Warning: Permanently added '10.128.0.179' (ED25519) to the list of known hosts. 2022/01/14 07:25:57 fuzzer started 2022/01/14 07:25:59 dialing manager at 10.128.15.235:6268 2022/01/14 07:25:59 syscalls: 387 2022/01/14 07:25:59 code coverage: enabled 2022/01/14 07:25:59 comparison tracing: enabled 2022/01/14 07:25:59 extra coverage: enabled 2022/01/14 07:25:59 delay kcov mmap: enabled 2022/01/14 07:25:59 setuid sandbox: enabled 2022/01/14 07:25:59 namespace sandbox: support is not implemented in syzkaller 2022/01/14 07:25:59 Android sandbox: support is not implemented in syzkaller 2022/01/14 07:25:59 fault injection: support is not implemented in syzkaller 2022/01/14 07:25:59 leak checking: support is not implemented in syzkaller 2022/01/14 07:25:59 net packet injection: enabled 2022/01/14 07:25:59 net device setup: support is not implemented in syzkaller 2022/01/14 07:25:59 concurrency sanitizer: support is not implemented in syzkaller 2022/01/14 07:25:59 devlink PCI setup: support is not implemented in syzkaller 2022/01/14 07:25:59 USB emulation: support is not implemented in syzkaller 2022/01/14 07:25:59 hci packet injection: support is not implemented in syzkaller 2022/01/14 07:25:59 wifi device emulation: support is not implemented in syzkaller 2022/01/14 07:25:59 802.15.4 emulation: support is not implemented in syzkaller 2022/01/14 07:25:59 fetching corpus: 0, signal 0/2000 (executing program) 2022/01/14 07:25:59 fetching corpus: 23, signal 1559/4699 (executing program) 2022/01/14 07:25:59 fetching corpus: 23, signal 1559/6299 (executing program) 2022/01/14 07:25:59 fetching corpus: 23, signal 1559/7488 (executing program) 2022/01/14 07:25:59 fetching corpus: 23, signal 1559/7488 (executing program) 2022/01/14 07:25:59 starting 8 fuzzer processes 07:25:59 executing program 0: sysctl$vfs_nfs(&(0x7f0000000000)={0xa, 0x2, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x0) 07:25:59 executing program 2: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r0 = socket(0x800000018, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) r1 = socket(0x800000018, 0x1, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 07:25:59 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000080)=[{0x5}, {0x34, 0x0, 0x0, 0x8}, {0x6, 0x0, 0x0, 0xa9}]}) pwrite(r0, &(0x7f0000000040)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:25:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @rand_addr=0xac14ffff}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @rand_addr}}}}}}) 07:25:59 executing program 4: r0 = socket$unix(0x1, 0x5, 0x0) getsockopt$sock_int(r0, 0xffff, 0x0, 0x0, 0x0) 07:25:59 executing program 5: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000100), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000040)={0x3, &(0x7f0000000080)=[{0x1}, {0x2d}, {0x800000000000006, 0x0, 0x0, 0x80000100}]}) pwrite(r0, &(0x7f0000000280)="d000"/14, 0xe, 0x0) 07:25:59 executing program 7: r0 = openat$wsmouse(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$WSMOUSEIO_SETPARAMS(r0, 0x80105728, &(0x7f00000002c0)={0xfffffffffffffffe}) 07:25:59 executing program 6: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000040), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f0000000540)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f00000000c0)={0x3, &(0x7f0000000280)=[{0x2d}, {0x60}, {0x6, 0x0, 0x0, 0xcae}]}) pwrite(r0, &(0x7f00000001c0)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:25:59 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000080)=[{0x5}, {0x34, 0x0, 0x0, 0x8}, {0x6, 0x0, 0x0, 0xa9}]}) pwrite(r0, &(0x7f0000000040)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:25:59 executing program 2: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r0 = socket(0x800000018, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) r1 = socket(0x800000018, 0x1, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 07:25:59 executing program 0: sysctl$vfs_nfs(&(0x7f0000000000)={0xa, 0x2, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x0) 07:25:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @rand_addr=0xac14ffff}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @rand_addr}}}}}}) 07:25:59 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000080)=[{0x5}, {0x34, 0x0, 0x0, 0x8}, {0x6, 0x0, 0x0, 0xa9}]}) pwrite(r0, &(0x7f0000000040)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:25:59 executing program 2: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r0 = socket(0x800000018, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) r1 = socket(0x800000018, 0x1, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 07:25:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @rand_addr=0xac14ffff}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @rand_addr}}}}}}) 07:25:59 executing program 0: sysctl$vfs_nfs(&(0x7f0000000000)={0xa, 0x2, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x0) 07:25:59 executing program 1: r0 = openat$bpf(0xffffffffffffff9c, &(0x7f0000000000), 0x4000000001, 0x0) ioctl$BIOCSETIF(r0, 0x8020426c, &(0x7f00000000c0)={'tap', 0x0}) ioctl$BIOCSETWF(r0, 0x80104277, &(0x7f0000000180)={0x3, &(0x7f0000000080)=[{0x5}, {0x34, 0x0, 0x0, 0x8}, {0x6, 0x0, 0x0, 0xa9}]}) pwrite(r0, &(0x7f0000000040)="fbaf8a8d1a029be96914f6357e3a", 0xe, 0x0) 07:25:59 executing program 0: sysctl$vfs_nfs(&(0x7f0000000000)={0xa, 0x2, 0x2}, 0x3, 0x0, 0x0, 0x0, 0x0) 07:25:59 executing program 3: syz_emit_ethernet(0x3e, &(0x7f0000000040)={@broadcast, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @rand_addr=0xac14ffff}, @icmp=@time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast2, @rand_addr}}}}}}) 07:25:59 executing program 2: ioctl$BIOCSETIF(0xffffffffffffffff, 0x8020426c, &(0x7f0000000080)={'tap', 0x0}) r0 = socket(0x800000018, 0x1, 0x0) bind$unix(r0, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) r1 = socket(0x800000018, 0x1, 0x0) bind$unix(r1, &(0x7f0000000080)=@abs={0x1f95d27d48731892}, 0x1c) 2022/01/14 07:26:10 executor 4 failed 11 times: executor 4: EOF SYZFAIL: tun_id out of range tun_id=4 (errno 2: No such file or directory) login: