kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Jan 14 07:48:56 PST 2022 OpenBSD/amd64 (ci-openbsd-main-1.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.16' (ED25519) to the list of known hosts. 2022/01/14 07:49:07 fuzzer started 2022/01/14 07:49:10 dialing manager at 10.128.15.235:35213 2022/01/14 07:49:10 syscalls: 387 2022/01/14 07:49:10 code coverage: enabled 2022/01/14 07:49:10 comparison tracing: enabled 2022/01/14 07:49:10 extra coverage: enabled 2022/01/14 07:49:10 delay kcov mmap: enabled 2022/01/14 07:49:10 setuid sandbox: enabled 2022/01/14 07:49:10 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:49:10 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:49:10 fault injection: support is not implemented in syzkaller 2022/01/14 07:49:10 leak checking: support is not implemented in syzkaller 2022/01/14 07:49:10 net packet injection: enabled 2022/01/14 07:49:10 net device setup: support is not implemented in syzkaller 2022/01/14 07:49:10 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:49:10 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:49:10 USB emulation: support is not implemented in syzkaller 2022/01/14 07:49:10 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:49:10 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:49:10 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:49:10 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:49:10 fetching corpus: 31, signal 2356/5124 (executing program) 2022/01/14 07:49:10 fetching corpus: 31, signal 2356/6517 (executing program) 2022/01/14 07:49:10 fetching corpus: 31, signal 2356/7739 (executing program) 2022/01/14 07:49:10 fetching corpus: 31, signal 2356/7739 (executing program) 2022/01/14 07:49:10 starting 8 fuzzer processes 07:49:10 executing program 5: mkdirat(0xffffffffffffff9c, &(0x7f00000012c0)='./file0\x00', 0x0) unveil(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)='c\x00') unveil(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='c\x00') open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) 07:49:10 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x34, 0x0, 0x0, 0xfffffffc}, {0x40}, {0x6}]}) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="a1fe7ee44726", @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random="d2818c5058c5", @empty, @remote, @multicast1}}}}) 07:49:10 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2000, 0xd9c) open$dir(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) 07:49:10 executing program 2: setitimer(0x2, &(0x7f0000000000), 0x0) 07:49:10 executing program 3: r0 = socket(0x400000000018, 0x3, 0x0) close(r0) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) r1 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000140)={0x3f, 0x0, 0x0, 0x1}, 0x123) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f00000000c0)={{}, {0x18, 0x1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}, 0xe5) 07:49:10 executing program 4: r0 = syz_open_pts() r1 = kqueue() dup2(r0, r1) fcntl$lock(r1, 0x9, &(0x7f0000000000)={0x0, 0x2, 0x7ffffffffffffffe, 0x1000200000005}) 07:49:10 executing program 6: r0 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$WSKBDIO_SETMAP(r0, 0x8010570e, &(0x7f00000000c0)={0x900, 0x0}) 07:49:10 executing program 7: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x3}}) r0 = socket(0x18, 0x3, 0x0) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x1ff, 0x0, "00000000000000010000ef6f00"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0xffffffffffffff71) close(r0) r1 = socket(0x18, 0x3, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13f9fd812eaa4e713040e69931929648", 0x14) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 07:49:10 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2000, 0xd9c) open$dir(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) 07:49:10 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2000, 0xd9c) open$dir(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) 07:49:10 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x2000, 0xd9c) open$dir(&(0x7f00000002c0)='./file1\x00', 0x0, 0x0) 07:49:10 executing program 3: r0 = socket(0x400000000018, 0x3, 0x0) close(r0) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) r1 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000140)={0x3f, 0x0, 0x0, 0x1}, 0x123) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f00000000c0)={{}, {0x18, 0x1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}, 0xe5) 07:49:10 executing program 2: setitimer(0x2, &(0x7f0000000000), 0x0) 07:49:10 executing program 1: r0 = socket(0x400000000018, 0x3, 0x0) close(r0) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) r1 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000140)={0x3f, 0x0, 0x0, 0x1}, 0x123) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f00000000c0)={{}, {0x18, 0x1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}, 0xe5) 07:49:10 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x34, 0x0, 0x0, 0xfffffffc}, {0x40}, {0x6}]}) syz_emit_ethernet(0x2a, &(0x7f0000000000)={@random="a1fe7ee44726", @empty, [], {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @random="d2818c5058c5", @empty, @remote, @multicast1}}}}) 07:49:10 executing program 3: r0 = socket(0x400000000018, 0x3, 0x0) close(r0) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) r1 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000140)={0x3f, 0x0, 0x0, 0x1}, 0x123) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0x68, &(0x7f00000000c0)={{}, {0x18, 0x1}, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f]}, 0xe5) 2022/01/14 07:49:22 executor 4 failed 11 times: executor 4: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) login: