kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:39:13 PST 2021 OpenBSD/amd64 (ci-openbsd-main-3.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.54' (ED25519) to the list of known hosts. 2021/12/23 02:39:25 fuzzer started 2021/12/23 02:39:28 dialing manager at 10.128.15.235:22938 2021/12/23 02:39:28 syscalls: 387 2021/12/23 02:39:28 code coverage: enabled 2021/12/23 02:39:28 comparison tracing: enabled 2021/12/23 02:39:28 extra coverage: enabled 2021/12/23 02:39:28 delay kcov mmap: enabled 2021/12/23 02:39:28 setuid sandbox: enabled 2021/12/23 02:39:28 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:39:28 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:39:28 fault injection: support is not implemented in syzkaller 2021/12/23 02:39:28 leak checking: support is not implemented in syzkaller 2021/12/23 02:39:28 net packet injection: enabled 2021/12/23 02:39:28 net device setup: support is not implemented in syzkaller 2021/12/23 02:39:28 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:39:28 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:39:28 USB emulation: support is not implemented in syzkaller 2021/12/23 02:39:28 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:39:28 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:39:28 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:39:28 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:39:28 fetching corpus: 4, signal 507/4142 (executing program) 2021/12/23 02:39:28 fetching corpus: 4, signal 507/5435 (executing program) 2021/12/23 02:39:28 fetching corpus: 4, signal 507/5435 (executing program) 2021/12/23 02:39:28 starting 6 fuzzer processes 02:39:28 executing program 0: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0xee) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x2, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$TIOCFLUSH(r4, 0x802069c7, &(0x7f0000000300)) 02:39:28 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@rights={0x10}, @cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @rights={0x30, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, @cred={0x20}, @rights={0x20, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}], 0xa0}, 0x0) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x111, 0x0) ioctl$VMM_IOC_WRITEREGS(r0, 0xc4504442, &(0x7f0000000280)) 02:39:28 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x2) 02:39:28 executing program 3: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x2000, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "1dda410cef36499dc809030aaf58d991cc06d0f7", 0x1}) 02:39:28 executing program 4: r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r0, 0x80105728, &(0x7f0000000080)={&(0x7f0000000040)=[{0x2}, {0x26}, {}], 0x3}) 02:39:28 executing program 5: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f0000000000)={0x2, &(0x7f0000000080)=[{}, {0x42c, 0x1f, 0x5}]}) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB='+'], 0x1) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r1 = socket(0x18, 0x1, 0x0) close(r1) r2 = socket(0x18, 0x2, 0x0) close(r2) socket(0x400000000018, 0x3, 0x3a) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r2, &(0x7f0000000040)="100a2956b9223776", 0x21d) 02:39:28 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@rights={0x10}, @cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @rights={0x30, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, @cred={0x20}, @rights={0x20, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}], 0xa0}, 0x0) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x111, 0x0) ioctl$VMM_IOC_WRITEREGS(r0, 0xc4504442, &(0x7f0000000280)) 02:39:28 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x2) 02:39:28 executing program 3: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x2000, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "1dda410cef36499dc809030aaf58d991cc06d0f7", 0x1}) 02:39:28 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@rights={0x10}, @cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @rights={0x30, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, @cred={0x20}, @rights={0x20, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}], 0xa0}, 0x0) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x111, 0x0) ioctl$VMM_IOC_WRITEREGS(r0, 0xc4504442, &(0x7f0000000280)) 02:39:28 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x2) 02:39:28 executing program 3: mknod$loop(&(0x7f0000000300)='./file0\x00', 0x2000, 0xffffffffffffffff) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "1dda410cef36499dc809030aaf58d991cc06d0f7", 0x1}) 02:39:28 executing program 0: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0xee) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x2, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$TIOCFLUSH(r4, 0x802069c7, &(0x7f0000000300)) 02:39:28 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000600)=[@rights={0x10}, @cred={0x20, 0xffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff}, @rights={0x30, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}, @cred={0x20}, @rights={0x20, 0xffff, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}], 0xa0}, 0x0) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x111, 0x0) ioctl$VMM_IOC_WRITEREGS(r0, 0xc4504442, &(0x7f0000000280)) 02:39:28 executing program 2: r0 = socket$inet(0x2, 0x1, 0x0) shutdown(r0, 0x2) 02:39:28 executing program 1: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0xee) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x2, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$TIOCFLUSH(r4, 0x802069c7, &(0x7f0000000300)) 2021/12/23 02:39:39 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: