Warning: Permanently added '10.128.1.115' (ED25519) to the list of known hosts. 2022/01/14 07:24:49 fuzzer started 2022/01/14 07:24:52 dialing manager at 10.128.15.235:5613 2022/01/14 07:24:52 syscalls: 387 2022/01/14 07:24:52 code coverage: enabled 2022/01/14 07:24:52 comparison tracing: enabled 2022/01/14 07:24:52 extra coverage: enabled 2022/01/14 07:24:52 delay kcov mmap: enabled 2022/01/14 07:24:52 setuid sandbox: enabled 2022/01/14 07:24:52 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:24:52 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:24:52 fault injection: support is not implemented in syzkaller 2022/01/14 07:24:52 leak checking: support is not implemented in syzkaller 2022/01/14 07:24:52 net packet injection: enabled 2022/01/14 07:24:52 net device setup: support is not implemented in syzkaller 2022/01/14 07:24:52 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:24:52 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:24:52 USB emulation: support is not implemented in syzkaller 2022/01/14 07:24:52 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:24:52 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:24:52 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:24:52 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:24:52 fetching corpus: 6, signal 1149/3515 (executing program) 2022/01/14 07:24:52 fetching corpus: 6, signal 1149/3515 (executing program) 2022/01/14 07:24:52 starting 8 fuzzer processes 07:24:52 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) shutdown(r0, 0x2) select(0x40, &(0x7f0000000040)={0xff}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0) 07:24:52 executing program 1: r0 = socket(0x2, 0x4003, 0x0) setsockopt(r0, 0x0, 0x2, &(0x7f0000000140)="99fe358a", 0x4) connect$unix(r0, &(0x7f0000001c80)=ANY=[@ANYBLOB="8202"], 0x10) write(r0, &(0x7f0000000180)="b4d2cc3b78efffa8b8823b99a6d20feff4fde776", 0x14) 07:24:52 executing program 2: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000280)={0x3, &(0x7f0000000040)=[{}, {0x5, 0x0, 0x0, 0x1f}, {0x6}]}) sysctl$kern(&(0x7f0000000040)={0x1, 0x42}, 0x6, &(0x7f0000000080)="f7a451e4a37b0df30b1d32cb", &(0x7f0000000180)=0xea, 0x0, 0x0) 07:24:52 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x462, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000280)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0xc}, {0x7}, {0x4000006, 0x0, 0x0, 0x10102}]}) pwrite(r0, &(0x7f0000000100)="0000000000424374cfb5f0b099b9", 0xe, 0x0) 07:24:52 executing program 6: r0 = open(&(0x7f0000000080)='./file0\x00', 0x612, 0x0) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000440)="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", 0x1dc}, {&(0x7f0000000040)="37a2cba9bab90d18db1e8cf27015d61975aa538e19e3ff00879f8c", 0x1b}, {&(0x7f0000000180)="e7b09c4e134d3c1c27f51254fca351a3ab3cc51407fac793d943436ff82c73f89f93051691725198be6df552157cd200ba9872b3ffba43a1472a71e0b24ddf2e546f0f4c49b8d762ecee72f451264602b977bce0b6f1e88a5808436ff990f2d36e239246484e8826edce6165283c57beb26e72b009eaadd6ba86e91dda8cd15ca5e6eaafcdb2d62c1261738396c4984f6b1a4df599e0fbf77d40c5902321c9c3944d17cf3b1202d00a3c444db6cb4e1d296f", 0xb2}, {&(0x7f0000000640)="fdb2617e274d09632ad0e17beba97ff45163e8ce5f25fe2789c092412d280a839c4560a374e34321424a5e4801b2ab7359dd24faf8f617713b2ad1870350f6d7253e2f40dee9", 0x46}, {&(0x7f0000000bc0)="bbf5ee8bfbfa29ab52b08e465fc790d1e1990dc656b54225f03b34", 0x1b}], 0x5) mmap(&(0x7f0000000000/0x13000)=nil, 0x13000, 0x5, 0x10, r0, 0x0) r1 = socket(0x18, 0x3, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$TIOCFLUSH(r2, 0x80206979, &(0x7f0000000300)) 07:24:52 executing program 4: mknod(&(0x7f0000000140)='./bus\x00', 0x2000, 0x5302) open$dir(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) 07:24:52 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000100)=[{0x7c}, {0x14}, {0x6}]}) pwrite(r0, &(0x7f00000001c0)='2', 0x1, 0x0) 07:24:52 executing program 7: select(0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xfffffffffffff1fe}) 07:24:53 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x462, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000280)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0xc}, {0x7}, {0x4000006, 0x0, 0x0, 0x10102}]}) pwrite(r0, &(0x7f0000000100)="0000000000424374cfb5f0b099b9", 0xe, 0x0) 07:24:53 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x462, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000280)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0xc}, {0x7}, {0x4000006, 0x0, 0x0, 0x10102}]}) pwrite(r0, &(0x7f0000000100)="0000000000424374cfb5f0b099b9", 0xe, 0x0) 07:24:53 executing program 1: r0 = socket(0x2, 0x4003, 0x0) setsockopt(r0, 0x0, 0x2, &(0x7f0000000140)="99fe358a", 0x4) connect$unix(r0, &(0x7f0000001c80)=ANY=[@ANYBLOB="8202"], 0x10) write(r0, &(0x7f0000000180)="b4d2cc3b78efffa8b8823b99a6d20feff4fde776", 0x14) 07:24:53 executing program 1: r0 = socket(0x2, 0x4003, 0x0) setsockopt(r0, 0x0, 0x2, &(0x7f0000000140)="99fe358a", 0x4) connect$unix(r0, &(0x7f0000001c80)=ANY=[@ANYBLOB="8202"], 0x10) write(r0, &(0x7f0000000180)="b4d2cc3b78efffa8b8823b99a6d20feff4fde776", 0x14) 07:24:53 executing program 2: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000280)={0x3, &(0x7f0000000040)=[{}, {0x5, 0x0, 0x0, 0x1f}, {0x6}]}) sysctl$kern(&(0x7f0000000040)={0x1, 0x42}, 0x6, &(0x7f0000000080)="f7a451e4a37b0df30b1d32cb", &(0x7f0000000180)=0xea, 0x0, 0x0) 07:24:53 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) shutdown(r0, 0x2) select(0x40, &(0x7f0000000040)={0xff}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0) 07:24:53 executing program 1: r0 = socket(0x2, 0x4003, 0x0) setsockopt(r0, 0x0, 0x2, &(0x7f0000000140)="99fe358a", 0x4) connect$unix(r0, &(0x7f0000001c80)=ANY=[@ANYBLOB="8202"], 0x10) write(r0, &(0x7f0000000180)="b4d2cc3b78efffa8b8823b99a6d20feff4fde776", 0x14) 07:24:53 executing program 2: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000280)={0x3, &(0x7f0000000040)=[{}, {0x5, 0x0, 0x0, 0x1f}, {0x6}]}) sysctl$kern(&(0x7f0000000040)={0x1, 0x42}, 0x6, &(0x7f0000000080)="f7a451e4a37b0df30b1d32cb", &(0x7f0000000180)=0xea, 0x0, 0x0) 07:24:53 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x462, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000280)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0xc}, {0x7}, {0x4000006, 0x0, 0x0, 0x10102}]}) pwrite(r0, &(0x7f0000000100)="0000000000424374cfb5f0b099b9", 0xe, 0x0) 07:24:53 executing program 2: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000280)={0x3, &(0x7f0000000040)=[{}, {0x5, 0x0, 0x0, 0x1f}, {0x6}]}) sysctl$kern(&(0x7f0000000040)={0x1, 0x42}, 0x6, &(0x7f0000000080)="f7a451e4a37b0df30b1d32cb", &(0x7f0000000180)=0xea, 0x0, 0x0) 07:24:53 executing program 1: r0 = socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) shutdown(r0, 0x2) select(0x40, &(0x7f0000000040)={0xff}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0) 07:24:53 executing program 0: r0 = socket$inet(0x2, 0x1, 0x0) listen(r0, 0x0) shutdown(r0, 0x2) select(0x40, &(0x7f0000000040)={0xff}, 0x0, 0x0, 0x0) select(0x40, &(0x7f0000000000)={0x9}, 0x0, 0x0, 0x0) 2022/01/14 07:25:04 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: