Warning: Permanently added '10.128.1.118' (ED25519) to the list of known hosts. 2022/01/14 07:24:28 fuzzer started 2022/01/14 07:24:30 dialing manager at 10.128.15.235:6268 2022/01/14 07:24:30 syscalls: 387 2022/01/14 07:24:30 code coverage: enabled 2022/01/14 07:24:30 comparison tracing: enabled 2022/01/14 07:24:30 extra coverage: enabled 2022/01/14 07:24:30 delay kcov mmap: enabled 2022/01/14 07:24:30 setuid sandbox: enabled 2022/01/14 07:24:30 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:24:30 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:24:30 fault injection: support is not implemented in syzkaller 2022/01/14 07:24:30 leak checking: support is not implemented in syzkaller 2022/01/14 07:24:30 net packet injection: enabled 2022/01/14 07:24:30 net device setup: support is not implemented in syzkaller 2022/01/14 07:24:30 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:24:30 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:24:30 USB emulation: support is not implemented in syzkaller 2022/01/14 07:24:30 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:24:30 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:24:30 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:24:30 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:24:30 fetching corpus: 8, signal 457/4140 (executing program) 2022/01/14 07:24:30 fetching corpus: 8, signal 457/5765 (executing program) 2022/01/14 07:24:30 fetching corpus: 8, signal 457/5765 (executing program) 2022/01/14 07:24:30 starting 8 fuzzer processes 07:24:30 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x7c}, {0x1}, {0x6, 0x0, 0x0, 0x624}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) pwrite(r0, &(0x7f0000000e00)="3bc4fbaf8a14eee16e780bec3d26", 0xe, 0x0) 07:24:30 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0/fi\x00', 0x0) unveil(&(0x7f0000000240)='./file0/file0/fi/file0\x00', &(0x7f0000000280)='x\x00') 07:24:30 executing program 1: r0 = socket(0x2, 0xc003, 0x2f) setsockopt(r0, 0x0, 0x22, &(0x7f0000000000)="caf5b415", 0x4) sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x0}, 0x8, 0x0}, 0x0) 07:24:30 executing program 2: r0 = socket(0x18, 0x2, 0x0) setsockopt(r0, 0x1000000000029, 0x9, &(0x7f0000000180)="01000000", 0x4) sendmsg$unix(r0, &(0x7f0000001700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="fb182e2b666902e3ff010d9822700fd1a9f2d2a45723de9de0"], 0x1c, 0x0}, 0x0) 07:24:30 executing program 5: setregid(0xffffffffffffffff, 0x0) setregid(0x0, 0x0) ioctl$WSMUXIO_INJECTEVENT(0xffffffffffffffff, 0x80185760, &(0x7f0000000000)={0x0, 0x0, {0x0, 0x10000000000001}}) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0xffffffffffffffff, 0x0, "00000000000000000000f2ffffffffffffff4000"}) connect$unix(0xffffffffffffffff, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) ioctl$TIOCSETAF(0xffffffffffffffff, 0x802c7416, &(0x7f0000000140)={0xffffffffffffffff, 0x0, 0x0, 0x0, "010000000000000000ffffff7f00"}) ioctl$TIOCSWINSZ(0xffffffffffffffff, 0x80087467, &(0x7f0000000040)={0x0, 0x7}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xc, &(0x7f0000000140)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) r1 = socket(0x400000000018, 0x3, 0x0) setsockopt(r1, 0x29, 0x1a, &(0x7f0000000040), 0x4) r2 = socket(0x18, 0x1, 0x0) close(r2) r3 = socket(0x18, 0x2, 0x0) close(r3) socket(0x18, 0x3, 0x8) setsockopt(r3, 0x1000000029, 0x2e, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) connect$unix(r2, &(0x7f00000000c0)=@abs={0x0, 0x7}, 0x1c) write(r3, &(0x7f0000000080)="1654", 0x2) 07:24:30 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="28000000ffff000001"], 0x28}, 0x0) setrlimit(0x8, &(0x7f0000000080)) recvmsg(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=""/88, 0x58}, 0x0) 07:24:30 executing program 7: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x18, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x6e) ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000300)={'tap', 0x0}) ioctl$VMM_IOC_RESETCPU(0xffffffffffffffff, 0x82405605, &(0x7f0000000340)={0x0, 0x0, {[0x2, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x3], [0x0, 0x3]}}) ioctl$BIOCGFILDROP(r1, 0x40044278, &(0x7f0000000280)) r2 = accept$inet(r1, 0x0, &(0x7f0000000000)) socket(0x1, 0x8000, 0x0) pwrite(r2, &(0x7f0000000040)="75d4e2a4199c8dbe3f2bebb7a5b8bfb84ad5331ea269b09bf15be6b193d8062052a3842e3c0064a7cd1abd30e651b5948940ff19e28c1bb844b74c4da9944ee8361c9619b5162560", 0x48, 0x4) r3 = socket$unix(0x1, 0x5, 0x0) fcntl$setflags(r3, 0x2, 0x1) setsockopt$sock_timeval(r3, 0xffff, 0x1023, 0x0, 0x0) setsockopt(r3, 0xffffffff, 0xbded, &(0x7f0000000100)="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", 0xfd) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) setsockopt(r2, 0x7, 0x400, &(0x7f0000000200)="b73e510e63d42516468a4d329cdbb002f6caa2a846434b7596594ec166d0a1470614c85903970c5ce8b83f7b21f356fd7016609df35e9a11a54e5d014f945ba5b0df48b9ef6b3b16c3ca731fc23b31c876d547edb1b3ca32645e3cc085e3fa0002bf66e810dac675bb0de12b2e7caffe63e982cb5b88ac", 0x77) r4 = socket(0x18, 0x3, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$TIOCFLUSH(r5, 0x8080691a, &(0x7f0000000300)) 07:24:30 executing program 6: fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x3}) sysctl$kern(&(0x7f0000000040)={0x1, 0x33}, 0x4000000000000003, &(0x7f00000001c0)="eb9c770525dbfb3a662c2e9fcde22a63a70b2f59cf6fdd160d1d376007f883be5d093f7630b4399c188b0a79c5b6f12d2a104d64a206500bdf5ca91fb2299fb50093847dc573a5c2e9acddf0aa76345bc995274e0149c8ff070000000000009200f86fae240d9fdbbe85dd833b595e346825ba46f7c4881d7702012992b893e765edcc865895bdaf7a6ca185324c6dd9a652c26ebc4e816491d09e073d481defed0adfa61364a3b5f9fce44462609c067532fb0e2b241425a808", &(0x7f0000000000)=0x14, 0x0, 0x42) 07:24:31 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x7c}, {0x1}, {0x6, 0x0, 0x0, 0x624}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) pwrite(r0, &(0x7f0000000e00)="3bc4fbaf8a14eee16e780bec3d26", 0xe, 0x0) 07:24:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0/fi\x00', 0x0) unveil(&(0x7f0000000240)='./file0/file0/fi/file0\x00', &(0x7f0000000280)='x\x00') 07:24:31 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x7c}, {0x1}, {0x6, 0x0, 0x0, 0x624}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) pwrite(r0, &(0x7f0000000e00)="3bc4fbaf8a14eee16e780bec3d26", 0xe, 0x0) 07:24:31 executing program 2: r0 = socket(0x18, 0x2, 0x0) setsockopt(r0, 0x1000000000029, 0x9, &(0x7f0000000180)="01000000", 0x4) sendmsg$unix(r0, &(0x7f0000001700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="fb182e2b666902e3ff010d9822700fd1a9f2d2a45723de9de0"], 0x1c, 0x0}, 0x0) 07:24:31 executing program 1: r0 = socket(0x2, 0xc003, 0x2f) setsockopt(r0, 0x0, 0x22, &(0x7f0000000000)="caf5b415", 0x4) sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x0}, 0x8, 0x0}, 0x0) 07:24:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0/fi\x00', 0x0) unveil(&(0x7f0000000240)='./file0/file0/fi/file0\x00', &(0x7f0000000280)='x\x00') 07:24:31 executing program 2: r0 = socket(0x18, 0x2, 0x0) setsockopt(r0, 0x1000000000029, 0x9, &(0x7f0000000180)="01000000", 0x4) sendmsg$unix(r0, &(0x7f0000001700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="fb182e2b666902e3ff010d9822700fd1a9f2d2a45723de9de0"], 0x1c, 0x0}, 0x0) 07:24:31 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000080)=[{0x7c}, {0x1}, {0x6, 0x0, 0x0, 0x624}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000040)={'tap', 0x0}) pwrite(r0, &(0x7f0000000e00)="3bc4fbaf8a14eee16e780bec3d26", 0xe, 0x0) 07:24:31 executing program 1: r0 = socket(0x2, 0xc003, 0x2f) setsockopt(r0, 0x0, 0x22, &(0x7f0000000000)="caf5b415", 0x4) sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x0}, 0x8, 0x0}, 0x0) 07:24:31 executing program 2: r0 = socket(0x18, 0x2, 0x0) setsockopt(r0, 0x1000000000029, 0x9, &(0x7f0000000180)="01000000", 0x4) sendmsg$unix(r0, &(0x7f0000001700)={&(0x7f00000002c0)=ANY=[@ANYBLOB="fb182e2b666902e3ff010d9822700fd1a9f2d2a45723de9de0"], 0x1c, 0x0}, 0x0) 07:24:31 executing program 1: r0 = socket(0x2, 0xc003, 0x2f) setsockopt(r0, 0x0, 0x22, &(0x7f0000000000)="caf5b415", 0x4) sendmsg$unix(r0, &(0x7f0000000540)={&(0x7f00000000c0)=@abs={0x0, 0x0, 0x0}, 0x8, 0x0}, 0x0) 07:24:31 executing program 3: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file0\x00', 0x0) mkdir(&(0x7f0000000180)='./file0/file0/fi\x00', 0x0) unveil(&(0x7f0000000240)='./file0/file0/fi/file0\x00', &(0x7f0000000280)='x\x00') 2022/01/14 07:24:43 executor 5 failed 11 times: executor 5: EOF SYZFAIL: tun_id out of range tun_id=5 (errno 2: No such file or directory) login: