kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:40:29 PST 2021 OpenBSD/amd64 (ci-openbsd-main-0.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.253' (ED25519) to the list of known hosts. 2021/12/23 02:40:45 fuzzer started 2021/12/23 02:40:47 dialing manager at 10.128.15.235:22938 2021/12/23 02:40:47 syscalls: 387 2021/12/23 02:40:47 code coverage: enabled 2021/12/23 02:40:47 comparison tracing: enabled 2021/12/23 02:40:47 extra coverage: enabled 2021/12/23 02:40:47 delay kcov mmap: enabled 2021/12/23 02:40:47 setuid sandbox: enabled 2021/12/23 02:40:47 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:40:47 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:40:47 fault injection: support is not implemented in syzkaller 2021/12/23 02:40:47 leak checking: support is not implemented in syzkaller 2021/12/23 02:40:47 net packet injection: enabled 2021/12/23 02:40:47 net device setup: support is not implemented in syzkaller 2021/12/23 02:40:47 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:40:47 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:40:47 USB emulation: support is not implemented in syzkaller 2021/12/23 02:40:47 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:40:47 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:40:47 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:40:47 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:40:47 fetching corpus: 14, signal 1293/4601 (executing program) 2021/12/23 02:40:47 fetching corpus: 14, signal 1293/6224 (executing program) 2021/12/23 02:40:47 fetching corpus: 14, signal 1293/6528 (executing program) 2021/12/23 02:40:47 fetching corpus: 14, signal 1293/6528 (executing program) 2021/12/23 02:40:47 starting 6 fuzzer processes 02:40:47 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {0x20}, {0x6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) syz_emit_ethernet(0x278, &(0x7f0000000340)) 02:40:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000080)="97b91d094d1f5f91bfdb974e82a25e9087e8b82477929a5d812e0e", 0x1}], 0x19, &(0x7f0000000500)=[@rights={0x10}], 0x10}, 0x0) 02:40:47 executing program 4: setuid(0xee01) r0 = socket(0x2, 0x2, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x25ad51a74fd02bc, 0xd}, 0x10) setsockopt$sock_int(r0, 0xffff, 0x200, &(0x7f0000000080)=0x6, 0x4) r1 = socket(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0xffff, 0x200, &(0x7f00000000c0)=0x6, 0x4) bind(r1, &(0x7f0000000000)=@un=@abs={0x25ad51a74fd02bc, 0xd}, 0x10) 02:40:47 executing program 5: mknod(&(0x7f0000000340)='./bus\x00', 0x3a0914c44f7b202d, 0x501) ktrace(&(0x7f0000000200)='./bus\x00', 0x1, 0x40000b36, 0xffffffffffffffff) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000000)="ea00005c00000000", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, 0x0, 0x0) ktrace(&(0x7f00000000c0)='./bus\x00', 0x0, 0x0, 0x0) r1 = syz_open_pts() ioctl$TIOCGETD(r1, 0x4004741a, &(0x7f0000000100)) pwritev(0xffffffffffffffff, &(0x7f0000000080)=[{&(0x7f00000004c0)="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", 0x188}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x12, 0xffffffffffffffff, 0x0, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) open$dir(&(0x7f0000000040)='./bus\x00', 0x80, 0x4) socket(0x18, 0x4007, 0x81) syz_open_pts() utimensat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000001180)={{0x0, 0xffffffffffffffff}, {0x0, 0xffffffffffffffff}}, 0x0) r2 = socket(0x18, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0x68, &(0x7f0000000140)={{0x18, 0x1, 0x101, 0xdc}, {0x18, 0x2, 0x9, 0xffffffff}, 0x1, [0x7, 0x1, 0x1, 0x380, 0x5, 0x6, 0x6, 0x80000000]}, 0x3c) openat$wskbd(0xffffffffffffff9c, &(0x7f00000000c0), 0x41, 0x0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, r2) ioctl$PCIOCREAD(r3, 0x8010570e, &(0x7f0000000080)) 02:40:47 executing program 2: setrlimit(0x8, &(0x7f0000000040)={0x7, 0x8}) r0 = syz_open_pts() close(r0) syz_open_pts() ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f0000000080)={0x0, 0xfff, 0x40005, 0x1fc80d8c, "00d35ed9000400"}) write(r0, &(0x7f0000000180)="ae2d6fd8b2afffd97b5d06dbd99ed95af56260e8988dbe2452cc42d6f3f3b304", 0x20) 02:40:47 executing program 3: mknod(&(0x7f0000000240)='./bus\x00', 0x8000200b, 0x3200) r0 = open$dir(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(r0, &(0x7f0000000100)=""/20, 0x729518d7ae52c1df) r1 = open$dir(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) read(r1, &(0x7f0000000100)=""/20, 0x729518d7ae52c1df) 02:40:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000080)="97b91d094d1f5f91bfdb974e82a25e9087e8b82477929a5d812e0e", 0x1}], 0x19, &(0x7f0000000500)=[@rights={0x10}], 0x10}, 0x0) 02:40:47 executing program 2: setrlimit(0x8, &(0x7f0000000040)={0x7, 0x8}) r0 = syz_open_pts() close(r0) syz_open_pts() ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f0000000080)={0x0, 0xfff, 0x40005, 0x1fc80d8c, "00d35ed9000400"}) write(r0, &(0x7f0000000180)="ae2d6fd8b2afffd97b5d06dbd99ed95af56260e8988dbe2452cc42d6f3f3b304", 0x20) 02:40:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000080)="97b91d094d1f5f91bfdb974e82a25e9087e8b82477929a5d812e0e", 0x1}], 0x19, &(0x7f0000000500)=[@rights={0x10}], 0x10}, 0x0) 02:40:47 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {0x20}, {0x6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) syz_emit_ethernet(0x278, &(0x7f0000000340)) 02:40:47 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000380)=[{0x0}, {0x0}, {0x0}, {&(0x7f0000000080)="97b91d094d1f5f91bfdb974e82a25e9087e8b82477929a5d812e0e", 0x1}], 0x19, &(0x7f0000000500)=[@rights={0x10}], 0x10}, 0x0) 02:40:47 executing program 2: setrlimit(0x8, &(0x7f0000000040)={0x7, 0x8}) r0 = syz_open_pts() close(r0) syz_open_pts() ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f0000000080)={0x0, 0xfff, 0x40005, 0x1fc80d8c, "00d35ed9000400"}) write(r0, &(0x7f0000000180)="ae2d6fd8b2afffd97b5d06dbd99ed95af56260e8988dbe2452cc42d6f3f3b304", 0x20) 02:40:47 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {0x20}, {0x6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) syz_emit_ethernet(0x278, &(0x7f0000000340)) 02:40:47 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x35}, {0x20}, {0x6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) syz_emit_ethernet(0x278, &(0x7f0000000340)) 2021/12/23 02:40:58 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: