Warning: Permanently added '10.128.0.173' (ED25519) to the list of known hosts. 2022/01/14 07:33:16 fuzzer started 2022/01/14 07:33:18 dialing manager at 10.128.15.235:5613 2022/01/14 07:33:18 syscalls: 387 2022/01/14 07:33:18 code coverage: enabled 2022/01/14 07:33:18 comparison tracing: enabled 2022/01/14 07:33:18 extra coverage: enabled 2022/01/14 07:33:18 delay kcov mmap: enabled 2022/01/14 07:33:18 setuid sandbox: enabled 2022/01/14 07:33:18 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:33:18 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:33:18 fault injection: support is not implemented in syzkaller 2022/01/14 07:33:18 leak checking: support is not implemented in syzkaller 2022/01/14 07:33:18 net packet injection: enabled 2022/01/14 07:33:18 net device setup: support is not implemented in syzkaller 2022/01/14 07:33:18 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:33:18 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:33:18 USB emulation: support is not implemented in syzkaller 2022/01/14 07:33:18 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:33:18 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:33:18 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:33:18 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:33:18 fetching corpus: 50, signal 4385/7148 (executing program) 2022/01/14 07:33:19 fetching corpus: 100, signal 6259/9533 (executing program) 2022/01/14 07:33:19 fetching corpus: 116, signal 6725/10835 (executing program) 2022/01/14 07:33:19 fetching corpus: 116, signal 6725/11828 (executing program) 2022/01/14 07:33:19 fetching corpus: 116, signal 6725/12872 (executing program) 2022/01/14 07:33:19 fetching corpus: 116, signal 6725/13696 (executing program) 2022/01/14 07:33:19 fetching corpus: 116, signal 6725/13696 (executing program) 2022/01/14 07:33:19 starting 8 fuzzer processes 07:33:19 executing program 0: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1}, 0xc) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 07:33:19 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000002c0)={0x3, &(0x7f0000000000)=[{0x74}, {0x60}, {0x6, 0x0, 0x0, 0x100}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) pwrite(r0, &(0x7f00000001c0)="fbaf09009261d5eaed0e846e783a", 0xe, 0x0) 07:33:19 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000000)={0x3, &(0x7f00000001c0)=[{0x4d}, {}, {0x8006}]}) syz_emit_ethernet(0xe, &(0x7f00000000c0)={@empty, @remote}) 07:33:19 executing program 3: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000380)={0x2, &(0x7f0000000000)=[{}, {0x3}]}) sysctl$kern(&(0x7f0000000000)={0x1, 0x45}, 0x3, &(0x7f0000000080)="0e6ed84b", &(0x7f00000000c0)=0x4, &(0x7f0000000100), 0x55) 07:33:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@broadcast, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x2, 0x0, @remote={0xac, 0x14, 0x0}, @multicast1}, @icmp=@timestamp={0x16, 0x0, 0x0, 0xe000, 0x1}}}}}) 07:33:19 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000240)={0x4, &(0x7f00000001c0)=[{0x3}, {0xeb}, {0xf801}, {0xfffc}]}) 07:33:19 executing program 6: r0 = socket(0x2, 0x4001, 0x0) shutdown(r0, 0x0) connect$unix(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="82020063c4"], 0x10) setsockopt$sock_int(r0, 0xffff, 0x1023, &(0x7f0000000100)=0x3, 0x4) 07:33:19 executing program 7: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000340)=[{0x1d}, {0x14}, {0x6, 0x0, 0x0, 0x7f3}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) pwrite(r0, &(0x7f0000000140)="fbaf8a8d1abe1a56b4899902b113", 0xe, 0x0) 07:33:19 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000000)={0x3, &(0x7f00000001c0)=[{0x4d}, {}, {0x8006}]}) syz_emit_ethernet(0xe, &(0x7f00000000c0)={@empty, @remote}) 07:33:19 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000002c0)={0x3, &(0x7f0000000000)=[{0x74}, {0x60}, {0x6, 0x0, 0x0, 0x100}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) pwrite(r0, &(0x7f00000001c0)="fbaf09009261d5eaed0e846e783a", 0xe, 0x0) 07:33:19 executing program 0: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1}, 0xc) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 07:33:19 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000000)={0x3, &(0x7f00000001c0)=[{0x4d}, {}, {0x8006}]}) syz_emit_ethernet(0xe, &(0x7f00000000c0)={@empty, @remote}) 07:33:19 executing program 3: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000380)={0x2, &(0x7f0000000000)=[{}, {0x3}]}) sysctl$kern(&(0x7f0000000000)={0x1, 0x45}, 0x3, &(0x7f0000000080)="0e6ed84b", &(0x7f00000000c0)=0x4, &(0x7f0000000100), 0x55) 07:33:19 executing program 0: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1}, 0xc) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 07:33:19 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000002c0)={0x3, &(0x7f0000000000)=[{0x74}, {0x60}, {0x6, 0x0, 0x0, 0x100}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) pwrite(r0, &(0x7f00000001c0)="fbaf09009261d5eaed0e846e783a", 0xe, 0x0) 07:33:19 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000002c0)={0x3, &(0x7f0000000000)=[{0x74}, {0x60}, {0x6, 0x0, 0x0, 0x100}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) pwrite(r0, &(0x7f00000001c0)="fbaf09009261d5eaed0e846e783a", 0xe, 0x0) 07:33:19 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000000)={0x3, &(0x7f00000001c0)=[{0x4d}, {}, {0x8006}]}) syz_emit_ethernet(0xe, &(0x7f00000000c0)={@empty, @remote}) 07:33:19 executing program 0: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1}, 0xc) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 07:33:19 executing program 3: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000380)={0x2, &(0x7f0000000000)=[{}, {0x3}]}) sysctl$kern(&(0x7f0000000000)={0x1, 0x45}, 0x3, &(0x7f0000000080)="0e6ed84b", &(0x7f00000000c0)=0x4, &(0x7f0000000100), 0x55) 07:33:19 executing program 1: munmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x1}, 0xc) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0) 2022/01/14 07:33:31 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: