kern.securelevel: 0 -> 1
creating runtime link editor directory cache.
preserving editor files.
starting network daemons: sshd.
starting local daemons:.
Fri Jan 14 07:34:50 PST 2022

OpenBSD/amd64 (ci-openbsd-main-0.c.syzkaller.internal) (tty00)

Warning: Permanently added '10.128.1.89' (ED25519) to the list of known hosts.
2022/01/14 07:35:06 fuzzer started
2022/01/14 07:35:08 dialing manager at 10.128.15.235:6268
2022/01/14 07:35:08 syscalls: 387
2022/01/14 07:35:08 code coverage: enabled
2022/01/14 07:35:08 comparison tracing: enabled
2022/01/14 07:35:08 extra coverage: enabled
2022/01/14 07:35:08 delay kcov mmap: enabled
2022/01/14 07:35:08 setuid sandbox: enabled
2022/01/14 07:35:08 namespace sandbox: support is not implemented in syzkaller
2022/01/14 07:35:08 Android sandbox: support is not implemented in syzkaller
2022/01/14 07:35:08 fault injection: support is not implemented in syzkaller
2022/01/14 07:35:08 leak checking: support is not implemented in syzkaller
2022/01/14 07:35:08 net packet injection: enabled
2022/01/14 07:35:08 net device setup: support is not implemented in syzkaller
2022/01/14 07:35:08 concurrency sanitizer: support is not implemented in syzkaller
2022/01/14 07:35:08 devlink PCI setup: support is not implemented in syzkaller
2022/01/14 07:35:08 USB emulation: support is not implemented in syzkaller
2022/01/14 07:35:08 hci packet injection: support is not implemented in syzkaller
2022/01/14 07:35:08 wifi device emulation: support is not implemented in syzkaller
2022/01/14 07:35:08 802.15.4 emulation: support is not implemented in syzkaller
2022/01/14 07:35:08 fetching corpus: 0, signal 0/2000 (executing program)
2022/01/14 07:35:08 fetching corpus: 50, signal 2509/5782 (executing program)
2022/01/14 07:35:08 fetching corpus: 100, signal 4600/8552 (executing program)
2022/01/14 07:35:08 fetching corpus: 129, signal 5560/10311 (executing program)
2022/01/14 07:35:08 fetching corpus: 129, signal 5560/11516 (executing program)
2022/01/14 07:35:08 fetching corpus: 129, signal 5560/12728 (executing program)
2022/01/14 07:35:08 fetching corpus: 129, signal 5560/13731 (executing program)
2022/01/14 07:35:08 fetching corpus: 129, signal 5560/13731 (executing program)
2022/01/14 07:35:08 starting 8 fuzzer processes
07:35:08 executing program 0:
r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x1fd, 0x0)
ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000003c0)={0x3, &(0x7f0000000280)=[{0x81}, {0x74}, {0x6, 0x0, 0x0, 0x7ffffffc}]})
ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0})
pwrite(r0, &(0x7f0000000080)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0)

07:35:08 executing program 3:
syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="cf3ca9e387df", @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@timestamp={0x44, 0x4}]}}, @icmp=@echo={0xe}}}}})

07:35:08 executing program 1:
sysctl$net_inet6_ip6(&(0x7f0000000080)={0x4, 0x18, 0x29, 0x32}, 0x4, 0x0, 0x0, 0x0, 0x0)

07:35:08 executing program 2:
fcntl$setown(0xffffffffffffff9c, 0x6, 0x0)
setrlimit(0x8, &(0x7f0000000040)={0x30, 0x95})
r0 = syz_open_pts()
close(r0)
syz_open_pts()
ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f00000001c0)=0x7)
write(r0, &(0x7f0000000000)="abd1e1db3fd0e8e31424", 0xa)

07:35:08 executing program 4:
r0 = socket$inet(0x2, 0x3, 0x0)
r1 = fcntl$dupfd(r0, 0x0, r0)
setsockopt(r1, 0x0, 0x20, 0x0, 0x0)

07:35:08 executing program 5:
r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0)
ioctl$FIOASYNC(r0, 0xc0104419, &(0x7f0000000240)=0x9)

07:35:08 executing program 6:
mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x1e6e)
r0 = open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0)
open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0)
ioctl$WSDISPLAYIO_LDFONT(r0, 0x8058574d, &(0x7f0000000100)={'./file0\x00'})

07:35:08 executing program 7:
r0 = socket(0x2, 0x2, 0x0)
setsockopt(r0, 0x0, 0x1f, &(0x7f0000000100), 0x4)

07:35:08 executing program 2:
fcntl$setown(0xffffffffffffff9c, 0x6, 0x0)
setrlimit(0x8, &(0x7f0000000040)={0x30, 0x95})
r0 = syz_open_pts()
close(r0)
syz_open_pts()
ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f00000001c0)=0x7)
write(r0, &(0x7f0000000000)="abd1e1db3fd0e8e31424", 0xa)

07:35:08 executing program 1:
sysctl$net_inet6_ip6(&(0x7f0000000080)={0x4, 0x18, 0x29, 0x32}, 0x4, 0x0, 0x0, 0x0, 0x0)

07:35:08 executing program 3:
syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="cf3ca9e387df", @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@timestamp={0x44, 0x4}]}}, @icmp=@echo={0xe}}}}})

07:35:08 executing program 2:
fcntl$setown(0xffffffffffffff9c, 0x6, 0x0)
setrlimit(0x8, &(0x7f0000000040)={0x30, 0x95})
r0 = syz_open_pts()
close(r0)
syz_open_pts()
ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f00000001c0)=0x7)
write(r0, &(0x7f0000000000)="abd1e1db3fd0e8e31424", 0xa)

07:35:08 executing program 1:
sysctl$net_inet6_ip6(&(0x7f0000000080)={0x4, 0x18, 0x29, 0x32}, 0x4, 0x0, 0x0, 0x0, 0x0)

07:35:08 executing program 0:
r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x1fd, 0x0)
ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000003c0)={0x3, &(0x7f0000000280)=[{0x81}, {0x74}, {0x6, 0x0, 0x0, 0x7ffffffc}]})
ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0})
pwrite(r0, &(0x7f0000000080)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0)

07:35:08 executing program 2:
fcntl$setown(0xffffffffffffff9c, 0x6, 0x0)
setrlimit(0x8, &(0x7f0000000040)={0x30, 0x95})
r0 = syz_open_pts()
close(r0)
syz_open_pts()
ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f00000001c0)=0x7)
write(r0, &(0x7f0000000000)="abd1e1db3fd0e8e31424", 0xa)

07:35:08 executing program 1:
sysctl$net_inet6_ip6(&(0x7f0000000080)={0x4, 0x18, 0x29, 0x32}, 0x4, 0x0, 0x0, 0x0, 0x0)

07:35:08 executing program 0:
r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x1fd, 0x0)
ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000003c0)={0x3, &(0x7f0000000280)=[{0x81}, {0x74}, {0x6, 0x0, 0x0, 0x7ffffffc}]})
ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0})
pwrite(r0, &(0x7f0000000080)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0)

07:35:08 executing program 3:
syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="cf3ca9e387df", @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@timestamp={0x44, 0x4}]}}, @icmp=@echo={0xe}}}}})

07:35:08 executing program 3:
syz_emit_ethernet(0x2e, &(0x7f0000000180)={@random="cf3ca9e387df", @local, [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2, {[@timestamp={0x44, 0x4}]}}, @icmp=@echo={0xe}}}}})

07:35:08 executing program 1:
r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x1fd, 0x0)
ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000003c0)={0x3, &(0x7f0000000280)=[{0x81}, {0x74}, {0x6, 0x0, 0x0, 0x7ffffffc}]})
ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0})
pwrite(r0, &(0x7f0000000080)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0)

2022/01/14 07:35:20 executor 5 failed 11 times:
executor 5: EOF
SYZFAIL: tun_id out of range
tun_id=5 (errno 2: No such file or directory)
login: