kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:40:32 PST 2021 OpenBSD/amd64 (ci-openbsd-main-1.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.53' (ED25519) to the list of known hosts. 2021/12/23 02:40:44 fuzzer started 2021/12/23 02:40:46 dialing manager at 10.128.15.235:22938 2021/12/23 02:40:46 syscalls: 387 2021/12/23 02:40:46 code coverage: enabled 2021/12/23 02:40:46 comparison tracing: enabled 2021/12/23 02:40:46 extra coverage: enabled 2021/12/23 02:40:46 delay kcov mmap: enabled 2021/12/23 02:40:46 setuid sandbox: enabled 2021/12/23 02:40:46 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:40:46 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:40:46 fault injection: support is not implemented in syzkaller 2021/12/23 02:40:46 leak checking: support is not implemented in syzkaller 2021/12/23 02:40:46 net packet injection: enabled 2021/12/23 02:40:46 net device setup: support is not implemented in syzkaller 2021/12/23 02:40:46 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:40:46 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:40:46 USB emulation: support is not implemented in syzkaller 2021/12/23 02:40:46 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:40:46 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:40:46 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:40:46 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:40:46 fetching corpus: 13, signal 1197/4541 (executing program) 2021/12/23 02:40:46 fetching corpus: 13, signal 1197/6206 (executing program) 2021/12/23 02:40:46 fetching corpus: 13, signal 1197/6479 (executing program) 2021/12/23 02:40:46 fetching corpus: 13, signal 1197/6479 (executing program) 2021/12/23 02:40:46 starting 6 fuzzer processes 02:40:46 executing program 1: r0 = socket(0x2, 0x8001, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040)=0x200000, 0x4) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) shutdown(r0, 0x1) 02:40:46 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @random="45f7b676ee0e", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr}, @icmp=@dest_unreach={0x3, 0xb, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x0}, @broadcast}}}}}}) 02:40:46 executing program 5: setrlimit(0x8, &(0x7f0000000040)={0x30, 0x95}) r0 = syz_open_pts() close(r0) r1 = syz_open_pts() ioctl$TIOCSTOP(r1, 0x2000746f) ioctl$TIOCSETAW(r1, 0x802c7415, &(0x7f0000000140)={0x0, 0x45, 0x401, 0xd, "cf85ba00009972b43165cd84f300"}) write(r0, &(0x7f0000001200)='\r', 0x1) 02:40:46 executing program 2: ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)={{}, {[], [], [], [], [{0x0, 0x0, 0xffffffff}, {}, {0x4}]}}}) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x6) r1 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIOASYNC(r1, 0xcd60441a, &(0x7f0000000240)=0x2) 02:40:46 executing program 3: sysctl$net_inet6_icmp6(&(0x7f0000000040)={0x4, 0x18, 0x3a, 0xf}, 0x4, &(0x7f0000000080)="0245b471", &(0x7f00000000c0)=0x4, &(0x7f0000000100)="9652ac98", 0x4) 02:40:46 executing program 4: sysctl$net_inet_carp(&(0x7f0000002200)={0x4, 0x2, 0x6c, 0x2}, 0x4, 0x0, 0x0, 0x0, 0x0) 02:40:46 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @random="45f7b676ee0e", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr}, @icmp=@dest_unreach={0x3, 0xb, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x0}, @broadcast}}}}}}) 02:40:46 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @random="45f7b676ee0e", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr}, @icmp=@dest_unreach={0x3, 0xb, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x0}, @broadcast}}}}}}) 02:40:46 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @random="45f7b676ee0e", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr}, @icmp=@dest_unreach={0x3, 0xb, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x0}, @broadcast}}}}}}) 02:40:46 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) r1 = socket(0x2, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r2, 0xc0106924, &(0x7f00000000c0)=0x6e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) 02:40:46 executing program 3: sysctl$net_inet6_icmp6(&(0x7f0000000040)={0x4, 0x18, 0x3a, 0xf}, 0x4, &(0x7f0000000080)="0245b471", &(0x7f00000000c0)=0x4, &(0x7f0000000100)="9652ac98", 0x4) 02:40:46 executing program 2: ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000bc0)={{}, {[], [], [], [], [{0x0, 0x0, 0xffffffff}, {}, {0x4}]}}}) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x6) r1 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIOASYNC(r1, 0xcd60441a, &(0x7f0000000240)=0x2) 02:40:46 executing program 1: r0 = socket(0x2, 0x8001, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000040)=0x200000, 0x4) connect$unix(r0, &(0x7f0000000000)=@file={0xbd5699bc1ec0282, './file0\x00'}, 0x10) shutdown(r0, 0x1) 02:40:46 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000040)}) r1 = socket(0x2, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r2, 0xc0106924, &(0x7f00000000c0)=0x6e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) 2021/12/23 02:40:58 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory) login: