Warning: Permanently added '10.128.1.4' (ED25519) to the list of known hosts. 2022/01/14 07:47:41 fuzzer started 2022/01/14 07:47:43 dialing manager at 10.128.15.235:5710 2022/01/14 07:47:43 syscalls: 387 2022/01/14 07:47:43 code coverage: enabled 2022/01/14 07:47:43 comparison tracing: enabled 2022/01/14 07:47:43 extra coverage: enabled 2022/01/14 07:47:43 delay kcov mmap: enabled 2022/01/14 07:47:43 setuid sandbox: enabled 2022/01/14 07:47:43 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:47:43 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:47:43 fault injection: support is not implemented in syzkaller 2022/01/14 07:47:43 leak checking: support is not implemented in syzkaller 2022/01/14 07:47:43 net packet injection: enabled 2022/01/14 07:47:43 net device setup: support is not implemented in syzkaller 2022/01/14 07:47:43 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:47:43 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:47:43 USB emulation: support is not implemented in syzkaller 2022/01/14 07:47:43 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:47:43 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:47:43 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:47:43 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:47:43 fetching corpus: 10, signal 1236/3788 (executing program) 2022/01/14 07:47:43 fetching corpus: 10, signal 1236/3788 (executing program) 2022/01/14 07:47:43 starting 8 fuzzer processes 07:47:43 executing program 0: ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000020f]}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) r1 = socket(0x2, 0x4001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCFLUSH(r2, 0x8020690e, &(0x7f0000000300)) 07:47:43 executing program 1: r0 = socket(0x2, 0x10000000000003, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r1, 0x0, 0x100000000000000a, &(0x7f0000000080)='\x00', 0x1) connect$unix(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="8202ddffffffffff"], 0x10) r2 = dup(r0) r3 = dup2(r2, r2) write(r3, 0x0, 0x0) writev(r2, &(0x7f0000000180)=[{0x0}], 0x1) 07:47:43 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000040)=[{0x28}, {0x35}, {0x6, 0x0, 0x0, 0x1df}]}) pwrite(r0, &(0x7f0000000140)="8cac85bdc9509de10ba252df728c", 0xe, 0x0) 07:47:43 executing program 3: r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x800000000, 0x0, 0x2812, r0, 0x0) 07:47:43 executing program 4: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x242, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x81}, {0x24}, {0x6, 0x0, 0x0, 0x400}]}) pwrite(r0, &(0x7f00000001c0)="e7007b0000000000000000235609", 0xe, 0x0) 07:47:43 executing program 5: sysctl$hw(&(0x7f00000000c0)={0x6, 0x9}, 0x2, &(0x7f0000000380), 0x0, 0x0, 0x0) 07:47:44 executing program 6: mknod(&(0x7f0000000140)='./file0\x00', 0x1000, 0x0) open(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) open(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000080), 0x0, &(0x7f0000000100)={0xff}, 0x0) select(0x40, &(0x7f00000000c0)={0xfffffffe}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x6}, 0x0, 0x0) 07:47:44 executing program 7: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) ioctl$FIOASYNC(r0, 0xc450443c, &(0x7f0000000180)) 07:47:44 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000040)=[{0x28}, {0x35}, {0x6, 0x0, 0x0, 0x1df}]}) pwrite(r0, &(0x7f0000000140)="8cac85bdc9509de10ba252df728c", 0xe, 0x0) 07:47:44 executing program 0: ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000020f]}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) r1 = socket(0x2, 0x4001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCFLUSH(r2, 0x8020690e, &(0x7f0000000300)) 07:47:44 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000040)=[{0x28}, {0x35}, {0x6, 0x0, 0x0, 0x1df}]}) pwrite(r0, &(0x7f0000000140)="8cac85bdc9509de10ba252df728c", 0xe, 0x0) 07:47:44 executing program 0: ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000020f]}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) r1 = socket(0x2, 0x4001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCFLUSH(r2, 0x8020690e, &(0x7f0000000300)) 07:47:44 executing program 3: r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x800000000, 0x0, 0x2812, r0, 0x0) 07:47:44 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000040)=[{0x28}, {0x35}, {0x6, 0x0, 0x0, 0x1df}]}) pwrite(r0, &(0x7f0000000140)="8cac85bdc9509de10ba252df728c", 0xe, 0x0) 07:47:44 executing program 0: ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f0000000240)={0x0, 0x0, 0x0, {[], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000020f]}}) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) r1 = socket(0x2, 0x4001, 0x0) r2 = fcntl$dupfd(r1, 0x0, r0) ioctl$TIOCFLUSH(r2, 0x8020690e, &(0x7f0000000300)) 07:47:44 executing program 3: r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x800000000, 0x0, 0x2812, r0, 0x0) 07:47:44 executing program 0: r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x800000000, 0x0, 0x2812, r0, 0x0) 07:47:44 executing program 1: r0 = socket(0x2, 0x10000000000003, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r1, 0x0, 0x100000000000000a, &(0x7f0000000080)='\x00', 0x1) connect$unix(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="8202ddffffffffff"], 0x10) r2 = dup(r0) r3 = dup2(r2, r2) write(r3, 0x0, 0x0) writev(r2, &(0x7f0000000180)=[{0x0}], 0x1) 07:47:44 executing program 0: r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x800000000, 0x0, 0x2812, r0, 0x0) 07:47:44 executing program 1: r0 = socket(0x2, 0x10000000000003, 0x0) close(r0) r1 = socket$inet(0x2, 0x3, 0x0) setsockopt$inet_opts(r1, 0x0, 0x100000000000000a, &(0x7f0000000080)='\x00', 0x1) connect$unix(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="8202ddffffffffff"], 0x10) r2 = dup(r0) r3 = dup2(r2, r2) write(r3, 0x0, 0x0) writev(r2, &(0x7f0000000180)=[{0x0}], 0x1) 2022/01/14 07:47:57 executor 4 failed 11 times: executor 4: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory) login: