random: sshd: uninitialized urandom read (32 bytes read)
random: sshd: uninitialized urandom read (32 bytes read)
random: sshd: uninitialized urandom read (32 bytes read)
urandom_read: 1 callbacks suppressed
random: sshd: uninitialized urandom read (32 bytes read)
BUG: unable to handle kernel NULL pointer dereference at 0000000000000080
IP: [<ffffffff836c39cc>] l2tp_session_free+0x11c/0x200 net/l2tp/l2tp_core.c:1765
PGD 1c14ec067 [   23.004051] PUD 1c603c067 
Oops: 0002 [#1] PREEMPT SMP KASAN
Dumping ftrace buffer:
   (ftrace buffer empty)
Modules linked in:
CPU: 1 PID: 3790 Comm: syz-executor668 Not tainted 4.9.122-g54068d6 #26
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
task: ffff8801b8f6b000 task.stack: ffff8801b6030000
RIP: 0010:[<ffffffff836c39cc>]  [<ffffffff836c39cc>] l2tp_session_free+0x11c/0x200 net/l2tp/l2tp_core.c:1765
RSP: 0018:ffff8801b6037ca0  EFLAGS: 00010246
RAX: dffffc0000000000 RBX: ffff8801b6774280 RCX: 0000000000000000
RDX: 1ffff10036cee4d0 RSI: ffffffff836c39a1 RDI: ffff8801b6772680
RBP: ffff8801b6037cc0 R08: ffff8801b8f6b8e8 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000000 R12: ffff8801b6772500
R13: ffff8801b6774288 R14: 0000000000000000 R15: ffffffff83019be0
FS:  0000000000fbb880(0000) GS:ffff8801db300000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000000000080 CR3: 00000001b87fe000 CR4: 00000000001606f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Stack:
 ffff8801b7e1cc80 ffff8801b6774280 ffff8801b7e1d050 ffff8801b7e1cf58
 ffff8801b6037ce8 ffffffff836cb2b2 ffff8801b7e1d0c0 ffff8801b7e1cc80
 ffffffff836cb1e0 ffff8801b6037d20 ffffffff830270f5 ffff8801b7e1d0c0
Call Trace:
 [<ffffffff836cb2b2>] l2tp_session_dec_refcount_1 net/l2tp/l2tp_core.h:297 [inline]
 [<ffffffff836cb2b2>] pppol2tp_session_destruct+0xd2/0x110 net/l2tp/l2tp_ppp.c:460
 [<ffffffff830270f5>] __sk_destruct+0x55/0x590 net/core/sock.c:1428
 [<ffffffff8302eb83>] sk_destruct+0x63/0x80 net/core/sock.c:1463
 [<ffffffff8302ebef>] __sk_free+0x4f/0x220 net/core/sock.c:1471
 [<ffffffff8302edeb>] sk_free+0x2b/0x40 net/core/sock.c:1482
 [<ffffffff836ce5b9>] sock_put include/net/sock.h:1588 [inline]
 [<ffffffff836ce5b9>] pppol2tp_release+0x239/0x2e0 net/l2tp/l2tp_ppp.c:501
 [<ffffffff83019ab6>] sock_release+0x96/0x1c0 net/socket.c:600
 [<ffffffff83019bf6>] sock_close+0x16/0x20 net/socket.c:1047
 [<ffffffff8157bdd3>] __fput+0x263/0x700 fs/file_table.c:208
 [<ffffffff8157c2f5>] ____fput+0x15/0x20 fs/file_table.c:244
 [<ffffffff8119a62c>] task_work_run+0x10c/0x180 kernel/task_work.c:116
 [<ffffffff8100559c>] tracehook_notify_resume include/linux/tracehook.h:191 [inline]
 [<ffffffff8100559c>] exit_to_usermode_loop+0xfc/0x120 arch/x86/entry/common.c:161
 [<ffffffff810064d4>] prepare_exit_to_usermode arch/x86/entry/common.c:191 [inline]
 [<ffffffff810064d4>] syscall_return_slowpath arch/x86/entry/common.c:260 [inline]
 [<ffffffff810064d4>] do_syscall_64+0x364/0x490 arch/x86/entry/common.c:287
 [<ffffffff83a00cd3>] entry_SYSCALL_64_after_swapgs+0x5d/0xdb
Code: 49 8d bc 24 80 01 00 00 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 c6 00 00 00 4d 8b b4 24 80 01 00 00 <f0> 41 ff 8e 80 00 00 00 74 69 e8 95 d3 c9 fd 4c 89 ea 48 b8 00 
RIP  [<ffffffff836c39cc>] l2tp_session_free+0x11c/0x200 net/l2tp/l2tp_core.c:1765
 RSP <ffff8801b6037ca0>
CR2: 0000000000000080
---[ end trace 00ddf24243a0dcc8 ]---