Warning: Permanently added '10.128.0.67' (ED25519) to the list of known hosts. 2022/01/14 07:31:33 fuzzer started 2022/01/14 07:31:35 dialing manager at 10.128.15.235:6268 2022/01/14 07:31:35 syscalls: 387 2022/01/14 07:31:35 code coverage: enabled 2022/01/14 07:31:35 comparison tracing: enabled 2022/01/14 07:31:35 extra coverage: enabled 2022/01/14 07:31:35 delay kcov mmap: enabled 2022/01/14 07:31:35 setuid sandbox: enabled 2022/01/14 07:31:35 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:31:35 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:31:35 fault injection: support is not implemented in syzkaller 2022/01/14 07:31:35 leak checking: support is not implemented in syzkaller 2022/01/14 07:31:35 net packet injection: enabled 2022/01/14 07:31:35 net device setup: support is not implemented in syzkaller 2022/01/14 07:31:35 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:31:35 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:31:35 USB emulation: support is not implemented in syzkaller 2022/01/14 07:31:35 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:31:35 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:31:35 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:31:35 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:31:35 fetching corpus: 50, signal 3639/6415 (executing program) 2022/01/14 07:31:35 fetching corpus: 86, signal 4806/8358 (executing program) 2022/01/14 07:31:35 fetching corpus: 86, signal 4806/9549 (executing program) 2022/01/14 07:31:35 fetching corpus: 86, signal 4806/10756 (executing program) 2022/01/14 07:31:35 fetching corpus: 86, signal 4806/12002 (executing program) 2022/01/14 07:31:35 fetching corpus: 86, signal 4806/12005 (executing program) 2022/01/14 07:31:35 fetching corpus: 86, signal 4806/12005 (executing program) 2022/01/14 07:31:35 starting 8 fuzzer processes 07:31:35 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x64, 0x0, 0x0) 07:31:35 executing program 2: sysctl$vm_swapencrypt(&(0x7f0000000000)={0x7, 0x2, 0x3}, 0x3, 0x0, 0x0, 0x0, 0x0) 07:31:35 executing program 1: read(0xffffffffffffffff, &(0x7f00000003c0)=""/80, 0xffffffffffffffe3) 07:31:35 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000001600)=[{0xc}, {0x54}, {0x6, 0x0, 0x0, 0xff}]}) pwrite(r0, &(0x7f0000000280)="d000"/14, 0xe, 0x0) 07:31:35 executing program 6: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x6) r1 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIOASYNC(r1, 0xcd60441a, &(0x7f0000000240)=0x1) 07:31:35 executing program 7: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x20, 0x0) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$TIOCFLUSH(r2, 0xc0106924, &(0x7f00000000c0)=0x6e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r3 = socket$inet6(0x18, 0x3, 0x102) r4 = dup2(r3, r3) r5 = fcntl$dupfd(r4, 0x0, r0) ioctl$TIOCFLUSH(r5, 0x8080691a, &(0x7f0000000300)) 07:31:35 executing program 4: r0 = open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) pwritev(r0, &(0x7f0000000280)=[{&(0x7f0000000180)="65605c5c8dcf6b4731c458f63e90405bc856dacc0a6c8500a520a7bb354c974b1a79eb0cd8", 0x25}, {&(0x7f00000001c0)="073a3414273fb1514151c090baf38b662f8e95e2f2fa78c1c6216c860cd6645e5821782ec39f5b02333e8bf88ccfbc2994b51dab0039717750ccba886659dcaf4f62515ea0742a2116d9d8601c70002a581d3c76b91d1ef2aee6ad9ae5f058317f3cecc3cb6ba1a3457658394ff481", 0x6f}, {&(0x7f0000000240)="d462987228b0aa8c0e2a", 0xa}, {&(0x7f00000004c0)="f989f5be36a6117ca0beed828de1e1dca2dc02b21d52a1a3782b78d51aaa02740e64d61bef41de2d597956d5de7f9199f337", 0x32}], 0x4, 0x0) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = socket(0x2, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r2, 0x8020697a, &(0x7f00000000c0)) 07:31:35 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000240), 0x4000000001, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0x3}, {0x5}, {0x6, 0x0, 0x0, 0x7e}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) pwrite(r0, &(0x7f0000000040)="e16914f6357e3a00000015000000", 0xe, 0x0) 07:31:35 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x64, 0x0, 0x0) 07:31:36 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000001600)=[{0xc}, {0x54}, {0x6, 0x0, 0x0, 0xff}]}) pwrite(r0, &(0x7f0000000280)="d000"/14, 0xe, 0x0) 07:31:36 executing program 2: sysctl$vm_swapencrypt(&(0x7f0000000000)={0x7, 0x2, 0x3}, 0x3, 0x0, 0x0, 0x0, 0x0) 07:31:36 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x64, 0x0, 0x0) 07:31:36 executing program 1: read(0xffffffffffffffff, &(0x7f00000003c0)=""/80, 0xffffffffffffffe3) 07:31:36 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000001600)=[{0xc}, {0x54}, {0x6, 0x0, 0x0, 0xff}]}) pwrite(r0, &(0x7f0000000280)="d000"/14, 0xe, 0x0) 07:31:36 executing program 0: r0 = socket$inet(0x2, 0x3, 0x0) setsockopt(r0, 0x0, 0x64, 0x0, 0x0) 07:31:36 executing program 2: sysctl$vm_swapencrypt(&(0x7f0000000000)={0x7, 0x2, 0x3}, 0x3, 0x0, 0x0, 0x0, 0x0) 07:31:36 executing program 1: read(0xffffffffffffffff, &(0x7f00000003c0)=""/80, 0xffffffffffffffe3) 07:31:36 executing program 0: sysctl$kern(&(0x7f0000000000)={0x1, 0x29}, 0x2, 0x0, 0x0, 0x0, 0x0) 07:31:36 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000001600)=[{0xc}, {0x54}, {0x6, 0x0, 0x0, 0xff}]}) pwrite(r0, &(0x7f0000000280)="d000"/14, 0xe, 0x0) 07:31:36 executing program 2: sysctl$vm_swapencrypt(&(0x7f0000000000)={0x7, 0x2, 0x3}, 0x3, 0x0, 0x0, 0x0, 0x0) 2022/01/14 07:31:47 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: