Warning: Permanently added '10.128.15.198' (ED25519) to the list of known hosts. 2021/12/23 02:41:29 fuzzer started 2021/12/23 02:41:32 dialing manager at 10.128.15.235:42845 2021/12/23 02:41:32 syscalls: 387 2021/12/23 02:41:32 code coverage: enabled 2021/12/23 02:41:32 comparison tracing: enabled 2021/12/23 02:41:32 extra coverage: enabled 2021/12/23 02:41:32 delay kcov mmap: enabled 2021/12/23 02:41:32 setuid sandbox: enabled 2021/12/23 02:41:32 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:41:32 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:41:32 fault injection: support is not implemented in syzkaller 2021/12/23 02:41:32 leak checking: support is not implemented in syzkaller 2021/12/23 02:41:32 net packet injection: enabled 2021/12/23 02:41:32 net device setup: support is not implemented in syzkaller 2021/12/23 02:41:32 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:41:32 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:41:32 USB emulation: support is not implemented in syzkaller 2021/12/23 02:41:32 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:41:32 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:41:32 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:41:32 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:41:32 fetching corpus: 32, signal 4036/6449 (executing program) 2021/12/23 02:41:32 fetching corpus: 32, signal 4036/7649 (executing program) 2021/12/23 02:41:32 fetching corpus: 32, signal 4036/8868 (executing program) 2021/12/23 02:41:32 fetching corpus: 32, signal 4036/10064 (executing program) 2021/12/23 02:41:32 fetching corpus: 32, signal 4036/10173 (executing program) 2021/12/23 02:41:32 fetching corpus: 32, signal 4036/10173 (executing program) 2021/12/23 02:41:32 starting 6 fuzzer processes 02:41:33 executing program 0: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffff, 0x0, "2e000000000000000000f2ffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x18, 0x2, 0x0) close(r1) r2 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) setsockopt(r2, 0x29, 0x4, &(0x7f00000001c0)='\x00\x00\x00\x00', 0x4) write(r0, &(0x7f0000000100)="d13d1b7d72ad0333", 0x14) 02:41:33 executing program 1: sysctl$kern(&(0x7f0000000000)={0x1, 0x28}, 0x2, 0x0, 0x0, 0x0, 0x0) 02:41:33 executing program 2: r0 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000080), 0x2b1, 0x0) ioctl$WSKBDIO_GETDEFAULTBELL(r0, 0x40105706, &(0x7f0000000000)) 02:41:33 executing program 3: r0 = socket(0x400000000018, 0x3, 0x800000000000003a) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) setsockopt(r0, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x67, &(0x7f0000000000), 0xc) 02:41:33 executing program 4: r0 = socket(0x10000000011, 0x8000000003, 0x0) close(r0) socket(0x2, 0x3, 0x102) setsockopt$sock_int(r0, 0xffff, 0x2000, &(0x7f00000000c0)=0x2, 0x4) sendto(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)=@in={0x2, 0x3}, 0xc) 02:41:33 executing program 5: sysctl$vm(&(0x7f0000000040)={0x2, 0x7}, 0x2, &(0x7f0000000080)="4c85dad3", &(0x7f0000000140)=0x4, &(0x7f0000000180)="2cbb6d74", 0x4) 02:41:33 executing program 3: r0 = socket(0x400000000018, 0x3, 0x800000000000003a) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) setsockopt(r0, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x67, &(0x7f0000000000), 0xc) 02:41:33 executing program 0: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffff, 0x0, "2e000000000000000000f2ffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x18, 0x2, 0x0) close(r1) r2 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) setsockopt(r2, 0x29, 0x4, &(0x7f00000001c0)='\x00\x00\x00\x00', 0x4) write(r0, &(0x7f0000000100)="d13d1b7d72ad0333", 0x14) 02:41:33 executing program 3: r0 = socket(0x400000000018, 0x3, 0x800000000000003a) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) setsockopt(r0, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x67, &(0x7f0000000000), 0xc) 02:41:33 executing program 2: r0 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000080), 0x2b1, 0x0) ioctl$WSKBDIO_GETDEFAULTBELL(r0, 0x40105706, &(0x7f0000000000)) 02:41:33 executing program 3: r0 = socket(0x400000000018, 0x3, 0x800000000000003a) ioctl$WSMUXIO_REMOVE_DEVICE(0xffffffffffffffff, 0x80085762, &(0x7f0000000040)={0x1}) setsockopt(r0, 0x29, 0x6c, &(0x7f0000000040), 0x4) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x66, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x1}, 0xc) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x67, &(0x7f0000000000), 0xc) 02:41:33 executing program 2: r0 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000080), 0x2b1, 0x0) ioctl$WSKBDIO_GETDEFAULTBELL(r0, 0x40105706, &(0x7f0000000000)) 02:41:33 executing program 0: ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffff, 0x0, "2e000000000000000000f2ffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) close(r0) r1 = socket(0x18, 0x2, 0x0) close(r1) r2 = socket(0x400000000018, 0x3, 0x3a) setsockopt(r1, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r0, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) setsockopt(r2, 0x29, 0x4, &(0x7f00000001c0)='\x00\x00\x00\x00', 0x4) write(r0, &(0x7f0000000100)="d13d1b7d72ad0333", 0x14) 02:41:33 executing program 1: sysctl$kern(&(0x7f0000000000)={0x1, 0x28}, 0x2, 0x0, 0x0, 0x0, 0x0) 02:41:33 executing program 3: r0 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000080), 0x2b1, 0x0) ioctl$WSKBDIO_GETDEFAULTBELL(r0, 0x40105706, &(0x7f0000000000)) 02:41:33 executing program 3: r0 = openat$wskbd(0xffffffffffffff9c, &(0x7f0000000080), 0x2b1, 0x0) ioctl$WSKBDIO_GETDEFAULTBELL(r0, 0x40105706, &(0x7f0000000000)) 2021/12/23 02:41:45 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory)