kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:40:30 PST 2021 OpenBSD/amd64 (ci-openbsd-multicore-1.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.199' (ED25519) to the list of known hosts. 2021/12/23 02:40:43 fuzzer started 2021/12/23 02:40:45 dialing manager at 10.128.15.235:42845 2021/12/23 02:40:45 syscalls: 387 2021/12/23 02:40:45 code coverage: enabled 2021/12/23 02:40:45 comparison tracing: enabled 2021/12/23 02:40:45 extra coverage: enabled 2021/12/23 02:40:45 delay kcov mmap: enabled 2021/12/23 02:40:45 setuid sandbox: enabled 2021/12/23 02:40:45 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:40:45 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:40:45 fault injection: support is not implemented in syzkaller 2021/12/23 02:40:45 leak checking: support is not implemented in syzkaller 2021/12/23 02:40:45 net packet injection: enabled 2021/12/23 02:40:45 net device setup: support is not implemented in syzkaller 2021/12/23 02:40:45 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:40:45 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:40:45 USB emulation: support is not implemented in syzkaller 2021/12/23 02:40:45 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:40:45 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:40:45 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:40:45 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:40:45 fetching corpus: 18, signal 3183/5791 (executing program) 2021/12/23 02:40:45 fetching corpus: 18, signal 3183/7120 (executing program) 2021/12/23 02:40:45 fetching corpus: 18, signal 3183/8388 (executing program) 2021/12/23 02:40:45 fetching corpus: 18, signal 3183/9020 (executing program) 2021/12/23 02:40:45 fetching corpus: 18, signal 3183/9020 (executing program) 2021/12/23 02:40:45 starting 6 fuzzer processes 02:40:45 executing program 0: sysctl$net_inet_ip(&(0x7f00000011c0)={0x4, 0x2, 0x0, 0x19}, 0x4, 0x0, 0x0, 0x0, 0x0) 02:40:45 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x8010, r0, 0x0, 0x0) 02:40:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000ffff000001"], 0x9}, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10}, 0x0) 02:40:45 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 02:40:45 executing program 5: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0xee) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x11, 0x3, 0x0) r3 = fcntl$dupfd(r0, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x81206919, &(0x7f0000000300)) 02:40:45 executing program 4: ioctl$VMM_IOC_RESETCPU(0xffffffffffffffff, 0x82405605, &(0x7f00000002c0)={0x0, 0x0, {[], [], [], [], [{}, {}, {}, {0x0, 0x0, 0x7323}]}}) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0xa, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='8\x00\x00\x00)\x00\x00\x00.'], 0x38}, 0x0) r0 = socket(0x18, 0x8002, 0x0) sendmsg$unix(r0, &(0x7f0000000580)={&(0x7f0000000000)=ANY=[], 0xa, 0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB='$'], 0x38}, 0x0) 02:40:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000ffff000001"], 0x9}, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10}, 0x0) 02:40:45 executing program 0: sysctl$net_inet_ip(&(0x7f00000011c0)={0x4, 0x2, 0x0, 0x19}, 0x4, 0x0, 0x0, 0x0, 0x0) 02:40:45 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 02:40:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000ffff000001"], 0x9}, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10}, 0x0) 02:40:45 executing program 0: sysctl$net_inet_ip(&(0x7f00000011c0)={0x4, 0x2, 0x0, 0x19}, 0x4, 0x0, 0x0, 0x0, 0x0) 02:40:45 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 02:40:46 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r1, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="10000000ffff000001"], 0x9}, 0x0) sendmsg(r0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x10}, 0x0) 02:40:46 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x0, 0x8010, r0, 0x0, 0x0) 02:40:46 executing program 0: sysctl$net_inet_ip(&(0x7f00000011c0)={0x4, 0x2, 0x0, 0x19}, 0x4, 0x0, 0x0, 0x0, 0x0) 02:40:46 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x1022, 0x0, 0x0) 2021/12/23 02:40:57 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory) login: