ASan bug (2)

3 views
Skip to first unread message

syzbot

unread,
Feb 24, 2019, 2:44:06 PM2/24/19
to syzkaller-...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 11eef5b2ee47 Clear per-lwp entries whose mount is gone bef..
git tree: netbsd
console output: https://syzkaller.appspot.com/x/log.txt?x=13483948c00000
dashboard link: https://syzkaller.appspot.com/bug?extid=0b9692ae0f49f93b7dc7

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+0b9692...@syzkaller.appspotmail.com

login: [ 133.0828479] ASan: Unauthorized Access In 0xffffffff80a7f51e: Addr
0xffff920012ed35d4 [4 bytes, read, RedZonePartial]
[ 133.0924945] #0 0xffffffff80a7f51e in in6_print <netbsd>
[ 133.0924945] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.0985923] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.1021765] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.1021765] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.1090254] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.1124449] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.1214289] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.1289961] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.1371350] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.1455398] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.1536718] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.1611820] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.1698627] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.1792983] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.1862483] ASan: Unauthorized Access In 0xffffffff80a7f9ec: Addr
0xffff920012ed35d8 [4 bytes, read, RedZone]
[ 133.1986333] #0 0xffffffff80a7f9ec in in6_print <netbsd>
[ 133.2063160] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.2140351] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.2226987] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.2307787] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.2387424] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.2470396] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.2564569] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.2636549] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.2717619] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.2805710] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.2882838] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.2957292] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.3046822] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.3130214] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.3210118] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d4 [2 bytes, read, RedZonePartial]
[ 133.3341396] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 133.3418222] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.3495694] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.3580780] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.3673749] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.3744321] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.3825981] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.3914871] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.3991507] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.4072271] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.4156028] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.4239925] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.4314291] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.4400564] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.4493619] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.4563531] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d6 [2 bytes, read, RedZonePartial]
[ 133.4694773] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 133.4782920] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.4849636] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.4935280] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.5024108] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.5098515] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.5180567] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.5265181] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.5346631] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.5428319] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.5507095] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.5602751] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.5667957] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.5754259] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.5843871] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.5917684] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d8 [2 bytes, read, RedZone]
[ 133.6041311] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 133.6118262] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.6196141] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.6281375] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.6374423] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.6443672] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.6525554] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.6615478] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.6691459] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.6772683] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.6856618] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.6938320] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.7012332] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.7098545] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.7181996] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.7261541] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35da [2 bytes, read, RedZone]
[ 133.7387082] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 133.7462089] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.7540123] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.7628209] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.7707777] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.7787337] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.7869334] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.7952504] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.8035307] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.8116624] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.8206904] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.8282463] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.8357779] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.8448070] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.8527131] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.8606697] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35dc [2 bytes, read, RedZone]
[ 133.8737427] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 133.8808306] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 133.8886178] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 133.8978509] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 133.9053176] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 133.9133119] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 133.9219637] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 133.9298037] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 133.9380931] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 133.9461703] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 133.9540706] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 133.9627337] #11 0xffffffff80f603ca in sosend <netbsd>
[ 133.9701868] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 133.9798345] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 133.9871533] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 133.9951713] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35de [2 bytes, read, RedZone]
[ 134.0087688] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 134.0154881] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 134.0232645] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 134.0328797] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 134.0401281] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 134.0481321] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 134.0569935] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 134.0647944] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.0730782] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.0811565] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.0890012] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.0976219] #11 0xffffffff80f603ca in sosend <netbsd>
[ 134.1052192] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.1148722] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.1220319] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.1300245] sockaddr_checklen: 0xffff920012ed35c8 bad len af=24
socklen=12 len=28 [inet6: ::]
[ 134.1406529] sockaddr_checklen: 0xffff92016f10f070 bad len af=24
socklen=12 len=28 [inet6: [100:100::9800:0:0:0]:20018]
[ 134.1539954] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35da [1 byte, read, RedZone]
[ 134.1662495] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 134.1738756] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 134.1823784] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 134.1920236] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 134.1997283] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 134.2080456] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.2163420] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.2244268] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.2323636] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.2408733] #9 0xffffffff80f603ca in sosend <netbsd>
[ 134.2482632] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.2569364] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.2652672] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.2740053] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 134.2815443] #14 0xffffffff80265c1e in syscall <netbsd>
[ 134.2890775] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35dc [1 byte, read, RedZone]
[ 134.3013164] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 134.3088586] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 134.3174080] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 134.3270538] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 134.3346784] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 134.3429787] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.3514793] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.3612003] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.3683332] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.3768805] #9 0xffffffff80f603ca in sosend <netbsd>
[ 134.3849258] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.3929205] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.4012268] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.4091971] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 134.4173920] #14 0xffffffff80265c1e in syscall <netbsd>
[ 134.4249772] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35dc [1 byte, read, RedZone]
[ 134.4379721] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 134.4448202] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 134.4528371] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 134.4625701] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 134.4717288] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 134.4790212] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.4873746] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.4958417] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.5037106] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.5123230] #9 0xffffffff80f603ca in sosend <netbsd>
[ 134.5199560] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.5283295] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.5367249] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.5447507] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 134.5537118] #14 0xffffffff80265c1e in syscall <netbsd>
[ 134.5606784] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35df [1 byte, read, RedZone]
[ 134.5730018] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 134.5805906] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 134.5886333] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 134.5984529] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 134.6067609] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 134.6149123] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.6232809] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.6315037] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.6405271] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.6480510] #9 0xffffffff80f603ca in sosend <netbsd>
[ 134.6554650] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.6646357] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.6724947] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.6805437] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 134.6887428] #14 0xffffffff80265c1e in syscall <netbsd>
[ 134.7948370] ASan: Unauthorized Access In 0xffffffff80a7f51e: Addr
0xffff920012ed35d4 [4 bytes, read, RedZonePartial]
[ 134.8093055] #0 0xffffffff80a7f51e in in6_print <netbsd>
[ 134.8189493] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 134.8237712] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 134.8334171] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 134.8430620] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 134.8527071] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 134.8575301] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 134.8671751] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 134.8768193] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 134.8816410] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 134.8912865] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 134.9009311] #11 0xffffffff80f603ca in sosend <netbsd>
[ 134.9057554] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 134.9153986] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 134.9250459] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 134.9298662] ASan: Unauthorized Access In 0xffffffff80a7f9ec: Addr
0xffff920012ed35d8 [4 bytes, read, RedZone]
[ 134.9443454] #0 0xffffffff80a7f9ec in in6_print <netbsd>
[ 134.9539833] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 134.9588012] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 134.9684462] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 134.9780914] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 134.9877385] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 134.9925637] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.0022050] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.0118537] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.0166716] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.0263163] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.0359615] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.0407855] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.0504313] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.0600735] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.0648963] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d4 [2 bytes, read, RedZonePartial]
[ 135.0793649] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.0890090] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.0986570] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.1034768] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.1131216] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.1227679] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.1275909] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.1372352] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.1468800] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.1565276] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.1613466] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.1709917] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.1806373] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.1854633] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.1951053] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.1999265] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d6 [2 bytes, read, RedZonePartial]
[ 135.2143957] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.2240403] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.2336848] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.2385114] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.2481519] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.2577974] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.2674430] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.2722813] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.2819103] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.2915558] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.2963769] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.3060215] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.3156680] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.3253138] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.3301350] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.3397803] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35d8 [2 bytes, read, RedZone]
[ 135.3542489] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.3590723] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.3687153] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.3783621] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.3831826] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.3928273] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.4024737] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.4072944] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.4169415] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.4265857] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.4314074] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.4410522] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.4506991] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.4603443] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.4651648] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.4748121] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35da [2 bytes, read, RedZone]
[ 135.4844567] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.4941002] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.5037488] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.5085803] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.5182124] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.5278573] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.5375039] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.5423248] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.5519695] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.5616174] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.5664371] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.5760825] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.5857295] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.5905541] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.6001953] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.6098399] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35dc [2 bytes, read, RedZone]
[ 135.6194874] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.6291349] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.6387767] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.6435974] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.6532426] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.6628875] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.6725357] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.6773580] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.6870004] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.6966473] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.7014686] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.7111125] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.7207594] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.7255805] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.7352262] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.7448696] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffff920012ed35de [2 bytes, read, RedZone]
[ 135.7545147] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 135.7641618] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 135.7738086] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 135.7834524] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 135.7882720] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 135.7979312] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 135.8075644] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 135.8123846] #7 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.8220318] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.8316756] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.8364984] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.8461437] #11 0xffffffff80f603ca in sosend <netbsd>
[ 135.8557875] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 135.8654342] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 135.8702557] #14 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 135.8799022] sockaddr_checklen: 0xffff920012ed35c8 bad len af=24
socklen=12 len=28 [inet6: ::]
[ 135.8895453] sockaddr_checklen: 0xffff92016f107070 bad len af=24
socklen=12 len=28 [inet6: [100:100::9800:0:0:0]:20018]
[ 135.9040131] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35da [1 byte, read, RedZone]
[ 135.9136593] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 135.9233027] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 135.9329481] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 135.9425927] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 135.9474154] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 135.9570601] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 135.9667074] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 135.9763513] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 135.9811726] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 135.9908176] #9 0xffffffff80f603ca in sosend <netbsd>
[ 136.0004638] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 136.0101088] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 136.0149304] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 136.0245753] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 136.0342228] #14 0xffffffff80265c1e in syscall <netbsd>
[ 136.0390428] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35dc [1 byte, read, RedZone]
[ 136.0535127] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 136.0583328] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 136.0679781] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 136.0776228] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 136.0872695] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 136.0920902] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 136.1017352] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 136.1113831] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 136.1162030] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 136.1258477] #9 0xffffffff80f603ca in sosend <netbsd>
[ 136.1354948] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 136.1403162] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 136.1499602] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 136.1596054] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 136.1644278] #14 0xffffffff80265c1e in syscall <netbsd>
[ 136.1740734] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35dc [1 byte, read, RedZone]
[ 136.1885418] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 136.1933627] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 136.2030093] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 136.2126529] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 136.2222995] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 136.2271210] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 136.2367729] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 136.2464121] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 136.2512330] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 136.2608775] #9 0xffffffff80f603ca in sosend <netbsd>
[ 136.2705278] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 136.2753457] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 136.2849909] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
[ 136.2946374] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 136.2994581] #14 0xffffffff80265c1e in syscall <netbsd>
[ 136.3091045] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffff920012ed35df [1 byte, read, RedZone]
[ 136.3187480] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 136.3283926] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 136.3380385] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 136.3476843] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 136.3525061] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 136.3621504] #5 0xffffffff80a8029e in in6_selectroute <netbsd>
[ 136.3717957] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 136.3814424] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 136.3862631] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 136.3959084] #9 0xffffffff80f603ca in sosend <netbsd>
[ 136.4055538] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 136.4103757] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 136.4200204] #12 0xffffffff80f6b4a6 in sys_sendmsg <netbsd>
06:29:04 executing program 3:
r0 = semget(0x0, 0x2, 0x100)
semctl$GETZCNT(r0, 0x1, 0x7, &(0x7f0000000000)=""/176)
semget(0x3, 0x3, 0x402)
r1 = geteuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f00000000c0)={<r2=>0x0, 0x0, <r3=>0x0}, 0xc)
r4 = getuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f0000000100)={0x0, 0x0, <r5=>0x0}, 0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000140)={{0x1000, r1, r3, r4, r5,
0x92, 0x8}, 0x5, 0x20, 0x7})
r6 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0),
&(0x7f0000000200)=0xc)
sendmsg(r6, &(0x7f00000008c0)={&(0x7f0000000240)=@in6={0x18, 0x0,
0xfffffffffffffff7, 0x4}, 0xc,
&(0x7f0000000540)=[{&(0x7f00000004c0)="be1cbcad5f17fc8a409c162eef56c43b1427c10ad37b046057b9b2522c4341bb41c510f5de7976711d7bae61b182f5f517ce0f746d0f0a20c95c937824bdbe82222b619a6819ef3b",
0x48}], 0x1, 0x0}, 0x2)
getuid()
r7 = fcntl$dupfd(r6, 0xc, r6)
sendmsg(r7,
&(0x7f0000000d00)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0xa,
&(0x7f0000000a80)=[{&(0x7f0000000940)="bc2979", 0x3},
{&(0x7f0000000980)="84ec6f127e1623f8aa8fa07c9ebc0a6f40dfe8ba98761bf867ec69fcce85500ccade82b058e818b49e0b47e274ee75cee944e20fcbd8aaedbb9a5f8ef69cf0d5ba49e2ba6350074915d0522f38c7acba2c3bfc2eee2f2f1ed995d29a87cf80a19812f6f655ddd040131ac191573bde72d3050e21430cf8cd2460265fc88d1264552186ff2dfc5b324fa0f6da049d7147330bcdfa4b079d8b0b9a9483f46c2d704e041ad962ae0f2f5221c56bb964bd3134696f5483f3452cbfc3dcbe86459babd2c7ebf1d8cf10a1c24ac5cda611df9c1a705927cd774d810b9f713844aca7e1f9725642459e9106b3c0468f8ffe9a718416",
0xf2}], 0x2, &(0x7f0000000ac0)=[{0xd0, 0x100,
0x6, "3fcd14f569f252017dbc999341224e9de37d57f0cb7b45b2051a5dd68a7082d5310e1ec1d0867672d6ceecc70bbd503bd339baee461cd6dcb90a84c864654d317ace2fd217c9c4dc06b69c431422b19661d8dcfd74d8fa34aef1bdef74810a7a34d06328af8e7f37f846d1af871c3309ba5ef86f322ccf52ccc989b3f642c2f4c30e7f9c1f848fa8f54a9ba02a3555d8fbe13630afa094790340a67f7b1d24412142845fea7810f88d1633824b9334385a4fcc9e06d044ac2b244bfe849da818"},
{0xf0, 0xffff,
0x2, "4c11385e8609520456d1dc078aaaed55e67ae2f5a9aa3ad1cb8851754093d84399adecbc967f3655dabcaff7b8ed497671aa7ab464e6b254e837b94d1494e5e4b09e0f852718fd6dde3fb18804813407e0ee930ddeecdfaa5af857bfc8eb7c9faf38733b62645cab0df08dcd48c3d71e92b62a1ff6dfa2d7cb4f092730e9a2b49523e784a5688dbed2cecc1d0972c5bc0d87a41a4d47ef7b8bfbf3de3d913a8e318b79ba13b91dc125aa789ee5afcd7d0d6d3fd399e1a9c71a4584f0d7116c28e4b890dd08f08f68f72e7d638faa2a97c7252a9244c4f19300a7de8ed3"},
{0x50, 0x101,
0x5, "b34d1aa82fd223e9cd0a1a14d5d16c45c2f3e4a184bf45e6dd55c07c1aeb8fd43a2e96c8e570b65f28456b5e768e7f0d087f00b2032ca78184f2f358c21501"}],
0x210}, 0x0)
accept$unix(r7, &(0x7f0000000d40)=@abs, &(0x7f0000000d80)=0x8)
geteuid()
setsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f0000000dc0)={r2, r4, r5}, 0xc)
r8 = msgget$private(0x0, 0x1)
msgctl$IPC_STAT(r8, 0x2, &(0x7f0000000e00)=""/122)
r9 = fcntl$dupfd(r7, 0x0, r7)
r10 = getuid()
getsockopt$SO_PEERCRED(r9, 0xffff, 0x11, &(0x7f0000000e80), 0xc)
getpeername$inet6(r9, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000f40)={{0x9, r10, r5, r1, r5,
0x21, 0xed}, 0x8000, 0x61, 0x6614dd80})

06:29:04 executing program 1:
r0 = paccept(0xffffffffffffffff, &(0x7f0000000000)=@un=@file={0x0, ""/67},
&(0x7f0000000080)=0x45, 0xac159c788919e7bc)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
pwritev(r1,
&(0x7f0000000100)=[{&(0x7f00000000c0)="1104a0cf3592bf2bebf5e08a84e91dd3c684d4288cd6dd5cb535d4",
0x1b}], 0x1, 0x0)
getdents(r1, &(0x7f0000000140)=""/89, 0x59)
mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x10, r1, 0x0, 0x0)
r2 = semget$private(0x0, 0x2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x90, r1, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
getpeername(r0, &(0x7f00000001c0)=@in, &(0x7f0000000200)=0xc)
getdents(r1, &(0x7f0000000240)=""/4096, 0x1000)
semctl$GETNCNT(r2, 0x3, 0x3, &(0x7f0000001240)=""/219)
execve(&(0x7f0000001340)='./file0\x00',
&(0x7f00000014c0)=[&(0x7f0000001380)='-\x00', &(0x7f00000013c0)='\x00',
&(0x7f0000001400)='\\#!\x00', &(0x7f0000001440)='![&}.\x00',
&(0x7f0000001480)='@\x00'],
&(0x7f00000015c0)=[&(0x7f0000001500)='-\'[:$\x00',
&(0x7f0000001540)='\x00', &(0x7f0000001580)='\x00'])
r3 = dup(r0)
flock(r3, 0x3)
semget(0x3, 0x1, 0x100)
fchmodat(r3, &(0x7f0000001600)='./file0\x00', 0x110, 0x600)
symlink(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='./file0\x00')
semctl$SETVAL(r2, 0x6, 0x8, &(0x7f00000016c0)=0xfffffffffffffeff)
ftruncate(r1, 0x1)
getsockname$inet(r3, &(0x7f0000001700), &(0x7f0000001740)=0xc)
poll(&(0x7f0000001780)=[{r1, 0x20}, {r1, 0x20}, {r3, 0x8}, {r0, 0x40}],
0x4, 0xffff)
recvfrom$inet(r3, &(0x7f00000017c0)=""/81, 0x51, 0x2,
&(0x7f0000001840)={0x2, 0x3}, 0xc)
bind$unix(r3, &(0x7f0000001880)=@abs={0x0, 0x0, 0x0}, 0x8)
r4 = fcntl$getown(r1, 0x5)
fcntl$lock(r1, 0x7, &(0x7f00000018c0)={0x1, 0x3, 0x808, 0x1f, r4})
sendto$unix(r3,
&(0x7f0000001900)="7880d2895506d4b1e50d0bb381f4951302f678b2402dc8ebb55842e8ebafb06e4832e46e2f95af7865658231462f661f63794c2fb190f3f7b05ec111dfd8740057beedb3",
0x44, 0x0, &(0x7f0000001980)=@file={0x1, './file0\x00'}, 0xa)
semget(0x1, 0x3, 0x80)
getsockopt$SO_PEERCRED(r0, 0xffff, 0x11, &(0x7f00000019c0), 0xc)
renameat(r3, &(0x7f0000001a00)='./file0\x00', r1,
&(0x7f0000001a40)='./file1\x00')

06:29:04 executing program 2:
r0 = semget(0x2, 0x3, 0x100)
semctl$IPC_RMID(r0, 0x0, 0x0)
r1 = semget(0x0, 0x3, 0x400)
pipe2(&(0x7f0000000000)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff},
0x1400004)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000040)={0x0, <r4=>0x0},
&(0x7f0000000080)=0xc)
r5 = semget$private(0x0, 0x1, 0x80)
getsockname$inet6(r3, &(0x7f00000000c0), &(0x7f0000000100)=0xc)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000140)={<r6=>0x0,
<r7=>0x0}, &(0x7f0000000180)=0xc)
semctl$IPC_RMID(r5, 0x0, 0x0)
semctl$GETZCNT(r0, 0x0, 0x7, &(0x7f00000001c0)=""/205)
fsync(r2)
getsockopt$sock_cred(r2, 0xffff, 0x11, &(0x7f00000002c0)={0x0, 0x0,
<r8=>0x0}, &(0x7f0000000300)=0xc)
semop(r0, &(0x7f0000000340)=[{0x4, 0x5, 0x1800}, {0x2, 0x3, 0x1800}, {0x3,
0x80000000, 0x1800}, {0x3, 0x7, 0x1000}, {0x1, 0x0, 0x800}], 0x5)
setsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000380)={r6, r4, r8}, 0xc)
semctl$GETPID(r5, 0x7, 0x4, &(0x7f00000003c0)=""/76)
setsockopt$sock_linger(r3, 0xffff, 0x80, &(0x7f0000000440)={0x5}, 0x8)
writev(r3,
&(0x7f00000005c0)=[{&(0x7f0000000480)="f79d6430a25c42d95c95928b0a62fc0e9172916a7817a1df190a0771c9006306ae703bcca2caf382bac623cd7a46cdf757f1cc64928fff5b72bd56e020e89f10f65f62879f01e7c8ba86667054028b6f871785c6624b78",
0x57},
{&(0x7f0000000500)="d1c0e0dc2dfa6d7c71fca183ac0011968f49ce90083667bdd98cbdb75942c95566690cb81e001a24aabe89cf688a2aba3eb2f35d700960bd8126a477d93d1a857e74a9103652c05678b51615524dfd95ec145a9f41857f4633af7b30a959ab716ac5622cc081d4ad87c24c7c97f61bd43b66fba7558904c435a38ce00595ac33ed1f99ec55c1b7ebb568c8b7cb44c46432463f96a01bba4d29c48f25d1dcc8e143a999f19235215ea0a37d5e5e4c10d59d11c29878",
0xb5}], 0x2)
semctl$GETPID(r5, 0x2, 0x4, &(0x7f0000000600)=""/132)
semctl$GETPID(r5, 0x1, 0x4, &(0x7f00000006c0))
shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
semctl$GETPID(r0, 0x3, 0x4, &(0x7f0000000700)=""/96)
pipe2(&(0x7f0000000780)={<r9=>0xffffffffffffffff}, 0x1000000)
fcntl$getown(r9, 0x5)
setsockopt$sock_int(r9, 0xffff, 0x301f, &(0x7f00000007c0)=0x1f, 0x4)
semget(0x2, 0x1, 0x1)
wait4(r6, &(0x7f0000000800), 0x2, &(0x7f0000000840))
r10 = dup2(r9, r9)
semctl$GETZCNT(r1, 0x4, 0x7, &(0x7f0000000900)=""/144)
fchown(r10, r7, r8)
getsockopt$sock_cred(r10, 0xffff, 0x11, &(0x7f00000009c0),
&(0x7f0000000a00)=0xc)

06:29:04 executing program 5:
r0 = socket$unix(0x1, 0x2, 0x0)
link(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00')
r1 = dup(r0)
sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0)

06:29:04 executing program 0:
r0 = msgget$private(0x0, 0x40)
msgsnd(r0,
&(0x7f0000000000)={0x3, "9e5babd9e6982ee7976757096a10014bba3b5a79d317d8b74bc2aeb6c38e1ecbd54dc10873eea3dc5d9655d9ee5aeeae1b53bfa0c6ed129d4f5f6ec6d0cd06e629d177421d204b6fba4ab6114122554c9448a0b57d51f665ac1efe6b336d0acfe41fa89f6a01c5d90dc1dc562301aebd39a892eb3c27756e38cf6357ba766784b142c62eb4c05d4e4a9d7ada5063c15008122709cf4380faed5cc4c96755c13e68ae77136822e7d7bbdf252d2cbbee01e6e8e1ef8c853b8e545bc4"},
0xc3, 0x800)
r1 = semget(0x3, 0x3, 0x4)
semctl$GETZCNT(r1, 0x3, 0x7, &(0x7f0000000100)=""/145)
pipe2(&(0x7f00000001c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff},
0x1400004)
pipe2(&(0x7f0000000280)={0xffffffffffffffff, <r4=>0xffffffffffffffff},
0x1000004)
fcntl$setflags(r2, 0x2, 0x1)
utimensat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x3f,
0x5}, {0x5, 0x8}}, 0x200)
pipe2(&(0x7f00000003c0)={0xffffffffffffffff, <r5=>0xffffffffffffffff},
0xfffffe)
read(r4, &(0x7f0000000400)=""/147, 0x93)
fchdir(r5)
pipe2(&(0x7f00000002c0)={<r6=>0xffffffffffffffff, <r7=>0xffffffffffffffff},
0x400000)
semget(0x3, 0x4, 0x698)
fchmod(r3, 0x12)
fchroot(r7)
msgrcv(r0, &(0x7f0000000300)={0x0, ""/145}, 0x99, 0x0, 0x1000)
pwritev(r5,
&(0x7f0000000540)=[{&(0x7f00000004c0)="d395cae33a14362ae0b45a3686ab8dc71c94808067a8ad7d040ee463c905c22d57e0f8bbaf127446785c1cd37c52a7033c76a6d3b87fa8c0e99d0f28b1d3b2658ac9267fac9133ed6192ede88466e4c46bd37799a19c67fa6f02be5eb615382bc2b49ca6fdc733",
0x67}], 0x1, 0x0)
getpeername$unix(r6, &(0x7f0000000580)=@file={0x0, ""/4096},
&(0x7f00000015c0)=0x1002)

06:29:04 executing program 4:
r0 = dup(0xffffffffffffffff)
sendto$inet(r0, &(0x7f0000000000)="6817605cbf674928ec", 0xfe48, 0x0, 0x0,
0x0)
r1 = socket(0x18, 0x3, 0x0)
connect$unix(r1, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c)

06:29:04 executing program 5:
r0 = socket$unix(0x1, 0x100000000001002, 0x0)
r1 = dup(r0)
sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0)

06:29:04 executing program 3:
r0 = semget(0x0, 0x2, 0x100)
semctl$GETZCNT(r0, 0x1, 0x7, &(0x7f0000000000)=""/176)
semget(0x3, 0x3, 0x402)
r1 = geteuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f00000000c0)={<r2=>0x0, 0x0, <r3=>0x0}, 0xc)
r4 = getuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f0000000100)={0x0, 0x0, <r5=>0x0}, 0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000140)={{0x1000, r1, r3, r4, r5,
0x92, 0x8}, 0x5, 0x20, 0x7})
r6 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0),
&(0x7f0000000200)=0xc)
sendmsg(r6, &(0x7f00000008c0)={&(0x7f0000000240)=@in6={0x18, 0x0,
0xfffffffffffffff7, 0x4}, 0xc,
&(0x7f0000000540)=[{&(0x7f00000004c0)="be1cbcad5f17fc8a409c162eef56c43b1427c10ad37b046057b9b2522c4341bb41c510f5de7976711d7bae61b182f5f517ce0f746d0f0a20c95c937824bdbe82222b619a6819ef3b",
0x48}], 0x1, 0x0}, 0x2)
getuid()
r7 = fcntl$dupfd(r6, 0xc, r6)
sendmsg(r7,
&(0x7f0000000d00)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0xa,
&(0x7f0000000a80)=[{&(0x7f0000000940)="bc2979", 0x3},
{&(0x7f0000000980)="84ec6f127e1623f8aa8fa07c9ebc0a6f40dfe8ba98761bf867ec69fcce85500ccade82b058e818b49e0b47e274ee75cee944e20fcbd8aaedbb9a5f8ef69cf0d5ba49e2ba6350074915d0522f38c7acba2c3bfc2eee2f2f1ed995d29a87cf80a19812f6f655ddd040131ac191573bde72d3050e21430cf8cd2460265fc88d1264552186ff2dfc5b324fa0f6da049d7147330bcdfa4b079d8b0b9a9483f46c2d704e041ad962ae0f2f5221c56bb964bd3134696f5483f3452cbfc3dcbe86459babd2c7ebf1d8cf10a1c24ac5cda611df9c1a705927cd774d810b9f713844aca7e1f9725642459e9106b3c0468f8ffe9a718416",
0xf2}], 0x2, &(0x7f0000000ac0)=[{0xd0, 0x100,
0x6, "3fcd14f569f252017dbc999341224e9de37d57f0cb7b45b2051a5dd68a7082d5310e1ec1d0867672d6ceecc70bbd503bd339baee461cd6dcb90a84c864654d317ace2fd217c9c4dc06b69c431422b19661d8dcfd74d8fa34aef1bdef74810a7a34d06328af8e7f37f846d1af871c3309ba5ef86f322ccf52ccc989b3f642c2f4c30e7f9c1f848fa8f54a9ba02a3555d8fbe13630afa094790340a67f7b1d24412142845fea7810f88d1633824b9334385a4fcc9e06d044ac2b244bfe849da818"},
{0xf0, 0xffff,
0x2, "4c11385e8609520456d1dc078aaaed55e67ae2f5a9aa3ad1cb8851754093d84399adecbc967f3655dabcaff7b8ed497671aa7ab464e6b254e837b94d1494e5e4b09e0f852718fd6dde3fb18804813407e0ee930ddeecdfaa5af857bfc8eb7c9faf38733b62645cab0df08dcd48c3d71e92b62a1ff6dfa2d7cb4f092730e9a2b49523e784a5688dbed2cecc1d0972c5bc0d87a41a4d47ef7b8bfbf3de3d913a8e318b79ba13b91dc125aa789ee5afcd7d0d6d3fd399e1a9c71a4584f0d7116c28e4b890dd08f08f68f72e7d638faa2a97c7252a9244c4f19300a7de8ed3"},
{0x50, 0x101,
0x5, "b34d1aa82fd223e9cd0a1a14d5d16c45c2f3e4a184bf45e6dd55c07c1aeb8fd43a2e96c8e570b65f28456b5e768e7f0d087f00b2032ca78184f2f358c21501"}],
0x210}, 0x0)
accept$unix(r7, &(0x7f0000000d40)=@abs, &(0x7f0000000d80)=0x8)
geteuid()
setsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f0000000dc0)={r2, r4, r5}, 0xc)
r8 = msgget$private(0x0, 0x1)
msgctl$IPC_STAT(r8, 0x2, &(0x7f0000000e00)=""/122)
r9 = fcntl$dupfd(r7, 0x0, r7)
r10 = getuid()
getsockopt$SO_PEERCRED(r9, 0xffff, 0x11, &(0x7f0000000e80), 0xc)
getpeername$inet6(r9, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000f40)={{0x9, r10, r5, r1, r5,
0x21, 0xed}, 0x8000, 0x61, 0x6614dd80})

06:29:04 executing program 2:
r0 = semget(0x2, 0x3, 0x100)
semctl$IPC_RMID(r0, 0x0, 0x0)
r1 = semget(0x0, 0x3, 0x400)
pipe2(&(0x7f0000000000)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff},
0x1400004)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000040)={0x0, <r4=>0x0},
&(0x7f0000000080)=0xc)
r5 = semget$private(0x0, 0x1, 0x80)
getsockname$inet6(r3, &(0x7f00000000c0), &(0x7f0000000100)=0xc)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000140)={<r6=>0x0,
<r7=>0x0}, &(0x7f0000000180)=0xc)
semctl$IPC_RMID(r5, 0x0, 0x0)
semctl$GETZCNT(r0, 0x0, 0x7, &(0x7f00000001c0)=""/205)
fsync(r2)
getsockopt$sock_cred(r2, 0xffff, 0x11, &(0x7f00000002c0)={0x0, 0x0,
<r8=>0x0}, &(0x7f0000000300)=0xc)
semop(r0, &(0x7f0000000340)=[{0x4, 0x5, 0x1800}, {0x2, 0x3, 0x1800}, {0x3,
0x80000000, 0x1800}, {0x3, 0x7, 0x1000}, {0x1, 0x0, 0x800}], 0x5)
setsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000380)={r6, r4, r8}, 0xc)
semctl$GETPID(r5, 0x7, 0x4, &(0x7f00000003c0)=""/76)
setsockopt$sock_linger(r3, 0xffff, 0x80, &(0x7f0000000440)={0x5}, 0x8)
writev(r3,
&(0x7f00000005c0)=[{&(0x7f0000000500)="d1c0e0dc2dfa6d7c71fca183ac0011968f49ce90083667bdd98cbdb75942c95566690cb81e001a24aabe89cf688a2aba3eb2f35d700960bd8126a477d93d1a857e74a9103652c05678b51615524dfd95ec145a9f41857f4633af7b30a959ab716ac5622cc081d4ad87c24c7c97f61bd43b66fba7558904c435a38ce00595ac33ed1f99ec55c1b7ebb568c8b7cb44c46432463f96a01bba4d29c48f25d1dcc8e143a999f19235215ea0a37d5e5e4c10d59d11c298781b",
0xb6}], 0x1)
semctl$GETPID(r5, 0x2, 0x4, &(0x7f0000000600)=""/132)
semctl$GETPID(r5, 0x1, 0x4, &(0x7f00000006c0))
shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
semctl$GETPID(r0, 0x3, 0x4, &(0x7f0000000700)=""/96)
pipe2(&(0x7f0000000780)={<r9=>0xffffffffffffffff}, 0x1000000)
fcntl$getown(r9, 0x5)
setsockopt$sock_int(r9, 0xffff, 0x301f, &(0x7f00000007c0)=0x1f, 0x4)
semget(0x2, 0x1, 0x1)
wait4(r6, &(0x7f0000000800), 0x2, &(0x7f0000000840))
r10 = dup2(r9, r9)
semctl$GETZCNT(r1, 0x4, 0x7, &(0x7f0000000900)=""/144)
fchown(r10, r7, r8)
getsockopt$sock_cred(r10, 0xffff, 0x11, &(0x7f00000009c0),
&(0x7f0000000a00)=0xc)

06:29:04 executing program 5:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = dup(r0)
mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000)
sendto$inet6(r1, 0x0, 0x0, 0x0, 0x0, 0x0)
read(r1, &(0x7f0000000000)=""/104, 0x68)

[ 136.4296681] #13 0xffffffff80ebc484 in sys___syscall <netbsd>
[ 136.4344936] #14 0xffffffff80265c1e in syscall <netbsd>
06:29:04 executing program 4:
sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="6817605cbf674928ec",
0x9, 0x0, 0x0, 0x0)
r0 = socket(0x18, 0x3, 0x0)
connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c)
open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x24)

06:29:04 executing program 0:
r0 = msgget$private(0x0, 0x40)
msgsnd(r0,
&(0x7f00000003c0)=ANY=[@ANYBLOB="030000000000976757096a10014bba3b5a79d317d8b74bc2aeb6c38e1ecbd54dc10873eea3dc5d9655d9ee5aeeae1b53bfa0c6ed129d4f5f6ec6d0cd06e629d177421d204b6fba4ab6114122554c9448a0b57d51f665ac1efe6b336d0acfe41fa89f6a01c5d90dc1dc562301aebd39a892eb3c27756e38cf6357ba760500b142c62eb4c05d4380faed5cc4c96755c13e68ae77136822e7d7bbdf252d2cbbee01e6e8e1ef8c42e672853b8e545bc437a2fa3e98fcaa008418809e2d675cfec91e949054684700000000000000000000a62cd7d20000000000000000000000000000"],
0xc3, 0x800)
r1 = semget(0x3, 0x3, 0x4)
semctl$GETZCNT(r1, 0x3, 0x7, &(0x7f0000000100)=""/145)
pipe2(&(0x7f00000001c0)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff},
0x1400004)
fcntl$setflags(r2, 0x2, 0x1)
utimensat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x3f,
0x5}, {0x5, 0x8}}, 0x200)
pipe2(&(0x7f0000000280)={0xffffffffffffffff, <r4=>0xffffffffffffffff},
0x1000000)
fchdir(r4)
pipe2(&(0x7f00000002c0)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff},
0x400000)
semget(0x3, 0x4, 0x698)
fchmod(r3, 0x12)
fchroot(r6)
msgrcv(r0, &(0x7f0000000300)={0x0, ""/145}, 0x99, 0x0, 0x1000)
pwritev(r4,
&(0x7f0000000540)=[{&(0x7f00000004c0)="d395cae33a14362ae0b45a3686ab8dc71c94808067a8ad7d040ee463c905c22d57e0f8bbaf127446785c1cd37c52a7033c76a6d3b87fa8c0e99d0f28b1d3b2658ac9267fac9133ed6192ede88466e4c46bd37799a19c67fa6f02be5eb615382bc2b49ca6fdc733",
0x67}], 0x1, 0x0)
getpeername$unix(r5, &(0x7f0000000580)=@file={0x0, ""/4096},
&(0x7f00000015c0)=0x1002)

06:29:04 executing program 3:
r0 = semget(0x0, 0x2, 0x100)
semctl$GETZCNT(r0, 0x1, 0x7, &(0x7f0000000000)=""/176)
semget(0x3, 0x3, 0x402)
r1 = geteuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f00000000c0)={<r2=>0x0, 0x0, <r3=>0x0}, 0xc)
r4 = getuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f0000000100)={0x0, 0x0, <r5=>0x0}, 0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000140)={{0x1000, r1, r3, r4, r5,
0x92, 0x8}, 0x5, 0x20, 0x7})
r6 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0),
&(0x7f0000000200)=0xc)
sendmsg(r6, &(0x7f00000008c0)={&(0x7f0000000240)=@in6={0x18, 0x0,
0xfffffffffffffff7, 0x4}, 0xc,
&(0x7f0000000540)=[{&(0x7f00000004c0)="be1cbcad5f17fc8a409c162eef56c43b1427c10ad37b046057b9b2522c4341bb41c510f5de7976711d7bae61b182f5f517ce0f746d0f0a20c95c937824bdbe82222b619a6819ef3b",
0x48}], 0x1, 0x0}, 0x0)
getuid()
r7 = fcntl$dupfd(r6, 0xc, r6)
sendmsg(r7,
&(0x7f0000000d00)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0xa,
&(0x7f0000000a80)=[{&(0x7f0000000940)="bc2979", 0x3},
{&(0x7f0000000980)="84ec6f127e1623f8aa8fa07c9ebc0a6f40dfe8ba98761bf867ec69fcce85500ccade82b058e818b49e0b47e274ee75cee944e20fcbd8aaedbb9a5f8ef69cf0d5ba49e2ba6350074915d0522f38c7acba2c3bfc2eee2f2f1ed995d29a87cf80a19812f6f655ddd040131ac191573bde72d3050e21430cf8cd2460265fc88d1264552186ff2dfc5b324fa0f6da049d7147330bcdfa4b079d8b0b9a9483f46c2d704e041ad962ae0f2f5221c56bb964bd3134696f5483f3452cbfc3dcbe86459babd2c7ebf1d8cf10a1c24ac5cda611df9c1a705927cd774d810b9f713844aca7e1f9725642459e9106b3c0468f8ffe9a718416",
0xf2}], 0x2, &(0x7f0000000ac0)=[{0xd0, 0x100,
0x6, "3fcd14f569f252017dbc999341224e9de37d57f0cb7b45b2051a5dd68a7082d5310e1ec1d0867672d6ceecc70bbd503bd339baee461cd6dcb90a84c864654d317ace2fd217c9c4dc06b69c431422b19661d8dcfd74d8fa34aef1bdef74810a7a34d06328af8e7f37f846d1af871c3309ba5ef86f322ccf52ccc989b3f642c2f4c30e7f9c1f848fa8f54a9ba02a3555d8fbe13630afa094790340a67f7b1d24412142845fea7810f88d1633824b9334385a4fcc9e06d044ac2b244bfe849da818"},
{0xf0, 0xffff,
0x2, "4c11385e8609520456d1dc078aaaed55e67ae2f5a9aa3ad1cb8851754093d84399adecbc967f3655dabcaff7b8ed497671aa7ab464e6b254e837b94d1494e5e4b09e0f852718fd6dde3fb18804813407e0ee930ddeecdfaa5af857bfc8eb7c9faf38733b62645cab0df08dcd48c3d71e92b62a1ff6dfa2d7cb4f092730e9a2b49523e784a5688dbed2cecc1d0972c5bc0d87a41a4d47ef7b8bfbf3de3d913a8e318b79ba13b91dc125aa789ee5afcd7d0d6d3fd399e1a9c71a4584f0d7116c28e4b890dd08f08f68f72e7d638faa2a97c7252a9244c4f19300a7de8ed3"},
{0x50, 0x101,
0x5, "b34d1aa82fd223e9cd0a1a14d5d16c45c2f3e4a184bf45e6dd55c07c1aeb8fd43a2e96c8e570b65f28456b5e768e7f0d087f00b2032ca78184f2f358c21501"}],
0x210}, 0x0)
accept$unix(r7, &(0x7f0000000d40)=@abs, &(0x7f0000000d80)=0x8)
geteuid()
setsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f0000000dc0)={r2, r4, r5}, 0xc)
r8 = msgget$private(0x0, 0x1)
msgctl$IPC_STAT(r8, 0x2, &(0x7f0000000e00)=""/122)
r9 = fcntl$dupfd(r7, 0x0, r7)
r10 = getuid()
getsockopt$SO_PEERCRED(r9, 0xffff, 0x11, &(0x7f0000000e80), 0xc)
getpeername$inet6(r9, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000f40)={{0x9, r10, r5, r1, r5,
0x21, 0xed}, 0x8000, 0x61, 0x6614dd80})

06:29:05 executing program 0:
r0 = msgget$private(0x0, 0x40)
msgsnd(r0,
&(0x7f0000000000)={0x3, "9e5babd9e6982ee7976757096a10014bba3b5a79d317d8b74bc2aeb6c38e1ecbd54dc10873eea3dc5d9655d9ee5aeeae1b53bfa0c6ed129d4f5f6ec6d0cd06e629d177421d204b6fba4ab6114122554c9448a0b57d51f665ac1efe6b336d0acfe41fa89f6a01c5d90dc1dc562301aebd39a892eb3c27756e38cf6357ba766784b142c62eb4c05d4e4a9d7ada5063c15008122709cf4380faed5cc4c96755c13e68ae77136822e7d7bbdf252d2cbbee01e6e8e1ef8c853b8e545bc4"},
0xc3, 0x800)
r1 = semget(0x3, 0x3, 0x4)
r2 = socket(0x1e, 0x60000002, 0x4)
fcntl$setstatus(r2, 0x4, 0x1020000)
semctl$GETZCNT(r1, 0x3, 0x7, &(0x7f0000000100)=""/145)
pipe2(&(0x7f00000001c0)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff},
0x1400004)
fcntl$setflags(r3, 0x2, 0x1)
utimensat(r3, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x3f,
0x5}, {0x5, 0x8}}, 0x200)
pipe2(&(0x7f0000000280)={0xffffffffffffffff, <r5=>0xffffffffffffffff},
0x1000000)
pwritev(r3,
&(0x7f0000001600)=[{&(0x7f00000003c0)="9ed703d3778fb1b299c1bafedeabe8e1602c3353c3446484f1f6057be2f5f225bda8995b20c24206e01777e0a898fae615757825dc220b210d6d8352b4a08c1ac1ed316ccb0cf8fff2b1e3fba095a6ae6aace4aa4db66bf112e85f9b171264bd6ac55691c619e95a367a8323a81fcaf64455ba10b9c65da15b36b9af9146ce6566ed6816120947a4e6f19c9e68786b131d96592ada978abf333aefa34bedcf054946be9d6bbc8dcb11abbbb05bca4c5818e3944555ad06eea7f7c16315b316b62cee4993f5c728f1c984789cdfa29c3dcd3325ba5ee35852ec1e3523cdab46f0f6f112b87049458b22f55a357f",
0xed}], 0x1, 0x0)
fchdir(r5)
pipe2(&(0x7f00000002c0)={<r6=>0xffffffffffffffff, <r7=>0xffffffffffffffff},
0x400000)
semget(0x3, 0x4, 0x698)
fchmod(r4, 0x12)
semget$private(0x0, 0x0, 0x81)
fchroot(r7)
msgrcv(r0, &(0x7f0000000300)={0x0, ""/145}, 0x99, 0x0, 0x1000)
pwritev(r5,
&(0x7f0000000540)=[{&(0x7f00000004c0)="d395cae33a14362ae0b45a3686ab8dc71c94808067a8ad7d040ee463c905c22d57e0f8bbaf127446785c1cd37c52a7033c76a6d3b87fa8c0e99d0f28b1d3b2658ac9267fac9133ed6192ede88466e4c46bd37799a19c67fa6f02be5eb615382bc2b49ca6fdc733",
0x67}], 0x1, 0x0)
getpeername$unix(r6, &(0x7f0000000580)=@file={0x0, ""/4096},
&(0x7f00000015c0)=0x1002)

06:29:05 executing program 3:
r0 = semget(0x0, 0x2, 0x100)
semctl$GETZCNT(r0, 0x1, 0x7, &(0x7f0000000000)=""/176)
semget(0x3, 0x3, 0x402)
r1 = geteuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f00000000c0)={<r2=>0x0, 0x0, <r3=>0x0}, 0xc)
r4 = getuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f0000000100)={0x0, 0x0, <r5=>0x0}, 0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000140)={{0x1000, r1, r3, r4, r5,
0x92, 0x8}, 0x5, 0x20, 0x7})
r6 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0),
&(0x7f0000000200)=0xc)
sendmsg(r6, &(0x7f00000008c0)={&(0x7f0000000240)=@in6={0x18, 0x0,
0xfffffffffffffff7, 0x4}, 0xc,
&(0x7f0000000540)=[{&(0x7f00000004c0)="be1cbcad5f17fc8a409c162eef56c43b1427c10ad37b046057b9b2522c4341bb41c510f5de7976711d7bae61b182f5f517ce0f746d0f0a20c95c937824bdbe82222b619a6819ef3b",
0x48}], 0x1, 0x0}, 0x0)
getuid()
r7 = fcntl$dupfd(r6, 0xc, r6)
sendmsg(r7,
&(0x7f0000000d00)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0xa,
&(0x7f0000000a80)=[{&(0x7f0000000940)="bc2979", 0x3},
{&(0x7f0000000980)="84ec6f127e1623f8aa8fa07c9ebc0a6f40dfe8ba98761bf867ec69fcce85500ccade82b058e818b49e0b47e274ee75cee944e20fcbd8aaedbb9a5f8ef69cf0d5ba49e2ba6350074915d0522f38c7acba2c3bfc2eee2f2f1ed995d29a87cf80a19812f6f655ddd040131ac191573bde72d3050e21430cf8cd2460265fc88d1264552186ff2dfc5b324fa0f6da049d7147330bcdfa4b079d8b0b9a9483f46c2d704e041ad962ae0f2f5221c56bb964bd3134696f5483f3452cbfc3dcbe86459babd2c7ebf1d8cf10a1c24ac5cda611df9c1a705927cd774d810b9f713844aca7e1f9725642459e9106b3c0468f8ffe9a718416",
0xf2}], 0x2, &(0x7f0000000ac0)=[{0xd0, 0x100,
0x6, "3fcd14f569f252017dbc999341224e9de37d57f0cb7b45b2051a5dd68a7082d5310e1ec1d0867672d6ceecc70bbd503bd339baee461cd6dcb90a84c864654d317ace2fd217c9c4dc06b69c431422b19661d8dcfd74d8fa34aef1bdef74810a7a34d06328af8e7f37f846d1af871c3309ba5ef86f322ccf52ccc989b3f642c2f4c30e7f9c1f848fa8f54a9ba02a3555d8fbe13630afa094790340a67f7b1d24412142845fea7810f88d1633824b9334385a4fcc9e06d044ac2b244bfe849da818"},
{0xf0, 0xffff,
0x2, "4c11385e8609520456d1dc078aaaed55e67ae2f5a9aa3ad1cb8851754093d84399adecbc967f3655dabcaff7b8ed497671aa7ab464e6b254e837b94d1494e5e4b09e0f852718fd6dde3fb18804813407e0ee930ddeecdfaa5af857bfc8eb7c9faf38733b62645cab0df08dcd48c3d71e92b62a1ff6dfa2d7cb4f092730e9a2b49523e784a5688dbed2cecc1d0972c5bc0d87a41a4d47ef7b8bfbf3de3d913a8e318b79ba13b91dc125aa789ee5afcd7d0d6d3fd399e1a9c71a4584f0d7116c28e4b890dd08f08f68f72e7d638faa2a97c7252a9244c4f19300a7de8ed3"},
{0x50, 0x101,
0x5, "b34d1aa82fd223e9cd0a1a14d5d16c45c2f3e4a184bf45e6dd55c07c1aeb8fd43a2e96c8e570b65f28456b5e768e7f0d087f00b2032ca78184f2f358c21501"}],
0x210}, 0x0)
accept$unix(r7, &(0x7f0000000d40)=@abs, &(0x7f0000000d80)=0x8)
geteuid()
setsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f0000000dc0)={r2, r4, r5}, 0xc)
r8 = msgget$private(0x0, 0x1)
msgctl$IPC_STAT(r8, 0x2, &(0x7f0000000e00)=""/122)
r9 = fcntl$dupfd(r7, 0x0, r7)
r10 = getuid()
getsockopt$SO_PEERCRED(r9, 0xffff, 0x11, &(0x7f0000000e80), 0xc)
getpeername$inet6(r9, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000f40)={{0x9, r10, r5, r1, r5,
0x21, 0xed}, 0x8000, 0x61, 0x6614dd80})

06:29:05 executing program 4:
sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="6817605cbf674928ec",
0x9, 0x0, 0x0, 0x0)
r0 = socket(0x18, 0x3, 0x0)
connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c)
r1 = semget$private(0x0, 0x3, 0x0)
semctl$SETALL(r1, 0x0, 0x9, &(0x7f0000000000)=[0xfffffffffffffffa, 0x2])

06:29:05 executing program 2:
r0 = semget(0x2, 0x3, 0x100)
semctl$IPC_RMID(r0, 0x0, 0x0)
r1 = semget(0x0, 0x3, 0x400)
pipe2(&(0x7f0000000000)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff},
0x1400004)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000040)={0x0, <r4=>0x0},
&(0x7f0000000080)=0xc)
r5 = semget$private(0x0, 0x1, 0x80)
getsockname$inet6(r3, &(0x7f00000000c0), &(0x7f0000000100)=0xc)
getsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000140)={<r6=>0x0,
<r7=>0x0}, &(0x7f0000000180)=0xc)
semctl$IPC_RMID(r5, 0x0, 0x0)
semctl$GETZCNT(r0, 0x0, 0x7, &(0x7f00000001c0)=""/205)
fsync(r2)
getsockopt$sock_cred(r2, 0xffff, 0x11, &(0x7f00000002c0)={0x0, 0x0,
<r8=>0x0}, &(0x7f0000000300)=0xc)
semop(r0, &(0x7f0000000340)=[{0x4, 0x5, 0x1800}, {0x2, 0x3, 0x1800}, {0x3,
0x80000000, 0x1800}, {0x3, 0x7, 0x1000}, {0x1, 0x0, 0x800}], 0x5)
setsockopt$sock_cred(r3, 0xffff, 0x11, &(0x7f0000000380)={r6, r4, r8}, 0xc)
semctl$GETPID(r5, 0x7, 0x4, &(0x7f00000003c0)=""/76)
setsockopt$sock_linger(r3, 0xffff, 0x80, &(0x7f0000000440)={0x5}, 0x8)
writev(r3,
&(0x7f00000005c0)=[{&(0x7f0000000500)="d1c0e0dc2dfa6d7c71fca183ac0011968f49ce90083667bdd98cbdb75942c95566690cb81e001a24aabe89cf688a2aba3eb2f35d700960bd8126a477d93d1a857e74a9103652c05678b51615524dfd95ec145a9f41857f4633af7b30a959ab716ac5622cc081d4ad87c24c7c97f61bd43b66fba7558904c435a38ce00595ac33ed1f99ec55c1b7ebb568c8b7cb44c46432463f96a01bba4d29c48f25d1dcc8e143a999f19235215ea0a37d5e5e4c10d59d11c298781b",
0xb6}], 0x1)
semctl$GETPID(r5, 0x2, 0x4, &(0x7f0000000600)=""/132)
semctl$GETPID(r5, 0x1, 0x4, &(0x7f00000006c0))
shmget$private(0x0, 0x2000, 0x0, &(0x7f0000ffe000/0x2000)=nil)
semctl$GETPID(r0, 0x3, 0x4, &(0x7f0000000700)=""/96)
pipe2(&(0x7f0000000780)={<r9=>0xffffffffffffffff}, 0x1000000)
fcntl$getown(r9, 0x5)
setsockopt$sock_int(r9, 0xffff, 0x301f, &(0x7f00000007c0)=0x1f, 0x4)
semget(0x2, 0x1, 0x1)
wait4(r6, &(0x7f0000000800), 0x2, &(0x7f0000000840))
r10 = dup2(r9, r9)
semctl$GETZCNT(r1, 0x4, 0x7, &(0x7f0000000900)=""/144)
fchown(r10, r7, r8)
getsockopt$sock_cred(r10, 0xffff, 0x11, &(0x7f00000009c0),
&(0x7f0000000a00)=0xc)

06:29:05 executing program 1:
r0 = paccept(0xffffffffffffffff, &(0x7f0000000000)=@un=@file={0x0, ""/67},
&(0x7f0000000080)=0x45, 0xac159c788919e7bc)
mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0x12, r0, 0x0, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
pwritev(r1,
&(0x7f0000000100)=[{&(0x7f00000000c0)="1104a0cf3592bf2bebf5e08a84e91dd3c684d4288cd6dd5cb535d4",
0x1b}], 0x1, 0x0)
getdents(r1, &(0x7f0000000140)=""/89, 0x59)
mmap(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x5, 0x10, r1, 0x0, 0x0)
r2 = semget$private(0x0, 0x2, 0x0)
mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x90, r1, 0x0, 0x0)
lseek(r0, 0x0, 0x2)
getpeername(r0, &(0x7f00000001c0)=@in, &(0x7f0000000200)=0xc)
getdents(r1, &(0x7f0000000240)=""/4096, 0x1000)
semctl$GETNCNT(r2, 0x3, 0x3, &(0x7f0000001240)=""/219)
execve(&(0x7f0000001340)='./file0\x00',
&(0x7f00000014c0)=[&(0x7f0000001380)='-\x00', &(0x7f00000013c0)='\x00',
&(0x7f0000001400)='\\#!\x00', &(0x7f0000001440)='![&}.\x00',
&(0x7f0000001480)='@\x00'],
&(0x7f00000015c0)=[&(0x7f0000001500)='-\'[:$\x00',
&(0x7f0000001540)='\x00', &(0x7f0000001580)='\x00'])
r3 = dup(r0)
flock(r3, 0x3)
semget(0x3, 0x1, 0x100)
fchmodat(r3, &(0x7f0000001600)='./file0\x00', 0x110, 0x600)
symlink(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)='./file0\x00')
semctl$SETVAL(r2, 0x6, 0x8, &(0x7f00000016c0)=0xfffffffffffffeff)
ftruncate(r1, 0x1)
getsockname$inet(r3, &(0x7f0000001700), &(0x7f0000001740)=0xc)
poll(&(0x7f0000001780)=[{r1, 0x20}, {r1, 0x20}, {r3, 0x8}, {r0, 0x40}],
0x4, 0xffff)
recvfrom$inet(r3, &(0x7f00000017c0)=""/81, 0x51, 0x2,
&(0x7f0000001840)={0x2, 0x3}, 0xc)
bind$unix(r3, &(0x7f0000001880)=@abs={0x0, 0x0, 0x0}, 0x8)
r4 = fcntl$getown(r1, 0x5)
fcntl$lock(r1, 0x7, &(0x7f00000018c0)={0x1, 0x3, 0x808, 0x1f, r4})
sendto$unix(r3,
&(0x7f0000001900)="7880d2895506d4b1e50d0bb381f4951302f678b2402dc8ebb55842e8ebafb06e4832e46e2f95af7865658231462f661f63794c2fb190f3f7b05ec111dfd8740057beedb3",
0x44, 0x0, &(0x7f0000001980)=@file={0x1, './file0\x00'}, 0xa)
semget(0x1, 0x3, 0x80)
getsockopt$SO_PEERCRED(r0, 0xffff, 0x11, &(0x7f00000019c0), 0xc)
renameat(r3, &(0x7f0000001a00)='./file0\x00', r1,
&(0x7f0000001a40)='./file1\x00')

06:29:05 executing program 4:
sendto$inet(0xffffffffffffffff, &(0x7f00000000c0)="6817605cbf674928ec",
0x9, 0x0, 0x0, 0x0)
r0 = socket(0x18, 0x3, 0x0)
connect$unix(r0, &(0x7f0000000000)=@abs={0x682eb13985c518e6, 0x7}, 0x8)

06:29:05 executing program 3:
r0 = semget(0x0, 0x2, 0x100)
semctl$GETZCNT(r0, 0x1, 0x7, &(0x7f0000000000)=""/176)
semget(0x3, 0x3, 0x402)
r1 = geteuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f00000000c0)={<r2=>0x0, 0x0, <r3=>0x0}, 0xc)
r4 = getuid()
getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x11,
&(0x7f0000000100)={0x0, 0x0, <r5=>0x0}, 0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000140)={{0x1000, r1, r3, r4, r5,
0x92, 0x8}, 0x5, 0x20, 0x7})
r6 = accept$inet(0xffffffffffffffff, &(0x7f00000001c0),
&(0x7f0000000200)=0xc)
sendmsg(r6, &(0x7f00000008c0)={&(0x7f0000000240)=@in6={0x18, 0x0,
0xfffffffffffffff7, 0x4}, 0xc,
&(0x7f0000000540)=[{&(0x7f00000004c0)="be1cbcad5f17fc8a409c162eef56c43b1427c10ad37b046057b9b2522c4341bb41c510f5de7976711d7bae61b182f5f517ce0f746d0f0a20c95c937824bdbe82222b619a6819ef3b",
0x48}], 0x1, 0x0}, 0x0)
getuid()
r7 = fcntl$dupfd(r6, 0xc, r6)
sendmsg(r7,
&(0x7f0000000d00)={&(0x7f0000000900)=@un=@file={0x0, './file0\x00'}, 0xa,
&(0x7f0000000a80)=[{&(0x7f0000000940)="bc2979", 0x3},
{&(0x7f0000000980)="84ec6f127e1623f8aa8fa07c9ebc0a6f40dfe8ba98761bf867ec69fcce85500ccade82b058e818b49e0b47e274ee75cee944e20fcbd8aaedbb9a5f8ef69cf0d5ba49e2ba6350074915d0522f38c7acba2c3bfc2eee2f2f1ed995d29a87cf80a19812f6f655ddd040131ac191573bde72d3050e21430cf8cd2460265fc88d1264552186ff2dfc5b324fa0f6da049d7147330bcdfa4b079d8b0b9a9483f46c2d704e041ad962ae0f2f5221c56bb964bd3134696f5483f3452cbfc3dcbe86459babd2c7ebf1d8cf10a1c24ac5cda611df9c1a705927cd774d810b9f713844aca7e1f9725642459e9106b3c0468f8ffe9a718416",
0xf2}], 0x2, &(0x7f0000000ac0)=[{0xd0, 0x100,
0x6, "3fcd14f569f252017dbc999341224e9de37d57f0cb7b45b2051a5dd68a7082d5310e1ec1d0867672d6ceecc70bbd503bd339baee461cd6dcb90a84c864654d317ace2fd217c9c4dc06b69c431422b19661d8dcfd74d8fa34aef1bdef74810a7a34d06328af8e7f37f846d1af871c3309ba5ef86f322ccf52ccc989b3f642c2f4c30e7f9c1f848fa8f54a9ba02a3555d8fbe13630afa094790340a67f7b1d24412142845fea7810f88d1633824b9334385a4fcc9e06d044ac2b244bfe849da818"},
{0xf0, 0xffff,
0x2, "4c11385e8609520456d1dc078aaaed55e67ae2f5a9aa3ad1cb8851754093d84399adecbc967f3655dabcaff7b8ed497671aa7ab464e6b254e837b94d1494e5e4b09e0f852718fd6dde3fb18804813407e0ee930ddeecdfaa5af857bfc8eb7c9faf38733b62645cab0df08dcd48c3d71e92b62a1ff6dfa2d7cb4f092730e9a2b49523e784a5688dbed2cecc1d0972c5bc0d87a41a4d47ef7b8bfbf3de3d913a8e318b79ba13b91dc125aa789ee5afcd7d0d6d3fd399e1a9c71a4584f0d7116c28e4b890dd08f08f68f72e7d638faa2a97c7252a9244c4f19300a7de8ed3"},
{0x50, 0x101,
0x5, "b34d1aa82fd223e9cd0a1a14d5d16c45c2f3e4a184bf45e6dd55c07c1aeb8fd43a2e96c8e570b65f28456b5e768e7f0d087f00b2032ca78184f2f358c21501"}],
0x210}, 0x0)
accept$unix(r7, &(0x7f0000000d40)=@abs, &(0x7f0000000d80)=0x8)
geteuid()
setsockopt$sock_cred(r6, 0xffff, 0x11, &(0x7f0000000dc0)={r2, r4, r5}, 0xc)
r8 = msgget$private(0x0, 0x1)
msgctl$IPC_STAT(r8, 0x2, &(0x7f0000000e00)=""/122)
r9 = fcntl$dupfd(r7, 0x0, r7)
r10 = getuid()
getsockopt$SO_PEERCRED(r9, 0xffff, 0x11, &(0x7f0000000e80), 0xc)
getpeername$inet6(r9, &(0x7f0000000ec0), &(0x7f0000000f00)=0xc)
semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000f40)={{0x9, r10, r5, r1, r5,
0x21, 0xed}, 0x8000, 0x61, 0x6614dd80})

06:29:05 executing program 0:
r0 = msgget$private(0x0, 0x40)
msgsnd(r0,
&(0x7f0000000000)={0x3, "9e5babd9e6982ee7976757096a10014bba3b5a79d317d8b74bc2aeb6c38e1ecbd54dc10873eea3dc5d9655d9ee5aeeae1b53bfa0c6ed129d4f5f6ec6d0cd06e629d177421d204b6fba4ab6114122554c9448a0b57d51f665ac1efe6b336d0acfe41fa89f6a01c5d90dc1dc562301aebd39a892eb3c27756e38cf6357ba766784b142c62eb4c05d4e4a9d7ada5063c15008122709cf4380faed5cc4c96755c13e68ae77136822e7d7bbdf252d2cbbee01e6e8e1ef8c853b8e545bc4"},
0xc3, 0x800)
r1 = semget(0x3, 0x3, 0x4)
semctl$GETZCNT(r1, 0x3, 0x7, &(0x7f0000000100)=""/145)
pipe2(&(0x7f00000001c0)={<r2=>0xffffffffffffffff}, 0x1400004)
fcntl$setflags(r2, 0x2, 0x1)
utimensat(r2, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={{0x3f,
0x5}, {0x5, 0x8}}, 0x200)
pipe2(&(0x7f0000000280)={<r3=>0xffffffffffffffff, <r4=>0xffffffffffffffff},
0x1000000)
fchdir(r4)
connect$unix(r3, &(0x7f00000003c0)=@file={0x0, './file0\x00'}, 0xa)
pipe2(&(0x7f00000002c0)={<r5=>0xffffffffffffffff, <r6=>0xffffffffffffffff},
0x400000)
semget(0x3, 0x4, 0x698)
fchmod(r6, 0x12)
fchroot(r6)
msgrcv(r0, &(0x7f0000000300)={0x0, ""/145}, 0x99, 0x0, 0x1000)
pwritev(r4,
&(0x7f0000000540)=[{&(0x7f00000004c0)="d395cae33a14362ae0b45a3686ab8dc71c94808067a8ad7d040ee463c905c22d57e0f8bbaf127446785c1cd37c52a7033c76a6d3b87fa8c0e99d0f28b1d3b2658ac9267fac9133ed6192ede88466e4c46bd37799a19c67fa6f02be5eb615382bc2b49ca6fdc733",
0x67}], 0x1, 0x0)
getpeername$unix(r5, &(0x7f0000000580)=@file={0x0, ""/4096},
&(0x7f00000015c0)=0x1002)

06:29:05 executing program 5:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = open(&(0x7f0000001040)='./file0\x00', 0x0, 0x21)
getsockopt$sock_cred(r0, 0xffff, 0x11, &(0x7f0000001080)={<r2=>0x0},
&(0x7f00000010c0)=0xc)
fcntl$setown(r1, 0x6, r2)
r3 = dup(r0)
sendto$inet6(r3,
&(0x7f0000000000)="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

---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#bug-status-tracking for how to communicate with
syzbot.

syzbot

unread,
Feb 24, 2019, 3:17:05 PM2/24/19
to syzkaller-...@googlegroups.com
syzbot has found a reproducer for the following crash on:

HEAD commit: 11eef5b2ee47 Clear per-lwp entries whose mount is gone bef..
git tree: netbsd
console output: https://syzkaller.appspot.com/x/log.txt?x=16dbda5cc00000
dashboard link: https://syzkaller.appspot.com/bug?extid=0b9692ae0f49f93b7dc7
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=149284a4c00000
C reproducer: https://syzkaller.appspot.com/x/repro.c?x=14fcba7cc00000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+0b9692...@syzkaller.appspotmail.com

login: [ 41.3808332] ASan: Unauthorized Access In 0xffffffff80a7f51e: Addr
0xffffc08011f5b56c [4 bytes, read, RedZonePartial]
[ 41.3847664] #0 0xffffffff80a7f51e in in6_print <netbsd>
[ 41.3886962] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 41.3926299] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 41.3926299] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 41.3965580] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 41.4004902] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 41.4004902] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 41.4044183] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 41.4122800] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 41.4201431] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 41.4280047] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 41.4319346] #11 0xffffffff80f603ca in sosend <netbsd>
[ 41.4397954] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 41.4476573] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 41.4555203] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 41.4594507] ASan: Unauthorized Access In 0xffffffff80a7f9ec: Addr
0xffffc08011f5b570 [4 bytes, read, RedZone]
[ 41.4712428] #0 0xffffffff80a7f9ec in in6_print <netbsd>
[ 41.4791048] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 41.4869654] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 41.4948273] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 41.5026915] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 41.5105525] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 41.5144816] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 41.5223443] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 41.5302055] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 41.5380659] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 41.5459301] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 41.5538068] #11 0xffffffff80f603ca in sosend <netbsd>
[ 41.5577392] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 41.5655825] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 41.5734459] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 41.5813058] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b56c [2 bytes, read, RedZonePartial]
[ 41.5930980] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 41.6009625] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 41.6048910] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 41.6127531] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 41.6206148] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 41.6284761] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 41.6363377] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 41.6442022] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 41.6481310] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 41.6559926] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 41.6638539] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 41.6717147] #11 0xffffffff80f603ca in sosend <netbsd>
[ 41.6795789] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 41.6874403] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 41.6913851] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 41.6992423] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b56e [2 bytes, read, RedZonePartial]
[ 41.7110233] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 41.7188980] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 41.7267479] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 41.7346099] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 41.7385404] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 41.7464020] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 41.7542626] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 41.7621250] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 41.7699858] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 41.7778492] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 41.7817923] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 41.7896406] #11 0xffffffff80f603ca in sosend <netbsd>
[ 41.7975022] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 41.8053635] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 41.8132253] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 41.8171565] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b570 [2 bytes, read, RedZone]
[ 41.8289482] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 41.8368101] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 41.8446715] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 41.8525333] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 41.8603969] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 41.8643401] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 41.8722007] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 41.8800503] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 41.8879106] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 41.8957730] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 41.9036369] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 41.9075657] #11 0xffffffff80f603ca in sosend <netbsd>
[ 41.9154271] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 41.9232922] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 41.9311502] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 41.9350816] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b572 [2 bytes, read, RedZone]
[ 41.9508073] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 41.9547357] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 41.9625966] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 41.9704582] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 41.9783204] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 41.9861844] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 41.9940458] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 41.9979750] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 42.0058362] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 42.0136973] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 42.0215604] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 42.0294210] #11 0xffffffff80f603ca in sosend <netbsd>
[ 42.0333522] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 42.0412138] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 42.0490754] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 42.0569368] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b574 [2 bytes, read, RedZone]
[ 42.0687333] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 42.0766009] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 42.0805223] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 42.0883900] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 42.0962457] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 42.1041072] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 42.1119703] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 42.1198329] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 42.1237615] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 42.1316230] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 42.1394853] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 42.1473605] #11 0xffffffff80f603ca in sosend <netbsd>
[ 42.1552112] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 42.1630723] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 42.1670017] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 42.1748616] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b576 [2 bytes, read, RedZone]
[ 42.1866542] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 42.1945175] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 42.1984473] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 42.2063086] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 42.2141703] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 42.2220324] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 42.2298943] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 42.2377563] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 42.2456187] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 42.2495480] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 42.2574107] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 42.2652712] #11 0xffffffff80f603ca in sosend <netbsd>
[ 42.2731323] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 42.2810113] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 42.2888576] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 42.2927915] sockaddr_checklen: 0xffffc08011f5b560 bad len af=24
socklen=12 len=28 [inet6: ::]
[ 42.3006623] sockaddr_checklen: 0xffffc0816efcc020 bad len af=24
socklen=12 len=28 [inet6: [100::3400:0:0:0]:20013]
[ 42.3124412] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffffc08011f5b572 [1 byte, read, RedZone]
[ 42.3242336] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 42.3321008] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 42.3399574] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 42.3478188] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 42.3556804] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 42.3635423] #5 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 42.3714062] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 42.3753363] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 42.3831968] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 42.3910580] #9 0xffffffff80f603ca in sosend <netbsd>
[ 42.3989195] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 42.4067820] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 42.4146453] #12 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 42.4185747] #13 0xffffffff80ebc2de in sys_syscall <netbsd>
[ 42.4264362] #14 0xffffffff80265c1e in syscall <netbsd>
[ 42.4342978] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffffc08011f5b574 [1 byte, read, RedZone]
[ 42.4460924] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 42.4500210] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 42.4578824] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 42.4657439] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 42.4736199] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 42.4814673] #5 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 42.4893287] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 42.4971923] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 42.5011220] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 42.5089834] #9 0xffffffff80f603ca in sosend <netbsd>
[ 42.5168459] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 42.5247061] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 42.5325710] #12 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 42.5365000] #13 0xffffffff80ebc2de in sys_syscall <netbsd>
[ 42.5443602] #14 0xffffffff80265c1e in syscall <netbsd>
[ 42.5522226] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffffc08011f5b574 [1 byte, read, RedZone]
[ 42.5640159] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 42.5679457] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 42.5758070] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 42.5836689] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 42.5915315] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 42.5993928] #5 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 42.6072543] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 42.6151183] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 42.6190467] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 42.6269081] #9 0xffffffff80f603ca in sosend <netbsd>
[ 42.6347699] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 42.6426313] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 42.6504934] #12 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 42.6583584] #13 0xffffffff80ebc2de in sys_syscall <netbsd>
[ 42.6622858] #14 0xffffffff80265c1e in syscall <netbsd>
[ 42.6701472] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffffc08011f5b577 [1 byte, read, RedZone]
[ 42.6819407] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 42.6858717] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 42.6937323] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 42.7016013] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 42.7094668] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 42.7173183] #5 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 42.7251792] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 42.7330414] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 42.7409048] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 42.7448333] #9 0xffffffff80f603ca in sosend <netbsd>
[ 42.7526957] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 42.7605566] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 42.7684190] #12 0xffffffff80f6b3ac in sys_sendto <netbsd>
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 42.7762827] #13 0xffffffff80ebc2de in sys_syscall <netbsd>
[ 42.7802115] #14 0xffffffff80265c1e in syscall <netbsd>
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 43.2754970] ASan: Unauthorized Access In 0xffffffff80a7f51e: Addr
0xffffc08011f5b56c [4 bytes, read, RedZonePartial]
[ 43.2912214] #0 0xffffffff80a7f51e in in6_print <netbsd>
[ 43.2976806] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 43.3045588] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 43.3120971] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 43.3192665] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 43.3265979] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 43.3334767] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 43.3407504] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 43.3480559] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 43.3552302] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 43.3621392] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 43.3698375] #11 0xffffffff80f603ca in sosend <netbsd>
[ 43.3762637] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 43.3838441] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 43.3911453] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 43.3981417] ASan: Unauthorized Access In 0xffffffff80a7f9ec: Addr
0xffffc08011f5b570 [4 bytes, read, RedZone]
[ 43.4091461] #0 0xffffffff80a7f9ec in in6_print <netbsd>
[ 43.4160010] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 43.4228249] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 43.4303342] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 43.4376629] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 43.4446771] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 43.4523863] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 43.4602467] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 43.4667110] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 43.4738567] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 43.4808235] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 43.4883799] #11 0xffffffff80f603ca in sosend <netbsd>
[ 43.4956243] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 43.5034869] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 43.5098974] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 43.5168049] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b56c [2 bytes, read, RedZonePartial]
[ 43.5284765] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 43.5352048] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 43.5427946] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 43.5495057] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 43.5567049] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 43.5637313] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 43.5709231] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 43.5782030] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 43.5860461] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 43.5927783] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 43.5996875] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 43.6074605] #11 0xffffffff80f603ca in sosend <netbsd>
[ 43.6139850] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 43.6216461] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 43.6292718] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 43.6357578] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b56e [2 bytes, read, RedZonePartial]
[ 43.6474303] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 43.6542198] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 43.6610618] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 43.6686053] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 43.6764427] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 43.6828133] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 43.6900045] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 43.6972768] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 43.7046388] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 43.7118211] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 43.7185846] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 43.7261777] #11 0xffffffff80f603ca in sosend <netbsd>
[ 43.7326672] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 43.7402400] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 43.7474346] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 43.7543658] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b570 [2 bytes, read, RedZone]
[ 43.7653564] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 43.7721371] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 43.7790002] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 43.7865042] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 43.7943676] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 43.8006560] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 43.8078962] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 43.8152026] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 43.8225055] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 43.8297489] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 43.8365580] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 43.8441808] #11 0xffffffff80f603ca in sosend <netbsd>
[ 43.8507033] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 43.8582876] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 43.8655876] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 43.8724962] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b572 [2 bytes, read, RedZone]
[ 43.8834905] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 43.8902087] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 43.8970410] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 43.9045330] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 43.9122934] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 43.9187547] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 43.9259591] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 43.9332510] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 43.9405589] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 43.9477887] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 43.9555322] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 43.9633955] #11 0xffffffff80f603ca in sosend <netbsd>
[ 43.9690317] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 43.9766619] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 43.9840335] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 43.9909466] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b574 [2 bytes, read, RedZone]
[ 44.0027034] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 44.0086902] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 44.0154862] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 44.0229710] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 44.0302241] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 44.0380795] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 44.0445406] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 44.0518865] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 44.0592058] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 44.0663535] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 44.0734565] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 44.0813205] #11 0xffffffff80f603ca in sosend <netbsd>
[ 44.0876287] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 44.0952182] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 44.1025717] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 44.1095366] ASan: Unauthorized Access In 0xffffffff80a7f7e0: Addr
0xffffc08011f5b576 [2 bytes, read, RedZone]
[ 44.1206293] #0 0xffffffff80a7f7e0 in in6_print <netbsd>
[ 44.1272884] #1 0xffffffff80a7fbdf in sin6_print <netbsd>
[ 44.1341170] #2 0xffffffff80f4f561 in sockaddr_checklen <netbsd>
[ 44.1416506] #3 0xffffffff80f4f62a in sockaddr_alloc <netbsd>
[ 44.1488581] #4 0xffffffff80f4f78f in sockaddr_dup <netbsd>
[ 44.1560060] #5 0xffffffff81060f60 in rtcache_setdst <netbsd>
[ 44.1638670] #6 0xffffffff81061377 in rtcache_lookup2 <netbsd>
[ 44.1704311] #7 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 44.1777293] #8 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 44.1848341] #9 0xffffffff80aa9309 in rip6_output <netbsd>
[ 44.1918021] #10 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 44.1994921] #11 0xffffffff80f603ca in sosend <netbsd>
[ 44.2071061] #12 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 44.2137094] #13 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 44.2210151] #14 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 44.2279085] sockaddr_checklen: 0xffffc08011f5b560 bad len af=24
socklen=12 len=28 [inet6: ::]
[ 44.2373623] sockaddr_checklen: 0xffffc0816ef5c020 bad len af=24
socklen=12 len=28 [inet6: [100::3400:0:0:0]:20017]
[ 44.2488375] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffffc08011f5b572 [1 byte, read, RedZone]
[ 44.2597367] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 44.2663792] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 44.2739324] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 44.2820469] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 44.2896533] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 44.2975144] #5 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 44.3039146] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 44.3110300] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 44.3180853] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 44.3255972] #9 0xffffffff80f603ca in sosend <netbsd>
[ 44.3328982] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 44.3397061] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 44.3470030] #12 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 44.3539521] #13 0xffffffff80ebc2de in sys_syscall <netbsd>
[ 44.3610241] #14 0xffffffff80265c1e in syscall <netbsd>
[ 44.3675981] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffffc08011f5b574 [1 byte, read, RedZone]
[ 44.3784870] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 44.3851012] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 44.3921329] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 44.4006721] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 44.4077890] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 44.4154405] #5 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 44.4233012] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 44.4295788] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 44.4364994] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 44.4440017] #9 0xffffffff80f603ca in sosend <netbsd>
[ 44.4508171] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 44.4586787] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 44.4653040] #12 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 44.4722489] #13 0xffffffff80ebc2de in sys_syscall <netbsd>
[ 44.4792845] #14 0xffffffff80265c1e in syscall <netbsd>
[ 44.4858873] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffffc08011f5b574 [1 byte, read, RedZone]
[ 44.4967986] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 44.5034505] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 44.5104638] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 44.5190190] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 44.5261163] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 44.5334102] #5 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 44.5412268] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 44.5479035] #7 0xffffffff80aa9309 in rip6_output <netbsd>
[ 44.5548246] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 44.5623856] #9 0xffffffff80f603ca in sosend <netbsd>
[ 44.5688090] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 44.5766050] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 44.5844663] #12 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 44.5907988] #13 0xffffffff80ebc2de in sys_syscall <netbsd>
[ 44.5978216] #14 0xffffffff80265c1e in syscall <netbsd>
[ 44.6044262] ASan: Unauthorized Access In 0xffffffff8105b58f: Addr
0xffffc08011f5b577 [1 byte, read, RedZone]
[ 44.6159129] #0 0xffffffff8105b58f in rn_match <netbsd>
[ 44.6219637] #1 0xffffffff8106402d in rt_matchaddr <netbsd>
[ 44.6290553] #2 0xffffffff8105f503 in rtalloc1_locked.constprop.15
<netbsd>
[ 44.6376027] #3 0xffffffff8105ff5b in _rtcache_init <netbsd>
[ 44.6447233] #4 0xffffffff81061442 in rtcache_lookup2 <netbsd>
[ 44.6521457] #5 0xffffffff80a8038f in in6_selectroute <netbsd>
[ 44.6596002] #6 0xffffffff80a80797 in in6_selectsrc <netbsd>
[ 44.6670135] #7 0xffffffff80aa9309 in rip6_output <netbsd>
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
[ 44.6736505] #8 0xffffffff80aa9f14 in rip6_send_wrapper <netbsd>
[ 44.6811626] #9 0xffffffff80f603ca in sosend <netbsd>
[ 44.6876457] #10 0xffffffff80f6acb1 in do_sys_sendmsg_so <netbsd>
[ 44.6951871] #11 0xffffffff80f6b26e in do_sys_sendmsg <netbsd>
[ 44.7025324] #12 0xffffffff80f6b3ac in sys_sendto <netbsd>
[ 44.7102546] #13 0xffffffff80ebc2de in sys_syscall <netbsd>
[ 44.7165049] #14 0xffffffff80265c1e in syscall <netbsd>
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing program
executing progr
Reply all
Reply to author
Forward
0 new messages