creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. /etc/rc.local[5]: syntax error: `(' unexpected starting local daemons:. Fri Jan 14 03:28:19 PST 2022 OpenBSD/amd64 (worker.my.domain) (tty00) Warning: Permanently added '10.128.0.52' (ED25519) to the list of known hosts. 2022/01/14 03:28:28 fuzzer started 2022/01/14 03:28:32 dialing manager at 10.128.15.235:19886 2022/01/14 03:28:32 checking machine... 2022/01/14 03:28:32 checking revisions... 2022/01/14 03:28:32 testing simple program... 2022/01/14 03:28:32 building call list... 2022/01/14 03:28:32 syscalls: 387 2022/01/14 03:28:32 code coverage: enabled 2022/01/14 03:28:32 comparison tracing: enabled 2022/01/14 03:28:32 extra coverage: enabled 2022/01/14 03:28:32 delay kcov mmap: enabled 2022/01/14 03:28:32 setuid sandbox: enabled 2022/01/14 03:28:32 namespace sandbox: support is not implemented in syzkaller 2022/01/14 03:28:32 Android sandbox: support is not implemented in syzkaller 2022/01/14 03:28:32 fault injection: support is not implemented in syzkaller 2022/01/14 03:28:32 leak checking: support is not implemented in syzkaller 2022/01/14 03:28:32 net packet injection: enabled 2022/01/14 03:28:32 net device setup: support is not implemented in syzkaller 2022/01/14 03:28:32 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 03:28:32 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 03:28:32 USB emulation: support is not implemented in syzkaller 2022/01/14 03:28:32 hci packet injection: support is not implemented in syzkaller 2022/01/14 03:28:32 wifi device emulation: support is not implemented in syzkaller 2022/01/14 03:28:32 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 03:28:32 fetching corpus: 0, signal 0/0 (executing program) 2022/01/14 03:28:32 fetching corpus: 0, signal 0/0 (executing program) 2022/01/14 03:28:32 starting 8 fuzzer processes 03:28:32 executing program 0: open$dir(&(0x7f0000000140)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x520, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0x5, 0x0) open(0x0, 0x0, 0x0) semctl$SETVAL(0x0, 0x4, 0x8, 0x0) 03:28:32 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt(r0, 0x1000000000029, 0x200000033, 0x0, 0x170) getsockopt(r0, 0x29, 0x20800000033, 0x0, 0x0) 03:28:32 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1/file0\x00', 0x200, 0x0) 03:28:33 executing program 7: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) connect$unix(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="2bd62ffd82d3ccfbb7393871f74b33"], 0x1) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r1 = socket(0x18, 0x1, 0x0) close(r1) r2 = socket(0x2, 0x2, 0x0) close(r2) socket(0x400000000018, 0x3, 0x3a) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r2, &(0x7f0000000040), 0xe7) 03:28:32 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x612, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000100)='M', 0x1}], 0x1) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x500, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000080)={{}, 0x0, 0x0, 0xffffffffffffffff}) 03:28:32 executing program 6: r0 = socket(0x400000000018, 0x3, 0x3a) r1 = syz_open_pts() recvmsg(r0, &(0x7f0000000300)={&(0x7f0000000180)=@in, 0xc, &(0x7f00000001c0)=[{&(0x7f0000000240)=""/187, 0xbb}], 0x1, &(0x7f0000000640)=""/4096, 0x1000}, 0x1) fcntl$lock(r1, 0x8, &(0x7f00000000c0)={0x3, 0x0, 0x0, 0x2000300000003}) fcntl$lock(r1, 0x10000000000009, &(0x7f0000000200)={0x3, 0x0, 0xfffffffffffffffd, 0x20002fffffffd}) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) fcntl$lock(r0, 0x7, &(0x7f0000000340)={0x3, 0x0, 0xfffffffffffffffd, 0xfff}) setsockopt(r0, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x5}, 0xc) sendto$inet6(0xffffffffffffffff, &(0x7f0000000040)="9b3758e1", 0x4, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f0000000000)={{0x18, 0x2}}, 0x36e) r2 = socket(0x18, 0x2, 0x0) sendmsg$unix(r2, &(0x7f0000000600)={&(0x7f0000000040)=@abs={0x1800, 0x0, 0x1}, 0x1c, 0x0}, 0x0) 03:28:32 executing program 4: open$dir(&(0x7f0000000000)='./file0\x00', 0x40000400000002c2, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) unveil(&(0x7f0000000000)='./file0\x00', &(0x7f0000001580)='r\x00') 03:28:32 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x28}, {0x4d}, {0x16}]}) pwrite(r0, &(0x7f0000000100)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 03:28:33 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt(r0, 0x1000000000029, 0x200000033, 0x0, 0x170) getsockopt(r0, 0x29, 0x20800000033, 0x0, 0x0) 03:28:33 executing program 0: open$dir(&(0x7f0000000140)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x520, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0x5, 0x0) open(0x0, 0x0, 0x0) semctl$SETVAL(0x0, 0x4, 0x8, 0x0) 03:28:33 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt(r0, 0x1000000000029, 0x200000033, 0x0, 0x170) getsockopt(r0, 0x29, 0x20800000033, 0x0, 0x0) 03:28:33 executing program 3: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt(r0, 0x1000000000029, 0x200000033, 0x0, 0x170) getsockopt(r0, 0x29, 0x20800000033, 0x0, 0x0) 03:28:33 executing program 0: open$dir(&(0x7f0000000140)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x520, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0x5, 0x0) open(0x0, 0x0, 0x0) semctl$SETVAL(0x0, 0x4, 0x8, 0x0) 03:28:33 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x612, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000100)='M', 0x1}], 0x1) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x500, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000080)={{}, 0x0, 0x0, 0xffffffffffffffff}) 03:28:33 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x612, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000100)='M', 0x1}], 0x1) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x500, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000080)={{}, 0x0, 0x0, 0xffffffffffffffff}) 03:28:33 executing program 0: open$dir(&(0x7f0000000140)='./file0\x00', 0x200, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000600)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) setgid(r1) ktrace(&(0x7f0000000040)='./file0\x00', 0x4, 0x520, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x2, 0x0, 0x0) semctl$GETVAL(0x0, 0x0, 0x5, 0x0) open(0x0, 0x0, 0x0) semctl$SETVAL(0x0, 0x4, 0x8, 0x0) 03:28:33 executing program 3: r0 = open(&(0x7f0000000140)='./file0\x00', 0x612, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000100)='M', 0x1}], 0x1) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x500, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000080)={{}, 0x0, 0x0, 0xffffffffffffffff}) 03:28:33 executing program 0: r0 = open(&(0x7f0000000140)='./file0\x00', 0x612, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000100)='M', 0x1}], 0x1) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x500, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000080)={{}, 0x0, 0x0, 0xffffffffffffffff}) 03:28:33 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdir(&(0x7f0000000140)='./file1/file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1/file0\x00', 0x200, 0x0) 03:28:33 executing program 2: r0 = open(&(0x7f0000000140)='./file0\x00', 0x612, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000100)='M', 0x1}], 0x1) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = shmget$private(0x0, 0x1000, 0x500, &(0x7f0000ffc000/0x1000)=nil) shmctl$IPC_SET(r1, 0x1, &(0x7f0000000080)={{}, 0x0, 0x0, 0xffffffffffffffff}) 2022/01/14 03:28:45 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: