Warning: Permanently added '10.128.1.102' (ED25519) to the list of known hosts. 2022/01/14 07:24:18 fuzzer started 2022/01/14 07:24:19 dialing manager at 10.128.15.235:6268 2022/01/14 07:24:19 syscalls: 387 2022/01/14 07:24:19 code coverage: enabled 2022/01/14 07:24:19 comparison tracing: enabled 2022/01/14 07:24:19 extra coverage: enabled 2022/01/14 07:24:19 delay kcov mmap: enabled 2022/01/14 07:24:19 setuid sandbox: enabled 2022/01/14 07:24:19 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:24:19 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:24:19 fault injection: support is not implemented in syzkaller 2022/01/14 07:24:19 leak checking: support is not implemented in syzkaller 2022/01/14 07:24:19 net packet injection: enabled 2022/01/14 07:24:19 net device setup: support is not implemented in syzkaller 2022/01/14 07:24:19 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:24:19 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:24:19 USB emulation: support is not implemented in syzkaller 2022/01/14 07:24:19 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:24:19 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:24:19 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:24:19 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:24:19 fetching corpus: 4, signal 339/3819 (executing program) 2022/01/14 07:24:19 fetching corpus: 4, signal 339/3819 (executing program) 2022/01/14 07:24:19 starting 8 fuzzer processes 07:24:19 executing program 0: r0 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = dup(r0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)='\vF+', 0x3}], 0x1, 0x0) 07:24:19 executing program 4: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000200)=[{0x5}, {0x45}, {0x6, 0x0, 0x0, 0x100}]}) pwrite(r0, &(0x7f0000000240)="d000000000000000000000000008", 0xe, 0x0) 07:24:19 executing program 1: r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$VNDIOCCLR(r0, 0x20006473, &(0x7f0000000500)={0x0, 0x0, 0x0}) 07:24:19 executing program 2: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2}, {0x2e}]}) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_READREGS(r0, 0xc2485607, &(0x7f0000000040)) 07:24:19 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2c}, {}, {0x6}]}) mkdir(&(0x7f0000000200)='./file0\x00', 0x88) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file1/file0\x00', 0x0) r1 = getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000200)={{0x1, 0x0, 0x0, 0x0, 0x0, 0x144, 0x1ff}, 0x480000, 0x7, r1, 0x0, 0x2, 0x5, 0xfbc2000, 0x8}) setgid(0x0) chroot(&(0x7f0000000080)='./file0/file1/file0\x00') mknod$loop(&(0x7f0000000300)='./file0/file1\x00', 0x3a6dec9f9117ee4e, 0x1) rename(&(0x7f0000000000)='./file0/file1/file0\x00', &(0x7f0000000140)='./file1\x00') rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file1\x00') open$dir(&(0x7f0000000100)='\x00', 0x8000, 0x10) open$dir(&(0x7f00000001c0)='./file0/file1/file0/../file0\x00', 0x8833254deba4882c, 0x16) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0/file0\x00', r2, &(0x7f0000d06ff8)='./file0\x00') unlink(&(0x7f0000000280)='./file0/file1\x00') fchownat(r2, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x2) dup(0xffffffffffffff9c) 07:24:19 executing program 6: syz_emit_ethernet(0x2e, &(0x7f0000000140)={@broadcast, @local, [], {@ipv4={0x800, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @multicast2, {[@timestamp={0x44, 0xc, 0x7, 0x2, 0x0, [{}, {}]}]}}}}}}) 07:24:19 executing program 5: r0 = kqueue() r1 = fcntl$dupfd(r0, 0x2, 0xffffffffffffffff) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3, 0x10, r1, 0x0) ioctl$BIOCGDLTLIST(r1, 0xc010427b, &(0x7f00000000c0)={0x3, &(0x7f0000000040)=[0x8d7, 0x10001, 0x34d8ec14]}) r2 = openat$wsdisplay(0xffffffffffffff9c, &(0x7f0000000100), 0x10000, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000640)={0xffffffffffffffff}) getsockopt$sock_cred(r4, 0xffff, 0x1022, &(0x7f0000000000), &(0x7f0000000040)=0xc) r5 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_opts(r5, 0x0, 0x200000000000a, &(0x7f0000000000)='\x00', 0x1) setsockopt$inet_opts(r5, 0x0, 0x200000000000d, &(0x7f0000000140), 0x0) getsockopt$sock_cred(r5, 0xffff, 0x1022, &(0x7f0000000140), &(0x7f0000000180)=0x2) r6 = openat$vmm(0xffffffffffffff9c, &(0x7f00000001c0), 0x20, 0x0) kevent(r0, &(0x7f0000000180)=[{{r2}, 0xfffffffffffffffc, 0x4a, 0xfffff, 0x7, 0xde3}, {{r3}, 0xfffffffffffffff8, 0xa2, 0xb0000009, 0xfffffffffffffff7, 0x9}], 0x1ff, &(0x7f0000000280)=[{{r4}, 0xfffffffffffffffa, 0xb, 0x80, 0x7, 0x9}, {{r5}, 0xfffffffffffffff9, 0x54, 0x1, 0x7, 0x1}, {{r6}, 0xfffffffffffffff9, 0xc0, 0x40, 0x101, 0x7}, {{}, 0xfffffffffffffffc, 0x46, 0x1, 0x2ea50000000, 0x10000}, {{}, 0xfffffffffffffffc, 0x12, 0x40, 0x1f, 0x9}, {{r1}, 0xfffffffffffffff9, 0x8, 0x2, 0x100, 0x9}, {{r0}, 0xfffffffffffffffd, 0x1, 0x2, 0x6}, {{r0}, 0xfffffffffffffffc, 0xa0, 0x20, 0xfdd0, 0x5}, {{r0}, 0xfffffffffffffff8, 0x26, 0x8, 0x5, 0x9}, {{r1}, 0x0, 0x28, 0x4, 0x80, 0x6}], 0x1f, &(0x7f00000003c0)={0x1, 0x1}) ioctl$WSKBDIO_SETMAP(0xffffffffffffffff, 0x8010570e, &(0x7f0000000080)={0x1999999999999b46, &(0x7f0000000000)=[{0x0, 0x2}]}) 07:24:19 executing program 7: r0 = socket(0x18, 0x3, 0x0) getsockopt$inet_opts(r0, 0x29, 0x66, 0x0, 0x0) 07:24:20 executing program 1: r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$VNDIOCCLR(r0, 0x20006473, &(0x7f0000000500)={0x0, 0x0, 0x0}) 07:24:20 executing program 2: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2}, {0x2e}]}) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_READREGS(r0, 0xc2485607, &(0x7f0000000040)) 07:24:20 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2c}, {}, {0x6}]}) mkdir(&(0x7f0000000200)='./file0\x00', 0x88) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file1/file0\x00', 0x0) r1 = getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000200)={{0x1, 0x0, 0x0, 0x0, 0x0, 0x144, 0x1ff}, 0x480000, 0x7, r1, 0x0, 0x2, 0x5, 0xfbc2000, 0x8}) setgid(0x0) chroot(&(0x7f0000000080)='./file0/file1/file0\x00') mknod$loop(&(0x7f0000000300)='./file0/file1\x00', 0x3a6dec9f9117ee4e, 0x1) rename(&(0x7f0000000000)='./file0/file1/file0\x00', &(0x7f0000000140)='./file1\x00') rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file1\x00') open$dir(&(0x7f0000000100)='\x00', 0x8000, 0x10) open$dir(&(0x7f00000001c0)='./file0/file1/file0/../file0\x00', 0x8833254deba4882c, 0x16) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0/file0\x00', r2, &(0x7f0000d06ff8)='./file0\x00') unlink(&(0x7f0000000280)='./file0/file1\x00') fchownat(r2, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x2) dup(0xffffffffffffff9c) 07:24:20 executing program 1: r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$VNDIOCCLR(r0, 0x20006473, &(0x7f0000000500)={0x0, 0x0, 0x0}) 07:24:20 executing program 2: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2}, {0x2e}]}) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_READREGS(r0, 0xc2485607, &(0x7f0000000040)) 07:24:20 executing program 2: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2}, {0x2e}]}) r0 = openat$vmm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$VMM_IOC_READREGS(r0, 0xc2485607, &(0x7f0000000040)) 07:24:20 executing program 1: r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) ioctl$VNDIOCCLR(r0, 0x20006473, &(0x7f0000000500)={0x0, 0x0, 0x0}) 07:24:20 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2c}, {}, {0x6}]}) mkdir(&(0x7f0000000200)='./file0\x00', 0x88) mkdir(&(0x7f00000000c0)='./file0/file1\x00', 0x0) mkdir(&(0x7f0000000040)='./file0/file1/file0\x00', 0x0) r1 = getpid() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000200)={{0x1, 0x0, 0x0, 0x0, 0x0, 0x144, 0x1ff}, 0x480000, 0x7, r1, 0x0, 0x2, 0x5, 0xfbc2000, 0x8}) setgid(0x0) chroot(&(0x7f0000000080)='./file0/file1/file0\x00') mknod$loop(&(0x7f0000000300)='./file0/file1\x00', 0x3a6dec9f9117ee4e, 0x1) rename(&(0x7f0000000000)='./file0/file1/file0\x00', &(0x7f0000000140)='./file1\x00') rename(&(0x7f0000000180)='./file0/file1\x00', &(0x7f00000002c0)='./file1\x00') open$dir(&(0x7f0000000100)='\x00', 0x8000, 0x10) open$dir(&(0x7f00000001c0)='./file0/file1/file0/../file0\x00', 0x8833254deba4882c, 0x16) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) symlinkat(&(0x7f0000000000)='./file0/file0\x00', r2, &(0x7f0000d06ff8)='./file0\x00') unlink(&(0x7f0000000280)='./file0/file1\x00') fchownat(r2, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x2) dup(0xffffffffffffff9c) 07:24:20 executing program 0: r0 = openat$speaker(0xffffffffffffff9c, &(0x7f0000000280), 0x2, 0x0) r1 = dup(r0) pwritev(r1, &(0x7f0000000040)=[{&(0x7f0000000080)='\vF+', 0x3}], 0x1, 0x0) 2022/01/14 07:24:31 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: