Warning: Permanently added '10.128.0.187' (ED25519) to the list of known hosts. 2022/01/14 03:28:21 fuzzer started 2022/01/14 03:28:25 dialing manager at 10.128.15.235:38506 2022/01/14 03:28:26 syscalls: 387 2022/01/14 03:28:26 code coverage: enabled 2022/01/14 03:28:26 comparison tracing: enabled 2022/01/14 03:28:26 extra coverage: enabled 2022/01/14 03:28:26 delay kcov mmap: enabled 2022/01/14 03:28:26 setuid sandbox: enabled 2022/01/14 03:28:26 namespace sandbox: support is not implemented in syzkaller 2022/01/14 03:28:26 Android sandbox: support is not implemented in syzkaller 2022/01/14 03:28:26 fault injection: support is not implemented in syzkaller 2022/01/14 03:28:26 leak checking: support is not implemented in syzkaller 2022/01/14 03:28:26 net packet injection: enabled 2022/01/14 03:28:26 net device setup: support is not implemented in syzkaller 2022/01/14 03:28:26 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 03:28:26 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 03:28:26 USB emulation: support is not implemented in syzkaller 2022/01/14 03:28:26 hci packet injection: support is not implemented in syzkaller 2022/01/14 03:28:26 wifi device emulation: support is not implemented in syzkaller 2022/01/14 03:28:26 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 03:28:26 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 03:28:26 fetching corpus: 16, signal 1706/4684 (executing program) 2022/01/14 03:28:26 fetching corpus: 16, signal 1706/6197 (executing program) 2022/01/14 03:28:26 fetching corpus: 16, signal 1706/6743 (executing program) 2022/01/14 03:28:26 fetching corpus: 16, signal 1706/6743 (executing program) 2022/01/14 03:28:26 starting 8 fuzzer processes 03:28:26 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BIOCSBLEN(r0, 0xc0044266, &(0x7f0000000240)) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000100)={'tap', 0x0}) read(r0, &(0x7f0000000080)=""/32, 0x20) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = socket(0x18, 0x3, 0x0) r2 = socket(0x18, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$TIOCFLUSH(r3, 0x80206979, &(0x7f0000000300)) 03:28:26 executing program 1: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) munlock(&(0x7f0000ff2000/0xe000)=nil, 0xe000) 03:28:26 executing program 2: r0 = socket(0x18, 0x1, 0x0) getsockopt(r0, 0x200000029, 0x3f, 0x0, 0x0) r1 = socket(0x2, 0x3, 0x0) connect$unix(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8202adfdffffffff"], 0x10) writev(r1, 0x0, 0x0) dup2(0xffffffffffffffff, r1) r2 = socket(0x2, 0x3, 0x0) connect$unix(r2, &(0x7f0000000300)=ANY=[], 0x10) writev(r2, &(0x7f0000000000)=[{0x0}], 0x3a) 03:28:26 executing program 3: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@random="9d2932063ced", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, 'V`Q', 0x24, 0x2c, 0x0, @empty, @mcast2, {[@hopopts={0x2c, 0x0, '\x00', [@jumbo]}], @tcp={{0x0, 0x1, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}) 03:28:26 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f0000000040)="eaff125c00000000", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000a, &(0x7f0000000200), 0x0) 03:28:26 executing program 5: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f00000001c0)={0x2, &(0x7f0000000100)=[{}, {0x4c}]}) mknod(&(0x7f0000000000)='./bus\x00', 0x2000, 0x4086333) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$TIOCFLUSH(r0, 0x82907003, &(0x7f0000000100)=0x3) 03:28:26 executing program 6: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000180)=[{0xc}, {0xc}, {0x7ffffffe}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) syz_emit_ethernet(0x66, &(0x7f0000000000)=ANY=[]) 03:28:26 executing program 7: r0 = open$dir(&(0x7f0000000100)='./file0\x00', 0x40000400000002c6, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000180), 0x817fd}], 0x1000000000000013) openat$wsmuxkbd(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x2, 0x0) writev(r1, &(0x7f0000000340)=[{&(0x7f0000000180), 0x817fd}], 0x1000000000000013) read(r1, &(0x7f0000000000)=""/5, 0x7fffffffffffffff) 03:28:26 executing program 3: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@random="9d2932063ced", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, 'V`Q', 0x24, 0x2c, 0x0, @empty, @mcast2, {[@hopopts={0x2c, 0x0, '\x00', [@jumbo]}], @tcp={{0x0, 0x1, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}) 03:28:26 executing program 3: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@random="9d2932063ced", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, 'V`Q', 0x24, 0x2c, 0x0, @empty, @mcast2, {[@hopopts={0x2c, 0x0, '\x00', [@jumbo]}], @tcp={{0x0, 0x1, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}) 03:28:26 executing program 2: r0 = socket(0x18, 0x1, 0x0) getsockopt(r0, 0x200000029, 0x3f, 0x0, 0x0) r1 = socket(0x2, 0x3, 0x0) connect$unix(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8202adfdffffffff"], 0x10) writev(r1, 0x0, 0x0) dup2(0xffffffffffffffff, r1) r2 = socket(0x2, 0x3, 0x0) connect$unix(r2, &(0x7f0000000300)=ANY=[], 0x10) writev(r2, &(0x7f0000000000)=[{0x0}], 0x3a) 03:28:26 executing program 3: syz_emit_ethernet(0x5a, &(0x7f0000000040)={@random="9d2932063ced", @remote, [], {@ipv6={0x86dd, {0x0, 0x6, 'V`Q', 0x24, 0x2c, 0x0, @empty, @mcast2, {[@hopopts={0x2c, 0x0, '\x00', [@jumbo]}], @tcp={{0x0, 0x1, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}) 03:28:26 executing program 3: r0 = socket(0x18, 0x1, 0x0) getsockopt(r0, 0x200000029, 0x3f, 0x0, 0x0) r1 = socket(0x2, 0x3, 0x0) connect$unix(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8202adfdffffffff"], 0x10) writev(r1, 0x0, 0x0) dup2(0xffffffffffffffff, r1) r2 = socket(0x2, 0x3, 0x0) connect$unix(r2, &(0x7f0000000300)=ANY=[], 0x10) writev(r2, &(0x7f0000000000)=[{0x0}], 0x3a) 03:28:26 executing program 2: r0 = socket(0x18, 0x1, 0x0) getsockopt(r0, 0x200000029, 0x3f, 0x0, 0x0) r1 = socket(0x2, 0x3, 0x0) connect$unix(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8202adfdffffffff"], 0x10) writev(r1, 0x0, 0x0) dup2(0xffffffffffffffff, r1) r2 = socket(0x2, 0x3, 0x0) connect$unix(r2, &(0x7f0000000300)=ANY=[], 0x10) writev(r2, &(0x7f0000000000)=[{0x0}], 0x3a) 03:28:26 executing program 3: r0 = socket(0x18, 0x1, 0x0) getsockopt(r0, 0x200000029, 0x3f, 0x0, 0x0) r1 = socket(0x2, 0x3, 0x0) connect$unix(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8202adfdffffffff"], 0x10) writev(r1, 0x0, 0x0) dup2(0xffffffffffffffff, r1) r2 = socket(0x2, 0x3, 0x0) connect$unix(r2, &(0x7f0000000300)=ANY=[], 0x10) writev(r2, &(0x7f0000000000)=[{0x0}], 0x3a) 03:28:26 executing program 1: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) munlock(&(0x7f0000ff2000/0xe000)=nil, 0xe000) 03:28:27 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BIOCSBLEN(r0, 0xc0044266, &(0x7f0000000240)) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000100)={'tap', 0x0}) read(r0, &(0x7f0000000080)=""/32, 0x20) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) syz_extract_tcp_res$synack(0x0, 0x1, 0x0) r1 = socket(0x18, 0x3, 0x0) r2 = socket(0x18, 0x3, 0x0) r3 = fcntl$dupfd(r2, 0x0, r1) ioctl$TIOCFLUSH(r3, 0x80206979, &(0x7f0000000300)) 03:28:27 executing program 2: r0 = socket(0x18, 0x1, 0x0) getsockopt(r0, 0x200000029, 0x3f, 0x0, 0x0) r1 = socket(0x2, 0x3, 0x0) connect$unix(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8202adfdffffffff"], 0x10) writev(r1, 0x0, 0x0) dup2(0xffffffffffffffff, r1) r2 = socket(0x2, 0x3, 0x0) connect$unix(r2, &(0x7f0000000300)=ANY=[], 0x10) writev(r2, &(0x7f0000000000)=[{0x0}], 0x3a) 03:28:27 executing program 1: munmap(&(0x7f0000ffe000/0x2000)=nil, 0x2000) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0) munlock(&(0x7f0000ff2000/0xe000)=nil, 0xe000) 03:28:27 executing program 3: r0 = socket(0x18, 0x1, 0x0) getsockopt(r0, 0x200000029, 0x3f, 0x0, 0x0) r1 = socket(0x2, 0x3, 0x0) connect$unix(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="8202adfdffffffff"], 0x10) writev(r1, 0x0, 0x0) dup2(0xffffffffffffffff, r1) r2 = socket(0x2, 0x3, 0x0) connect$unix(r2, &(0x7f0000000300)=ANY=[], 0x10) writev(r2, &(0x7f0000000000)=[{0x0}], 0x3a) 2022/01/14 03:28:38 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory)