kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:40:55 PST 2021 OpenBSD/amd64 (ci-openbsd-setuid-2.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.23' (ED25519) to the list of known hosts. 2021/12/23 02:41:07 fuzzer started 2021/12/23 02:41:10 dialing manager at 10.128.15.235:11992 2021/12/23 02:41:10 syscalls: 387 2021/12/23 02:41:10 code coverage: enabled 2021/12/23 02:41:10 comparison tracing: enabled 2021/12/23 02:41:10 extra coverage: enabled 2021/12/23 02:41:10 delay kcov mmap: enabled 2021/12/23 02:41:10 setuid sandbox: enabled 2021/12/23 02:41:10 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:41:10 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:41:10 fault injection: support is not implemented in syzkaller 2021/12/23 02:41:10 leak checking: support is not implemented in syzkaller 2021/12/23 02:41:10 net packet injection: enabled 2021/12/23 02:41:10 net device setup: support is not implemented in syzkaller 2021/12/23 02:41:10 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:41:10 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:41:10 USB emulation: support is not implemented in syzkaller 2021/12/23 02:41:10 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:41:10 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:41:10 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:41:10 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:41:10 fetching corpus: 20, signal 3019/5370 (executing program) 2021/12/23 02:41:10 fetching corpus: 20, signal 3019/6562 (executing program) 2021/12/23 02:41:10 fetching corpus: 20, signal 3019/7305 (executing program) 2021/12/23 02:41:10 fetching corpus: 20, signal 3019/7305 (executing program) 2021/12/23 02:41:10 starting 6 fuzzer processes 02:41:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='R', 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000003240)=""/4104, 0x1008}, {&(0x7f0000002240)=""/4096, 0x1000}], 0x2, 0x0}, 0x840) close(r1) 02:41:10 executing program 1: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6b02e18b7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) close(r1) r2 = socket(0x2, 0x2, 0x0) bind(r2, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r3 = socket(0x2, 0x2, 0x0) r4 = dup2(r2, r3) connect$unix(r3, &(0x7f0000000000)=ANY=[], 0x10) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1023, 0x0, 0x0) recvfrom(r4, &(0x7f0000000100)=""/4096, 0x1000, 0x42, 0x0, 0x0) 02:41:10 executing program 2: ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) setsockopt(r0, 0x29, 0xd, 0x0, 0x0) 02:41:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000240)=@un=@file={0xd80f49edce43012d, './file0\x00'}, 0xa) r2 = dup2(r1, r0) listen(r1, 0x0) accept$inet6(r2, 0x0, 0x0) 02:41:10 executing program 4: r0 = socket(0x2, 0x2, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="62020207e0"], 0x1) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000080)=0x7, 0x4) connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="8b0229"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x2, 0x2, 0x0) bind(r1, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r2 = socket(0x2, 0x2, 0x0) dup2(r1, r2) connect$unix(r2, &(0x7f0000000000)=ANY=[@ANYBLOB], 0x10) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) 02:41:10 executing program 5: syz_emit_ethernet(0x7e, &(0x7f0000000100)={@broadcast, @random="21483d2265a8", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @multicast1}, @icmp=@dest_unreach={0x3, 0x2, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @empty, @broadcast, {[@noop, @noop, @timestamp={0x44, 0x20, 0x0, 0x0, 0x0, [{}, {}, {[@multicast1]}, {}, {[@remote={0xac, 0x14, 0x0}]}]}, @rr={0x7, 0x1b, 0x0, [@empty, @local={0xac, 0x14, 0x0}, @empty, @multicast2, @multicast1, @multicast1]}]}}}}}}}) 02:41:10 executing program 2: ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) setsockopt(r0, 0x29, 0xd, 0x0, 0x0) 02:41:10 executing program 1: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6b02e18b7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) close(r1) r2 = socket(0x2, 0x2, 0x0) bind(r2, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r3 = socket(0x2, 0x2, 0x0) r4 = dup2(r2, r3) connect$unix(r3, &(0x7f0000000000)=ANY=[], 0x10) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1023, 0x0, 0x0) recvfrom(r4, &(0x7f0000000100)=""/4096, 0x1000, 0x42, 0x0, 0x0) 02:41:10 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='R', 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000003240)=""/4104, 0x1008}, {&(0x7f0000002240)=""/4096, 0x1000}], 0x2, 0x0}, 0x840) close(r1) 02:41:10 executing program 2: ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) setsockopt(r0, 0x29, 0xd, 0x0, 0x0) 02:41:10 executing program 1: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6b02e18b7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) close(r1) r2 = socket(0x2, 0x2, 0x0) bind(r2, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r3 = socket(0x2, 0x2, 0x0) r4 = dup2(r2, r3) connect$unix(r3, &(0x7f0000000000)=ANY=[], 0x10) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1023, 0x0, 0x0) recvfrom(r4, &(0x7f0000000100)=""/4096, 0x1000, 0x42, 0x0, 0x0) 02:41:10 executing program 2: ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) setsockopt(r0, 0x29, 0xd, 0x0, 0x0) 02:41:10 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000240)=@un=@file={0xd80f49edce43012d, './file0\x00'}, 0xa) r2 = dup2(r1, r0) listen(r1, 0x0) accept$inet6(r2, 0x0, 0x0) 02:41:11 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000240)=@un=@file={0xd80f49edce43012d, './file0\x00'}, 0xa) r2 = dup2(r1, r0) listen(r1, 0x0) accept$inet6(r2, 0x0, 0x0) 02:41:11 executing program 1: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6b02e18b7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) close(r1) r2 = socket(0x2, 0x2, 0x0) bind(r2, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r3 = socket(0x2, 0x2, 0x0) r4 = dup2(r2, r3) connect$unix(r3, &(0x7f0000000000)=ANY=[], 0x10) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1023, 0x0, 0x0) recvfrom(r4, &(0x7f0000000100)=""/4096, 0x1000, 0x42, 0x0, 0x0) 02:41:11 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000140)='R', 0x1, 0x0, 0x0, 0x0) recvmsg(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000003240)=""/4104, 0x1008}, {&(0x7f0000002240)=""/4096, 0x1000}], 0x2, 0x0}, 0x840) close(r1) 2021/12/23 02:41:22 executor 5 failed 11 times: executor 5: exit status 67 SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory) loop exited with status 67 login: