starting RPC daemons:. savecore: no core dump checking quotas: done. clearing /tmp kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Jan 14 07:29:36 PST 2022 OpenBSD/amd64 (ci-openbsd-main-0.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.30' (ED25519) to the list of known hosts. 2022/01/14 07:29:45 fuzzer started 2022/01/14 07:29:46 dialing manager at 10.128.15.235:6268 2022/01/14 07:29:46 syscalls: 387 2022/01/14 07:29:46 code coverage: enabled 2022/01/14 07:29:46 comparison tracing: enabled 2022/01/14 07:29:46 extra coverage: enabled 2022/01/14 07:29:46 delay kcov mmap: enabled 2022/01/14 07:29:46 setuid sandbox: enabled 2022/01/14 07:29:46 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:29:46 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:29:46 fault injection: support is not implemented in syzkaller 2022/01/14 07:29:46 leak checking: support is not implemented in syzkaller 2022/01/14 07:29:46 net packet injection: enabled 2022/01/14 07:29:46 net device setup: support is not implemented in syzkaller 2022/01/14 07:29:46 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:29:46 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:29:46 USB emulation: support is not implemented in syzkaller 2022/01/14 07:29:46 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:29:46 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:29:46 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:29:46 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:29:46 fetching corpus: 50, signal 3069/5971 (executing program) 2022/01/14 07:29:46 fetching corpus: 65, signal 4102/7891 (executing program) 2022/01/14 07:29:46 fetching corpus: 65, signal 4102/9175 (executing program) 2022/01/14 07:29:46 fetching corpus: 65, signal 4102/10384 (executing program) 2022/01/14 07:29:46 fetching corpus: 65, signal 4102/10997 (executing program) 2022/01/14 07:29:46 fetching corpus: 65, signal 4102/10997 (executing program) 2022/01/14 07:29:46 starting 8 fuzzer processes 07:29:46 executing program 0: r0 = kqueue() kevent(0xffffffffffffffff, &(0x7f0000000100)=[{{}, 0xffffffffffffffff, 0x41}], 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/200, &(0x7f0000000100)=0xc8) kevent(r0, &(0x7f0000000000), 0xc2, 0x0, 0x101, 0x0) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000100)={'tap', 0x0}) r2 = dup2(r1, r1) pwrite(r2, &(0x7f0000000080)="e16914001500ef1e178e00000400", 0xe, 0x0) 07:29:46 executing program 4: sysctl$net_inet_carp(&(0x7f0000000000)={0x4, 0x2, 0xf0}, 0x4, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x5, &(0x7f0000000180)) 07:29:46 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000180)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000280)=[{0x61}, {0xc0}, {0x6, 0x0, 0x0, 0xfe}]}) write(r0, &(0x7f0000000140)="7cd23fc0aa17dddf7830faa1aaab", 0xe) 07:29:47 executing program 2: sysctl$net_inet6_ip6(&(0x7f0000000040)={0x4, 0x18, 0x29, 0x35}, 0x4, &(0x7f0000000140)="4f009952d47c707ffa7d24e95b32c887", &(0x7f00000001c0)=0xff6f, 0x0, 0x0) msgget$private(0x0, 0x111) r0 = semget$private(0x0, 0x5, 0x30e) msgget$private(0x0, 0x440) semop(r0, &(0x7f00000015c0)=[{0x2, 0x9, 0x1000}, {0x1, 0x0, 0x1000}], 0x2) semop(r0, &(0x7f0000001640)=[{0x0, 0x5022, 0x1000}, {0x1, 0x10001, 0x7351d18524d2e3a2}], 0x2) 07:29:47 executing program 3: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000280)={0x3, &(0x7f0000000040)=[{}, {0x3, 0x0, 0x0, 0xffffff86}, {0x6, 0x0, 0x0, 0x4a01}]}) sysctl$kern(&(0x7f0000000040)={0x1, 0x49}, 0x6, &(0x7f0000000080)="f7a451e4a37b0df30b1d328b", &(0x7f0000000180)=0xff1b, 0x0, 0x0) 07:29:47 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000002200)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0xffff, 0x1005, 0x0, 0x0) 07:29:47 executing program 6: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x1}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, '\x00/\x00'}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x18, 0x400000002, 0x0) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 07:29:47 executing program 7: socket(0x2, 0x2, 0x0) kevent(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x3, 0x7fbffff7}) r0 = kqueue() kevent(r0, &(0x7f00000000c0), 0x2d, 0x0, 0x4f, 0x0) 07:29:47 executing program 2: sysctl$net_inet6_ip6(&(0x7f0000000040)={0x4, 0x18, 0x29, 0x35}, 0x4, &(0x7f0000000140)="4f009952d47c707ffa7d24e95b32c887", &(0x7f00000001c0)=0xff6f, 0x0, 0x0) msgget$private(0x0, 0x111) r0 = semget$private(0x0, 0x5, 0x30e) msgget$private(0x0, 0x440) semop(r0, &(0x7f00000015c0)=[{0x2, 0x9, 0x1000}, {0x1, 0x0, 0x1000}], 0x2) semop(r0, &(0x7f0000001640)=[{0x0, 0x5022, 0x1000}, {0x1, 0x10001, 0x7351d18524d2e3a2}], 0x2) 07:29:47 executing program 0: r0 = kqueue() kevent(0xffffffffffffffff, &(0x7f0000000100)=[{{}, 0xffffffffffffffff, 0x41}], 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/200, &(0x7f0000000100)=0xc8) kevent(r0, &(0x7f0000000000), 0xc2, 0x0, 0x101, 0x0) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000100)={'tap', 0x0}) r2 = dup2(r1, r1) pwrite(r2, &(0x7f0000000080)="e16914001500ef1e178e00000400", 0xe, 0x0) 07:29:47 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000180)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000280)=[{0x61}, {0xc0}, {0x6, 0x0, 0x0, 0xfe}]}) write(r0, &(0x7f0000000140)="7cd23fc0aa17dddf7830faa1aaab", 0xe) 07:29:47 executing program 3: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000280)={0x3, &(0x7f0000000040)=[{}, {0x3, 0x0, 0x0, 0xffffff86}, {0x6, 0x0, 0x0, 0x4a01}]}) sysctl$kern(&(0x7f0000000040)={0x1, 0x49}, 0x6, &(0x7f0000000080)="f7a451e4a37b0df30b1d328b", &(0x7f0000000180)=0xff1b, 0x0, 0x0) 07:29:47 executing program 3: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000280)={0x3, &(0x7f0000000040)=[{}, {0x3, 0x0, 0x0, 0xffffff86}, {0x6, 0x0, 0x0, 0x4a01}]}) sysctl$kern(&(0x7f0000000040)={0x1, 0x49}, 0x6, &(0x7f0000000080)="f7a451e4a37b0df30b1d328b", &(0x7f0000000180)=0xff1b, 0x0, 0x0) 07:29:47 executing program 0: r0 = kqueue() kevent(0xffffffffffffffff, &(0x7f0000000100)=[{{}, 0xffffffffffffffff, 0x41}], 0x0, 0x0, 0x0, 0x0) getsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)=""/200, &(0x7f0000000100)=0xc8) kevent(r0, &(0x7f0000000000), 0xc2, 0x0, 0x101, 0x0) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000100)={'tap', 0x0}) r2 = dup2(r1, r1) pwrite(r2, &(0x7f0000000080)="e16914001500ef1e178e00000400", 0xe, 0x0) 07:29:47 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000180)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000280)=[{0x61}, {0xc0}, {0x6, 0x0, 0x0, 0xfe}]}) write(r0, &(0x7f0000000140)="7cd23fc0aa17dddf7830faa1aaab", 0xe) 07:29:47 executing program 2: sysctl$net_inet6_ip6(&(0x7f0000000040)={0x4, 0x18, 0x29, 0x35}, 0x4, &(0x7f0000000140)="4f009952d47c707ffa7d24e95b32c887", &(0x7f00000001c0)=0xff6f, 0x0, 0x0) msgget$private(0x0, 0x111) r0 = semget$private(0x0, 0x5, 0x30e) msgget$private(0x0, 0x440) semop(r0, &(0x7f00000015c0)=[{0x2, 0x9, 0x1000}, {0x1, 0x0, 0x1000}], 0x2) semop(r0, &(0x7f0000001640)=[{0x0, 0x5022, 0x1000}, {0x1, 0x10001, 0x7351d18524d2e3a2}], 0x2) 07:29:47 executing program 3: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000280)={0x3, &(0x7f0000000040)=[{}, {0x3, 0x0, 0x0, 0xffffff86}, {0x6, 0x0, 0x0, 0x4a01}]}) sysctl$kern(&(0x7f0000000040)={0x1, 0x49}, 0x6, &(0x7f0000000080)="f7a451e4a37b0df30b1d328b", &(0x7f0000000180)=0xff1b, 0x0, 0x0) 2022/01/14 07:29:58 executor 6 failed 11 times: executor 6: EOF SYZFAIL: tun_id out of range tun_id=6 (errno 2: No such file or directory) login: