Warning: Permanently added '10.128.0.115' (ED25519) to the list of known hosts. 2022/01/14 07:49:44 fuzzer started 2022/01/14 07:49:46 dialing manager at 10.128.15.235:35213 2022/01/14 07:49:46 syscalls: 387 2022/01/14 07:49:46 code coverage: enabled 2022/01/14 07:49:46 comparison tracing: enabled 2022/01/14 07:49:46 extra coverage: enabled 2022/01/14 07:49:46 delay kcov mmap: enabled 2022/01/14 07:49:46 setuid sandbox: enabled 2022/01/14 07:49:46 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:49:46 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:49:46 fault injection: support is not implemented in syzkaller 2022/01/14 07:49:46 leak checking: support is not implemented in syzkaller 2022/01/14 07:49:46 net packet injection: enabled 2022/01/14 07:49:46 net device setup: support is not implemented in syzkaller 2022/01/14 07:49:46 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:49:46 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:49:46 USB emulation: support is not implemented in syzkaller 2022/01/14 07:49:46 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:49:46 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:49:46 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:49:46 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:49:46 fetching corpus: 39, signal 2777/5485 (executing program) 2022/01/14 07:49:46 fetching corpus: 39, signal 2777/6850 (executing program) 2022/01/14 07:49:46 fetching corpus: 39, signal 2777/8212 (executing program) 2022/01/14 07:49:46 fetching corpus: 39, signal 2777/8657 (executing program) 2022/01/14 07:49:46 fetching corpus: 39, signal 2777/8657 (executing program) 2022/01/14 07:49:46 starting 8 fuzzer processes 07:49:46 executing program 4: setrlimit(0x8, &(0x7f0000000040)={0x7, 0x8}) r0 = syz_open_pts() close(r0) r1 = syz_open_pts() ioctl$TIOCSETAF(r1, 0x802c7416, &(0x7f0000000000)={0x0, 0xf4b, 0x4009, 0x1fc80588, "e3904da500980400"}) writev(r0, &(0x7f0000000700)=[{&(0x7f0000000500)="e77ec314b5f4bd6d8617eaecef8326bfb2559a886e85113cf4730204", 0x1c}], 0x1) 07:49:46 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="90c3fe67eb586898600425f2f573e0d1ac83c18d65c8e22066c0d389fe894a974c8d45aaf9d2e7ae9fed58938ea6ac68a0b0632688ca0fab3647175abf22fea120c9b3bb77ca60c128295bf234505356095dbf9e50a4a5079723b57fed8ef0a251b91e67e1f5d347d5b668a390a25beea3962e7c10b8d9f53f5c82b5eacc26757d14f2fa6be9a2cbb2cfacc5e940c4495e2177cb06dfd1e3208364bbc454327b6a1522c332ea628b8cb672e9e7247818f970e017c7cb9303", 0xb8}, {&(0x7f00000002c0)="12ffffff6e5d2110444faf1535", 0xd}], 0x2, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = socket(0x2, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r2, 0x8020697a, &(0x7f00000000c0)) 07:49:46 executing program 1: r0 = kqueue() r1 = socket$unix(0x1, 0x2, 0x0) kevent(r0, &(0x7f0000000000)=[{{r1}, 0xffffffffffffffff, 0x11}], 0x8, 0x0, 0x0, 0x0) kevent(r0, &(0x7f00000002c0)=[{{}, 0xfffffffffffffff9, 0x21}, {{}, 0xfffffffffffffffa, 0x5}, {{r1}, 0xfffffffffffffffe, 0x8d}, {{r1}, 0xfffffffffffffffe, 0x57, 0x1}], 0x80, 0x0, 0x4900, 0x0) 07:49:46 executing program 2: sysctl$kern(&(0x7f0000000000)={0x1, 0x4}, 0x2, &(0x7f0000000080)="25a37e7bfe10a873d0317835187cb4b76a487eac8ca2baba326bb3aabcf8cda5f562cab3ff0cf238940236b8ff197d933aa663614ce3f6232df7cd491d7cf1ebcc6ea324f656d291e56b277eed43e151a32afe63741b551d2331f436c2875d6336d6a2251725fef37024468f773e797b818481a5bc3a7baeaf5a937b86ed652b4fbd8dc80957b6aa985dfe51e31a0bdd6d0e1df31acbeb2a1b77e52af6be07a4af4e8eb1b198d5f395a55851", &(0x7f0000000180)=0xac, 0x0, 0x0) 07:49:46 executing program 3: seteuid(0xffffffffffffffff) setuid(0xffffffffffffffff) r0 = semget$private(0x0, 0x2, 0x189) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) semop(r0, &(0x7f00000002c0), 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000480)={{0x2000000f, r1, 0x0, 0x0, 0x0, 0x100010024, 0x207}, 0xfffffffffffffffb, 0x7, 0x2}) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000003c0)=""/168) semctl$GETZCNT(r0, 0x2, 0x7, &(0x7f0000000200)=""/224) geteuid() 07:49:46 executing program 5: ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={{}, {[], [], [], [], [{}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x101}]}}}) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x6) r1 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FIOASYNC(r1, 0xcd604407, &(0x7f0000000240)) 07:49:46 executing program 6: r0 = syz_open_pts() ioctl$TIOCSETA(r0, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "263e8983e464da1988b371ae438122a1364287ce", 0xf0000000}) 07:49:46 executing program 7: r0 = socket(0x11, 0x3, 0x0) r1 = socket(0x11, 0x3, 0x0) setsockopt(r1, 0x20000000000011, 0x3, &(0x7f00000000c0)="18000000", 0x4) sendto$unix(r0, &(0x7f0000000000)="b100050400000000000008000101000000000000cea1fea7fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acbdd602000d7d026ba8af63ff37282902e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c8943310b404f36a00f90006ee01bc43eaea8c500000002000000000000020208a371a3f80004000000000000000100"/177, 0xb1, 0x0, 0x0, 0x0) 07:49:46 executing program 2: sysctl$kern(&(0x7f0000000000)={0x1, 0x4}, 0x2, &(0x7f0000000080)="25a37e7bfe10a873d0317835187cb4b76a487eac8ca2baba326bb3aabcf8cda5f562cab3ff0cf238940236b8ff197d933aa663614ce3f6232df7cd491d7cf1ebcc6ea324f656d291e56b277eed43e151a32afe63741b551d2331f436c2875d6336d6a2251725fef37024468f773e797b818481a5bc3a7baeaf5a937b86ed652b4fbd8dc80957b6aa985dfe51e31a0bdd6d0e1df31acbeb2a1b77e52af6be07a4af4e8eb1b198d5f395a55851", &(0x7f0000000180)=0xac, 0x0, 0x0) 07:49:46 executing program 2: sysctl$kern(&(0x7f0000000000)={0x1, 0x4}, 0x2, &(0x7f0000000080)="25a37e7bfe10a873d0317835187cb4b76a487eac8ca2baba326bb3aabcf8cda5f562cab3ff0cf238940236b8ff197d933aa663614ce3f6232df7cd491d7cf1ebcc6ea324f656d291e56b277eed43e151a32afe63741b551d2331f436c2875d6336d6a2251725fef37024468f773e797b818481a5bc3a7baeaf5a937b86ed652b4fbd8dc80957b6aa985dfe51e31a0bdd6d0e1df31acbeb2a1b77e52af6be07a4af4e8eb1b198d5f395a55851", &(0x7f0000000180)=0xac, 0x0, 0x0) 07:49:46 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="90c3fe67eb586898600425f2f573e0d1ac83c18d65c8e22066c0d389fe894a974c8d45aaf9d2e7ae9fed58938ea6ac68a0b0632688ca0fab3647175abf22fea120c9b3bb77ca60c128295bf234505356095dbf9e50a4a5079723b57fed8ef0a251b91e67e1f5d347d5b668a390a25beea3962e7c10b8d9f53f5c82b5eacc26757d14f2fa6be9a2cbb2cfacc5e940c4495e2177cb06dfd1e3208364bbc454327b6a1522c332ea628b8cb672e9e7247818f970e017c7cb9303", 0xb8}, {&(0x7f00000002c0)="12ffffff6e5d2110444faf1535", 0xd}], 0x2, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = socket(0x2, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r2, 0x8020697a, &(0x7f00000000c0)) 07:49:46 executing program 2: sysctl$kern(&(0x7f0000000000)={0x1, 0x4}, 0x2, &(0x7f0000000080)="25a37e7bfe10a873d0317835187cb4b76a487eac8ca2baba326bb3aabcf8cda5f562cab3ff0cf238940236b8ff197d933aa663614ce3f6232df7cd491d7cf1ebcc6ea324f656d291e56b277eed43e151a32afe63741b551d2331f436c2875d6336d6a2251725fef37024468f773e797b818481a5bc3a7baeaf5a937b86ed652b4fbd8dc80957b6aa985dfe51e31a0bdd6d0e1df31acbeb2a1b77e52af6be07a4af4e8eb1b198d5f395a55851", &(0x7f0000000180)=0xac, 0x0, 0x0) 07:49:46 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="90c3fe67eb586898600425f2f573e0d1ac83c18d65c8e22066c0d389fe894a974c8d45aaf9d2e7ae9fed58938ea6ac68a0b0632688ca0fab3647175abf22fea120c9b3bb77ca60c128295bf234505356095dbf9e50a4a5079723b57fed8ef0a251b91e67e1f5d347d5b668a390a25beea3962e7c10b8d9f53f5c82b5eacc26757d14f2fa6be9a2cbb2cfacc5e940c4495e2177cb06dfd1e3208364bbc454327b6a1522c332ea628b8cb672e9e7247818f970e017c7cb9303", 0xb8}, {&(0x7f00000002c0)="12ffffff6e5d2110444faf1535", 0xd}], 0x2, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = socket(0x2, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r2, 0x8020697a, &(0x7f00000000c0)) 07:49:46 executing program 3: seteuid(0xffffffffffffffff) setuid(0xffffffffffffffff) r0 = semget$private(0x0, 0x2, 0x189) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) semop(r0, &(0x7f00000002c0), 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000480)={{0x2000000f, r1, 0x0, 0x0, 0x0, 0x100010024, 0x207}, 0xfffffffffffffffb, 0x7, 0x2}) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000003c0)=""/168) semctl$GETZCNT(r0, 0x2, 0x7, &(0x7f0000000200)=""/224) geteuid() 07:49:46 executing program 0: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) pwritev(r0, &(0x7f0000000000)=[{&(0x7f0000000140)="90c3fe67eb586898600425f2f573e0d1ac83c18d65c8e22066c0d389fe894a974c8d45aaf9d2e7ae9fed58938ea6ac68a0b0632688ca0fab3647175abf22fea120c9b3bb77ca60c128295bf234505356095dbf9e50a4a5079723b57fed8ef0a251b91e67e1f5d347d5b668a390a25beea3962e7c10b8d9f53f5c82b5eacc26757d14f2fa6be9a2cbb2cfacc5e940c4495e2177cb06dfd1e3208364bbc454327b6a1522c332ea628b8cb672e9e7247818f970e017c7cb9303", 0xb8}, {&(0x7f00000002c0)="12ffffff6e5d2110444faf1535", 0xd}], 0x2, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = socket(0x2, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r2, 0x8020697a, &(0x7f00000000c0)) 07:49:46 executing program 2: seteuid(0xffffffffffffffff) setuid(0xffffffffffffffff) r0 = semget$private(0x0, 0x2, 0x189) getsockopt$sock_cred(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000300)={0x0, 0x0}, &(0x7f0000000340)=0xc) semop(r0, &(0x7f00000002c0), 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000480)={{0x2000000f, r1, 0x0, 0x0, 0x0, 0x100010024, 0x207}, 0xfffffffffffffffb, 0x7, 0x2}) semctl$IPC_STAT(r0, 0x0, 0x2, &(0x7f00000003c0)=""/168) semctl$GETZCNT(r0, 0x2, 0x7, &(0x7f0000000200)=""/224) geteuid() 2022/01/14 07:49:58 executor 4 failed 11 times: executor 4: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory)