[....] Starting OpenBSD Secure Shell server: sshd[ 11.061542] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 37.142643] random: sshd: uninitialized urandom read (32 bytes read) [ 37.411084] audit: type=1400 audit(1550181036.109:6): avc: denied { map } for pid=1776 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 37.453089] random: sshd: uninitialized urandom read (32 bytes read) [ 37.939027] random: sshd: uninitialized urandom read (32 bytes read) [ 68.577048] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.0.188' (ECDSA) to the list of known hosts. [ 74.196532] random: sshd: uninitialized urandom read (32 bytes read) [ 74.287714] audit: type=1400 audit(1550181072.979:7): avc: denied { map } for pid=1812 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/02/14 21:51:13 parsed 1 programs [ 75.053571] audit: type=1400 audit(1550181073.749:8): avc: denied { map } for pid=1812 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=5005 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 75.909215] random: cc1: uninitialized urandom read (8 bytes read) 2019/02/14 21:51:16 executed programs: 0 [ 77.547642] audit: type=1400 audit(1550181076.239:9): avc: denied { map } for pid=1812 comm="syz-execprog" path="/root/syzkaller-shm526740152" dev="sda1" ino=16096 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 80.059364] audit: type=1400 audit(1550181078.749:10): avc: denied { create } for pid=2715 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 80.087553] audit: type=1400 audit(1550181078.759:11): avc: denied { write } for pid=2715 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 80.112502] audit: type=1400 audit(1550181078.759:12): avc: denied { read } for pid=2715 comm="syz-executor.5" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 [ 80.208262] [ 80.209924] ===================================== [ 80.214758] WARNING: bad unlock balance detected! [ 80.219592] 4.14.99+ #12 Not tainted [ 80.223282] ------------------------------------- [ 80.228115] migration/0/11 is trying to release lock (&rq->lock) at: [ 80.234591] [] migration_cpu_stop+0x2dd/0x430 [ 80.240618] but there are no more locks to release! [ 80.245621] [ 80.245621] other info that might help us debug this: [ 80.252259] 1 lock held by migration/0/11: [ 80.256471] #0: (&p->pi_lock){-.-.}, at: [] migration_cpu_stop+0xe1/0x430 [ 80.265135] [ 80.265135] stack backtrace: [ 80.269606] CPU: 0 PID: 11 Comm: migration/0 Not tainted 4.14.99+ #12 [ 80.276159] Call Trace: [ 80.278739] dump_stack+0xb9/0x10e [ 80.282261] ? migration_cpu_stop+0x2dd/0x430 [ 80.286741] print_unlock_imbalance_bug.cold+0x110/0x11f [ 80.292170] ? lock_set_class+0x3b6/0x570 [ 80.296296] ? migration_cpu_stop+0x2dd/0x430 [ 80.300764] ? reacquire_held_locks+0x3f0/0x3f0 [ 80.305407] ? set_task_cpu+0x30b/0x9f0 [ 80.309374] ? move_queued_task+0x382/0x970 [ 80.313672] ? migration_cpu_stop+0x2dd/0x430 [ 80.318143] ? cpu_stopper_thread+0x130/0x320 [ 80.322614] ? sched_ttwu_pending+0x2a0/0x2a0 [ 80.327085] ? cpu_stopper_thread+0x215/0x320 [ 80.331580] ? _raw_spin_unlock_irq+0x24/0x50 [ 80.336051] ? sched_ttwu_pending+0x2a0/0x2a0 [ 80.340519] ? cpu_stopper_thread+0x19b/0x320 [ 80.344986] ? cpu_stop_create+0x80/0x80 [ 80.349019] ? smpboot_thread_fn+0x5ca/0x900 [ 80.353401] ? sort_range+0x30/0x30 [ 80.357007] ? sort_range+0x30/0x30 [ 80.360644] ? kthread+0x310/0x420 [ 80.364157] ? kthread_create_on_node+0xf0/0xf0 [ 80.368805] ? ret_from_fork+0x3a/0x50 2019/02/14 21:51:21 executed programs: 139