Warning: Permanently added '10.128.0.212' (ED25519) to the list of known hosts. 2021/12/23 02:44:57 fuzzer started 2021/12/23 02:45:00 dialing manager at 10.128.15.235:42845 2021/12/23 02:45:00 syscalls: 387 2021/12/23 02:45:00 code coverage: enabled 2021/12/23 02:45:00 comparison tracing: enabled 2021/12/23 02:45:00 extra coverage: enabled 2021/12/23 02:45:00 delay kcov mmap: enabled 2021/12/23 02:45:00 setuid sandbox: enabled 2021/12/23 02:45:00 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:45:00 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:45:00 fault injection: support is not implemented in syzkaller 2021/12/23 02:45:00 leak checking: support is not implemented in syzkaller 2021/12/23 02:45:00 net packet injection: enabled 2021/12/23 02:45:00 net device setup: support is not implemented in syzkaller 2021/12/23 02:45:00 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:45:00 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:45:00 USB emulation: support is not implemented in syzkaller 2021/12/23 02:45:00 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:45:00 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:45:00 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:45:00 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:45:00 fetching corpus: 50, signal 5242/7728 (executing program) 2021/12/23 02:45:00 fetching corpus: 69, signal 6421/9648 (executing program) 2021/12/23 02:45:00 fetching corpus: 69, signal 6421/10682 (executing program) 2021/12/23 02:45:00 fetching corpus: 69, signal 6421/11706 (executing program) 2021/12/23 02:45:00 fetching corpus: 69, signal 6421/12734 (executing program) 2021/12/23 02:45:00 fetching corpus: 69, signal 6421/13551 (executing program) 2021/12/23 02:45:00 fetching corpus: 69, signal 6421/13551 (executing program) 2021/12/23 02:45:00 starting 6 fuzzer processes 02:45:00 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x8100800080002002, 0x2e00) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) close(r0) 02:45:00 executing program 1: mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1) r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000180), 0x29, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001340)="9a", 0x1}], 0x1) 02:45:00 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2d}, {0x16}]}) pwrite(r0, &(0x7f0000000140)="f9", 0x1, 0x0, 0x0) 02:45:00 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "00e7ff", 0x14, 0x6, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x0, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x4}}}}}}}) 02:45:00 executing program 4: mknod(&(0x7f0000000140)='./bus\x00', 0x80002005, 0x8000000000005200) r0 = open(&(0x7f0000000200)='./bus\x00', 0x0, 0x0) select(0x40, &(0x7f0000000280)={0xffffffff}, 0x0, 0x0, 0x0) r1 = kqueue() dup2(r1, r0) 02:45:00 executing program 5: r0 = syz_open_pts() fcntl$lock(r0, 0x9, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x100000000}) flock(r0, 0x2) flock(r0, 0x2) fcntl$lock(r0, 0x10000000000009, &(0x7f0000000000)={0x2, 0x0, 0x0, 0x2000300000000}) flock(r0, 0x2) fcntl$lock(r0, 0x9, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x100000000}) 02:45:01 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2d}, {0x16}]}) pwrite(r0, &(0x7f0000000140)="f9", 0x1, 0x0, 0x0) 02:45:01 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x8100800080002002, 0x2e00) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) close(r0) 02:45:01 executing program 1: mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1) r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000180), 0x29, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001340)="9a", 0x1}], 0x1) 02:45:01 executing program 1: mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x1) r0 = openat$vnd(0xffffffffffffff9c, &(0x7f0000000180), 0x29, 0x0) writev(r0, &(0x7f0000000080)=[{&(0x7f0000001340)="9a", 0x1}], 0x1) 02:45:01 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "00e7ff", 0x14, 0x6, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x0, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x4}}}}}}}) 02:45:01 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2d}, {0x16}]}) pwrite(r0, &(0x7f0000000140)="f9", 0x1, 0x0, 0x0) 02:45:01 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x8100800080002002, 0x2e00) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) close(r0) 02:45:01 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000040)={@local, @broadcast, [], {@ipv6={0x86dd, {0x0, 0x6, "00e7ff", 0x14, 0x6, 0x0, @local={0xfe, 0x80, '\x00', 0x0}, @local={0xfe, 0x80, '\x00', 0x0}, {[], @tcp={{0x0, 0x3, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x4}}}}}}}) 02:45:01 executing program 2: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x2, &(0x7f0000000040)=[{0x2d}, {0x16}]}) pwrite(r0, &(0x7f0000000140)="f9", 0x1, 0x0, 0x0) 02:45:01 executing program 0: mknod(&(0x7f0000000040)='./bus\x00', 0x8100800080002002, 0x2e00) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) close(r0) 2021/12/23 02:45:12 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory)