Warning: Permanently added '10.128.0.187' (ECDSA) to the list of known hosts. 2019/09/23 11:52:11 fuzzer started 2019/09/23 11:52:12 dialing manager at 10.128.0.105:39541 2019/09/23 11:52:12 syscalls: 2425 2019/09/23 11:52:12 code coverage: CONFIG_KCOV is not enabled 2019/09/23 11:52:12 comparison tracing: CONFIG_KCOV is not enabled 2019/09/23 11:52:12 extra coverage: CONFIG_KCOV is not enabled 2019/09/23 11:52:12 setuid sandbox: enabled 2019/09/23 11:52:12 namespace sandbox: enabled 2019/09/23 11:52:12 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/23 11:52:12 fault injection: kernel does not have systematic fault injection support 2019/09/23 11:52:12 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/23 11:52:12 net packet injection: enabled 2019/09/23 11:52:12 net device setup: enabled 11:52:13 executing program 0: r0 = socket$inet6(0xa, 0x3, 0x2) sendmsg$TIPC_NL_MON_SET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000180), 0xc, &(0x7f00000003c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="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", @ANYRES16, @ANYBLOB="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"], 0x160}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x4}, 0x1c) sendmmsg$alg(r0, &(0x7f0000000200)=[{0x0, 0xff00, 0x0, 0x0, &(0x7f0000002780)=[@assoc={0x18, 0x29, 0x3}], 0x18}], 0x4924924924927e1, 0x0) 11:52:13 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="11dca50d5e0bcfe47bf070") r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vcs\x00', 0x402, 0x0) pwritev(r1, &(0x7f0000001340)=[{0x0}, {&(0x7f0000000140)="c8", 0x1}], 0x2, 0x0) 11:52:13 executing program 5: perf_event_open(&(0x7f0000000000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5e, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_nlink(0x0, 0x0, &(0x7f0000000240)={'U-', 0x6}, 0x28, 0x0) syz_read_part_table(0x0, 0x1, &(0x7f0000000480)=[{&(0x7f0000010000)="02006800000f000000000000000000008128b14700000000d59863d20000000002000f2020cc00000000ff0700740000000000000000000000000000000000000000000000000000000000000000000000000000000000008a6e94c0000055aa", 0x60, 0x1a0}]) keyctl$session_to_parent(0x12) 11:52:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_add_memb(0xffffffffffffffff, 0x107, 0x1, 0x0, 0x0) dup2(r0, r1) 11:52:13 executing program 4: 11:52:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@ipv6_delrule={0x34, 0x21, 0x1, 0x0, 0x0, {0xa, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@FRA_SRC={0x14, 0x2, @empty}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x10) syzkaller login: [ 33.643047] IPv6: ADDRCONF(NETDEV_CHANGE): nr1: link becomes ready [ 33.654197] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 33.661390] IPVS: Creating netns size=2712 id=1 [ 33.663861] IPv6: ADDRCONF(NETDEV_CHANGE): nr5: link becomes ready [ 33.664457] IPv6: ADDRCONF(NETDEV_CHANGE): nr3: link becomes ready [ 33.664754] IPv6: ADDRCONF(NETDEV_CHANGE): nr2: link becomes ready [ 33.665069] IPv6: ADDRCONF(NETDEV_CHANGE): nr4: link becomes ready [ 33.692649] IPVS: ftp: loaded support on port[0] = 21 [ 33.706123] IPVS: Creating netns size=2712 id=2 [ 33.711212] IPVS: ftp: loaded support on port[0] = 21 [ 33.728249] chnl_net:caif_netlink_parms(): no params data found [ 33.735125] ------------[ cut here ]------------ [ 33.739922] WARNING: CPU: 0 PID: 5812 at net/batman-adv/main.c:750 batadv_tvlv_container_remove+0x7b/0x80() [ 33.749859] Kernel panic - not syncing: panic_on_warn set ... [ 33.749859] [ 33.757194] CPU: 0 PID: 5812 Comm: syz-executor.1 Not tainted 4.4.194 #0 [ 33.764198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.773626] 0000000000000082 ffff8800aa01b870 ffffffff818a6f22 0000000000000000 [ 33.781652] ffffffff82e96378 ffffffff8300ac2f ffff8800aa01b8e8 ffffffff8126f9bc [ 33.789714] ffff880000000008 ffff8800aa01b8f8 ffff8800aa01b898 ffffffff81274e1f [ 33.797737] Call Trace: [ 33.800299] [] dump_stack+0xa1/0xdf [ 33.806031] [] panic+0xd2/0x225 [ 33.810956] [] ? printk+0x48/0x4a [ 33.816061] [] warn_slowpath_common.cold+0x16/0x16 [ 33.822632] [] warn_slowpath_null+0x15/0x20 [ 33.828579] [] batadv_tvlv_container_remove+0x7b/0x80 [ 33.835389] [] batadv_tvlv_container_register+0xb3/0x120 [ 33.842676] [] batadv_dat_tvlv_container_update+0x26/0x40 [ 33.849940] [] batadv_dat_init+0x6a/0x80 [ 33.855635] [] batadv_mesh_init+0x239/0x290 [ 33.861581] [] batadv_softif_init_late+0x271/0x2c0 [ 33.868135] [] register_netdevice+0xfa/0x450 [ 33.874426] [] rtnl_newlink+0x8a5/0x910 [ 33.880044] [] ? rtnl_newlink+0x17d/0x910 [ 33.885922] [] rtnetlink_rcv_msg+0x170/0x1e0 [ 33.891967] [] ? trace_hardirqs_on+0xd/0x10 [ 33.898544] [] ? mutex_lock_nested+0x30a/0x5a0 [ 33.904941] [] ? rtnetlink_rcv+0x17/0x30 [ 33.910723] [] ? rtnetlink_rcv+0x30/0x30 [ 33.916510] [] netlink_rcv_skb+0x31/0xc0 [ 33.922226] [] rtnetlink_rcv+0x26/0x30 [ 33.927909] [] netlink_unicast+0x168/0x210 [ 33.934298] [] netlink_sendmsg+0x1f1/0x390 [ 33.941055] [] sock_sendmsg+0x35/0x40 [ 33.946483] [] SYSC_sendto+0xed/0x160 [ 33.951908] [] ? sock_alloc_file+0x8c/0x120 [ 33.957941] [] ? fd_install+0x22/0x30 [ 33.963387] [] ? lockdep_sys_exit_thunk+0x12/0x14 [ 33.970518] [] SyS_sendto+0x9/0x10 [ 33.975801] [] entry_SYSCALL_64_fastpath+0x1c/0x7c [ 33.983613] Kernel Offset: disabled [ 33.987264] Rebooting in 86400 seconds..