OpenBSD/amd64 (ci-openbsd-multicore-2.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.117' (ED25519) to the list of known hosts. 2022/01/14 07:26:03 fuzzer started 2022/01/14 07:26:06 dialing manager at 10.128.15.235:5613 2022/01/14 07:26:06 syscalls: 387 2022/01/14 07:26:06 code coverage: enabled 2022/01/14 07:26:06 comparison tracing: enabled 2022/01/14 07:26:06 extra coverage: enabled 2022/01/14 07:26:06 delay kcov mmap: enabled 2022/01/14 07:26:06 setuid sandbox: enabled 2022/01/14 07:26:06 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:26:06 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:26:06 fault injection: support is not implemented in syzkaller 2022/01/14 07:26:06 leak checking: support is not implemented in syzkaller 2022/01/14 07:26:06 net packet injection: enabled 2022/01/14 07:26:06 net device setup: support is not implemented in syzkaller 2022/01/14 07:26:06 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:26:06 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:26:06 USB emulation: support is not implemented in syzkaller 2022/01/14 07:26:06 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:26:06 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:26:06 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:26:06 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:26:06 fetching corpus: 24, signal 3068/5610 (executing program) 2022/01/14 07:26:06 fetching corpus: 24, signal 3068/6912 (executing program) 2022/01/14 07:26:06 fetching corpus: 24, signal 3068/8152 (executing program) 2022/01/14 07:26:06 fetching corpus: 24, signal 3068/8377 (executing program) 2022/01/14 07:26:06 fetching corpus: 24, signal 3068/8377 (executing program) 2022/01/14 07:26:06 starting 8 fuzzer processes 07:26:06 executing program 0: r0 = msgget(0x1, 0x688) msgctl$IPC_RMID(r0, 0x0) 07:26:06 executing program 1: r0 = socket(0x18, 0x3, 0x0) shutdown(r0, 0x2) 07:26:06 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000140)={'tap', 0x0}) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSDIRFILT(r2, 0x8004427d, &(0x7f0000000040)=0x9) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000000c0)={0x1, &(0x7f00000001c0)=[{0x4406}]}) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@random="eec30f4c10d9", @random="aef139c6c068", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @multicast1, @random="73b977f996c8", @remote={0xac, 0x14, 0x0}}}}}) 07:26:06 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x81}, {0x61}, {0x6, 0x0, 0x0, 0x401}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) write(r0, &(0x7f00000001c0)="3c9ebbd555feff969613ba3e1fd0", 0xe) 07:26:06 executing program 4: mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$VNDIOCSET(r0, 0xc0384600, &(0x7f00000000c0)={&(0x7f0000000000)='./file0\x00', 0xffffffff, 0x0}) chmod(&(0x7f0000000040)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000240)=ANY=[@ANYBLOB="2d012e2f66"], 0xa) rename(&(0x7f00000001c0)='./file0\x00', 0x0) execve(0x0, 0x0, 0x0) 07:26:06 executing program 5: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$WSMOUSEIO_GCALIBCOORDS(r0, 0x20004455, 0x0) 07:26:06 executing program 6: r0 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000040), 0x42, 0x0) write(r0, &(0x7f00000001c0)="6c83a34d530f10e1007f9906d97336a95489b9e2cb5f2745269cb24a228e54b3fdf5926b653b9cb19910c1a9fb6cb52a40cdc5f6be96e1a98420bb10b99cc30b745c0a483ec7d52b16f86f551e3cc042c12d8c", 0x1) 07:26:06 executing program 7: semop(0x0, &(0x7f0000000000)=[{}, {}, {0x0, 0x0, 0x1000}], 0x3) sysctl$kern(&(0x7f0000000000)={0x1, 0x49}, 0x6, 0x0, 0x0, 0x0, 0x0) 07:26:06 executing program 1: r0 = socket(0x18, 0x3, 0x0) shutdown(r0, 0x2) 07:26:06 executing program 0: r0 = msgget(0x1, 0x688) msgctl$IPC_RMID(r0, 0x0) 07:26:06 executing program 1: r0 = socket(0x18, 0x3, 0x0) shutdown(r0, 0x2) 07:26:07 executing program 0: r0 = msgget(0x1, 0x688) msgctl$IPC_RMID(r0, 0x0) 07:26:07 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x81}, {0x61}, {0x6, 0x0, 0x0, 0x401}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) write(r0, &(0x7f00000001c0)="3c9ebbd555feff969613ba3e1fd0", 0xe) 07:26:07 executing program 0: r0 = msgget(0x1, 0x688) msgctl$IPC_RMID(r0, 0x0) 07:26:07 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000140)={'tap', 0x0}) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSDIRFILT(r2, 0x8004427d, &(0x7f0000000040)=0x9) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000000c0)={0x1, &(0x7f00000001c0)=[{0x4406}]}) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@random="eec30f4c10d9", @random="aef139c6c068", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @multicast1, @random="73b977f996c8", @remote={0xac, 0x14, 0x0}}}}}) 07:26:07 executing program 1: r0 = socket(0x18, 0x3, 0x0) shutdown(r0, 0x2) 07:26:07 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x81}, {0x61}, {0x6, 0x0, 0x0, 0x401}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) write(r0, &(0x7f00000001c0)="3c9ebbd555feff969613ba3e1fd0", 0xe) 07:26:07 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000140)={'tap', 0x0}) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSDIRFILT(r2, 0x8004427d, &(0x7f0000000040)=0x9) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000000c0)={0x1, &(0x7f00000001c0)=[{0x4406}]}) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@random="eec30f4c10d9", @random="aef139c6c068", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @multicast1, @random="73b977f996c8", @remote={0xac, 0x14, 0x0}}}}}) 07:26:07 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000140)={'tap', 0x0}) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSDIRFILT(r2, 0x8004427d, &(0x7f0000000040)=0x9) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000000c0)={0x1, &(0x7f00000001c0)=[{0x4406}]}) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@random="eec30f4c10d9", @random="aef139c6c068", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @multicast1, @random="73b977f996c8", @remote={0xac, 0x14, 0x0}}}}}) 07:26:07 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = dup(r0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000140)={'tap', 0x0}) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETIF(r2, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSDIRFILT(r2, 0x8004427d, &(0x7f0000000040)=0x9) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000000c0)={0x1, &(0x7f00000001c0)=[{0x4406}]}) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@random="eec30f4c10d9", @random="aef139c6c068", [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @local, @multicast1, @random="73b977f996c8", @remote={0xac, 0x14, 0x0}}}}}) 2022/01/14 07:26:19 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory) login: