[ 14.601615] audit: type=1800 audit(1565470034.819:28): pid=5545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="cron" dev="sda1" ino=2447 res=0 [ 14.623418] audit: type=1800 audit(1565470034.839:29): pid=5545 uid=0 auid=4294967295 ses=4294967295 subj=system_u:system_r:kernel_t:s0 op="collect_data" cause="failed(directio)" comm="startpar" name="mcstrans" dev="sda1" ino=2490 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.252' (ECDSA) to the list of known hosts. 2019/08/10 20:47:33 fuzzer started 2019/08/10 20:47:36 dialing manager at 10.128.0.105:45409 2019/08/10 20:47:36 syscalls: 2419 2019/08/10 20:47:36 code coverage: CONFIG_KCOV is not enabled 2019/08/10 20:47:36 comparison tracing: CONFIG_KCOV is not enabled 2019/08/10 20:47:36 extra coverage: CONFIG_KCOV is not enabled 2019/08/10 20:47:36 setuid sandbox: enabled 2019/08/10 20:47:36 namespace sandbox: enabled 2019/08/10 20:47:36 Android sandbox: /sys/fs/selinux/policy does not exist 2019/08/10 20:47:36 fault injection: kernel does not have systematic fault injection support 2019/08/10 20:47:36 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/08/10 20:47:36 net packet injection: enabled 2019/08/10 20:47:36 net device setup: enabled 20:47:37 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000800)={@random="77b0e1efedfa", @random="cfc93934256f", [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @rand_addr, @multicast1}, @igmp={0x14, 0x0, 0x0, @empty, "000000081e84d84b2db57b8a0af02ad8c4fda114"}}}}}, 0x0) 20:47:37 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000000)="11dca50d5e0bcfe47bf070") r1 = socket(0x1e, 0x4, 0x0) r2 = socket(0x1e, 0x2, 0x0) setsockopt$packet_tx_ring(r2, 0x10f, 0x87, &(0x7f0000000080)=@req={0x3fc}, 0x10) setsockopt$packet_tx_ring(r1, 0x10f, 0x87, &(0x7f0000265000)=@req={0x3fc, 0x0, 0x2}, 0x10) write$binfmt_script(r1, &(0x7f0000000040)=ANY=[], 0x0) 20:47:37 executing program 5: perf_event_open(&(0x7f0000940000)={0x2, 0x70, 0xee6a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$VT_WAITACTIVE(0xffffffffffffffff, 0x5607) r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_route(r0, &(0x7f0000000500)={&(0x7f0000000440)={0x10, 0xf0ffffff}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="280000001c000100000000000000008007000000", @ANYRES32, @ANYBLOB="0000ff000a000200ff00000000000000"], 0x28}}, 0x0) 20:47:37 executing program 2: r0 = perf_event_open(&(0x7f000025c000)={0x400000001, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f00000011c0)=""/4096, 0x1350) 20:47:37 executing program 3: r0 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file0'}, 0xb) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) execve(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 20:47:37 executing program 4: syz_mount_image$msdos(&(0x7f0000000280)='msdos\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=ANY=[@ANYBLOB='nodots,gid=', @ANYRESHEX]) syzkaller login: [ 36.840997] IPv6: ADDRCONF(NETDEV_CHANGE): nr0: link becomes ready [ 36.847577] IPv6: ADDRCONF(NETDEV_CHANGE): nr4: link becomes ready [ 36.854164] IPv6: ADDRCONF(NETDEV_CHANGE): nr1: link becomes ready [ 36.861160] IPv6: ADDRCONF(NETDEV_CHANGE): nr3: link becomes ready [ 36.868357] IPv6: ADDRCONF(NETDEV_CHANGE): nr2: link becomes ready [ 36.874814] IPv6: ADDRCONF(NETDEV_CHANGE): nr5: link becomes ready [ 36.883168] IPVS: Creating netns size=2712 id=1 [ 36.887862] IPVS: ftp: loaded support on port[0] = 21 [ 36.897957] IPVS: Creating netns size=2712 id=2 [ 36.902667] IPVS: ftp: loaded support on port[0] = 21 [ 36.920912] chnl_net:caif_netlink_parms(): no params data found [ 36.927970] ------------[ cut here ]------------ [ 36.932723] WARNING: CPU: 1 PID: 5764 at net/batman-adv/main.c:750 batadv_tvlv_container_remove+0x7b/0x80() [ 36.942640] Kernel panic - not syncing: panic_on_warn set ... [ 36.942640] [ 36.949989] CPU: 1 PID: 5764 Comm: syz-executor.4 Not tainted 4.4.188 #18 [ 36.956907] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 36.966245] 0000000000000086 ffff8800b24e7870 ffffffff818a71b2 0000000000000000 [ 36.974221] ffffffff82e958a8 ffffffff8300a06c ffff8800b24e78e8 ffffffff8126f8ec [ 36.982196] ffff880000000008 ffff8800b24e78f8 ffff8800b24e7898 ffffffff81274d4f [ 36.990183] Call Trace: [ 36.992785] [] dump_stack+0xa1/0xdf [ 36.998034] [] panic+0xd2/0x225 [ 37.002931] [] ? printk+0x48/0x4a [ 37.008004] [] warn_slowpath_common.cold+0x16/0x16 [ 37.014552] [] warn_slowpath_null+0x15/0x20 [ 37.020494] [] batadv_tvlv_container_remove+0x7b/0x80 [ 37.027307] [] batadv_tvlv_container_register+0xb3/0x120 [ 37.034396] [] batadv_dat_tvlv_container_update+0x26/0x40 [ 37.041564] [] batadv_dat_init+0x6a/0x80 [ 37.047248] [] batadv_mesh_init+0x239/0x290 [ 37.053189] [] batadv_softif_init_late+0x271/0x2c0 [ 37.059739] [] register_netdevice+0xfa/0x440 [ 37.065766] [] rtnl_newlink+0x8a5/0x910 [ 37.071360] [] ? rtnl_newlink+0x17d/0x910 [ 37.077135] [] rtnetlink_rcv_msg+0x170/0x1e0 [ 37.083167] [] ? trace_hardirqs_on+0xd/0x10 [ 37.089111] [] ? mutex_lock_nested+0x30a/0x5a0 [ 37.095318] [] ? rtnetlink_rcv+0x17/0x30 [ 37.101001] [] ? rtnetlink_rcv+0x30/0x30 [ 37.106683] [] netlink_rcv_skb+0x31/0xc0 [ 37.112367] [] rtnetlink_rcv+0x26/0x30 [ 37.117909] [] netlink_unicast+0x168/0x210 [ 37.123761] [] netlink_sendmsg+0x1f1/0x390 [ 37.129618] [] sock_sendmsg+0x35/0x40 [ 37.135041] [] SYSC_sendto+0xed/0x160 [ 37.140465] [] ? sock_alloc_file+0x8c/0x120 [ 37.146407] [] ? fd_install+0x22/0x30 [ 37.151829] [] ? lockdep_sys_exit_thunk+0x12/0x14 [ 37.158297] [] SyS_sendto+0x9/0x10 [ 37.163459] [] entry_SYSCALL_64_fastpath+0x1c/0x7c [ 37.170957] Kernel Offset: disabled [ 37.174586] Rebooting in 86400 seconds.. serialport: VM disconnected.