Warning: Permanently added '10.128.0.44' (ED25519) to the list of known hosts. 2021/12/23 02:41:48 fuzzer started 2021/12/23 02:41:50 dialing manager at 10.128.15.235:22938 2021/12/23 02:41:50 syscalls: 387 2021/12/23 02:41:50 code coverage: enabled 2021/12/23 02:41:50 comparison tracing: enabled 2021/12/23 02:41:50 extra coverage: enabled 2021/12/23 02:41:50 delay kcov mmap: enabled 2021/12/23 02:41:50 setuid sandbox: enabled 2021/12/23 02:41:50 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:41:50 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:41:50 fault injection: support is not implemented in syzkaller 2021/12/23 02:41:50 leak checking: support is not implemented in syzkaller 2021/12/23 02:41:50 net packet injection: enabled 2021/12/23 02:41:50 net device setup: support is not implemented in syzkaller 2021/12/23 02:41:50 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:41:50 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:41:50 USB emulation: support is not implemented in syzkaller 2021/12/23 02:41:50 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:41:50 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:41:50 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:41:50 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:41:50 fetching corpus: 23, signal 1880/4990 (executing program) 2021/12/23 02:41:50 fetching corpus: 23, signal 1880/6538 (executing program) 2021/12/23 02:41:50 fetching corpus: 23, signal 1880/8102 (executing program) 2021/12/23 02:41:50 fetching corpus: 23, signal 1880/8427 (executing program) 2021/12/23 02:41:50 fetching corpus: 23, signal 1880/8427 (executing program) 2021/12/23 02:41:50 starting 6 fuzzer processes 02:41:50 executing program 0: r0 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$WSKBDIO_SETDEFAULTBELL(r0, 0x80105705, &(0x7f0000000080)) 02:41:50 executing program 2: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x4001, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x80206910, &(0x7f0000000300)) 02:41:50 executing program 1: setuid(0xffffffffffffffff) r0 = getpid() ktrace(0x0, 0x1, 0x1a00, r0) 02:41:50 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4}, {0x15}, {0x6, 0x0, 0x0, 0xfd}]}) pwrite(r0, &(0x7f0000000180)="f781ea80e21bb6f576c45af84a28", 0xe, 0x0, 0x0) 02:41:50 executing program 5: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000200), 0x10, 0x0) r1 = socket(0x18, 0x2, 0x0) r2 = socket$inet(0x2, 0x8000, 0x3) setsockopt$inet_opts(r2, 0x0, 0x1, &(0x7f00000000c0)="89030000", 0x4) write(r0, &(0x7f0000000580)="fceca0009eed6a84f9e8470dc763fa187824b39c810ec07ce297a1ffab3be06ad87e6c4a09fb5cdfde95fe27c0ebe92f36e31dfc202c720ca4f787a7a200b1c8d45d32d940bd38eb565a19212818e28d674563782e6c496f72f77cbe454cf0c0fd32948f6f22e9ac864ee781a60c6aba63355b7ee7eaff7873ad9df23b58bc404cc2649e9f7b216e290b63f185e379a420666b3d949f0b2d91e7ad844e7a6b6349e5787b4dbd90ad452c93fd482aebf9af252f3732dec5", 0xfffffffffffffe07) setsockopt$sock_int(0xffffffffffffffff, 0xffff, 0x1002, &(0x7f0000000000)=0x3, 0x3) getsockopt$SO_PEERCRED(0xffffffffffffffff, 0xffff, 0x1022, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x10000) r5 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r5, 0xc0106924, &(0x7f00000000c0)=0x26e) semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000240)={{0x3, r3, r4, 0x0, r4, 0x20, 0x81}, 0x3, 0x56358446, 0x3}) ioctl$VMM_IOC_RESETCPU(0xffffffffffffffff, 0x82405605, &(0x7f0000000340)={0xfffffffd, 0x0, {[0xa, 0x80, 0xe0, 0x3ff, 0x0, 0x0, 0x7, 0x5, 0x0, 0x4000, 0x0, 0x0, 0xfffffffffffffffd, 0x9, 0x6, 0x200000004, 0xfffffffffffffffd, 0xfffffffffffffff8], [0x0, 0x0, 0x0, 0x2, 0xfffffffffffffffd, 0x2, 0x40000000001, 0x4, 0x200000000000, 0x6], [0xfffffffffffffffd, 0x0, 0x0, 0x3c8, 0x200000000000, 0x8, 0xfffffffffffffffc], [0x6, 0xffffffffffffffff, 0x801, 0x6, 0x0, 0x80001], [{0xfffc, 0x0, 0x2, 0x7ff}, {0x0, 0x7ffffffb, 0x3}, {0x0, 0xfffffffd, 0xff, 0x2}, {0x200, 0x1, 0x0, 0x101}, {0x0, 0x0, 0x4, 0x40000000000000}, {0xb1, 0x0, 0x1, 0x4}, {0x9, 0x0, 0xffffffff, 0x4}, {0x0, 0x0, 0x0, 0xfffffffffffffffd}], {0x20, 0xffe, 0x2e, 0x8}, {0x0, 0xfffffffe, 0x804004, 0x8}}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r6 = socket(0x18, 0x3, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) r8 = socket(0x18, 0x2, 0x0) r9 = fcntl$dupfd(r8, 0xa, r8) ioctl$TIOCFLUSH(r9, 0x81206919, &(0x7f0000000300)) ioctl$TIOCFLUSH(r7, 0x8080691a, &(0x7f0000000300)) 02:41:50 executing program 4: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000240)={0x3, &(0x7f0000000080)=[{0x1}, {0x50}, {0x6, 0x0, 0x0, 0x80000000}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) write(r0, &(0x7f0000000140)="06bdd9e2f9430f144dd59cd7786c", 0xe) 02:41:50 executing program 0: r0 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$WSKBDIO_SETDEFAULTBELL(r0, 0x80105705, &(0x7f0000000080)) 02:41:50 executing program 2: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x4001, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x80206910, &(0x7f0000000300)) 02:41:50 executing program 0: r0 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$WSKBDIO_SETDEFAULTBELL(r0, 0x80105705, &(0x7f0000000080)) 02:41:50 executing program 2: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x4001, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x80206910, &(0x7f0000000300)) 02:41:50 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4}, {0x15}, {0x6, 0x0, 0x0, 0xfd}]}) pwrite(r0, &(0x7f0000000180)="f781ea80e21bb6f576c45af84a28", 0xe, 0x0, 0x0) 02:41:50 executing program 0: r0 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$WSKBDIO_SETDEFAULTBELL(r0, 0x80105705, &(0x7f0000000080)) 02:41:50 executing program 2: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x2, 0x4001, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0x80206910, &(0x7f0000000300)) 02:41:50 executing program 1: setuid(0xffffffffffffffff) r0 = getpid() ktrace(0x0, 0x1, 0x1a00, r0) 02:41:50 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{0x4}, {0x15}, {0x6, 0x0, 0x0, 0xfd}]}) pwrite(r0, &(0x7f0000000180)="f781ea80e21bb6f576c45af84a28", 0xe, 0x0, 0x0) 02:41:50 executing program 0: setuid(0xffffffffffffffff) r0 = getpid() ktrace(0x0, 0x1, 0x1a00, r0) 2021/12/23 02:42:02 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: