random: sshd: uninitialized urandom read (32 bytes read)
random: sshd: uninitialized urandom read (32 bytes read)
random: sshd: uninitialized urandom read (32 bytes read)
random: sshd: uninitialized urandom read (32 bytes read)
random: sshd: uninitialized urandom read (32 bytes read)
BUG: unable to handle kernel NULL pointer dereference at 0000000000000080
IP: [<ffffffff836c29cc>] l2tp_session_free+0x11c/0x200 net/l2tp/l2tp_core.c:1765
PGD 1c83c9067 [   26.983144] PUD 1c7118067 
Oops: 0002 [#1] PREEMPT SMP KASAN
Dumping ftrace buffer:
   (ftrace buffer empty)
Modules linked in:
CPU: 1 PID: 3795 Comm: syz-executor192 Not tainted 4.9.121-g681e57b #25
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8801b8b61800 task.stack: ffff8801d9b80000
RIP: 0010:[<ffffffff836c29cc>]  [<ffffffff836c29cc>] l2tp_session_free+0x11c/0x200 net/l2tp/l2tp_core.c:1765
RSP: 0018:ffff8801d9b87ca0  EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff8801b73d2f00 RCX: 0000000000000000
RDX: 1ffff10036db6e60 RSI: ffffffff836c29a1 RDI: ffff8801b6db7300
RBP: ffff8801d9b87cc0 R08: ffff8801b8b620e8 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801b6db7180
R13: ffff8801b73d2f08 R14: 0000000000000000 R15: ffffffff83018be0
FS:  0000000000edb880(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000080 CR3: 00000001ca80f000 CR4: 00000000001606f0
Stack:
 ffff8801b69f5500 ffff8801b73d2f00 ffff8801b69f58d0 ffff8801b69f57d8
 ffff8801d9b87ce8 ffffffff836ca2b2 ffff8801b69f5940 ffff8801b69f5500
 ffffffff836ca1e0 ffff8801d9b87d20 ffffffff830260f5 ffff8801b69f5940
Call Trace:
 [<ffffffff836ca2b2>] l2tp_session_dec_refcount_1 net/l2tp/l2tp_core.h:297 [inline]
 [<ffffffff836ca2b2>] pppol2tp_session_destruct+0xd2/0x110 net/l2tp/l2tp_ppp.c:460
 [<ffffffff830260f5>] __sk_destruct+0x55/0x590 net/core/sock.c:1428
 [<ffffffff8302db83>] sk_destruct+0x63/0x80 net/core/sock.c:1463
 [<ffffffff8302dbef>] __sk_free+0x4f/0x220 net/core/sock.c:1471
 [<ffffffff8302ddeb>] sk_free+0x2b/0x40 net/core/sock.c:1482
 [<ffffffff836cd5b9>] sock_put include/net/sock.h:1588 [inline]
 [<ffffffff836cd5b9>] pppol2tp_release+0x239/0x2e0 net/l2tp/l2tp_ppp.c:501
 [<ffffffff83018ab6>] sock_release+0x96/0x1c0 net/socket.c:600
 [<ffffffff83018bf6>] sock_close+0x16/0x20 net/socket.c:1047
 [<ffffffff8157b403>] __fput+0x263/0x700 fs/file_table.c:208
 [<ffffffff8157b925>] ____fput+0x15/0x20 fs/file_table.c:244
 [<ffffffff8119a1fc>] task_work_run+0x10c/0x180 kernel/task_work.c:116
 [<ffffffff8100559c>] tracehook_notify_resume include/linux/tracehook.h:191 [inline]
 [<ffffffff8100559c>] exit_to_usermode_loop+0xfc/0x120 arch/x86/entry/common.c:161
 [<ffffffff810064d4>] prepare_exit_to_usermode arch/x86/entry/common.c:191 [inline]
 [<ffffffff810064d4>] syscall_return_slowpath arch/x86/entry/common.c:260 [inline]
 [<ffffffff810064d4>] do_syscall_64+0x364/0x490 arch/x86/entry/common.c:287
 [<ffffffff839ffcd3>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb
Code: 49 8d bc 24 80 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 c6 00 00 00 4d 8b b4 24 80 01 00 00 <f0> 41 ff 8e 80 00 00 00 74 69 e8 65 df c9 fd 4c 89 ea 48 b8 00 
RIP  [<ffffffff836c29cc>] l2tp_session_free+0x11c/0x200 net/l2tp/l2tp_core.c:1765
 RSP <ffff8801d9b87ca0>
CR2: 0000000000000080
---[ end trace ef3c974708841a12 ]---