[....] Starting OpenBSD Secure Shell server: sshd[ 8.615514] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 34.888424] random: sshd: uninitialized urandom read (32 bytes read) [ 35.215390] audit: type=1400 audit(1547044306.104:6): avc: denied { map } for pid=1781 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 [ 35.264724] random: sshd: uninitialized urandom read (32 bytes read) [ 35.765278] random: sshd: uninitialized urandom read (32 bytes read) [ 48.112493] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.204' (ECDSA) to the list of known hosts. [ 53.711114] random: sshd: uninitialized urandom read (32 bytes read) [ 53.798721] audit: type=1400 audit(1547044324.684:7): avc: denied { map } for pid=1805 comm="syz-execprog" path="/root/syz-execprog" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2019/01/09 14:32:05 parsed 1 programs [ 54.571247] audit: type=1400 audit(1547044325.464:8): avc: denied { map } for pid=1805 comm="syz-execprog" path="/sys/kernel/debug/kcov" dev="debugfs" ino=4999 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 [ 55.381789] random: cc1: uninitialized urandom read (8 bytes read) 2019/01/09 14:32:07 executed programs: 0 [ 56.774566] audit: type=1400 audit(1547044327.664:9): avc: denied { map } for pid=1805 comm="syz-execprog" path="/root/syzkaller-shm404128313" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 58.719596] SELinux: failed to load policy [ 58.724748] kasan: CONFIG_KASAN_INLINE enabled [ 58.729476] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 58.736989] general protection fault: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 58.743738] Modules linked in: [ 58.746915] CPU: 1 PID: 1968 Comm: syz-executor0 Not tainted 4.14.91+ #3 [ 58.753815] task: ffff8881ccd0af00 task.stack: ffff8881cb8a8000 [ 58.759878] RIP: 0010:ebitmap_destroy+0x2d/0xe0 [ 58.764527] RSP: 0018:ffff8881cb8af658 EFLAGS: 00010202 [ 58.769880] RAX: dffffc0000000000 RBX: 1ffff11039715ed4 RCX: 0000000000000000 [ 58.777218] RDX: 0000000000000001 RSI: 00000000ffffffff RDI: 0000000000000008 [ 58.784490] RBP: ffff8881cf2b1c40 R08: ffffffff8b2e888e R09: ffffffff8b2e888a [ 58.791758] R10: 000000000002853f R11: 000000000001c033 R12: 0000000000000008 [ 58.791763] R13: ffff8881cf3ca270 R14: 00000000ffffffea R15: ffff8881cce3eee8 [ 58.791769] FS: 00007f032f49d700(0000) GS:ffff8881dbb00000(0000) knlGS:0000000000000000 [ 58.791773] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 58.791781] CR2: 000000000073c000 CR3: 00000001c5376001 CR4: 00000000001606a0 [ 58.827829] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 58.835098] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 58.842442] Call Trace: [ 58.842474] sens_destroy+0x44/0x90 [ 58.842481] sens_read+0x1c1/0x340 [ 58.842493] ? cat_read+0x300/0x300 [ 58.855895] ? kfree+0xd4/0x310 [ 58.855909] ? policydb_read+0x7e6/0x2240 [ 58.855918] policydb_read+0xc44/0x2240 [ 58.867296] ? trace_hardirqs_on+0x10/0x10 [ 58.871525] ? trace_hardirqs_on+0x10/0x10 [ 58.875741] ? deref_stack_reg+0xe0/0xe0 [ 58.879783] ? __vmalloc_node_range+0x9c/0x690 [ 58.884360] ? cat_read+0x300/0x300 [ 58.887964] ? string_to_av_perm+0x90/0x90 [ 58.892180] ? mark_held_locks+0xa6/0xf0 [ 58.896339] ? kasan_unpoison_shadow+0x30/0x40 [ 58.900907] ? kasan_kmalloc+0x76/0xc0 [ 58.904787] ? kmem_cache_alloc_trace+0x126/0x310 [ 58.909675] ? security_load_policy+0x230/0x960 [ 58.914334] ? lock_acquire+0x10f/0x380 [ 58.918291] ? security_get_bools+0x5e0/0x5e0 [ 58.922768] ? trace_hardirqs_on+0x10/0x10 [ 58.926995] ? alloc_vmap_area.isra.0+0x7e0/0x7e0 [ 58.931824] ? kasan_unpoison_shadow+0x30/0x40 [ 58.936392] ? __might_fault+0x104/0x1b0 [ 58.940436] ? lock_downgrade+0x5d0/0x5d0 [ 58.944563] ? lock_acquire+0x10f/0x380 [ 58.948517] ? __might_fault+0xd4/0x1b0 [ 58.952473] ? __might_fault+0x177/0x1b0 [ 58.956512] ? sel_write_load+0x1e3/0xfb0 [ 58.960640] ? sel_read_bool+0x240/0x240 [ 58.964680] ? trace_hardirqs_on+0x10/0x10 [ 58.968906] ? __vfs_write+0xf9/0x5a0 [ 58.972688] ? sel_read_bool+0x240/0x240 [ 58.976737] ? kernel_read+0x110/0x110 [ 58.980613] ? rcu_lockdep_current_cpu_online+0xed/0x140 [ 58.986047] ? rcu_read_lock_sched_held+0x10a/0x130 [ 58.991044] ? vfs_write+0x17f/0x4d0 [ 58.994734] ? SyS_write+0xc0/0x1a0 [ 58.998340] ? SyS_read+0x1a0/0x1a0 [ 59.001949] ? do_clock_gettime+0xd0/0xd0 [ 59.006160] ? do_syscall_64+0x43/0x4b0 [ 59.010127] ? SyS_read+0x1a0/0x1a0 [ 59.013745] ? do_syscall_64+0x19b/0x4b0 [ 59.017788] ? entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 59.023138] Code: 41 54 49 89 fc 55 53 e8 f2 49 8f ff 4d 85 e4 0f 84 9b 00 00 00 e8 e4 49 8f ff 4c 89 e2 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <80> 3c 02 00 0f 85 97 00 00 00 49 bd 00 00 00 00 00 fc ff df 49 [ 59.042283] RIP: ebitmap_destroy+0x2d/0xe0 RSP: ffff8881cb8af658 [ 59.050709] ---[ end trace 0d94355ff223ec59 ]--- [ 59.055515] Kernel panic - not syncing: Fatal exception [ 59.061242] Kernel Offset: 0x7800000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 59.072072] Rebooting in 86400 seconds..