kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:39:49 PST 2021 OpenBSD/amd64 (ci-openbsd-main-4.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.10.52' (ED25519) to the list of known hosts. 2021/12/23 02:40:03 fuzzer started 2021/12/23 02:40:07 dialing manager at 10.128.15.235:22938 2021/12/23 02:40:07 syscalls: 387 2021/12/23 02:40:07 code coverage: enabled 2021/12/23 02:40:07 comparison tracing: enabled 2021/12/23 02:40:07 extra coverage: enabled 2021/12/23 02:40:07 delay kcov mmap: enabled 2021/12/23 02:40:07 setuid sandbox: enabled 2021/12/23 02:40:07 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:40:07 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:40:07 fault injection: support is not implemented in syzkaller 2021/12/23 02:40:07 leak checking: support is not implemented in syzkaller 2021/12/23 02:40:07 net packet injection: enabled 2021/12/23 02:40:07 net device setup: support is not implemented in syzkaller 2021/12/23 02:40:07 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:40:07 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:40:07 USB emulation: support is not implemented in syzkaller 2021/12/23 02:40:07 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:40:07 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:40:07 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:40:07 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:40:07 fetching corpus: 6, signal 679/4182 (executing program) 2021/12/23 02:40:07 fetching corpus: 6, signal 679/5662 (executing program) 2021/12/23 02:40:07 fetching corpus: 6, signal 679/5662 (executing program) 2021/12/23 02:40:07 starting 6 fuzzer processes 02:40:07 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x80000000000000a, &(0x7f0000000040)="90000000", 0x4) setsockopt(r0, 0x29, 0xa, 0x0, 0x0) 02:40:07 executing program 2: r0 = socket(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8202e687c6"], 0x10) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10}}) setsockopt$sock_int(r0, 0xffff, 0x1023, &(0x7f0000000080)=0x3, 0x3e6) 02:40:07 executing program 0: ktrace(0x0, 0x0, 0x0, 0xffffffffffffffff) 02:40:07 executing program 3: setrlimit(0x8, &(0x7f0000000000)={0x9, 0x93}) r0 = syz_open_pts() close(r0) syz_open_pts() ioctl$TIOCSETAW(r0, 0x80047469, &(0x7f0000001780)={0x34, 0x0, 0x0, 0x0, "1fffff0366dfde36ae61dba64800"}) write(r0, &(0x7f0000000100)="309b6f2fa4699fa310acfd78123b20e4eb77d292a8555e9068f72b9498e15a1477a4770700000000000000fdef369fd8f0627000619707f7cd2cab808a6fa6a0bd72ba8480f2663c", 0x48) 02:40:07 executing program 4: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f0000000040)=[{0x1d}, {0x2d}, {0x6, 0x0, 0x0, 0x180}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) pwrite(r0, &(0x7f0000000240)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0, 0x0) 02:40:07 executing program 5: r0 = socket(0x2, 0x8001, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1, &(0x7f0000000080)=0x1000, 0x4) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040)=0x200000, 0x4) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) shutdown(r0, 0x1) 02:40:07 executing program 0: ktrace(0x0, 0x0, 0x0, 0xffffffffffffffff) 02:40:07 executing program 3: setrlimit(0x8, &(0x7f0000000000)={0x9, 0x93}) r0 = syz_open_pts() close(r0) syz_open_pts() ioctl$TIOCSETAW(r0, 0x80047469, &(0x7f0000001780)={0x34, 0x0, 0x0, 0x0, "1fffff0366dfde36ae61dba64800"}) write(r0, &(0x7f0000000100)="309b6f2fa4699fa310acfd78123b20e4eb77d292a8555e9068f72b9498e15a1477a4770700000000000000fdef369fd8f0627000619707f7cd2cab808a6fa6a0bd72ba8480f2663c", 0x48) 02:40:07 executing program 0: ktrace(0x0, 0x0, 0x0, 0xffffffffffffffff) 02:40:07 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x80000000000000a, &(0x7f0000000040)="90000000", 0x4) setsockopt(r0, 0x29, 0xa, 0x0, 0x0) 02:40:07 executing program 3: setrlimit(0x8, &(0x7f0000000000)={0x9, 0x93}) r0 = syz_open_pts() close(r0) syz_open_pts() ioctl$TIOCSETAW(r0, 0x80047469, &(0x7f0000001780)={0x34, 0x0, 0x0, 0x0, "1fffff0366dfde36ae61dba64800"}) write(r0, &(0x7f0000000100)="309b6f2fa4699fa310acfd78123b20e4eb77d292a8555e9068f72b9498e15a1477a4770700000000000000fdef369fd8f0627000619707f7cd2cab808a6fa6a0bd72ba8480f2663c", 0x48) 02:40:07 executing program 0: ktrace(0x0, 0x0, 0x0, 0xffffffffffffffff) 02:40:07 executing program 3: setrlimit(0x8, &(0x7f0000000000)={0x9, 0x93}) r0 = syz_open_pts() close(r0) syz_open_pts() ioctl$TIOCSETAW(r0, 0x80047469, &(0x7f0000001780)={0x34, 0x0, 0x0, 0x0, "1fffff0366dfde36ae61dba64800"}) write(r0, &(0x7f0000000100)="309b6f2fa4699fa310acfd78123b20e4eb77d292a8555e9068f72b9498e15a1477a4770700000000000000fdef369fd8f0627000619707f7cd2cab808a6fa6a0bd72ba8480f2663c", 0x48) 02:40:08 executing program 2: r0 = socket(0x2, 0x1, 0x0) connect$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="8202e687c6"], 0x10) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10}}) setsockopt$sock_int(r0, 0xffff, 0x1023, &(0x7f0000000080)=0x3, 0x3e6) 02:40:08 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x80000000000000a, &(0x7f0000000040)="90000000", 0x4) setsockopt(r0, 0x29, 0xa, 0x0, 0x0) 02:40:08 executing program 0: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0x80000000000000a, &(0x7f0000000040)="90000000", 0x4) setsockopt(r0, 0x29, 0xa, 0x0, 0x0) 2021/12/23 02:40:19 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory) login: