Warning: Permanently added '10.128.1.98' (ED25519) to the list of known hosts. 2022/01/14 07:24:06 fuzzer started 2022/01/14 07:24:09 dialing manager at 10.128.15.235:5613 2022/01/14 07:24:09 syscalls: 387 2022/01/14 07:24:09 code coverage: enabled 2022/01/14 07:24:09 comparison tracing: enabled 2022/01/14 07:24:09 extra coverage: enabled 2022/01/14 07:24:09 delay kcov mmap: enabled 2022/01/14 07:24:09 setuid sandbox: enabled 2022/01/14 07:24:09 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:24:09 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:24:09 fault injection: support is not implemented in syzkaller 2022/01/14 07:24:09 leak checking: support is not implemented in syzkaller 2022/01/14 07:24:09 net packet injection: enabled 2022/01/14 07:24:09 net device setup: support is not implemented in syzkaller 2022/01/14 07:24:09 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:24:09 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:24:09 USB emulation: support is not implemented in syzkaller 2022/01/14 07:24:09 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:24:09 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:24:09 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:24:09 fetching corpus: 0, signal 0/1480 (executing program) 2022/01/14 07:24:09 fetching corpus: 1, signal 77/1480 (executing program) 2022/01/14 07:24:09 fetching corpus: 1, signal 77/1480 (executing program) 2022/01/14 07:24:10 starting 8 fuzzer processes 07:24:10 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x4}, {0x1}, {0x6, 0x0, 0x0, 0x102}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r1 = dup(r0) pwrite(r1, &(0x7f0000000300)="fbffb46ed079474fb7691a14af3b", 0xe, 0x0) 07:24:10 executing program 1: sysctl$net_inet_ip(&(0x7f0000000000)={0x4, 0x2, 0x0, 0x11}, 0x4, 0x0, 0x0, 0x0, 0x0) 07:24:10 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffff0000000000008100000086dd60587c400014da00fe80000000000000aafe800000000000000000000000ff"]) 07:24:10 executing program 3: sysctl$net_inet_ip(&(0x7f00000000c0)={0x4, 0x2, 0x0, 0x1b}, 0x4, 0x0, 0x0, &(0x7f00000012c0), 0x4) 07:24:10 executing program 4: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000180), 0x242, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000140)={0x3, &(0x7f0000000000)=[{0x40}, {0x61}, {0x6, 0x0, 0x0, 0x3ff}]}) pwrite(r0, &(0x7f0000000240)="d000"/14, 0xe, 0x0) 07:24:10 executing program 5: sendto$unix(0xffffffffffffffff, &(0x7f0000000000)="b1000513600000000000000004", 0xd, 0x0, 0x0, 0x0) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0x68, &(0x7f0000000040)={{0x18, 0x1}, {0x18, 0x1}, 0x0, [0x0, 0x200]}, 0x3c) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r0 = socket(0x11, 0x4003, 0x0) sendto$unix(r0, &(0x7f0000000000)="b1000513600000000000000004000000000004fecea11ea8fef96ecfc73fd3357ae26caa0416fa4f376336acf00b7804be781e4991f7c8df5f882b297be1aa5b23ed00f4c8b2ca3ebbc257699a1f132e27acb5d602000d7d026ba8af63ff37280f18e4fd89720fd3872babfbb770c1f5a872c881ff7cc53c894303b22f310b404f36a00f75006ee01b1257aea8c500ff0002000000000000020208a371a3f8000400000000000000010000000000000000", 0xb1, 0x0, 0x0, 0x0) 07:24:10 executing program 6: sysctl$kern(&(0x7f0000000000)={0x1, 0x4d}, 0x2, &(0x7f0000000040)="6d5eaf3e", &(0x7f0000000080)=0x4, &(0x7f00000000c0), 0x0) 07:24:10 executing program 1: sysctl$net_inet_ip(&(0x7f0000000000)={0x4, 0x2, 0x0, 0x11}, 0x4, 0x0, 0x0, 0x0, 0x0) 07:24:10 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x4}, {0x1}, {0x6, 0x0, 0x0, 0x102}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r1 = dup(r0) pwrite(r1, &(0x7f0000000300)="fbffb46ed079474fb7691a14af3b", 0xe, 0x0) 07:24:10 executing program 7: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x4}, {0x1}, {0x6, 0x0, 0x0, 0x102}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r1 = dup(r0) pwrite(r1, &(0x7f0000000300)="fbffb46ed079474fb7691a14af3b", 0xe, 0x0) 07:24:10 executing program 1: sysctl$net_inet_ip(&(0x7f0000000000)={0x4, 0x2, 0x0, 0x11}, 0x4, 0x0, 0x0, 0x0, 0x0) 07:24:10 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x4}, {0x1}, {0x6, 0x0, 0x0, 0x102}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r1 = dup(r0) pwrite(r1, &(0x7f0000000300)="fbffb46ed079474fb7691a14af3b", 0xe, 0x0) 07:24:10 executing program 1: sysctl$net_inet_ip(&(0x7f0000000000)={0x4, 0x2, 0x0, 0x11}, 0x4, 0x0, 0x0, 0x0, 0x0) 07:24:10 executing program 3: sysctl$net_inet_ip(&(0x7f00000000c0)={0x4, 0x2, 0x0, 0x1b}, 0x4, 0x0, 0x0, &(0x7f00000012c0), 0x4) 07:24:10 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x4}, {0x1}, {0x6, 0x0, 0x0, 0x102}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r1 = dup(r0) pwrite(r1, &(0x7f0000000300)="fbffb46ed079474fb7691a14af3b", 0xe, 0x0) 07:24:10 executing program 3: sysctl$net_inet_ip(&(0x7f00000000c0)={0x4, 0x2, 0x0, 0x1b}, 0x4, 0x0, 0x0, &(0x7f00000012c0), 0x4) 07:24:10 executing program 1: sysctl$net_inet_ip(&(0x7f00000000c0)={0x4, 0x2, 0x0, 0x1b}, 0x4, 0x0, 0x0, &(0x7f00000012c0), 0x4) 07:24:10 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x4}, {0x1}, {0x6, 0x0, 0x0, 0x102}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r1 = dup(r0) pwrite(r1, &(0x7f0000000300)="fbffb46ed079474fb7691a14af3b", 0xe, 0x0) 07:24:10 executing program 0: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000100)={0x3, &(0x7f0000000000)=[{0x4}, {0x1}, {0x6, 0x0, 0x0, 0x102}]}) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r1 = dup(r0) pwrite(r1, &(0x7f0000000300)="fbffb46ed079474fb7691a14af3b", 0xe, 0x0) 07:24:10 executing program 2: syz_emit_ethernet(0x4e, &(0x7f0000000040)=ANY=[@ANYBLOB="ffffffffffff0000000000008100000086dd60587c400014da00fe80000000000000aafe800000000000000000000000ff"]) 2022/01/14 07:24:22 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory)