kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:39:38 PST 2021 OpenBSD/amd64 (ci-openbsd-multicore-7.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.45' (ED25519) to the list of known hosts. 2021/12/23 02:39:49 fuzzer started 2021/12/23 02:39:51 dialing manager at 10.128.15.235:42845 2021/12/23 02:39:51 syscalls: 387 2021/12/23 02:39:51 code coverage: enabled 2021/12/23 02:39:51 comparison tracing: enabled 2021/12/23 02:39:51 extra coverage: enabled 2021/12/23 02:39:51 delay kcov mmap: enabled 2021/12/23 02:39:51 setuid sandbox: enabled 2021/12/23 02:39:51 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:39:51 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:39:51 fault injection: support is not implemented in syzkaller 2021/12/23 02:39:51 leak checking: support is not implemented in syzkaller 2021/12/23 02:39:51 net packet injection: enabled 2021/12/23 02:39:51 net device setup: support is not implemented in syzkaller 2021/12/23 02:39:51 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:39:51 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:39:51 USB emulation: support is not implemented in syzkaller 2021/12/23 02:39:51 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:39:51 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:39:51 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:39:51 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:39:51 fetching corpus: 11, signal 1744/4800 (executing program) 2021/12/23 02:39:51 fetching corpus: 11, signal 1744/6276 (executing program) 2021/12/23 02:39:51 fetching corpus: 11, signal 1744/7162 (executing program) 2021/12/23 02:39:51 fetching corpus: 11, signal 1744/7162 (executing program) 2021/12/23 02:39:51 starting 6 fuzzer processes 02:39:51 executing program 0: syz_emit_ethernet(0x50, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd60950000001a3aff000000000000000000000000bbff02000000000000000006"]) 02:39:51 executing program 1: r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x800000018, 0x1, 0x0) setsockopt(r0, 0x6, 0x4, &(0x7f0000000100)="f752d96b", 0x4) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000080)={0x0, 0x0, 0x1ff, 0x0, "d730c1e7e400000001000000000000000000009e"}) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) setsockopt$sock_int(r1, 0xffff, 0x1, &(0x7f0000000000)=0x80000001, 0x4) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "001937ead90fe578d7002000"}) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) 02:39:51 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setrlimit(0x8, &(0x7f0000000080)) recvmsg(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=""/79, 0x4f}, 0x0) sendmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="28000000ffff000001"], 0x28}, 0x0) 02:39:51 executing program 4: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6b02731c7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) openat$null(0xffffffffffffff9c, 0x0, 0x0, 0x0) connect(0xffffffffffffffff, 0x0, 0x0) listen(r1, 0x0) r2 = kqueue() setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040), 0x4) r3 = fcntl$dupfd(r2, 0x2, 0xffffffffffffffff) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, 0x0, 0x0) close(r3) r4 = socket(0x2, 0x1, 0x0) connect$unix(r4, &(0x7f0000000000)=ANY=[], 0x10) pwritev(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x40) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = accept$inet(r0, 0x0, 0x0) sendto$inet(r5, &(0x7f0000000940)="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", 0xfffffe60, 0x403, &(0x7f0000000140)={0x2, 0x3}, 0xc) setsockopt$sock_int(r3, 0xffff, 0x1023, &(0x7f0000000080)=0x20000000, 0x4) 02:39:51 executing program 3: sysctl$kern(&(0x7f0000000040)={0x1, 0x9}, 0x2, &(0x7f0000000080)="0b5f8720", &(0x7f0000000140)=0x4, &(0x7f0000000180)="34c73f8a", 0x4) 02:39:51 executing program 5: syz_emit_ethernet(0x68, &(0x7f0000000000)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x32, 0x3a, 0x0, @remote={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "e2362c", 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @broadcast}, @mcast2, [], '\x00\x00'}}}}}}}) 02:39:52 executing program 0: syz_emit_ethernet(0x50, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd60950000001a3aff000000000000000000000000bbff02000000000000000006"]) 02:39:52 executing program 0: syz_emit_ethernet(0x50, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd60950000001a3aff000000000000000000000000bbff02000000000000000006"]) 02:39:52 executing program 3: sysctl$kern(&(0x7f0000000040)={0x1, 0x9}, 0x2, &(0x7f0000000080)="0b5f8720", &(0x7f0000000140)=0x4, &(0x7f0000000180)="34c73f8a", 0x4) 02:39:52 executing program 3: sysctl$kern(&(0x7f0000000040)={0x1, 0x9}, 0x2, &(0x7f0000000080)="0b5f8720", &(0x7f0000000140)=0x4, &(0x7f0000000180)="34c73f8a", 0x4) 02:39:52 executing program 0: syz_emit_ethernet(0x50, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd60950000001a3aff000000000000000000000000bbff02000000000000000006"]) 02:39:52 executing program 1: r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x800000018, 0x1, 0x0) setsockopt(r0, 0x6, 0x4, &(0x7f0000000100)="f752d96b", 0x4) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000080)={0x0, 0x0, 0x1ff, 0x0, "d730c1e7e400000001000000000000000000009e"}) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) setsockopt$sock_int(r1, 0xffff, 0x1, &(0x7f0000000000)=0x80000001, 0x4) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "001937ead90fe578d7002000"}) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) 02:39:52 executing program 3: sysctl$kern(&(0x7f0000000040)={0x1, 0x9}, 0x2, &(0x7f0000000080)="0b5f8720", &(0x7f0000000140)=0x4, &(0x7f0000000180)="34c73f8a", 0x4) 02:39:52 executing program 1: r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x800000018, 0x1, 0x0) setsockopt(r0, 0x6, 0x4, &(0x7f0000000100)="f752d96b", 0x4) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000080)={0x0, 0x0, 0x1ff, 0x0, "d730c1e7e400000001000000000000000000009e"}) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) setsockopt$sock_int(r1, 0xffff, 0x1, &(0x7f0000000000)=0x80000001, 0x4) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "001937ead90fe578d7002000"}) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) 02:39:52 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) setrlimit(0x8, &(0x7f0000000080)) recvmsg(r0, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=""/79, 0x4f}, 0x0) sendmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="28000000ffff000001"], 0x28}, 0x0) 2021/12/23 02:40:03 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: