kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:40:01 PST 2021 OpenBSD/amd64 (ci-openbsd-multicore-9.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.2' (ED25519) to the list of known hosts. 2021/12/23 02:40:14 fuzzer started 2021/12/23 02:40:17 dialing manager at 10.128.15.235:42845 2021/12/23 02:40:17 syscalls: 387 2021/12/23 02:40:17 code coverage: enabled 2021/12/23 02:40:17 comparison tracing: enabled 2021/12/23 02:40:17 extra coverage: enabled 2021/12/23 02:40:17 delay kcov mmap: enabled 2021/12/23 02:40:17 setuid sandbox: enabled 2021/12/23 02:40:17 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:40:17 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:40:17 fault injection: support is not implemented in syzkaller 2021/12/23 02:40:17 leak checking: support is not implemented in syzkaller 2021/12/23 02:40:17 net packet injection: enabled 2021/12/23 02:40:17 net device setup: support is not implemented in syzkaller 2021/12/23 02:40:17 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:40:17 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:40:17 USB emulation: support is not implemented in syzkaller 2021/12/23 02:40:17 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:40:17 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:40:17 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:40:17 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:40:17 fetching corpus: 13, signal 1997/4927 (executing program) 2021/12/23 02:40:17 fetching corpus: 13, signal 1997/6403 (executing program) 2021/12/23 02:40:17 fetching corpus: 13, signal 1997/7404 (executing program) 2021/12/23 02:40:17 fetching corpus: 13, signal 1997/7404 (executing program) 2021/12/23 02:40:17 starting 6 fuzzer processes 02:40:17 executing program 0: r0 = syz_open_pts() ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffff0a, 0x0, "d730c1e7bb6fc6e23c5b00000000000000e74de4"}) read(r0, &(0x7f0000000140)=""/111, 0x1db6036960f62377) syz_open_pts() ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffff7fff, "fba487e60400c0bd45de78a3000000000100"}) ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "05f50e931641989ef5fe448af345e951ad613642"}) syz_open_pts() 02:40:17 executing program 1: sysctl$net_inet_ip(&(0x7f0000000380)={0x4, 0x18, 0x33}, 0x9, 0x0, 0x0, 0x0, 0x0) 02:40:17 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f0000000180)=[{0x5}, {0x45}, {0x6, 0x0, 0x0, 0x2000}]}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="06005d0c07f6777c038271cb7ed8", 0xe}], 0x1) 02:40:17 executing program 3: r0 = getgid() r1 = getuid() semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x2, 0x0, r0, r1, 0x0, 0x4, 0x8101}, 0xf2b2, 0x7fd, 0x8000007}) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0xc) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0xc) r6 = getegid() r7 = socket(0x11, 0x3, 0x0) recvmsg(r7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x803) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, r1, r3}, @cred={0x20, 0xffff, 0x0, r4, r2, r6}, @rights={0x28, 0xffff, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, @rights={0x20, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, @rights={0x20, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r7]}, @cred={0x20, 0xffff, 0x0, 0x0, 0x0, r5}, @rights={0x38, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}], 0x100, 0x1}, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0xc) r9 = semget$private(0x0, 0x5, 0x46) r10 = socket(0x18, 0x1, 0x0) getsockopt$SO_PEERCRED(r10, 0xffff, 0x1022, &(0x7f0000000300)={0x0, 0x0}, 0xc) setreuid(r11, 0xee01) r12 = getgid() r13 = getuid() semctl$IPC_SET(r9, 0x0, 0x1, &(0x7f0000000280)={{0x2, r11, r12, r13, 0x0, 0x4, 0x8101}, 0xf2b2, 0x7fd, 0x8000007}) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) setgroups(0x7, &(0x7f00000002c0)=[0x0, r5, r8, 0x0, 0x0, r12, r14]) sysctl$net_inet6_ip6(&(0x7f00000000c0)={0x4, 0x18, 0x29, 0x35}, 0x4, &(0x7f0000000100)="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", &(0x7f0000000000)=0xfdea, 0x0, 0x0) 02:40:17 executing program 4: fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x1}) sysctl$kern(&(0x7f0000000040)={0x1, 0x59}, 0x4000000000000003, &(0x7f00000001c0)="eb9c770525dbfb3a662c2e9fcde22a63a70b2f59cf6fdd160d1d376007f883be5d093f7630b4399c188b0a79c5b6f12d2a104d64a206500bdf5ca91fb2299fb50093847dc573a5c2e9acddf0aa76345bc995274e0149c8ff070000000000009200f86fae240d9fdbbe85dd833b595e346825ba46f7c4881d7702012992b893e765edcc865895bdaf7a6ca185324c6dd9a652c26ebc4e816491d09e073d481defed0adfa61364a3b5f9fce44462609c067532fb0e2b241425a808", &(0x7f0000000000)=0x2000, 0x0, 0x42) 02:40:17 executing program 5: r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) fcntl$setown(r0, 0x6, 0x0) 02:40:18 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f0000000180)=[{0x5}, {0x45}, {0x6, 0x0, 0x0, 0x2000}]}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="06005d0c07f6777c038271cb7ed8", 0xe}], 0x1) 02:40:18 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f0000000180)=[{0x5}, {0x45}, {0x6, 0x0, 0x0, 0x2000}]}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="06005d0c07f6777c038271cb7ed8", 0xe}], 0x1) 02:40:18 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f0000000180)=[{0x5}, {0x45}, {0x6, 0x0, 0x0, 0x2000}]}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="06005d0c07f6777c038271cb7ed8", 0xe}], 0x1) 02:40:18 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f0000000180)=[{0x5}, {0x45}, {0x6, 0x0, 0x0, 0x2000}]}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="06005d0c07f6777c038271cb7ed8", 0xe}], 0x1) 02:40:18 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f0000000180)=[{0x5}, {0x45}, {0x6, 0x0, 0x0, 0x2000}]}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="06005d0c07f6777c038271cb7ed8", 0xe}], 0x1) 02:40:18 executing program 0: r0 = syz_open_pts() ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f0000000080)={0x0, 0x0, 0xffffffffffffff0a, 0x0, "d730c1e7bb6fc6e23c5b00000000000000e74de4"}) read(r0, &(0x7f0000000140)=""/111, 0x1db6036960f62377) syz_open_pts() ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xffff7fff, "fba487e60400c0bd45de78a3000000000100"}) ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "05f50e931641989ef5fe448af345e951ad613642"}) syz_open_pts() 02:40:18 executing program 1: sysctl$net_inet_ip(&(0x7f0000000380)={0x4, 0x18, 0x33}, 0x9, 0x0, 0x0, 0x0, 0x0) 02:40:18 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f0000000180)=[{0x5}, {0x45}, {0x6, 0x0, 0x0, 0x2000}]}) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000280)="06005d0c07f6777c038271cb7ed8", 0xe}], 0x1) 02:40:18 executing program 1: sysctl$net_inet_ip(&(0x7f0000000380)={0x4, 0x18, 0x33}, 0x9, 0x0, 0x0, 0x0, 0x0) 02:40:18 executing program 3: r0 = getgid() r1 = getuid() semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000280)={{0x2, 0x0, r0, r1, 0x0, 0x4, 0x8101}, 0xf2b2, 0x7fd, 0x8000007}) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0xc) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0xc) r6 = getegid() r7 = socket(0x11, 0x3, 0x0) recvmsg(r7, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x803) sendmsg$unix(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=[@cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, r1, r3}, @cred={0x20, 0xffff, 0x0, r4, r2, r6}, @rights={0x28, 0xffff, 0x1, [0xffffffffffffffff, r7, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, @rights={0x20, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, @rights={0x20, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r7]}, @cred={0x20, 0xffff, 0x0, 0x0, 0x0, r5}, @rights={0x38, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}], 0x100, 0x1}, 0x0) getsockopt$SO_PEERCRED(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0xc) r9 = semget$private(0x0, 0x5, 0x46) r10 = socket(0x18, 0x1, 0x0) getsockopt$SO_PEERCRED(r10, 0xffff, 0x1022, &(0x7f0000000300)={0x0, 0x0}, 0xc) setreuid(r11, 0xee01) r12 = getgid() r13 = getuid() semctl$IPC_SET(r9, 0x0, 0x1, &(0x7f0000000280)={{0x2, r11, r12, r13, 0x0, 0x4, 0x8101}, 0xf2b2, 0x7fd, 0x8000007}) getsockopt$sock_cred(0xffffffffffffff9c, 0xffff, 0x1022, &(0x7f0000000240)={0x0, 0x0, 0x0}, &(0x7f0000000280)=0xc) setgroups(0x7, &(0x7f00000002c0)=[0x0, r5, r8, 0x0, 0x0, r12, r14]) sysctl$net_inet6_ip6(&(0x7f00000000c0)={0x4, 0x18, 0x29, 0x35}, 0x4, &(0x7f0000000100)="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", &(0x7f0000000000)=0xfdea, 0x0, 0x0) 2021/12/23 02:40:30 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: