Warning: Permanently added '10.128.0.145' (ED25519) to the list of known hosts. 2022/01/14 07:49:48 fuzzer started 2022/01/14 07:49:51 dialing manager at 10.128.15.235:5710 2022/01/14 07:49:51 syscalls: 387 2022/01/14 07:49:51 code coverage: enabled 2022/01/14 07:49:51 comparison tracing: enabled 2022/01/14 07:49:51 extra coverage: enabled 2022/01/14 07:49:51 delay kcov mmap: enabled 2022/01/14 07:49:51 setuid sandbox: enabled 2022/01/14 07:49:51 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:49:51 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:49:51 fault injection: support is not implemented in syzkaller 2022/01/14 07:49:51 leak checking: support is not implemented in syzkaller 2022/01/14 07:49:51 net packet injection: enabled 2022/01/14 07:49:51 net device setup: support is not implemented in syzkaller 2022/01/14 07:49:51 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:49:51 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:49:51 USB emulation: support is not implemented in syzkaller 2022/01/14 07:49:51 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:49:51 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:49:51 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:49:51 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:49:51 fetching corpus: 39, signal 3507/5884 (executing program) 2022/01/14 07:49:51 fetching corpus: 39, signal 3507/7063 (executing program) 2022/01/14 07:49:51 fetching corpus: 39, signal 3507/8235 (executing program) 2022/01/14 07:49:51 fetching corpus: 39, signal 3507/8586 (executing program) 2022/01/14 07:49:51 fetching corpus: 39, signal 3507/8586 (executing program) 2022/01/14 07:49:51 starting 8 fuzzer processes 07:49:51 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x12) getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) setegid(r0) setgroups(0x0, 0x0) setuid(0xee01) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 07:49:51 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x1d}, {0x81}, {0x6, 0x0, 0x0, 0xfd}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) write(r0, &(0x7f0000000080)="7cd23fc0aa17dddf7830faa1aaab", 0xe) 07:49:51 executing program 2: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xb, &(0x7f0000000040)='\x00\x00\x00\x00', 0x4) ioctl$BIOCSETIF(0xffffffffffffffff, 0xc0284416, &(0x7f00000000c0)={'tap', 0x0}) setsockopt(r0, 0x29, 0x800000000000009, &(0x7f00000000c0), 0x4) 07:49:51 executing program 3: r0 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$DIOCMAP(r0, 0xc0106477, &(0x7f0000000100)={0xffffffffffffffff}) 07:49:51 executing program 4: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@broadcast, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x29, 0x0, @multicast2, @rand_addr}, @udp={{0x1, 0x0, 0x8}}}}}}) 07:49:51 executing program 5: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FIOASYNC(r0, 0xc0104419, &(0x7f0000000100)=0x7d) 07:49:51 executing program 7: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{0x60}, {0x28}, {0x2006}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) syz_emit_ethernet(0xe, &(0x7f0000000080)) 07:49:51 executing program 6: syz_emit_ethernet(0x46, &(0x7f00000000c0)={@broadcast, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "9bb4d1", 0x10, 0x0, 0x0, @rand_addr="f9bfb3bada3e6b95a130b3cbf297733f", @local={0xfe, 0x80, '\x00', 0x0}, {[@routing={0x3c}], @udp={{0x2, 0x2, 0x8}}}}}}}) 07:49:52 executing program 3: r0 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$DIOCMAP(r0, 0xc0106477, &(0x7f0000000100)={0xffffffffffffffff}) 07:49:52 executing program 2: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xb, &(0x7f0000000040)='\x00\x00\x00\x00', 0x4) ioctl$BIOCSETIF(0xffffffffffffffff, 0xc0284416, &(0x7f00000000c0)={'tap', 0x0}) setsockopt(r0, 0x29, 0x800000000000009, &(0x7f00000000c0), 0x4) 07:49:52 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x12) getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) setegid(r0) setgroups(0x0, 0x0) setuid(0xee01) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 07:49:52 executing program 3: r0 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$DIOCMAP(r0, 0xc0106477, &(0x7f0000000100)={0xffffffffffffffff}) 07:49:52 executing program 2: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xb, &(0x7f0000000040)='\x00\x00\x00\x00', 0x4) ioctl$BIOCSETIF(0xffffffffffffffff, 0xc0284416, &(0x7f00000000c0)={'tap', 0x0}) setsockopt(r0, 0x29, 0x800000000000009, &(0x7f00000000c0), 0x4) 07:49:52 executing program 3: r0 = openat$diskmap(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$DIOCMAP(r0, 0xc0106477, &(0x7f0000000100)={0xffffffffffffffff}) 07:49:52 executing program 2: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xb, &(0x7f0000000040)='\x00\x00\x00\x00', 0x4) ioctl$BIOCSETIF(0xffffffffffffffff, 0xc0284416, &(0x7f00000000c0)={'tap', 0x0}) setsockopt(r0, 0x29, 0x800000000000009, &(0x7f00000000c0), 0x4) 07:49:52 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x12) getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) setegid(r0) setgroups(0x0, 0x0) setuid(0xee01) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 07:49:52 executing program 2: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xb, &(0x7f0000000040)='\x00\x00\x00\x00', 0x4) ioctl$BIOCSETIF(0xffffffffffffffff, 0xc0284416, &(0x7f00000000c0)={'tap', 0x0}) setsockopt(r0, 0x29, 0x800000000000009, &(0x7f00000000c0), 0x4) 07:49:52 executing program 0: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x12) getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) setegid(r0) setgroups(0x0, 0x0) setuid(0xee01) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 07:49:52 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f00000000c0)=[{0x1d}, {0x81}, {0x6, 0x0, 0x0, 0xfd}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) write(r0, &(0x7f0000000080)="7cd23fc0aa17dddf7830faa1aaab", 0xe) 07:49:52 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) chmod(&(0x7f0000000040)='./file0\x00', 0x12) getgroups(0x7, &(0x7f0000000200)=[0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0]) setegid(r0) setgroups(0x0, 0x0) setuid(0xee01) truncate(&(0x7f0000000000)='./file0\x00', 0x0) 2022/01/14 07:50:04 executor 5 failed 11 times: executor 5: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap5 (errno 2: No such file or directory) login: