Warning: Permanently added '10.128.1.103' (ED25519) to the list of known hosts. 2022/01/14 07:24:10 fuzzer started 2022/01/14 07:24:13 dialing manager at 10.128.15.235:6268 2022/01/14 07:24:13 syscalls: 387 2022/01/14 07:24:13 code coverage: enabled 2022/01/14 07:24:13 comparison tracing: enabled 2022/01/14 07:24:13 extra coverage: enabled 2022/01/14 07:24:13 delay kcov mmap: enabled 2022/01/14 07:24:13 setuid sandbox: enabled 2022/01/14 07:24:13 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:24:13 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:24:13 fault injection: support is not implemented in syzkaller 2022/01/14 07:24:13 leak checking: support is not implemented in syzkaller 2022/01/14 07:24:13 net packet injection: enabled 2022/01/14 07:24:13 net device setup: support is not implemented in syzkaller 2022/01/14 07:24:13 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:24:13 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:24:13 USB emulation: support is not implemented in syzkaller 2022/01/14 07:24:13 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:24:13 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:24:13 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:24:13 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:24:13 fetching corpus: 3, signal 323/2364 (executing program) 2022/01/14 07:24:13 fetching corpus: 3, signal 323/2364 (executing program) 2022/01/14 07:24:13 starting 8 fuzzer processes 07:24:13 executing program 4: open$dir(&(0x7f0000000200)='./file0\x00', 0x40000400000002c2, 0x0) open(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) select(0x40, &(0x7f0000000100)={0xbe}, 0x0, 0x0, 0x0) select(0x40, &(0x7f00000005c0), &(0x7f0000000600)={0x7}, 0x0, 0x0) 07:24:13 executing program 0: sysctl$vfs_nfs(&(0x7f0000000080)={0xa, 0x2, 0x2}, 0x3, &(0x7f0000000040)="0b82c340", &(0x7f0000000100)=0x4, &(0x7f0000000000)="0600a869", 0x4) 07:24:13 executing program 1: r0 = socket(0x18, 0x1, 0x0) r1 = socket(0x800000018, 0x1, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) listen(r1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1, &(0x7f0000000000)=0x1, 0x4) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "0000000000000001008e7d00000000ddf500"}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x1ba) setsockopt(r2, 0x5, 0x3, &(0x7f0000000100)="7c95858d13b012b531", 0x9) r3 = socket(0x18, 0x1, 0x0) connect$unix(r3, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) dup2(r0, r1) 07:24:13 executing program 2: r0 = kqueue() fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) socket(0x400000000018, 0x3, 0x0) r1 = dup2(r0, 0xffffffffffffffff) close(r1) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e7130", 0xd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="01002e2f666958653000"], 0xa) sysctl$kern(&(0x7f0000000000)={0x1, 0x44}, 0x4, &(0x7f0000000080), 0x0, 0x0, 0x0) getgid() r3 = socket(0x2, 0x5, 0x81) connect$unix(r3, &(0x7f0000000040)=ANY=[@ANYRES32], 0xfffffd5b) r4 = semget$private(0x0, 0x4000000009, 0x8ca) semctl$SETVAL(r4, 0x5, 0x8, &(0x7f0000000100)=0x7) semop(r4, &(0x7f00000000c0)=[{0x0, 0x1, 0x800}, {0x1, 0x1, 0x1000}], 0x2) semctl$SETALL(r4, 0x0, 0x9, &(0x7f0000000100)=[0x6, 0x2000]) setgid(0x0) semctl$SETALL(r4, 0x0, 0x9, &(0x7f0000000000)=[0x3f, 0x9]) 07:24:13 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xa, &(0x7f0000000000)="d5ff9668", 0x4) getsockopt(r0, 0x29, 0x9, 0x0, 0x0) 07:24:13 executing program 5: fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x3}) sysctl$net_inet_ip(&(0x7f0000000040)={0x4, 0x2, 0x0, 0x29}, 0x5, 0x0, 0x0, 0x0, 0x0) 07:24:13 executing program 6: fcntl$lock(0xffffffffffffffff, 0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x100000001}) sysctl$net_inet_ip(&(0x7f0000000040)={0x4, 0x2, 0x0, 0x29}, 0x5, 0x0, 0x0, 0x0, 0x0) 07:24:13 executing program 7: syz_emit_ethernet(0x4e, &(0x7f0000000200)={@broadcast, @remote, [], {@ipv6={0x86dd, {0x0, 0x6, '\x00', 0x18, 0x0, 0x0, @rand_addr="4e668d2ef2e0b04e20efe0fc5201d933", @mcast2, {[@hopopts={0x32}], @icmpv6=@ni}}}}}) 07:24:13 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xa, &(0x7f0000000000)="d5ff9668", 0x4) getsockopt(r0, 0x29, 0x9, 0x0, 0x0) 07:24:13 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xa, &(0x7f0000000000)="d5ff9668", 0x4) getsockopt(r0, 0x29, 0x9, 0x0, 0x0) 07:24:13 executing program 0: sysctl$vfs_nfs(&(0x7f0000000080)={0xa, 0x2, 0x2}, 0x3, &(0x7f0000000040)="0b82c340", &(0x7f0000000100)=0x4, &(0x7f0000000000)="0600a869", 0x4) 07:24:13 executing program 3: mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0x1, 0x0) setsockopt(r0, 0x29, 0xa, &(0x7f0000000000)="d5ff9668", 0x4) getsockopt(r0, 0x29, 0x9, 0x0, 0x0) 07:24:13 executing program 1: r0 = socket(0x18, 0x1, 0x0) r1 = socket(0x800000018, 0x1, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892, 0x7}, 0x1c) listen(r1, 0x0) setsockopt$sock_int(r1, 0xffff, 0x1, &(0x7f0000000000)=0x1, 0x4) ioctl$TIOCSETA(0xffffffffffffffff, 0x802c7414, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, "0000000000000001008e7d00000000ddf500"}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x80, 0x1ba) setsockopt(r2, 0x5, 0x3, &(0x7f0000000100)="7c95858d13b012b531", 0x9) r3 = socket(0x18, 0x1, 0x0) connect$unix(r3, &(0x7f00000000c0)=@abs={0x682eb13985c518e6, 0x7}, 0x1c) dup2(r0, r1) 07:24:13 executing program 2: r0 = kqueue() fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) socket(0x400000000018, 0x3, 0x0) r1 = dup2(r0, 0xffffffffffffffff) close(r1) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e7130", 0xd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="01002e2f666958653000"], 0xa) sysctl$kern(&(0x7f0000000000)={0x1, 0x44}, 0x4, &(0x7f0000000080), 0x0, 0x0, 0x0) getgid() r3 = socket(0x2, 0x5, 0x81) connect$unix(r3, &(0x7f0000000040)=ANY=[@ANYRES32], 0xfffffd5b) r4 = semget$private(0x0, 0x4000000009, 0x8ca) semctl$SETVAL(r4, 0x5, 0x8, &(0x7f0000000100)=0x7) semop(r4, &(0x7f00000000c0)=[{0x0, 0x1, 0x800}, {0x1, 0x1, 0x1000}], 0x2) semctl$SETALL(r4, 0x0, 0x9, &(0x7f0000000100)=[0x6, 0x2000]) setgid(0x0) semctl$SETALL(r4, 0x0, 0x9, &(0x7f0000000000)=[0x3f, 0x9]) 07:24:13 executing program 3: r0 = kqueue() fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) socket(0x400000000018, 0x3, 0x0) r1 = dup2(r0, 0xffffffffffffffff) close(r1) setsockopt(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e7130", 0xd) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r2, &(0x7f00000000c0)=ANY=[@ANYBLOB="01002e2f666958653000"], 0xa) sysctl$kern(&(0x7f0000000000)={0x1, 0x44}, 0x4, &(0x7f0000000080), 0x0, 0x0, 0x0) getgid() r3 = socket(0x2, 0x5, 0x81) connect$unix(r3, &(0x7f0000000040)=ANY=[@ANYRES32], 0xfffffd5b) r4 = semget$private(0x0, 0x4000000009, 0x8ca) semctl$SETVAL(r4, 0x5, 0x8, &(0x7f0000000100)=0x7) semop(r4, &(0x7f00000000c0)=[{0x0, 0x1, 0x800}, {0x1, 0x1, 0x1000}], 0x2) semctl$SETALL(r4, 0x0, 0x9, &(0x7f0000000100)=[0x6, 0x2000]) setgid(0x0) semctl$SETALL(r4, 0x0, 0x9, &(0x7f0000000000)=[0x3f, 0x9]) 07:24:13 executing program 0: sysctl$vfs_nfs(&(0x7f0000000080)={0xa, 0x2, 0x2}, 0x3, &(0x7f0000000040)="0b82c340", &(0x7f0000000100)=0x4, &(0x7f0000000000)="0600a869", 0x4) 2022/01/14 07:24:24 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory)