kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Jan 14 07:47:39 PST 2022 OpenBSD/amd64 (ci-openbsd-multicore-7.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.41' (ED25519) to the list of known hosts. 2022/01/14 07:47:51 fuzzer started 2022/01/14 07:47:53 dialing manager at 10.128.15.235:5710 2022/01/14 07:47:53 syscalls: 387 2022/01/14 07:47:53 code coverage: enabled 2022/01/14 07:47:53 comparison tracing: enabled 2022/01/14 07:47:53 extra coverage: enabled 2022/01/14 07:47:53 delay kcov mmap: enabled 2022/01/14 07:47:53 setuid sandbox: enabled 2022/01/14 07:47:53 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:47:53 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:47:53 fault injection: support is not implemented in syzkaller 2022/01/14 07:47:53 leak checking: support is not implemented in syzkaller 2022/01/14 07:47:53 net packet injection: enabled 2022/01/14 07:47:53 net device setup: support is not implemented in syzkaller 2022/01/14 07:47:53 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:47:53 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:47:53 USB emulation: support is not implemented in syzkaller 2022/01/14 07:47:53 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:47:53 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:47:53 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:47:53 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:47:53 fetching corpus: 15, signal 1507/4364 (executing program) 2022/01/14 07:47:53 fetching corpus: 15, signal 1507/5151 (executing program) 2022/01/14 07:47:53 fetching corpus: 15, signal 1507/5151 (executing program) 2022/01/14 07:47:53 starting 8 fuzzer processes 07:47:53 executing program 0: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) r0 = syz_open_pts() ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f00000000c0)={0x0, 0x467, 0x0, 0x1000000, "5e00000000001b5ef99b0e00"}) write(r0, &(0x7f0000000080)='\r', 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$TIOCSETA(r1, 0x802c7414, &(0x7f00000000c0)={0x8, 0xfffffffe, 0xffffffffffffffff, 0xfffffffc, "000000000000000064e4f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r3, 0x0, 0x0) 07:47:53 executing program 1: r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000140)='#!', 0x2}], 0x1) fchmod(r0, 0xe3) r1 = fcntl$dupfd(r0, 0x0, r0) write(r1, &(0x7f00000004c0)="d3f5f3e75ee0b2a43a47c9e04d87403fcac95873090915000000000000d5311b9528fb544456ec53ab1cccfaeea6cd49850dce31d8cbae6c3393e26d925c7e7b048b1c6c392736622d6e36b9bcf2010b152674f21c012b6be2cad3ac12c9aa6ee8067b5719a2163d0ea60efa0a", 0x6d) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 07:47:53 executing program 2: sysctl$kern(&(0x7f0000000180)={0x1, 0x48}, 0x2, &(0x7f00000002c0)="6b5c40a2", &(0x7f0000000200)=0x4, 0x0, 0x0) 07:47:53 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x722, r0) clock_gettime(0x2, &(0x7f0000000040)) 07:47:53 executing program 4: madvise(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x2) mknod(&(0x7f0000000100)='./bus\x00', 0x2000, 0x5dd9) open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) r1 = socket(0x11, 0x4003, 0x0) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) recvmsg(r1, &(0x7f0000000000)={&(0x7f0000000140)=@in6, 0xc, &(0x7f0000000180), 0x1000000000000264, 0x0, 0xffffffffffffff51}, 0x0) 07:47:54 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x74}, {0x20}, {0xfffffffffffffffe}]}) syz_emit_ethernet(0xe, &(0x7f00000003c0)={@broadcast}) 07:47:54 executing program 7: r0 = socket(0x800000018, 0x2, 0x0) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000080)={0x0, 0x0, 0x9ff, 0x0, "d730c1e7e400000001000000000000000000009e"}) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) r1 = socket(0x18, 0x1, 0x0) r2 = dup2(r0, r1) connect$unix(r1, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) sendmsg(r2, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002500)=[{0x10}], 0x10}, 0x0) 07:47:54 executing program 6: munmap(&(0x7f0000005000/0x4000)=nil, 0x4000) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(r0, 0xc5005601, &(0x7f0000000580)={0x1, 0x0, 0x1, {[0x0, 0x0, 0x0, 0x20004000, 0x200000]}}) 07:47:54 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x722, r0) clock_gettime(0x2, &(0x7f0000000040)) 07:47:54 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x722, r0) clock_gettime(0x2, &(0x7f0000000040)) 07:47:54 executing program 0: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) r0 = syz_open_pts() ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f00000000c0)={0x0, 0x467, 0x0, 0x1000000, "5e00000000001b5ef99b0e00"}) write(r0, &(0x7f0000000080)='\r', 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$TIOCSETA(r1, 0x802c7414, &(0x7f00000000c0)={0x8, 0xfffffffe, 0xffffffffffffffff, 0xfffffffc, "000000000000000064e4f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r3, 0x0, 0x0) 07:47:54 executing program 0: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) r0 = syz_open_pts() ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f00000000c0)={0x0, 0x467, 0x0, 0x1000000, "5e00000000001b5ef99b0e00"}) write(r0, &(0x7f0000000080)='\r', 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$TIOCSETA(r1, 0x802c7414, &(0x7f00000000c0)={0x8, 0xfffffffe, 0xffffffffffffffff, 0xfffffffc, "000000000000000064e4f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r3, 0x0, 0x0) 07:47:54 executing program 3: open$dir(&(0x7f0000000000)='./file0\x00', 0x200, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0x722, r0) clock_gettime(0x2, &(0x7f0000000040)) 07:47:54 executing program 0: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) r0 = syz_open_pts() ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f00000000c0)={0x0, 0x467, 0x0, 0x1000000, "5e00000000001b5ef99b0e00"}) write(r0, &(0x7f0000000080)='\r', 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$TIOCSETA(r1, 0x802c7414, &(0x7f00000000c0)={0x8, 0xfffffffe, 0xffffffffffffffff, 0xfffffffc, "000000000000000064e4f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r3, 0x0, 0x0) 07:47:54 executing program 2: sysctl$kern(&(0x7f0000000180)={0x1, 0x48}, 0x2, &(0x7f00000002c0)="6b5c40a2", &(0x7f0000000200)=0x4, 0x0, 0x0) 07:47:54 executing program 3: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) r0 = syz_open_pts() ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f00000000c0)={0x0, 0x467, 0x0, 0x1000000, "5e00000000001b5ef99b0e00"}) write(r0, &(0x7f0000000080)='\r', 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$TIOCSETA(r1, 0x802c7414, &(0x7f00000000c0)={0x8, 0xfffffffe, 0xffffffffffffffff, 0xfffffffc, "000000000000000064e4f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r3, 0x0, 0x0) 07:47:54 executing program 3: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) r0 = syz_open_pts() ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f00000000c0)={0x0, 0x467, 0x0, 0x1000000, "5e00000000001b5ef99b0e00"}) write(r0, &(0x7f0000000080)='\r', 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$TIOCSETA(r1, 0x802c7414, &(0x7f00000000c0)={0x8, 0xfffffffe, 0xffffffffffffffff, 0xfffffffc, "000000000000000064e4f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r3, 0x0, 0x0) 07:47:54 executing program 1: r0 = open(&(0x7f0000000480)='./file0\x00', 0x80000000000206, 0x0) writev(r0, &(0x7f0000000640)=[{&(0x7f0000000140)='#!', 0x2}], 0x1) fchmod(r0, 0xe3) r1 = fcntl$dupfd(r0, 0x0, r0) write(r1, &(0x7f00000004c0)="d3f5f3e75ee0b2a43a47c9e04d87403fcac95873090915000000000000d5311b9528fb544456ec53ab1cccfaeea6cd49850dce31d8cbae6c3393e26d925c7e7b048b1c6c392736622d6e36b9bcf2010b152674f21c012b6be2cad3ac12c9aa6ee8067b5719a2163d0ea60efa0a", 0x6d) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 07:47:54 executing program 2: sysctl$kern(&(0x7f0000000180)={0x1, 0x48}, 0x2, &(0x7f00000002c0)="6b5c40a2", &(0x7f0000000200)=0x4, 0x0, 0x0) 07:47:54 executing program 3: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) r0 = syz_open_pts() ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f00000000c0)={0x0, 0x467, 0x0, 0x1000000, "5e00000000001b5ef99b0e00"}) write(r0, &(0x7f0000000080)='\r', 0x1) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x10000, 0x0) ioctl$TIOCSETA(r1, 0x802c7414, &(0x7f00000000c0)={0x8, 0xfffffffe, 0xffffffffffffffff, 0xfffffffc, "000000000000000064e4f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r3, 0x0, 0x0) 2022/01/14 07:48:06 executor 5 failed 11 times: executor 5: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap5 (errno 2: No such file or directory) login: