Warning: Permanently added '10.128.0.216' (ED25519) to the list of known hosts. 2022/01/14 07:25:56 fuzzer started 2022/01/14 07:25:58 dialing manager at 10.128.15.235:5613 2022/01/14 07:25:58 syscalls: 387 2022/01/14 07:25:58 code coverage: enabled 2022/01/14 07:25:58 comparison tracing: enabled 2022/01/14 07:25:58 extra coverage: enabled 2022/01/14 07:25:58 delay kcov mmap: enabled 2022/01/14 07:25:58 setuid sandbox: enabled 2022/01/14 07:25:58 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:25:58 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:25:58 fault injection: support is not implemented in syzkaller 2022/01/14 07:25:58 leak checking: support is not implemented in syzkaller 2022/01/14 07:25:58 net packet injection: enabled 2022/01/14 07:25:58 net device setup: support is not implemented in syzkaller 2022/01/14 07:25:58 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:25:58 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:25:58 USB emulation: support is not implemented in syzkaller 2022/01/14 07:25:58 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:25:58 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:25:58 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:25:58 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:25:58 fetching corpus: 20, signal 2932/5387 (executing program) 2022/01/14 07:25:58 fetching corpus: 20, signal 2932/6606 (executing program) 2022/01/14 07:25:58 fetching corpus: 20, signal 2932/7376 (executing program) 2022/01/14 07:25:58 fetching corpus: 20, signal 2932/7376 (executing program) 2022/01/14 07:25:58 starting 8 fuzzer processes 07:25:58 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000000c0)={0x3, &(0x7f0000000140)=[{0x44}, {0x48}, {0x4006}]}) syz_emit_ethernet(0xe, &(0x7f0000000000)) 07:25:58 executing program 1: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000140), 0x0) 07:25:58 executing program 2: r0 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$WSMUXIO_ADD_DEVICE(r0, 0x80085761, &(0x7f0000000000)={0x2, 0x6}) 07:25:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="82022e"], 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000100)=@un=@file={0x6b2f841e542302b3, './file0/file0\x00'}, 0x10, 0x0, 0x0, 0x0}, 0x0) 07:25:58 executing program 4: pwritev(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000040)="d73160174caf1fdb37b55715656e4718635a8c9994734f2d218868ac2881f1d6c2fda7ca6e6de98059ba14f943f52c65f327f660df5da2a156184864128ec5ae45372aab309d4db3ea499c41662d60a6835c4209f45a86dfd0b571ee93a26215006b35a3c4ca46a4afcc55d5d4f613b33240bc8c9d7beb68f43bf760fd171733787444b15b698c9c75c5b3e41882", 0x8e}], 0x1, 0x0) sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="b10005016000009005001b0007000000000004fecea11ea8fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff3728211ee4fd89720fd3872babfbb770a9f5a872c881ff7cc53c895303b22f310b404f36a00f90006ee01b00000000000200"/156, 0x9c, 0x0, 0x0, 0x0) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$FIOASYNC(r0, 0xc0504417, &(0x7f0000000080)=0xae6a) 07:25:59 executing program 5: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x1, 0x0) r1 = dup(r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0x2e) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x18, 0x1, 0x0) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$TIOCFLUSH(r3, 0x8080691a, &(0x7f0000000300)) 07:25:59 executing program 6: ioctl$BIOCSETF(0xffffffffffffffff, 0x80104267, &(0x7f00000000c0)={0x0, &(0x7f0000000300)}) r0 = socket(0x2, 0x3, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) ioctl$TIOCFLUSH(r1, 0xc0106924, &(0x7f00000000c0)=0xee) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = socket(0x2, 0x2, 0x0) r3 = socket$inet(0x2, 0x2, 0x0) r4 = fcntl$dupfd(r2, 0x0, r3) ioctl$TIOCFLUSH(r4, 0x8060693c, &(0x7f0000000300)) 07:25:59 executing program 7: r0 = openat$wsmuxkbd(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) ioctl$WSKBDIO_SETMODE(r0, 0x80045713, &(0x7f0000000180)) 07:25:59 executing program 2: r0 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$WSMUXIO_ADD_DEVICE(r0, 0x80085761, &(0x7f0000000000)={0x2, 0x6}) 07:25:59 executing program 2: r0 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$WSMUXIO_ADD_DEVICE(r0, 0x80085761, &(0x7f0000000000)={0x2, 0x6}) 07:25:59 executing program 2: r0 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$WSMUXIO_ADD_DEVICE(r0, 0x80085761, &(0x7f0000000000)={0x2, 0x6}) 07:25:59 executing program 2: r0 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$WSMUXIO_ADD_DEVICE(r0, 0x80085761, &(0x7f0000000000)={0x2, 0x6}) 07:25:59 executing program 2: r0 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$WSMUXIO_ADD_DEVICE(r0, 0x80085761, &(0x7f0000000000)={0x2, 0x6}) 07:25:59 executing program 2: r0 = openat$wsmuxmouse(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) ioctl$WSMUXIO_ADD_DEVICE(r0, 0x80085761, &(0x7f0000000000)={0x2, 0x6}) 07:25:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="82022e"], 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000100)=@un=@file={0x6b2f841e542302b3, './file0/file0\x00'}, 0x10, 0x0, 0x0, 0x0}, 0x0) 07:25:59 executing program 2: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="82022e"], 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000100)=@un=@file={0x6b2f841e542302b3, './file0/file0\x00'}, 0x10, 0x0, 0x0, 0x0}, 0x0) 07:25:59 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000001c0)={'tap', 0x0}) ioctl$BIOCSETF(r0, 0x80104267, &(0x7f00000000c0)={0x3, &(0x7f0000000140)=[{0x44}, {0x48}, {0x4006}]}) syz_emit_ethernet(0xe, &(0x7f0000000000)) 07:25:59 executing program 2: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="82022e"], 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000100)=@un=@file={0x6b2f841e542302b3, './file0/file0\x00'}, 0x10, 0x0, 0x0, 0x0}, 0x0) 07:25:59 executing program 1: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) utimensat(0xffffffffffffff9c, 0x0, &(0x7f0000000140), 0x0) 07:25:59 executing program 3: r0 = socket(0x2, 0x2, 0x0) connect$unix(r0, &(0x7f0000000040)=ANY=[@ANYBLOB="82022e"], 0x10) r1 = fcntl$dupfd(r0, 0x0, r0) sendmsg(r1, &(0x7f0000000080)={&(0x7f0000000100)=@un=@file={0x6b2f841e542302b3, './file0/file0\x00'}, 0x10, 0x0, 0x0, 0x0}, 0x0) 2022/01/14 07:26:11 executor 7 failed 11 times: executor 7: EOF SYZFAIL: tun_id out of range tun_id=7 (errno 2: No such file or directory)