starting RPC daemons:. savecore: no core dump checking quotas: done. clearing /tmp kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Jan 14 07:49:21 PST 2022 OpenBSD/amd64 (ci-openbsd-main-3.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.1.37' (ED25519) to the list of known hosts. 2022/01/14 07:49:29 fuzzer started 2022/01/14 07:49:31 dialing manager at 10.128.15.235:35213 2022/01/14 07:49:31 syscalls: 387 2022/01/14 07:49:31 code coverage: enabled 2022/01/14 07:49:31 comparison tracing: enabled 2022/01/14 07:49:31 extra coverage: enabled 2022/01/14 07:49:31 delay kcov mmap: enabled 2022/01/14 07:49:31 setuid sandbox: enabled 2022/01/14 07:49:31 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:49:31 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:49:31 fault injection: support is not implemented in syzkaller 2022/01/14 07:49:31 leak checking: support is not implemented in syzkaller 2022/01/14 07:49:31 net packet injection: enabled 2022/01/14 07:49:31 net device setup: support is not implemented in syzkaller 2022/01/14 07:49:31 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:49:31 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:49:31 USB emulation: support is not implemented in syzkaller 2022/01/14 07:49:31 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:49:31 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:49:31 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:49:31 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:49:31 fetching corpus: 36, signal 2737/5379 (executing program) 2022/01/14 07:49:31 fetching corpus: 36, signal 2737/6703 (executing program) 2022/01/14 07:49:31 fetching corpus: 36, signal 2737/8035 (executing program) 2022/01/14 07:49:31 fetching corpus: 36, signal 2737/8105 (executing program) 2022/01/14 07:49:31 fetching corpus: 36, signal 2737/8105 (executing program) 2022/01/14 07:49:31 starting 8 fuzzer processes 07:49:31 executing program 0: r0 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000600), 0x82, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="a96f6c", 0x3}], 0x1, 0x0) pwritev(r0, &(0x7f0000002940)=[{&(0x7f0000000300)="4af3966b56519cc8dcad6f65e6276fd8e8665dc55c522ab6dc310265a172e8a409491488caed42", 0x27}, {&(0x7f0000002980)="276a3aa3e98095c2818fb8d7a1442372acc42ff4fe632e2d2c", 0x19}], 0x2, 0x0) execve(0x0, 0x0, 0x0) 07:49:31 executing program 4: socket(0x18, 0x8000, 0x6) openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) utimes(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={{0x103, 0x2}, {0x6, 0x80}}) r0 = semget$private(0x0, 0x5, 0x46) semctl$GETVAL(r0, 0x1, 0x5, &(0x7f0000000840)=""/178) r1 = socket(0x18, 0x5, 0x0) utimes(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000500)={{0x0, 0x3f}, {0x0, 0xe01}}) getsockopt$SO_PEERCRED(r1, 0xffff, 0x1022, &(0x7f0000000000)={0x0, 0x0}, 0xc) socket(0x2, 0x1, 0x0) ioctl$PCIOCGETROM(0xffffffffffffffff, 0xc0107005, &(0x7f0000000540)={{}, 0x1, &(0x7f0000000040)=[0x0]}) setsockopt(r1, 0x0, 0x9, &(0x7f0000000240)="32dd637de0ddeae28eff8c6ff6ba80e90f787b215c0146f5ca03d46ab375241a5e718294cbfd7ef7fb3fab96ab02d9fc840b84b48814a433f40ea3dbbd9dca278154841efd0d4b81fea5ceaa8a94c155c55e9332ed3883e7533dc1044e86ad925e1d12bd8259cd826ebf3da8c034c8a6e8265659ce75880a87cd3ff5d4ae56619be8f324fac81648bb0251d74f13b4a8c220f327e7cc764961b16f06f2024f7d4a7c00230411b13340047397f7ba63e657d6dca5f163cda12471139f5fdfb86595d2c1ab3d602d38f6540725deef2482ddfb9f65063bc48efd62a5b5a54d386a5cfad463e7a2dd0e4e623ad2162a62296b87551897c628", 0xf7) setreuid(r3, 0xee01) socket$inet(0x2, 0x3, 0x80000000102) sendmsg(0xffffffffffffffff, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000580)="3da855438f44109c725efdbc26b6d370ea2a787fdb48a25e1da134c623473c0e48e6ab3a9fc89d141ab50667b995f3a54673217b69fb25b917497b097bc31e538c23c0dc023f669979dc6af4054bcd99ff3e4b0f28771b16b8c8ef20734b89ee12e2f7e99419c2dcae6b208dcdfbcc578122539fd98a85e882e243a447e69d05aaa248160b4a35035752eb2ce3a4ef94ccf71d5245f35b23ab12b7a126626130eb48d7ffdb0033844f54c6ecc64bdc3c12ac4383f539faf7961b9c217cccfd765057f587abc2a844ba5c20e045027ce47ad21e561c2120", 0xd7}, {&(0x7f0000000340)="2d8396d0b7ccd053019665e6812fd0650c86d9ae939d4b61e71ef41d21b2caf7338d9e1e0d6e463163a3b355eb415dbd45223b", 0x33}], 0x2, &(0x7f0000000b00)=ANY=[@ANYBLOB="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"/489], 0xe0}, 0x405) fcntl$lock(r1, 0x7, &(0x7f0000000200)={0x2, 0x1, 0x6, 0x1b, r2}) semctl$GETVAL(r0, 0x0, 0x5, &(0x7f0000000400)=""/216) 07:49:31 executing program 1: sysctl$kern(&(0x7f0000000200)={0x1, 0xb}, 0x2, 0x0, 0x0, &(0x7f0000000380), 0x0) 07:49:31 executing program 6: mknod(&(0x7f0000000000)='./bus\x00', 0x8000800080002002, 0x4000000005bcd) r0 = open(&(0x7f0000000100)='./bus\x00', 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0xa, 0x0, 0x0, 0x0, 0x88}, 0x0) ioctl$TIOCFLUSH(r0, 0x82907003, &(0x7f0000000080)=0x3) 07:49:31 executing program 2: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$VMM_IOC_CREATE(0xffffffffffffffff, 0xc5005601, &(0x7f0000000040)={0x10, 0x0, 0x4, 0x0, [{&(0x7f00004f7000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil}, {&(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil}, {&(0x7f00004ee000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil}, {&(0x7f0000fee000/0x12000)=nil, &(0x7f0000ffc000/0x4000)=nil}, {&(0x7f0000dfa000/0x4000)=nil, &(0x7f0000ff6000/0x3000)=nil}, {&(0x7f0000ff3000/0x1000)=nil, &(0x7f00007a8000/0x3000)=nil}, {&(0x7f00003dd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil}, {&(0x7f0000a0a000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil}, {&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff8000/0x2000)=nil}, {&(0x7f0000ffc000/0x3000)=nil, &(0x7f00009fd000/0x600000)=nil}, {&(0x7f0000aec000/0x4000)=nil, &(0x7f0000acd000/0x3000)=nil}, {&(0x7f0000c0e000/0x3000)=nil, &(0x7f0000c5e000/0x3000)=nil}, {&(0x7f00000fa000/0x4000)=nil, &(0x7f0000dad000/0x4000)=nil}, {&(0x7f0000df3000/0x1000)=nil, &(0x7f0000ff0000/0x1000)=nil}, {&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fe0000/0x1000)=nil}, {&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000e13000/0x1000)=nil}], ['./file1\x00', './file\x00', './file0\x00', './file0\x00'], './file0\x00', './file0\x00', './file0\x00', ['./file', './file', './file', './file']}) ioctl$WSDISPLAYIO_ADDSCREEN(0xffffffffffffffff, 0x80245753, &(0x7f00000005c0)={0x8, './file1\x00', './file1\x00'}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7, 0x2}, 0x8) socket(0x18, 0x4003, 0x0) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x3, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r1 = socket(0x18, 0x1, 0x0) close(r1) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000540), 0x4) r2 = socket(0x18, 0x3, 0x85) setsockopt(r0, 0x800000000029, 0x24, &(0x7f0000000040)='\t\x00\x00\x00', 0x4) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r2, 0x0, 0x0) 07:49:31 executing program 3: sysctl$net_inet_carp(&(0x7f0000000100)={0xa}, 0x2, 0x0, 0x0, 0x0, 0x0) 07:49:31 executing program 5: mknod(&(0x7f0000000040)='./file0\x00', 0x1ffb, 0x0) open(&(0x7f0000000180)='./file1\x00', 0x200, 0x0) r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$VNDIOCSET(r0, 0xc0384600, &(0x7f0000000440)={&(0x7f00000003c0)='./file0\x00', 0x7, 0x0}) r1 = openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x0, 0x0) renameat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000140)='./file1\x00') rename(&(0x7f0000000200)='./file1\x00', &(0x7f0000000100)='./file0\x00') execve(0x0, 0x0, 0x0) 07:49:32 executing program 7: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x1d}, {0x48}, {0x4406}]}) syz_emit_ethernet(0xe, &(0x7f0000000240)) 07:49:32 executing program 3: sysctl$net_inet_carp(&(0x7f0000000100)={0xa}, 0x2, 0x0, 0x0, 0x0, 0x0) 07:49:32 executing program 1: sysctl$kern(&(0x7f0000000200)={0x1, 0xb}, 0x2, 0x0, 0x0, &(0x7f0000000380), 0x0) 07:49:32 executing program 2: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$VMM_IOC_CREATE(0xffffffffffffffff, 0xc5005601, &(0x7f0000000040)={0x10, 0x0, 0x4, 0x0, [{&(0x7f00004f7000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil}, {&(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil}, {&(0x7f00004ee000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil}, {&(0x7f0000fee000/0x12000)=nil, &(0x7f0000ffc000/0x4000)=nil}, {&(0x7f0000dfa000/0x4000)=nil, &(0x7f0000ff6000/0x3000)=nil}, {&(0x7f0000ff3000/0x1000)=nil, &(0x7f00007a8000/0x3000)=nil}, {&(0x7f00003dd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil}, {&(0x7f0000a0a000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil}, {&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff8000/0x2000)=nil}, {&(0x7f0000ffc000/0x3000)=nil, &(0x7f00009fd000/0x600000)=nil}, {&(0x7f0000aec000/0x4000)=nil, &(0x7f0000acd000/0x3000)=nil}, {&(0x7f0000c0e000/0x3000)=nil, &(0x7f0000c5e000/0x3000)=nil}, {&(0x7f00000fa000/0x4000)=nil, &(0x7f0000dad000/0x4000)=nil}, {&(0x7f0000df3000/0x1000)=nil, &(0x7f0000ff0000/0x1000)=nil}, {&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fe0000/0x1000)=nil}, {&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000e13000/0x1000)=nil}], ['./file1\x00', './file\x00', './file0\x00', './file0\x00'], './file0\x00', './file0\x00', './file0\x00', ['./file', './file', './file', './file']}) ioctl$WSDISPLAYIO_ADDSCREEN(0xffffffffffffffff, 0x80245753, &(0x7f00000005c0)={0x8, './file1\x00', './file1\x00'}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7, 0x2}, 0x8) socket(0x18, 0x4003, 0x0) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x3, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r1 = socket(0x18, 0x1, 0x0) close(r1) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000540), 0x4) r2 = socket(0x18, 0x3, 0x85) setsockopt(r0, 0x800000000029, 0x24, &(0x7f0000000040)='\t\x00\x00\x00', 0x4) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r2, 0x0, 0x0) 07:49:32 executing program 1: sysctl$kern(&(0x7f0000000200)={0x1, 0xb}, 0x2, 0x0, 0x0, &(0x7f0000000380), 0x0) 07:49:32 executing program 3: sysctl$net_inet_carp(&(0x7f0000000100)={0xa}, 0x2, 0x0, 0x0, 0x0, 0x0) 07:49:32 executing program 3: sysctl$net_inet_carp(&(0x7f0000000100)={0xa}, 0x2, 0x0, 0x0, 0x0, 0x0) 07:49:32 executing program 0: r0 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000600), 0x82, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="a96f6c", 0x3}], 0x1, 0x0) pwritev(r0, &(0x7f0000002940)=[{&(0x7f0000000300)="4af3966b56519cc8dcad6f65e6276fd8e8665dc55c522ab6dc310265a172e8a409491488caed42", 0x27}, {&(0x7f0000002980)="276a3aa3e98095c2818fb8d7a1442372acc42ff4fe632e2d2c", 0x19}], 0x2, 0x0) execve(0x0, 0x0, 0x0) 07:49:32 executing program 2: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$VMM_IOC_CREATE(0xffffffffffffffff, 0xc5005601, &(0x7f0000000040)={0x10, 0x0, 0x4, 0x0, [{&(0x7f00004f7000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil}, {&(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil}, {&(0x7f00004ee000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil}, {&(0x7f0000fee000/0x12000)=nil, &(0x7f0000ffc000/0x4000)=nil}, {&(0x7f0000dfa000/0x4000)=nil, &(0x7f0000ff6000/0x3000)=nil}, {&(0x7f0000ff3000/0x1000)=nil, &(0x7f00007a8000/0x3000)=nil}, {&(0x7f00003dd000/0x2000)=nil, &(0x7f0000ffa000/0x3000)=nil}, {&(0x7f0000a0a000/0x1000)=nil, &(0x7f0000ffb000/0x4000)=nil}, {&(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ff8000/0x2000)=nil}, {&(0x7f0000ffc000/0x3000)=nil, &(0x7f00009fd000/0x600000)=nil}, {&(0x7f0000aec000/0x4000)=nil, &(0x7f0000acd000/0x3000)=nil}, {&(0x7f0000c0e000/0x3000)=nil, &(0x7f0000c5e000/0x3000)=nil}, {&(0x7f00000fa000/0x4000)=nil, &(0x7f0000dad000/0x4000)=nil}, {&(0x7f0000df3000/0x1000)=nil, &(0x7f0000ff0000/0x1000)=nil}, {&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000fe0000/0x1000)=nil}, {&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000e13000/0x1000)=nil}], ['./file1\x00', './file\x00', './file0\x00', './file0\x00'], './file0\x00', './file0\x00', './file0\x00', ['./file', './file', './file', './file']}) ioctl$WSDISPLAYIO_ADDSCREEN(0xffffffffffffffff, 0x80245753, &(0x7f00000005c0)={0x8, './file1\x00', './file1\x00'}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7, 0x2}, 0x8) socket(0x18, 0x4003, 0x0) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x3, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r1 = socket(0x18, 0x1, 0x0) close(r1) setsockopt$sock_int(r0, 0xffff, 0x1002, &(0x7f0000000540), 0x4) r2 = socket(0x18, 0x3, 0x85) setsockopt(r0, 0x800000000029, 0x24, &(0x7f0000000040)='\t\x00\x00\x00', 0x4) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r2, 0x0, 0x0) 07:49:32 executing program 3: r0 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000600), 0x82, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000100)="a96f6c", 0x3}], 0x1, 0x0) pwritev(r0, &(0x7f0000002940)=[{&(0x7f0000000300)="4af3966b56519cc8dcad6f65e6276fd8e8665dc55c522ab6dc310265a172e8a409491488caed42", 0x27}, {&(0x7f0000002980)="276a3aa3e98095c2818fb8d7a1442372acc42ff4fe632e2d2c", 0x19}], 0x2, 0x0) execve(0x0, 0x0, 0x0) 2022/01/14 07:49:43 executor 4 failed 11 times: executor 4: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) login: