[ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.64' (ECDSA) to the list of known hosts. 2020/09/23 19:04:18 fuzzer started 2020/09/23 19:04:18 connecting to host at 10.128.0.105:44151 2020/09/23 19:04:18 checking machine... 2020/09/23 19:04:18 checking revisions... 2020/09/23 19:04:18 testing simple program... syzkaller login: [ 36.967946] audit: type=1400 audit(1600887858.311:8): avc: denied { execmem } for pid=6371 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 37.024350] IPVS: ftp: loaded support on port[0] = 21 2020/09/23 19:04:18 building call list... [ 37.672424] ================================================================================ [ 37.681132] UBSAN: Undefined behaviour in ./include/crypto/hash.h:686:9 [ 37.687983] member access within null pointer of type 'struct crypto_shash' [ 37.695076] CPU: 0 PID: 5 Comm: kworker/u4:0 Not tainted 4.14.199-syzkaller #0 [ 37.703034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 37.712415] Workqueue: netns cleanup_net [ 37.716468] Call Trace: [ 37.719062] dump_stack+0x21b/0x32e [ 37.722724] ? dma_virt_alloc+0x82/0x82 [ 37.726693] ? ubsan_prologue+0x29/0x50 [ 37.730674] ubsan_epilogue+0xe/0x3a [ 37.734390] handle_null_ptr_deref+0x78/0x80 [ 37.738795] __ubsan_handle_type_mismatch_v1+0x81/0xb0 [ 37.744103] sctp_destruct_sock+0x70/0x80 [ 37.748246] ? sctp_accept+0x730/0x730 [ 37.752158] __sk_destruct+0x93/0x8e0 [ 37.755961] ? proto_unregister+0x5e0/0x5e0 [ 37.760315] ? mark_held_locks+0xc4/0x120 [ 37.764728] __sk_free+0xf4/0x370 [ 37.768177] sk_free+0x30/0x50 [ 37.772079] sctp_close+0x667/0x940 [ 37.775712] ? sctp_init_sock+0x1430/0x1430 [ 37.785161] ? do_raw_spin_unlock+0x1e0/0x310 [ 37.789683] ? ip_mc_drop_socket+0x16/0x270 [ 37.794008] inet_release+0xfe/0x230 [ 37.797723] inet6_release+0x51/0x80 [ 37.801441] __sock_release+0x236/0x330 [ 37.805419] sctp_ctrlsock_exit+0x67/0x90 [ 37.809576] ops_exit_list+0x9a/0x190 [ 37.813400] cleanup_net+0x4a3/0xd30 [ 37.817111] ? net_drop_ns+0x90/0x90 [ 37.820832] process_one_work+0x7ac/0x1890 [ 37.825086] ? pwq_dec_nr_in_flight+0x360/0x360 [ 37.829753] ? lock_acquire+0x197/0x510 [ 37.833721] ? rwlock_bug.part.0+0xe0/0xe0 [ 37.837949] ? worker_thread+0x1e0/0x1330 [ 37.842099] worker_thread+0x6c1/0x1330 [ 37.846093] ? process_one_work+0x1890/0x1890 [ 37.850672] ? process_one_work+0x1890/0x1890 [ 37.855181] kthread+0x35e/0x530 [ 37.858562] ? kthread_create_on_node+0xd0/0xd0 [ 37.863224] ret_from_fork+0x24/0x30 [ 37.867658] ================================================================================ [ 38.234965] can: request_module (can-proto-0) failed. [ 38.247617] can: request_module (can-proto-0) failed. [ 38.260680] can: request_module (can-proto-0) failed. [ 38.313232] audit: type=1400 audit(1600887859.652:9): avc: denied { create } for pid=6355 comm="syz-fuzzer" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=dccp_socket permissive=1