Warning: Permanently added '10.128.0.146' (ED25519) to the list of known hosts. 2022/01/14 07:50:13 fuzzer started 2022/01/14 07:50:14 dialing manager at 10.128.15.235:35213 2022/01/14 07:50:15 syscalls: 387 2022/01/14 07:50:15 code coverage: enabled 2022/01/14 07:50:15 comparison tracing: enabled 2022/01/14 07:50:15 extra coverage: enabled 2022/01/14 07:50:15 delay kcov mmap: enabled 2022/01/14 07:50:15 setuid sandbox: enabled 2022/01/14 07:50:15 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:50:15 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:50:15 fault injection: support is not implemented in syzkaller 2022/01/14 07:50:15 leak checking: support is not implemented in syzkaller 2022/01/14 07:50:15 net packet injection: enabled 2022/01/14 07:50:15 net device setup: support is not implemented in syzkaller 2022/01/14 07:50:15 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:50:15 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:50:15 USB emulation: support is not implemented in syzkaller 2022/01/14 07:50:15 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:50:15 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:50:15 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:50:15 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:50:15 fetching corpus: 44, signal 2983/5698 (executing program) 2022/01/14 07:50:15 fetching corpus: 44, signal 2983/7007 (executing program) 2022/01/14 07:50:15 fetching corpus: 44, signal 2983/8337 (executing program) 2022/01/14 07:50:15 fetching corpus: 44, signal 2983/8992 (executing program) 2022/01/14 07:50:15 fetching corpus: 44, signal 2983/8992 (executing program) 2022/01/14 07:50:15 starting 8 fuzzer processes 07:50:15 executing program 0: mknod(&(0x7f0000000240)='./file0\x00', 0x800080002002, 0x5bc9) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) select(0x40, &(0x7f00000000c0), &(0x7f0000000140)={0x9}, 0x0, 0x0) close(r0) 07:50:15 executing program 4: mknod(&(0x7f0000000180)='./file0\x00', 0x1ffb, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x2, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) fcntl$lock(r1, 0x9, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x1000301000002}) close(r0) 07:50:15 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000140)=[{0x2}, {0x14}, {0x6, 0x0, 0x0, 0x400}]}) pwrite(r0, &(0x7f0000000040)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:50:15 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000000)={0x3, &(0x7f0000000140)=[{0x74}, {0x81}, {0x3c6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) syz_emit_ethernet(0x2a, &(0x7f0000000340)={@empty, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x0, 0x3, 0x8}}}}}}) 07:50:15 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000000)=[{0x28}, {0xc0}, {0x16}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) pwrite(r0, &(0x7f0000000040)="000100c57898f445ef12c5010120", 0xe, 0x0) 07:50:15 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000140)=[{0x44}, {0x35}, {0x6, 0x0, 0x0, 0x3f}]}) pwrite(r0, &(0x7f0000000040)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:50:15 executing program 6: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x61}, {0x64}, {0x6, 0x0, 0x0, 0xfb}]}) pwrite(r0, &(0x7f0000000040)="e81af191c7a750ff6914f6317e37", 0xe, 0x0) 07:50:15 executing program 7: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x80206932, &(0x7f0000000300)) 07:50:15 executing program 0: mknod(&(0x7f0000000240)='./file0\x00', 0x800080002002, 0x5bc9) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) select(0x40, &(0x7f00000000c0), &(0x7f0000000140)={0x9}, 0x0, 0x0) close(r0) 07:50:15 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000140)=[{0x2}, {0x14}, {0x6, 0x0, 0x0, 0x400}]}) pwrite(r0, &(0x7f0000000040)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:50:15 executing program 0: mknod(&(0x7f0000000240)='./file0\x00', 0x800080002002, 0x5bc9) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) select(0x40, &(0x7f00000000c0), &(0x7f0000000140)={0x9}, 0x0, 0x0) close(r0) 07:50:15 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000000)={0x3, &(0x7f0000000140)=[{0x74}, {0x81}, {0x3c6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) syz_emit_ethernet(0x2a, &(0x7f0000000340)={@empty, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x0, 0x3, 0x8}}}}}}) 07:50:15 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000140)=[{0x2}, {0x14}, {0x6, 0x0, 0x0, 0x400}]}) pwrite(r0, &(0x7f0000000040)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:50:15 executing program 0: mknod(&(0x7f0000000240)='./file0\x00', 0x800080002002, 0x5bc9) r0 = open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) select(0x40, &(0x7f00000000c0), &(0x7f0000000140)={0x9}, 0x0, 0x0) close(r0) 07:50:15 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000000)={0x3, &(0x7f0000000140)=[{0x74}, {0x81}, {0x3c6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) syz_emit_ethernet(0x2a, &(0x7f0000000340)={@empty, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x0, 0x3, 0x8}}}}}}) 07:50:15 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000140)=[{0x2}, {0x14}, {0x6, 0x0, 0x0, 0x400}]}) pwrite(r0, &(0x7f0000000040)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:50:15 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000000)={0x3, &(0x7f0000000140)=[{0x74}, {0x81}, {0x3c6}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) syz_emit_ethernet(0x2a, &(0x7f0000000340)={@empty, @broadcast, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @local={0xac, 0x14, 0x0}, @broadcast}, @udp={{0x0, 0x3, 0x8}}}}}}) 2022/01/14 07:50:26 executor 4 failed 11 times: executor 4: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory)