random: sshd: uninitialized urandom read (32 bytes read) audit: type=1400 audit(1560197892.998:36): avc: denied { map } for pid=7204 comm="syz-executor598" path="/root/syz-executor598666960" dev="sda1" ino=1426 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 TCP: request_sock_TCPv6: Possible SYN flooding on port 20002. Sending cookies. Check SNMP counters. BUG: unable to handle kernel NULL pointer dereference at (null) IP: (null) PGD 7e4a8067 P4D 7e4a8067 PUD 96606067 PMD 0 Oops: 0010 [#1] PREEMPT SMP KASAN Modules linked in: CPU: 0 PID: 3146 Comm: kworker/0:2 Not tainted 4.14.124 #18 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: pencrypt padata_serial_worker task: ffff88809c3ca6c0 task.stack: ffff88809bc00000 RIP: 0010: (null) RSP: 0018:ffff88809bc07c80 EFLAGS: 00010246 RAX: dffffc0000000000 RBX: ffff88808055bc80 RCX: ffff88809bc07cf0 RDX: 1ffff110100ab792 RSI: 0000000000000000 RDI: ffff88808055bc80 RBP: ffff88809bc07c98 R08: ffff88809c3ca6c0 R09: 0000000000000002 R10: 0000000000000000 R11: ffff88809c3ca6c0 R12: ffff88809bc07d10 R13: ffff8880a694d41c R14: ffff88808055bcd8 R15: ffff88808055bcd0 FS: 0000000000000000(0000) GS:ffff8880aee00000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000000000000 CR3: 00000000a10d2000 CR4: 00000000001406f0 Call Trace: aead_request_complete include/crypto/internal/aead.h:75 [inline] pcrypt_aead_serial+0x7e/0xb0 crypto/pcrypt.c:123 padata_serial_worker+0x261/0x400 kernel/padata.c:307 process_one_work+0x863/0x1600 kernel/workqueue.c:2114 worker_thread+0x5d9/0x1050 kernel/workqueue.c:2248 kthread+0x319/0x430 kernel/kthread.c:232 ret_from_fork+0x24/0x30 arch/x86/entry/entry_64.S:404 Code: Bad RIP value. RIP: (null) RSP: ffff88809bc07c80 CR2: 0000000000000000 ---[ end trace 5d9f7b2e3912ca28 ]---