Warning: Permanently added '10.128.1.28' (ED25519) to the list of known hosts. 2022/01/14 07:46:56 fuzzer started 2022/01/14 07:46:59 dialing manager at 10.128.15.235:5710 2022/01/14 07:46:59 syscalls: 387 2022/01/14 07:46:59 code coverage: enabled 2022/01/14 07:46:59 comparison tracing: enabled 2022/01/14 07:46:59 extra coverage: enabled 2022/01/14 07:46:59 delay kcov mmap: enabled 2022/01/14 07:46:59 setuid sandbox: enabled 2022/01/14 07:46:59 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:46:59 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:46:59 fault injection: support is not implemented in syzkaller 2022/01/14 07:46:59 leak checking: support is not implemented in syzkaller 2022/01/14 07:46:59 net packet injection: enabled 2022/01/14 07:46:59 net device setup: support is not implemented in syzkaller 2022/01/14 07:46:59 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:46:59 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:46:59 USB emulation: support is not implemented in syzkaller 2022/01/14 07:46:59 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:46:59 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:46:59 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:46:59 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:46:59 fetching corpus: 7, signal 815/2578 (executing program) 2022/01/14 07:46:59 fetching corpus: 7, signal 815/2578 (executing program) 2022/01/14 07:46:59 starting 8 fuzzer processes 07:46:59 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x5}, {0x81}, {0x6, 0x0, 0x0, 0xfb}]}) pwrite(r0, &(0x7f0000000240)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:46:59 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000140)={0x3, &(0x7f0000000040)=[{0x4c}, {0x28}, {0x2006}]}) syz_emit_ethernet(0xe, &(0x7f0000000100)={@broadcast, @remote}) 07:46:59 executing program 2: sysctl$kern(&(0x7f0000000040)={0x1, 0x41}, 0x2, &(0x7f00000000c0), 0x0, 0x0, 0x0) 07:46:59 executing program 3: openat$tty(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) 07:46:59 executing program 4: syz_emit_ethernet(0x22, &(0x7f0000000000)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x33, 0x0, @rand_addr, @broadcast}}}}}) 07:46:59 executing program 5: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x5}}) sysctl$net_inet_tcp(0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)="d30297dc8a7e452eba890b70a5e058d7a61331f1797043c1124f85a371181ca2c1278ec34670403ec7e8886d6ef3c02e40aa7738a7a030f4f61f01dde3b706a74748cc562da26cc75350c06b704b902d30bba0be770fe0b39d9cd708bf3f996b1fb7bfd6346fb43f6a496436503f9bd68577a8c82031fe2ce936e75f0f54500a020000000000000080", 0x89) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x18, 0x2, 0x0) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 07:46:59 executing program 6: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000380)={0x2, &(0x7f0000000000)=[{}, {0x3}]}) sysctl$kern(&(0x7f0000000000)={0x1, 0x45}, 0x3, &(0x7f0000000080)="0e6ed84b", &(0x7f00000000c0)=0x4, &(0x7f0000000100), 0x55) 07:46:59 executing program 7: r0 = socket(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x6, 0x10, &(0x7f0000000200), 0x4) 07:47:00 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000140)={0x3, &(0x7f0000000040)=[{0x4c}, {0x28}, {0x2006}]}) syz_emit_ethernet(0xe, &(0x7f0000000100)={@broadcast, @remote}) 07:47:00 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000140)={0x3, &(0x7f0000000040)=[{0x4c}, {0x28}, {0x2006}]}) syz_emit_ethernet(0xe, &(0x7f0000000100)={@broadcast, @remote}) 07:47:00 executing program 2: sysctl$kern(&(0x7f0000000040)={0x1, 0x41}, 0x2, &(0x7f00000000c0), 0x0, 0x0, 0x0) 07:47:00 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x5}, {0x81}, {0x6, 0x0, 0x0, 0xfb}]}) pwrite(r0, &(0x7f0000000240)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:47:00 executing program 2: sysctl$kern(&(0x7f0000000040)={0x1, 0x41}, 0x2, &(0x7f00000000c0), 0x0, 0x0, 0x0) 07:47:00 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000140)={0x3, &(0x7f0000000040)=[{0x4c}, {0x28}, {0x2006}]}) syz_emit_ethernet(0xe, &(0x7f0000000100)={@broadcast, @remote}) 07:47:00 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x5}, {0x81}, {0x6, 0x0, 0x0, 0xfb}]}) pwrite(r0, &(0x7f0000000240)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:47:00 executing program 2: sysctl$kern(&(0x7f0000000040)={0x1, 0x41}, 0x2, &(0x7f00000000c0), 0x0, 0x0, 0x0) 07:47:00 executing program 3: openat$tty(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) 07:47:00 executing program 3: openat$tty(0xffffffffffffff9c, 0xfffffffffffffffe, 0x0, 0x0) 07:47:00 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x5}, {0x81}, {0x6, 0x0, 0x0, 0xfb}]}) pwrite(r0, &(0x7f0000000240)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:47:00 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x5}, {0x81}, {0x6, 0x0, 0x0, 0xfb}]}) pwrite(r0, &(0x7f0000000240)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 2022/01/14 07:47:12 executor 5 failed 11 times: executor 5: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap5 (errno 2: No such file or directory)