Warning: Permanently added '10.128.0.83' (ED25519) to the list of known hosts. 2022/01/14 07:25:51 fuzzer started 2022/01/14 07:25:54 dialing manager at 10.128.15.235:5613 2022/01/14 07:25:54 syscalls: 387 2022/01/14 07:25:54 code coverage: enabled 2022/01/14 07:25:54 comparison tracing: enabled 2022/01/14 07:25:54 extra coverage: enabled 2022/01/14 07:25:54 delay kcov mmap: enabled 2022/01/14 07:25:54 setuid sandbox: enabled 2022/01/14 07:25:54 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:25:54 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:25:54 fault injection: support is not implemented in syzkaller 2022/01/14 07:25:54 leak checking: support is not implemented in syzkaller 2022/01/14 07:25:54 net packet injection: enabled 2022/01/14 07:25:54 net device setup: support is not implemented in syzkaller 2022/01/14 07:25:54 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:25:54 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:25:54 USB emulation: support is not implemented in syzkaller 2022/01/14 07:25:54 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:25:54 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:25:54 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:25:54 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:25:54 fetching corpus: 15, signal 2455/4994 (executing program) 2022/01/14 07:25:54 fetching corpus: 15, signal 2455/6261 (executing program) 2022/01/14 07:25:54 fetching corpus: 15, signal 2455/6684 (executing program) 2022/01/14 07:25:54 fetching corpus: 15, signal 2455/6684 (executing program) 2022/01/14 07:25:54 starting 8 fuzzer processes 07:25:54 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@random="877538e8b22a", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "167177", 0x38, 0x3a, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "cca2f6", 0x0, 0x3a, 0x0, @mcast2, @remote={0xfe, 0x80, '\x00', 0x0}, [@dstopts={0x88}]}}}}}}}) 07:25:54 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{}, {0x84}, {0x6, 0x0, 0x0, 0x1df}]}) pwrite(r0, &(0x7f0000000140)="8cac85bdc9509de10ba252df728c", 0xe, 0x0) 07:25:54 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) r0 = getpid() ktrace(&(0x7f00000002c0)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000280)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, 0x0, 0x0, &(0x7f0000000240)}, 0x0) 07:25:54 executing program 3: socketpair(0x1e, 0x0, 0x0, 0x0) 07:25:54 executing program 4: r0 = socket(0x2, 0x1, 0x0) setsockopt$sock_int(r0, 0x6, 0x10, &(0x7f0000000200), 0x4) 07:25:54 executing program 5: r0 = socket(0x11, 0x3, 0x0) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f0000000000), 0x4) sendmsg(r0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001480)=[{0x10}], 0x10}, 0x0) fchmod(r0, 0x174) syz_emit_ethernet(0x66, &(0x7f00000003c0)=ANY=[@ANYBLOB="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"]) mprotect(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x1) r1 = socket$inet(0x2, 0x1, 0x0) listen(r1, 0x0) accept$unix(r1, 0x0, 0x0) 07:25:54 executing program 6: utimensat(0xffffffffffffffff, 0x0, &(0x7f0000000180), 0x0) getitimer(0x2, &(0x7f0000000000)) 07:25:54 executing program 7: sysctl$vm_swapencrypt(&(0x7f0000000300)={0x4, 0x18, 0x33}, 0xa, 0x0, 0x0, 0x0, 0x0) 07:25:54 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{}, {0x84}, {0x6, 0x0, 0x0, 0x1df}]}) pwrite(r0, &(0x7f0000000140)="8cac85bdc9509de10ba252df728c", 0xe, 0x0) 07:25:54 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{}, {0x84}, {0x6, 0x0, 0x0, 0x1df}]}) pwrite(r0, &(0x7f0000000140)="8cac85bdc9509de10ba252df728c", 0xe, 0x0) 07:25:55 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{}, {0x84}, {0x6, 0x0, 0x0, 0x1df}]}) pwrite(r0, &(0x7f0000000140)="8cac85bdc9509de10ba252df728c", 0xe, 0x0) 07:25:55 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{}, {0x84}, {0x6, 0x0, 0x0, 0x1df}]}) pwrite(r0, &(0x7f0000000140)="8cac85bdc9509de10ba252df728c", 0xe, 0x0) 07:25:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@random="877538e8b22a", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "167177", 0x38, 0x3a, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "cca2f6", 0x0, 0x3a, 0x0, @mcast2, @remote={0xfe, 0x80, '\x00', 0x0}, [@dstopts={0x88}]}}}}}}}) 07:25:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@random="877538e8b22a", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "167177", 0x38, 0x3a, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "cca2f6", 0x0, 0x3a, 0x0, @mcast2, @remote={0xfe, 0x80, '\x00', 0x0}, [@dstopts={0x88}]}}}}}}}) 07:25:55 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{}, {0x84}, {0x6, 0x0, 0x0, 0x1df}]}) pwrite(r0, &(0x7f0000000140)="8cac85bdc9509de10ba252df728c", 0xe, 0x0) 07:25:55 executing program 3: socketpair(0x1e, 0x0, 0x0, 0x0) 07:25:55 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000000)=[{}, {0x84}, {0x6, 0x0, 0x0, 0x1df}]}) pwrite(r0, &(0x7f0000000140)="8cac85bdc9509de10ba252df728c", 0xe, 0x0) 07:25:55 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@random="877538e8b22a", @local, [], {@ipv6={0x86dd, {0x0, 0x6, "167177", 0x38, 0x3a, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @mcast2, {[], @icmpv6=@param_prob={0x4, 0x0, 0x0, 0x0, {0x0, 0x6, "cca2f6", 0x0, 0x3a, 0x0, @mcast2, @remote={0xfe, 0x80, '\x00', 0x0}, [@dstopts={0x88}]}}}}}}}) 07:25:55 executing program 2: open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) r0 = getpid() ktrace(&(0x7f00000002c0)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000280)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, 0x0, 0x0, &(0x7f0000000240)}, 0x0) 07:25:55 executing program 1: open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) r0 = getpid() ktrace(&(0x7f00000002c0)='./file0\x00', 0x0, 0xfcfc96ac7f78659a, r0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000280)={&(0x7f00000000c0)=@file={0x0, './file0\x00'}, 0xa, 0x0, 0x0, &(0x7f0000000240)}, 0x0) 2022/01/14 07:26:06 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory)