starting RPC daemons:. savecore: no core dump checking quotas: done. clearing /tmp kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:40:27 PST 2021 OpenBSD/amd64 (ci-openbsd-main-6.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.236' (ED25519) to the list of known hosts. 2021/12/23 02:40:36 fuzzer started 2021/12/23 02:40:39 dialing manager at 10.128.15.235:22938 2021/12/23 02:40:40 syscalls: 387 2021/12/23 02:40:40 code coverage: enabled 2021/12/23 02:40:40 comparison tracing: enabled 2021/12/23 02:40:40 extra coverage: enabled 2021/12/23 02:40:40 delay kcov mmap: enabled 2021/12/23 02:40:40 setuid sandbox: enabled 2021/12/23 02:40:40 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:40:40 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:40:40 fault injection: support is not implemented in syzkaller 2021/12/23 02:40:40 leak checking: support is not implemented in syzkaller 2021/12/23 02:40:40 net packet injection: enabled 2021/12/23 02:40:40 net device setup: support is not implemented in syzkaller 2021/12/23 02:40:40 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:40:40 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:40:40 USB emulation: support is not implemented in syzkaller 2021/12/23 02:40:40 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:40:40 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:40:40 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:40:40 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:40:40 fetching corpus: 11, signal 980/4332 (executing program) 2021/12/23 02:40:40 fetching corpus: 11, signal 980/6032 (executing program) 2021/12/23 02:40:40 fetching corpus: 11, signal 980/6169 (executing program) 2021/12/23 02:40:40 fetching corpus: 11, signal 980/6169 (executing program) 2021/12/23 02:40:40 starting 6 fuzzer processes 02:40:40 executing program 4: setrlimit(0x8, &(0x7f0000000000)={0x47, 0x93}) r0 = syz_open_pts() close(r0) r1 = syz_open_pts() writev(r0, &(0x7f0000002a00)=[{&(0x7f0000000440), 0xff52}], 0x1) poll(&(0x7f0000000040)=[{r1, 0x4}], 0x1, 0x1ff) readv(r0, &(0x7f00000023c0)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/4096, 0x1000}], 0x2) 02:40:40 executing program 0: r0 = socket(0x400000000018, 0x3, 0x800000000000003a) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) setsockopt(r0, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x67, &(0x7f0000000140), 0xc) 02:40:40 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000002c0)={0x3, &(0x7f0000000100)=[{0x35}, {0x2d}, {0x6, 0x0, 0x0, 0x100}]}) pwrite(r0, &(0x7f0000000040)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0, 0x0) 02:40:40 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000380)=[{0x7}, {0x25}, {0x6, 0x0, 0x0, 0x7fff}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) write(r0, &(0x7f0000000180)="3c9ebb8a65237a19000000000000", 0xe) 02:40:40 executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="d73160174caf1fdb37b55715656e4718635a8c9994734f2d218868ac2881f1d6c2fda7ca6e6de98059ba14f943f52c65f327f660df5da2a156184864128ec5ae45372aab309d4db3ea499c41662d60a6835c4209f45a86dfd0b571ee93a26215006b35a3c4ca46a4afcc55d5d4f613b33240bc8c9d7beb68f43bf760fd171733787444b15b698c9c75c5b3e41882", 0x8e}], 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="b10005016000009005001b0007000000000004fecea11ea8fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff3728211ee4fd89720fd3872babfbb770a9f5a872c881ff7cc53c895303b22f310b404f36a00f90006ee01b00000000000200"/156, 0x9c, 0x0, 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(0xffffffffffffffff, 0x80105728, &(0x7f0000000080)={&(0x7f0000000000)=[{}], 0x1}) r0 = openat$pf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$FIOASYNC(r0, 0xc0504417, &(0x7f0000000080)) 02:40:40 executing program 5: r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000080), 0x41, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r0, 0x80047476, &(0x7f00000001c0)={0x0}) 02:40:40 executing program 0: r0 = socket(0x400000000018, 0x3, 0x800000000000003a) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) setsockopt(r0, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x67, &(0x7f0000000140), 0xc) 02:40:40 executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="d73160174caf1fdb37b55715656e4718635a8c9994734f2d218868ac2881f1d6c2fda7ca6e6de98059ba14f943f52c65f327f660df5da2a156184864128ec5ae45372aab309d4db3ea499c41662d60a6835c4209f45a86dfd0b571ee93a26215006b35a3c4ca46a4afcc55d5d4f613b33240bc8c9d7beb68f43bf760fd171733787444b15b698c9c75c5b3e41882", 0x8e}], 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="b10005016000009005001b0007000000000004fecea11ea8fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff3728211ee4fd89720fd3872babfbb770a9f5a872c881ff7cc53c895303b22f310b404f36a00f90006ee01b00000000000200"/156, 0x9c, 0x0, 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(0xffffffffffffffff, 0x80105728, &(0x7f0000000080)={&(0x7f0000000000)=[{}], 0x1}) r0 = openat$pf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$FIOASYNC(r0, 0xc0504417, &(0x7f0000000080)) 02:40:40 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000380)=[{0x7}, {0x25}, {0x6, 0x0, 0x0, 0x7fff}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) write(r0, &(0x7f0000000180)="3c9ebb8a65237a19000000000000", 0xe) 02:40:40 executing program 0: r0 = socket(0x400000000018, 0x3, 0x800000000000003a) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) setsockopt(r0, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x67, &(0x7f0000000140), 0xc) 02:40:40 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000380)=[{0x7}, {0x25}, {0x6, 0x0, 0x0, 0x7fff}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) write(r0, &(0x7f0000000180)="3c9ebb8a65237a19000000000000", 0xe) 02:40:40 executing program 3: pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="d73160174caf1fdb37b55715656e4718635a8c9994734f2d218868ac2881f1d6c2fda7ca6e6de98059ba14f943f52c65f327f660df5da2a156184864128ec5ae45372aab309d4db3ea499c41662d60a6835c4209f45a86dfd0b571ee93a26215006b35a3c4ca46a4afcc55d5d4f613b33240bc8c9d7beb68f43bf760fd171733787444b15b698c9c75c5b3e41882", 0x8e}], 0x1, 0x0, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="b10005016000009005001b0007000000000004fecea11ea8fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff3728211ee4fd89720fd3872babfbb770a9f5a872c881ff7cc53c895303b22f310b404f36a00f90006ee01b00000000000200"/156, 0x9c, 0x0, 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(0xffffffffffffffff, 0x80105728, &(0x7f0000000080)={&(0x7f0000000000)=[{}], 0x1}) r0 = openat$pf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$FIOASYNC(r0, 0xc0504417, &(0x7f0000000080)) 2021/12/23 02:40:51 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory) login: