[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 16.921894] random: sshd: uninitialized urandom read (32 bytes read, 33 bits of entropy available) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 21.453064] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available) [ 21.832834] random: sshd: uninitialized urandom read (32 bytes read, 38 bits of entropy available) [ 22.665753] random: sshd: uninitialized urandom read (32 bytes read, 101 bits of entropy available) [ 25.058757] random: sshd: uninitialized urandom read (32 bytes read, 107 bits of entropy available) Warning: Permanently added '10.128.0.48' (ECDSA) to the list of known hosts. [ 30.455227] random: sshd: uninitialized urandom read (32 bytes read, 116 bits of entropy available) executing program executing program [ 30.573327] [ 30.574978] ===================================== [ 30.579782] [ BUG: bad unlock balance detected! ] [ 30.584586] 4.4.107-g610c835 #4 Not tainted [ 30.588868] ------------------------------------- [ 30.593672] syzkaller046272/3344 is trying to release lock (mrt_lock) at: [ 30.600789] [] ipmr_mfc_seq_stop+0xe4/0x140 [ 30.606634] but there are no more locks to release! [ 30.611616] [ 30.611616] other info that might help us debug this: [ 30.618274] 1 lock held by syzkaller046272/3344: [ 30.622990] #0: (&p->lock){+.+.+.}, at: [] seq_read+0xdd/0x1270 [ 30.631321] [ 30.631321] stack backtrace: [ 30.635788] CPU: 0 PID: 3344 Comm: syzkaller046272 Not tainted 4.4.107-g610c835 #4 [ 30.643458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 30.652778] 0000000000000000 72e8baffa2c5fd40 ffff8801d02af860 ffffffff81d0457d [ 30.660716] ffffffff8476ab98 ffff8801d27a8000 ffffffff833c77d4 ffffffff8476ab98 [ 30.668658] ffff8801d27a8848 ffff8801d02af890 ffffffff812301a4 dffffc0000000000 [ 30.676602] Call Trace: [ 30.679158] [] dump_stack+0xc1/0x124 [ 30.684485] [] ? ipmr_mfc_seq_stop+0xe4/0x140 [ 30.690595] [] print_unlock_imbalance_bug+0x174/0x1a0 [ 30.697417] [] lock_release+0x72a/0xc10 [ 30.703005] [] ? memcpy+0x45/0x50 [ 30.708072] [] ? ipmr_mfc_seq_stop+0xe4/0x140 [ 30.714188] [] _raw_read_unlock+0x1a/0x50 [ 30.719951] [] ipmr_mfc_seq_stop+0xe4/0x140 [ 30.725884] [] traverse+0x3a7/0x900 [ 30.731127] [] ? seq_buf_alloc+0x80/0x80 [ 30.736803] [] seq_read+0x7ea/0x1270 [ 30.742130] [] ? seq_lseek+0x3c0/0x3c0 [ 30.747636] [] ? seq_lseek+0x3c0/0x3c0 [ 30.753138] [] proc_reg_read+0xef/0x170 [ 30.758723] [] ? proc_reg_write+0x170/0x170 [ 30.764656] [] __vfs_read+0x103/0x440 [ 30.770068] [] ? vfs_iter_write+0x2d0/0x2d0 [ 30.776006] [] ? fsnotify+0x5ad/0xee0 [ 30.781419] [] ? fsnotify+0xee0/0xee0 [ 30.786840] [] ? avc_policy_seqno+0x9/0x20 [ 30.792690] [] ? selinux_file_permission+0x348/0x460 [ 30.799405] [] ? security_file_permission+0x89/0x1e0 [ 30.806121] [] ? rw_verify_area+0x100/0x2f0 [ 30.812055] [] vfs_read+0x123/0x3a0 [ 30.817296] [] SyS_pread64+0x13f/0x170 executing program executing program [ 30.822801] [] ? SyS_write+0x1b0/0x1b0 [ 30.828308] [] sys32_pread+0x39/0x50 [ 30.833637] [] ? sys32_waitpid+0x30/0x30 [ 30.839313] [] do_fast_syscall_32+0x314/0x890 [ 30.845425] [] sysenter_flags_fixed+0xd/0x17