creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. /etc/rc.local[5]: syntax error: `(' unexpected starting local daemons:. Fri Jan 14 03:28:18 PST 2022 OpenBSD/amd64 (worker.my.domain) (tty00) Warning: Permanently added '10.128.0.31' (ED25519) to the list of known hosts. 2022/01/14 03:28:31 fuzzer started 2022/01/14 03:28:35 dialing manager at 10.128.15.235:38506 2022/01/14 03:28:35 syscalls: 387 2022/01/14 03:28:35 code coverage: enabled 2022/01/14 03:28:35 comparison tracing: enabled 2022/01/14 03:28:35 extra coverage: enabled 2022/01/14 03:28:35 delay kcov mmap: enabled 2022/01/14 03:28:35 setuid sandbox: enabled 2022/01/14 03:28:35 namespace sandbox: support is not implemented in syzkaller 2022/01/14 03:28:35 Android sandbox: support is not implemented in syzkaller 2022/01/14 03:28:35 fault injection: support is not implemented in syzkaller 2022/01/14 03:28:35 leak checking: support is not implemented in syzkaller 2022/01/14 03:28:35 net packet injection: enabled 2022/01/14 03:28:35 net device setup: support is not implemented in syzkaller 2022/01/14 03:28:35 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 03:28:35 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 03:28:35 USB emulation: support is not implemented in syzkaller 2022/01/14 03:28:35 hci packet injection: support is not implemented in syzkaller 2022/01/14 03:28:35 wifi device emulation: support is not implemented in syzkaller 2022/01/14 03:28:35 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 03:28:35 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 03:28:35 fetching corpus: 21, signal 2673/5440 (executing program) 2022/01/14 03:28:35 fetching corpus: 21, signal 2673/6809 (executing program) 2022/01/14 03:28:35 fetching corpus: 21, signal 2673/8196 (executing program) 2022/01/14 03:28:35 fetching corpus: 21, signal 2673/8596 (executing program) 2022/01/14 03:28:35 fetching corpus: 21, signal 2673/8596 (executing program) 2022/01/14 03:28:35 starting 8 fuzzer processes 03:28:35 executing program 0: r0 = socket$inet(0x18, 0x3, 0x0) getsockopt$inet_opts(r0, 0x3a, 0x12, 0x0, 0x0) 03:28:35 executing program 1: mknod(&(0x7f0000000040)='./file0\x00', 0x1ffb, 0x0) r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$VNDIOCSET(r0, 0xc0384600, &(0x7f0000000440)={&(0x7f00000003c0)='./file0\x00', 0x7, 0x0}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00') unveil(&(0x7f0000000180)='./file1\x00', &(0x7f0000000240)='x\x00') unveil(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='r\x00') execve(0x0, 0x0, 0x0) 03:28:35 executing program 2: r0 = socket(0x18, 0x400000002, 0x0) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x3}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) close(r0) r1 = socket(0x18, 0x2, 0x0) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) setsockopt(r0, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) 03:28:35 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000000c0)="5f5c9a2fee17b00bfff539a803ad9c82c0645bf6be6561db3920859dc34117f5070fa5a46c51afe34683ab07f3bb895d958044ea8b0f236526dc5bba7a27914671c2fdca84b6132f9d661740e2e493f1e7a095cba7498b818d613053589fd6f79c6169a5ad981d775fe126fa7711642228c0f03b7328c2d2ac73e72e780fbc744c80083ec86cffaa6d124e36dbc129f4f01b1207176a0c42f2fd0c78b4d0f7098924d0b88c2398a1d88cb2ca338a5fe3a4ac5ae757ae2cd2e694fd516b43c2eb", 0xc0}], 0x1}, 0x0) ioctl$FIOASYNC(r0, 0xc1084425, &(0x7f0000000080)) 03:28:35 executing program 4: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x80}, {0x5c}, {0x6, 0x0, 0x0, 0x54e}]}) pwrite(r0, &(0x7f0000000540)="4686f8eabd63a39675809d763f3a", 0xe, 0x0) 03:28:35 executing program 5: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$FIOASYNC(r0, 0xc450444a, &(0x7f0000000000)) 03:28:35 executing program 7: ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) r0 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r0, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1}, 0xc) r1 = socket(0x18, 0x2, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$VMM_IOC_RUN(r2, 0xc028756b, &(0x7f0000000000)={0x4, 0x0, 0x0, 0x0, 0x0}) 03:28:35 executing program 6: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{0x80}, {0x3d}, {0x6, 0x0, 0x0, 0x100}]}) pwrite(r0, &(0x7f00000000c0)="4a69cd0a1292bcde4372aaa52440", 0xe, 0x0) 03:28:35 executing program 0: r0 = socket$inet(0x18, 0x3, 0x0) getsockopt$inet_opts(r0, 0x3a, 0x12, 0x0, 0x0) 03:28:35 executing program 0: r0 = socket$inet(0x18, 0x3, 0x0) getsockopt$inet_opts(r0, 0x3a, 0x12, 0x0, 0x0) 03:28:35 executing program 0: r0 = socket$inet(0x18, 0x3, 0x0) getsockopt$inet_opts(r0, 0x3a, 0x12, 0x0, 0x0) 03:28:36 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x80002007, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x10702, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="000000186204018b002b06000000267e890053b5d1d090753dd40900a24e14da00af846ddacb33d8f3000000e1838f74a2e84567f810efc950550ca7f9a86a652d62e159c51bad5a8bf626d9dea3c20000000000000000", 0x84b}], 0x1) ioctl$TIOCDRAIN(r0, 0x2000745e) execve(0x0, 0x0, 0x0) 03:28:36 executing program 2: r0 = socket(0x18, 0x400000002, 0x0) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x3}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) close(r0) r1 = socket(0x18, 0x2, 0x0) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) setsockopt(r0, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) 03:28:36 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x80002007, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x10702, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="000000186204018b002b06000000267e890053b5d1d090753dd40900a24e14da00af846ddacb33d8f3000000e1838f74a2e84567f810efc950550ca7f9a86a652d62e159c51bad5a8bf626d9dea3c20000000000000000", 0x84b}], 0x1) ioctl$TIOCDRAIN(r0, 0x2000745e) execve(0x0, 0x0, 0x0) 03:28:36 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000000c0)="5f5c9a2fee17b00bfff539a803ad9c82c0645bf6be6561db3920859dc34117f5070fa5a46c51afe34683ab07f3bb895d958044ea8b0f236526dc5bba7a27914671c2fdca84b6132f9d661740e2e493f1e7a095cba7498b818d613053589fd6f79c6169a5ad981d775fe126fa7711642228c0f03b7328c2d2ac73e72e780fbc744c80083ec86cffaa6d124e36dbc129f4f01b1207176a0c42f2fd0c78b4d0f7098924d0b88c2398a1d88cb2ca338a5fe3a4ac5ae757ae2cd2e694fd516b43c2eb", 0xc0}], 0x1}, 0x0) ioctl$FIOASYNC(r0, 0xc1084425, &(0x7f0000000080)) 03:28:36 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000000c0)="5f5c9a2fee17b00bfff539a803ad9c82c0645bf6be6561db3920859dc34117f5070fa5a46c51afe34683ab07f3bb895d958044ea8b0f236526dc5bba7a27914671c2fdca84b6132f9d661740e2e493f1e7a095cba7498b818d613053589fd6f79c6169a5ad981d775fe126fa7711642228c0f03b7328c2d2ac73e72e780fbc744c80083ec86cffaa6d124e36dbc129f4f01b1207176a0c42f2fd0c78b4d0f7098924d0b88c2398a1d88cb2ca338a5fe3a4ac5ae757ae2cd2e694fd516b43c2eb", 0xc0}], 0x1}, 0x0) ioctl$FIOASYNC(r0, 0xc1084425, &(0x7f0000000080)) 03:28:36 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x80002007, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x10702, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)="000000186204018b002b06000000267e890053b5d1d090753dd40900a24e14da00af846ddacb33d8f3000000e1838f74a2e84567f810efc950550ca7f9a86a652d62e159c51bad5a8bf626d9dea3c20000000000000000", 0x84b}], 0x1) ioctl$TIOCDRAIN(r0, 0x2000745e) execve(0x0, 0x0, 0x0) 03:28:36 executing program 1: mknod(&(0x7f0000000040)='./file0\x00', 0x1ffb, 0x0) r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$VNDIOCSET(r0, 0xc0384600, &(0x7f0000000440)={&(0x7f00000003c0)='./file0\x00', 0x7, 0x0}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00') unveil(&(0x7f0000000180)='./file1\x00', &(0x7f0000000240)='x\x00') unveil(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='r\x00') execve(0x0, 0x0, 0x0) 03:28:36 executing program 2: r0 = socket(0x18, 0x400000002, 0x0) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x3}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) close(r0) r1 = socket(0x18, 0x2, 0x0) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) setsockopt(r0, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) 03:28:36 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f00000000c0)="5f5c9a2fee17b00bfff539a803ad9c82c0645bf6be6561db3920859dc34117f5070fa5a46c51afe34683ab07f3bb895d958044ea8b0f236526dc5bba7a27914671c2fdca84b6132f9d661740e2e493f1e7a095cba7498b818d613053589fd6f79c6169a5ad981d775fe126fa7711642228c0f03b7328c2d2ac73e72e780fbc744c80083ec86cffaa6d124e36dbc129f4f01b1207176a0c42f2fd0c78b4d0f7098924d0b88c2398a1d88cb2ca338a5fe3a4ac5ae757ae2cd2e694fd516b43c2eb", 0xc0}], 0x1}, 0x0) ioctl$FIOASYNC(r0, 0xc1084425, &(0x7f0000000080)) 2022/01/14 03:28:47 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: b+&~SАu= Nm3჏tEgPU je-bYZ&ޣb+&~SАu= Nm3჏tEgPU je-bYZ&ޣb+&~SАu= Nm3჏tEgPU je-bYZ&ޣ