random: sshd: uninitialized urandom read (32 bytes read) audit: type=1400 audit(1560808705.056:7): avc: denied { map } for pid=1789 comm="syz-executor092" path="/root/syz-executor092205908" dev="sda1" ino=16482 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 ------------[ cut here ]------------ audit: type=1400 audit(1560808705.056:8): avc: denied { map } for pid=1789 comm="syz-executor092" path="/dev/binder0" dev="devtmpfs" ino=5448 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 kernel BUG at drivers/android/binder_alloc.c:1128! invalid opcode: 0000 [#1] PREEMPT SMP KASAN NOPTI audit: type=1400 audit(1560808705.056:9): avc: denied { set_context_mgr } for pid=1789 comm="syz-executor092" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 Modules linked in: CPU: 0 PID: 1789 Comm: syz-executor092 Not tainted 4.14.127+ #8 task: (ptrval) task.stack: (ptrval) RIP: 0010:binder_alloc_do_buffer_copy+0xc7/0x500 drivers/android/binder_alloc.c:1128 RSP: 0018:ffff8881cfd17550 EFLAGS: 00010297 RAX: ffff8881d1510000 RBX: 0000000020001000 RCX: 00000000000000e8 RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffff8881d269b9d8 RBP: 0000000000000078 R08: ffff8881cfd17608 R09: 0000000000000008 R10: ffffed1039fa2f1a R11: ffff8881cfd178d7 R12: ffff8881cfd20b98 audit: type=1400 audit(1560808705.056:10): avc: denied { call } for pid=1789 comm="syz-executor092" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 R13: 0000000000000008 R14: 00000000000000e8 R15: ffff8881cfd17608 FS: 00000000017f3940(0000) GS:ffff8881db800000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000055e9c0c2e0f0 CR3: 00000001d721a002 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Call Trace: binder_validate_ptr+0xad/0x190 drivers/android/binder.c:2315 binder_transaction+0x1edf/0x5700 drivers/android/binder.c:3423 audit: type=1400 audit(1560808705.056:11): avc: denied { transfer } for pid=1789 comm="syz-executor092" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=binder permissive=1 Code: 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 0d 04 00 00 48 8b 6d 58 48 29 dd e8 33 14 0c ff 49 39 ed 76 07 e8 29 14 0c ff <0f> 0b e8 22 14 0c ff 4c 29 ed 49 39 ee 77 ec e8 15 14 0c ff 41 RIP: binder_alloc_do_buffer_copy+0xc7/0x500 drivers/android/binder_alloc.c:1128 RSP: ffff8881cfd17550 ---[ end trace e8f7913d30076eff ]---