random: sshd: uninitialized urandom read (32 bytes read) audit: type=1400 audit(1536347540.349:7): avc: denied { map } for pid=1782 comm="syz-executor426" path="/root/syz-executor426315913" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 audit: type=1400 audit(1536347540.599:8): avc: denied { map } for pid=1783 comm="syz-executor426" path="/dev/ashmem" dev="devtmpfs" ino=1428 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:device_t:s0 tclass=chr_file permissive=1 ====================================================== WARNING: possible circular locking dependency detected 4.14.68+ #4 Not tainted ------------------------------------------------------