kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Jan 14 07:49:22 PST 2022 OpenBSD/amd64 (ci-openbsd-main-6.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.10.0' (ED25519) to the list of known hosts. 2022/01/14 07:49:33 fuzzer started 2022/01/14 07:49:34 dialing manager at 10.128.15.235:35213 2022/01/14 07:49:34 syscalls: 387 2022/01/14 07:49:34 code coverage: enabled 2022/01/14 07:49:34 comparison tracing: enabled 2022/01/14 07:49:34 extra coverage: enabled 2022/01/14 07:49:34 delay kcov mmap: enabled 2022/01/14 07:49:34 setuid sandbox: enabled 2022/01/14 07:49:34 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:49:34 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:49:34 fault injection: support is not implemented in syzkaller 2022/01/14 07:49:34 leak checking: support is not implemented in syzkaller 2022/01/14 07:49:34 net packet injection: enabled 2022/01/14 07:49:34 net device setup: support is not implemented in syzkaller 2022/01/14 07:49:34 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:49:34 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:49:34 USB emulation: support is not implemented in syzkaller 2022/01/14 07:49:34 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:49:34 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:49:34 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:49:34 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:49:34 fetching corpus: 37, signal 2740/5439 (executing program) 2022/01/14 07:49:34 fetching corpus: 37, signal 2740/6780 (executing program) 2022/01/14 07:49:34 fetching corpus: 37, signal 2740/8140 (executing program) 2022/01/14 07:49:34 fetching corpus: 37, signal 2740/8470 (executing program) 2022/01/14 07:49:34 fetching corpus: 37, signal 2740/8470 (executing program) 2022/01/14 07:49:34 starting 8 fuzzer processes 07:49:35 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{0x61}, {0x3}, {0x6, 0x0, 0x0, 0x800fff}]}) pwrite(r0, &(0x7f0000000080)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:49:35 executing program 3: r0 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) pwrite(r0, &(0x7f00000005c0)="0737fa210700fb70d1b6927bf19396f2f81680047354d68d7e933be80c840113dcada5758c4db5e4bfeffca3c5296e185b09fed0c4ab7e153b547e3f9cef46082e55f383e7f6e286e7b06b6d17bd4ca1d5490b2358f8384ffa5b503fdb886daeff69d5f60c327d2f141de79ec83a80273e0978007c58323c54fc764d97179dddf896158d45819cc8c95f66c98688ccb8b1045f2cbf7c0759f7e890e69de7f3c8a57d1c232853f8fcb126cb3edc9f829539246ae2269937b76f74b02c93a5af08738ee751af7dbcd65226de00190e13726efbbeaa5a3e709a2ed9a8095784d10d34a2d14bbeb56523", 0xe8, 0x0) execve(0x0, 0x0, 0x0) 07:49:35 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x1000000002052, 0x5f00) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$VMM_IOC_RUN(r0, 0xc0205602, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) 07:49:35 executing program 5: setrlimit(0x8, &(0x7f0000000040)={0x7, 0x8}) r0 = syz_open_pts() close(r0) r1 = syz_open_pts() ioctl$TIOCSETAF(r1, 0x802c7416, &(0x7f0000000100)={0xfffffff8, 0xfffffffd, 0xfffffffe, 0x1ec80d8f, "00bbff0059610e6ccaa6f9ac0000000600"}) writev(r0, &(0x7f00000003c0)=[{&(0x7f0000000600)="5315cada1b1ccc29ef813a2e1e413f77fee8bffb0c2da8684bcf71e988e5f84c01e85fc106", 0x25}], 0x1) 07:49:35 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="b002e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) listen(r1, 0x0) r2 = socket(0x2, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=ANY=[], 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x1010, 0xffffffffffffffff, 0x0) getpeername(r2, 0x0, &(0x7f00000002c0)) 07:49:35 executing program 4: sysctl$net_inet6_ip6(&(0x7f0000000040)={0x7, 0x2, 0x2, 0xa0000204}, 0x4, 0x0, 0x0, 0x0, 0x0) 07:49:35 executing program 7: sysctl$net_inet_tcp(&(0x7f0000000000)={0x4, 0x2, 0x2, 0x1}, 0x4, 0x0, 0x0, &(0x7f0000000140), 0x0) r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x50}, {0x84}, {0x6, 0x0, 0x0, 0xfffffffc}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) pwrite(r0, &(0x7f00000000c0)="e4bb1f214389f6e3d5ca0268c7ab", 0xe, 0x0) r1 = getuid() setreuid(0xee00, r1) getgroups(0x7, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) r3 = semget$private(0x0, 0x1, 0x3b2) semctl$SETALL(r3, 0x0, 0x9, &(0x7f00000002c0)=[0x572a]) r4 = getuid() setreuid(0xee00, r4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f00000003c0)={0x0, 0x0, 0x0}, &(0x7f0000000080)=0xc) semctl$IPC_SET(r3, 0x0, 0x1, &(0x7f0000000140)={{0x7fff, r4, r6, 0x0, r2, 0x1, 0x20}, 0xd2f3, 0x0, 0x8}) 07:49:35 executing program 6: mprotect(&(0x7f00000da000/0x2000)=nil, 0xfffffffffffffce9, 0x0) 07:49:35 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{0x61}, {0x3}, {0x6, 0x0, 0x0, 0x800fff}]}) pwrite(r0, &(0x7f0000000080)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:49:35 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x1000000002052, 0x5f00) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$VMM_IOC_RUN(r0, 0xc0205602, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) 07:49:35 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x1000000002052, 0x5f00) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$VMM_IOC_RUN(r0, 0xc0205602, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) 07:49:35 executing program 3: r0 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) pwrite(r0, &(0x7f00000005c0)="0737fa210700fb70d1b6927bf19396f2f81680047354d68d7e933be80c840113dcada5758c4db5e4bfeffca3c5296e185b09fed0c4ab7e153b547e3f9cef46082e55f383e7f6e286e7b06b6d17bd4ca1d5490b2358f8384ffa5b503fdb886daeff69d5f60c327d2f141de79ec83a80273e0978007c58323c54fc764d97179dddf896158d45819cc8c95f66c98688ccb8b1045f2cbf7c0759f7e890e69de7f3c8a57d1c232853f8fcb126cb3edc9f829539246ae2269937b76f74b02c93a5af08738ee751af7dbcd65226de00190e13726efbbeaa5a3e709a2ed9a8095784d10d34a2d14bbeb56523", 0xe8, 0x0) execve(0x0, 0x0, 0x0) 07:49:35 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{0x61}, {0x3}, {0x6, 0x0, 0x0, 0x800fff}]}) pwrite(r0, &(0x7f0000000080)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:49:35 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="b002e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) listen(r1, 0x0) r2 = socket(0x2, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=ANY=[], 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x1010, 0xffffffffffffffff, 0x0) getpeername(r2, 0x0, &(0x7f00000002c0)) 07:49:35 executing program 1: mknod(&(0x7f0000000100)='./bus\x00', 0x1000000002052, 0x5f00) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$VMM_IOC_RUN(r0, 0xc0205602, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) 07:49:35 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{0x61}, {0x3}, {0x6, 0x0, 0x0, 0x800fff}]}) pwrite(r0, &(0x7f0000000080)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:49:35 executing program 2: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="b002e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) listen(r1, 0x0) r2 = socket(0x2, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=ANY=[], 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x1010, 0xffffffffffffffff, 0x0) getpeername(r2, 0x0, &(0x7f00000002c0)) 07:49:35 executing program 3: r0 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) pwrite(r0, &(0x7f00000005c0)="0737fa210700fb70d1b6927bf19396f2f81680047354d68d7e933be80c840113dcada5758c4db5e4bfeffca3c5296e185b09fed0c4ab7e153b547e3f9cef46082e55f383e7f6e286e7b06b6d17bd4ca1d5490b2358f8384ffa5b503fdb886daeff69d5f60c327d2f141de79ec83a80273e0978007c58323c54fc764d97179dddf896158d45819cc8c95f66c98688ccb8b1045f2cbf7c0759f7e890e69de7f3c8a57d1c232853f8fcb126cb3edc9f829539246ae2269937b76f74b02c93a5af08738ee751af7dbcd65226de00190e13726efbbeaa5a3e709a2ed9a8095784d10d34a2d14bbeb56523", 0xe8, 0x0) execve(0x0, 0x0, 0x0) 07:49:35 executing program 1: connect$unix(0xffffffffffffffff, &(0x7f0000000000)=ANY=[@ANYBLOB="b002e57f7f000001"], 0x1) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) bind(r0, &(0x7f0000000000)=@un=@abs={0x0, 0xd}, 0x10) r1 = dup(r0) listen(r1, 0x0) r2 = socket(0x2, 0x1, 0x0) connect$unix(r2, &(0x7f0000000000)=ANY=[], 0x10) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x1010, 0xffffffffffffffff, 0x0) getpeername(r2, 0x0, &(0x7f00000002c0)) 2022/01/14 07:49:46 executor 5 failed 11 times: executor 5: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap5 (errno 2: No such file or directory) login: