Warning: Permanently added '10.128.15.206' (ECDSA) to the list of known hosts. 2019/09/23 12:45:27 fuzzer started 2019/09/23 12:45:29 dialing manager at 10.128.0.105:39541 2019/09/23 12:45:29 syscalls: 2425 2019/09/23 12:45:29 code coverage: CONFIG_KCOV is not enabled 2019/09/23 12:45:29 comparison tracing: CONFIG_KCOV is not enabled 2019/09/23 12:45:29 extra coverage: CONFIG_KCOV is not enabled 2019/09/23 12:45:29 setuid sandbox: enabled 2019/09/23 12:45:29 namespace sandbox: enabled 2019/09/23 12:45:29 Android sandbox: /sys/fs/selinux/policy does not exist 2019/09/23 12:45:29 fault injection: kernel does not have systematic fault injection support 2019/09/23 12:45:29 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/09/23 12:45:29 net packet injection: enabled 2019/09/23 12:45:29 net device setup: enabled 12:45:29 executing program 0: socketpair$unix(0x1, 0x8000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000180)={0x0, 0xd}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x705, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x28, 0x12, @veth={{0xc, 0x1, 'veth\x00'}, {0x18, 0x2, @VETH_INFO_PEER={0x14}}}}]}, 0x250}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000100)=@dellink={0x20, 0x11, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x20}}, 0x0) 12:45:29 executing program 2: r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000140)={0x18, 0x0, {0x5, @local, 'bridge0\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) 12:45:29 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$security_selinux(r1, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0xae, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r2, 0x29, 0x48, &(0x7f0000000040)=0xfffffffffffffffe, 0x4) fstatfs(r2, &(0x7f00000002c0)=""/164) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, 0xffffffffffffffff) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ppp\x00', 0x40000, 0x0) fcntl$setlease(r3, 0x400, 0x6) r4 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$security_selinux(r4, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x415, 0x0) getsockopt$inet6_opts(r4, 0x29, 0x36, &(0x7f0000000400)=""/16, &(0x7f0000000440)=0x10) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r5, 0x29, 0x48, &(0x7f0000000040)=0xfffffffffffffffe, 0x4) write$binfmt_misc(r5, &(0x7f0000000380)={'syz1', "a22f86d455d65577442bcc339a557f91530c30f06f9abe3e6e8affaa8f8b6fd329f4a32742a6e3b9476adf5e26c4758c5cb7bdce94f8c966b3b43a29f32c98178d884cd3c385d2ad18db90"}, 0x4f) ioctl(r0, 0x1000008912, &(0x7f00000000c0)="11dca50d5e0bcfe47bf070") getrandom(&(0x7f0000000000)=""/73, 0x49, 0x2) r6 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fsetxattr$security_selinux(r6, &(0x7f0000000200)='security.selinux\x00', &(0x7f00000001c0)='unconfined_u:system_r:insmod_t:s0-s0:c0.c1023\x00', 0x415, 0x0) ioctl$TIOCGSID(r6, 0x5429, &(0x7f0000000280)) r7 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r7, 0x29, 0x48, &(0x7f0000000040)=0xfffffffffffffffe, 0x4) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000140)='ip6gretap0\x00', 0x10) 12:45:29 executing program 3: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) bind(0xffffffffffffffff, &(0x7f0000000080)=@generic={0x0, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="38f19c0420cd8034"], 0xc}}, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = fcntl$dupfd(r1, 0x0, r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="c37c5e74bb4ce4100e71d9155eaf710b2be7b9bd75fe9711c59f7d9c21b47a61e8089f2ecebe8ae9ad7f608dc82ca9c92f7e4d538cf51c526f7735d9b8", @ANYRES16, @ANYRESHEX, @ANYBLOB="e6c55c5d9eb82ee45101ed000029a741efca44f937d0492482ba837296d961244e2e0c734057548c402cc43b3897cc275fd87f333c960d2bc40dd887fc8dc4872bf5b65c87e940b30eecad4c079521dfdaf3d8fef515583873ddd56ce404602b1894ef983d0cfcdfbb1118c5ae8c6b540b32a7db10396d42dcfb98a27a58ec1bcfc693000031"], 0x0, 0xd7}, 0x20) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 12:45:29 executing program 4: r0 = socket$packet(0x11, 0xa, 0x300) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000080)=[{0x80000006, 0x0, 0x0, 0x3}]}, 0x10) r1 = socket$inet6(0xa, 0x3, 0x1) close(r1) r2 = socket(0x11, 0x3, 0x0) syz_open_procfs(0x0, 0x0) bind(r2, &(0x7f0000000000)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r3 = open(&(0x7f0000002000)='./bus\x00', 0x141042, 0x0) ftruncate(r3, 0x87ffd) sendfile(r1, r3, 0x0, 0x800000000024) 12:45:29 executing program 1: r0 = socket$alg(0x26, 0x5, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000040)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x72dd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfeffffffffffffff, 0xffffffffffffffff, 0x0) pipe(0x0) write$binfmt_misc(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_STREAMON(0xffffffffffffffff, 0x40045612, &(0x7f0000000000)=0x1) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) close(r0) openat$rtc(0xffffffffffffff9c, &(0x7f0000001580)='/dev/rtc0\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r0, r3, &(0x7f000000f000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffa5) syzkaller login: [ 44.757408] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 44.768761] IPv6: ADDRCONF(NETDEV_CHANGE): nr4: link becomes ready [ 44.769776] IPVS: Creating netns size=2712 id=1 [ 44.769788] IPVS: ftp: loaded support on port[0] = 21 [ 44.789435] IPv6: ADDRCONF(NETDEV_CHANGE): nr1: link becomes ready [ 44.796864] IPv6: ADDRCONF(NETDEV_CHANGE): nr5: link becomes ready [ 44.803692] IPv6: ADDRCONF(NETDEV_CHANGE): nr2: link becomes ready [ 44.810190] IPv6: ADDRCONF(NETDEV_CHANGE): nr3: link becomes ready [ 44.818574] IPVS: Creating netns size=2712 id=2 [ 44.823328] IPVS: ftp: loaded support on port[0] = 21 [ 44.835932] chnl_net:caif_netlink_parms(): no params data found [ 44.843339] ------------[ cut here ]------------ [ 44.848254] WARNING: CPU: 0 PID: 5766 at net/batman-adv/main.c:750 batadv_tvlv_container_remove+0x7b/0x80() [ 44.858919] Kernel panic - not syncing: panic_on_warn set ... [ 44.858919] [ 44.866374] CPU: 0 PID: 5766 Comm: syz-executor.0 Not tainted 4.4.194 #0 [ 44.873188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 44.882603] 0000000000000082 ffff8800bb297870 ffffffff818a6f22 0000000000000000 [ 44.890642] ffffffff82e96378 ffffffff8300ac2f ffff8800bb2978e8 ffffffff8126f9bc [ 44.898713] ffff880000000008 ffff8800bb2978f8 ffff8800bb297898 ffffffff81274e1f [ 44.906919] Call Trace: [ 44.909485] [] dump_stack+0xa1/0xdf [ 44.914763] [] panic+0xd2/0x225 [ 44.919866] [] ? printk+0x48/0x4a [ 44.924969] [] warn_slowpath_common.cold+0x16/0x16 [ 44.931539] [] warn_slowpath_null+0x15/0x20 [ 44.937670] [] batadv_tvlv_container_remove+0x7b/0x80 [ 44.944486] [] batadv_tvlv_container_register+0xb3/0x120 [ 44.951660] [] batadv_dat_tvlv_container_update+0x26/0x40 [ 44.958905] [] batadv_dat_init+0x6a/0x80 [ 44.964589] [] batadv_mesh_init+0x239/0x290 [ 44.970555] [] batadv_softif_init_late+0x271/0x2c0 [ 44.977123] [] register_netdevice+0xfa/0x450 [ 44.983168] [] rtnl_newlink+0x8a5/0x910 [ 44.988764] [] ? rtnl_newlink+0x17d/0x910 [ 44.994548] [] rtnetlink_rcv_msg+0x170/0x1e0 [ 45.000578] [] ? trace_hardirqs_on+0xd/0x10 [ 45.006534] [] ? mutex_lock_nested+0x30a/0x5a0 [ 45.012753] [] ? rtnetlink_rcv+0x17/0x30 [ 45.018435] [] ? rtnetlink_rcv+0x30/0x30 [ 45.024133] [] netlink_rcv_skb+0x31/0xc0 [ 45.029842] [] rtnetlink_rcv+0x26/0x30 [ 45.035353] [] netlink_unicast+0x168/0x210 [ 45.041221] [] netlink_sendmsg+0x1f1/0x390 [ 45.047088] [] sock_sendmsg+0x35/0x40 [ 45.052511] [] SYSC_sendto+0xed/0x160 [ 45.057935] [] ? sock_alloc_file+0x8c/0x120 [ 45.063899] [] ? fd_install+0x22/0x30 [ 45.069324] [] ? lockdep_sys_exit_thunk+0x12/0x14 [ 45.075791] [] SyS_sendto+0x9/0x10 [ 45.081065] [] entry_SYSCALL_64_fastpath+0x1c/0x7c [ 45.089093] Kernel Offset: disabled [ 45.092747] Rebooting in 86400 seconds..