kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Jan 14 07:46:31 PST 2022 OpenBSD/amd64 (ci-openbsd-multicore-0.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.86' (ED25519) to the list of known hosts. 2022/01/14 07:46:42 fuzzer started 2022/01/14 07:46:46 dialing manager at 10.128.15.235:5710 2022/01/14 07:46:46 checking machine... 2022/01/14 07:46:46 checking revisions... 2022/01/14 07:46:46 testing simple program... 2022/01/14 07:46:46 building call list... 2022/01/14 07:46:47 syscalls: 387 2022/01/14 07:46:47 code coverage: enabled 2022/01/14 07:46:47 comparison tracing: enabled 2022/01/14 07:46:47 extra coverage: enabled 2022/01/14 07:46:47 delay kcov mmap: enabled 2022/01/14 07:46:47 setuid sandbox: enabled 2022/01/14 07:46:47 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:46:47 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:46:47 fault injection: support is not implemented in syzkaller 2022/01/14 07:46:47 leak checking: support is not implemented in syzkaller 2022/01/14 07:46:47 net packet injection: enabled 2022/01/14 07:46:47 net device setup: support is not implemented in syzkaller 2022/01/14 07:46:47 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:46:47 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:46:47 USB emulation: support is not implemented in syzkaller 2022/01/14 07:46:47 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:46:47 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:46:47 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:46:47 fetching corpus: 0, signal 0/0 (executing program) 2022/01/14 07:46:47 fetching corpus: 0, signal 0/0 (executing program) 2022/01/14 07:46:47 starting 8 fuzzer processes 07:46:47 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) getsockopt(r0, 0x6, 0x8, 0x0, 0x0) 07:46:47 executing program 1: r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ftruncate(r0, 0x0) 07:46:47 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000240)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{0x48}, {0x64}, {0x6, 0x0, 0x0, 0x196}]}) pwrite(r0, &(0x7f0000000100)="244e7f3cb06224b0386e5110db69", 0xe, 0x0) 07:46:47 executing program 3: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x400000000002, 0x0) r3 = socket(0x1e, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$TIOCFLUSH(r4, 0x80206916, &(0x7f0000000300)) 07:46:47 executing program 4: syz_emit_ethernet(0x50, &(0x7f0000003300)={@random="1dfb007700", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "102f22", 0x1a, 0x3a, 0xff, @rand_addr="fe000000000001000100", @mcast2, {[], @icmpv6=@ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @empty, [{}]}}}}}}) 07:46:47 executing program 5: ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "d730c15b00f4ff0000747beffde400"}) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x1}}) r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x18, 0x400000002, 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) close(r1) r2 = socket(0x18, 0x3, 0x11) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r2, 0x0, 0x0) 07:46:47 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) getsockopt(r0, 0x6, 0x8, 0x0, 0x0) 07:46:47 executing program 6: r0 = socket$inet6(0x18, 0x1, 0x0) getsockopt(r0, 0x6, 0x8, 0x0, 0x0) 07:46:47 executing program 7: r0 = socket$inet6(0x18, 0x1, 0x0) getsockopt(r0, 0x6, 0x8, 0x0, 0x0) 07:46:47 executing program 3: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x400000000002, 0x0) r3 = socket(0x1e, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$TIOCFLUSH(r4, 0x80206916, &(0x7f0000000300)) 07:46:47 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) getsockopt(r0, 0x6, 0x8, 0x0, 0x0) 07:46:47 executing program 3: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x400000000002, 0x0) r3 = socket(0x1e, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$TIOCFLUSH(r4, 0x80206916, &(0x7f0000000300)) 07:46:47 executing program 3: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x400000000002, 0x0) r3 = socket(0x1e, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$TIOCFLUSH(r4, 0x80206916, &(0x7f0000000300)) 07:46:47 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000240)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{0x48}, {0x64}, {0x6, 0x0, 0x0, 0x196}]}) pwrite(r0, &(0x7f0000000100)="244e7f3cb06224b0386e5110db69", 0xe, 0x0) 07:46:47 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000240)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{0x48}, {0x64}, {0x6, 0x0, 0x0, 0x196}]}) pwrite(r0, &(0x7f0000000100)="244e7f3cb06224b0386e5110db69", 0xe, 0x0) 07:46:47 executing program 1: r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ftruncate(r0, 0x0) 07:46:47 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000240)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{0x48}, {0x64}, {0x6, 0x0, 0x0, 0x196}]}) pwrite(r0, &(0x7f0000000100)="244e7f3cb06224b0386e5110db69", 0xe, 0x0) 07:46:47 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000240)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{0x48}, {0x64}, {0x6, 0x0, 0x0, 0x196}]}) pwrite(r0, &(0x7f0000000100)="244e7f3cb06224b0386e5110db69", 0xe, 0x0) 07:46:47 executing program 0: r0 = socket$inet6(0x18, 0x1, 0x0) getsockopt(r0, 0x6, 0x8, 0x0, 0x0) 07:46:47 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000240)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{0x48}, {0x64}, {0x6, 0x0, 0x0, 0x196}]}) pwrite(r0, &(0x7f0000000100)="244e7f3cb06224b0386e5110db69", 0xe, 0x0) 2022/01/14 07:46:59 executor 4 failed 11 times: executor 4: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) login: