kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:40:28 PST 2021 OpenBSD/amd64 (ci-openbsd-main-9.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.175' (ED25519) to the list of known hosts. 2021/12/23 02:40:41 fuzzer started 2021/12/23 02:40:43 dialing manager at 10.128.15.235:22938 2021/12/23 02:40:43 syscalls: 387 2021/12/23 02:40:43 code coverage: enabled 2021/12/23 02:40:43 comparison tracing: enabled 2021/12/23 02:40:43 extra coverage: enabled 2021/12/23 02:40:43 delay kcov mmap: enabled 2021/12/23 02:40:43 setuid sandbox: enabled 2021/12/23 02:40:43 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:40:43 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:40:43 fault injection: support is not implemented in syzkaller 2021/12/23 02:40:43 leak checking: support is not implemented in syzkaller 2021/12/23 02:40:43 net packet injection: enabled 2021/12/23 02:40:43 net device setup: support is not implemented in syzkaller 2021/12/23 02:40:43 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:40:43 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:40:43 USB emulation: support is not implemented in syzkaller 2021/12/23 02:40:43 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:40:43 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:40:43 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:40:43 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:40:44 fetching corpus: 11, signal 980/4369 (executing program) 2021/12/23 02:40:44 fetching corpus: 11, signal 980/6043 (executing program) 2021/12/23 02:40:44 fetching corpus: 11, signal 980/6317 (executing program) 2021/12/23 02:40:44 fetching corpus: 11, signal 980/6317 (executing program) 2021/12/23 02:40:44 starting 6 fuzzer processes 02:40:44 executing program 0: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="89000000ffff000001"], 0x9}, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x32c, 0x0, 0x0, &(0x7f0000000000), 0x90}, 0x0) 02:40:44 executing program 1: r0 = syz_open_pts() r1 = dup2(r0, r0) syz_open_pts() ioctl$FIOASYNC(r1, 0x8004667d, &(0x7f0000000000)=0x3) syz_open_pts() 02:40:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/104, 0x27a) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x1, 0x0) close(r1) r2 = socket(0x18, 0x2, 0x0) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 02:40:45 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) listen(r1, 0x0) r2 = socket(0x2, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=ANY=[], 0x10) kqueue() r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0) sendto$unix(r2, &(0x7f00000011c0)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) r4 = syz_open_pts() getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000040)={0x0}, &(0x7f0000002200)=0xc) fcntl$lock(r4, 0x8, &(0x7f0000002240)={0x2, 0x2, 0x20000000000, 0x540d, r5}) r6 = accept$unix(r1, 0x0, &(0x7f0000000080)) syz_open_pts() write(r2, &(0x7f00000000c0)="c5100513dd49d09d4e0602c99662ab25dde23ec8036820dcdfce827b1dce69a5fb7db52988393aaf046855a73562ffd89f3bda41ace0a61c4c977f6fa767098a6c60c63c46aeda61975dadd810ed5ad2acba73f6f714a976584d1adb5c788c1a23b1c333", 0x64) readv(r6, &(0x7f0000003280)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/108, 0x6c}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000003200)=""/106, 0x6a}], 0x4) 02:40:45 executing program 4: sysctl$net_inet6_ip6(&(0x7f0000000680)={0xa, 0xd}, 0x4, 0x0, 0x0, 0x0, 0x0) 02:40:45 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x1002, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) open$dir(&(0x7f00000000c0)='./file0\x00', 0x6, 0x0) 02:40:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/104, 0x27a) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x1, 0x0) close(r1) r2 = socket(0x18, 0x2, 0x0) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 02:40:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/104, 0x27a) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x1, 0x0) close(r1) r2 = socket(0x18, 0x2, 0x0) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 02:40:45 executing program 0: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="89000000ffff000001"], 0x9}, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x32c, 0x0, 0x0, &(0x7f0000000000), 0x90}, 0x0) 02:40:45 executing program 3: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="6202e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) listen(r1, 0x0) r2 = socket(0x2, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=ANY=[], 0x10) kqueue() r3 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x0, 0x0) sendto$unix(r2, &(0x7f00000011c0)='\x00', 0x1, 0x0, 0x0, 0x0) close(r2) r4 = syz_open_pts() getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f0000000040)={0x0}, &(0x7f0000002200)=0xc) fcntl$lock(r4, 0x8, &(0x7f0000002240)={0x2, 0x2, 0x20000000000, 0x540d, r5}) r6 = accept$unix(r1, 0x0, &(0x7f0000000080)) syz_open_pts() write(r2, &(0x7f00000000c0)="c5100513dd49d09d4e0602c99662ab25dde23ec8036820dcdfce827b1dce69a5fb7db52988393aaf046855a73562ffd89f3bda41ace0a61c4c977f6fa767098a6c60c63c46aeda61975dadd810ed5ad2acba73f6f714a976584d1adb5c788c1a23b1c333", 0x64) readv(r6, &(0x7f0000003280)=[{&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/108, 0x6c}, {&(0x7f0000001200)=""/4096, 0x1000}, {&(0x7f0000003200)=""/106, 0x6a}], 0x4) 02:40:45 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f000060cff8)='/', 0x0, 0x0) getdents(r0, &(0x7f0000000000)=""/104, 0x27a) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x1, 0x0) close(r1) r2 = socket(0x18, 0x2, 0x0) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 02:40:45 executing program 1: r0 = syz_open_pts() r1 = dup2(r0, r0) syz_open_pts() ioctl$FIOASYNC(r1, 0x8004667d, &(0x7f0000000000)=0x3) syz_open_pts() 02:40:45 executing program 0: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="89000000ffff000001"], 0x9}, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x32c, 0x0, 0x0, &(0x7f0000000000), 0x90}, 0x0) 02:40:45 executing program 1: r0 = syz_open_pts() r1 = dup2(r0, r0) syz_open_pts() ioctl$FIOASYNC(r1, 0x8004667d, &(0x7f0000000000)=0x3) syz_open_pts() 02:40:45 executing program 2: r0 = syz_open_pts() r1 = dup2(r0, r0) syz_open_pts() ioctl$FIOASYNC(r1, 0x8004667d, &(0x7f0000000000)=0x3) syz_open_pts() 02:40:45 executing program 0: shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000000)={{0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="89000000ffff000001"], 0x9}, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x32c, 0x0, 0x0, &(0x7f0000000000), 0x90}, 0x0) 2021/12/23 02:40:56 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: