kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Jan 14 07:48:25 PST 2022 OpenBSD/amd64 (ci-openbsd-multicore-2.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.205' (ED25519) to the list of known hosts. 2022/01/14 07:48:36 fuzzer started 2022/01/14 07:48:38 dialing manager at 10.128.15.235:5710 2022/01/14 07:48:38 syscalls: 387 2022/01/14 07:48:38 code coverage: enabled 2022/01/14 07:48:38 comparison tracing: enabled 2022/01/14 07:48:38 extra coverage: enabled 2022/01/14 07:48:38 delay kcov mmap: enabled 2022/01/14 07:48:38 setuid sandbox: enabled 2022/01/14 07:48:38 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:48:38 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:48:38 fault injection: support is not implemented in syzkaller 2022/01/14 07:48:38 leak checking: support is not implemented in syzkaller 2022/01/14 07:48:38 net packet injection: enabled 2022/01/14 07:48:38 net device setup: support is not implemented in syzkaller 2022/01/14 07:48:38 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:48:38 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:48:38 USB emulation: support is not implemented in syzkaller 2022/01/14 07:48:38 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:48:38 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:48:38 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:48:38 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:48:38 fetching corpus: 30, signal 2779/5227 (executing program) 2022/01/14 07:48:38 fetching corpus: 30, signal 2779/6447 (executing program) 2022/01/14 07:48:38 fetching corpus: 30, signal 2779/7179 (executing program) 2022/01/14 07:48:38 fetching corpus: 30, signal 2779/7179 (executing program) 2022/01/14 07:48:38 starting 8 fuzzer processes 07:48:38 executing program 0: getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) setegid(r0) setgroups(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000340)='./file0\x00', 0x107) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) setuid(0xee01) rename(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') 07:48:38 executing program 1: r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000040), 0x10609, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r0, 0x80105728, &(0x7f0000000100)={&(0x7f00000000c0)=[{}, {0x21}], 0x2}) 07:48:38 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x5c}, {0x45}, {0x6, 0x0, 0x0, 0xfc}]}) pwrite(r0, &(0x7f0000000200)="c07cae19fdec509468c66511edec", 0xe, 0x0) 07:48:38 executing program 3: r0 = kqueue() kevent(r0, 0x0, 0x0, 0x0, 0x47, 0x0) kevent(r0, 0x0, 0x0, &(0x7f0000000140), 0x5, &(0x7f00000002c0)={0x234f4383}) kevent(r0, &(0x7f0000000080)=[{{}, 0xfffffffffffffff9, 0x1}], 0x1, 0x0, 0x0, 0x0) 07:48:38 executing program 5: mknod(&(0x7f0000000180)='./file0\x00', 0x61c8, 0x202) mknod(&(0x7f0000000240)='./bus\x00', 0x210d, 0x202) mkdir(&(0x7f0000000040)='./bus\x00', 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000600), 0x0, 0x0) close(r0) 07:48:38 executing program 4: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xa, &(0x7f0000000480), 0x0) 07:48:38 executing program 6: ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000000)={0x0, 0x0, 0x1, 0x0, "00003d51859e1865790aeb00000400001fe600"}) sysctl$kern(&(0x7f0000000000)={0x1, 0x33}, 0x3, &(0x7f00000001c0)="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", 0x0, 0x0, 0xffffffffffffffb6) 07:48:38 executing program 7: r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(r0, 0xc5005601, &(0x7f0000000580)={0x1, 0x0, 0x1, {[0x0, 0x0, 0x0, 0x20004000, 0x200000]}}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f000062e000)={&(0x7f0000690ff6)=@abs, 0xea, 0x0, 0x0, 0x0, 0xffffffffffffff61}, 0x0) 07:48:38 executing program 0: getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) setegid(r0) setgroups(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000340)='./file0\x00', 0x107) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) setuid(0xee01) rename(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') 07:48:39 executing program 0: getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) setegid(r0) setgroups(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000340)='./file0\x00', 0x107) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) setuid(0xee01) rename(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') 07:48:39 executing program 0: getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) setegid(r0) setgroups(0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000340)='./file0\x00', 0x107) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) setuid(0xee01) rename(&(0x7f0000000180)='./file0/file0\x00', &(0x7f0000000100)='./file0/file1\x00') 07:48:39 executing program 1: r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000040), 0x10609, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r0, 0x80105728, &(0x7f0000000100)={&(0x7f00000000c0)=[{}, {0x21}], 0x2}) 07:48:39 executing program 3: r0 = kqueue() kevent(r0, 0x0, 0x0, 0x0, 0x47, 0x0) kevent(r0, 0x0, 0x0, &(0x7f0000000140), 0x5, &(0x7f00000002c0)={0x234f4383}) kevent(r0, &(0x7f0000000080)=[{{}, 0xfffffffffffffff9, 0x1}], 0x1, 0x0, 0x0, 0x0) 07:48:39 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x5c}, {0x45}, {0x6, 0x0, 0x0, 0xfc}]}) pwrite(r0, &(0x7f0000000200)="c07cae19fdec509468c66511edec", 0xe, 0x0) 07:48:39 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x5c}, {0x45}, {0x6, 0x0, 0x0, 0xfc}]}) pwrite(r0, &(0x7f0000000200)="c07cae19fdec509468c66511edec", 0xe, 0x0) 07:48:39 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x5c}, {0x45}, {0x6, 0x0, 0x0, 0xfc}]}) pwrite(r0, &(0x7f0000000200)="c07cae19fdec509468c66511edec", 0xe, 0x0) 07:48:39 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x5c}, {0x45}, {0x6, 0x0, 0x0, 0xfc}]}) pwrite(r0, &(0x7f0000000200)="c07cae19fdec509468c66511edec", 0xe, 0x0) 07:48:39 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x5c}, {0x45}, {0x6, 0x0, 0x0, 0xfc}]}) pwrite(r0, &(0x7f0000000200)="c07cae19fdec509468c66511edec", 0xe, 0x0) 07:48:39 executing program 1: r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000040), 0x10609, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r0, 0x80105728, &(0x7f0000000100)={&(0x7f00000000c0)=[{}, {0x21}], 0x2}) 07:48:39 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x5c}, {0x45}, {0x6, 0x0, 0x0, 0xfc}]}) pwrite(r0, &(0x7f0000000200)="c07cae19fdec509468c66511edec", 0xe, 0x0) 2022/01/14 07:48:52 executor 4 failed 11 times: executor 4: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) login: