random: sshd: uninitialized urandom read (32 bytes read, 100 bits of entropy available) random: sshd: uninitialized urandom read (32 bytes read, 105 bits of entropy available) random: sshd: uninitialized urandom read (32 bytes read, 113 bits of entropy available) ================================================================== BUG: KASAN: slab-out-of-bounds in list_empty include/linux/list.h:189 [inline] BUG: KASAN: slab-out-of-bounds in sg_remove_request+0xf9/0x110 drivers/scsi/sg.c:2120 Read of size 8 at addr ffff8800aa4b8140 by task syzkaller892621/3774 CPU: 1 PID: 3774 Comm: syzkaller892621 Not tainted 4.4.119-g855ea74 #27 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 0000000000000000 34c53bae84bb28c3 ffff8801d8fafab0 ffffffff81d0402d ffffea0002a92e00 ffff8800aa4b8140 0000000000000000 ffff8800aa4b8140 ffff8801d8eda338 ffff8801d8fafae8 ffffffff814fe103 ffff8800aa4b8140 Call Trace: [] __dump_stack lib/dump_stack.c:15 [inline] [] dump_stack+0xc1/0x124 lib/dump_stack.c:51 [] print_address_description+0x73/0x260 mm/kasan/report.c:252 [] kasan_report_error mm/kasan/report.c:351 [inline] [] kasan_report+0x285/0x370 mm/kasan/report.c:408 [] __asan_report_load8_noabort+0x14/0x20 mm/kasan/report.c:429 [] list_empty include/linux/list.h:189 [inline] [] sg_remove_request+0xf9/0x110 drivers/scsi/sg.c:2120 [] sg_finish_rem_req+0x295/0x340 drivers/scsi/sg.c:1837 [] sg_read+0xa1b/0x1490 drivers/scsi/sg.c:537 [] __vfs_read+0x103/0x440 fs/read_write.c:432 [] vfs_read+0x123/0x3a0 fs/read_write.c:454 [] SYSC_read fs/read_write.c:569 [inline] [] SyS_read+0xd9/0x1b0 fs/read_write.c:562 [] entry_SYSCALL_64_fastpath+0x1c/0x98 Allocated by task 0: (stack is not available) Freed by task 0: (stack is not available) The buggy address belongs to the object at ffff8800aa4b8100 which belongs to the cache fasync_cache of size 96 The buggy address is located 64 bytes inside of 96-byte region [ffff8800aa4b8100, ffff8800aa4b8160) The buggy address belongs to the page: kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory accessgeneral protection fault: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.4.119-g855ea74 #27 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffffffff84217840 task.stack: ffffffff84200000 RIP: 0010:[] [] lookup_object lib/debugobjects.c:120 [inline] RIP: 0010:[] [] debug_object_deactivate+0x1a6/0x3c0 lib/debugobjects.c:465 RSP: 0018:ffff8801db207d20 EFLAGS: 00010006 RAX: 0000000000000092 RBX: 00000000006ce018 RCX: ffff8801db219c40 RDX: 00000000000d9c06 RSI: ffffffff842c6460 RDI: 00000000006ce030 RBP: ffff8801db207de8 R08: 1ffff1003afa861f R09: ffffffff8512d750 R10: 0000000000000001 R11: 1ffff1003b640f6a R12: 1ffff1003b640fa8 R13: 0000000000049b2b R14: dffffc0000000000 R15: ffffffff8580af08 FS: 0000000000000000(0000) GS:ffff8801db200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000557b72b9c100 CR3: 00000001d9746000 CR4: 0000000000160670 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: 000000000000003d ffffffff842c6460 ffff8801db219c40 0000000000000092 0000000041b58ab3 ffffffff83fce929 ffffffff81d65e00 ffffffff84217840 fffffbfff0843021 ffff8801db219658 ffffffff84218110 0000000000000000 Call Trace: [] debug_hrtimer_deactivate kernel/time/hrtimer.c:415 [inline] [] debug_deactivate kernel/time/hrtimer.c:461 [inline] [] __run_hrtimer kernel/time/hrtimer.c:1224 [inline] [] __hrtimer_run_queues+0x492/0xfe0 kernel/time/hrtimer.c:1319 [] hrtimer_interrupt+0x1a6/0x440 kernel/time/hrtimer.c:1353 [] local_apic_timer_interrupt+0x6a/0xb0 arch/x86/kernel/apic/apic.c:901 [] smp_apic_timer_interrupt+0x76/0xa0 arch/x86/kernel/apic/apic.c:925 [] apic_timer_interrupt+0xa0/0xb0 arch/x86/entry/entry_64.S:737 [] arch_safe_halt arch/x86/include/asm/paravirt.h:117 [inline] [] default_idle+0x55/0x3c0 arch/x86/kernel/process.c:290 [] arch_cpu_idle+0xa/0x10 arch/x86/kernel/process.c:281 [] default_idle_call+0x48/0x70 kernel/sched/idle.c:93 [] cpuidle_idle_call kernel/sched/idle.c:157 [inline] [] cpu_idle_loop kernel/sched/idle.c:253 [inline] [] cpu_startup_entry+0x5fd/0x8f0 kernel/sched/idle.c:301 [] rest_init+0x189/0x190 init/main.c:410 [] start_kernel+0x6b9/0x6ee init/main.c:682 [] x86_64_start_reservations+0x2a/0x2c arch/x86/kernel/head64.c:196 [] x86_64_start_kernel+0x140/0x163 arch/x86/kernel/head64.c:185 Code: eb 1a 48 89 da 48 c1 ea 03 42 80 3c 32 00 0f 85 86 01 00 00 48 8b 1b 48 85 db 74 7a 48 8d 7b 18 41 83 c5 01 48 89 fa 48 c1 ea 03 <42> 80 3c 32 00 0f 85 3c 01 00 00 48 3b 4b 18 75 c6 48 8d 7b 10 RIP [] lookup_object lib/debugobjects.c:120 [inline] RIP [] debug_object_deactivate+0x1a6/0x3c0 lib/debugobjects.c:465 RSP ---[ end trace 188b2210feae301f ]---