2018/07/23 19:29:59 fuzzer started 2018/07/23 19:29:59 dialing manager at 127.0.0.1:42615 2018/07/23 19:29:59 syscalls: 213 2018/07/23 19:29:59 code coverage: support is not implemented in syzkaller 2018/07/23 19:29:59 comparison tracing: support is not implemented in syzkaller 2018/07/23 19:29:59 setuid sandbox: support is not implemented in syzkaller 2018/07/23 19:29:59 namespace sandbox: support is not implemented in syzkaller 2018/07/23 19:29:59 fault injection: support is not implemented in syzkaller 2018/07/23 19:29:59 leak checking: support is not implemented in syzkaller 2018/07/23 19:29:59 net packed injection: support is not implemented in syzkaller 2018/07/23 19:29:59 net device setup: support is not implemented in syzkaller 19:29:59 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8, 0x40, 0xffbffffffffbffff) 19:29:59 executing program 1: r0 = openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) fcntl$F_GETFL(r0, 0x3) 19:29:59 executing program 2: openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) 19:29:59 executing program 3: r0 = openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) fd2path(r0, &(0x7f0000000180)=""/249, 0xf9) 19:29:59 executing program 4: r0 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) tcgetattr(r0, &(0x7f00000000c0)) 19:29:59 executing program 5: r0 = openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) fstat(r0, &(0x7f00000007c0)) 19:29:59 executing program 6: r0 = openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipselftab\x00', 0xf, 0x1, 0x0) fd2path(r0, &(0x7f0000000080)=""/60, 0x3c) 19:29:59 executing program 7: r0 = openat$dev_bintime(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bintime\x00', 0xd, 0x3, 0x0) fstat(r0, &(0x7f0000000200)) 19:30:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8, 0x40, 0xffbffffffffbffff) 19:30:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8, 0x40, 0xffbffffffffbffff) 19:30:00 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8, 0x40, 0xffbffffffffbffff) 19:30:00 executing program 0: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:30:00 executing program 0: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:30:00 executing program 0: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:30:00 executing program 0: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) 19:30:00 executing program 0: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000004, 0x8832, 0xffffffffffffff9c, 0x0) nbind(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 19:30:00 executing program 0: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000004, 0x8832, 0xffffffffffffff9c, 0x0) nbind(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 19:30:01 executing program 1: r0 = openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) fcntl$F_GETFL(r0, 0x3) 19:30:02 executing program 2: openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) 19:30:03 executing program 3: r0 = openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) fd2path(r0, &(0x7f0000000180)=""/249, 0xf9) 19:30:04 executing program 4: r0 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) tcgetattr(r0, &(0x7f00000000c0)) 19:30:05 executing program 0: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000004, 0x8832, 0xffffffffffffff9c, 0x0) nbind(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 19:30:06 executing program 2: openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) 19:30:07 executing program 7: r0 = openat$dev_bintime(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bintime\x00', 0xd, 0x3, 0x0) fstat(r0, &(0x7f0000000200)) 19:30:07 executing program 6: r0 = openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipselftab\x00', 0xf, 0x1, 0x0) fd2path(r0, &(0x7f0000000080)=""/60, 0x3c) 19:30:07 executing program 0: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000004, 0x8832, 0xffffffffffffff9c, 0x0) nbind(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='./file0\x00', 0x8, 0x0) 19:30:07 executing program 1: r0 = openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) fcntl$F_GETFL(r0, 0x3) 19:30:07 executing program 5: r0 = openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) fstat(r0, &(0x7f00000007c0)) 19:30:07 executing program 1: r0 = openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) fcntl$F_GETFL(r0, 0x3) 19:30:07 executing program 3: r0 = openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) fd2path(r0, &(0x7f0000000180)=""/249, 0xf9) 19:30:07 executing program 2: openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) 19:30:07 executing program 4: r0 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) tcgetattr(r0, &(0x7f00000000c0)) 19:30:07 executing program 0: openat$proc_self_strace_traceset(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/strace_traceset\x00', 0x1b, 0x3, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x4) openat$net_ipifc_0_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ipifc/0/ctl\x00', 0x11, 0x3, 0x0) 19:30:07 executing program 6: r0 = openat$net_ipselftab(0xffffffffffffff9c, &(0x7f0000000000)='/net/ipselftab\x00', 0xf, 0x1, 0x0) fd2path(r0, &(0x7f0000000080)=""/60, 0x3c) 19:30:07 executing program 5: r0 = openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) fstat(r0, &(0x7f00000007c0)) 19:30:07 executing program 4: r0 = openat$dev_sysname(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sysname\x00', 0xd, 0x3, 0x0) tcgetattr(r0, &(0x7f00000000c0)) 19:30:07 executing program 3: r0 = openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000140)='/net/udp/0/remote\x00', 0x12, 0x1, 0x0) fd2path(r0, &(0x7f0000000180)=""/249, 0xf9) 19:30:07 executing program 2: r0 = openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/0/data\x00', 0x13, 0x3, 0x0) fcntl$F_GETFL(r0, 0x3) 19:30:07 executing program 7: r0 = openat$dev_bintime(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/bintime\x00', 0xd, 0x3, 0x0) fstat(r0, &(0x7f0000000200)) 2018/07/23 19:30:07 executor failed 0 times: executor 1: failed: Warning: Permanently added '[localhost]:45243' (RSA) to the list of known hosts. bad input size 664, want 304 (errno 0) child failed (errno 0)