Warning: Permanently added '10.128.0.50' (ED25519) to the list of known hosts. 2022/01/14 03:28:23 fuzzer started 2022/01/14 03:28:26 dialing manager at 10.128.15.235:38506 2022/01/14 03:28:26 syscalls: 387 2022/01/14 03:28:26 code coverage: enabled 2022/01/14 03:28:26 comparison tracing: enabled 2022/01/14 03:28:26 extra coverage: enabled 2022/01/14 03:28:26 delay kcov mmap: enabled 2022/01/14 03:28:26 setuid sandbox: enabled 2022/01/14 03:28:26 namespace sandbox: support is not implemented in syzkaller 2022/01/14 03:28:26 Android sandbox: support is not implemented in syzkaller 2022/01/14 03:28:26 fault injection: support is not implemented in syzkaller 2022/01/14 03:28:26 leak checking: support is not implemented in syzkaller 2022/01/14 03:28:26 net packet injection: enabled 2022/01/14 03:28:26 net device setup: support is not implemented in syzkaller 2022/01/14 03:28:26 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 03:28:26 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 03:28:26 USB emulation: support is not implemented in syzkaller 2022/01/14 03:28:26 hci packet injection: support is not implemented in syzkaller 2022/01/14 03:28:26 wifi device emulation: support is not implemented in syzkaller 2022/01/14 03:28:26 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 03:28:26 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 03:28:26 fetching corpus: 16, signal 1706/4741 (executing program) 2022/01/14 03:28:26 fetching corpus: 16, signal 1706/6198 (executing program) 2022/01/14 03:28:26 fetching corpus: 16, signal 1706/6743 (executing program) 2022/01/14 03:28:26 fetching corpus: 16, signal 1706/6743 (executing program) 2022/01/14 03:28:26 starting 8 fuzzer processes 03:28:26 executing program 0: mknod(&(0x7f00000000c0)='./bus\x00', 0x2040, 0x4f4b) r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETA(r0, 0xc3304221, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "04713de0af28a2813d8209b8d9f39321849e3c99"}) 03:28:26 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000002600)={@random="0d05b5a90ca7", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "102f22", 0x24, 0x3a, 0xff, @rand_addr="01000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@ndisc_rs={0x85, 0x0, 0x0, '\x00', [{0x0, 0x3, "650790105bdad88b1f3631958e62baa6218574ac9135cb980fda"}]}}}}}}) 03:28:26 executing program 1: r0 = socket(0x18, 0x1, 0x0) r1 = socket(0x800000018, 0x1, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) listen(r1, 0x0) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "0000000000000001008e7d00000000ddf500"}) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f00000001c0)=0x7, 0x4) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="c37afef3a28f6970ccfec27a751e9e54f9cf6ddf50caa322de43b69810bc4d34d8d4010b780c4acd93f39a1837bd0f854804983404930b5b3b9450e48a89d9e83ca92ef477df", 0x46}], 0x1) 03:28:26 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{}, {0x87}, {0x6, 0x0, 0x0, 0xfd}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) write(r0, &(0x7f0000000080)="7cd23fc0aa17dddf7830faa1aaab", 0xe) 03:28:26 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getsockopt$sock_int(r0, 0xffff, 0x100, 0x0, 0x0) 03:28:26 executing program 5: mknodat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x12080, 0x5cf9) open$dir(&(0x7f00000002c0)='./file0\x00', 0x0, 0x0) open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = openat$vnd(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$VNDIOCSET(r0, 0xc0384600, &(0x7f00000001c0)={&(0x7f0000000100)='./file0\x00', 0x101, 0x0}) 03:28:26 executing program 6: syz_emit_ethernet(0x62, &(0x7f0000000000)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x54, 0x0, 0x0, 0x0, 0x1, 0x0, @broadcast, @broadcast}, @icmp=@dest_unreach={0x3, 0x8, 0x0, 0x0, 0x0, 0x0, {0xe, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x29, 0x0, @remote={0xac, 0x14, 0x0}, @empty, {[@timestamp={0x44, 0x18, 0x0, 0x0, 0x0, [{}, {}, {}, {[@loopback]}]}, @lsrr={0x83, 0x3}, @ssrr={0x89, 0x7, 0x0, [@remote={0xac, 0x14, 0x0}]}]}}}}}}}) write(0xffffffffffffffff, &(0x7f0000000080)="2078f7b69541d6d970", 0x9) r0 = socket(0x2, 0x1, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0xc0106978, &(0x7f0000000080)) r2 = msgget$private(0x0, 0x5) msgsnd(r2, &(0x7f0000000c80)=ANY=[@ANYBLOB="01000000000000002e1100b0df6d7fcf409def1a1fc1ed341c5533b89b0603ae37c860fe2c09c110ff00f45709d664539e1e381f35071f061ac0e16f328dca5d39656da02489672db6d19f37405111e97aa998473f0e8d1e8f3b32b99730931041cfd6c2df99a9d60031c125814bb6ee11e303000000b33d0000000049ad4ae8d462fcf5fa3b57806356cdb615f058b0fed6706a4d152ed0cea438f8387c3440ba6ba9cc08452fc04250db61cf3bcacfe9d34b6a31de9d05a5615416a1e222dcba8dee9f0cdc7527d27e8a15b700000000000000000000000000000000cd846e9ea6bfe963e86814a576b24813ddfa8130a04b4ad6d8791c698df63e5e23fa5f7326484829f3f7769669e325cd2485e172bf12"], 0x44b, 0x800) msgrcv(r2, 0x0, 0x0, 0x2, 0x0) msgsnd(r2, &(0x7f0000000080)={0x2, "b324e98f72b7d93db3d60b80af80cee73b6cbdcabf9338e2798ef3c52fe72a2a5470154755dc3365d18ed616b9e683c0099f70e246d2649fa910b8187fc7"}, 0x46, 0x0) r3 = msgget(0x1, 0x20) msgrcv(r3, &(0x7f0000000100)={0x0, ""/89}, 0x61, 0x2, 0x0) msgget$private(0x0, 0x420) 03:28:26 executing program 7: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@broadcast, @random='\x00\x00;mR\x00', [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1}, @icmp=@generic={0xc, 0x81, 0x0, "e7254d59"}}}}}) 03:28:26 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{}, {0x87}, {0x6, 0x0, 0x0, 0xfd}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) write(r0, &(0x7f0000000080)="7cd23fc0aa17dddf7830faa1aaab", 0xe) 03:28:27 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{}, {0x87}, {0x6, 0x0, 0x0, 0xfd}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) write(r0, &(0x7f0000000080)="7cd23fc0aa17dddf7830faa1aaab", 0xe) 03:28:27 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f00000000c0)=[{}, {0x87}, {0x6, 0x0, 0x0, 0xfd}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) write(r0, &(0x7f0000000080)="7cd23fc0aa17dddf7830faa1aaab", 0xe) 03:28:27 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000002600)={@random="0d05b5a90ca7", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "102f22", 0x24, 0x3a, 0xff, @rand_addr="01000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@ndisc_rs={0x85, 0x0, 0x0, '\x00', [{0x0, 0x3, "650790105bdad88b1f3631958e62baa6218574ac9135cb980fda"}]}}}}}}) 03:28:27 executing program 0: mknod(&(0x7f00000000c0)='./bus\x00', 0x2040, 0x4f4b) r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETA(r0, 0xc3304221, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "04713de0af28a2813d8209b8d9f39321849e3c99"}) 03:28:27 executing program 3: mknod(&(0x7f00000000c0)='./bus\x00', 0x2040, 0x4f4b) r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETA(r0, 0xc3304221, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "04713de0af28a2813d8209b8d9f39321849e3c99"}) 03:28:27 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000002600)={@random="0d05b5a90ca7", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "102f22", 0x24, 0x3a, 0xff, @rand_addr="01000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@ndisc_rs={0x85, 0x0, 0x0, '\x00', [{0x0, 0x3, "650790105bdad88b1f3631958e62baa6218574ac9135cb980fda"}]}}}}}}) 03:28:27 executing program 0: mknod(&(0x7f00000000c0)='./bus\x00', 0x2040, 0x4f4b) r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETA(r0, 0xc3304221, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "04713de0af28a2813d8209b8d9f39321849e3c99"}) 03:28:27 executing program 2: syz_emit_ethernet(0x5a, &(0x7f0000002600)={@random="0d05b5a90ca7", @empty, [], {@ipv6={0x86dd, {0x0, 0x6, "102f22", 0x24, 0x3a, 0xff, @rand_addr="01000100", @local={0xfe, 0x80, '\x00', 0x0}, {[], @icmpv6=@ndisc_rs={0x85, 0x0, 0x0, '\x00', [{0x0, 0x3, "650790105bdad88b1f3631958e62baa6218574ac9135cb980fda"}]}}}}}}) 03:28:27 executing program 3: mknod(&(0x7f00000000c0)='./bus\x00', 0x2040, 0x4f4b) r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETA(r0, 0xc3304221, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "04713de0af28a2813d8209b8d9f39321849e3c99"}) 03:28:27 executing program 1: r0 = socket(0x18, 0x1, 0x0) r1 = socket(0x800000018, 0x1, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) listen(r1, 0x0) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "0000000000000001008e7d00000000ddf500"}) connect$unix(r0, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) setsockopt$sock_int(r0, 0xffff, 0x1001, &(0x7f00000001c0)=0x7, 0x4) writev(r0, &(0x7f0000000500)=[{&(0x7f0000000100)="c37afef3a28f6970ccfec27a751e9e54f9cf6ddf50caa322de43b69810bc4d34d8d4010b780c4acd93f39a1837bd0f854804983404930b5b3b9450e48a89d9e83ca92ef477df", 0x46}], 0x1) 03:28:27 executing program 0: mknod(&(0x7f00000000c0)='./bus\x00', 0x2040, 0x4f4b) r0 = open(&(0x7f0000000140)='./bus\x00', 0x0, 0x0) ioctl$TIOCSETA(r0, 0xc3304221, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, "04713de0af28a2813d8209b8d9f39321849e3c99"}) 2022/01/14 03:28:39 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: