Warning: Permanently added '10.128.0.30' (ED25519) to the list of known hosts. 2022/01/14 07:26:03 fuzzer started 2022/01/14 07:26:05 dialing manager at 10.128.15.235:6268 2022/01/14 07:26:05 syscalls: 387 2022/01/14 07:26:05 code coverage: enabled 2022/01/14 07:26:05 comparison tracing: enabled 2022/01/14 07:26:05 extra coverage: enabled 2022/01/14 07:26:05 delay kcov mmap: enabled 2022/01/14 07:26:05 setuid sandbox: enabled 2022/01/14 07:26:05 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:26:05 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:26:05 fault injection: support is not implemented in syzkaller 2022/01/14 07:26:05 leak checking: support is not implemented in syzkaller 2022/01/14 07:26:05 net packet injection: enabled 2022/01/14 07:26:05 net device setup: support is not implemented in syzkaller 2022/01/14 07:26:05 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:26:05 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:26:05 USB emulation: support is not implemented in syzkaller 2022/01/14 07:26:05 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:26:05 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:26:05 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:26:05 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:26:05 fetching corpus: 27, signal 1620/4750 (executing program) 2022/01/14 07:26:05 fetching corpus: 27, signal 1620/6307 (executing program) 2022/01/14 07:26:05 fetching corpus: 27, signal 1620/7535 (executing program) 2022/01/14 07:26:05 fetching corpus: 27, signal 1620/7535 (executing program) 2022/01/14 07:26:05 starting 8 fuzzer processes 07:26:05 executing program 0: setreuid(0xffffffffffffffff, 0xee01) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x4001, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x80206910, &(0x7f0000000300)) 07:26:05 executing program 4: r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet(0x2, 0x4000, 0x0) getsockopt$sock_cred(r3, 0xffff, 0x1022, &(0x7f00000003c0), &(0x7f0000000080)=0xc) syz_emit_ethernet(0x32, &(0x7f0000000000)={@broadcast, @local, [], {@arp={0x806, @generic={0x1, 0x800, 0x0, 0x0, 0x0, @broadcast, "", @broadcast, "ba9571695583d44204488045286438a1"}}}}) syz_extract_tcp_res(&(0x7f0000000040), 0x9, 0x0) r4 = semget$private(0x0, 0x5, 0x204) semop(r4, &(0x7f0000000100)=[{0x0, 0x5022, 0x1000}, {0x1}], 0x2) semop(r4, &(0x7f0000000240)=[{0x0, 0xffffffffffffffff, 0x1800}, {0x2, 0x20}, {0x3, 0x0, 0x1800}, {0x4, 0x5}, {0x0, 0x7, 0x1800}], 0x5) semctl$GETZCNT(r4, 0x5, 0x7, &(0x7f0000000480)=""/246) semctl$SETVAL(r4, 0x0, 0x8, &(0x7f0000000040)=0x800) semctl$GETNCNT(r4, 0x3, 0x3, &(0x7f0000000100)=""/17) r5 = semget$private(0x0, 0x5, 0x204) semop(r5, &(0x7f0000000180), 0x0) semop(r5, &(0x7f00000003c0)=[{0x6, 0x1, 0x800}, {0x3, 0x6, 0x800}, {0x2, 0x9, 0x1800}, {0x1, 0x9, 0x1000}], 0x2bdd) semctl$SETALL(r5, 0x0, 0x9, &(0x7f00000001c0)=[0x4, 0x6, 0x3]) setregid(0x0, 0x0) kevent(r1, &(0x7f0000000580)=[{{r3}, 0xfffffffffffffff8, 0x2, 0xfffff, 0xa15f}, {{}, 0xfffffffffffffffd, 0x80, 0x20000000, 0xf36, 0x1}, {{r2}, 0xfffffffffffffffd, 0x8, 0x20, 0x8}, {{}, 0xfffffffffffffffb, 0x88, 0x2, 0x400, 0x2}, {{}, 0xfffffffffffffff8, 0x35, 0x4, 0x2, 0x7fffffff}, {{}, 0xfffffffffffffffd, 0xc4, 0x40000000, 0xc4c, 0x8000000}, {{}, 0xfffffffffffffffe, 0xac, 0x80, 0x95, 0x7}], 0x89, &(0x7f0000000340)=[{{}, 0xfffffffffffffffb, 0x8, 0x20, 0x5, 0x8001}, {{}, 0xffffffffffffffff, 0x28, 0x0, 0x3, 0x4}, {{}, 0xffffffffffffffff, 0xe, 0x1, 0x3, 0x10000}, {{}, 0xfffffffffffffffb, 0x59, 0x40000000, 0xdc2f, 0xffff}], 0x1, &(0x7f0000000400)={0x4, 0x7f}) chown(&(0x7f0000000140)='./file0\x00', 0x0, 0x0) 07:26:05 executing program 1: ioctl$WSDISPLAYIO_WSMOUSED(0xffffffffffffffff, 0x80185758, &(0x7f0000000000)={0x0, 0x0, {0x1}}) sysctl$kern(&(0x7f0000000000)={0x1, 0x3d}, 0x3, 0x0, 0x0, 0x0, 0x0) 07:26:05 executing program 5: syz_emit_ethernet(0x32, &(0x7f00000000c0)={@local, @random="48f96c9b28f2", [], {@ipv4={0x800, {{0x7, 0x4, 0x0, 0x0, 0x24, 0x0, 0x2, 0x0, 0x0, 0x0, @empty, @multicast2, {[@ra={0x94, 0x6}]}}, @udp={{0x1, 0x0, 0x8}}}}}}) 07:26:05 executing program 2: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$FIONBIO(r0, 0x8004667e, &(0x7f0000000140)=0x400) 07:26:05 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x4, 0x10110, 0x0) select(0x3b7, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) 07:26:05 executing program 6: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FIOASYNC(r0, 0xc110445e, &(0x7f0000000240)) 07:26:05 executing program 7: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x462, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000280)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000040)=[{0x80}, {0x28}, {0x6}]}) pwrite(r0, &(0x7f00000002c0)="fb", 0x1, 0x0) 07:26:05 executing program 0: setreuid(0xffffffffffffffff, 0xee01) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x4001, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x80206910, &(0x7f0000000300)) 07:26:05 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x4, 0x10110, 0x0) select(0x3b7, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) 07:26:05 executing program 1: ioctl$WSDISPLAYIO_WSMOUSED(0xffffffffffffffff, 0x80185758, &(0x7f0000000000)={0x0, 0x0, {0x1}}) sysctl$kern(&(0x7f0000000000)={0x1, 0x3d}, 0x3, 0x0, 0x0, 0x0, 0x0) 07:26:05 executing program 0: setreuid(0xffffffffffffffff, 0xee01) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x4001, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x80206910, &(0x7f0000000300)) 07:26:05 executing program 3: open(&(0x7f0000000040)='./file0\x00', 0x611, 0x0) ktrace(&(0x7f0000000080)='./file0\x00', 0x4, 0x10110, 0x0) select(0x3b7, 0x0, &(0x7f0000000000), &(0x7f0000000080), &(0x7f00000000c0)) 07:26:05 executing program 1: ioctl$WSDISPLAYIO_WSMOUSED(0xffffffffffffffff, 0x80185758, &(0x7f0000000000)={0x0, 0x0, {0x1}}) sysctl$kern(&(0x7f0000000000)={0x1, 0x3d}, 0x3, 0x0, 0x0, 0x0, 0x0) 07:26:05 executing program 2: pipe2(&(0x7f0000000080)={0xffffffffffffffff}, 0x0) ioctl$FIONBIO(r0, 0x8004667e, &(0x7f0000000140)=0x400) 07:26:05 executing program 0: setreuid(0xffffffffffffffff, 0xee01) ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x4001, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x80206910, &(0x7f0000000300)) 07:26:05 executing program 1: ioctl$WSDISPLAYIO_WSMOUSED(0xffffffffffffffff, 0x80185758, &(0x7f0000000000)={0x0, 0x0, {0x1}}) sysctl$kern(&(0x7f0000000000)={0x1, 0x3d}, 0x3, 0x0, 0x0, 0x0, 0x0) 2022/01/14 07:26:17 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: