[....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 15.174390] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 18.729468] random: sshd: uninitialized urandom read (32 bytes read) [ 19.026554] random: sshd: uninitialized urandom read (32 bytes read) [ 19.705318] random: sshd: uninitialized urandom read (32 bytes read) [ 181.114685] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.26' (ECDSA) to the list of known hosts. [ 186.629303] random: sshd: uninitialized urandom read (32 bytes read) executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 186.765272] kasan: CONFIG_KASAN_INLINE enabled [ 186.769935] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 186.777319] general protection fault: 0000 [#1] SMP KASAN [ 186.782844] CPU: 0 PID: 4448 Comm: syz-executor589 Not tainted 4.18.0-rc3+ #48 [ 186.790194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 186.799541] RIP: 0010:do_raw_spin_lock+0x27/0x200 [ 186.804357] Code: 00 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 e5 41 56 41 55 41 54 53 48 89 fb 48 83 c7 04 48 89 fa 48 c1 ea 03 48 83 ec 08 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 7b [ 186.823481] RSP: 0018:ffff8801be6ff9c0 EFLAGS: 00010286 [ 186.828823] RAX: dffffc0000000000 RBX: 0000000000000230 RCX: 0000000000000000 [ 186.836081] RDX: 0000000000000046 RSI: 0000000000000000 RDI: 0000000000000234 [ 186.843342] RBP: ffff8801be6ff9e8 R08: 0000000000000001 R09: 0000000000000000 [ 186.850601] R10: ffffed00360e196e R11: ffff8801b070cb73 R12: dffffc0000000000 [ 186.857854] R13: ffff8801c79fee00 R14: 0000000000000220 R15: 0000000000000000 [ 186.865121] FS: 00007f3df6ee5700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 186.873329] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 186.879200] CR2: 00007ffcce07fc30 CR3: 00000001c00ee000 CR4: 00000000001406f0 [ 186.886549] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 186.893808] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 186.901055] Call Trace: [ 186.903643] _raw_spin_lock_bh+0x39/0x40 [ 186.907688] ? smap_list_map_remove+0x96/0x350 [ 186.912271] smap_list_map_remove+0x96/0x350 [ 186.916660] ? __fget+0x414/0x670 [ 186.920093] ? smap_tx_work+0xcd0/0xcd0 [ 186.924058] ? expand_files.part.8+0x9c0/0x9c0 [ 186.928622] sock_map_ctx_update_elem.isra.21+0x3ab/0x570 [ 186.934140] ? __sock_map_ctx_update_elem.isra.20+0x1530/0x1530 [ 186.940179] ? lock_acquire+0x1e4/0x540 [ 186.944155] sock_map_update_elem+0x1b9/0x3b0 [ 186.948628] ? bpf_sock_map_update+0x60/0x60 [ 186.953014] ? lock_release+0xa30/0xa30 [ 186.956974] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 186.962514] ? bpf_sock_map_update+0x60/0x60 [ 186.966902] map_update_elem+0x5c4/0xc90 [ 186.970942] __x64_sys_bpf+0x32d/0x510 [ 186.974810] ? bpf_prog_get+0x20/0x20 [ 186.978592] ? kasan_check_read+0x11/0x20 [ 186.983092] ? compat_start_thread+0x80/0x80 [ 186.987484] do_syscall_64+0x1b9/0x820 [ 186.991446] ? syscall_return_slowpath+0x5e0/0x5e0 [ 186.996357] ? syscall_return_slowpath+0x31d/0x5e0 [ 187.001264] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 187.006260] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 187.011089] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.016256] RIP: 0033:0x445939 [ 187.019432] Code: e8 8c be 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 11 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.038561] RSP: 002b:00007f3df6ee4db8 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 187.046251] RAX: ffffffffffffffda RBX: 00000000006dbc3c RCX: 0000000000445939 [ 187.053499] RDX: 0000000000000020 RSI: 0000000020000080 RDI: 0000000000000002 executing program [ 187.062156] RBP: 00000000006dbc38 R08: 0000000000000000 R09: 0000000000000000 [ 187.069413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 187.077185] R13: 00007ffe793602bf R14: 00007f3df6ee59c0 R15: 0000000000000005 [ 187.084436] Modules linked in: [ 187.087608] Dumping ftrace buffer: [ 187.091125] (ftrace buffer empty) [ 187.094889] ---[ end trace 8a02525585baec70 ]--- [ 187.099680] RIP: 0010:do_raw_spin_lock+0x27/0x200 [ 187.104532] Code: 00 00 00 48 b8 00 00 00 00 00 fc ff df 55 48 89 e5 41 56 41 55 41 54 53 48 89 fb 48 83 c7 04 48 89 fa 48 c1 ea 03 48 83 ec 08 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 7b [ 187.108844] kasan: CONFIG_KASAN_INLINE enabled [ 187.123793] RSP: 0018:ffff8801be6ff9c0 EFLAGS: 00010286 [ 187.128419] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 187.133810] general protection fault: 0000 [#2] SMP KASAN [ 187.141190] RAX: dffffc0000000000 RBX: 0000000000000230 RCX: 0000000000000000 [ 187.146700] CPU: 1 PID: 4445 Comm: syz-executor589 Tainted: G D 4.18.0-rc3+ #48 [ 187.146712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 187.154018] RDX: 0000000000000046 RSI: 0000000000000000 RDI: 0000000000000234 [ 187.162839] RIP: 0010:do_raw_spin_lock+0x27/0x200 [ 187.162847] Code: [ 187.172232] RBP: ffff8801be6ff9e8 R08: 0000000000000001 R09: 0000000000000000 [ 187.179475] 00 00 00 [ 187.184329] R10: ffffed00360e196e R11: ffff8801b070cb73 R12: dffffc0000000000 [ 187.186451] 48 b8 00 00 [ 187.193747] R13: ffff8801c79fee00 R14: 0000000000000220 R15: 0000000000000000 [ 187.196129] 00 00 00 fc [ 187.203417] FS: 00007f3df6ee5700(0000) GS:ffff8801dae00000(0000) knlGS:0000000000000000 [ 187.206343] ff df 55 48 [ 187.213638] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 187.216290] 89 e5 41 56 [ 187.224539] CR2: 00007ffcce07fc30 CR3: 00000001c00ee000 CR4: 00000000001406f0 [ 187.227184] 41 55 41 54 [ 187.233081] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 187.235724] 53 48 89 fb [ 187.243009] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 187.245651] 48 83 c7 04 48 89 fa 48 c1 ea 03 [ 187.252963] Kernel panic - not syncing: Fatal exception in interrupt [ 187.255605] 48 83 ec 08 <0f> b6 14 02 48 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 7b [ 187.282421] RSP: 0018:ffff8801b078f9c0 EFLAGS: 00010286 [ 187.287770] RAX: dffffc0000000000 RBX: 0000000000000230 RCX: 0000000000000000 [ 187.295024] RDX: 0000000000000046 RSI: 0000000000000000 RDI: 0000000000000234 [ 187.302295] RBP: ffff8801b078f9e8 R08: 0000000000000001 R09: 0000000000000000 [ 187.309542] R10: ffffed0036bfb966 R11: ffff8801b5fdcb33 R12: dffffc0000000000 [ 187.316791] R13: ffff8801c79fe280 R14: 0000000000000220 R15: 0000000000000000 [ 187.324055] FS: 00007f3df6f06700(0000) GS:ffff8801daf00000(0000) knlGS:0000000000000000 [ 187.332260] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 187.338145] CR2: 00007f3df6ec3e78 CR3: 00000001c00ee000 CR4: 00000000001406e0 [ 187.345407] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 187.352753] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 187.360014] Call Trace: [ 187.362593] _raw_spin_lock_bh+0x39/0x40 [ 187.366636] ? smap_list_map_remove+0x96/0x350 [ 187.371201] smap_list_map_remove+0x96/0x350 [ 187.375590] ? __fget+0x414/0x670 [ 187.379036] ? smap_tx_work+0xcd0/0xcd0 [ 187.382989] ? expand_files.part.8+0x9c0/0x9c0 [ 187.387551] sock_map_ctx_update_elem.isra.21+0x3ab/0x570 [ 187.393074] ? __sock_map_ctx_update_elem.isra.20+0x1530/0x1530 [ 187.399115] ? lock_acquire+0x1e4/0x540 [ 187.403080] sock_map_update_elem+0x1b9/0x3b0 [ 187.407557] ? bpf_sock_map_update+0x60/0x60 [ 187.411956] ? lock_release+0xa30/0xa30 [ 187.415916] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 187.421432] ? bpf_sock_map_update+0x60/0x60 [ 187.425818] map_update_elem+0x5c4/0xc90 [ 187.429884] __x64_sys_bpf+0x32d/0x510 [ 187.433761] ? bpf_prog_get+0x20/0x20 [ 187.437548] do_syscall_64+0x1b9/0x820 [ 187.441427] ? finish_task_switch+0x1d3/0x890 [ 187.445902] ? syscall_return_slowpath+0x5e0/0x5e0 [ 187.450812] ? syscall_return_slowpath+0x31d/0x5e0 [ 187.455719] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 187.460726] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 187.465553] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 187.470722] RIP: 0033:0x445939 [ 187.473885] Code: e8 8c be 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b 11 fc ff c3 66 2e 0f 1f 84 00 00 00 00 [ 187.493002] RSP: 002b:00007f3df6f05db8 EFLAGS: 00000297 ORIG_RAX: 0000000000000141 [ 187.500701] RAX: ffffffffffffffda RBX: 00000000006dbc24 RCX: 0000000000445939 [ 187.507949] RDX: 0000000000000020 RSI: 0000000020000180 RDI: 0000000000000002 [ 187.515209] RBP: 00000000006dbc20 R08: 0000000000000000 R09: 0000000000000000 [ 187.522468] R10: 0000000000000000 R11: 0000000000000297 R12: 0000000000000000 [ 187.529729] R13: 00007ffe793602bf R14: 00007f3df6f069c0 R15: 0000000000000005 [ 187.536980] Modules linked in: [ 187.540158] Dumping ftrace buffer: [ 187.543675] (ftrace buffer empty) [ 187.547942] Dumping ftrace buffer: [ 187.551500] (ftrace buffer empty) [ 187.555205] Kernel Offset: disabled [ 187.558831] Rebooting in 86400 seconds..