Warning: Permanently added '10.128.0.249' (ED25519) to the list of known hosts. 2022/01/14 07:23:59 fuzzer started 2022/01/14 07:24:02 dialing manager at 10.128.15.235:5613 2022/01/14 07:24:02 checking machine... 2022/01/14 07:24:02 checking revisions... 2022/01/14 07:24:02 testing simple program... 2022/01/14 07:24:02 building call list... 2022/01/14 07:24:03 syscalls: 387 2022/01/14 07:24:03 code coverage: enabled 2022/01/14 07:24:03 comparison tracing: enabled 2022/01/14 07:24:03 extra coverage: enabled 2022/01/14 07:24:03 delay kcov mmap: enabled 2022/01/14 07:24:03 setuid sandbox: enabled 2022/01/14 07:24:03 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:24:03 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:24:03 fault injection: support is not implemented in syzkaller 2022/01/14 07:24:03 leak checking: support is not implemented in syzkaller 2022/01/14 07:24:03 net packet injection: enabled 2022/01/14 07:24:03 net device setup: support is not implemented in syzkaller 2022/01/14 07:24:03 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:24:03 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:24:03 USB emulation: support is not implemented in syzkaller 2022/01/14 07:24:03 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:24:03 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:24:03 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:24:03 fetching corpus: 0, signal 0/0 (executing program) 2022/01/14 07:24:03 fetching corpus: 0, signal 0/0 (executing program) 2022/01/14 07:24:03 starting 8 fuzzer processes 07:24:03 executing program 0: unveil(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='c\x00') unveil(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='c\x00') 07:24:03 executing program 2: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x6, 0x2, &(0x7f00000000c0)="50b2c811", 0x4) 07:24:03 executing program 1: sysctl$kern(&(0x7f0000000000)={0x1, 0x47}, 0x7, 0x0, 0x0, &(0x7f00000000c0)="80adc8b21380fc0300499879479c99b5b909df22c618bd5ab6c72c4b3dd1cc96994bed761b7e1287d61154f5163e056f3268b75de2e26a4a9c6fa629cbc7dc4595ecf947f23ab343de03ae1f871c0d5a2c41e3543b5a00003a8cdbdc820e70df6dfedf28e7821e190e330842a52ed9a74d09be2b19b49f76be93fd9a", 0x0) 07:24:03 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$FIOASYNC(r0, 0xc0284459, &(0x7f0000000040)) 07:24:03 executing program 4: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) ioctl$FIONBIO(r0, 0xc008441e, &(0x7f0000000080)) 07:24:03 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$BIOCSBLEN(r0, 0xc0044266, &(0x7f0000000240)) ioctl$BIOCIMMEDIATE(r0, 0x80044270, &(0x7f0000000080)=0xe80) ioctl$BIOCSRTIMEOUT(r0, 0x8010426d, &(0x7f0000000000)={0x0, 0x5}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) read(r0, &(0x7f0000000040)=""/32, 0x20) 07:24:03 executing program 6: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1, 0x1010, 0xffffffffffffffff, 0x0) select(0x1c, &(0x7f0000000000), 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 07:24:03 executing program 7: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f0000000000)={0x200000000000030f, &(0x7f0000000040)=[{0x2}, {}, {0x8fe}]}) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) connect$unix(0xffffffffffffffff, &(0x7f0000000080)=ANY=[@ANYBLOB="11"], 0x1) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r1 = socket(0x18, 0x1, 0x0) close(r1) r2 = socket(0x18, 0x2, 0x0) close(r2) socket(0x400000000018, 0x3, 0x3a) setsockopt(r2, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r1, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r2, &(0x7f0000000040)="100a2956b9223776", 0x21d) 07:24:03 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$FIOASYNC(r0, 0xc0284459, &(0x7f0000000040)) 07:24:03 executing program 2: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x6, 0x2, &(0x7f00000000c0)="50b2c811", 0x4) 07:24:03 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$FIOASYNC(r0, 0xc0284459, &(0x7f0000000040)) 07:24:03 executing program 1: sysctl$kern(&(0x7f0000000000)={0x1, 0x47}, 0x7, 0x0, 0x0, &(0x7f00000000c0)="80adc8b21380fc0300499879479c99b5b909df22c618bd5ab6c72c4b3dd1cc96994bed761b7e1287d61154f5163e056f3268b75de2e26a4a9c6fa629cbc7dc4595ecf947f23ab343de03ae1f871c0d5a2c41e3543b5a00003a8cdbdc820e70df6dfedf28e7821e190e330842a52ed9a74d09be2b19b49f76be93fd9a", 0x0) 07:24:04 executing program 3: r0 = openat$pf(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) ioctl$FIOASYNC(r0, 0xc0284459, &(0x7f0000000040)) 07:24:04 executing program 1: sysctl$kern(&(0x7f0000000000)={0x1, 0x47}, 0x7, 0x0, 0x0, &(0x7f00000000c0)="80adc8b21380fc0300499879479c99b5b909df22c618bd5ab6c72c4b3dd1cc96994bed761b7e1287d61154f5163e056f3268b75de2e26a4a9c6fa629cbc7dc4595ecf947f23ab343de03ae1f871c0d5a2c41e3543b5a00003a8cdbdc820e70df6dfedf28e7821e190e330842a52ed9a74d09be2b19b49f76be93fd9a", 0x0) 07:24:04 executing program 1: sysctl$kern(&(0x7f0000000000)={0x1, 0x47}, 0x7, 0x0, 0x0, &(0x7f00000000c0)="80adc8b21380fc0300499879479c99b5b909df22c618bd5ab6c72c4b3dd1cc96994bed761b7e1287d61154f5163e056f3268b75de2e26a4a9c6fa629cbc7dc4595ecf947f23ab343de03ae1f871c0d5a2c41e3543b5a00003a8cdbdc820e70df6dfedf28e7821e190e330842a52ed9a74d09be2b19b49f76be93fd9a", 0x0) 07:24:04 executing program 3: sysctl$kern(&(0x7f0000000000)={0x1, 0x47}, 0x7, 0x0, 0x0, &(0x7f00000000c0)="80adc8b21380fc0300499879479c99b5b909df22c618bd5ab6c72c4b3dd1cc96994bed761b7e1287d61154f5163e056f3268b75de2e26a4a9c6fa629cbc7dc4595ecf947f23ab343de03ae1f871c0d5a2c41e3543b5a00003a8cdbdc820e70df6dfedf28e7821e190e330842a52ed9a74d09be2b19b49f76be93fd9a", 0x0) 07:24:04 executing program 0: unveil(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='c\x00') unveil(&(0x7f0000000100)='./file0\x00', &(0x7f0000000180)='c\x00') 07:24:04 executing program 1: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x6, 0x2, &(0x7f00000000c0)="50b2c811", 0x4) 07:24:04 executing program 2: r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x6, 0x2, &(0x7f00000000c0)="50b2c811", 0x4) 07:24:04 executing program 3: sysctl$kern(&(0x7f0000000000)={0x1, 0x47}, 0x7, 0x0, 0x0, &(0x7f00000000c0)="80adc8b21380fc0300499879479c99b5b909df22c618bd5ab6c72c4b3dd1cc96994bed761b7e1287d61154f5163e056f3268b75de2e26a4a9c6fa629cbc7dc4595ecf947f23ab343de03ae1f871c0d5a2c41e3543b5a00003a8cdbdc820e70df6dfedf28e7821e190e330842a52ed9a74d09be2b19b49f76be93fd9a", 0x0) 2022/01/14 07:24:15 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory) login: