Warning: Permanently added '10.128.0.228' (ED25519) to the list of known hosts. 2021/12/23 02:41:44 fuzzer started 2021/12/23 02:41:48 dialing manager at 10.128.15.235:22938 2021/12/23 02:41:48 syscalls: 387 2021/12/23 02:41:48 code coverage: enabled 2021/12/23 02:41:48 comparison tracing: enabled 2021/12/23 02:41:48 extra coverage: enabled 2021/12/23 02:41:48 delay kcov mmap: enabled 2021/12/23 02:41:48 setuid sandbox: enabled 2021/12/23 02:41:48 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:41:48 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:41:48 fault injection: support is not implemented in syzkaller 2021/12/23 02:41:48 leak checking: support is not implemented in syzkaller 2021/12/23 02:41:48 net packet injection: enabled 2021/12/23 02:41:48 net device setup: support is not implemented in syzkaller 2021/12/23 02:41:48 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:41:48 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:41:48 USB emulation: support is not implemented in syzkaller 2021/12/23 02:41:48 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:41:48 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:41:48 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:41:49 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:41:49 fetching corpus: 23, signal 1880/4994 (executing program) 2021/12/23 02:41:49 fetching corpus: 23, signal 1880/6548 (executing program) 2021/12/23 02:41:49 fetching corpus: 23, signal 1880/8094 (executing program) 2021/12/23 02:41:49 fetching corpus: 23, signal 1880/8427 (executing program) 2021/12/23 02:41:49 fetching corpus: 23, signal 1880/8427 (executing program) 2021/12/23 02:41:49 starting 6 fuzzer processes 02:41:49 executing program 4: sysctl$kern(&(0x7f0000000200)={0x1, 0x32}, 0x2, &(0x7f0000000000)="741c7e1f", &(0x7f0000000040)=0x4, &(0x7f0000000300)='\x00\x00\x00\x00', 0x4) 02:41:49 executing program 0: mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f00000002c0)='./file0/file0\x00', 0x0) unveil(&(0x7f0000000040)='./file0/file0\x00', &(0x7f00000000c0)='r\x00') unveil(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='r\x00') chroot(&(0x7f0000000180)='./file0/file0\x00') unveil(&(0x7f0000000440)='./file3\x00', &(0x7f0000000740)='r\x00') 02:41:49 executing program 1: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={{}, {[], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92], [0x0, 0x0, 0x2]}}}) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0xc}, {0x60}, {0x6, 0x0, 0x0, 0xfc}]}) pwrite(r1, &(0x7f00000001c0)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0, 0x0) geteuid() open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)) ktrace(&(0x7f0000000180)='./file0\x00', 0x0, 0xc0000030, r3) ktrace(&(0x7f0000000000)='./file1\x00', 0x2, 0x824, r3) socket(0x2, 0x2, 0x0) ioctl$FIOASYNC(r0, 0xcd604404, &(0x7f0000000240)) 02:41:49 executing program 2: madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000240)=@un=@file={0xd80f49edce43012d, './file0\x00'}, 0xa) dup2(r1, r0) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r2) connect$unix(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="00012e2f66696c653000"], 0xa) fsync(0xffffffffffffff9c) mlock(&(0x7f0000002000/0x2000)=nil, 0x2000) accept$unix(r1, &(0x7f0000001640)=@file={0x0, ""/58}, &(0x7f00000000c0)=0x249) 02:41:49 executing program 3: semget(0x2, 0x2, 0x282) 02:41:49 executing program 5: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000000080)={{0x0, 0xffffffffffffffff, 0xffffffffffffffff}}) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) r0 = socket(0x800000018, 0x2, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r1 = socket(0x18, 0x1, 0x0) setsockopt(r1, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r3, 0x0, 0x0) 02:41:49 executing program 2: madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000240)=@un=@file={0xd80f49edce43012d, './file0\x00'}, 0xa) dup2(r1, r0) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r2) connect$unix(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="00012e2f66696c653000"], 0xa) fsync(0xffffffffffffff9c) mlock(&(0x7f0000002000/0x2000)=nil, 0x2000) accept$unix(r1, &(0x7f0000001640)=@file={0x0, ""/58}, &(0x7f00000000c0)=0x249) 02:41:49 executing program 1: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={{}, {[], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92], [0x0, 0x0, 0x2]}}}) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0xc}, {0x60}, {0x6, 0x0, 0x0, 0xfc}]}) pwrite(r1, &(0x7f00000001c0)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0, 0x0) geteuid() open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)) ktrace(&(0x7f0000000180)='./file0\x00', 0x0, 0xc0000030, r3) ktrace(&(0x7f0000000000)='./file1\x00', 0x2, 0x824, r3) socket(0x2, 0x2, 0x0) ioctl$FIOASYNC(r0, 0xcd604404, &(0x7f0000000240)) 02:41:49 executing program 1: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000940)={{}, {[], [], [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x92], [0x0, 0x0, 0x2]}}}) r1 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x4000000001, 0x0) ioctl$BIOCSETIF(r1, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) ioctl$BIOCSETWF(r1, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000000)=[{0xc}, {0x60}, {0x6, 0x0, 0x0, 0xfc}]}) pwrite(r1, &(0x7f00000001c0)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0, 0x0) geteuid() open(&(0x7f0000000040)='./file0\x00', 0x70e, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$sock_cred(r2, 0xffff, 0x1022, &(0x7f0000000140)={0x0}, &(0x7f0000000100)) ktrace(&(0x7f0000000180)='./file0\x00', 0x0, 0xc0000030, r3) ktrace(&(0x7f0000000000)='./file1\x00', 0x2, 0x824, r3) socket(0x2, 0x2, 0x0) ioctl$FIOASYNC(r0, 0xcd604404, &(0x7f0000000240)) 02:41:49 executing program 3: semget(0x2, 0x2, 0x282) 02:41:49 executing program 3: semget(0x2, 0x2, 0x282) 02:41:49 executing program 2: madvise(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x80000000002) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) bind(r1, &(0x7f0000000240)=@un=@file={0xd80f49edce43012d, './file0\x00'}, 0xa) dup2(r1, r0) listen(r1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup2(r3, r2) connect$unix(r3, &(0x7f0000000000)=ANY=[@ANYBLOB="00012e2f66696c653000"], 0xa) fsync(0xffffffffffffff9c) mlock(&(0x7f0000002000/0x2000)=nil, 0x2000) accept$unix(r1, &(0x7f0000001640)=@file={0x0, ""/58}, &(0x7f00000000c0)=0x249) 2021/12/23 02:42:00 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: