Warning: Permanently added '10.128.1.116' (ED25519) to the list of known hosts. 2022/01/14 07:47:19 fuzzer started 2022/01/14 07:47:22 dialing manager at 10.128.15.235:5710 2022/01/14 07:47:22 syscalls: 387 2022/01/14 07:47:22 code coverage: enabled 2022/01/14 07:47:22 comparison tracing: enabled 2022/01/14 07:47:22 extra coverage: enabled 2022/01/14 07:47:22 delay kcov mmap: enabled 2022/01/14 07:47:22 setuid sandbox: enabled 2022/01/14 07:47:22 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:47:22 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:47:22 fault injection: support is not implemented in syzkaller 2022/01/14 07:47:22 leak checking: support is not implemented in syzkaller 2022/01/14 07:47:22 net packet injection: enabled 2022/01/14 07:47:22 net device setup: support is not implemented in syzkaller 2022/01/14 07:47:22 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:47:22 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:47:22 USB emulation: support is not implemented in syzkaller 2022/01/14 07:47:22 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:47:22 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:47:22 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:47:22 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:47:22 fetching corpus: 10, signal 1209/2818 (executing program) 2022/01/14 07:47:22 fetching corpus: 10, signal 1209/2818 (executing program) 2022/01/14 07:47:22 starting 8 fuzzer processes 07:47:22 executing program 0: symlinkat(&(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') unveil(&(0x7f0000000040)='./file0/file0/..\x00', &(0x7f0000000080)='r\x00') unveil(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='c\x00') chmod(&(0x7f0000000280)='./file0\x00', 0x0) 07:47:22 executing program 1: r0 = openat$speaker(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='A+', 0x2}], 0x1, 0x0) 07:47:22 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f00000001c0)=[{0x45}, {0x84}, {0x6, 0x0, 0x0, 0x7f}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) pwrite(r0, &(0x7f0000000180)="ad0200000000000000bb0000e8c1", 0xe, 0x0) 07:47:22 executing program 5: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0xee) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x2, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$TIOCFLUSH(r4, 0xc0206937, &(0x7f0000000300)) 07:47:22 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x0, 0x0) fchdir(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sysctl$kern(&(0x7f0000000280)={0x1, 0x4e}, 0x3, &(0x7f00000002c0)="11ab71df", &(0x7f0000000000)=0x4, 0x0, 0x0) 07:47:22 executing program 4: syz_emit_ethernet(0x7e, &(0x7f0000000080)={@random="57d953b0b8b1", @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x70, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr}, @icmp=@parameter_prob={0xc, 0x0, 0x0, 0x0, 0x0, 0x0, {0x15, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @empty, @empty, {[@timestamp={0x44, 0x4}, @lsrr={0x83, 0x13, 0x0, [@multicast1, @empty, @multicast2, @loopback]}, @ssrr={0x89, 0x13, 0x0, [@rand_addr, @multicast2, @broadcast, @loopback]}, @rr={0x7, 0x13, 0x0, [@local={0xac, 0x14, 0x0}, @local={0xac, 0x14, 0x0}, @broadcast, @multicast1]}]}}}}}}}) 07:47:22 executing program 7: mknodat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1000, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) ktrace(&(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0) flock(r0, 0x2) close(r0) 07:47:22 executing program 6: setrlimit(0x8, &(0x7f0000000100)={0x8, 0xb}) r0 = syz_open_pts() close(r0) r1 = syz_open_pts() ioctl$TIOCSETAF(r1, 0x802c7416, &(0x7f0000000000)={0x97ac, 0x0, 0xfffffff5, 0xffffff78, "560400800300e500000100008d1b82834700"}) write(r0, &(0x7f0000000480)="2abb8a6df96f07fe2ddfef32ff450877652a3ce718ebdb5fcc2bb0f084f9d8a73c45a12d46efcf6e1c1d0bb67f475a9fe7e34433ca7d190a0d5c939d80e29f490c3c42e49866289b", 0x48) ioctl$TIOCSETAF(r1, 0x802c7416, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, "7d336be4a6a259e7bf38e7557162ac596ddfbfc2"}) close(r0) 07:47:23 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f00000001c0)=[{0x45}, {0x84}, {0x6, 0x0, 0x0, 0x7f}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) pwrite(r0, &(0x7f0000000180)="ad0200000000000000bb0000e8c1", 0xe, 0x0) 07:47:23 executing program 0: symlinkat(&(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') unveil(&(0x7f0000000040)='./file0/file0/..\x00', &(0x7f0000000080)='r\x00') unveil(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='c\x00') chmod(&(0x7f0000000280)='./file0\x00', 0x0) 07:47:23 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f00000001c0)=[{0x45}, {0x84}, {0x6, 0x0, 0x0, 0x7f}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) pwrite(r0, &(0x7f0000000180)="ad0200000000000000bb0000e8c1", 0xe, 0x0) 07:47:23 executing program 0: symlinkat(&(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') unveil(&(0x7f0000000040)='./file0/file0/..\x00', &(0x7f0000000080)='r\x00') unveil(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='c\x00') chmod(&(0x7f0000000280)='./file0\x00', 0x0) 07:47:23 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f00000001c0)=[{0x45}, {0x84}, {0x6, 0x0, 0x0, 0x7f}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) pwrite(r0, &(0x7f0000000180)="ad0200000000000000bb0000e8c1", 0xe, 0x0) 07:47:23 executing program 0: symlinkat(&(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') unveil(&(0x7f0000000040)='./file0/file0/..\x00', &(0x7f0000000080)='r\x00') unveil(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='c\x00') chmod(&(0x7f0000000280)='./file0\x00', 0x0) 07:47:23 executing program 2: symlinkat(&(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') unveil(&(0x7f0000000040)='./file0/file0/..\x00', &(0x7f0000000080)='r\x00') unveil(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='c\x00') chmod(&(0x7f0000000280)='./file0\x00', 0x0) 07:47:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x0, 0x0) fchdir(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sysctl$kern(&(0x7f0000000280)={0x1, 0x4e}, 0x3, &(0x7f00000002c0)="11ab71df", &(0x7f0000000000)=0x4, 0x0, 0x0) 07:47:23 executing program 2: symlinkat(&(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') unveil(&(0x7f0000000040)='./file0/file0/..\x00', &(0x7f0000000080)='r\x00') unveil(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000180)='c\x00') chmod(&(0x7f0000000280)='./file0\x00', 0x0) 07:47:23 executing program 1: r0 = openat$speaker(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) pwritev(r0, &(0x7f0000000100)=[{&(0x7f0000000000)='A+', 0x2}], 0x1, 0x0) 07:47:23 executing program 3: r0 = openat(0xffffffffffffffff, &(0x7f0000000080)='/', 0x0, 0x0) fchdir(r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockopt$sock_cred(r1, 0xffff, 0x1022, &(0x7f0000000280), &(0x7f00000002c0)=0xc) sysctl$kern(&(0x7f0000000280)={0x1, 0x4e}, 0x3, &(0x7f00000002c0)="11ab71df", &(0x7f0000000000)=0x4, 0x0, 0x0) 2022/01/14 07:47:34 executor 5 failed 11 times: executor 5: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap5 (errno 2: No such file or directory)