kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:38:41 PST 2021 OpenBSD/amd64 (ci-openbsd-main-0.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.27' (ED25519) to the list of known hosts. 2021/12/23 02:38:53 fuzzer started 2021/12/23 02:38:56 dialing manager at 10.128.15.235:22938 2021/12/23 02:38:56 checking machine... 2021/12/23 02:38:56 checking revisions... 2021/12/23 02:38:56 testing simple program... 2021/12/23 02:38:57 building call list... 2021/12/23 02:38:57 syscalls: 387 2021/12/23 02:38:57 code coverage: enabled 2021/12/23 02:38:57 comparison tracing: enabled 2021/12/23 02:38:57 extra coverage: enabled 2021/12/23 02:38:57 delay kcov mmap: enabled 2021/12/23 02:38:57 setuid sandbox: enabled 2021/12/23 02:38:57 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:38:57 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:38:57 fault injection: support is not implemented in syzkaller 2021/12/23 02:38:57 leak checking: support is not implemented in syzkaller 2021/12/23 02:38:57 net packet injection: enabled 2021/12/23 02:38:57 net device setup: support is not implemented in syzkaller 2021/12/23 02:38:57 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:38:57 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:38:57 USB emulation: support is not implemented in syzkaller 2021/12/23 02:38:57 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:38:57 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:38:57 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:38:57 fetching corpus: 0, signal 0/0 (executing program) 2021/12/23 02:38:57 fetching corpus: 0, signal 0/0 (executing program) 2021/12/23 02:38:57 starting 6 fuzzer processes 02:38:57 executing program 4: r0 = socket$inet6(0x11, 0x3, 0x0) sendto(r0, &(0x7f0000000000)="a919cb2d", 0x4, 0x0, 0x0, 0x0) 02:38:57 executing program 0: r0 = kqueue() ioctl$VMM_IOC_RESETCPU(0xffffffffffffffff, 0x82405605, &(0x7f0000000400)={0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0xc8, 0x7fffffff]}}) kevent(r0, &(0x7f0000000080), 0x800, 0x0, 0x1002, 0x0) kevent(r0, 0x0, 0x0, &(0x7f0000000100), 0x2, 0x0) 02:38:57 executing program 1: setrlimit(0x8, &(0x7f0000000000)={0x7, 0x95}) r0 = syz_open_pts() close(r0) r1 = syz_open_pts() ioctl$TIOCSETAW(r1, 0x802c7415, &(0x7f00000000c0)={0x0, 0x5, 0x2007, 0xffffffb0, "91903fffa80a00000000cafb00"}) write(r0, &(0x7f0000000100)="4da3055a267756ad507002055f88e013c6a6ff1214f557ef58d989bc245536d95e648ad9caf6b61728a05e3d9d56ecb214f96ea905747770bf7ed41a0ddf39370970edf8ee81c74dd4ca256b83030000000000000000b16a432b467ff86ed373b20d1a15cfdbbb140746e2bfe4e9442ef5f9115214c997eb462403400b6386d13c571021c04d6087209317c8748c5c0f9588a453f6538f61bfd554fe70555378264ada7109a8ad605f54063fd6fe081ef51e481650a12e06f44ca629dce9e1c01c9792c538e0517f781cdd9b1bdd46ec23fb57ba056e36c677670a", 0xdb) 02:38:57 executing program 2: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000001740)=""/4096, 0x1000) read(r0, &(0x7f0000000200)=""/129, 0x81) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r3, 0x4, 0x80) pwritev(r3, &(0x7f00000003c0), 0x273, 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x0, 0x0) write(r1, &(0x7f0000000100)='w', 0x1) execve(0x0, 0x0, 0x0) writev(r1, &(0x7f0000000000)=[{&(0x7f00000002c0)='k', 0x1}], 0x1) 02:38:57 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000100)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x10001, 0x0, 0x0, 0x8000000000001f}, {0x3c}, {0x81}, {0x4406}]}) syz_emit_ethernet(0xe, &(0x7f0000000140)={@remote}) 02:38:57 executing program 5: syz_emit_ethernet(0x4e, &(0x7f0000002ac0)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, '\b \x00', 0x18, 0x3a, 0xff, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @mcast2}}}}}}) 02:38:57 executing program 0: r0 = kqueue() ioctl$VMM_IOC_RESETCPU(0xffffffffffffffff, 0x82405605, &(0x7f0000000400)={0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0xc8, 0x7fffffff]}}) kevent(r0, &(0x7f0000000080), 0x800, 0x0, 0x1002, 0x0) kevent(r0, 0x0, 0x0, &(0x7f0000000100), 0x2, 0x0) 02:38:57 executing program 1: setrlimit(0x8, &(0x7f0000000000)={0x7, 0x95}) r0 = syz_open_pts() close(r0) r1 = syz_open_pts() ioctl$TIOCSETAW(r1, 0x802c7415, &(0x7f00000000c0)={0x0, 0x5, 0x2007, 0xffffffb0, "91903fffa80a00000000cafb00"}) write(r0, &(0x7f0000000100)="4da3055a267756ad507002055f88e013c6a6ff1214f557ef58d989bc245536d95e648ad9caf6b61728a05e3d9d56ecb214f96ea905747770bf7ed41a0ddf39370970edf8ee81c74dd4ca256b83030000000000000000b16a432b467ff86ed373b20d1a15cfdbbb140746e2bfe4e9442ef5f9115214c997eb462403400b6386d13c571021c04d6087209317c8748c5c0f9588a453f6538f61bfd554fe70555378264ada7109a8ad605f54063fd6fe081ef51e481650a12e06f44ca629dce9e1c01c9792c538e0517f781cdd9b1bdd46ec23fb57ba056e36c677670a", 0xdb) 02:38:57 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000100)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x10001, 0x0, 0x0, 0x8000000000001f}, {0x3c}, {0x81}, {0x4406}]}) syz_emit_ethernet(0xe, &(0x7f0000000140)={@remote}) 02:38:57 executing program 0: r0 = kqueue() ioctl$VMM_IOC_RESETCPU(0xffffffffffffffff, 0x82405605, &(0x7f0000000400)={0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0xc8, 0x7fffffff]}}) kevent(r0, &(0x7f0000000080), 0x800, 0x0, 0x1002, 0x0) kevent(r0, 0x0, 0x0, &(0x7f0000000100), 0x2, 0x0) 02:38:57 executing program 1: setrlimit(0x8, &(0x7f0000000000)={0x7, 0x95}) r0 = syz_open_pts() close(r0) r1 = syz_open_pts() ioctl$TIOCSETAW(r1, 0x802c7415, &(0x7f00000000c0)={0x0, 0x5, 0x2007, 0xffffffb0, "91903fffa80a00000000cafb00"}) write(r0, &(0x7f0000000100)="4da3055a267756ad507002055f88e013c6a6ff1214f557ef58d989bc245536d95e648ad9caf6b61728a05e3d9d56ecb214f96ea905747770bf7ed41a0ddf39370970edf8ee81c74dd4ca256b83030000000000000000b16a432b467ff86ed373b20d1a15cfdbbb140746e2bfe4e9442ef5f9115214c997eb462403400b6386d13c571021c04d6087209317c8748c5c0f9588a453f6538f61bfd554fe70555378264ada7109a8ad605f54063fd6fe081ef51e481650a12e06f44ca629dce9e1c01c9792c538e0517f781cdd9b1bdd46ec23fb57ba056e36c677670a", 0xdb) 02:38:57 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000100)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x4, &(0x7f0000000000)=[{0x10001, 0x0, 0x0, 0x8000000000001f}, {0x3c}, {0x81}, {0x4406}]}) syz_emit_ethernet(0xe, &(0x7f0000000140)={@remote}) 2021/12/23 02:39:09 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory) login: