random: sshd: uninitialized urandom read (32 bytes read, 39 bits of entropy available) random: sshd: uninitialized urandom read (32 bytes read, 73 bits of entropy available) random: sshd: uninitialized urandom read (32 bytes read, 75 bits of entropy available) random: sshd: uninitialized urandom read (32 bytes read, 81 bits of entropy available) kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory accessgeneral protection fault: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 1 PID: 3841 Comm: syz-executor619 Not tainted 4.4.147-ga5fc665 #80 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8800aca8e000 task.stack: ffff8801d8d18000 RIP: 0010:[] [] __xfrm_policy_check2 include/net/xfrm.h:1070 [inline] RIP: 0010:[] [] xfrm_policy_check include/net/xfrm.h:1076 [inline] RIP: 0010:[] [] xfrm4_policy_check include/net/xfrm.h:1081 [inline] RIP: 0010:[] [] udp_queue_rcv_skb+0x18f/0x1580 net/ipv4/udp.c:1520 RSP: 0018:ffff8801d8d1f930 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: ffff8800bb2f0000 RCX: 1ffff1003b2f194b RDX: 000000000000000c RSI: ffffffff832d8ea6 RDI: 0000000000000060 RBP: ffff8801d8d1f970 R08: ffffffff853656b0 R09: 0000000000000001 R10: 0000000000000000 R11: ffff8800aca8e000 R12: ffff8801d978ca00 R13: 0000000000000001 R14: 0000000000000000 R15: ffff8801d978ca58 FS: 0000000001867880(0063) GS:ffff8801db300000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 000000002082dff0 CR3: 00000000b25b9000 CR4: 00000000001606f0 Stack: ffff8800bb2f0088 ffff880100000001 ffff8800bb2f0088 ffff8800bb2f0000 ffff8801d978ca00 dffffc0000000000 ffff8801d978ca58 0000000000000000 ffff8801d8d1f9e0 ffffffff82f30e0b ffff8800bb2f0430 ffff8800bb2f0188 Call Trace: [] sk_backlog_rcv include/net/sock.h:871 [inline] [] __release_sock net/core/sock.c:2023 [inline] [] release_sock+0x17b/0x500 net/core/sock.c:2473 [] udp_sendmsg+0x1152/0x1c70 net/ipv4/udp.c:1107 [] inet_sendmsg+0x203/0x4d0 net/ipv4/af_inet.c:755 [] sock_sendmsg_nosec net/socket.c:626 [inline] [] sock_sendmsg+0xcc/0x110 net/socket.c:636 [] SYSC_sendto+0x21c/0x370 net/socket.c:1666 [] SyS_sendto+0x40/0x50 net/socket.c:1634 [] entry_SYSCALL_64_fastpath+0x22/0x9e Code: 74 24 58 41 f6 c6 01 0f 85 ae 07 00 00 e8 1a a9 07 fe 49 83 e6 fe 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 60 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 01 0f 8e 2d 0e 00 00 41 f6 46 60 04 RIP [] __xfrm_policy_check2 include/net/xfrm.h:1070 [inline] RIP [] xfrm_policy_check include/net/xfrm.h:1076 [inline] RIP [] xfrm4_policy_check include/net/xfrm.h:1081 [inline] RIP [] udp_queue_rcv_skb+0x18f/0x1580 net/ipv4/udp.c:1520 RSP ---[ end trace a0c0a4552e0ecdc2 ]---