Warning: Permanently added '10.128.0.89' (ECDSA) to the list of known hosts. 2019/09/23 15:30:03 fuzzer started 2019/09/23 15:30:04 dialing manager at 10.128.0.105:39633 2019/09/23 15:30:04 syscalls: 2425 2019/09/23 15:30:04 code coverage: CONFIG_KCOV is not enabled 2019/09/23 15:30:04 comparison tracing: CONFIG_KCOV is not enabled 2019/09/23 15:30:04 extra coverage: CONFIG_KCOV is not enabled 2019/09/23 15:30:04 setuid sandbox: enabled 2019/09/23 15:30:04 namespace sandbox: enabled 2019/09/23 15:30:04 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/23 15:30:04 fault injection: kernel does not have systematic fault injection support 2019/09/23 15:30:04 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/23 15:30:04 net packet injection: enabled 2019/09/23 15:30:04 net device setup: enabled 15:30:05 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f0000000400)=[{0x6, 0x0, 0x0, 0x50000}]}) fsetxattr$trusted_overlay_redirect(0xffffffffffffff9c, &(0x7f0000005800)='trusted.overlay.redirect\x00', 0x0, 0x3d2, 0x6) 15:30:05 executing program 1: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x800000000006, 0x0, 0x0, 0x50000}]}) r0 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, 0x0) 15:30:05 executing program 5: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x10000050000}]}) r0 = accept4(0xffffffffffffff9c, 0x0, 0x0, 0x0) read$eventfd(r0, 0x0, 0x0) 15:30:05 executing program 2: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x800000000006, 0x0, 0x0, 0x50000}]}) r0 = openat$random(0xffffffffffffff9c, 0x0, 0x0, 0x0) setsockopt$inet6_buf(r0, 0x29, 0x0, 0x0, 0x0) 15:30:05 executing program 3: syz_open_procfs$namespace(0xffffffffffffffff, 0x0) fgetxattr(0xffffffffffffffff, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = timerfd_create(0x0, 0x0) accept$inet6(r0, 0x0, 0x0) 15:30:05 executing program 4: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000100)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x50000}]}) r0 = eventfd(0x0) ioctl$sock_inet6_tcp_SIOCOUTQNSD(r0, 0x894b, 0x0) syzkaller login: [ 37.128588] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 37.135182] IPv6: ADDRCONF(NETDEV_CHANGE): nr2: link becomes ready [ 37.142509] IPv6: ADDRCONF(NETDEV_CHANGE): nr1: link becomes ready [ 37.149234] IPv6: ADDRCONF(NETDEV_CHANGE): nr3: link becomes ready [ 37.155759] IPv6: ADDRCONF(NETDEV_CHANGE): nr5: link becomes ready [ 37.162472] IPVS: Creating netns size=2712 id=1 [ 37.162641] IPv6: ADDRCONF(NETDEV_CHANGE): nr4: link becomes ready [ 37.173571] IPVS: ftp: loaded support on port[0] = 21 [ 37.184509] IPVS: Creating netns size=2712 id=2 [ 37.189340] IPVS: ftp: loaded support on port[0] = 21 [ 37.206742] IPVS: Creating netns size=2712 id=3 [ 37.211457] IPVS: ftp: loaded support on port[0] = 21 [ 37.224970] chnl_net:caif_netlink_parms(): no params data found [ 37.233090] ------------[ cut here ]------------ [ 37.237847] WARNING: CPU: 0 PID: 5693 at net/batman-adv/main.c:750 batadv_tvlv_container_remove+0x7b/0x80() [ 37.247737] Kernel panic - not syncing: panic_on_warn set ... [ 37.247737] [ 37.255088] CPU: 0 PID: 5693 Comm: syz-executor.2 Not tainted 4.4.194 #0 [ 37.261893] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.271214] 0000000000000082 ffff88012a61b870 ffffffff818a6f22 0000000000000000 [ 37.279215] ffffffff82e96378 ffffffff8300ac2f ffff88012a61b8e8 ffffffff8126f9bc [ 37.287220] ffff880100000008 ffff88012a61b8f8 ffff88012a61b898 ffffffff81274e1f [ 37.295206] Call Trace: [ 37.297762] [] dump_stack+0xa1/0xdf [ 37.303015] [] panic+0xd2/0x225 [ 37.307915] [] ? printk+0x48/0x4a [ 37.312984] [] warn_slowpath_common.cold+0x16/0x16 [ 37.319531] [] warn_slowpath_null+0x15/0x20 [ 37.325473] [] batadv_tvlv_container_remove+0x7b/0x80 [ 37.332280] [] batadv_tvlv_container_register+0xb3/0x120 [ 37.339347] [] batadv_dat_tvlv_container_update+0x26/0x40 [ 37.346504] [] batadv_dat_init+0x6a/0x80 [ 37.352184] [] batadv_mesh_init+0x239/0x290 [ 37.358125] [] batadv_softif_init_late+0x271/0x2c0 [ 37.364673] [] register_netdevice+0xfa/0x450 [ 37.370698] [] rtnl_newlink+0x8a5/0x910 [ 37.376289] [] ? rtnl_newlink+0x17d/0x910 [ 37.382054] [] rtnetlink_rcv_msg+0x170/0x1e0 [ 37.388082] [] ? trace_hardirqs_on+0xd/0x10 [ 37.394024] [] ? mutex_lock_nested+0x30a/0x5a0 [ 37.400233] [] ? rtnetlink_rcv+0x17/0x30 [ 37.405909] [] ? rtnetlink_rcv+0x30/0x30 [ 37.411600] [] netlink_rcv_skb+0x31/0xc0 [ 37.417276] [] rtnetlink_rcv+0x26/0x30 [ 37.422778] [] netlink_unicast+0x168/0x210 [ 37.428628] [] netlink_sendmsg+0x1f1/0x390 [ 37.434479] [] sock_sendmsg+0x35/0x40 [ 37.439908] [] SYSC_sendto+0xed/0x160 [ 37.445324] [] ? sock_alloc_file+0x8c/0x120 [ 37.451265] [] ? fd_install+0x22/0x30 [ 37.456692] [] ? lockdep_sys_exit_thunk+0x12/0x14 [ 37.463152] [] SyS_sendto+0x9/0x10 [ 37.468312] [] entry_SYSCALL_64_fastpath+0x1c/0x7c [ 37.476180] Kernel Offset: disabled [ 37.479813] Rebooting in 86400 seconds..