Warning: Permanently added '10.128.1.2' (ED25519) to the list of known hosts. 2022/01/14 07:48:06 fuzzer started 2022/01/14 07:48:08 dialing manager at 10.128.15.235:5710 2022/01/14 07:48:08 syscalls: 387 2022/01/14 07:48:08 code coverage: enabled 2022/01/14 07:48:08 comparison tracing: enabled 2022/01/14 07:48:08 extra coverage: enabled 2022/01/14 07:48:08 delay kcov mmap: enabled 2022/01/14 07:48:08 setuid sandbox: enabled 2022/01/14 07:48:08 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:48:08 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:48:08 fault injection: support is not implemented in syzkaller 2022/01/14 07:48:08 leak checking: support is not implemented in syzkaller 2022/01/14 07:48:08 net packet injection: enabled 2022/01/14 07:48:08 net device setup: support is not implemented in syzkaller 2022/01/14 07:48:08 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:48:08 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:48:08 USB emulation: support is not implemented in syzkaller 2022/01/14 07:48:08 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:48:08 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:48:08 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:48:08 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:48:08 fetching corpus: 19, signal 2261/4770 (executing program) 2022/01/14 07:48:08 fetching corpus: 19, signal 2261/6032 (executing program) 2022/01/14 07:48:08 fetching corpus: 19, signal 2261/6101 (executing program) 2022/01/14 07:48:08 fetching corpus: 19, signal 2261/6101 (executing program) 2022/01/14 07:48:08 starting 8 fuzzer processes 07:48:08 executing program 0: poll(&(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x200000000000035f, 0xffffffff) 07:48:08 executing program 1: sysctl$net_inet_ipip(&(0x7f0000000000)={0xa, 0x6}, 0x4, 0x0, 0x0, 0x0, 0x0) 07:48:08 executing program 2: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$WSDISPLAYIO_SBURNER(r0, 0xc0104453, &(0x7f0000000080)) 07:48:08 executing program 3: r0 = socket(0x400000000018, 0x3, 0x0) setsockopt(r0, 0x29, 0x1a, &(0x7f0000000040), 0x4) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x3, 0x0) setsockopt(r1, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) close(r3) socket(0x18, 0x3, 0x8) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) r4 = dup2(r2, r3) write(r4, &(0x7f0000000040)="f16d", 0x2) 07:48:08 executing program 4: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@random="877538e8b22a", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "167177", 0x38, 0x3a, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "cca2f6", 0x0, 0x3a, 0x0, @mcast2, @remote={0xfe, 0x80, '\x00', 0x0}, [@dstopts={0x88}]}}}}}}}) 07:48:09 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000100)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000340)={0x3, &(0x7f0000000040)=[{0x48}, {0x30}, {0x7ffffffe}]}) syz_emit_ethernet(0x3e, &(0x7f0000000380)={@empty, @local, [], {@ipv6={0x86dd, {0x0, 0x6, "2453a1", 0x8, 0x0, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[], @udp={{0x3, 0x0, 0x8}}}}}}}) 07:48:09 executing program 6: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000140), 0x4000000005, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000100)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000002c0)={0x3, &(0x7f0000000280)=[{0x81}, {0xc}, {0x6, 0x0, 0x0, 0x7fc}]}) write(r0, &(0x7f0000000180)="3c9ebb8a65237a19000000000000", 0xe) 07:48:09 executing program 7: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000740)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x4, &(0x7f0000000000)=[{0x100000001, 0x0, 0x0, 0x1}, {0x5}, {0x3c}, {0xfffffffffffffffe}]}) syz_emit_ethernet(0x3e, &(0x7f0000002600)={@random="0d05b5a90ca7", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "102f22", 0x8, 0x0, 0x0, @rand_addr="01000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@ndisc_rs}}}}}) 07:48:09 executing program 3: r0 = socket(0x400000000018, 0x3, 0x0) setsockopt(r0, 0x29, 0x1a, &(0x7f0000000040), 0x4) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x3, 0x0) setsockopt(r1, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) close(r3) socket(0x18, 0x3, 0x8) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) r4 = dup2(r2, r3) write(r4, &(0x7f0000000040)="f16d", 0x2) 07:48:09 executing program 2: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$WSDISPLAYIO_SBURNER(r0, 0xc0104453, &(0x7f0000000080)) 07:48:09 executing program 1: sysctl$net_inet_ipip(&(0x7f0000000000)={0xa, 0x6}, 0x4, 0x0, 0x0, 0x0, 0x0) 07:48:09 executing program 3: r0 = socket(0x400000000018, 0x3, 0x0) setsockopt(r0, 0x29, 0x1a, &(0x7f0000000040), 0x4) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x3, 0x0) setsockopt(r1, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) close(r3) socket(0x18, 0x3, 0x8) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) r4 = dup2(r2, r3) write(r4, &(0x7f0000000040)="f16d", 0x2) 07:48:09 executing program 0: poll(&(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x200000000000035f, 0xffffffff) 07:48:09 executing program 1: sysctl$net_inet_ipip(&(0x7f0000000000)={0xa, 0x6}, 0x4, 0x0, 0x0, 0x0, 0x0) 07:48:09 executing program 3: r0 = socket(0x400000000018, 0x3, 0x0) setsockopt(r0, 0x29, 0x1a, &(0x7f0000000040), 0x4) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x3, 0x0) setsockopt(r1, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) close(r3) socket(0x18, 0x3, 0x8) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) r4 = dup2(r2, r3) write(r4, &(0x7f0000000040)="f16d", 0x2) 07:48:09 executing program 0: poll(&(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x200000000000035f, 0xffffffff) 07:48:09 executing program 2: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$WSDISPLAYIO_SBURNER(r0, 0xc0104453, &(0x7f0000000080)) 07:48:09 executing program 0: poll(&(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x200000000000035f, 0xffffffff) 07:48:09 executing program 3: r0 = socket(0x400000000018, 0x3, 0x0) setsockopt(r0, 0x29, 0x1a, &(0x7f0000000040), 0x4) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x3, 0x0) setsockopt(r1, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) close(r3) socket(0x18, 0x3, 0x8) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) r4 = dup2(r2, r3) write(r4, &(0x7f0000000040)="f16d", 0x2) 07:48:09 executing program 2: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$WSDISPLAYIO_SBURNER(r0, 0xc0104453, &(0x7f0000000080)) 2022/01/14 07:48:22 executor 4 failed 11 times: executor 4: EOF ifconfig: SIOCIFDESTROY: Device not configured SYZFAIL: tun: can't open device device=/dev/tap4 (errno 2: No such file or directory)