Warning: Permanently added '10.128.0.39' (ED25519) to the list of known hosts. 2022/01/14 07:25:01 fuzzer started 2022/01/14 07:25:04 dialing manager at 10.128.15.235:5613 2022/01/14 07:25:04 syscalls: 387 2022/01/14 07:25:04 code coverage: enabled 2022/01/14 07:25:04 comparison tracing: enabled 2022/01/14 07:25:04 extra coverage: enabled 2022/01/14 07:25:04 delay kcov mmap: enabled 2022/01/14 07:25:04 setuid sandbox: enabled 2022/01/14 07:25:04 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:25:04 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:25:04 fault injection: support is not implemented in syzkaller 2022/01/14 07:25:04 leak checking: support is not implemented in syzkaller 2022/01/14 07:25:04 net packet injection: enabled 2022/01/14 07:25:04 net device setup: support is not implemented in syzkaller 2022/01/14 07:25:04 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:25:04 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:25:04 USB emulation: support is not implemented in syzkaller 2022/01/14 07:25:04 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:25:04 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:25:04 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:25:04 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:25:04 fetching corpus: 9, signal 1348/4007 (executing program) 2022/01/14 07:25:04 fetching corpus: 9, signal 1348/4030 (executing program) 2022/01/14 07:25:04 fetching corpus: 9, signal 1348/4030 (executing program) 2022/01/14 07:25:05 starting 8 fuzzer processes 07:25:05 executing program 0: setrlimit(0x3, &(0x7f0000000180)={0x100000, 0x100000}) 07:25:05 executing program 1: r0 = socket(0x18, 0x2, 0x0) setsockopt(r0, 0x29, 0x23, &(0x7f0000000140)="9513f3948292ae269282d455abab56626afd70c6e9b3fda3181149ee114dd200a92ef2b465bbc11fcfdb71b72ce278fa941a79b7d45722a806d166b1bc4513bb05a76025938759964a53c6bb7cf2394a7ab24012dc56fa2aa2786a7b4b39b7a51bf1baa51d3fb561c0ce637ef3c53f88edcc758d1e1eff1031571ebb9a54c1ea8426de968ad829470aa55d5b3eb81a62a35e0b41bc906838a88d756b2d17d0d7", 0xa0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@in={0x2, 0x0}, 0xc, 0x0, 0x0, &(0x7f0000000580)=[{0x10}], 0x10}, 0x0) 07:25:05 executing program 2: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BIOCSETIF(r0, 0xc0284414, &(0x7f0000000040)={'tap', 0x0}) 07:25:05 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000001740)=""/4096, 0x1000) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r3, 0x4, 0x80) pwritev(r3, &(0x7f00000003c0), 0x273, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x0) write(r1, &(0x7f0000000100)='w', 0x1) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(r4, 0xc5005601, &(0x7f0000000580)={0x1, 0x0, 0x1, {[0x0, 0x0, 0x0, 0x20000000, 0x200000]}}) 07:25:05 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x0, 0x10, r0, 0x0) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)) 07:25:05 executing program 6: r0 = socket(0x11, 0x4003, 0x0) sendto$unix(r0, &(0x7f0000000000)="b1000513600000000000000004000000000004fe8ad8562d370a6ab8e10f35cea11ea8fef96ecfc73fd3357ae26caa0416fa4f376336acf02b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37280f18e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f75006ee01b1257aea8c500ff0002000000000000020208a371a3f800040000000000", 0xb1, 0x0, 0x0, 0x0) 07:25:05 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x20}, {0x1}, {0x7ffffffe}]}) syz_emit_ethernet(0x3e, &(0x7f0000000280)={@random="1b160e744c36", @random="08800ef22172", [], {@ipv6={0x86dd, {0x0, 0x6, "3d6ba3", 0x8, 0x0, 0x0, @rand_addr="de00000000000000000400", @rand_addr="000000000300000000000100", {[], @udp={{0x0, 0x0, 0x8}}}}}}}) 07:25:05 executing program 7: r0 = socket$inet6(0x18, 0x1, 0x0) setsockopt$inet6_MRT6_ADD_MFC(r0, 0x29, 0xe, 0x0, 0x0) 07:25:05 executing program 0: setrlimit(0x3, &(0x7f0000000180)={0x100000, 0x100000}) 07:25:05 executing program 0: setrlimit(0x3, &(0x7f0000000180)={0x100000, 0x100000}) 07:25:05 executing program 0: setrlimit(0x3, &(0x7f0000000180)={0x100000, 0x100000}) 07:25:05 executing program 2: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BIOCSETIF(r0, 0xc0284414, &(0x7f0000000040)={'tap', 0x0}) 07:25:05 executing program 0: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BIOCSETIF(r0, 0xc0284414, &(0x7f0000000040)={'tap', 0x0}) 07:25:05 executing program 2: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BIOCSETIF(r0, 0xc0284414, &(0x7f0000000040)={'tap', 0x0}) 07:25:05 executing program 0: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BIOCSETIF(r0, 0xc0284414, &(0x7f0000000040)={'tap', 0x0}) 07:25:05 executing program 1: r0 = socket(0x18, 0x2, 0x0) setsockopt(r0, 0x29, 0x23, &(0x7f0000000140)="9513f3948292ae269282d455abab56626afd70c6e9b3fda3181149ee114dd200a92ef2b465bbc11fcfdb71b72ce278fa941a79b7d45722a806d166b1bc4513bb05a76025938759964a53c6bb7cf2394a7ab24012dc56fa2aa2786a7b4b39b7a51bf1baa51d3fb561c0ce637ef3c53f88edcc758d1e1eff1031571ebb9a54c1ea8426de968ad829470aa55d5b3eb81a62a35e0b41bc906838a88d756b2d17d0d7", 0xa0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@in={0x2, 0x0}, 0xc, 0x0, 0x0, &(0x7f0000000580)=[{0x10}], 0x10}, 0x0) 07:25:05 executing program 1: r0 = socket(0x18, 0x2, 0x0) setsockopt(r0, 0x29, 0x23, &(0x7f0000000140)="9513f3948292ae269282d455abab56626afd70c6e9b3fda3181149ee114dd200a92ef2b465bbc11fcfdb71b72ce278fa941a79b7d45722a806d166b1bc4513bb05a76025938759964a53c6bb7cf2394a7ab24012dc56fa2aa2786a7b4b39b7a51bf1baa51d3fb561c0ce637ef3c53f88edcc758d1e1eff1031571ebb9a54c1ea8426de968ad829470aa55d5b3eb81a62a35e0b41bc906838a88d756b2d17d0d7", 0xa0) sendmsg(r0, &(0x7f0000000340)={&(0x7f0000000000)=@in={0x2, 0x0}, 0xc, 0x0, 0x0, &(0x7f0000000580)=[{0x10}], 0x10}, 0x0) 07:25:05 executing program 2: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BIOCSETIF(r0, 0xc0284414, &(0x7f0000000040)={'tap', 0x0}) 07:25:05 executing program 0: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BIOCSETIF(r0, 0xc0284414, &(0x7f0000000040)={'tap', 0x0}) 07:25:05 executing program 3: pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000040)='./file0\x00', 0x200, 0x0) r2 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0) read(r0, &(0x7f0000001740)=""/4096, 0x1000) preadv(0xffffffffffffffff, &(0x7f00000004c0)=[{&(0x7f0000001640)=""/247, 0xffffffcc}], 0x1, 0x0) r3 = open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) fcntl$setstatus(r3, 0x4, 0x80) pwritev(r3, &(0x7f00000003c0), 0x273, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x10, r2, 0x0) write(r1, &(0x7f0000000100)='w', 0x1) r4 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) ioctl$VMM_IOC_WRITEREGS(r4, 0xc5005601, &(0x7f0000000580)={0x1, 0x0, 0x1, {[0x0, 0x0, 0x0, 0x20000000, 0x200000]}}) 2022/01/14 07:25:18 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: