Warning: Permanently added '10.128.0.33' (ED25519) to the list of known hosts. 2021/12/23 02:41:08 fuzzer started 2021/12/23 02:41:10 dialing manager at 10.128.15.235:22938 2021/12/23 02:41:10 syscalls: 387 2021/12/23 02:41:10 code coverage: enabled 2021/12/23 02:41:10 comparison tracing: enabled 2021/12/23 02:41:10 extra coverage: enabled 2021/12/23 02:41:10 delay kcov mmap: enabled 2021/12/23 02:41:10 setuid sandbox: enabled 2021/12/23 02:41:10 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:41:10 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:41:10 fault injection: support is not implemented in syzkaller 2021/12/23 02:41:10 leak checking: support is not implemented in syzkaller 2021/12/23 02:41:10 net packet injection: enabled 2021/12/23 02:41:10 net device setup: support is not implemented in syzkaller 2021/12/23 02:41:10 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:41:10 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:41:10 USB emulation: support is not implemented in syzkaller 2021/12/23 02:41:10 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:41:10 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:41:10 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:41:10 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:41:10 fetching corpus: 20, signal 1590/4803 (executing program) 2021/12/23 02:41:10 fetching corpus: 20, signal 1590/6348 (executing program) 2021/12/23 02:41:10 fetching corpus: 20, signal 1590/7693 (executing program) 2021/12/23 02:41:10 fetching corpus: 20, signal 1590/7693 (executing program) 2021/12/23 02:41:10 starting 6 fuzzer processes 02:41:10 executing program 0: mprotect(&(0x7f000000f000/0x3000)=nil, 0x3000, 0x0) munmap(&(0x7f000000f000/0x2000)=nil, 0x2000) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0, 0x0) 02:41:10 executing program 2: mknod(&(0x7f0000000040)='./bus\x00', 0x2007, 0x40004004000828a6) acct(&(0x7f0000000080)='./bus\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1, 0x0) writev(r0, &(0x7f0000000100)=[{0x0}], 0x1) 02:41:10 executing program 1: syz_emit_ethernet(0x48, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6008200000123afffe8000000000000000000000000000aafe8000000000000000000000000000aa86"]) 02:41:10 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000140)={0x2, &(0x7f0000000080)=[{0x3c}, {0x16}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) syz_emit_ethernet(0x2a, &(0x7f0000000280)={@empty, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}, @udp={{0x3, 0x2, 0x8}}}}}}) 02:41:10 executing program 4: mprotect(&(0x7f00000da000/0x2000)=nil, 0xfffffffffffffce9, 0x0) 02:41:10 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000140)=[{0x87}, {0x3d}, {0x6, 0x0, 0x0, 0x100}]}) pwrite(r0, &(0x7f0000000000)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0, 0x0) 02:41:10 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000140)={0x2, &(0x7f0000000080)=[{0x3c}, {0x16}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) syz_emit_ethernet(0x2a, &(0x7f0000000280)={@empty, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}, @udp={{0x3, 0x2, 0x8}}}}}}) 02:41:10 executing program 1: syz_emit_ethernet(0x48, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6008200000123afffe8000000000000000000000000000aafe8000000000000000000000000000aa86"]) 02:41:10 executing program 0: mprotect(&(0x7f000000f000/0x3000)=nil, 0x3000, 0x0) munmap(&(0x7f000000f000/0x2000)=nil, 0x2000) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0, 0x0) 02:41:10 executing program 1: syz_emit_ethernet(0x48, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6008200000123afffe8000000000000000000000000000aafe8000000000000000000000000000aa86"]) 02:41:10 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000140)={0x2, &(0x7f0000000080)=[{0x3c}, {0x16}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) syz_emit_ethernet(0x2a, &(0x7f0000000280)={@empty, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}, @udp={{0x3, 0x2, 0x8}}}}}}) 02:41:10 executing program 0: mprotect(&(0x7f000000f000/0x3000)=nil, 0x3000, 0x0) munmap(&(0x7f000000f000/0x2000)=nil, 0x2000) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0, 0x0) 02:41:10 executing program 1: syz_emit_ethernet(0x48, &(0x7f0000000880)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6008200000123afffe8000000000000000000000000000aafe8000000000000000000000000000aa86"]) 02:41:10 executing program 2: mknod(&(0x7f0000000040)='./bus\x00', 0x2007, 0x40004004000828a6) acct(&(0x7f0000000080)='./bus\x00') r0 = open(&(0x7f00000000c0)='./bus\x00', 0x1, 0x0) writev(r0, &(0x7f0000000100)=[{0x0}], 0x1) 02:41:10 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000140)={0x2, &(0x7f0000000080)=[{0x3c}, {0x16}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) syz_emit_ethernet(0x2a, &(0x7f0000000280)={@empty, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}, @udp={{0x3, 0x2, 0x8}}}}}}) 02:41:10 executing program 0: mprotect(&(0x7f000000f000/0x3000)=nil, 0x3000, 0x0) munmap(&(0x7f000000f000/0x2000)=nil, 0x2000) mmap(&(0x7f0000010000/0x2000)=nil, 0x2000, 0x0, 0x1010, 0xffffffffffffffff, 0x0, 0x0) 2021/12/23 02:41:22 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: