kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Thu Dec 23 02:40:01 PST 2021 OpenBSD/amd64 (ci-openbsd-multicore-4.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.10.60' (ED25519) to the list of known hosts. 2021/12/23 02:40:15 fuzzer started 2021/12/23 02:40:17 dialing manager at 10.128.15.235:42845 2021/12/23 02:40:17 syscalls: 387 2021/12/23 02:40:17 code coverage: enabled 2021/12/23 02:40:17 comparison tracing: enabled 2021/12/23 02:40:17 extra coverage: enabled 2021/12/23 02:40:17 delay kcov mmap: enabled 2021/12/23 02:40:17 setuid sandbox: enabled 2021/12/23 02:40:17 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:40:17 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:40:17 fault injection: support is not implemented in syzkaller 2021/12/23 02:40:17 leak checking: support is not implemented in syzkaller 2021/12/23 02:40:17 net packet injection: enabled 2021/12/23 02:40:17 net device setup: support is not implemented in syzkaller 2021/12/23 02:40:17 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:40:17 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:40:17 USB emulation: support is not implemented in syzkaller 2021/12/23 02:40:17 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:40:17 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:40:17 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:40:17 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:40:17 fetching corpus: 13, signal 1997/4911 (executing program) 2021/12/23 02:40:17 fetching corpus: 13, signal 1997/6391 (executing program) 2021/12/23 02:40:17 fetching corpus: 13, signal 1997/7404 (executing program) 2021/12/23 02:40:17 fetching corpus: 13, signal 1997/7404 (executing program) 2021/12/23 02:40:17 starting 6 fuzzer processes 02:40:17 executing program 0: openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x10c81, 0x0) 02:40:17 executing program 1: sysctl$kern(&(0x7f0000000080), 0xa, &(0x7f00000000c0)="0cd77b691eaa2a851910c1a6a112bffa69ec4cf65d59d011c45da7f14bc0c47a3db7ded5c220cb39cf860f8a779a1838e24d5639d9ba2c4609ac9f6d414cf73fbe6432b455372af60724cedb9dc5652f3a87741ca314deebbdf408c2ac284af130ef7b", &(0x7f0000000040)=0x63, 0x0, 0x0) 02:40:17 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@random="1714a0285b80", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2}, @tcp={{0x2, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x9824e5fdd113e783, 0x0, 0x0, 0x0, {[@generic={0x2, 0x2}, @nop, @nop]}}}}}}}) 02:40:17 executing program 3: open(&(0x7f00000003c0)='./file0\x00', 0x610, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0, 0x0) 02:40:17 executing program 5: syz_emit_ethernet(0x46, &(0x7f0000000000)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x38, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x14, 0x0}, @local={0xac, 0x14, 0x0}}, @icmp=@dest_unreach={0x3, 0xf, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @broadcast, @loopback}, "84cb22edbfee082c"}}}}}) 02:40:17 executing program 4: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x201, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000000)={0x3, &(0x7f0000000140)=[{0x3d}, {}, {0x6, 0x0, 0x0, 0x3fd}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) write(r0, &(0x7f0000000100)="3c9ebbd555feff969613ba3e1fd0", 0xe) 02:40:17 executing program 1: sysctl$kern(&(0x7f0000000080), 0xa, &(0x7f00000000c0)="0cd77b691eaa2a851910c1a6a112bffa69ec4cf65d59d011c45da7f14bc0c47a3db7ded5c220cb39cf860f8a779a1838e24d5639d9ba2c4609ac9f6d414cf73fbe6432b455372af60724cedb9dc5652f3a87741ca314deebbdf408c2ac284af130ef7b", &(0x7f0000000040)=0x63, 0x0, 0x0) 02:40:18 executing program 1: sysctl$kern(&(0x7f0000000080), 0xa, &(0x7f00000000c0)="0cd77b691eaa2a851910c1a6a112bffa69ec4cf65d59d011c45da7f14bc0c47a3db7ded5c220cb39cf860f8a779a1838e24d5639d9ba2c4609ac9f6d414cf73fbe6432b455372af60724cedb9dc5652f3a87741ca314deebbdf408c2ac284af130ef7b", &(0x7f0000000040)=0x63, 0x0, 0x0) 02:40:18 executing program 3: open(&(0x7f00000003c0)='./file0\x00', 0x610, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0, 0x0) 02:40:18 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@random="1714a0285b80", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2}, @tcp={{0x2, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x9824e5fdd113e783, 0x0, 0x0, 0x0, {[@generic={0x2, 0x2}, @nop, @nop]}}}}}}}) 02:40:18 executing program 1: sysctl$kern(&(0x7f0000000080), 0xa, &(0x7f00000000c0)="0cd77b691eaa2a851910c1a6a112bffa69ec4cf65d59d011c45da7f14bc0c47a3db7ded5c220cb39cf860f8a779a1838e24d5639d9ba2c4609ac9f6d414cf73fbe6432b455372af60724cedb9dc5652f3a87741ca314deebbdf408c2ac284af130ef7b", &(0x7f0000000040)=0x63, 0x0, 0x0) 02:40:18 executing program 3: open(&(0x7f00000003c0)='./file0\x00', 0x610, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0, 0x0) 02:40:18 executing program 0: openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x10c81, 0x0) 02:40:18 executing program 3: open(&(0x7f00000003c0)='./file0\x00', 0x610, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0, 0x0) 02:40:18 executing program 2: syz_emit_ethernet(0x3a, &(0x7f0000000040)={@random="1714a0285b80", @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote={0xac, 0x14, 0x0}, @multicast2}, @tcp={{0x2, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x9824e5fdd113e783, 0x0, 0x0, 0x0, {[@generic={0x2, 0x2}, @nop, @nop]}}}}}}}) 02:40:18 executing program 1: open(&(0x7f00000003c0)='./file0\x00', 0x610, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x0, 0x0) 2021/12/23 02:40:29 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory) login: