random: sshd: uninitialized urandom read (32 bytes read) random: crng init done kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory access general protection fault: 0000 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 1 PID: 2078 Comm: syz-executor176 Not tainted 4.9.141+ #23 task: ffff8801cf3e8000 task.stack: ffff8801ce200000 RIP: 0010:[] [] do_tcp_sendpages net/ipv4/tcp.c:924 [inline] RIP: 0010:[] [] tcp_sendpage+0x35d/0x1910 net/ipv4/tcp.c:1033 RSP: 0018:ffff8801ce207920 EFLAGS: 00010206 RAX: 000000000000000f RBX: 0000000000000000 RCX: 1ffff1003a04c2eb RDX: 0000000000000000 RSI: ffffffff824e0eab RDI: 0000000000000078 RBP: ffff8801ce207a88 R08: ffff8801cf3e88b0 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000000 R12: 000000000000fd58 R13: ffff8801cb486640 R14: ffff8801d0261500 R15: dffffc0000000000 FS: 0000000000000000(0000) GS:ffff8801db700000(0063) knlGS:00000000f7736b40 CS: 0010 DS: 002b ES: 002b CR0: 0000000080050033 CR2: 00000000f7715db0 CR3: 00000001cb0c7000 CR4: 00000000001606b0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffff8801ce207930 ffffffff81243c87 0000000000000246 ffff8801cf3e8000 ffffffff830cc2e0 fffffbfff067d37c 0000000000000000 ffff8801cf3e88b0 ffffed0039e7d115 0000000000000000 ffff8801d02618e8 ffff8801ce2079e0 Call Trace: [] inet_sendpage+0x221/0x510 net/ipv4/af_inet.c:787 [] kernel_sendpage+0x93/0xf0 net/socket.c:3334 [] sock_sendpage+0x8c/0xc0 net/socket.c:802 [] pipe_to_sendpage+0x266/0x330 fs/splice.c:470 [] splice_from_pipe_feed fs/splice.c:521 [inline] [] __splice_from_pipe+0x316/0x710 fs/splice.c:645 [] splice_from_pipe+0xf9/0x170 fs/splice.c:680 [] generic_splice_sendpage+0x3c/0x50 fs/splice.c:851 [] do_splice_from fs/splice.c:870 [inline] [] do_splice fs/splice.c:1166 [inline] [] SYSC_splice fs/splice.c:1416 [inline] [] SyS_splice+0xe4d/0x14d0 fs/splice.c:1399 [] do_syscall_32_irqs_on arch/x86/entry/common.c:328 [inline] [] do_fast_syscall_32+0x2f1/0xa10 arch/x86/entry/common.c:390 [] entry_SYSENTER_compat+0x90/0xa2 arch/x86/entry/entry_64_compat.S:137 Code: ff ff 48 0f 44 d8 e8 c3 ab e3 fe 4d 85 e4 0f 84 f0 04 00 00 e8 b5 ab e3 fe 48 8d 7b 78 44 8b a5 58 ff ff ff 48 89 f8 48 c1 e8 03 <42> 0f b6 04 38 84 c0 74 08 3c 03 0f 8e 06 11 00 00 44 2b 63 78 RIP [] do_tcp_sendpages net/ipv4/tcp.c:924 [inline] RIP [] tcp_sendpage+0x35d/0x1910 net/ipv4/tcp.c:1033 RSP ---[ end trace a3f20260a3e526d8 ]---