ASan: Unauthorized Access in exec_makepathbuf

2 views
Skip to first unread message

syzbot

unread,
Jun 21, 2019, 7:51:06 AM6/21/19
to syzkaller-...@googlegroups.com
Hello,

syzbot found the following crash on:

HEAD commit: 1f4f8368 Revert previous
git tree: netbsd
console output: https://syzkaller.appspot.com/x/log.txt?x=154daa6ea00000
dashboard link: https://syzkaller.appspot.com/bug?extid=8665827f389a9fac5cc9

Unfortunately, I don't have any reproducer for this crash yet.

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+866582...@syzkaller.appspotmail.com

�)j��8{ �o,���G���Ժ����WU0D�!h �]A���ش�<8��J �@���+�.� K �mZ���>!���� � 4
4 @ � @ �
�
[
2602.4621053] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffdc8012d36c88 [1 byte, write, PoolRedZone]
[ 2602.4843562] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 2602.4987588] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 2602.5109335] #2 0xffffffff810fcfe3 in execve1 <netbsd>
00:00:17 executing program 5:
preadv(0xffffffffffffffff, &(0x7f0000000180), 0x1000000000000203, 0x0)
r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000000),
&(0x7f0000000040)=0xc)
pwritev(r0,
&(0x7f0000000240)=[{&(0x7f0000000080)="246a1f036a1ccad3d18b3333e9df6d4836af078c7df43acaf2ca3edc4424f44babceb4613e63cac6ec0ac42bd78b7a4a9be37ddea04dcb3f07247a85e02ea970be7b9ab0bb78225e64a0de9392ac7944cb82f620c595b63cce8d8fe569f84a975b0a21611a79d1d20f53a4a4080d189e6080b893948d5f9cb018e1588ec4ad16e1b0a7d48f45b69ca0a1252626121ad4112de26c0527234df22eb45bd3873ede30ae115eb0de397c046713ba2124",
0xfffffe0a},
{&(0x7f0000000140)="bf36d92854935e9ca2b338c92f03670ea0fb5e35d78ee4ad94d877d64b3650939af84d4621742ceeeb1a9715847455f083b410726ea22c43bfacf270014baa1330ed1287dcfe761a43a717ce146bc7c330a5de2daae108cfb02868c6af40102966c3a02562e286a23ec0eb6b6c584011e3fbbb44beedf78e4a62fdb9ecdab5cfbc5c31ac2485eac9820bc864b0064e51d0af960be8e7614eeb5da24268be50ed006195db2f7c85a21aeb349927a51d",
0xaf}], 0x2, 0x0)
r1 = getuid()
seteuid(r1)

00:00:17 executing program 0:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/251, 0xfb)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe}, {0x0}], 0x2)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:17 executing program 5:
r0 = socket(0x2, 0x10000000000003, 0x0)
connect$unix(r0,
&(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10)
sendto$inet6(r0, &(0x7f0000000040), 0xfffffe09, 0x1000000000000, 0x0, 0x13d)

00:00:17 executing program 1:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000300)="11bdfada7a47a33bbd46a36133b278a547aca8f077ac1e1fe77339891673e9f4273c5a7957f87a4cd1b08ab5482bab059ebbd898275ae92146b8fdf7c23ecf5d4f4ecd66bae9d11ac10b51faf7a8362dde563b723af5f28de95f6cc4c0ce6153291bb22c1f2239eff91ea34ade65cf3049703b50aedad81805d277f8a6d838edd7622094802d245c08b5b2b491dc7515830ba9f1186dc056da8a9f5ad1f27daed524436a64c91546d426d490c6e21dc5965f39fb3df093d3020d9d759850df10a14a5614fa200125808f8aa5750f02061b5af07b13d98b2f93d417633bbcd5b1c591710ea18c65d6",
0xe8},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec",
0xe5}], 0x4)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

[ 2602.5226362] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 2602.5347633] #4 0xffffffff80277d17 in syscall <netbsd>
[ 2602.6289671] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffdc8011f65c58 [1 byte, write, PoolRedZone]
[ 2602.6400902] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 2602.6512156] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 2602.6623395] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 2602.6734626] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 2602.6845887] #4 0xffffffff80277d17 in syscall <netbsd>
00:00:18 executing program 5:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000300)="11bdfada7a47a33bbd46a36133b278a547aca8f077ac1e1fe77339891673e9f4273c5a7957f87a4cd1b08ab5482bab059ebbd898275ae92146b8fdf7c23ecf5d4f4ecd66bae9d11ac10b51faf7a8362dde563b723af5f28de95f6cc4c0ce6153291bb22c1f2239eff91ea34ade65cf3049703b50aedad81805d277f8a6d838edd7622094802d245c08b5b2b491dc7515830ba9f1186dc056da8a9f5ad1f27daed524436a64c91546d426d490c6e21dc5965f39fb3df093d3020d9d759850df10a14a5614fa200125808f8aa5750f02061b5af07b13d98b2f93d417633bbcd5b1c591710ea18c65d6",
0xe8},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec",
0xe5}], 0x4)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 4:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f00000002c0)=[{&(0x7f0000000380)="82f6ca89e1654b5b39c786219b4860ceb04e10f29fa1d7b8cb2f6321fe6d519445587c9b4322f0a786b5c995d5d3ccdbfdd8834b5c5709e73b49d718713bb4d34dadfb3a743ede951d58a6f5815d31ba9159e37b5a27fe997d34a45e89fe59c08e5490656bd89b10e8d4068af1430ca5c57456c82aeab8f0cf0068b6670393112f",
0x81}], 0x1)
r1 = shmget$private(0x0, 0x1000, 0x0, &(0x7f0000010000/0x1000)=nil)
shmctl$SHM_UNLOCK(r1, 0x4)
r2 = accept(r0, 0x0, &(0x7f0000000000))
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
accept$inet(r2, &(0x7f00000000c0), &(0x7f0000000100)=0xc)
unlinkat(r0, &(0x7f0000000080)='./file0\x00', 0x0)

00:00:18 executing program 0:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/251, 0xfb)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe}, {0x0}], 0x2)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="46bca24b69ea081a17a8860561e618a1bc063d7d17b79b9cf2169c19ab3a5a82f4be50cd6d63dd0d7c574dc1cd1f837a7c04245ad52b8f0ec65bec3e75f60aed3ba0155634447b6d36e70cd12d332c2e9d1bbdd1dffcf22e0f18230b54acedc326412d113e084e65ee1917d0d210d852b85f1d671ef65d130383590abdec2ec5c0c4e63822406d8f602e191625c8b50a97f904aa56af64623aac1cc4b3459296b6e0165813ac06a3391bfc0f45dc6c781bb9a1d32d0961c6dfea210a84a17485d870eae9a6f4f2984124aa2db973020a283e2b529e3bb5962aedbe3ec87593cc12605ede3aaeef24bb4c465013fc6f863e04518a54081537e436a450cfceadf19854efa763e1938b0a595fd55be5be98b683b6ec9eec979e06799e6849fb464cd410ea6d394677f675bd2df9069138925f260cffdc14e67b5533738662b1e99388a8b2828e0ef9bef819edb35608b5de13ee58f262535282da020c5a92386c094f290b9b28a16c2b507d2a9f0970fd6a031eef",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 2:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec3a7357",
0xe8}], 0x3)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 1:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000300)="11bdfada7a47a33bbd46a36133b278a547aca8f077ac1e1fe77339891673e9f4273c5a7957f87a4cd1b08ab5482bab059ebbd898275ae92146b8fdf7c23ecf5d4f4ecd66bae9d11ac10b51faf7a8362dde563b723af5f28de95f6cc4c0ce6153291bb22c1f2239eff91ea34ade65cf3049703b50aedad81805d277f8a6d838edd7622094802d245c08b5b2b491dc7515830ba9f1186dc056da8a9f5ad1f27daed524436a64c91546d426d490c6e21dc5965f39fb3df093d3020d9d759850df10a14a5614fa200125808f8aa5750f02061b5af07b13d98b2f93d417633bbcd5b1c591710ea18c65d6",
0xe8},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec",
0xe5}], 0x4)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 3:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000300)="11bdfada7a47a33bbd46a36133b278a547aca8f077ac1e1fe77339891673e9f4273c5a7957f87a4cd1b08ab5482bab059ebbd898275ae92146b8fdf7c23ecf5d4f4ecd66bae9d11ac10b51faf7a8362dde563b723af5f28de95f6cc4c0ce6153291bb22c1f2239eff91ea34ade65cf3049703b50aedad81805d277f8a6d838edd7622094802d245c08b5b2b491dc7515830ba9f1186dc056da8a9f5ad1f27daed524436a64c91546d426d490c6e21dc5965f39fb3df093d3020d9d759850df10a14a5614fa200125808f8aa5750f02061b5af07b13d98b2f93d417633bbcd5b1c591710ea18c65d6",
0xe8},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec",
0xe5}], 0x4)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="46bca24b69ea081a17a8860561e618a1bc063d7d17b79b9cf2169c19ab3a5a82f4be50cd6d63dd0d7c574dc1cd1f837a7c04245ad52b8f0ec65bec3e75f60aed3ba0155634447b6d36e70cd12d332c2e9d1bbdd1dffcf22e0f18230b54acedc326412d113e084e65ee1917d0d210d852b85f1d671ef65d130383590abdec2ec5c0c4e63822406d8f602e191625c8b50a97f904aa56af64623aac1cc4b3459296b6e0165813ac06a3391bfc0f45dc6c781bb9a1d32d0961c6dfea210a84a17485d870eae9a6f4f2984124aa2db973020a283e2b529e3bb5962aedbe3ec87593cc12605ede3aaeef24bb4c465013fc6f863e04518a54081537e436a450cfceadf19854efa763e1938b0a595fd55be5be98b683b6ec9eec979e06799e6849fb464cd410ea6d394677f675bd2df9069138925f260cffdc14e67b5533738662b1e99388a8b2828e0ef9bef819edb35608b5de13ee58f262535282da020c5a92386c094f290b9b28a16c2b507d2a9f0970fd6a031eef",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 2:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec3a73574b24",
0xea}], 0x3)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 4:
socket$inet(0x2, 0x70000007, 0x5)
setregid(0xffffffffffffffff, 0xffffffffffffffff)
r0 = socket(0x1f, 0x7, 0x5)
setsockopt$inet_opts(r0, 0x0, 0x1,
&(0x7f0000000000)="ed07bde5cc71fbcd28d631bb147697785c9aa852dafa3208d607db251dd1ccbe31223701ca5f661763c2c4b9debdf3eec9863b1bad37e0e8b3d81949eb6924658afb7bdebe26ec1e666d8430e6a21305530662b84fa1df3bdaaf1fd89db191c8296f7edd877bc1e2fe4e6002b2f8ef1d342c633f82b619ed33036a",
0x7b)

[ 2603.1851864] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffdc8011f65c58 [1 byte, write, PoolRedZone]
[ 2603.2074358] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 2603.2185588] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 2603.2296854] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 2603.2408096] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 2603.2519328] #4 0xffffffff80277d17 in syscall <netbsd>
00:00:18 executing program 4:
r0 = socket(0x26, 0x10000003, 0xfffffffffffffffc)
sendto(r0, &(0x7f0000000000)="9045a723", 0x4, 0x0, 0x0, 0x0)
r1 = getuid()
getgroups(0x3, &(0x7f0000001140)=[0x0, 0xffffffffffffffff,
<r2=>0xffffffffffffffff])
lchown(&(0x7f0000001100)='./file0\x00', r1, r2)
recvfrom(r0, 0x0, 0x3de, 0x0, 0x0, 0x0)
recvfrom$unix(r0, &(0x7f0000000040)=""/4096, 0x1000, 0x3,
&(0x7f0000001040)=@abs={0x1, 0x0, 0x0}, 0x8)
mkdir(&(0x7f00000010c0)='./file0\x00', 0x180)
mkdir(&(0x7f0000001080)='./file0\x00', 0x20)

00:00:18 executing program 0:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/251, 0xfb)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe}, {&(0x7f0000000600)}], 0x2)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="46bca24b69ea081a17a8860561e618a1bc063d7d17b79b9cf2169c19ab3a5a82f4be50cd6d63dd0d7c574dc1cd1f837a7c04245ad52b8f0ec65bec3e75f60aed3ba0155634447b6d36e70cd12d332c2e9d1bbdd1dffcf22e0f18230b54acedc326412d113e084e65ee1917d0d210d852b85f1d671ef65d130383590abdec2ec5c0c4e63822406d8f602e191625c8b50a97f904aa56af64623aac1cc4b3459296b6e0165813ac06a3391bfc0f45dc6c781bb9a1d32d0961c6dfea210a84a17485d870eae9a6f4f2984124aa2db973020a283e2b529e3bb5962aedbe3ec87593cc12605ede3aaeef24bb4c465013fc6f863e04518a54081537e436a450cfceadf19854efa763e1938b0a595fd55be5be98b683b6ec9eec979e06799e6849fb464cd410ea6d394677f675bd2df9069138925f260cffdc14e67b5533738662b1e99388a8b2828e0ef9bef819edb35608b5de13ee58f262535282da020c5a92386c094f290b9b28a16c2b507d2a9f0970fd6a031eef",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 1:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000300)="11bdfada7a47a33bbd46a36133b278a547aca8f077ac1e1fe77339891673e9f4273c5a7957f87a4cd1b08ab5482bab059ebbd898275ae92146b8fdf7c23ecf5d4f4ecd66bae9d11ac10b51faf7a8362dde563b723af5f28de95f6cc4c0ce6153291bb22c1f2239eff91ea34ade65cf3049703b50aedad81805d277f8a6d838edd7622094802d245c08b5b2b491dc7515830ba9f1186dc056da8a9f5ad1f27daed524436a64c91546d426d490c6e21dc5965f39fb3df093d3020d9d759850df10a14a5614fa200125808f8aa5750f02061b5af07b13d98b2f93d417633bbcd5b1c591710ea18c65d6",
0xe8},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec3a73",
0xe7}], 0x4)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 2:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec3a73574b24",
0xea}], 0x3)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="46bca24b69ea081a17a8860561e618a1bc063d7d17b79b9cf2169c19ab3a5a82f4be50cd6d63dd0d7c574dc1cd1f837a7c04245ad52b8f0ec65bec3e75f60aed3ba0155634447b6d36e70cd12d332c2e9d1bbdd1dffcf22e0f18230b54acedc326412d113e084e65ee1917d0d210d852b85f1d671ef65d130383590abdec2ec5c0c4e63822406d8f602e191625c8b50a97f904aa56af64623aac1cc4b3459296b6e0165813ac06a3391bfc0f45dc6c781bb9a1d32d0961c6dfea210a84a17485d870eae9a6f4f2984124aa2db973020a283e2b529e3bb5962aedbe3ec87593cc12605ede3aaeef24bb4c465013fc6f863e04518a54081537e436a450cfceadf19854efa763e1938b0a595fd55be5be98b683b6ec9eec979e06799e6849fb464cd410ea6d394677f675bd2df9069138925f260cffdc14e67b5533738662b1e99388a8b2828e0ef9bef819edb35608b5de13ee58f262535282da020c5a92386c094f290b9b28a16c2b507d2a9f0970fd6a031eef",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 5:
r0 = accept$unix(0xffffffffffffff9c, &(0x7f0000000140)=@file={0x0, ""/108},
&(0x7f0000000040)=0x6e)
mmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x1, 0x10, r0, 0x0, 0x0)
r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
fdatasync(r1)
stat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0))
r2 = open$dir(&(0x7f0000001240)='./file0\x00', 0x40000400000002c2, 0x0)
pwritev(r2, &(0x7f0000000080)=[{&(0x7f00000006c0), 0x100000}], 0x1, 0x0)
lseek(r2, 0x0, 0x0)
open(&(0x7f00000010c0)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 4:
r0 = socket$unix(0x1, 0x2, 0x0)
r1 = socket$unix(0x1, 0x1, 0x0)
poll(&(0x7f0000000100)=[{r1, 0x4}], 0x1, 0xf1bc)
r2 = socket$unix(0x1, 0x1, 0x0)
dup2(r1, r2)
poll(&(0x7f0000000040)=[{r2, 0xd}], 0x1, 0x0)
poll(&(0x7f0000000000)=[{r0, 0x42}], 0x2121, 0x5)
fcntl$dupfd(r0, 0xa, 0xffffffffffffffff)

[ 2603.4410586] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffdc8011f65c58 [1 byte, write, PoolRedZone]
[ 2603.4632952] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 2603.4754148] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 2603.4872847] #2 0xffffffff810fcfe3 in execve1 <netbsd>
00:00:18 executing program 1:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000300)="11bdfada7a47a33bbd46a36133b278a547aca8f077ac1e1fe77339891673e9f4273c5a7957f87a4cd1b08ab5482bab059ebbd898275ae92146b8fdf7c23ecf5d4f4ecd66bae9d11ac10b51faf7a8362dde563b723af5f28de95f6cc4c0ce6153291bb22c1f2239eff91ea34ade65cf3049703b50aedad81805d277f8a6d838edd7622094802d245c08b5b2b491dc7515830ba9f1186dc056da8a9f5ad1f27daed524436a64c91546d426d490c6e21dc5965f39fb3df093d3020d9d759850df10a14a5614fa200125808f8aa5750f02061b5af07b13d98b2f93d417633bbcd5b1c591710ea18c65d6",
0xe8},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec3a73",
0xe7}], 0x4)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

[ 2603.4986776] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 2603.5106766] #4 0xffffffff80277d17 in syscall <netbsd>
00:00:18 executing program 4:
r0 = socket(0x18, 0x1, 0x2)
setsockopt(r0, 0x29, 0x0, &(0x7f0000000040)="eb3f9648", 0x4)

00:00:18 executing program 0:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/251, 0xfb)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe}, {&(0x7f0000000600)}], 0x2)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 3:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000300)="11bdfada7a47a33bbd46a36133b278a547aca8f077ac1e1fe77339891673e9f4273c5a7957f87a4cd1b08ab5482bab059ebbd898275ae92146b8fdf7c23ecf5d4f4ecd66bae9d11ac10b51faf7a8362dde563b723af5f28de95f6cc4c0ce6153291bb22c1f2239eff91ea34ade65cf3049703b50aedad81805d277f8a6d838edd7622094802d245c08b5b2b491dc7515830ba9f1186dc056da8a9f5ad1f27daed524436a64c91546d426d490c6e21dc5965f39fb3df093d3020d9d759850df10a14a5614fa200125808f8aa5750f02061b5af07b13d98b2f93d417633bbcd5b1c591710ea18c65d6",
0xe8},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec",
0xe5}], 0x4)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 2:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec3a73574b24",
0xea}], 0x3)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 1:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000300)="11bdfada7a47a33bbd46a36133b278a547aca8f077ac1e1fe77339891673e9f4273c5a7957f87a4cd1b08ab5482bab059ebbd898275ae92146b8fdf7c23ecf5d4f4ecd66bae9d11ac10b51faf7a8362dde563b723af5f28de95f6cc4c0ce6153291bb22c1f2239eff91ea34ade65cf3049703b50aedad81805d277f8a6d838edd7622094802d245c08b5b2b491dc7515830ba9f1186dc056da8a9f5ad1f27daed524436a64c91546d426d490c6e21dc5965f39fb3df093d3020d9d759850df10a14a5614fa200125808f8aa5750f02061b5af07b13d98b2f93d417633bbcd5b1c591710ea18c65d6",
0xe8},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec3a",
0xe6}], 0x4)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:18 executing program 4:
r0 = socket(0x18, 0x1, 0x0)
setsockopt(r0, 0xfffff7fffffffffd, 0x7,
&(0x7f0000000100)="00b53e4523ac279c91b349", 0xb)
connect(r0, &(0x7f0000000040)=@un=@abs={0x0, 0x0, 0x3}, 0x8)
getsockopt(r0, 0x0, 0x9, 0x0, 0x0)
socket$inet(0x2, 0x3, 0x7)

00:00:18 executing program 4:
r0 = socket$inet6(0x18, 0x3, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
r2 = semget$private(0x0, 0x3, 0x4)
semctl$GETALL(r2, 0x0, 0x6, &(0x7f0000000180)=""/219)
shutdown(r1, 0x0)
fdatasync(r1)
socket$inet6(0x18, 0x40000000, 0x1)
fcntl$getown(r0, 0x5)
recvfrom(r0, &(0x7f0000000040)=""/48, 0x30, 0x800, 0x0, 0xfffffffffffffd4d)
fcntl$setflags(r0, 0x2, 0x1)
bind(r0, &(0x7f0000000000)=@in={0x2, 0x2}, 0xc)
r3 = semget$private(0x0, 0x4, 0x402)
sendmsg$unix(r1, &(0x7f00000003c0)={&(0x7f0000000140)=@abs={0x1, 0x0, 0x0},
0x8,
&(0x7f0000000300)=[{&(0x7f00000002c0)="6e33acc76e77f4eb86d8560b5a741d7a295294a71d32ee227ab0a5d61657fbc0df",
0x21}], 0x1, 0x0, 0x0, 0x8}, 0x1)
semctl$GETPID(r3, 0x4, 0x4, &(0x7f0000000080)=""/170)
close(r1)

00:00:19 executing program 0:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/251, 0xfb)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe}, {&(0x7f0000000600)}], 0x2)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:19 executing program 4:
r0 = socket(0x2, 0x1, 0x0)
setsockopt(r0, 0x6, 0x5, &(0x7f0000000000)='\x00\x00\x00\x00', 0x4)

[ 2603.7525305] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffdc8011f29c48 [1 byte, write, PoolRedZone]
[ 2603.7636524] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 2603.7747796] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 2603.7859009] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 2603.7970240] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 2603.8081616] #4 0xffffffff80277d17 in syscall <netbsd>
00:00:19 executing program 2:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec3a73574b247e",
0xeb}], 0x2)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="46bca24b69ea081a17a8860561e618a1bc063d7d17b79b9cf2169c19ab3a5a82f4be50cd6d63dd0d7c574dc1cd1f837a7c04245ad52b8f0ec65bec3e75f60aed3ba0155634447b6d36e70cd12d332c2e9d1bbdd1dffcf22e0f18230b54acedc326412d113e084e65ee1917d0d210d852b85f1d671ef65d130383590abdec2ec5c0c4e63822406d8f602e191625c8b50a97f904aa56af64623aac1cc4b3459296b6e0165813ac06a3391bfc0f45dc6c781bb9a1d32d0961c6dfea210a84a17485d870eae9a6f4f2984124aa2db973020a283e2b529e3bb5962aedbe3ec87593cc12605ede3aaeef24bb4c465013fc6f863e04518a54081537e436a450cfceadf19854efa763e1938b0a595fd55be5be98b683b6ec9eec979e06799e6849fb464cd410ea6d394677f675bd2df9069138925f260cffdc14e67b5533738662b1e99388a8b2828e0ef9bef819edb35608b5de13ee58f262535282da020c5a92386c094f290b9b28a16c2b507d2a9f0970fd6a031eef",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:19 executing program 5:
pipe2(&(0x7f0000000040)={0xffffffffffffffff, <r0=>0xffffffffffffffff}, 0x0)
fdatasync(r0)

00:00:19 executing program 0:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/251, 0xfb)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a1",
0x78}], 0x2)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:19 executing program 4:
setrlimit(0x6, &(0x7f00000000c0))
r0 = msgget(0x0, 0x600)
msgsnd(r0,
&(0x7f0000000000)={0x3, "5fa5d7b06b9199df802e216def6f63b4728e9f5efe0a933c86183a349f73e2e64dd272e56c2c609d29f092d1a026a0ed572ce66f78bbab55de2eefacf8acbe6ae4cbe6c8aca4c61c258bb297528015f13371b656bbf93be63aa1f86a25b41f9ecb715999c818f7865be4ea3d5ef2d3d63500f55fc953437b6c60c8f36136d0c18f05b1f3920816"},
0x8f, 0x800)
msgget$private(0x0, 0x20)
mlockall(0x1)
semget(0x1, 0x1, 0x80)
munlockall()

00:00:19 executing program 1:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000300)="11bdfada7a47a33bbd46a36133b278a547aca8f077ac1e1fe77339891673e9f4273c5a7957f87a4cd1b08ab5482bab059ebbd898275ae92146b8fdf7c23ecf5d4f4ecd66bae9d11ac10b51faf7a8362dde563b723af5f28de95f6cc4c0ce6153291bb22c1f2239eff91ea34ade65cf3049703b50aedad81805d277f8a6d838edd7622094802d245c08b5b2b491dc7515830ba9f1186dc056da8a9f5ad1f27daed524436a64c91546d426d490c6e21dc5965f39fb3df093d3020d9d759850df10a14a5614fa200125808f8aa5750f02061b5af07b13d98b2f93d417633bbcd5b1c591710ea18c65d6",
0xe8},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec",
0xe5}], 0x4)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="46bca24b69ea081a17a8860561e618a1bc063d7d17b79b9cf2169c19ab3a5a82f4be50cd6d63dd0d7c574dc1cd1f837a7c04245ad52b8f0ec65bec3e75f60aed3ba0155634447b6d36e70cd12d332c2e9d1bbdd1dffcf22e0f18230b54acedc326412d113e084e65ee1917d0d210d852b85f1d671ef65d130383590abdec2ec5c0c4e63822406d8f602e191625c8b50a97f904aa56af64623aac1cc4b3459296b6e0165813ac06a3391bfc0f45dc6c781bb9a1d32d0961c6dfea210a84a17485d870eae9a6f4f2984124aa2db973020a283e2b529e3bb5962aedbe3ec87593cc12605ede3aaeef24bb4c465013fc6f863e04518a54081537e436a450cfceadf19854efa763e1938b0a595fd55be5be98b683b6ec9eec979e06799e6849fb464cd410ea6d394677f675bd2df9069138925f260cffdc14e67b5533738662b1e99388a8b2828e0ef9bef819edb35608b5de13ee58f262535282da020c5a92386c094f290b9b28a16c2b507d2a9f0970fd6a031eef",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:19 executing program 3:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000300)="11bdfada7a47a33bbd46a36133b278a547aca8f077ac1e1fe77339891673e9f4273c5a7957f87a4cd1b08ab5482bab059ebbd898275ae92146b8fdf7c23ecf5d4f4ecd66bae9d11ac10b51faf7a8362dde563b723af5f28de95f6cc4c0ce6153291bb22c1f2239eff91ea34ade65cf3049703b50aedad81805d277f8a6d838edd7622094802d245c08b5b2b491dc7515830ba9f1186dc056da8a9f5ad1f27daed524436a64c91546d426d490c6e21dc5965f39fb3df093d3020d9d759850df10a14a5614fa200125808f8aa5750f02061b5af07b13d98b2f93d417633bbcd5b1c591710ea18c65d6",
0xe8},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec",
0xe5}], 0x4)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="46bca24b69ea081a17a8860561e618a1bc063d7d17b79b9cf2169c19ab3a5a82f4be50cd6d63dd0d7c574dc1cd1f837a7c04245ad52b8f0ec65bec3e75f60aed3ba0155634447b6d36e70cd12d332c2e9d1bbdd1dffcf22e0f18230b54acedc326412d113e084e65ee1917d0d210d852b85f1d671ef65d130383590abdec2ec5c0c4e63822406d8f602e191625c8b50a97f904aa56af64623aac1cc4b3459296b6e0165813ac06a3391bfc0f45dc6c781bb9a1d32d0961c6dfea210a84a17485d870eae9a6f4f2984124aa2db973020a283e2b529e3bb5962aedbe3ec87593cc12605ede3aaeef24bb4c465013fc6f863e04518a54081537e436a450cfceadf19854efa763e1938b0a595fd55be5be98b683b6ec9eec979e06799e6849fb464cd410ea6d394677f675bd2df9069138925f260cffdc14e67b5533738662b1e99388a8b2828e0ef9bef819edb35608b5de13ee58f262535282da020c5a92386c094f290b9b28a16c2b507d2a9f0970fd6a031eef",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:19 executing program 2:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec3a73574b247e",
0xeb}], 0x2)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:19 executing program 5:
r0 = socket(0x1d, 0x10000000000003, 0x0)
shutdown(r0, 0x1)
recvfrom$inet(r0, &(0x7f0000000000)=""/4096, 0x1000, 0x40,
&(0x7f0000001000)={0x2, 0x3}, 0xc)

00:00:19 executing program 2:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec3a73574b247e",
0xeb}], 0x2)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:19 executing program 1:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000280)="c376a8108f21655fe5b1ec062d020d95d65cf8f0ae3790d61985af13d985889bad0cbe42ebcdcd793e65c9a32c344079db8ebb2f632bfc14204b84e355d7993786ee04fc0f82f341bdfa",
0x4a},
{&(0x7f0000000300)="11bdfada7a47a33bbd46a36133b278a547aca8f077ac1e1fe77339891673e9f4273c5a7957f87a4cd1b08ab5482bab059ebbd898275ae92146b8fdf7c23ecf5d4f4ecd66bae9d11ac10b51faf7a8362dde563b723af5f28de95f6cc4c0ce6153291bb22c1f2239eff91ea34ade65cf3049703b50aedad81805d277f8a6d838edd7622094802d245c08b5b2b491dc7515830ba9f1186dc056da8a9f5ad1f27daed524436a64c91546d426d490c6e21dc5965f39fb3df093d3020d9d759850df10a14a5614fa200125808f8aa5750f02061b5af07b13d98b2f93d417633bbcd5b1c591710ea18c65d6",
0xe8},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a12b88fec5cce2bb024938531c32b77bac0518f09cdbbdf9b69221e5b387be36aba6c8e9376a30f22a36bd1157cecb3b03d59caebc8e8553742af31d6db286797d375775417f7b483e8c314c1a6f76ec3635183212c34908d58827d4e125606aeb0ef8b0df1c9c12d4b39f6541ec",
0xe5}], 0x4)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

00:00:19 executing program 0:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0x0)
readlink(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)=""/251, 0xfb)
writev(r0,
&(0x7f0000000400)=[{&(0x7f00000001c0)="ecc083aad8adc02492aedd5909230a0b154bef15c4d0da54d1a2dc73924dd063519153ecd079a1ceff98eed7074eb78eec3a6a773a5d9217ec58bfc46b7f95de64a0b4082e8e6a284abe773f8b913c71f6718e665cd3bf256db3ecd77b28f1c81712f2aece48ad0234aeb3960eff079bd38bd4fd73ef88c90fc71529ccf00c2ad10cf51084eaa9f9e20ffc67e22b2703cacadce25cb993b9470d8ee0570471633cdaf94c0aea04039f8a4b03f1cb9c74ef2e250cd7603dc01fa6b2515ca4",
0xbe},
{&(0x7f0000000600)="7c7353fc7f7ea4b9a852f79eb9609f64280f548369702046f992a8ced0a4a58ac64d7b172f1b051ea6bc53a0d4dc12bed7ec6c1acc99a4b38d7dffa50d1362544e9f673916344adc3a310b7d561885646e9dc338496ac8b7230d11ad309949bfe28a9acbc91b3c0f51109397913f53ba2e5301cc4038f4a1",
0x78}], 0x2)
writev(r0,
&(0x7f0000001480)=[{&(0x7f0000000480)="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",
0x173}], 0x1)
mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0, 0x0)
execve(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)

[ 2604.4533687] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffdc80129e3468 [1 byte, write, PoolRedZone]
[ 2604.4756136] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 2604.4867376] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 2604.4978628] #2 0xffffffff810fcfe3 in execve1 <netbsd>
00:00:19 executing program 1:
r0 = open(&(0x7f0000000040)='./file0\x00', 0x60e, 0

---
This bug is generated by a bot. It may contain errors.
See https://goo.gl/tpsmEJ for more information about syzbot.
syzbot engineers can be reached at syzk...@googlegroups.com.

syzbot will keep track of this bug report. See:
https://goo.gl/tpsmEJ#status for how to communicate with syzbot.

syzbot

unread,
Jun 21, 2019, 8:24:06 AM6/21/19
to syzkaller-...@googlegroups.com
syzbot has found a reproducer for the following crash on:

HEAD commit: 1f4f8368 Revert previous
git tree: netbsd
console output: https://syzkaller.appspot.com/x/log.txt?x=15af46d6a00000
dashboard link: https://syzkaller.appspot.com/bug?extid=8665827f389a9fac5cc9
syz repro: https://syzkaller.appspot.com/x/repro.syz?x=16c3aea1a00000

IMPORTANT: if you fix the bug, please add the following tag to the commit:
Reported-by: syzbot+866582...@syzkaller.appspotmail.com

[ 44.4295628] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012001870 [1 byte, write, PoolRedZone]
[ 44.4378628] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 44.4461650] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 44.4503152] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 44.4544647] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 44.4669168] #4 0xffffffff80277d17 in syscall <netbsd>
[ 44.5001391] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52ca0 [1 byte, write, PoolRedZone]
[ 44.5125756] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 44.5250290] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 44.5333320] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 44.5457826] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 44.5540838] #4 0xffffffff80277d17 in syscall <netbsd>
[ 44.6786079] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012017c80 [1 byte, write, PoolRedZone]
[ 44.6910573] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 44.7035103] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 44.7118112] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 44.7242631] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 44.7325656] #4 0xffffffff80277d17 in syscall <netbsd>
[ 44.8363373] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc480129e1478 [1 byte, write, PoolRedZone]
[ 44.8612398] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 44.8736928] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 44.8819917] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 44.8902947] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 44.8986137] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.0231207] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012001c78 [1 byte, write, PoolRedZone]
[ 45.0355715] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.0480232] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.0563292] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.0687763] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.0770795] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.0936820] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d3e488 [1 byte, write, PoolRedZone]
[ 45.1102847] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.1227394] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.1310386] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.1395279] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.1517939] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.1600974] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52ca0 [1 byte, write, PoolRedZone]
[ 45.1739012] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.1849999] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.1932993] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.2057524] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.2140542] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.3012209] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f3e848 [1 byte, write, PoolRedZone]
[ 45.3178226] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.3302737] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.3385775] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.3468764] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.3593301] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.3966864] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc480129e1478 [1 byte, write, PoolRedZone]
[ 45.4091388] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.4215909] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.4298949] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.4423463] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.4506449] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.5544156] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f3e848 [1 byte, write, PoolRedZone]
[ 45.5668687] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.5793203] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.5876205] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.6000731] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.6083743] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.6166767] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc480129e1478 [1 byte, write, PoolRedZone]
[ 45.6332809] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.6415804] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.6540342] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d3e488 [1 byte, write, PoolRedZone]
[ 45.6540342] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.6540342] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.6747857] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.6747857] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.6872372] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.6872372] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.7038429] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.7121447] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.7204425] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52ca0 [1 byte, write, PoolRedZone]
[ 45.7328966] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.7453536] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f3e440 [1 byte, write, PoolRedZone]
[ 45.7453536] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.7453536] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.7661018] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.7661018] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.7785538] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.7910098] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.7910098] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.8034600] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.8076116] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d3e488 [1 byte, write, PoolRedZone]
[ 45.8076116] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.8242142] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.8366665] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.8491196] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.8574212] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.8698735] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52ca0 [1 byte, write, PoolRedZone]
[ 45.8698735] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.8698735] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.8872929] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d22480 [1 byte, write, PoolRedZone]
[ 45.8872929] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.9072283] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.9072283] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.9196798] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.9196798] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.9321331] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.9321331] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.9445851] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 45.9531370] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f3e440 [1 byte, write, PoolRedZone]
[ 45.9531370] #4 0xffffffff80277d17 in syscall <netbsd>
[ 45.9531370] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 45.9777915] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 45.9902458] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 45.9985456] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.0109979] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.0193005] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52ca0 [1 byte, write, PoolRedZone]
[ 46.0359039] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.0442025] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.0566565] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.0649567] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.0774101] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.1064690] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d22888 [1 byte, write, PoolRedZone]
[ 46.1230715] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.1355210] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.1438209] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.1562779] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.1645771] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.1728788] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52ca0 [1 byte, write, PoolRedZone]
[ 46.1853321] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.1977835] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.2060827] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.2185395] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.2268381] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.2393057] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012001870 [1 byte, write, PoolRedZone]
[ 46.2558957] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.2641946] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.2641946] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52898 [1 byte, write, PoolRedZone]
[ 46.2766448] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.2766448] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.2932507] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.2932507] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.3057013] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.3057013] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.3223044] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.3306061] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.3679660] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012001870 [1 byte, write, PoolRedZone]
[ 46.3845672] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.3928673] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.4053212] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.4136264] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.4260738] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.4343920] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012017470 [1 byte, write, PoolRedZone]
[ 46.4468296] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.4592794] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.4717320] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.4800376] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.4883337] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.5049403] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012001870 [1 byte, write, PoolRedZone]
[ 46.5215396] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.5298437] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.5422953] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.5505967] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.5630481] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.5671996] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f39c48 [1 byte, write, PoolRedZone]
[ 46.5838046] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.5879518] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f39438 [1 byte, write, PoolRedZone]
[ 46.5879518] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.6045558] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.6045558] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.6170066] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.6170066] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.6294585] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.6294585] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.6419116] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.6543671] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.6668202] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012001870 [1 byte, write, PoolRedZone]
[ 46.6792746] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.6917207] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.7000260] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.7124756] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.7207761] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.7332321] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52898 [1 byte, write, PoolRedZone]
[ 46.7456823] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.7581326] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.7664369] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc480129e1c88 [1 byte, write, PoolRedZone]
[ 46.7664369] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.7664369] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.7871878] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.7871878] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.7996409] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.8120950] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.8162429] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f39c48 [1 byte, write, PoolRedZone]
[ 46.8162429] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.8290615] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.8290615] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.8416878] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.8577553] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.8660542] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.8743565] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.8951298] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d3e488 [1 byte, write, PoolRedZone]
[ 46.9117148] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.9200184] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.9324662] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 46.9407684] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 46.9490668] #4 0xffffffff80277d17 in syscall <netbsd>
[ 46.9573692] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012001870 [1 byte, write, PoolRedZone]
[ 46.9739737] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 46.9822778] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 46.9947264] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.0030295] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.0154856] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.0362343] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc480129e1c88 [1 byte, write, PoolRedZone]
[ 47.0486890] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.0528362] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012001870 [1 byte, write, PoolRedZone]
[ 47.0528362] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.0735902] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.0735902] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.0860435] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.0860435] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.1026481] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.1026481] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.1109509] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.1234040] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.2230235] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d22c90 [1 byte, write, PoolRedZone]
[ 47.2354720] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.2479233] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.2562227] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.2645266] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f3e848 [1 byte, write, PoolRedZone]
[ 47.2645266] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.2772670] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.2935821] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.2935821] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.3018819] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.3143374] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.3226366] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.3392490] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f39840 [1 byte, write, PoolRedZone]
[ 47.3558430] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.3641436] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.3765999] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.3765999] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc480129e1c88 [1 byte, write, PoolRedZone]
[ 47.3848961] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.3848961] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.4014994] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.4014994] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.4129964] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d3e890 [1 byte, write, PoolRedZone]
[ 47.4129964] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.4305634] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.4305634] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.4430065] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.4430065] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.4554591] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.4679140] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.4803655] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.4886677] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d22c90 [1 byte, write, PoolRedZone]
[ 47.5011170] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.5135710] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.5218743] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.5343239] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.5426264] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.5509271] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012001c78 [1 byte, write, PoolRedZone]
[ 47.5675340] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.5799818] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.5882848] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.5965861] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.6090382] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.6173444] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011fee460 [1 byte, write, PoolRedZone]
[ 47.6297944] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.6422454] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.6505503] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.6630021] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.6712999] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.7045058] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc480129e1478 [1 byte, write, PoolRedZone]
[ 47.7169580] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.7294108] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.7294108] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48013323498 [1 byte, write, PoolRedZone]
[ 47.7377096] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.7377096] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.7543130] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.7543130] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.7667656] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.7667656] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.7875212] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.7999754] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.8331803] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012001870 [1 byte, write, PoolRedZone]
[ 47.8414793] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc480129e1478 [1 byte, write, PoolRedZone]
[ 47.8414793] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.8580829] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.8580829] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.8706510] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.8706510] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.8829996] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.8829996] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.8954383] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.8954383] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.9078911] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.9286490] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d22c90 [1 byte, write, PoolRedZone]
[ 47.9426094] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.9535528] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 47.9618544] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 47.9710587] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f39c48 [1 byte, write, PoolRedZone]
[ 47.9743041] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 47.9743041] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 47.9909055] #4 0xffffffff80277d17 in syscall <netbsd>
[ 47.9909055] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.0116615] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.0199632] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.0282648] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.0490246] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc480129e1478 [1 byte, write, PoolRedZone]
[ 48.0614731] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.0739273] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.0905256] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.0988293] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.1112808] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.1195855] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48013323498 [1 byte, write, PoolRedZone]
[ 48.1320317] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.1444869] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.1527879] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.1652392] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.1735419] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.1901451] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d3e488 [1 byte, write, PoolRedZone]
[ 48.1984433] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f39c48 [1 byte, write, PoolRedZone]
[ 48.1984433] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.2191996] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.2191996] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.2316514] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.2316514] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.2441034] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.2441034] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.2526742] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.2526742] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.2690107] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.2783997] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012001870 [1 byte, write, PoolRedZone]
[ 48.2783997] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48013323498 [1 byte, write, PoolRedZone]
[ 48.2939125] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.2939125] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.3105159] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.3105159] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.3229674] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.3229674] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.3354186] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.3354186] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.3478729] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.3478729] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.3644750] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f3e440 [1 byte, write, PoolRedZone]
[ 48.3810801] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.3893854] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.4018339] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.4018339] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f39438 [1 byte, write, PoolRedZone]
[ 48.4101330] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.4101330] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.4267379] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.4267379] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.4474905] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.4557942] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.4599440] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011fee460 [1 byte, write, PoolRedZone]
[ 48.4599440] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.4765450] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.4889988] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.5014512] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.5075528] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48013323498 [1 byte, write, PoolRedZone]
[ 48.5097517] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.5097517] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.5263535] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.5263535] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.5471085] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.5471085] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f39438 [1 byte, write, PoolRedZone]
[ 48.5471085] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.5678622] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.5678622] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.5803154] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.5803154] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011feec70 [1 byte, write, PoolRedZone]
[ 48.5927663] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.5927663] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.6093699] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.6093699] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.6218212] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.6218212] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.6384340] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.6467277] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.6633308] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d22480 [1 byte, write, PoolRedZone]
[ 48.6716331] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52ca0 [1 byte, write, PoolRedZone]
[ 48.6716331] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.6882342] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.6882342] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.7006846] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.7006846] #2 0xffffffff810fcfe3 in execve1 <netbsd>
2019/06/21 11:57:11 executed programs: 643
[ 48.7131394] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.7131394] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.7297423] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.7297423] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.7380425] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.7473189] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52ca0 [1 byte, write, PoolRedZone]
[ 48.7629479] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.7754015] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.7754015] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d3ec98 [1 byte, write, PoolRedZone]
[ 48.7837030] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.7837030] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.8003043] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.8003043] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.8127569] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.8127569] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.8293611] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.8418139] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.8584178] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52898 [1 byte, write, PoolRedZone]
[ 48.8708681] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.8833223] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.8916210] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.9040736] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.9123788] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.9208745] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52ca0 [1 byte, write, PoolRedZone]
[ 48.9331284] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.9455822] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 48.9580359] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 48.9663363] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 48.9746363] #4 0xffffffff80277d17 in syscall <netbsd>
[ 48.9835365] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012017470 [1 byte, write, PoolRedZone]
[ 48.9995408] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 48.9995408] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d3ec98 [1 byte, write, PoolRedZone]
[ 49.0119932] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.0119932] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 49.0285981] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.0285981] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.0410495] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.0410495] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.0534994] #4 0xffffffff80277d17 in syscall <netbsd>
[ 49.0534994] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.0701159] #4 0xffffffff80277d17 in syscall <netbsd>
[ 49.1116116] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d22480 [1 byte, write, PoolRedZone]
[ 49.1240633] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 49.1365152] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.1448175] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.1572707] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.1655711] #4 0xffffffff80277d17 in syscall <netbsd>
[ 49.2070801] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d22888 [1 byte, write, PoolRedZone]
[ 49.2195318] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 49.2319821] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.2402836] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.2527391] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.2610393] #4 0xffffffff80277d17 in syscall <netbsd>
[ 49.2693390] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d52490 [1 byte, write, PoolRedZone]
[ 49.2859457] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 49.2983966] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.3066970] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.3149997] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011fee460 [1 byte, write, PoolRedZone]
[ 49.3149997] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.3149997] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 49.3357530] #4 0xffffffff80277d17 in syscall <netbsd>
[ 49.3357530] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.3565075] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.3648091] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.3731077] #4 0xffffffff80277d17 in syscall <netbsd>
[ 49.3772583] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc480129e1880 [1 byte, write, PoolRedZone]
[ 49.3772583] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012d3ec98 [1 byte, write, PoolRedZone]
[ 49.3939633] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 49.4146184] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.4146184] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 49.4229166] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.4229166] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.4353718] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.4353718] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.4478216] #4 0xffffffff80277d17 in syscall <netbsd>
[ 49.4478216] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.4644249] #4 0xffffffff80277d17 in syscall <netbsd>
[ 49.4727254] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48012017470 [1 byte, write, PoolRedZone]
[ 49.4893299] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 49.5017852] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.5100838] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.5225410] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.5308374] #4 0xffffffff80277d17 in syscall <netbsd>
[ 49.5391416] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011feec70 [1 byte, write, PoolRedZone]
[ 49.5515897] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 49.5640452] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.5723461] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.5847998] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.5847998] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011f39438 [1 byte, write, PoolRedZone]
[ 49.5847998] #4 0xffffffff80277d17 in syscall <netbsd>
[ 49.6055514] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 49.6180088] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.6263096] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.6349483] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.6470587] #4 0xffffffff80277d17 in syscall <netbsd>
[ 49.6553609] ASan: Unauthorized Access In 0xffffffff810f6b25: Addr
0xffffc48011fee460 [1 byte, write, PoolRedZone]
[ 49.6719665] #0 0xffffffff810f6b25 in exec_makepathbuf <netbsd>
[ 49.6802668] #1 0xffffffff810f6e2b in execve_loadvm <netbsd>
[ 49.6927175] #2 0xffffffff810fcfe3 in execve1 <netbsd>
[ 49.7010179] #3 0xffffffff8113df56 in sys___syscall <netbsd>
[ 49.7093215] ASan: Unauthorized Access In

Reply all
Reply to author
Forward
0 new messages