creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. /etc/rc.local[5]: syntax error: `(' unexpected starting local daemons:. Fri Jan 14 03:27:15 PST 2022 OpenBSD/amd64 (worker.my.domain) (tty00) Warning: Permanently added '10.128.1.46' (ED25519) to the list of known hosts. 2022/01/14 03:27:24 fuzzer started 2022/01/14 03:27:28 dialing manager at 10.128.15.235:38506 2022/01/14 03:27:28 syscalls: 387 2022/01/14 03:27:28 code coverage: enabled 2022/01/14 03:27:28 comparison tracing: enabled 2022/01/14 03:27:28 extra coverage: enabled 2022/01/14 03:27:28 delay kcov mmap: enabled 2022/01/14 03:27:28 setuid sandbox: enabled 2022/01/14 03:27:28 namespace sandbox: support is not implemented in syzkaller 2022/01/14 03:27:28 Android sandbox: support is not implemented in syzkaller 2022/01/14 03:27:28 fault injection: support is not implemented in syzkaller 2022/01/14 03:27:28 leak checking: support is not implemented in syzkaller 2022/01/14 03:27:28 net packet injection: enabled 2022/01/14 03:27:28 net device setup: support is not implemented in syzkaller 2022/01/14 03:27:28 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 03:27:28 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 03:27:28 USB emulation: support is not implemented in syzkaller 2022/01/14 03:27:28 hci packet injection: support is not implemented in syzkaller 2022/01/14 03:27:28 wifi device emulation: support is not implemented in syzkaller 2022/01/14 03:27:28 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 03:27:28 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 03:27:28 fetching corpus: 8, signal 872/3848 (executing program) 2022/01/14 03:27:28 fetching corpus: 8, signal 872/3848 (executing program) 2022/01/14 03:27:28 starting 8 fuzzer processes 03:27:28 executing program 0: munlock(&(0x7f0000003000/0x1000)=nil, 0xffffffffdfffcfff) 03:27:28 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x1fe, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{0x74}, {0xc}, {0x6, 0x0, 0x0, 0xa4c8}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) pwrite(r0, &(0x7f0000000140)="fbf217f65b361b1b42e218190300", 0xe, 0x0) 03:27:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file3\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') unveil(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='c\x00') unveil(&(0x7f0000000080)='./file3\x00', &(0x7f00000000c0)='c\x00') unveil(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='c\x00') 03:27:28 executing program 3: open$dir(&(0x7f0000000040)='./file0\x00', 0x40000400000002c1, 0x0) r0 = getpid() open$dir(0x0, 0x0, 0x0) setpgid(0x0, 0x0) ktrace(&(0x7f0000000100)='./file0\x00', 0x0, 0x40000008, r0) setgroups(0x0, 0x0) r1 = getpgrp() ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x410, r1) 03:27:28 executing program 4: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000140)=[{0x87}, {0x40}, {0x6, 0x0, 0x0, 0x103}]}) pwrite(r0, &(0x7f0000000000)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 03:27:28 executing program 5: r0 = socket(0x2, 0x3, 0x0) setsockopt$inet_opts(r0, 0x0, 0x1, &(0x7f00000000c0)="071400000f370025ff149b33ff0f000000000000", 0x14) getsockopt(r0, 0x0, 0x8, 0x0, 0x0) 03:27:28 executing program 6: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000000100)={&(0x7f0000000040)=@in6={0x18, 0x1}, 0xc, 0x0, 0x0, &(0x7f0000000300)=[{0x10}], 0x10}, 0x0) 03:27:28 executing program 7: ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "0000000100000000000300"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x8) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) close(r0) socket(0x18, 0x3, 0x0) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 03:27:28 executing program 0: munlock(&(0x7f0000003000/0x1000)=nil, 0xffffffffdfffcfff) 03:27:28 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x1fe, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{0x74}, {0xc}, {0x6, 0x0, 0x0, 0xa4c8}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) pwrite(r0, &(0x7f0000000140)="fbf217f65b361b1b42e218190300", 0xe, 0x0) 03:27:28 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file3\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') unveil(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='c\x00') unveil(&(0x7f0000000080)='./file3\x00', &(0x7f00000000c0)='c\x00') unveil(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='c\x00') 03:27:28 executing program 0: munlock(&(0x7f0000003000/0x1000)=nil, 0xffffffffdfffcfff) 03:27:28 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x1fe, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{0x74}, {0xc}, {0x6, 0x0, 0x0, 0xa4c8}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) pwrite(r0, &(0x7f0000000140)="fbf217f65b361b1b42e218190300", 0xe, 0x0) 03:27:29 executing program 0: munlock(&(0x7f0000003000/0x1000)=nil, 0xffffffffdfffcfff) 03:27:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file3\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') unveil(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='c\x00') unveil(&(0x7f0000000080)='./file3\x00', &(0x7f00000000c0)='c\x00') unveil(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='c\x00') 03:27:29 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x1fe, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{0x74}, {0xc}, {0x6, 0x0, 0x0, 0xa4c8}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) pwrite(r0, &(0x7f0000000140)="fbf217f65b361b1b42e218190300", 0xe, 0x0) 03:27:29 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file3\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') unveil(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='c\x00') unveil(&(0x7f0000000080)='./file3\x00', &(0x7f00000000c0)='c\x00') unveil(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='c\x00') 03:27:29 executing program 3: open$dir(&(0x7f0000000040)='./file0\x00', 0x40000400000002c1, 0x0) r0 = getpid() open$dir(0x0, 0x0, 0x0) setpgid(0x0, 0x0) ktrace(&(0x7f0000000100)='./file0\x00', 0x0, 0x40000008, r0) setgroups(0x0, 0x0) r1 = getpgrp() ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x410, r1) 03:27:29 executing program 2: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file3\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) chroot(&(0x7f0000000040)='./file0\x00') unveil(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='c\x00') unveil(&(0x7f0000000080)='./file3\x00', &(0x7f00000000c0)='c\x00') unveil(&(0x7f0000000100)='./file1\x00', &(0x7f0000000140)='c\x00') 03:27:29 executing program 1: open$dir(&(0x7f0000000040)='./file0\x00', 0x40000400000002c1, 0x0) r0 = getpid() open$dir(0x0, 0x0, 0x0) setpgid(0x0, 0x0) ktrace(&(0x7f0000000100)='./file0\x00', 0x0, 0x40000008, r0) setgroups(0x0, 0x0) r1 = getpgrp() ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0x410, r1) 2022/01/14 03:27:41 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: