Warning: Permanently added '10.128.1.52' (ED25519) to the list of known hosts. 2022/01/14 07:24:40 fuzzer started 2022/01/14 07:24:44 dialing manager at 10.128.15.235:5613 2022/01/14 07:24:44 syscalls: 387 2022/01/14 07:24:44 code coverage: enabled 2022/01/14 07:24:44 comparison tracing: enabled 2022/01/14 07:24:44 extra coverage: enabled 2022/01/14 07:24:44 delay kcov mmap: enabled 2022/01/14 07:24:44 setuid sandbox: enabled 2022/01/14 07:24:44 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:24:44 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:24:44 fault injection: support is not implemented in syzkaller 2022/01/14 07:24:44 leak checking: support is not implemented in syzkaller 2022/01/14 07:24:44 net packet injection: enabled 2022/01/14 07:24:44 net device setup: support is not implemented in syzkaller 2022/01/14 07:24:44 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:24:44 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:24:44 USB emulation: support is not implemented in syzkaller 2022/01/14 07:24:44 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:24:44 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:24:44 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:24:44 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:24:44 fetching corpus: 4, signal 681/3333 (executing program) 2022/01/14 07:24:44 fetching corpus: 4, signal 681/3333 (executing program) 2022/01/14 07:24:44 starting 8 fuzzer processes 07:24:44 executing program 0: sysctl$vm_swapencrypt(&(0x7f0000000000), 0x3, 0x0, 0x0, 0x0, 0x0) 07:24:44 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1}, @generic="2197b1921825cbac"}}}}) 07:24:44 executing program 2: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x2, 0x0, 0x0, 0xfff}]}) sysctl$kern(&(0x7f0000000000)={0x1, 0x3f}, 0x4, &(0x7f0000000080), 0x0, 0x0, 0x22) 07:24:44 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000200)=[{0x4d}, {0x7c}, {0x6, 0x0, 0x0, 0x40400}]}) pwrite(r0, &(0x7f0000000240)="895e65615c0699894a78ab05541f", 0xe, 0x0) 07:24:44 executing program 4: sendmsg(0xffffffffffffff9c, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="0400000032da2edb097f2741855fd288fd96e3df953d8910a08e31d9047585bb7b7800000000000000032a0be62245c2b9784785f08b2b708237c775fd4f8e9c1304d35397722356edc157b0326bdf84e589d58abd35d049253cbd6891412dd29fa61ef723fca8d813a17502005f8913e94d2975688395abea288bb62c21bc4691fd24c1716d5fc09542a0337b01de42e800080000e8b80b57a3916aabff1d5b1b7fc3ab175559766937e7af951e5025af354d0761af3075e80b18", 0xbb}], 0x1, 0x0}, 0x0) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) recvmsg(0xffffffffffffffff, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0}, 0x0) ioctl$VMM_IOC_WRITEREGS(0xffffffffffffffff, 0x82485608, &(0x7f00000000c0)={0x0, 0x0, 0x0, {[], [], [], [], [{}, {}, {}, {}, {0x0, 0xfffffffe, 0x535}, {0x0, 0x0, 0x0, 0xfffffffffffffffd}]}}) ioctl$FIOASYNC(r0, 0xc1084425, &(0x7f0000000240)) 07:24:44 executing program 5: syz_emit_ethernet(0x66, &(0x7f00000000c0)={@broadcast, @random="4c040000008b", [], {@ipv6={0x86dd, {0x0, 0x6, "02ff09", 0x30, 0x3a, 0x0, @rand_addr="f39859e433c1ab241df8566850fe3645", @mcast2, {[], @icmpv6=@pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "6ab9a6", 0x0, 0x0, 0x0, @ipv4, @mcast2}}}}}}}) 07:24:44 executing program 7: sysctl$vm_swapencrypt(&(0x7f00000000c0), 0x3, &(0x7f0000001300)="adaa7c63", &(0x7f0000002300)=0x4, 0x0, 0x0) 07:24:44 executing program 6: setitimer(0x2, &(0x7f0000000640), &(0x7f0000000680)) 07:24:45 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000200)=[{0x4d}, {0x7c}, {0x6, 0x0, 0x0, 0x40400}]}) pwrite(r0, &(0x7f0000000240)="895e65615c0699894a78ab05541f", 0xe, 0x0) 07:24:45 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000200)=[{0x4d}, {0x7c}, {0x6, 0x0, 0x0, 0x40400}]}) pwrite(r0, &(0x7f0000000240)="895e65615c0699894a78ab05541f", 0xe, 0x0) 07:24:45 executing program 2: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x2, 0x0, 0x0, 0xfff}]}) sysctl$kern(&(0x7f0000000000)={0x1, 0x3f}, 0x4, &(0x7f0000000080), 0x0, 0x0, 0x22) 07:24:45 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1}, @generic="2197b1921825cbac"}}}}) 07:24:45 executing program 0: sysctl$vm_swapencrypt(&(0x7f0000000000), 0x3, 0x0, 0x0, 0x0, 0x0) 07:24:45 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1}, @generic="2197b1921825cbac"}}}}) 07:24:45 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000200)=[{0x4d}, {0x7c}, {0x6, 0x0, 0x0, 0x40400}]}) pwrite(r0, &(0x7f0000000240)="895e65615c0699894a78ab05541f", 0xe, 0x0) 07:24:45 executing program 1: syz_emit_ethernet(0x2a, &(0x7f00000001c0)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x1}, @generic="2197b1921825cbac"}}}}) 07:24:45 executing program 0: sysctl$vm_swapencrypt(&(0x7f0000000000), 0x3, 0x0, 0x0, 0x0, 0x0) 07:24:45 executing program 2: ioctl$BIOCSETWF(0xffffffffffffffff, 0x80104277, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {0x2, 0x0, 0x0, 0xfff}]}) sysctl$kern(&(0x7f0000000000)={0x1, 0x3f}, 0x4, &(0x7f0000000080), 0x0, 0x0, 0x22) 07:24:45 executing program 3: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000200)=[{0x4d}, {0x7c}, {0x6, 0x0, 0x0, 0x40400}]}) pwrite(r0, &(0x7f0000000240)="895e65615c0699894a78ab05541f", 0xe, 0x0) 07:24:45 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000000)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000080)={0x3, &(0x7f0000000200)=[{0x4d}, {0x7c}, {0x6, 0x0, 0x0, 0x40400}]}) pwrite(r0, &(0x7f0000000240)="895e65615c0699894a78ab05541f", 0xe, 0x0) 2022/01/14 07:24:56 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory)