Warning: Permanently added '10.128.1.82' (ED25519) to the list of known hosts. 2022/01/14 03:27:42 fuzzer started 2022/01/14 03:27:46 dialing manager at 10.128.15.235:38506 2022/01/14 03:27:46 syscalls: 387 2022/01/14 03:27:46 code coverage: enabled 2022/01/14 03:27:46 comparison tracing: enabled 2022/01/14 03:27:46 extra coverage: enabled 2022/01/14 03:27:46 delay kcov mmap: enabled 2022/01/14 03:27:46 setuid sandbox: enabled 2022/01/14 03:27:46 namespace sandbox: support is not implemented in syzkaller 2022/01/14 03:27:46 Android sandbox: support is not implemented in syzkaller 2022/01/14 03:27:46 fault injection: support is not implemented in syzkaller 2022/01/14 03:27:46 leak checking: support is not implemented in syzkaller 2022/01/14 03:27:46 net packet injection: enabled 2022/01/14 03:27:46 net device setup: support is not implemented in syzkaller 2022/01/14 03:27:46 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 03:27:46 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 03:27:46 USB emulation: support is not implemented in syzkaller 2022/01/14 03:27:46 hci packet injection: support is not implemented in syzkaller 2022/01/14 03:27:46 wifi device emulation: support is not implemented in syzkaller 2022/01/14 03:27:46 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 03:27:46 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 03:27:47 fetching corpus: 9, signal 1093/4185 (executing program) 2022/01/14 03:27:47 fetching corpus: 9, signal 1093/4855 (executing program) 2022/01/14 03:27:47 fetching corpus: 9, signal 1093/4855 (executing program) 2022/01/14 03:27:47 starting 8 fuzzer processes 03:27:47 executing program 0: r0 = socket(0x11, 0x4003, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$sock_int(r1, 0xffff, 0x1002, &(0x7f0000000000)=0x1ff, 0x4) sendto$unix(r0, &(0x7f0000000040)="b100050460000000000008000501000000000000cea1fea7fef96eefc73fd3357ae26caa0416fa76d06336acf00b7804be781e4991f7c8df5f882b2b7be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27ecb5d602000d7d026ba8af63ff37282921e4fd89720fd3872babfbb770c1abda71601a8bfee8aca4911faff5a872c881ff7cc53c894303b22f310b404f36a00f9000fc190d571aa189f381f80004000000000000000100"/177, 0xb1, 0x0, 0x0, 0x0) 03:27:47 executing program 1: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x7ffffffff000, 0x0, 0x2831, 0xffffffffffffffff, 0x0) 03:27:47 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x1d}, {0x2}, {0x6, 0x0, 0x0, 0x7f3}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) pwrite(r0, &(0x7f0000000180)="86bc44248213b8f21728034729ab", 0xe, 0x0) 03:27:47 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x48}, {0x7ffffffe}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) syz_emit_ethernet(0xe, &(0x7f0000000280)) 03:27:47 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f0000000280), 0x4) 03:27:47 executing program 5: r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$FIOASYNC(r0, 0xc0084427, &(0x7f0000000000)) 03:27:47 executing program 6: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000180)=[{0xc0}, {0x81}, {0x7ffffffe}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@local, @empty, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @multicast1}, @udp={{0x2, 0x0, 0x8}}}}}}) 03:27:47 executing program 7: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0xc0}, {0x48}, {0x6, 0x0, 0x0, 0xf7fefffb}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) write(r0, &(0x7f0000000240)="fcd1832ac3b74d36fc4ca2c5b772", 0xe) 03:27:47 executing program 1: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x7ffffffff000, 0x0, 0x2831, 0xffffffffffffffff, 0x0) 03:27:47 executing program 1: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x7ffffffff000, 0x0, 0x2831, 0xffffffffffffffff, 0x0) 03:27:47 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x1d}, {0x2}, {0x6, 0x0, 0x0, 0x7f3}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) pwrite(r0, &(0x7f0000000180)="86bc44248213b8f21728034729ab", 0xe, 0x0) 03:27:47 executing program 1: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x7ffffffff000, 0x0, 0x2831, 0xffffffffffffffff, 0x0) 03:27:47 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x48}, {0x7ffffffe}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) syz_emit_ethernet(0xe, &(0x7f0000000280)) 03:27:47 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x48}, {0x7ffffffe}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) syz_emit_ethernet(0xe, &(0x7f0000000280)) 03:27:47 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x48}, {0x7ffffffe}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) syz_emit_ethernet(0xe, &(0x7f0000000280)) 03:27:47 executing program 0: r0 = socket(0x11, 0x4003, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$sock_int(r1, 0xffff, 0x1002, &(0x7f0000000000)=0x1ff, 0x4) sendto$unix(r0, &(0x7f0000000040)="b100050460000000000008000501000000000000cea1fea7fef96eefc73fd3357ae26caa0416fa76d06336acf00b7804be781e4991f7c8df5f882b2b7be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27ecb5d602000d7d026ba8af63ff37282921e4fd89720fd3872babfbb770c1abda71601a8bfee8aca4911faff5a872c881ff7cc53c894303b22f310b404f36a00f9000fc190d571aa189f381f80004000000000000000100"/177, 0xb1, 0x0, 0x0, 0x0) 03:27:47 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x1d}, {0x2}, {0x6, 0x0, 0x0, 0x7f3}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) pwrite(r0, &(0x7f0000000180)="86bc44248213b8f21728034729ab", 0xe, 0x0) 03:27:47 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x48}, {0x7ffffffe}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) syz_emit_ethernet(0xe, &(0x7f0000000280)) 03:27:47 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x48}, {0x7ffffffe}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) syz_emit_ethernet(0xe, &(0x7f0000000280)) 03:27:47 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000040)={0x3, &(0x7f0000000000)=[{}, {0x48}, {0x7ffffffe}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) syz_emit_ethernet(0xe, &(0x7f0000000280)) 2022/01/14 03:27:59 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory)