kern.securelevel: 0 -> 1 creating runtime link editor directory cache. preserving editor files. starting network daemons: sshd. starting local daemons:. Fri Jan 14 07:47:21 PST 2022 OpenBSD/amd64 (ci-openbsd-main-5.c.syzkaller.internal) (tty00) Warning: Permanently added '10.128.0.222' (ED25519) to the list of known hosts. 2022/01/14 07:47:32 fuzzer started 2022/01/14 07:47:34 dialing manager at 10.128.15.235:35213 2022/01/14 07:47:34 syscalls: 387 2022/01/14 07:47:34 code coverage: enabled 2022/01/14 07:47:34 comparison tracing: enabled 2022/01/14 07:47:34 extra coverage: enabled 2022/01/14 07:47:34 delay kcov mmap: enabled 2022/01/14 07:47:34 setuid sandbox: enabled 2022/01/14 07:47:34 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:47:34 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:47:34 fault injection: support is not implemented in syzkaller 2022/01/14 07:47:34 leak checking: support is not implemented in syzkaller 2022/01/14 07:47:34 net packet injection: enabled 2022/01/14 07:47:34 net device setup: support is not implemented in syzkaller 2022/01/14 07:47:34 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:47:34 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:47:34 USB emulation: support is not implemented in syzkaller 2022/01/14 07:47:34 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:47:34 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:47:34 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:47:34 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:47:34 fetching corpus: 9, signal 907/4183 (executing program) 2022/01/14 07:47:34 fetching corpus: 9, signal 907/4960 (executing program) 2022/01/14 07:47:34 fetching corpus: 9, signal 907/4960 (executing program) 2022/01/14 07:47:34 starting 8 fuzzer processes 07:47:34 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0xa8e329f9edf63bbd, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) poll(&(0x7f00000001c0)=[{}], 0x1, 0x400) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) execve(0x0, 0x0, 0x0) 07:47:35 executing program 4: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x2000, 0xfff) openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x0) 07:47:35 executing program 1: r0 = syz_open_pts() ioctl$TIOCSETAF(r0, 0x802c7416, &(0x7f0000000100)={0x0, 0x0, 0xb2b0, 0x0, "578fe12a8bc585c3cafbeb988a0a164d8c4da967"}) writev(r0, &(0x7f0000000180)=[{&(0x7f0000000080)="829b9f0695091f4eab55381d007b8cff9d8d5a1688e50eab1732167f15e60465f6a27e00000e805bc1a05578320a7b32d56a22376a752083d9186e2044c2ac5b729de6073e5a", 0x46}, {&(0x7f0000000140)="d26d1d623f27fddbe7d58ff245478cc82e4c78be2e4ab2eec76070e9d75c12", 0x1f}], 0x2) write(r0, &(0x7f0000000040), 0xfffffec2) write(r0, &(0x7f00000001c0)="6ff01ee38bf936e338289fc1470b5104d0c8e64336af42b71d7ec5831e231aa8f26717e22cc4ebee7121664f73457f8ac42f0128381504b453982d459fdba4455cc10f3a", 0x44) syz_open_pts() close(r0) kqueue() syz_open_pts() execve(0x0, 0x0, 0x0) 07:47:35 executing program 2: setrlimit(0x8, &(0x7f0000000040)={0x7, 0x8}) r0 = syz_open_pts() close(r0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x60e, 0x0) ioctl$TIOCSTOP(r0, 0x2000746f) write(r0, &(0x7f0000000140)=' ', 0x1) 07:47:35 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000380)=ANY=[@ANYBLOB="0d05b5a90ca700000000000086dd601000183aff00000000000000100000010001000000fe8000000000000000000000000000aa"]) 07:47:35 executing program 7: r0 = semget$private(0x0, 0x3, 0x600) semop(r0, &(0x7f0000000240)=[{0x3, 0xcff, 0x1000}, {0x3, 0x100, 0x1000}], 0x2) semop(r0, &(0x7f0000000000), 0x0) semctl$SETVAL(r0, 0x4, 0x8, &(0x7f0000000100)=0x7) semop(r0, &(0x7f00000001c0)=[{0x0, 0x8}], 0x1) r1 = semget$private(0x0, 0x7, 0x3e0) semop(r1, &(0x7f0000000080)=[{0x3, 0x2, 0x800}, {0x1, 0xff, 0x1000}, {0x1, 0x8, 0x800}, {0x3, 0xffff, 0x1000}, {0x2, 0x101, 0x1800}, {0x3, 0x1, 0x1800}], 0x6) semctl$IPC_SET(r1, 0x0, 0x1, &(0x7f0000000400)={{0x100, 0x0, 0x0, 0x0, 0x0, 0xaa}, 0x393, 0x9, 0x7fff}) semctl$SETALL(r1, 0x0, 0x9, &(0x7f0000000000)) semctl$SETALL(r1, 0x0, 0x9, &(0x7f0000000140)=[0x6, 0x2080]) semctl$SETALL(r0, 0x0, 0x9, 0xffffffffffffffff) semop(r0, &(0x7f00000000c0)=[{0x3, 0x5}, {0x0, 0x5f80, 0x1800}, {0x0, 0xb72}, {0x3, 0x4}, {0x3, 0x9, 0x1000}], 0x5) r2 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$BIOCSETWF(r2, 0x80104277, &(0x7f0000000280)={0x3, &(0x7f0000000040)=[{0x0, 0x0, 0xb4, 0x7fe}, {0x1, 0x4, 0x0, 0x5}, {0x6, 0x0, 0x20, 0x4a21}]}) setuid(0xffffffffffffffff) sysctl$kern(&(0x7f0000000040)={0x1, 0x49}, 0x6, &(0x7f0000000080)="f7a451e4a37b0df30b1d32cb", &(0x7f0000000180)=0x68a, 0x0, 0x0) 07:47:35 executing program 5: mknod(&(0x7f0000000040)='./bus\x00', 0x2007, 0x40004004000828a6) r0 = open(&(0x7f0000000400)='./bus\x00', 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) poll(&(0x7f0000000000)=[{r0, 0x1}], 0x1, 0x5f) r2 = fcntl$dupfd(r1, 0x0, r0) poll(&(0x7f00000001c0)=[{r2, 0x1}], 0x1, 0x0) 07:47:35 executing program 6: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="28000000ffff000001"], 0x28}, 0x0) setrlimit(0x8, &(0x7f0000000080)) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/88, 0x58}, 0x0) 07:47:35 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000380)=ANY=[@ANYBLOB="0d05b5a90ca700000000000086dd601000183aff00000000000000100000010001000000fe8000000000000000000000000000aa"]) 07:47:35 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000380)=ANY=[@ANYBLOB="0d05b5a90ca700000000000086dd601000183aff00000000000000100000010001000000fe8000000000000000000000000000aa"]) 07:47:35 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0xa8e329f9edf63bbd, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) poll(&(0x7f00000001c0)=[{}], 0x1, 0x400) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) execve(0x0, 0x0, 0x0) 07:47:35 executing program 3: syz_emit_ethernet(0x4e, &(0x7f0000000380)=ANY=[@ANYBLOB="0d05b5a90ca700000000000086dd601000183aff00000000000000100000010001000000fe8000000000000000000000000000aa"]) 07:47:35 executing program 3: open$dir(&(0x7f00000002c0)='./file0\x00', 0xa8e329f9edf63bbd, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) poll(&(0x7f00000001c0)=[{}], 0x1, 0x400) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) execve(0x0, 0x0, 0x0) 07:47:35 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0xa8e329f9edf63bbd, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) poll(&(0x7f00000001c0)=[{}], 0x1, 0x400) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) execve(0x0, 0x0, 0x0) 07:47:35 executing program 3: open$dir(&(0x7f00000002c0)='./file0\x00', 0xa8e329f9edf63bbd, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) poll(&(0x7f00000001c0)=[{}], 0x1, 0x400) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) execve(0x0, 0x0, 0x0) 07:47:35 executing program 2: setrlimit(0x8, &(0x7f0000000040)={0x7, 0x8}) r0 = syz_open_pts() close(r0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x2000, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000080)='./file0\x00', 0x60e, 0x0) ioctl$TIOCSTOP(r0, 0x2000746f) write(r0, &(0x7f0000000140)=' ', 0x1) 07:47:35 executing program 0: open$dir(&(0x7f00000002c0)='./file0\x00', 0xa8e329f9edf63bbd, 0x0) r0 = getpid() ktrace(&(0x7f0000000080)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) poll(&(0x7f00000001c0)=[{}], 0x1, 0x400) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0) execve(0x0, 0x0, 0x0) 2022/01/14 07:47:46 executor 4 failed 11 times: executor 4: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) login: