random: sshd: uninitialized urandom read (32 bytes read, 54 bits of entropy available) random: sshd: uninitialized urandom read (32 bytes read, 58 bits of entropy available) random: sshd: uninitialized urandom read (32 bytes read, 64 bits of entropy available) kasan: CONFIG_KASAN_INLINE enabled kasan: GPF could be caused by NULL-ptr deref or user memory accessgeneral protection fault: 0000 [#1] PREEMPT SMP KASAN Dumping ftrace buffer: (ftrace buffer empty) Modules linked in: CPU: 0 PID: 3848 Comm: syz-executor995 Not tainted 4.4.145-g2241aa9 #78 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 task: ffff8800bb874800 task.stack: ffff8801d8de0000 RIP: 0010:[] [] __xfrm_policy_check2 include/net/xfrm.h:1070 [inline] RIP: 0010:[] [] xfrm_policy_check include/net/xfrm.h:1076 [inline] RIP: 0010:[] [] xfrm4_policy_check include/net/xfrm.h:1081 [inline] RIP: 0010:[] [] udp_queue_rcv_skb+0x18f/0x1580 net/ipv4/udp.c:1520 RSP: 0018:ffff8801d8de7930 EFLAGS: 00010206 RAX: dffffc0000000000 RBX: ffff8801d9780000 RCX: 1ffff1003995bd4b RDX: 000000000000000c RSI: ffffffff832d86d6 RDI: 0000000000000060 RBP: ffff8801d8de7970 R08: ffffffff85334870 R09: 0000000000000001 R10: 0000000000000000 R11: ffff8800bb874800 R12: ffff8801ccadea00 R13: 0000000000000001 R14: 0000000000000000 R15: ffff8801ccadea58 FS: 0000000001a28880(0063) GS:ffff8801db200000(0000) knlGS:0000000000000000 CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 CR2: 0000000020000000 CR3: 00000001ca7d1000 CR4: 00000000001606f0 DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 Stack: ffff8801d9780088 ffff880100000001 ffff8801d9780088 ffff8801d9780000 ffff8801ccadea00 dffffc0000000000 ffff8801ccadea58 0000000000000000 ffff8801d8de79e0 ffffffff82f302fb ffff8801d9780430 ffff8801d9780188 Call Trace: [] sk_backlog_rcv include/net/sock.h:871 [inline] [] __release_sock net/core/sock.c:2023 [inline] [] release_sock+0x17b/0x500 net/core/sock.c:2473 [] udp_sendmsg+0x1152/0x1c70 net/ipv4/udp.c:1107 [] inet_sendmsg+0x203/0x4d0 net/ipv4/af_inet.c:755 [] sock_sendmsg_nosec net/socket.c:625 [inline] [] sock_sendmsg+0xcc/0x110 net/socket.c:635 [] SYSC_sendto+0x21c/0x370 net/socket.c:1665 [] SyS_sendto+0x40/0x50 net/socket.c:1633 [] entry_SYSCALL_64_fastpath+0x22/0x9e Code: 74 24 58 41 f6 c6 01 0f 85 ae 07 00 00 e8 9a b0 07 fe 49 83 e6 fe 48 b8 00 00 00 00 00 fc ff df 49 8d 7e 60 48 89 fa 48 c1 ea 03 <0f> b6 04 02 84 c0 74 08 3c 01 0f 8e 2d 0e 00 00 41 f6 46 60 04 RIP [] __xfrm_policy_check2 include/net/xfrm.h:1070 [inline] RIP [] xfrm_policy_check include/net/xfrm.h:1076 [inline] RIP [] xfrm4_policy_check include/net/xfrm.h:1081 [inline] RIP [] udp_queue_rcv_skb+0x18f/0x1580 net/ipv4/udp.c:1520 RSP ---[ end trace ba6458ed68412090 ]---