kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:41:10 PST 2021 OpenBSD/amd64 (ci-openbsd-multicore-6.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.10.38' (ED25519) to the list of known hosts. 2021/12/23 02:41:20 fuzzer started 2021/12/23 02:41:23 dialing manager at 10.128.15.235:42845 2021/12/23 02:41:23 syscalls: 387 2021/12/23 02:41:23 code coverage: enabled 2021/12/23 02:41:23 comparison tracing: enabled 2021/12/23 02:41:23 extra coverage: enabled 2021/12/23 02:41:23 delay kcov mmap: enabled 2021/12/23 02:41:23 setuid sandbox: enabled 2021/12/23 02:41:23 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:41:23 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:41:23 fault injection: support is not implemented in syzkaller 2021/12/23 02:41:23 leak checking: support is not implemented in syzkaller 2021/12/23 02:41:23 net packet injection: enabled 2021/12/23 02:41:23 net device setup: support is not implemented in syzkaller 2021/12/23 02:41:23 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:41:23 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:41:23 USB emulation: support is not implemented in syzkaller 2021/12/23 02:41:23 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:41:23 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:41:23 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:41:23 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:41:23 fetching corpus: 28, signal 3593/6121 (executing program) 2021/12/23 02:41:23 fetching corpus: 28, signal 3593/7400 (executing program) 2021/12/23 02:41:23 fetching corpus: 28, signal 3593/8628 (executing program) 2021/12/23 02:41:23 fetching corpus: 28, signal 3593/9705 (executing program) 2021/12/23 02:41:23 fetching corpus: 28, signal 3593/9705 (executing program) 2021/12/23 02:41:23 starting 6 fuzzer processes 02:41:23 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x15, 0x0, 0x0) 02:41:23 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x281, 0x0) mmap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0, 0x0) mprotect(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ff1000/0xf000)=nil, 0xf000) 02:41:23 executing program 2: r0 = socket(0x11, 0x3, 0x0) sendto$unix(r0, &(0x7f00000000c0)="b100050460000000000008000501000000000000cea1fea7fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00e4c8b2ca3ebbc257699a1f132e278cb5d60200af7d026ba8af63ff37282902e4fd89720fd3872babfbb770c1f5a872c881bf7cc53c894303b22f310b404f36ba5f90006ee01be657aea8c5fd6f0d9cf049c0a00384020208a371a3f8000400000000000000010000000000090000", 0xb1, 0x0, 0x0, 0x0) r1 = semget$private(0x0, 0x2, 0x0) semctl$GETPID(r1, 0x2, 0x4, &(0x7f00000001c0)=""/248) 02:41:23 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)={{}, {[], [], [], [], [{}, {}, {0x0, 0x0, 0x40000003}]}}}) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x6) r1 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIOASYNC(r1, 0xcd60441a, &(0x7f0000000240)=0x2) 02:41:23 executing program 4: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0xb1}, {0x14}, {0x6, 0x0, 0x0, 0xf4}]}) pwrite(r0, &(0x7f0000000280)="4f00000087000000721e1f7dfa6e", 0xe, 0x0, 0x0) 02:41:24 executing program 5: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000b, &(0x7f0000000680)='\x00', 0x1) setsockopt$inet_opts(r0, 0x0, 0x2000000000009, &(0x7f0000000040)="73a11666a5abc354", 0x8) 02:41:24 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x15, 0x0, 0x0) 02:41:24 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x281, 0x0) mmap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0, 0x0) mprotect(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ff1000/0xf000)=nil, 0xf000) 02:41:24 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x15, 0x0, 0x0) 02:41:24 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)={{}, {[], [], [], [], [{}, {}, {0x0, 0x0, 0x40000003}]}}}) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x6) r1 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIOASYNC(r1, 0xcd60441a, &(0x7f0000000240)=0x2) 02:41:24 executing program 2: r0 = socket(0x11, 0x3, 0x0) sendto$unix(r0, &(0x7f00000000c0)="b100050460000000000008000501000000000000cea1fea7fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00e4c8b2ca3ebbc257699a1f132e278cb5d60200af7d026ba8af63ff37282902e4fd89720fd3872babfbb770c1f5a872c881bf7cc53c894303b22f310b404f36ba5f90006ee01be657aea8c5fd6f0d9cf049c0a00384020208a371a3f8000400000000000000010000000000090000", 0xb1, 0x0, 0x0, 0x0) r1 = semget$private(0x0, 0x2, 0x0) semctl$GETPID(r1, 0x2, 0x4, &(0x7f00000001c0)=""/248) 02:41:24 executing program 0: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt(r0, 0x0, 0x15, 0x0, 0x0) 02:41:24 executing program 1: r0 = open(&(0x7f0000000000)='./file0\x00', 0x281, 0x0) mmap(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x4, 0x10, r0, 0x0, 0x0) mprotect(&(0x7f0000ff5000/0x1000)=nil, 0x1000, 0x0) mlock(&(0x7f0000ff1000/0xf000)=nil, 0xf000) 02:41:24 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)={{}, {[], [], [], [], [{}, {}, {0x0, 0x0, 0x40000003}]}}}) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x6) r1 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIOASYNC(r1, 0xcd60441a, &(0x7f0000000240)=0x2) 02:41:24 executing program 2: r0 = socket(0x11, 0x3, 0x0) sendto$unix(r0, &(0x7f00000000c0)="b100050460000000000008000501000000000000cea1fea7fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00e4c8b2ca3ebbc257699a1f132e278cb5d60200af7d026ba8af63ff37282902e4fd89720fd3872babfbb770c1f5a872c881bf7cc53c894303b22f310b404f36ba5f90006ee01be657aea8c5fd6f0d9cf049c0a00384020208a371a3f8000400000000000000010000000000090000", 0xb1, 0x0, 0x0, 0x0) r1 = semget$private(0x0, 0x2, 0x0) semctl$GETPID(r1, 0x2, 0x4, &(0x7f00000001c0)=""/248) 02:41:24 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000c40)={{}, {[], [], [], [], [{}, {}, {0x0, 0x0, 0x40000003}]}}}) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x6) r1 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIOASYNC(r1, 0xcd60441a, &(0x7f0000000240)=0x2) 2021/12/23 02:41:36 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: