OpenBSD/amd64 (ci-openbsd-main-1.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.114' (ED25519) to the list of known hosts. 2022/01/14 07:25:43 fuzzer started 2022/01/14 07:25:46 dialing manager at 10.128.15.235:6268 2022/01/14 07:25:46 syscalls: 387 2022/01/14 07:25:46 code coverage: enabled 2022/01/14 07:25:46 comparison tracing: enabled 2022/01/14 07:25:46 extra coverage: enabled 2022/01/14 07:25:46 delay kcov mmap: enabled 2022/01/14 07:25:46 setuid sandbox: enabled 2022/01/14 07:25:46 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:25:46 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:25:46 fault injection: support is not implemented in syzkaller 2022/01/14 07:25:46 leak checking: support is not implemented in syzkaller 2022/01/14 07:25:46 net packet injection: enabled 2022/01/14 07:25:46 net device setup: support is not implemented in syzkaller 2022/01/14 07:25:46 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:25:46 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:25:46 USB emulation: support is not implemented in syzkaller 2022/01/14 07:25:46 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:25:46 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:25:46 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:25:46 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:25:46 fetching corpus: 20, signal 1314/4585 (executing program) 2022/01/14 07:25:46 fetching corpus: 20, signal 1314/6186 (executing program) 2022/01/14 07:25:46 fetching corpus: 20, signal 1314/7023 (executing program) 2022/01/14 07:25:46 fetching corpus: 20, signal 1314/7023 (executing program) 2022/01/14 07:25:46 starting 8 fuzzer processes 07:25:46 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x5c}, {0x84}, {0x6, 0x0, 0x0, 0x19c}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) write(r0, &(0x7f0000000240)="6d2c9662be5ccb8366b87c98830c", 0xe) 07:25:46 executing program 0: r0 = syz_open_pts() seteuid(0xffffffffffffffff) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000040)=0x9) 07:25:46 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x3a0914c44f7b202c, 0xd02) ktrace(&(0x7f0000000080)='./bus\x00', 0x1, 0x40000020, 0x0) 07:25:46 executing program 3: r0 = socket(0x400000000018, 0x3, 0x0) close(r0) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) r1 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0x66, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0x68, &(0x7f00000000c0), 0x5c) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000140)={0x3f, 0x0, 0x0, 0x1}, 0x123) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f00000000c0)={{}, {0x18, 0x1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}, 0xe5) 07:25:46 executing program 4: syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@local, @random="2a4313ff3952", [], {@ipv4={0x800, {{0x6, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x1, 0x0, @multicast1, @empty, {[@rr={0x7, 0x3}]}}, @icmp=@echo_reply={0xf}}}}}) 07:25:46 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000140)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x64}, {0x3d}, {0x6, 0x0, 0x0, 0x1000003}]}) pwrite(r0, &(0x7f00000000c0)="d00000004000000000001b000008", 0xe, 0x0) 07:25:46 executing program 6: r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)) 07:25:46 executing program 7: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2000, 0x0) setuid(0xffffffffffffffff) faccessat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x2, 0x0) symlinkat(&(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00') r0 = getpid() ktrace(&(0x7f0000000100)='./file0\x00', 0x2, 0x1010, r0) r1 = msgget$private(0x0, 0x6b0) msgrcv(r1, &(0x7f00000007c0)=ANY=[@ANYBLOB="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"], 0xc, 0x2, 0x1000) msgget$private(0x0, 0x410) 07:25:46 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x5c}, {0x84}, {0x6, 0x0, 0x0, 0x19c}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) write(r0, &(0x7f0000000240)="6d2c9662be5ccb8366b87c98830c", 0xe) 07:25:46 executing program 0: r0 = syz_open_pts() seteuid(0xffffffffffffffff) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000040)=0x9) 07:25:46 executing program 0: r0 = syz_open_pts() seteuid(0xffffffffffffffff) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000040)=0x9) 07:25:46 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x5c}, {0x84}, {0x6, 0x0, 0x0, 0x19c}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) write(r0, &(0x7f0000000240)="6d2c9662be5ccb8366b87c98830c", 0xe) 07:25:46 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x3a0914c44f7b202c, 0xd02) ktrace(&(0x7f0000000080)='./bus\x00', 0x1, 0x40000020, 0x0) 07:25:46 executing program 3: r0 = socket(0x400000000018, 0x3, 0x0) close(r0) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) r1 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0x66, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0x68, &(0x7f00000000c0), 0x5c) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000140)={0x3f, 0x0, 0x0, 0x1}, 0x123) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f00000000c0)={{}, {0x18, 0x1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}, 0xe5) 07:25:46 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x5c}, {0x84}, {0x6, 0x0, 0x0, 0x19c}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) write(r0, &(0x7f0000000240)="6d2c9662be5ccb8366b87c98830c", 0xe) 07:25:46 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x3a0914c44f7b202c, 0xd02) ktrace(&(0x7f0000000080)='./bus\x00', 0x1, 0x40000020, 0x0) 07:25:46 executing program 2: r0 = socket(0x400000000018, 0x3, 0x0) close(r0) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) r1 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0x66, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0x68, &(0x7f00000000c0), 0x5c) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000140)={0x3f, 0x0, 0x0, 0x1}, 0x123) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f00000000c0)={{}, {0x18, 0x1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}, 0xe5) 07:25:46 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x3a0914c44f7b202c, 0xd02) ktrace(&(0x7f0000000080)='./bus\x00', 0x1, 0x40000020, 0x0) 07:25:46 executing program 0: r0 = syz_open_pts() seteuid(0xffffffffffffffff) ioctl$TIOCSETD(r0, 0x8004741b, &(0x7f0000000040)=0x9) 07:25:46 executing program 2: r0 = socket(0x400000000018, 0x3, 0x0) close(r0) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) r1 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r1, 0x29, 0x66, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x3}, 0xc) setsockopt$inet6_MRT6_ADD_MFC(r1, 0x29, 0x68, &(0x7f00000000c0), 0x5c) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000140)={0x3f, 0x0, 0x0, 0x1}, 0x123) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f00000000c0)={{}, {0x18, 0x1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}, 0xe5) 2022/01/14 07:25:58 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: