kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:39:15 PST 2021 OpenBSD/amd64 (ci-openbsd-multicore-5.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.49' (ED25519) to the list of known hosts. 2021/12/23 02:39:25 fuzzer started 2021/12/23 02:39:28 dialing manager at 10.128.15.235:42845 2021/12/23 02:39:28 syscalls: 387 2021/12/23 02:39:28 code coverage: enabled 2021/12/23 02:39:28 comparison tracing: enabled 2021/12/23 02:39:28 extra coverage: enabled 2021/12/23 02:39:28 delay kcov mmap: enabled 2021/12/23 02:39:28 setuid sandbox: enabled 2021/12/23 02:39:28 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:39:28 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:39:28 fault injection: support is not implemented in syzkaller 2021/12/23 02:39:28 leak checking: support is not implemented in syzkaller 2021/12/23 02:39:28 net packet injection: enabled 2021/12/23 02:39:28 net device setup: support is not implemented in syzkaller 2021/12/23 02:39:28 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:39:28 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:39:28 USB emulation: support is not implemented in syzkaller 2021/12/23 02:39:28 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:39:28 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:39:28 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:39:29 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:39:29 fetching corpus: 5, signal 328/4035 (executing program) 2021/12/23 02:39:29 fetching corpus: 5, signal 328/4715 (executing program) 2021/12/23 02:39:29 fetching corpus: 5, signal 328/4715 (executing program) 2021/12/23 02:39:29 starting 6 fuzzer processes 02:39:29 executing program 0: sysctl$kern(&(0x7f0000000300)={0x1, 0x58}, 0x2, &(0x7f0000000340)="d9cb3bfe", &(0x7f0000000440)=0x4, &(0x7f0000000480), 0x0) getpid() r0 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000cf480000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000453f00"/230], 0xe6, 0x1, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/243}, 0xfb, 0x3, 0x1000) msgsnd(r0, &(0x7f0000000380)={0x1, "fa8083620239847d49c72953ce125cb6f3848ab9991f53bd2abef9ceb1b3d53342b486873bd2aa3849d3383d534151260c04e3f1e9762575d50410916344f2ea51125c924e0a466c3fefd6cbd862219cf6f27b71d033d829d472f6f817b7851cd0baabb607bf571374cf4c6b2e36b878e491ec984fda9d"}, 0x7f, 0x800) 02:39:29 executing program 1: openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 02:39:29 executing program 2: sysctl$kern(&(0x7f0000000040)={0x1, 0x3}, 0x2, 0x0, 0x0, 0x0, 0x0) 02:39:29 executing program 4: sysctl$kern(&(0x7f0000000040)={0x1, 0x35}, 0x7, &(0x7f0000000180)="5afaacfb03a6eaf2c42d35ef0860bcd79926003aa8bcad291dd2e057e1a166972c43f95c6fae5761ee232ea6c4cd64f502e270a3b9c0a0b250ee753c6db13c28ae9d2e908e4c876aa229026fec4e40a7070444194bbb11040ce2696764bee864a9d6f006770bbe03edc202a3dbf2cf8b5e11747d4858e72223478585be658d15145cc89f799b137a863dcc232121a333df5c166f2b1551b3553c618d8f428d6a12dd6779e5a4d1cac630e3", 0x0, 0x0, 0x7) 02:39:29 executing program 3: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x6) 02:39:29 executing program 5: mknod(&(0x7f0000000080)='./bus\x00', 0x2000, 0x8000000000005200) close(0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$FIONBIO(r0, 0x8004667e, &(0x7f0000000100)) 02:39:29 executing program 1: openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 02:39:29 executing program 2: sysctl$kern(&(0x7f0000000040)={0x1, 0x3}, 0x2, 0x0, 0x0, 0x0, 0x0) 02:39:29 executing program 1: openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 02:39:29 executing program 2: sysctl$kern(&(0x7f0000000040)={0x1, 0x3}, 0x2, 0x0, 0x0, 0x0, 0x0) 02:39:29 executing program 1: openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) 02:39:29 executing program 2: sysctl$kern(&(0x7f0000000040)={0x1, 0x3}, 0x2, 0x0, 0x0, 0x0, 0x0) 02:39:30 executing program 3: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x6) 02:39:30 executing program 0: sysctl$kern(&(0x7f0000000300)={0x1, 0x58}, 0x2, &(0x7f0000000340)="d9cb3bfe", &(0x7f0000000440)=0x4, &(0x7f0000000480), 0x0) getpid() r0 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000000cf480000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000453f00"/230], 0xe6, 0x1, 0x0) msgrcv(r0, &(0x7f00000000c0)={0x0, ""/243}, 0xfb, 0x3, 0x1000) msgsnd(r0, &(0x7f0000000380)={0x1, "fa8083620239847d49c72953ce125cb6f3848ab9991f53bd2abef9ceb1b3d53342b486873bd2aa3849d3383d534151260c04e3f1e9762575d50410916344f2ea51125c924e0a466c3fefd6cbd862219cf6f27b71d033d829d472f6f817b7851cd0baabb607bf571374cf4c6b2e36b878e491ec984fda9d"}, 0x7f, 0x800) 02:39:30 executing program 2: mlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) madvise(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x6) 2021/12/23 02:39:41 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: