OpenBSD/amd64 (ci-openbsd-main-8.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.125' (ED25519) to the list of known hosts. 2022/01/14 07:25:07 fuzzer started 2022/01/14 07:25:10 dialing manager at 10.128.15.235:6268 2022/01/14 07:25:10 syscalls: 387 2022/01/14 07:25:10 code coverage: enabled 2022/01/14 07:25:10 comparison tracing: enabled 2022/01/14 07:25:10 extra coverage: enabled 2022/01/14 07:25:10 delay kcov mmap: enabled 2022/01/14 07:25:10 setuid sandbox: enabled 2022/01/14 07:25:10 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:25:10 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:25:10 fault injection: support is not implemented in syzkaller 2022/01/14 07:25:10 leak checking: support is not implemented in syzkaller 2022/01/14 07:25:10 net packet injection: enabled 2022/01/14 07:25:10 net device setup: support is not implemented in syzkaller 2022/01/14 07:25:10 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:25:10 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:25:10 USB emulation: support is not implemented in syzkaller 2022/01/14 07:25:10 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:25:10 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:25:10 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:25:10 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:25:10 fetching corpus: 14, signal 841/4314 (executing program) 2022/01/14 07:25:10 fetching corpus: 14, signal 841/6034 (executing program) 2022/01/14 07:25:10 fetching corpus: 14, signal 841/6305 (executing program) 2022/01/14 07:25:10 fetching corpus: 14, signal 841/6305 (executing program) 2022/01/14 07:25:10 starting 8 fuzzer processes 07:25:10 executing program 0: r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xffed}], 0x1) 07:25:10 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000005c0)={0x3, &(0x7f0000000000)=[{0x2}, {0x30}, {0x6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@random="a9c400d8b100", @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00\x00\t', 0x8, 0x0, 0x0, @rand_addr='+\a\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', @mcast2, {[], @icmpv6=@echo_reply}}}}}) 07:25:10 executing program 1: sysctl$kern(&(0x7f0000001240)={0x1, 0x2}, 0x2, &(0x7f0000001280), 0x0, 0x0, 0x0) 07:25:10 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000a, &(0x7f0000000000)='\x00', 0x1) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, 0x0, 0x0) 07:25:10 executing program 4: r0 = socket(0x1e, 0x3, 0x0) shutdown(r0, 0x1) 07:25:10 executing program 0: r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xffed}], 0x1) 07:25:10 executing program 6: r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xffed}], 0x1) 07:25:10 executing program 5: mkdir(&(0x7f0000000040)='./file0\x00', 0x0) setreuid(0xee00, 0x0) chmod(&(0x7f0000000200)='./file0\x00', 0x1c2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r0, 0xffff, 0x1022, &(0x7f0000000180)={0x0, 0x0, 0x0}, &(0x7f00000000c0)=0xffffffffffffff14) chown(&(0x7f00000001c0)='./file0\x00', 0x0, r1) r2 = getuid() setreuid(0xee00, r2) unveil(&(0x7f0000000000)='./file0/file0\x00', &(0x7f0000000100)='x\x00') 07:25:10 executing program 7: r0 = socket$unix(0x1, 0x5, 0x0) setsockopt$sock_timeval(r0, 0xffff, 0x1021, 0x0, 0x0) 07:25:10 executing program 1: sysctl$kern(&(0x7f0000001240)={0x1, 0x2}, 0x2, &(0x7f0000001280), 0x0, 0x0, 0x0) 07:25:10 executing program 0: r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xffed}], 0x1) 07:25:10 executing program 3: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000a, &(0x7f0000000000)='\x00', 0x1) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, 0x0, 0x0) 07:25:10 executing program 0: r0 = semget(0x2, 0x0, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0xffed}], 0x1) 07:25:10 executing program 1: sysctl$kern(&(0x7f0000001240)={0x1, 0x2}, 0x2, &(0x7f0000001280), 0x0, 0x0, 0x0) 07:25:11 executing program 1: sysctl$kern(&(0x7f0000001240)={0x1, 0x2}, 0x2, &(0x7f0000001280), 0x0, 0x0, 0x0) 07:25:11 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000a, &(0x7f0000000000)='\x00', 0x1) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, 0x0, 0x0) 07:25:11 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000005c0)={0x3, &(0x7f0000000000)=[{0x2}, {0x30}, {0x6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@random="a9c400d8b100", @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00\x00\t', 0x8, 0x0, 0x0, @rand_addr='+\a\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', @mcast2, {[], @icmpv6=@echo_reply}}}}}) 07:25:11 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000005c0)={0x3, &(0x7f0000000000)=[{0x2}, {0x30}, {0x6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@random="a9c400d8b100", @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00\x00\t', 0x8, 0x0, 0x0, @rand_addr='+\a\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', @mcast2, {[], @icmpv6=@echo_reply}}}}}) 07:25:11 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000a, &(0x7f0000000000)='\x00', 0x1) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, 0x0, 0x0) 07:25:11 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000005c0)={0x3, &(0x7f0000000000)=[{0x2}, {0x30}, {0x6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@random="a9c400d8b100", @local, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00\x00\t', 0x8, 0x0, 0x0, @rand_addr='+\a\x00\x00\x00\x00\x00\x00\x00\x00\t\x00', @mcast2, {[], @icmpv6=@echo_reply}}}}}) 2022/01/14 07:25:22 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: