1e50d0bb381f4951302f678b2402dc8ebb55842e8ebafb06e4832e46e2f95af7865658231462f661f63794c2fb190f3f7b05ec111dfd8740057beedb3",
0x44, 0x0, &(0x7f0000001980)=@file={0x1, './file0\x00'}, 0xa)
semget(0x1, 0x3, 0x80)
getsockopt$SO_PEERCRED(r0, 0xffff, 0x11, &(0x7f00000019c0), 0xc)
renameat(r3, &(0x7f0000001a00)='./file0\x00', r1,
&(0x7f0000001a40)='./file1\x00')
06:29:04 executing program 2:
r0 = semget(0x2, 0x3, 0x100)
semctl$IPC_RMID(r0, 0x0, 0x0)
r1 = semget(0x0, 0x3, 0x400)
pipe2(&(0x7f0000000000)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff},
0x1400004)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000040)={0x0, <r4=>0x0},
&(0x7f0000000080)=0xc)
r5 = semget$private(0x0, 0x1, 0x80)
getsockname$inet6(r3, &(0x7f00000000c0), &(0x7f0000000100)=0xc)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000140)={<r6=>0x0,
<r7=>0x0}, &(0x7f0000000180)=0xc)
semctl$IPC_RMID(r5, 0x0, 0x0)
semctl$GETZCNT(r0, 0x0, 0x7, &(0x7f00000001c0)=""/205)
fsync(r2)
getsockopt$sock_cred(r2, 0xffff, 0x11, &(0x7f00000002c0)={0x0, 0x0,
<r8=>0x0}, &(0x7f0000000300)=0xc)
semop(r0, &(0x7f0000000340)=[{0x4, 0x5, 0x1800}, {0x2, 0x3, 0x1800}, {0x3,
0x80000000, 0x1800}, {0x3, 0x7, 0x1000}, {0x1, 0x0, 0x800}], 0x5)
setsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000380)={r6, r4, r8}, 0xc)
semctl$GETPID(r5, 0x7, 0x4, &(0x7f00000003c0)=""/76)
setsockopt$sock_linger(r3, 0xffff, 0x80, &(0x7f0000000440)={0x5}, 0x8)
writev(r3,
&(0x7f00000005c0)=[{&(0x7f0000000480)="f79d6430a25c42d95c95928b0a62fc0e9172916a7817a1df190a0771c9006306ae703bcca2caf382bac623cd7a46cdf757f1cc64928fff5b72bd56e020e89f10f65f62879f01e7c8ba86667054028b6f871785c6624b78",
0x57},
{&(0x7f0000000500)="d1c0e0dc2dfa6d7c71fca183ac0011968f49ce90083667bdd98cbdb75942c95566690cb81e001a24aabe89cf688a2aba3eb2f35d700960bd8126a477d93d1a857e74a9103652c05678b51615524dfd95ec145a9f41857f4633af7b30a959ab716ac5622cc081d4ad87c24c7c97f61bd43b66fba7558904c435a38ce00595ac33ed1f99ec55c1b7ebb568c8b7cb44c46432463f96a01bba4d29c48f25d1dcc8e143a999f19235215ea0a37d5e5e4c10d59d11c29878",
0xb5}], 0x2)
semctl$GETPID(r5, 0x2, 0x4, &(0x7f0000000600)=""/132)
semctl$GETPID(r5, 0x1, 0x4, &(0x7f00000006c0))
shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
semctl$GETPID(r0, 0x3, 0x4, &(0x7f0000000700)=""/96)
pipe2(&(0x7f0000000780)={<r9=>0xffffffffffffffff}, 0x1000000)
fcntl$getown(r9, 0x5)
setsockopt$sock_int(r9, 0xffff, 0x301f, &(0x7f00000007c0)=0x1f, 0x4)
semget(0x2, 0x1, 0x1)
wait4(r6, &(0x7f0000000800), 0x2, &(0x7f0000000840))
r10 = dup2(r9, r9)
semctl$GETZCNT(r1, 0x4, 0x7, &(0x7f0000000900)=""/144)
fchown(r10, r7, r8)
getsockopt$sock_cred(r10, 0xffff, 0x11, &(0x7f00000009c0),
&(0x7f0000000a00)=0xc)
06:29:04 executing program 5:
r0 = socket$unix(0x1, 0x2, 0x0)
link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00')
r1 = dup(r0)
sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
06:29:04 executing program 0:
r0 = msgget$private(0x0, 0x40)
msgsnd(r0,
&(0x7f0000000000)={0x3, "9e5babd9e6982ee7976757096a10014bba3b5a79d317d8b74bc2aeb6c38e1ecbd54dc10873eea3dc5d9655d9ee5aeeae1b53bfa0c6ed129d4f5f6ec6d0cd06e629d177421d204b6fba4ab6114122554c9448a0b57d51f665ac1efe6b336d0acfe41fa89f6a01c5d90dc1dc562301aebd39a892eb3c27756e38cf6357ba766784b142c62eb4c05d4e4a9d7ada5063c15008122709cf4380faed5cc4c96755c13e68ae77136822e7d7bbdf252d2cbbee01e6e8e1ef8c853b8e545bc4"},
0xc3, 0x800)
r1 = semget(0x3, 0x3, 0x4)
semctl$GETZCNT(r1, 0x3, 0x7, &(0x7f0000000100)=""/145)
pipe2(&(0x7f00000001c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff},
0x1400004)
pipe2(&(0x7f0000000280)={0xffffffffffffffff, <r4=>0xffffffffffffffff},
0x1000004)
fcntl$setflags(r2, 0x2, 0x1)
utimensat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x3f,
0x5}, {0x5, 0x8}}, 0x200)
pipe2(&(0x7f00000003c0)={0xffffffffffffffff, <r5=>0xffffffffffffffff},
0xfffffe)
read(r4, &(0x7f0000000400)=""/147, 0x93)
fchdir(r5)
pipe2(&(0x7f00000002c0)={<r6=>0xffffffffffffffff, <r7=>0xffffffffffffffff},
0x400000)
semget(0x3, 0x4, 0x698)
fchmod(r3, 0x12)
fchroot(r7)
msgrcv(r0, &(0x7f0000000300)={0x0, ""/145}, 0x99, 0x0, 0x1000)
pwritev(r5,
&(0x7f0000000540)=[{&(0x7f00000004c0)="d395cae33a14362ae0b45a3686ab8dc71c94808067a8ad7d040ee463c905c22d57e0f8bbaf127446785c1cd37c52a7033c76a6d3b87fa8c0e99d0f28b1d3b2658ac9267fac9133ed6192ede88466e4c46bd37799a19c67fa6f02be5eb615382bc2b49ca6fdc733",
0x67}], 0x1, 0x0)
getpeername$unix(r6, &(0x7f0000000580)=@file={0x0, ""/4096},
&(0x7f00000015c0)=0x1002)
06:29:04 executing program 4:
r0 = dup(0xffffffffffffffff)
sendto$inet(r0, &(0x7f0000000000)="6817605cbf674928ec", 0xfe48, 0x0, 0x0,
0x0)
r1 = socket(0x18, 0x3, 0x0)
connect$unix(r1, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c)
06:29:04 executing program 5:
r0 = socket$unix(0x1, 0x100000000001002, 0x0)
r1 = dup(r0)
sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
06:29:04 executing program 3:
r0 = semget(0x0, 0x2, 0x100)
semctl$GETZCNT(r0, 0x1, 0x7, &(0x7f0000000000)=""/176)
semget(0x3, 0x3, 0x402)
r1 = geteuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f00000000c0)={<r2=>0x0, 0x0, <r3=>0x0}, 0xc)
r4 = getuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f0000000100)={0x0, 0x0, <r5=>0x0}, 0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000140)={{0x1000, r1, r3, r4, r5,
0x92, 0x8}, 0x5, 0x20, 0x7})
r6 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0),
&(0x7f0000000200)=0xc)
sendmsg(r6, &(0x7f00000008c0)={&(0x7f0000000240)=@in6={0x18, 0x0,
0xfffffffffffffff7, 0x4}, 0xc,
&(0x7f0000000540)=[{&(0x7f00000004c0)="be1cbcad5f17fc8a409c162eef56c43b1427c10ad37b046057b9b2522c4341bb41c510f5de7976711d7bae61b182f5f517ce0f746d0f0a20c95c937824bdbe82222b619a6819ef3b",
0x48}], 0x1, 0x0}, 0x2)
getuid()
r7 = fcntl$dupfd(r6, 0xc, r6)
sendmsg(r7,
&(0x7f0000000d00)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0xa,
&(0x7f0000000a80)=[{&(0x7f0000000940)="bc2979", 0x3},
{&(0x7f0000000980)="84ec6f127e1623f8aa8fa07c9ebc0a6f40dfe8ba98761bf867ec69fcce85500ccade82b058e818b49e0b47e274ee75cee944e20fcbd8aaedbb9a5f8ef69cf0d5ba49e2ba6350074915d0522f38c7acba2c3bfc2eee2f2f1ed995d29a87cf80a19812f6f655ddd040131ac191573bde72d3050e21430cf8cd2460265fc88d1264552186ff2dfc5b324fa0f6da049d7147330bcdfa4b079d8b0b9a9483f46c2d704e041ad962ae0f2f5221c56bb964bd3134696f5483f3452cbfc3dcbe86459babd2c7ebf1d8cf10a1c24ac5cda611df9c1a705927cd774d810b9f713844aca7e1f9725642459e9106b3c0468f8ffe9a718416",
0xf2}], 0x2, &(0x7f0000000ac0)=[{0xd0, 0x100,
0x6, "3fcd14f569f252017dbc999341224e9de37d57f0cb7b45b2051a5dd68a7082d5310e1ec1d0867672d6ceecc70bbd503bd339baee461cd6dcb90a84c864654d317ace2fd217c9c4dc06b69c431422b19661d8dcfd74d8fa34aef1bdef74810a7a34d06328af8e7f37f846d1af871c3309ba5ef86f322ccf52ccc989b3f642c2f4c30e7f9c1f848fa8f54a9ba02a3555d8fbe13630afa094790340a67f7b1d24412142845fea7810f88d1633824b9334385a4fcc9e06d044ac2b244bfe849da818"},
{0xf0, 0xffff,
0x2, "4c11385e8609520456d1dc078aaaed55e67ae2f5a9aa3ad1cb8851754093d84399adecbc967f3655dabcaff7b8ed497671aa7ab464e6b254e837b94d1494e5e4b09e0f852718fd6dde3fb18804813407e0ee930ddeecdfaa5af857bfc8eb7c9faf38733b62645cab0df08dcd48c3d71e92b62a1ff6dfa2d7cb4f092730e9a2b49523e784a5688dbed2cecc1d0972c5bc0d87a41a4d47ef7b8bfbf3de3d913a8e318b79ba13b91dc125aa789ee5afcd7d0d6d3fd399e1a9c71a4584f0d7116c28e4b890dd08f08f68f72e7d638faa2a97c7252a9244c4f19300a7de8ed3"},
{0x50, 0x101,
0x5, "b34d1aa82fd223e9cd0a1a14d5d16c45c2f3e4a184bf45e6dd55c07c1aeb8fd43a2e96c8e570b65f28456b5e768e7f0d087f00b2032ca78184f2f358c21501"}],
0x210}, 0x0)
accept$unix(r7, &(0x7f0000000d40)=@abs, &(0x7f0000000d80)=0x8)
geteuid()
setsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f0000000dc0)={r2, r4, r5}, 0xc)
r8 = msgget$private(0x0, 0x1)
msgctl$IPC_STAT(r8, 0x2, &(0x7f0000000e00)=""/122)
r9 = fcntl$dupfd(r7, 0x0, r7)
r10 = getuid()
getsockopt$SO_PEERCRED(r9, 0xffff, 0x11, &(0x7f0000000e80), 0xc)
getpeername$inet6(r9, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000f40)={{0x9, r10, r5, r1, r5,
0x21, 0xed}, 0x8000, 0x61, 0x6614dd80})
06:29:04 executing program 2:
r0 = semget(0x2, 0x3, 0x100)
semctl$IPC_RMID(r0, 0x0, 0x0)
r1 = semget(0x0, 0x3, 0x400)
pipe2(&(0x7f0000000000)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff},
0x1400004)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000040)={0x0, <r4=>0x0},
&(0x7f0000000080)=0xc)
r5 = semget$private(0x0, 0x1, 0x80)
getsockname$inet6(r3, &(0x7f00000000c0), &(0x7f0000000100)=0xc)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000140)={<r6=>0x0,
<r7=>0x0}, &(0x7f0000000180)=0xc)
semctl$IPC_RMID(r5, 0x0, 0x0)
semctl$GETZCNT(r0, 0x0, 0x7, &(0x7f00000001c0)=""/205)
fsync(r2)
getsockopt$sock_cred(r2, 0xffff, 0x11, &(0x7f00000002c0)={0x0, 0x0,
<r8=>0x0}, &(0x7f0000000300)=0xc)
semop(r0, &(0x7f0000000340)=[{0x4, 0x5, 0x1800}, {0x2, 0x3, 0x1800}, {0x3,
0x80000000, 0x1800}, {0x3, 0x7, 0x1000}, {0x1, 0x0, 0x800}], 0x5)
setsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000380)={r6, r4, r8}, 0xc)
semctl$GETPID(r5, 0x7, 0x4, &(0x7f00000003c0)=""/76)
setsockopt$sock_linger(r3, 0xffff, 0x80, &(0x7f0000000440)={0x5}, 0x8)
writev(r3,
&(0x7f00000005c0)=[{&(0x7f0000000500)="d1c0e0dc2dfa6d7c71fca183ac0011968f49ce90083667bdd98cbdb75942c95566690cb81e001a24aabe89cf688a2aba3eb2f35d700960bd8126a477d93d1a857e74a9103652c05678b51615524dfd95ec145a9f41857f4633af7b30a959ab716ac5622cc081d4ad87c24c7c97f61bd43b66fba7558904c435a38ce00595ac33ed1f99ec55c1b7ebb568c8b7cb44c46432463f96a01bba4d29c48f25d1dcc8e143a999f19235215ea0a37d5e5e4c10d59d11c298781b",
0xb6}], 0x1)
semctl$GETPID(r5, 0x2, 0x4, &(0x7f0000000600)=""/132)
semctl$GETPID(r5, 0x1, 0x4, &(0x7f00000006c0))
shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
semctl$GETPID(r0, 0x3, 0x4, &(0x7f0000000700)=""/96)
pipe2(&(0x7f0000000780)={<r9=>0xffffffffffffffff}, 0x1000000)
fcntl$getown(r9, 0x5)
setsockopt$sock_int(r9, 0xffff, 0x301f, &(0x7f00000007c0)=0x1f, 0x4)
semget(0x2, 0x1, 0x1)
wait4(r6, &(0x7f0000000800), 0x2, &(0x7f0000000840))
r10 = dup2(r9, r9)
semctl$GETZCNT(r1, 0x4, 0x7, &(0x7f0000000900)=""/144)
fchown(r10, r7, r8)
getsockopt$sock_cred(r10, 0xffff, 0x11, &(0x7f00000009c0),
&(0x7f0000000a00)=0xc)
06:29:04 executing program 5:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = dup(r0)
mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000)
sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
read(r1, &(0x7f0000000000)=""/104, 0x68)
[ 136.4296681] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 136.4344936] #14 0xffffffff80265c1e in syscall <netbsd>
06:29:04 executing program 4:
sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="6817605cbf674928ec",
0x9, 0x0, 0x0, 0x0)
r0 = socket(0x18, 0x3, 0x0)
connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c)
open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x24)
06:29:04 executing program 0:
r0 = msgget$private(0x0, 0x40)
msgsnd(r0,
&(0x7f00000003c0)=ANY=[@ANYBLOB="030000000000976757096a10014bba3b5a79d317d8b74bc2aeb6c38e1ecbd54dc10873eea3dc5d9655d9ee5aeeae1b53bfa0c6ed129d4f5f6ec6d0cd06e629d177421d204b6fba4ab6114122554c9448a0b57d51f665ac1efe6b336d0acfe41fa89f6a01c5d90dc1dc562301aebd39a892eb3c27756e38cf6357ba760500b142c62eb4c05d4380faed5cc4c96755c13e68ae77136822e7d7bbdf252d2cbbee01e6e8e1ef8c42e672853b8e545bc437a2fa3e98fcaa008418809e2d675cfec91e949054684700000000000000000000a62cd7d20000000000000000000000000000"],
0xc3, 0x800)
r1 = semget(0x3, 0x3, 0x4)
semctl$GETZCNT(r1, 0x3, 0x7, &(0x7f0000000100)=""/145)
pipe2(&(0x7f00000001c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff},
0x1400004)
fcntl$setflags(r2, 0x2, 0x1)
utimensat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x3f,
0x5}, {0x5, 0x8}}, 0x200)
pipe2(&(0x7f0000000280)={0xffffffffffffffff, <r4=>0xffffffffffffffff},
0x1000000)
fchdir(r4)
pipe2(&(0x7f00000002c0)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff},
0x400000)
semget(0x3, 0x4, 0x698)
fchmod(r3, 0x12)
fchroot(r6)
msgrcv(r0, &(0x7f0000000300)={0x0, ""/145}, 0x99, 0x0, 0x1000)
pwritev(r4,
&(0x7f0000000540)=[{&(0x7f00000004c0)="d395cae33a14362ae0b45a3686ab8dc71c94808067a8ad7d040ee463c905c22d57e0f8bbaf127446785c1cd37c52a7033c76a6d3b87fa8c0e99d0f28b1d3b2658ac9267fac9133ed6192ede88466e4c46bd37799a19c67fa6f02be5eb615382bc2b49ca6fdc733",
0x67}], 0x1, 0x0)
getpeername$unix(r5, &(0x7f0000000580)=@file={0x0, ""/4096},
&(0x7f00000015c0)=0x1002)
06:29:04 executing program 3:
r0 = semget(0x0, 0x2, 0x100)
semctl$GETZCNT(r0, 0x1, 0x7, &(0x7f0000000000)=""/176)
semget(0x3, 0x3, 0x402)
r1 = geteuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f00000000c0)={<r2=>0x0, 0x0, <r3=>0x0}, 0xc)
r4 = getuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f0000000100)={0x0, 0x0, <r5=>0x0}, 0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000140)={{0x1000, r1, r3, r4, r5,
0x92, 0x8}, 0x5, 0x20, 0x7})
r6 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0),
&(0x7f0000000200)=0xc)
sendmsg(r6, &(0x7f00000008c0)={&(0x7f0000000240)=@in6={0x18, 0x0,
0xfffffffffffffff7, 0x4}, 0xc,
&(0x7f0000000540)=[{&(0x7f00000004c0)="be1cbcad5f17fc8a409c162eef56c43b1427c10ad37b046057b9b2522c4341bb41c510f5de7976711d7bae61b182f5f517ce0f746d0f0a20c95c937824bdbe82222b619a6819ef3b",
0x48}], 0x1, 0x0}, 0x0)
getuid()
r7 = fcntl$dupfd(r6, 0xc, r6)
sendmsg(r7,
&(0x7f0000000d00)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0xa,
&(0x7f0000000a80)=[{&(0x7f0000000940)="bc2979", 0x3},
{&(0x7f0000000980)="84ec6f127e1623f8aa8fa07c9ebc0a6f40dfe8ba98761bf867ec69fcce85500ccade82b058e818b49e0b47e274ee75cee944e20fcbd8aaedbb9a5f8ef69cf0d5ba49e2ba6350074915d0522f38c7acba2c3bfc2eee2f2f1ed995d29a87cf80a19812f6f655ddd040131ac191573bde72d3050e21430cf8cd2460265fc88d1264552186ff2dfc5b324fa0f6da049d7147330bcdfa4b079d8b0b9a9483f46c2d704e041ad962ae0f2f5221c56bb964bd3134696f5483f3452cbfc3dcbe86459babd2c7ebf1d8cf10a1c24ac5cda611df9c1a705927cd774d810b9f713844aca7e1f9725642459e9106b3c0468f8ffe9a718416",
0xf2}], 0x2, &(0x7f0000000ac0)=[{0xd0, 0x100,
0x6, "3fcd14f569f252017dbc999341224e9de37d57f0cb7b45b2051a5dd68a7082d5310e1ec1d0867672d6ceecc70bbd503bd339baee461cd6dcb90a84c864654d317ace2fd217c9c4dc06b69c431422b19661d8dcfd74d8fa34aef1bdef74810a7a34d06328af8e7f37f846d1af871c3309ba5ef86f322ccf52ccc989b3f642c2f4c30e7f9c1f848fa8f54a9ba02a3555d8fbe13630afa094790340a67f7b1d24412142845fea7810f88d1633824b9334385a4fcc9e06d044ac2b244bfe849da818"},
{0xf0, 0xffff,
0x2, "4c11385e8609520456d1dc078aaaed55e67ae2f5a9aa3ad1cb8851754093d84399adecbc967f3655dabcaff7b8ed497671aa7ab464e6b254e837b94d1494e5e4b09e0f852718fd6dde3fb18804813407e0ee930ddeecdfaa5af857bfc8eb7c9faf38733b62645cab0df08dcd48c3d71e92b62a1ff6dfa2d7cb4f092730e9a2b49523e784a5688dbed2cecc1d0972c5bc0d87a41a4d47ef7b8bfbf3de3d913a8e318b79ba13b91dc125aa789ee5afcd7d0d6d3fd399e1a9c71a4584f0d7116c28e4b890dd08f08f68f72e7d638faa2a97c7252a9244c4f19300a7de8ed3"},
{0x50, 0x101,
0x5, "b34d1aa82fd223e9cd0a1a14d5d16c45c2f3e4a184bf45e6dd55c07c1aeb8fd43a2e96c8e570b65f28456b5e768e7f0d087f00b2032ca78184f2f358c21501"}],
0x210}, 0x0)
accept$unix(r7, &(0x7f0000000d40)=@abs, &(0x7f0000000d80)=0x8)
geteuid()
setsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f0000000dc0)={r2, r4, r5}, 0xc)
r8 = msgget$private(0x0, 0x1)
msgctl$IPC_STAT(r8, 0x2, &(0x7f0000000e00)=""/122)
r9 = fcntl$dupfd(r7, 0x0, r7)
r10 = getuid()
getsockopt$SO_PEERCRED(r9, 0xffff, 0x11, &(0x7f0000000e80), 0xc)
getpeername$inet6(r9, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000f40)={{0x9, r10, r5, r1, r5,
0x21, 0xed}, 0x8000, 0x61, 0x6614dd80})
06:29:05 executing program 0:
r0 = msgget$private(0x0, 0x40)
msgsnd(r0,
&(0x7f0000000000)={0x3, "9e5babd9e6982ee7976757096a10014bba3b5a79d317d8b74bc2aeb6c38e1ecbd54dc10873eea3dc5d9655d9ee5aeeae1b53bfa0c6ed129d4f5f6ec6d0cd06e629d177421d204b6fba4ab6114122554c9448a0b57d51f665ac1efe6b336d0acfe41fa89f6a01c5d90dc1dc562301aebd39a892eb3c27756e38cf6357ba766784b142c62eb4c05d4e4a9d7ada5063c15008122709cf4380faed5cc4c96755c13e68ae77136822e7d7bbdf252d2cbbee01e6e8e1ef8c853b8e545bc4"},
0xc3, 0x800)
r1 = semget(0x3, 0x3, 0x4)
r2 = socket(0x1e, 0x60000002, 0x4)
fcntl$setstatus(r2, 0x4, 0x1020000)
semctl$GETZCNT(r1, 0x3, 0x7, &(0x7f0000000100)=""/145)
pipe2(&(0x7f00000001c0)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff},
0x1400004)
fcntl$setflags(r3, 0x2, 0x1)
utimensat(r3, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x3f,
0x5}, {0x5, 0x8}}, 0x200)
pipe2(&(0x7f0000000280)={0xffffffffffffffff, <r5=>0xffffffffffffffff},
0x1000000)
pwritev(r3,
&(0x7f0000001600)=[{&(0x7f00000003c0)="9ed703d3778fb1b299c1bafedeabe8e1602c3353c3446484f1f6057be2f5f225bda8995b20c24206e01777e0a898fae615757825dc220b210d6d8352b4a08c1ac1ed316ccb0cf8fff2b1e3fba095a6ae6aace4aa4db66bf112e85f9b171264bd6ac55691c619e95a367a8323a81fcaf64455ba10b9c65da15b36b9af9146ce6566ed6816120947a4e6f19c9e68786b131d96592ada978abf333aefa34bedcf054946be9d6bbc8dcb11abbbb05bca4c5818e3944555ad06eea7f7c16315b316b62cee4993f5c728f1c984789cdfa29c3dcd3325ba5ee35852ec1e3523cdab46f0f6f112b87049458b22f55a357f",
0xed}], 0x1, 0x0)
fchdir(r5)
pipe2(&(0x7f00000002c0)={<r6=>0xffffffffffffffff, <r7=>0xffffffffffffffff},
0x400000)
semget(0x3, 0x4, 0x698)
fchmod(r4, 0x12)
semget$private(0x0, 0x0, 0x81)
fchroot(r7)
msgrcv(r0, &(0x7f0000000300)={0x0, ""/145}, 0x99, 0x0, 0x1000)
pwritev(r5,
&(0x7f0000000540)=[{&(0x7f00000004c0)="d395cae33a14362ae0b45a3686ab8dc71c94808067a8ad7d040ee463c905c22d57e0f8bbaf127446785c1cd37c52a7033c76a6d3b87fa8c0e99d0f28b1d3b2658ac9267fac9133ed6192ede88466e4c46bd37799a19c67fa6f02be5eb615382bc2b49ca6fdc733",
0x67}], 0x1, 0x0)
getpeername$unix(r6, &(0x7f0000000580)=@file={0x0, ""/4096},
&(0x7f00000015c0)=0x1002)
06:29:05 executing program 3:
r0 = semget(0x0, 0x2, 0x100)
semctl$GETZCNT(r0, 0x1, 0x7, &(0x7f0000000000)=""/176)
semget(0x3, 0x3, 0x402)
r1 = geteuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f00000000c0)={<r2=>0x0, 0x0, <r3=>0x0}, 0xc)
r4 = getuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f0000000100)={0x0, 0x0, <r5=>0x0}, 0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000140)={{0x1000, r1, r3, r4, r5,
0x92, 0x8}, 0x5, 0x20, 0x7})
r6 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0),
&(0x7f0000000200)=0xc)
sendmsg(r6, &(0x7f00000008c0)={&(0x7f0000000240)=@in6={0x18, 0x0,
0xfffffffffffffff7, 0x4}, 0xc,
&(0x7f0000000540)=[{&(0x7f00000004c0)="be1cbcad5f17fc8a409c162eef56c43b1427c10ad37b046057b9b2522c4341bb41c510f5de7976711d7bae61b182f5f517ce0f746d0f0a20c95c937824bdbe82222b619a6819ef3b",
0x48}], 0x1, 0x0}, 0x0)
getuid()
r7 = fcntl$dupfd(r6, 0xc, r6)
sendmsg(r7,
&(0x7f0000000d00)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0xa,
&(0x7f0000000a80)=[{&(0x7f0000000940)="bc2979", 0x3},
{&(0x7f0000000980)="84ec6f127e1623f8aa8fa07c9ebc0a6f40dfe8ba98761bf867ec69fcce85500ccade82b058e818b49e0b47e274ee75cee944e20fcbd8aaedbb9a5f8ef69cf0d5ba49e2ba6350074915d0522f38c7acba2c3bfc2eee2f2f1ed995d29a87cf80a19812f6f655ddd040131ac191573bde72d3050e21430cf8cd2460265fc88d1264552186ff2dfc5b324fa0f6da049d7147330bcdfa4b079d8b0b9a9483f46c2d704e041ad962ae0f2f5221c56bb964bd3134696f5483f3452cbfc3dcbe86459babd2c7ebf1d8cf10a1c24ac5cda611df9c1a705927cd774d810b9f713844aca7e1f9725642459e9106b3c0468f8ffe9a718416",
0xf2}], 0x2, &(0x7f0000000ac0)=[{0xd0, 0x100,
0x6, "3fcd14f569f252017dbc999341224e9de37d57f0cb7b45b2051a5dd68a7082d5310e1ec1d0867672d6ceecc70bbd503bd339baee461cd6dcb90a84c864654d317ace2fd217c9c4dc06b69c431422b19661d8dcfd74d8fa34aef1bdef74810a7a34d06328af8e7f37f846d1af871c3309ba5ef86f322ccf52ccc989b3f642c2f4c30e7f9c1f848fa8f54a9ba02a3555d8fbe13630afa094790340a67f7b1d24412142845fea7810f88d1633824b9334385a4fcc9e06d044ac2b244bfe849da818"},
{0xf0, 0xffff,
0x2, "4c11385e8609520456d1dc078aaaed55e67ae2f5a9aa3ad1cb8851754093d84399adecbc967f3655dabcaff7b8ed497671aa7ab464e6b254e837b94d1494e5e4b09e0f852718fd6dde3fb18804813407e0ee930ddeecdfaa5af857bfc8eb7c9faf38733b62645cab0df08dcd48c3d71e92b62a1ff6dfa2d7cb4f092730e9a2b49523e784a5688dbed2cecc1d0972c5bc0d87a41a4d47ef7b8bfbf3de3d913a8e318b79ba13b91dc125aa789ee5afcd7d0d6d3fd399e1a9c71a4584f0d7116c28e4b890dd08f08f68f72e7d638faa2a97c7252a9244c4f19300a7de8ed3"},
{0x50, 0x101,
0x5, "b34d1aa82fd223e9cd0a1a14d5d16c45c2f3e4a184bf45e6dd55c07c1aeb8fd43a2e96c8e570b65f28456b5e768e7f0d087f00b2032ca78184f2f358c21501"}],
0x210}, 0x0)
accept$unix(r7, &(0x7f0000000d40)=@abs, &(0x7f0000000d80)=0x8)
geteuid()
setsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f0000000dc0)={r2, r4, r5}, 0xc)
r8 = msgget$private(0x0, 0x1)
msgctl$IPC_STAT(r8, 0x2, &(0x7f0000000e00)=""/122)
r9 = fcntl$dupfd(r7, 0x0, r7)
r10 = getuid()
getsockopt$SO_PEERCRED(r9, 0xffff, 0x11, &(0x7f0000000e80), 0xc)
getpeername$inet6(r9, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000f40)={{0x9, r10, r5, r1, r5,
0x21, 0xed}, 0x8000, 0x61, 0x6614dd80})
06:29:05 executing program 4:
sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="6817605cbf674928ec",
0x9, 0x0, 0x0, 0x0)
r0 = socket(0x18, 0x3, 0x0)
connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c)
r1 = semget$private(0x0, 0x3, 0x0)
semctl$SETALL(r1, 0x0, 0x9, &(0x7f0000000000)=[0xfffffffffffffffa, 0x2])
06:29:05 executing program 2:
r0 = semget(0x2, 0x3, 0x100)
semctl$IPC_RMID(r0, 0x0, 0x0)
r1 = semget(0x0, 0x3, 0x400)
pipe2(&(0x7f0000000000)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff},
0x1400004)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000040)={0x0, <r4=>0x0},
&(0x7f0000000080)=0xc)
r5 = semget$private(0x0, 0x1, 0x80)
getsockname$inet6(r3, &(0x7f00000000c0), &(0x7f0000000100)=0xc)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000140)={<r6=>0x0,
<r7=>0x0}, &(0x7f0000000180)=0xc)
semctl$IPC_RMID(r5, 0x0, 0x0)
semctl$GETZCNT(r0, 0x0, 0x7, &(0x7f00000001c0)=""/205)
fsync(r2)
getsockopt$sock_cred(r2, 0xffff, 0x11, &(0x7f00000002c0)={0x0, 0x0,
<r8=>0x0}, &(0x7f0000000300)=0xc)
semop(r0, &(0x7f0000000340)=[{0x4, 0x5, 0x1800}, {0x2, 0x3, 0x1800}, {0x3,
0x80000000, 0x1800}, {0x3, 0x7, 0x1000}, {0x1, 0x0, 0x800}], 0x5)
setsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000380)={r6, r4, r8}, 0xc)
semctl$GETPID(r5, 0x7, 0x4, &(0x7f00000003c0)=""/76)
setsockopt$sock_linger(r3, 0xffff, 0x80, &(0x7f0000000440)={0x5}, 0x8)
writev(r3,
&(0x7f00000005c0)=[{&(0x7f0000000500)="d1c0e0dc2dfa6d7c71fca183ac0011968f49ce90083667bdd98cbdb75942c95566690cb81e001a24aabe89cf688a2aba3eb2f35d700960bd8126a477d93d1a857e74a9103652c05678b51615524dfd95ec145a9f41857f4633af7b30a959ab716ac5622cc081d4ad87c24c7c97f61bd43b66fba7558904c435a38ce00595ac33ed1f99ec55c1b7ebb568c8b7cb44c46432463f96a01bba4d29c48f25d1dcc8e143a999f19235215ea0a37d5e5e4c10d59d11c298781b",
0xb6}], 0x1)
semctl$GETPID(r5, 0x2, 0x4, &(0x7f0000000600)=""/132)
semctl$GETPID(r5, 0x1, 0x4, &(0x7f00000006c0))
shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
semctl$GETPID(r0, 0x3, 0x4, &(0x7f0000000700)=""/96)
pipe2(&(0x7f0000000780)={<r9=>0xffffffffffffffff}, 0x1000000)
fcntl$getown(r9, 0x5)
setsockopt$sock_int(r9, 0xffff, 0x301f, &(0x7f00000007c0)=0x1f, 0x4)
semget(0x2, 0x1, 0x1)
wait4(r6, &(0x7f0000000800), 0x2, &(0x7f0000000840))
r10 = dup2(r9, r9)
semctl$GETZCNT(r1, 0x4, 0x7, &(0x7f0000000900)=""/144)
fchown(r10, r7, r8)
getsockopt$sock_cred(r10, 0xffff, 0x11, &(0x7f00000009c0),
&(0x7f0000000a00)=0xc)
06:29:05 executing program 1:
r0 = paccept(0xffffffffffffffff, &(0x7f0000000000)=@un=@file={0x0, ""/67},
&(0x7f0000000080)=0x45, 0xac159c788919e7bc)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
pwritev(r1,
&(0x7f0000000100)=[{&(0x7f00000000c0)="1104a0cf3592bf2bebf5e08a84e91dd3c684d4288cd6dd5cb535d4",
0x1b}], 0x1, 0x0)
getdents(r1, &(0x7f0000000140)=""/89, 0x59)
mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x10, r1, 0x0, 0x0)
r2 = semget$private(0x0, 0x2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x90, r1, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
getpeername(r0, &(0x7f00000001c0)=@in, &(0x7f0000000200)=0xc)
getdents(r1, &(0x7f0000000240)=""/4096, 0x1000)
semctl$GETNCNT(r2, 0x3, 0x3, &(0x7f0000001240)=""/219)
execve(&(0x7f0000001340)='./file0\x00',
&(0x7f00000014c0)=[&(0x7f0000001380)='-\x00', &(0x7f00000013c0)='\x00',
&(0x7f0000001400)='\\#!\x00', &(0x7f0000001440)='![&}.\x00',
&(0x7f0000001480)='@\x00'],
&(0x7f00000015c0)=[&(0x7f0000001500)='-\'[:$\x00',
&(0x7f0000001540)='\x00', &(0x7f0000001580)='\x00'])
r3 = dup(r0)
flock(r3, 0x3)
semget(0x3, 0x1, 0x100)
fchmodat(r3, &(0x7f0000001600)='./file0\x00', 0x110, 0x600)
symlink(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='./file0\x00')
semctl$SETVAL(r2, 0x6, 0x8, &(0x7f00000016c0)=0xfffffffffffffeff)
ftruncate(r1, 0x1)
getsockname$inet(r3, &(0x7f0000001700), &(0x7f0000001740)=0xc)
poll(&(0x7f0000001780)=[{r1, 0x20}, {r1, 0x20}, {r3, 0x8}, {r0, 0x40}],
0x4, 0xffff)
recvfrom$inet(r3, &(0x7f00000017c0)=""/81, 0x51, 0x2,
&(0x7f0000001840)={0x2, 0x3}, 0xc)
bind$unix(r3, &(0x7f0000001880)=@abs={0x0, 0x0, 0x0}, 0x8)
r4 = fcntl$getown(r1, 0x5)
fcntl$lock(r1, 0x7, &(0x7f00000018c0)={0x1, 0x3, 0x808, 0x1f, r4})
sendto$unix(r3,
&(0x7f0000001900)="7880d2895506d4b1e50d0bb381f4951302f678b2402dc8ebb55842e8ebafb06e4832e46e2f95af7865658231462f661f63794c2fb190f3f7b05ec111dfd8740057beedb3",
0x44, 0x0, &(0x7f0000001980)=@file={0x1, './file0\x00'}, 0xa)
semget(0x1, 0x3, 0x80)
getsockopt$SO_PEERCRED(r0, 0xffff, 0x11, &(0x7f00000019c0), 0xc)
renameat(r3, &(0x7f0000001a00)='./file0\x00', r1,
&(0x7f0000001a40)='./file1\x00')
06:29:05 executing program 4:
sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="6817605cbf674928ec",
0x9, 0x0, 0x0, 0x0)
r0 = socket(0x18, 0x3, 0x0)
connect$unix(r0, &(0x7f0000000000)=@abs={0x682eb13985c518e6, 0x7}, 0x8)
06:29:05 executing program 3:
r0 = semget(0x0, 0x2, 0x100)
semctl$GETZCNT(r0, 0x1, 0x7, &(0x7f0000000000)=""/176)
semget(0x3, 0x3, 0x402)
r1 = geteuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f00000000c0)={<r2=>0x0, 0x0, <r3=>0x0}, 0xc)
r4 = getuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f0000000100)={0x0, 0x0, <r5=>0x0}, 0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000140)={{0x1000, r1, r3, r4, r5,
0x92, 0x8}, 0x5, 0x20, 0x7})
r6 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0),
&(0x7f0000000200)=0xc)
sendmsg(r6, &(0x7f00000008c0)={&(0x7f0000000240)=@in6={0x18, 0x0,
0xfffffffffffffff7, 0x4}, 0xc,
&(0x7f0000000540)=[{&(0x7f00000004c0)="be1cbcad5f17fc8a409c162eef56c43b1427c10ad37b046057b9b2522c4341bb41c510f5de7976711d7bae61b182f5f517ce0f746d0f0a20c95c937824bdbe82222b619a6819ef3b",
0x48}], 0x1, 0x0}, 0x0)
getuid()
r7 = fcntl$dupfd(r6, 0xc, r6)
sendmsg(r7,
&(0x7f0000000d00)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0xa,
&(0x7f0000000a80)=[{&(0x7f0000000940)="bc2979", 0x3},
{&(0x7f0000000980)="84ec6f127e1623f8aa8fa07c9ebc0a6f40dfe8ba98761bf867ec69fcce85500ccade82b058e818b49e0b47e274ee75cee944e20fcbd8aaedbb9a5f8ef69cf0d5ba49e2ba6350074915d0522f38c7acba2c3bfc2eee2f2f1ed995d29a87cf80a19812f6f655ddd040131ac191573bde72d3050e21430cf8cd2460265fc88d1264552186ff2dfc5b324fa0f6da049d7147330bcdfa4b079d8b0b9a9483f46c2d704e041ad962ae0f2f5221c56bb964bd3134696f5483f3452cbfc3dcbe86459babd2c7ebf1d8cf10a1c24ac5cda611df9c1a705927cd774d810b9f713844aca7e1f9725642459e9106b3c0468f8ffe9a718416",
0xf2}], 0x2, &(0x7f0000000ac0)=[{0xd0, 0x100,
0x6, "3fcd14f569f252017dbc999341224e9de37d57f0cb7b45b2051a5dd68a7082d5310e1ec1d0867672d6ceecc70bbd503bd339baee461cd6dcb90a84c864654d317ace2fd217c9c4dc06b69c431422b19661d8dcfd74d8fa34aef1bdef74810a7a34d06328af8e7f37f846d1af871c3309ba5ef86f322ccf52ccc989b3f642c2f4c30e7f9c1f848fa8f54a9ba02a3555d8fbe13630afa094790340a67f7b1d24412142845fea7810f88d1633824b9334385a4fcc9e06d044ac2b244bfe849da818"},
{0xf0, 0xffff,
0x2, "4c11385e8609520456d1dc078aaaed55e67ae2f5a9aa3ad1cb8851754093d84399adecbc967f3655dabcaff7b8ed497671aa7ab464e6b254e837b94d1494e5e4b09e0f852718fd6dde3fb18804813407e0ee930ddeecdfaa5af857bfc8eb7c9faf38733b62645cab0df08dcd48c3d71e92b62a1ff6dfa2d7cb4f092730e9a2b49523e784a5688dbed2cecc1d0972c5bc0d87a41a4d47ef7b8bfbf3de3d913a8e318b79ba13b91dc125aa789ee5afcd7d0d6d3fd399e1a9c71a4584f0d7116c28e4b890dd08f08f68f72e7d638faa2a97c7252a9244c4f19300a7de8ed3"},
{0x50, 0x101,
0x5, "b34d1aa82fd223e9cd0a1a14d5d16c45c2f3e4a184bf45e6dd55c07c1aeb8fd43a2e96c8e570b65f28456b5e768e7f0d087f00b2032ca78184f2f358c21501"}],
0x210}, 0x0)
accept$unix(r7, &(0x7f0000000d40)=@abs, &(0x7f0000000d80)=0x8)
geteuid()
setsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f0000000dc0)={r2, r4, r5}, 0xc)
r8 = msgget$private(0x0, 0x1)
msgctl$IPC_STAT(r8, 0x2, &(0x7f0000000e00)=""/122)
r9 = fcntl$dupfd(r7, 0x0, r7)
r10 = getuid()
getsockopt$SO_PEERCRED(r9, 0xffff, 0x11, &(0x7f0000000e80), 0xc)
getpeername$inet6(r9, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000f40)={{0x9, r10, r5, r1, r5,
0x21, 0xed}, 0x8000, 0x61, 0x6614dd80})
06:29:05 executing program 0:
r0 = msgget$private(0x0, 0x40)
msgsnd(r0,
&(0x7f0000000000)={0x3, "9e5babd9e6982ee7976757096a10014bba3b5a79d317d8b74bc2aeb6c38e1ecbd54dc10873eea3dc5d9655d9ee5aeeae1b53bfa0c6ed129d4f5f6ec6d0cd06e629d177421d204b6fba4ab6114122554c9448a0b57d51f665ac1efe6b336d0acfe41fa89f6a01c5d90dc1dc562301aebd39a892eb3c27756e38cf6357ba766784b142c62eb4c05d4e4a9d7ada5063c15008122709cf4380faed5cc4c96755c13e68ae77136822e7d7bbdf252d2cbbee01e6e8e1ef8c853b8e545bc4"},
0xc3, 0x800)
r1 = semget(0x3, 0x3, 0x4)
semctl$GETZCNT(r1, 0x3, 0x7, &(0x7f0000000100)=""/145)
pipe2(&(0x7f00000001c0)={<r2=>0xffffffffffffffff}, 0x1400004)
fcntl$setflags(r2, 0x2, 0x1)
utimensat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x3f,
0x5}, {0x5, 0x8}}, 0x200)
pipe2(&(0x7f0000000280)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff},
0x1000000)
fchdir(r4)
connect$unix(r3, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0xa)
pipe2(&(0x7f00000002c0)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff},
0x400000)
semget(0x3, 0x4, 0x698)
fchmod(r6, 0x12)
fchroot(r6)
msgrcv(r0, &(0x7f0000000300)={0x0, ""/145}, 0x99, 0x0, 0x1000)
pwritev(r4,
&(0x7f0000000540)=[{&(0x7f00000004c0)="d395cae33a14362ae0b45a3686ab8dc71c94808067a8ad7d040ee463c905c22d57e0f8bbaf127446785c1cd37c52a7033c76a6d3b87fa8c0e99d0f28b1d3b2658ac9267fac9133ed6192ede88466e4c46bd37799a19c67fa6f02be5eb615382bc2b49ca6fdc733",
0x67}], 0x1, 0x0)
getpeername$unix(r5, &(0x7f0000000580)=@file={0x0, ""/4096},
&(0x7f00000015c0)=0x1002)
06:29:05 executing program 5:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = open(&(0x7f0000001040)='./file0\x00', 0x0, 0x21)
getsockopt$sock_cred(r0, 0xffff, 0x11, &(0x7f0000001080)={<r2=>0x0},
&(0x7f00000010c0)=0xc)
fcntl$setown(r1, 0x6, r2)
r3 = dup(r0)
sendto$inet6(r3,
&(0x7f0000000000)="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
---
This bug is generated by a bot. It may contain errors.
See
https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at
syzk...@googlegroups.com.
syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with
syzbot.