kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Jan 14 07:48:28 PST 2022 OpenBSD/amd64 (ci-openbsd-main-2.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.22' (ED25519) to the list of known hosts. 2022/01/14 07:48:42 fuzzer started 2022/01/14 07:48:44 dialing manager at 10.128.15.235:35213 2022/01/14 07:48:44 syscalls: 387 2022/01/14 07:48:44 code coverage: enabled 2022/01/14 07:48:44 comparison tracing: enabled 2022/01/14 07:48:44 extra coverage: enabled 2022/01/14 07:48:44 delay kcov mmap: enabled 2022/01/14 07:48:44 setuid sandbox: enabled 2022/01/14 07:48:44 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:48:44 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:48:44 fault injection: support is not implemented in syzkaller 2022/01/14 07:48:44 leak checking: support is not implemented in syzkaller 2022/01/14 07:48:44 net packet injection: enabled 2022/01/14 07:48:44 net device setup: support is not implemented in syzkaller 2022/01/14 07:48:44 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:48:44 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:48:44 USB emulation: support is not implemented in syzkaller 2022/01/14 07:48:44 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:48:44 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:48:44 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:48:44 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:48:44 fetching corpus: 24, signal 2291/5128 (executing program) 2022/01/14 07:48:44 fetching corpus: 24, signal 2291/6499 (executing program) 2022/01/14 07:48:44 fetching corpus: 24, signal 2291/7641 (executing program) 2022/01/14 07:48:44 fetching corpus: 24, signal 2291/7641 (executing program) 2022/01/14 07:48:44 starting 8 fuzzer processes 07:48:44 executing program 2: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) ioctl$VMM_IOC_RESETCPU(0xffffffffffffffff, 0x82405605, &(0x7f0000000340)={0x1, 0x800000, {[0x4000000000000009, 0xffffffffffffffff, 0x0, 0x5d12, 0x0, 0x0, 0x8000, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xfff], [0x0, 0x6, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x93, 0xfff], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [{}, {}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x10000000}], {0x0, 0x0, 0x0, 0x3}}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x8080691a, &(0x7f0000000300)) 07:48:44 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000002c0)={0x3, &(0x7f0000000100)=[{0x3d}, {0x84}, {0x6, 0x0, 0x0, 0x7ff}]}) pwrite(r0, &(0x7f0000000000)="72a82c87d5efc19bd421b3896db5", 0xe, 0x0) 07:48:44 executing program 1: r0 = socket$inet6(0x18, 0x8001, 0x0) getsockopt(r0, 0x6, 0x4, 0x0, 0x0) 07:48:44 executing program 3: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x1e, 0x4003, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$TIOCFLUSH(r4, 0x8080691a, &(0x7f0000000300)) 07:48:44 executing program 4: r0 = syz_open_pts() ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "00000000fc751b7a00"}) fcntl$setstatus(r0, 0x4, 0x40) poll(&(0x7f00000000c0)=[{r0, 0x40}], 0x1, 0x7bffffff) ioctl$TIOCSETAW(r0, 0x802c7415, &(0x7f0000000040)={0x0, 0x0, 0x0, 0xfffffff8, "1bba00153065564000000053018000"}) 07:48:44 executing program 5: sysctl$kern(&(0x7f0000000040)={0x1, 0x1b}, 0x2, 0x0, 0x0, 0x0, 0x0) 07:48:44 executing program 6: r0 = socket(0x2, 0x3, 0x0) getsockopt$sock_cred(r0, 0xffff, 0x8, 0x0, 0x0) 07:48:44 executing program 7: r0 = open(&(0x7f0000000080)='./file0\x00', 0x612, 0x0) ktrace(&(0x7f0000000000)='./file0\x00', 0x4, 0xa04, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) clock_settime(0x100000000000000, &(0x7f0000000140)) 07:48:45 executing program 2: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) ioctl$VMM_IOC_RESETCPU(0xffffffffffffffff, 0x82405605, &(0x7f0000000340)={0x1, 0x800000, {[0x4000000000000009, 0xffffffffffffffff, 0x0, 0x5d12, 0x0, 0x0, 0x8000, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xfff], [0x0, 0x6, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x93, 0xfff], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [{}, {}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x10000000}], {0x0, 0x0, 0x0, 0x3}}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x8080691a, &(0x7f0000000300)) 07:48:45 executing program 3: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x1e, 0x4003, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$TIOCFLUSH(r4, 0x8080691a, &(0x7f0000000300)) 07:48:45 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000002c0)={0x3, &(0x7f0000000100)=[{0x3d}, {0x84}, {0x6, 0x0, 0x0, 0x7ff}]}) pwrite(r0, &(0x7f0000000000)="72a82c87d5efc19bd421b3896db5", 0xe, 0x0) 07:48:45 executing program 1: r0 = socket$inet6(0x18, 0x8001, 0x0) getsockopt(r0, 0x6, 0x4, 0x0, 0x0) 07:48:45 executing program 1: r0 = socket$inet6(0x18, 0x8001, 0x0) getsockopt(r0, 0x6, 0x4, 0x0, 0x0) 07:48:45 executing program 2: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) ioctl$VMM_IOC_RESETCPU(0xffffffffffffffff, 0x82405605, &(0x7f0000000340)={0x1, 0x800000, {[0x4000000000000009, 0xffffffffffffffff, 0x0, 0x5d12, 0x0, 0x0, 0x8000, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xfff], [0x0, 0x6, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x93, 0xfff], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [{}, {}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x10000000}], {0x0, 0x0, 0x0, 0x3}}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x8080691a, &(0x7f0000000300)) 07:48:45 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000002c0)={0x3, &(0x7f0000000100)=[{0x3d}, {0x84}, {0x6, 0x0, 0x0, 0x7ff}]}) pwrite(r0, &(0x7f0000000000)="72a82c87d5efc19bd421b3896db5", 0xe, 0x0) 07:48:45 executing program 3: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x1e, 0x4003, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$TIOCFLUSH(r4, 0x8080691a, &(0x7f0000000300)) 07:48:45 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000002c0)={0x3, &(0x7f0000000100)=[{0x3d}, {0x84}, {0x6, 0x0, 0x0, 0x7ff}]}) pwrite(r0, &(0x7f0000000000)="72a82c87d5efc19bd421b3896db5", 0xe, 0x0) 07:48:45 executing program 1: r0 = socket$inet6(0x18, 0x8001, 0x0) getsockopt(r0, 0x6, 0x4, 0x0, 0x0) 07:48:45 executing program 2: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) ioctl$VMM_IOC_RESETCPU(0xffffffffffffffff, 0x82405605, &(0x7f0000000340)={0x1, 0x800000, {[0x4000000000000009, 0xffffffffffffffff, 0x0, 0x5d12, 0x0, 0x0, 0x8000, 0x0, 0x200000000000, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0xfff], [0x0, 0x6, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x93, 0xfff], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000], [{}, {}, {0x0, 0x0, 0x1}, {0x0, 0x0, 0x0, 0x10000000}], {0x0, 0x0, 0x0, 0x3}}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x2, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x8080691a, &(0x7f0000000300)) 07:48:45 executing program 3: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x1e, 0x4003, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) r4 = fcntl$dupfd(r3, 0x0, r0) ioctl$TIOCFLUSH(r4, 0x8080691a, &(0x7f0000000300)) 2022/01/14 07:48:56 executor 4 failed 11 times: executor 4: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) login: