kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Jan 14 07:47:12 PST 2022 OpenBSD/amd64 (ci-openbsd-main-4.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.112' (ED25519) to the list of known hosts. 2022/01/14 07:47:23 fuzzer started 2022/01/14 07:47:25 dialing manager at 10.128.15.235:35213 2022/01/14 07:47:25 syscalls: 387 2022/01/14 07:47:25 code coverage: enabled 2022/01/14 07:47:25 comparison tracing: enabled 2022/01/14 07:47:25 extra coverage: enabled 2022/01/14 07:47:25 delay kcov mmap: enabled 2022/01/14 07:47:25 setuid sandbox: enabled 2022/01/14 07:47:25 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:47:25 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:47:25 fault injection: support is not implemented in syzkaller 2022/01/14 07:47:25 leak checking: support is not implemented in syzkaller 2022/01/14 07:47:25 net packet injection: enabled 2022/01/14 07:47:25 net device setup: support is not implemented in syzkaller 2022/01/14 07:47:25 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:47:25 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:47:25 USB emulation: support is not implemented in syzkaller 2022/01/14 07:47:25 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:47:25 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:47:25 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:47:25 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:47:25 fetching corpus: 4, signal 362/2672 (executing program) 2022/01/14 07:47:25 fetching corpus: 4, signal 362/2672 (executing program) 2022/01/14 07:47:25 starting 8 fuzzer processes 07:47:25 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{0x2}, {0xc}, {0x6}]}) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @multicast1}, @udp={{0x0, 0x3, 0x8}}}}}}) 07:47:25 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x2000, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x10702, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='\x00', 0x1}], 0x1) 07:47:25 executing program 1: sysctl$fs(&(0x7f0000000000)={0x3, 0x1}, 0x2, &(0x7f0000000040), 0x0, 0x0, 0x0) 07:47:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) r2 = dup(r0) sendto$unix(r2, 0x0, 0x0, 0x8, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000100)=""/170, 0xaa, 0x0, 0x0, 0x0) 07:47:25 executing program 4: r0 = socket(0x18, 0x2, 0x0) select(0x40, &(0x7f0000000000)={0x8}, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2) shutdown(r0, 0x0) 07:47:25 executing program 6: setrlimit(0x8, &(0x7f0000000000)={0x9, 0x93}) r0 = syz_open_pts() close(r0) syz_open_pts() ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f0000000100)={0xfffffffe, 0x0, 0x9a6, 0xfffffffe, "5700007b000400000000000000002000"}) write(r0, &(0x7f0000000140)="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", 0x12d) 07:47:25 executing program 5: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0xee) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x2, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$TIOCFLUSH(r4, 0x80606954, &(0x7f0000000300)) 07:47:25 executing program 7: mknod(&(0x7f0000000000)='./bus\x00', 0x2000, 0x450b) r0 = open(&(0x7f00000002c0)='./bus\x00', 0x2, 0x0) read(r0, &(0x7f00000001c0)=""/212, 0xd4) read(r0, &(0x7f0000000100)=""/144, 0x90) ioctl$WSMUXIO_INJECTEVENT(r0, 0x80185760, &(0x7f0000000380)) ioctl$WSMUXIO_INJECTEVENT(r0, 0x80185760, &(0x7f0000000040)) 07:47:25 executing program 1: sysctl$fs(&(0x7f0000000000)={0x3, 0x1}, 0x2, &(0x7f0000000040), 0x0, 0x0, 0x0) 07:47:25 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x2000, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x10702, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='\x00', 0x1}], 0x1) 07:47:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) r2 = dup(r0) sendto$unix(r2, 0x0, 0x0, 0x8, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000100)=""/170, 0xaa, 0x0, 0x0, 0x0) 07:47:25 executing program 1: sysctl$fs(&(0x7f0000000000)={0x3, 0x1}, 0x2, &(0x7f0000000040), 0x0, 0x0, 0x0) 07:47:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) r2 = dup(r0) sendto$unix(r2, 0x0, 0x0, 0x8, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000100)=""/170, 0xaa, 0x0, 0x0, 0x0) 07:47:25 executing program 1: sysctl$fs(&(0x7f0000000000)={0x3, 0x1}, 0x2, &(0x7f0000000040), 0x0, 0x0, 0x0) 07:47:25 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x2000, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x10702, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='\x00', 0x1}], 0x1) 07:47:25 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{0x2}, {0xc}, {0x6}]}) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @multicast1}, @udp={{0x0, 0x3, 0x8}}}}}}) 07:47:25 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{0x2}, {0xc}, {0x6}]}) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @multicast1}, @udp={{0x0, 0x3, 0x8}}}}}}) 07:47:25 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x2000, 0x0) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x10702, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000000100)='\x00', 0x1}], 0x1) 07:47:25 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000100)={0x3, &(0x7f0000000040)=[{0x2}, {0xc}, {0x6}]}) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@broadcast, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @multicast1}, @udp={{0x0, 0x3, 0x8}}}}}}) 07:47:25 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000012c0)={0x0, 0x0, 0x0}, 0x0) r2 = dup(r0) sendto$unix(r2, 0x0, 0x0, 0x8, 0x0, 0x0) recvfrom$unix(r1, &(0x7f0000000100)=""/170, 0xaa, 0x0, 0x0, 0x0) 2022/01/14 07:47:37 executor 5 failed 11 times: executor 5: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap5 (errno 2: No such file or directory) login: