kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:39:58 PST 2021 OpenBSD/amd64 (ci-openbsd-main-7.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.255' (ED25519) to the list of known hosts. 2021/12/23 02:40:16 fuzzer started 2021/12/23 02:40:18 dialing manager at 10.128.15.235:22938 2021/12/23 02:40:18 syscalls: 387 2021/12/23 02:40:18 code coverage: enabled 2021/12/23 02:40:18 comparison tracing: enabled 2021/12/23 02:40:18 extra coverage: enabled 2021/12/23 02:40:18 delay kcov mmap: enabled 2021/12/23 02:40:18 setuid sandbox: enabled 2021/12/23 02:40:18 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:40:18 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:40:18 fault injection: support is not implemented in syzkaller 2021/12/23 02:40:18 leak checking: support is not implemented in syzkaller 2021/12/23 02:40:18 net packet injection: enabled 2021/12/23 02:40:18 net device setup: support is not implemented in syzkaller 2021/12/23 02:40:18 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:40:18 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:40:18 USB emulation: support is not implemented in syzkaller 2021/12/23 02:40:18 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:40:18 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:40:18 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:40:18 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:40:18 fetching corpus: 10, signal 945/4329 (executing program) 2021/12/23 02:40:18 fetching corpus: 10, signal 945/6010 (executing program) 2021/12/23 02:40:18 fetching corpus: 10, signal 945/6084 (executing program) 2021/12/23 02:40:18 fetching corpus: 10, signal 945/6084 (executing program) 2021/12/23 02:40:18 starting 6 fuzzer processes 02:40:18 executing program 1: pledge(0xffffffffffffffff, 0x0) 02:40:18 executing program 0: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000400)=[{0x4, 0x4}, {0x1, 0x6, 0x800}, {0x3, 0xfffe}, {0x4, 0x3f, 0x1800}, {0x1, 0x2e5, 0x1000}, {0x3, 0x8, 0x1800}, {0x4, 0x7, 0x800}, {0x0, 0x9, 0x1800}, {}], 0x9) semctl$IPC_RMID(r0, 0x0, 0x0) 02:40:18 executing program 4: r0 = socket(0x18, 0x3, 0x0) getsockopt$inet_opts(r0, 0x29, 0xc, 0x0, 0x0) 02:40:18 executing program 5: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@random="39ae8aea1c05", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, "453fe7", 0x48, 0x3a, 0x0, @rand_addr="bac359599b00009200", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "9905c2", 0x0, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, [@dstopts={0x0, 0x1, '\x00', [@jumbo, @enc_lim]}]}}}}}}}) 02:40:18 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = getpgid(0xffffffffffffffff) r2 = openat$pf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FIOASYNC(r2, 0xc0104419, &(0x7f0000000040)=0x108) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f0000000040)=0xc) fcntl$setown(r0, 0x6, r1) 02:40:18 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) r1 = dup2(r0, r0) ioctl$VMM_IOC_RUN(r1, 0xc028756b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) 02:40:18 executing program 1: pledge(0xffffffffffffffff, 0x0) 02:40:18 executing program 1: pledge(0xffffffffffffffff, 0x0) 02:40:18 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) r1 = dup2(r0, r0) ioctl$VMM_IOC_RUN(r1, 0xc028756b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) 02:40:18 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = getpgid(0xffffffffffffffff) r2 = openat$pf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FIOASYNC(r2, 0xc0104419, &(0x7f0000000040)=0x108) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f0000000040)=0xc) fcntl$setown(r0, 0x6, r1) 02:40:18 executing program 3: r0 = socket$inet6(0x18, 0x3, 0x0) r1 = dup2(r0, r0) ioctl$VMM_IOC_RUN(r1, 0xc028756b, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) 02:40:18 executing program 2: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) r1 = getpgid(0xffffffffffffffff) r2 = openat$pf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FIOASYNC(r2, 0xc0104419, &(0x7f0000000040)=0x108) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f0000000040)=0xc) fcntl$setown(r0, 0x6, r1) 02:40:18 executing program 0: r0 = semget$private(0x0, 0x4000000009, 0x0) semop(r0, &(0x7f0000000400)=[{0x4, 0x4}, {0x1, 0x6, 0x800}, {0x3, 0xfffe}, {0x4, 0x3f, 0x1800}, {0x1, 0x2e5, 0x1000}, {0x3, 0x8, 0x1800}, {0x4, 0x7, 0x800}, {0x0, 0x9, 0x1800}, {}], 0x9) semctl$IPC_RMID(r0, 0x0, 0x0) 02:40:18 executing program 1: pledge(0xffffffffffffffff, 0x0) 2021/12/23 02:40:30 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: