Warning: Permanently added '10.128.0.3' (ECDSA) to the list of known hosts. [ 41.653585] random: sshd: uninitialized urandom read (32 bytes read) executing program [ 41.774971] audit: type=1400 audit(1555897347.428:36): avc: denied { map } for pid=6957 comm="syz-executor556" path="/root/syz-executor556946847" dev="sda1" ino=16483 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 [ 41.805954] FAULT_INJECTION: forcing a failure. [ 41.805954] name failslab, interval 1, probability 0, space 0, times 1 [ 41.818161] CPU: 0 PID: 6957 Comm: syz-executor556 Not tainted 4.14.113 #3 [ 41.825962] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.829727] kasan: CONFIG_KASAN_INLINE enabled [ 41.835575] Call Trace: [ 41.835601] dump_stack+0x138/0x19c [ 41.835614] should_fail.cold+0x10f/0x159 [ 41.835628] should_failslab+0xdb/0x130 [ 41.835638] kmem_cache_alloc_node+0x56/0x780 [ 41.835649] ? lock_acquire+0x16f/0x430 [ 41.835662] __alloc_skb+0x9c/0x500 [ 41.835670] ? skb_scrub_packet+0x4b0/0x4b0 [ 41.835685] ll_recv+0x3d5/0x1010 [ 41.840500] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 41.842917] hci_uart_tty_receive+0x1fa/0x4d0 [ 41.846518] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 41.850881] ? ldsem_down_read+0x33/0x40 [ 41.854823] Modules linked in: [ 41.859312] ? hci_uart_write_work+0x6c0/0x6c0 [ 41.866862] tty_ioctl+0xe0e/0x1340 [ 41.871162] CPU: 1 PID: 22 Comm: kworker/u4:1 Not tainted 4.14.113 #3 [ 41.874598] ? get_pid_task+0xbf/0x140 [ 41.881926] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 41.886502] ? tty_vhangup+0x30/0x30 [ 41.892713] Workqueue: events_unbound flush_to_ldisc [ 41.896877] ? __might_sleep+0x93/0xb0 [ 41.904619] ? tty_vhangup+0x30/0x30 [ 41.908230] task: ffff8880a9e425c0 task.stack: ffff8880a9e48000 [ 41.914789] do_vfs_ioctl+0x7b9/0x1070 [ 41.918676] RIP: 0010:skb_put+0x31/0x1c0 [ 41.928637] ? selinux_file_mprotect+0x5d0/0x5d0 [ 41.932426] RSP: 0018:ffff8880a9e4fb48 EFLAGS: 00010202 [ 41.937513] ? ioctl_preallocate+0x1c0/0x1c0 [ 41.945435] ? vfs_write+0x104/0x500 [ 41.951462] RAX: dffffc0000000000 RBX: ffff8880a63571c0 RCX: ffff888096b4c540 [ 41.955327] ? security_file_ioctl+0x83/0xc0 [ 41.959361] RDX: 0000000000000019 RSI: 0000000000000004 RDI: 0000000000000000 [ 41.964209] ? security_file_ioctl+0x8f/0xc0 [ 41.969722] RBP: ffff8880a9e4fb70 R08: 0000000000000001 R09: ffff8880a9e4f948 [ 41.974111] SyS_ioctl+0x8f/0xc0 [ 41.977794] R10: 0000000000000006 R11: ffff8880a9e425c0 R12: 0000000000000000 [ 41.985047] ? do_vfs_ioctl+0x1070/0x1070 [ 41.989447] R13: 0000000000000004 R14: ffff8880867c4960 R15: 00000000000000c8 [ 41.996700] do_syscall_64+0x1eb/0x630 [ 42.001181] FS: 0000000000000000(0000) GS:ffff8880aef00000(0000) knlGS:0000000000000000 [ 42.008517] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 42.011863] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 42.019137] entry_SYSCALL_64_after_hwframe+0x42/0xb7 [ 42.024121] CR2: 00007f31b5984000 CR3: 0000000093e7a000 CR4: 00000000001406e0 [ 42.031371] RIP: 0033:0x440509 [ 42.035244] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 42.043703] RSP: 002b:00007ffd3a920788 EFLAGS: 00000246 [ 42.048529] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 42.048534] Call Trace: [ 42.054392] ORIG_RAX: 0000000000000010 [ 42.059564] ll_recv+0x507/0x1010 [ 42.066819] RAX: ffffffffffffffda RBX: 00007ffd3a920790 RCX: 0000000000440509 [ 42.070012] hci_uart_tty_receive+0x1fa/0x4d0 [ 42.077357] RDX: 0000000020000100 RSI: 0000000000005412 RDI: 0000000000000003 [ 42.082787] ? hci_uart_write_work+0x6c0/0x6c0 [ 42.090028] RBP: 0000000000000004 R08: 0000000000000001 R09: 00007ffd3a920031 [ 42.090033] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000401df0 [ 42.092596] tty_ldisc_receive_buf+0x151/0x1a0 [ 42.096543] R13: 0000000000401e80 R14: 0000000000000000 R15: 0000000000000000 [ 42.099972] tty_port_default_receive_buf+0x73/0xa0 [ 42.107780] Bluetooth: Can't allocate mem for new packet [ 42.111806] flush_to_ldisc+0x1f2/0x400 [ 42.111818] process_one_work+0x868/0x1610 [ 42.111826] ? pwq_dec_nr_in_flight+0x2e0/0x2e0 [ 42.111836] worker_thread+0x5d9/0x1050 [ 42.177669] kthread+0x31c/0x430 [ 42.181021] ? process_one_work+0x1610/0x1610 [ 42.185593] ? kthread_create_on_node+0xd0/0xd0 [ 42.190253] ret_from_fork+0x3a/0x50 [ 42.193944] Code: 41 56 41 55 41 89 f5 41 54 49 89 fc 4d 8d bc 24 c8 00 00 00 53 e8 60 1a 8e fc 4c 89 fa 48 b8 00 00 00 00 00 fc ff df 48 c1 ea 03 <0f> b6 14 02 4c 89 f8 83 e0 07 83 c0 03 38 d0 7c 08 84 d2 0f 85 [ 42.213573] RIP: skb_put+0x31/0x1c0 RSP: ffff8880a9e4fb48 [ 42.219882] ---[ end trace bd17fa81b08f095b ]--- [ 42.225023] Kernel panic - not syncing: Fatal exception [ 42.232052] Kernel Offset: disabled [ 42.235787] Rebooting in 86400 seconds..