Warning: Permanently added '10.128.10.57' (ED25519) to the list of known hosts. 2021/12/23 02:41:52 fuzzer started 2021/12/23 02:41:54 dialing manager at 10.128.15.235:22938 2021/12/23 02:41:54 syscalls: 387 2021/12/23 02:41:54 code coverage: enabled 2021/12/23 02:41:54 comparison tracing: enabled 2021/12/23 02:41:54 extra coverage: enabled 2021/12/23 02:41:54 delay kcov mmap: enabled 2021/12/23 02:41:54 setuid sandbox: enabled 2021/12/23 02:41:54 namespace sandbox: support is not implemented in syzkaller 2021/12/23 02:41:54 Android sandbox: support is not implemented in syzkaller 2021/12/23 02:41:54 fault injection: support is not implemented in syzkaller 2021/12/23 02:41:54 leak checking: support is not implemented in syzkaller 2021/12/23 02:41:54 net packet injection: enabled 2021/12/23 02:41:54 net device setup: support is not implemented in syzkaller 2021/12/23 02:41:54 concurrency sanitizer: support is not implemented in syzkaller 2021/12/23 02:41:54 devlink PCI setup: support is not implemented in syzkaller 2021/12/23 02:41:54 USB emulation: support is not implemented in syzkaller 2021/12/23 02:41:54 hci packet injection: support is not implemented in syzkaller 2021/12/23 02:41:54 wifi device emulation: support is not implemented in syzkaller 2021/12/23 02:41:54 802.15.4 emulation: support is not implemented in syzkaller 2021/12/23 02:41:54 fetching corpus: 0, signal 0/2000 (executing program) 2021/12/23 02:41:54 fetching corpus: 25, signal 2250/5257 (executing program) 2021/12/23 02:41:54 fetching corpus: 25, signal 2250/6763 (executing program) 2021/12/23 02:41:54 fetching corpus: 25, signal 2250/8284 (executing program) 2021/12/23 02:41:54 fetching corpus: 25, signal 2250/9124 (executing program) 2021/12/23 02:41:54 fetching corpus: 25, signal 2250/9124 (executing program) 2021/12/23 02:41:54 starting 6 fuzzer processes 02:41:54 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000019, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000240)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000003c0)={0x3, &(0x7f0000000000)=[{0x1}, {0xc}, {0x6, 0x0, 0x0, 0xfc}]}) write(r0, &(0x7f0000000140)="7cd23fc0aa17dddf7830faa1aaab", 0x39) 02:41:54 executing program 0: writev(0xffffffffffffffff, &(0x7f0000002640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 02:41:54 executing program 1: mknod(&(0x7f0000000200)='./file0\x00', 0x100002004, 0x28a9) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) select(0x40, &(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0x0, 0x0) 02:41:54 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="0400000032da2edb097f2741855fd288fd96e3df953d8910a08e31d9047585bb7b7800000000000000032a0be62245c2b9784785f08b2b708237c775fd4f8e9c1304d35397722356edc157b0326bdf84e589d58abd35d049253cbd6891412dd29fa61ef723fca8d813a17502005f8913e94d2975688395abea288bb62c21bc4691fd24c1716d5fc09542a0337b01de42e800080000e8b80b57a3916aabff1d5b1b7fc3ab175559766937e7af951e5025af354d0761af3075e80b18", 0xbb}], 0x1, 0x0, 0xffffffffffffffe9}, 0x0) ioctl$WSMUXIO_LIST_DEVICES(0xffffffffffffffff, 0xc1045763, &(0x7f00000001c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1}]}) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$FIOASYNC(r0, 0xc1084425, &(0x7f0000000240)) 02:41:54 executing program 3: kevent(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0xc003, 0x0) setsockopt(r0, 0x80000000000029, 0xc, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) 02:41:54 executing program 4: r0 = semget(0x2, 0x0, 0x0) semctl$GETPID(r0, 0x4, 0x4, 0x0) 02:41:54 executing program 0: writev(0xffffffffffffffff, &(0x7f0000002640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 02:41:54 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="0400000032da2edb097f2741855fd288fd96e3df953d8910a08e31d9047585bb7b7800000000000000032a0be62245c2b9784785f08b2b708237c775fd4f8e9c1304d35397722356edc157b0326bdf84e589d58abd35d049253cbd6891412dd29fa61ef723fca8d813a17502005f8913e94d2975688395abea288bb62c21bc4691fd24c1716d5fc09542a0337b01de42e800080000e8b80b57a3916aabff1d5b1b7fc3ab175559766937e7af951e5025af354d0761af3075e80b18", 0xbb}], 0x1, 0x0, 0xffffffffffffffe9}, 0x0) ioctl$WSMUXIO_LIST_DEVICES(0xffffffffffffffff, 0xc1045763, &(0x7f00000001c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1}]}) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$FIOASYNC(r0, 0xc1084425, &(0x7f0000000240)) 02:41:54 executing program 0: writev(0xffffffffffffffff, &(0x7f0000002640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 02:41:54 executing program 2: sendmsg(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000280)="0400000032da2edb097f2741855fd288fd96e3df953d8910a08e31d9047585bb7b7800000000000000032a0be62245c2b9784785f08b2b708237c775fd4f8e9c1304d35397722356edc157b0326bdf84e589d58abd35d049253cbd6891412dd29fa61ef723fca8d813a17502005f8913e94d2975688395abea288bb62c21bc4691fd24c1716d5fc09542a0337b01de42e800080000e8b80b57a3916aabff1d5b1b7fc3ab175559766937e7af951e5025af354d0761af3075e80b18", 0xbb}], 0x1, 0x0, 0xffffffffffffffe9}, 0x0) ioctl$WSMUXIO_LIST_DEVICES(0xffffffffffffffff, 0xc1045763, &(0x7f00000001c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x1}]}) r0 = openat$pf(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) ioctl$FIOASYNC(r0, 0xc1084425, &(0x7f0000000240)) 02:41:54 executing program 3: kevent(0xffffffffffffffff, &(0x7f0000000000)=[{}], 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x18, 0xc003, 0x0) setsockopt(r0, 0x80000000000029, 0xc, &(0x7f0000000000)="ebffcbff13b9fd812eaa4e713048e69931929648", 0x14) 02:41:54 executing program 0: writev(0xffffffffffffffff, &(0x7f0000002640)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9) 2021/12/23 02:42:06 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory)