Warning: Permanently added '10.128.0.216' (ED25519) to the list of known hosts. 2022/01/14 07:36:48 fuzzer started 2022/01/14 07:36:50 dialing manager at 10.128.15.235:5613 2022/01/14 07:36:50 syscalls: 387 2022/01/14 07:36:50 code coverage: enabled 2022/01/14 07:36:50 comparison tracing: enabled 2022/01/14 07:36:50 extra coverage: enabled 2022/01/14 07:36:50 delay kcov mmap: enabled 2022/01/14 07:36:50 setuid sandbox: enabled 2022/01/14 07:36:50 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:36:50 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:36:50 fault injection: support is not implemented in syzkaller 2022/01/14 07:36:50 leak checking: support is not implemented in syzkaller 2022/01/14 07:36:50 net packet injection: enabled 2022/01/14 07:36:50 net device setup: support is not implemented in syzkaller 2022/01/14 07:36:50 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:36:50 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:36:50 USB emulation: support is not implemented in syzkaller 2022/01/14 07:36:50 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:36:50 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:36:50 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:36:51 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:36:51 fetching corpus: 50, signal 3921/6946 (executing program) 2022/01/14 07:36:51 fetching corpus: 100, signal 5604/9520 (executing program) 2022/01/14 07:36:51 fetching corpus: 150, signal 7020/11427 (executing program) 2022/01/14 07:36:51 fetching corpus: 161, signal 7550/12702 (executing program) 2022/01/14 07:36:51 fetching corpus: 161, signal 7550/13734 (executing program) 2022/01/14 07:36:51 fetching corpus: 161, signal 7550/14785 (executing program) 2022/01/14 07:36:51 fetching corpus: 161, signal 7550/15643 (executing program) 2022/01/14 07:36:51 fetching corpus: 161, signal 7550/15643 (executing program) 2022/01/14 07:36:51 starting 8 fuzzer processes 07:36:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x100000000}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) fcntl$lock(r1, 0x8, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x100000001}) fcntl$lock(r1, 0x9, &(0x7f0000000000)={0x1, 0x0, 0x4, 0x100000001}) 07:36:51 executing program 1: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x2f, 0x0, 0x0) 07:36:51 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f00000002c0)="eaff000000000000", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f00000000c0)="eaff125c7f000001", 0x8) 07:36:51 executing program 3: r0 = socket(0x11, 0x4003, 0x0) r1 = dup(r0) sendto$unix(r1, &(0x7f0000000000)="b10005016000009005001b0007000000000004fecea11ea8fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff3728211ee4fd89720fd3872babfbb770a9f5a872c881ff7cc53c895303b22f310b404f36a00f90006ee01b00000000000200"/177, 0xb1, 0x0, 0x0, 0x0) 07:36:51 executing program 5: r0 = socket(0x11, 0x4003, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$sock_int(r1, 0xffff, 0x1002, &(0x7f0000000000)=0x1ff, 0x4) sendto$unix(r0, &(0x7f0000000040)="b100050460000000000008000501000000000000cea1fea7fef96eefc73fd3357ae26caa0416fa76d06336acf00b7804be781e4991f7c8df5f882b2b7be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27ecb5d602000d7d026ba8af63ff37282921e4fd89720fd3872babfbb770c1abda71601a8bfee8aca4911faff5a872c881ff7cc53c894303b22f310b404f36a00f9000fc190d571aa189f381f80004000000000000000100"/177, 0xb1, 0x0, 0x0, 0x0) 07:36:51 executing program 4: seteuid(0xffffffffffffffff) ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000280)={0x3, &(0x7f0000000040)=[{}, {0x1, 0x0, 0x0, 0x2}, {0x6, 0x0, 0x0, 0x4a21}]}) sysctl$kern(&(0x7f0000000040)={0x1, 0x49}, 0x6, &(0x7f0000000080)="f7a451e4a37b0df30b1d32cb", &(0x7f0000000180)=0x68a, 0x0, 0x0) 07:36:51 executing program 6: syz_emit_ethernet(0x23d, &(0x7f0000000580)=ANY=[@ANYBLOB="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"]) openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$VMM_IOC_RUN(0xffffffffffffffff, 0xc0205602, &(0x7f00000000c0)={0x0, 0xbb7c, 0x0, 0x0, &(0x7f0000000c40)={{0x0, 0x0, 0xcc}, {[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x4, 0xffffffffffffffff, 0x2], [0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4], [0x0, 0x4], [0x1], [{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0xfff}, {0x0, 0x0, 0x2}, {}, {0x0, 0x2}, {}, {}, {0x0, 0x0, 0x4}]}}, 0x8}) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x6) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x2) 07:36:51 executing program 7: syz_emit_ethernet(0x23d, &(0x7f0000000580)=ANY=[@ANYBLOB="e64bc49a217faaaaaaaaaabb88a8210081002a0086dd6fd487ad01ff2c47fe800000000000000000000000004c56c01b31f100bbff0200000000000000000000000000013b0004d1640000001d0007406700000011008001640080003300a7d0680000006c04000400000000ff02800000000000000000000000000100000000000000000000ffffac1400aa001900000000e60034c1daabe5ccc60981b7b54c632ad20d2622baef656253eb4a8a5e1a344dd9b44708085d6d00774e2518c613a50f5922172c826f7beb77943b"]) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x6) ioctl$FIOASYNC(r0, 0xcd60441a, &(0x7f0000000240)=0x2) 07:36:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x100000000}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) fcntl$lock(r1, 0x8, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x100000001}) fcntl$lock(r1, 0x9, &(0x7f0000000000)={0x1, 0x0, 0x4, 0x100000001}) 07:36:51 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f00000002c0)="eaff000000000000", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f00000000c0)="eaff125c7f000001", 0x8) 07:36:51 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f00000002c0)="eaff000000000000", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f00000000c0)="eaff125c7f000001", 0x8) 07:36:51 executing program 1: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x2f, 0x0, 0x0) 07:36:51 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f00000002c0)="eaff000000000000", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f00000000c0)="eaff125c7f000001", 0x8) 07:36:51 executing program 1: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x2f, 0x0, 0x0) 07:36:51 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x100000000}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) fcntl$lock(r1, 0x8, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x100000001}) fcntl$lock(r1, 0x9, &(0x7f0000000000)={0x1, 0x0, 0x4, 0x100000001}) 07:36:51 executing program 3: r0 = socket(0x11, 0x4003, 0x0) r1 = dup(r0) sendto$unix(r1, &(0x7f0000000000)="b10005016000009005001b0007000000000004fecea11ea8fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff3728211ee4fd89720fd3872babfbb770a9f5a872c881ff7cc53c895303b22f310b404f36a00f90006ee01b00000000000200"/177, 0xb1, 0x0, 0x0, 0x0) 07:36:51 executing program 2: r0 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r0, 0x0, 0x200000000000c, &(0x7f00000002c0)="eaff000000000000", 0x8) setsockopt$inet_opts(r0, 0x0, 0x200000000000d, &(0x7f00000000c0)="eaff125c7f000001", 0x8) 07:36:52 executing program 1: r0 = socket$inet6(0x18, 0x2, 0x0) setsockopt$inet6_MRT6_ADD_MIF(r0, 0x29, 0x2f, 0x0, 0x0) 07:36:52 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) fcntl$lock(r0, 0x8, &(0x7f0000000180)={0x0, 0x0, 0x2, 0x100000000}) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000001100), 0x0, 0x0) fcntl$lock(r1, 0x8, &(0x7f0000000040)={0x0, 0x1, 0x0, 0x100000001}) fcntl$lock(r1, 0x9, &(0x7f0000000000)={0x1, 0x0, 0x4, 0x100000001}) 07:36:52 executing program 3: r0 = socket(0x11, 0x4003, 0x0) r1 = dup(r0) sendto$unix(r1, &(0x7f0000000000)="b10005016000009005001b0007000000000004fecea11ea8fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff3728211ee4fd89720fd3872babfbb770a9f5a872c881ff7cc53c895303b22f310b404f36a00f90006ee01b00000000000200"/177, 0xb1, 0x0, 0x0, 0x0) 2022/01/14 07:37:04 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: