Warning: Permanently added '10.128.0.109' (ED25519) to the list of known hosts. 2022/01/14 07:49:35 fuzzer started 2022/01/14 07:49:38 dialing manager at 10.128.15.235:5710 2022/01/14 07:49:38 syscalls: 387 2022/01/14 07:49:38 code coverage: enabled 2022/01/14 07:49:38 comparison tracing: enabled 2022/01/14 07:49:38 extra coverage: enabled 2022/01/14 07:49:38 delay kcov mmap: enabled 2022/01/14 07:49:38 setuid sandbox: enabled 2022/01/14 07:49:38 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:49:38 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:49:38 fault injection: support is not implemented in syzkaller 2022/01/14 07:49:38 leak checking: support is not implemented in syzkaller 2022/01/14 07:49:38 net packet injection: enabled 2022/01/14 07:49:38 net device setup: support is not implemented in syzkaller 2022/01/14 07:49:38 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:49:38 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:49:38 USB emulation: support is not implemented in syzkaller 2022/01/14 07:49:38 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:49:38 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:49:38 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:49:38 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:49:38 fetching corpus: 35, signal 3174/5520 (executing program) 2022/01/14 07:49:38 fetching corpus: 35, signal 3174/6730 (executing program) 2022/01/14 07:49:38 fetching corpus: 35, signal 3174/7817 (executing program) 2022/01/14 07:49:38 fetching corpus: 35, signal 3174/7817 (executing program) 2022/01/14 07:49:38 starting 8 fuzzer processes 07:49:38 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x0}, 0x8, 0x0}, 0x0) ioctl$TIOCSETAF(0xffffffffffffff9c, 0x802c7416, &(0x7f00000000c0)={0x0, 0x0, 0x5ff, 0x0, "d730c15b00f4ff0000747beffde400"}) r0 = socket(0x18, 0x1, 0x0) close(r0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x2, 0x0) setsockopt(r1, 0x29, 0x9, &(0x7f0000000080)='\x00\x00\x00\x00', 0x4) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 07:49:38 executing program 1: mlock(&(0x7f0000ff8000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ff9000/0x1000)=nil, 0x1000) mquery(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:49:38 executing program 2: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x0) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) pipe(&(0x7f0000000040)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r1 = socket(0x18, 0x1, 0x0) close(r1) r2 = socket(0x18, 0x2, 0x0) close(r2) socket(0x400000000018, 0x3, 0x3a) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r2, &(0x7f0000000040)="100a2956b9223776", 0x21d) 07:49:38 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) r0 = open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f00000000c0)=[{{r0}, 0xfffffffffffffff8, 0x49}], 0x5, 0x0, 0x9, 0x0) 07:49:38 executing program 4: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000340), 0x201, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x4, &(0x7f0000000040)=[{0x54}, {0x4}, {0x6, 0x0, 0x0, 0xfff}, {0x9956}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) pwrite(r0, &(0x7f0000000240)="fbaf8a8d1a029be96914f6357e3a", 0x3a, 0x0) 07:49:38 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000340), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000001c0)={0x3, &(0x7f0000000380)=[{0x44}, {0x4d}, {0x6, 0x0, 0x0, 0xffff0000}]}) pwrite(r0, &(0x7f0000000180)="f781ea80e21bb6f576c45af84a28", 0xe, 0x0) 07:49:38 executing program 6: openat$pci(0xffffffffffffff9c, &(0x7f0000000080), 0x345, 0x0) 07:49:38 executing program 7: pledge(0x0, 0x0) 07:49:39 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x0}, 0x8, 0x0}, 0x0) ioctl$TIOCSETAF(0xffffffffffffff9c, 0x802c7416, &(0x7f00000000c0)={0x0, 0x0, 0x5ff, 0x0, "d730c15b00f4ff0000747beffde400"}) r0 = socket(0x18, 0x1, 0x0) close(r0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x2, 0x0) setsockopt(r1, 0x29, 0x9, &(0x7f0000000080)='\x00\x00\x00\x00', 0x4) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 07:49:39 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x0}, 0x8, 0x0}, 0x0) ioctl$TIOCSETAF(0xffffffffffffff9c, 0x802c7416, &(0x7f00000000c0)={0x0, 0x0, 0x5ff, 0x0, "d730c15b00f4ff0000747beffde400"}) r0 = socket(0x18, 0x1, 0x0) close(r0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x2, 0x0) setsockopt(r1, 0x29, 0x9, &(0x7f0000000080)='\x00\x00\x00\x00', 0x4) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 07:49:39 executing program 1: mlock(&(0x7f0000ff8000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ff9000/0x1000)=nil, 0x1000) mquery(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:49:39 executing program 0: sendmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000080)=@abs={0x1, 0x0, 0x0}, 0x8, 0x0}, 0x0) ioctl$TIOCSETAF(0xffffffffffffff9c, 0x802c7416, &(0x7f00000000c0)={0x0, 0x0, 0x5ff, 0x0, "d730c15b00f4ff0000747beffde400"}) r0 = socket(0x18, 0x1, 0x0) close(r0) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x2, 0x0) setsockopt(r1, 0x29, 0x9, &(0x7f0000000080)='\x00\x00\x00\x00', 0x4) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) 07:49:39 executing program 1: mlock(&(0x7f0000ff8000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ff9000/0x1000)=nil, 0x1000) mquery(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:49:39 executing program 1: mlock(&(0x7f0000ff8000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ff9000/0x1000)=nil, 0x1000) mquery(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:49:39 executing program 0: mlock(&(0x7f0000ff8000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ff9000/0x1000)=nil, 0x1000) mquery(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:49:39 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) r0 = open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f00000000c0)=[{{r0}, 0xfffffffffffffff8, 0x49}], 0x5, 0x0, 0x9, 0x0) 07:49:39 executing program 1: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) r0 = open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f00000000c0)=[{{r0}, 0xfffffffffffffff8, 0x49}], 0x5, 0x0, 0x9, 0x0) 07:49:39 executing program 0: mlock(&(0x7f0000ff8000/0x3000)=nil, 0x3000) munmap(&(0x7f0000ff9000/0x1000)=nil, 0x1000) mquery(&(0x7f0000ff9000/0x2000)=nil, 0x2000, 0x0, 0x0, 0xffffffffffffffff, 0x0) 07:49:40 executing program 3: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) r0 = open(&(0x7f00000005c0)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000600)='./file0\x00', 0x0, 0x0, 0x0) r1 = kqueue() kevent(r1, &(0x7f00000000c0)=[{{r0}, 0xfffffffffffffff8, 0x49}], 0x5, 0x0, 0x9, 0x0) 07:49:40 executing program 2: select(0x0, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x0) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) pipe(&(0x7f0000000040)) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r1 = socket(0x18, 0x1, 0x0) close(r1) r2 = socket(0x18, 0x2, 0x0) close(r2) socket(0x400000000018, 0x3, 0x3a) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r2, &(0x7f0000000040)="100a2956b9223776", 0x21d) 2022/01/14 07:49:51 executor 7 failed 11 times: executor 7: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap7 (errno 2: No such file or directory)