[ 16.343681] random: sshd: uninitialized urandom read (32 bytes read, 32 bits of entropy available) [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 21.975800] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available) [ 22.245828] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available) [ 23.006260] random: sshd: uninitialized urandom read (32 bytes read, 89 bits of entropy available) [ 36.578736] random: sshd: uninitialized urandom read (32 bytes read, 102 bits of entropy available) Warning: Permanently added '10.128.0.25' (ECDSA) to the list of known hosts. [ 41.982600] random: sshd: uninitialized urandom read (32 bytes read, 108 bits of entropy available) executing program executing program executing program [ 42.094729] [ 42.096374] ===================================== [ 42.101183] [ BUG: bad unlock balance detected! ] [ 42.105994] 4.4.107-g610c835 #12 Not tainted [ 42.110365] ------------------------------------- [ 42.115170] syzkaller520317/3322 is trying to release lock (mrt_lock) at: [ 42.122304] [] ipmr_mfc_seq_stop+0xe4/0x140 [ 42.128152] but there are no more locks to release! [ 42.133132] [ 42.133132] other info that might help us debug this: [ 42.139764] 1 lock held by syzkaller520317/3322: [ 42.144490] #0: (&p->lock){+.+.+.}, at: [] seq_read+0xdd/0x1270 [ 42.152817] [ 42.152817] stack backtrace: [ 42.157286] CPU: 0 PID: 3322 Comm: syzkaller520317 Not tainted 4.4.107-g610c835 #12 [ 42.165043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 42.174366] 0000000000000000 ed73fe0f5c099067 ffff8801d0f8f910 ffffffff81d0457d [ 42.182313] ffffffff8476ab98 ffff8800b4d2df00 ffffffff833c77d4 ffffffff8476ab98 [ 42.190266] ffff8800b4d2e748 ffff8801d0f8f940 ffffffff812301a4 dffffc0000000000 [ 42.198317] Call Trace: [ 42.200872] [] dump_stack+0xc1/0x124 [ 42.206199] [] ? ipmr_mfc_seq_stop+0xe4/0x140 [ 42.212312] [] print_unlock_imbalance_bug+0x174/0x1a0 [ 42.219116] [] lock_release+0x72a/0xc10 [ 42.224712] [] ? memcpy+0x45/0x50 [ 42.229782] [] ? ipmr_mfc_seq_stop+0xe4/0x140 [ 42.235893] [] _raw_read_unlock+0x1a/0x50 [ 42.241670] [] ipmr_mfc_seq_stop+0xe4/0x140 [ 42.247610] [] traverse+0x3a7/0x900 [ 42.252853] [] ? seq_buf_alloc+0x80/0x80 [ 42.258539] [] seq_read+0x7ea/0x1270 [ 42.263867] [] ? seq_lseek+0x3c0/0x3c0 [ 42.269372] [] ? do_futex+0x3e3/0x1670 [ 42.274877] [] ? avc_has_perm_noaudit+0x460/0x460 [ 42.281334] [] ? seq_lseek+0x3c0/0x3c0 [ 42.286842] [] proc_reg_read+0xef/0x170 [ 42.292432] [] ? proc_reg_write+0x170/0x170 [ 42.298373] [] __vfs_read+0x103/0x440 [ 42.303791] [] ? vfs_iter_write+0x2d0/0x2d0 [ 42.309733] [] ? fsnotify+0x5ad/0xee0 [ 42.315151] [] ? fsnotify+0xee0/0xee0 [ 42.320573] [] ? avc_policy_seqno+0x9/0x20 [ 42.326426] [] ? selinux_file_permission+0x348/0x460 [ 42.333150] [] ? security_file_permission+0x89/0x1e0 [ 42.339873] [] ? rw_verify_area+0x100/0x2f0 executing program [ 42.345811] [] vfs_read+0x123/0x3a0 [ 42.351061] [] SyS_pread64+0x13f/0x170 [ 42.356564] [] ? SyS_write+0x1b0/0x1b0 [ 42.362069] [] ? lockdep_sys_exit_thunk+0x12/0x14 [ 42.368531] [] entry_SYSCALL_64_fastpath+0x16/0x76 executing program executing program