kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Jan 14 07:47:26 PST 2022 OpenBSD/amd64 (ci-openbsd-multicore-3.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.56' (ED25519) to the list of known hosts. 2022/01/14 07:47:38 fuzzer started 2022/01/14 07:47:41 dialing manager at 10.128.15.235:5710 2022/01/14 07:47:41 syscalls: 387 2022/01/14 07:47:41 code coverage: enabled 2022/01/14 07:47:41 comparison tracing: enabled 2022/01/14 07:47:41 extra coverage: enabled 2022/01/14 07:47:41 delay kcov mmap: enabled 2022/01/14 07:47:41 setuid sandbox: enabled 2022/01/14 07:47:41 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:47:41 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:47:41 fault injection: support is not implemented in syzkaller 2022/01/14 07:47:41 leak checking: support is not implemented in syzkaller 2022/01/14 07:47:41 net packet injection: enabled 2022/01/14 07:47:41 net device setup: support is not implemented in syzkaller 2022/01/14 07:47:41 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:47:41 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:47:41 USB emulation: support is not implemented in syzkaller 2022/01/14 07:47:41 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:47:41 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:47:41 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:47:41 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:47:41 fetching corpus: 10, signal 1236/3788 (executing program) 2022/01/14 07:47:41 fetching corpus: 10, signal 1236/3788 (executing program) 2022/01/14 07:47:41 starting 8 fuzzer processes 07:47:41 executing program 0: sysctl$kern(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)="21d85583295b850bfc9e68fa4903af414f6acdb55b97c55e12d24fe003255a90d2bad6b56bdbe6a197e7444537f533c2111d2c4886a3f44a2d43ba532a0000000096a7ab8b3be16e9320949f2da75a9cb4359ed7694a93753fd47e9c5239077f9551d5643930a064c4a4811d871457988e5b4c001a24cebc0e9153250bb7a96b9df66b80997896509ec2112bfdc830c4ebd0bc703193bcaa662b4976040f52dbdf7b2d01041eb2f36cc05074a81072509f53480dfe6f2f3159d60c6c8604d8452a7dfdcf21", 0xc5) r0 = syz_open_pts() fcntl$lock(r0, 0x9, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x100000000}) flock(r0, 0x2) flock(r0, 0x2) fcntl$lock(r0, 0x10000000000009, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000300000000}) 07:47:41 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) symlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000280)='./file0/file1\x00') setuid(0xee01) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x200, 0x0) rename(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000680)='./file0/file1\x00') 07:47:42 executing program 2: r0 = syz_open_pts() syz_open_pts() syz_open_pts() fchflags(r0, 0x0) 07:47:42 executing program 3: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x2004, 0x200) open$dir(&(0x7f0000000000)='./file0\x00', 0x1, 0x0) 07:47:42 executing program 4: setrlimit(0x7, &(0x7f0000000040)={0x4000, 0x40000000000}) 07:47:42 executing program 6: mknodat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x2000, 0x53d7) open$dir(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 07:47:42 executing program 7: r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r0, 0x80105728, &(0x7f0000000440)={&(0x7f0000000340)=[{0x21}, {}], 0x2}) 07:47:42 executing program 5: sysctl$net_inet_tcp(&(0x7f00000006c0)={0x4, 0x2, 0x6, 0x13}, 0x4, 0x0, 0x0, &(0x7f0000001740), 0x210) 07:47:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) symlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000280)='./file0/file1\x00') setuid(0xee01) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x200, 0x0) rename(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000680)='./file0/file1\x00') 07:47:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) symlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000280)='./file0/file1\x00') setuid(0xee01) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x200, 0x0) rename(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000680)='./file0/file1\x00') 07:47:42 executing program 2: r0 = syz_open_pts() syz_open_pts() syz_open_pts() fchflags(r0, 0x0) 07:47:42 executing program 3: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x2004, 0x200) open$dir(&(0x7f0000000000)='./file0\x00', 0x1, 0x0) 07:47:42 executing program 1: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) chmod(&(0x7f0000000180)='./file0\x00', 0x23f) symlink(&(0x7f0000000240)='./file0/file1\x00', &(0x7f0000000280)='./file0/file1\x00') setuid(0xee01) openat(0xffffffffffffff9c, &(0x7f0000000300)='./file0/file0\x00', 0x200, 0x0) rename(&(0x7f00000006c0)='./file0/file0\x00', &(0x7f0000000680)='./file0/file1\x00') 07:47:42 executing program 3: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x2004, 0x200) open$dir(&(0x7f0000000000)='./file0\x00', 0x1, 0x0) 07:47:42 executing program 1: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x2004, 0x200) open$dir(&(0x7f0000000000)='./file0\x00', 0x1, 0x0) 07:47:42 executing program 2: r0 = syz_open_pts() syz_open_pts() syz_open_pts() fchflags(r0, 0x0) 07:47:43 executing program 0: sysctl$kern(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)="21d85583295b850bfc9e68fa4903af414f6acdb55b97c55e12d24fe003255a90d2bad6b56bdbe6a197e7444537f533c2111d2c4886a3f44a2d43ba532a0000000096a7ab8b3be16e9320949f2da75a9cb4359ed7694a93753fd47e9c5239077f9551d5643930a064c4a4811d871457988e5b4c001a24cebc0e9153250bb7a96b9df66b80997896509ec2112bfdc830c4ebd0bc703193bcaa662b4976040f52dbdf7b2d01041eb2f36cc05074a81072509f53480dfe6f2f3159d60c6c8604d8452a7dfdcf21", 0xc5) r0 = syz_open_pts() fcntl$lock(r0, 0x9, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x100000000}) flock(r0, 0x2) flock(r0, 0x2) fcntl$lock(r0, 0x10000000000009, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2000300000000}) 07:47:43 executing program 2: r0 = syz_open_pts() syz_open_pts() syz_open_pts() fchflags(r0, 0x0) 07:47:43 executing program 3: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x2004, 0x200) open$dir(&(0x7f0000000000)='./file0\x00', 0x1, 0x0) 07:47:43 executing program 1: r0 = open$dir(&(0x7f00000000c0)='.\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000100)='./file0\x00', 0x2004, 0x200) open$dir(&(0x7f0000000000)='./file0\x00', 0x1, 0x0) 2022/01/14 07:47:55 executor 7 failed 11 times: executor 7: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap7 (errno 2: No such file or directory) login: