kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:38:53 PST 2021 OpenBSD/amd64 (ci-openbsd-main-1.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.22' (ED25519) to the list of known hosts. 2021/12/23 02:39:04 fuzzer started 2021/12/23 02:39:07 dialing manager at 10.128.15.235:22938 2021/12/23 02:39:07 syscalls: 387 2021/12/23 02:39:07 code coverage: enabled 2021/12/23 02:39:07 comparison tracing: enabled 2021/12/23 02:39:07 extra coverage: enabled 2021/12/23 02:39:07 delay kcov mmap: enabled 2021/12/23 02:39:07 setuid sandbox: enabled 2021/12/23 02:39:07 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:39:07 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:39:07 fault injection: support is not implemented in syzkaller 2021/12/23 02:39:07 leak checking: support is not implemented in syzkaller 2021/12/23 02:39:07 net packet injection: enabled 2021/12/23 02:39:07 net device setup: support is not implemented in syzkaller 2021/12/23 02:39:07 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:39:07 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:39:07 USB emulation: support is not implemented in syzkaller 2021/12/23 02:39:07 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:39:07 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:39:07 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:39:07 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:39:07 fetching corpus: 0, signal 0/3863 (executing program) 2021/12/23 02:39:07 fetching corpus: 0, signal 0/3863 (executing program) 2021/12/23 02:39:07 starting 6 fuzzer processes 02:39:07 executing program 1: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x80206910, &(0x7f0000000300)) 02:39:07 executing program 0: r0 = socket(0x2, 0x1, 0x0) close(r0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="ba02e480ffffffff"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) connect(r0, &(0x7f0000000000)=@un=@file={0x0, './file0/file0\x00'}, 0x10) 02:39:07 executing program 2: sysctl$kern(&(0x7f00000000c0)={0x1, 0x4}, 0x2, &(0x7f0000000240), 0x0, 0x0, 0x0) 02:39:07 executing program 3: write(0xffffffffffffffff, &(0x7f0000000100)="4e981d6c6b153b015386907119eb16c4c504b7d57b864b294604674792ebb3e9320528924979b557ac7bf6f33cde99eda2573d26e76d76c67277bf0392d03e6ad418", 0x42) socket(0x18, 0x1, 0x0) setreuid(0x0, 0x0) sysctl$net_inet_tcp(&(0x7f0000000000)={0x4, 0x2, 0x6, 0x13}, 0x4, 0x0, 0x0, &(0x7f0000000140), 0x210) 02:39:07 executing program 5: chown(&(0x7f0000000040)='./file1\x00', 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000140)}], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) unveil(&(0x7f0000000000)='./file0\x00', &(0x7f0000001580)='c\x00') 02:39:07 executing program 4: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{}, {0x3, 0x0, 0x0, 0x7fff}, {0x3}]}) sysctl$kern(&(0x7f0000000040)={0x1, 0x42}, 0x6, &(0x7f0000000180)="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", 0x0, 0x0, 0x0) 02:39:07 executing program 2: sysctl$kern(&(0x7f00000000c0)={0x1, 0x4}, 0x2, &(0x7f0000000240), 0x0, 0x0, 0x0) 02:39:07 executing program 0: r0 = socket(0x2, 0x1, 0x0) close(r0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="ba02e480ffffffff"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) connect(r0, &(0x7f0000000000)=@un=@file={0x0, './file0/file0\x00'}, 0x10) 02:39:07 executing program 2: sysctl$kern(&(0x7f00000000c0)={0x1, 0x4}, 0x2, &(0x7f0000000240), 0x0, 0x0, 0x0) 02:39:07 executing program 3: write(0xffffffffffffffff, &(0x7f0000000100)="4e981d6c6b153b015386907119eb16c4c504b7d57b864b294604674792ebb3e9320528924979b557ac7bf6f33cde99eda2573d26e76d76c67277bf0392d03e6ad418", 0x42) socket(0x18, 0x1, 0x0) setreuid(0x0, 0x0) sysctl$net_inet_tcp(&(0x7f0000000000)={0x4, 0x2, 0x6, 0x13}, 0x4, 0x0, 0x0, &(0x7f0000000140), 0x210) 02:39:07 executing program 1: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x80206910, &(0x7f0000000300)) 02:39:07 executing program 0: r0 = socket(0x2, 0x1, 0x0) close(r0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="ba02e480ffffffff"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) connect(r0, &(0x7f0000000000)=@un=@file={0x0, './file0/file0\x00'}, 0x10) 02:39:07 executing program 2: sysctl$kern(&(0x7f00000000c0)={0x1, 0x4}, 0x2, &(0x7f0000000240), 0x0, 0x0, 0x0) 02:39:07 executing program 3: write(0xffffffffffffffff, &(0x7f0000000100)="4e981d6c6b153b015386907119eb16c4c504b7d57b864b294604674792ebb3e9320528924979b557ac7bf6f33cde99eda2573d26e76d76c67277bf0392d03e6ad418", 0x42) socket(0x18, 0x1, 0x0) setreuid(0x0, 0x0) sysctl$net_inet_tcp(&(0x7f0000000000)={0x4, 0x2, 0x6, 0x13}, 0x4, 0x0, 0x0, &(0x7f0000000140), 0x210) 02:39:07 executing program 0: r0 = socket(0x2, 0x1, 0x0) close(r0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="ba02e480ffffffff"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) connect(r0, &(0x7f0000000000)=@un=@file={0x0, './file0/file0\x00'}, 0x10) 02:39:07 executing program 1: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x80206910, &(0x7f0000000300)) 2021/12/23 02:39:19 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory) login: