[ 16.398312] random: sshd: uninitialized urandom read (32 bytes read, 32 bits of entropy available) [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 21.017856] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available) [ 21.473242] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available) [ 22.276185] random: sshd: uninitialized urandom read (32 bytes read, 95 bits of entropy available) [ 22.453352] random: sshd: uninitialized urandom read (32 bytes read, 101 bits of entropy available) Warning: Permanently added '10.128.0.34' (ECDSA) to the list of known hosts. [ 27.950802] random: sshd: uninitialized urandom read (32 bytes read, 110 bits of entropy available) executing program executing program [ 28.063411] [ 28.065053] ===================================== [ 28.069858] [ BUG: bad unlock balance detected! ] [ 28.074670] 4.4.107-g610c835 #12 Not tainted [ 28.079037] ------------------------------------- [ 28.083840] syzkaller507573/3318 is trying to release lock (mrt_lock) at: [ 28.090956] [] ipmr_mfc_seq_stop+0xe4/0x140 [ 28.096803] but there are no more locks to release! [ 28.101779] [ 28.101779] other info that might help us debug this: [ 28.108407] 1 lock held by syzkaller507573/3318: [ 28.113128] #0: (&p->lock){+.+.+.}, at: [] seq_read+0xdd/0x1270 [ 28.121706] [ 28.121706] stack backtrace: [ 28.126169] CPU: 0 PID: 3318 Comm: syzkaller507573 Not tainted 4.4.107-g610c835 #12 [ 28.133925] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 28.143243] 0000000000000000 2594681743681b92 ffff8800b47c7910 ffffffff81d0457d [ 28.151184] ffffffff8476ab98 ffff8800b5514740 ffffffff833c77d4 ffffffff8476ab98 [ 28.159138] ffff8800b5514f88 ffff8800b47c7940 ffffffff812301a4 dffffc0000000000 [ 28.167083] Call Trace: [ 28.169636] [] dump_stack+0xc1/0x124 [ 28.174965] [] ? ipmr_mfc_seq_stop+0xe4/0x140 [ 28.181082] [] print_unlock_imbalance_bug+0x174/0x1a0 [ 28.187882] [] lock_release+0x72a/0xc10 [ 28.193470] [] ? memcpy+0x45/0x50 [ 28.198539] [] ? ipmr_mfc_seq_stop+0xe4/0x140 [ 28.204649] [] _raw_read_unlock+0x1a/0x50 [ 28.210411] [] ipmr_mfc_seq_stop+0xe4/0x140 [ 28.216348] [] traverse+0x3a7/0x900 [ 28.221591] [] ? seq_buf_alloc+0x80/0x80 [ 28.227265] [] seq_read+0x7ea/0x1270 [ 28.232599] [] ? seq_lseek+0x3c0/0x3c0 [ 28.238099] [] ? do_futex+0x3e3/0x1670 [ 28.243606] [] ? fsnotify+0xee0/0xee0 [ 28.249021] [] ? proc_reg_write+0x170/0x170 [ 28.254954] [] ? seq_lseek+0x3c0/0x3c0 [ 28.260628] [] proc_reg_read+0xef/0x170 [ 28.266217] [] ? proc_reg_write+0x170/0x170 [ 28.272154] [] __vfs_read+0x103/0x440 [ 28.277572] [] ? vfs_iter_write+0x2d0/0x2d0 [ 28.283506] [] ? fsnotify+0x5ad/0xee0 [ 28.288918] [] ? fsnotify+0xee0/0xee0 [ 28.294336] [] ? avc_policy_seqno+0x9/0x20 [ 28.300183] [] ? selinux_file_permission+0x348/0x460 [ 28.306909] [] ? security_file_permission+0x89/0x1e0 executing program executing program [ 28.313632] [] ? rw_verify_area+0x100/0x2f0 [ 28.319568] [] vfs_read+0x123/0x3a0 [ 28.324813] [] SyS_pread64+0x13f/0x170 [ 28.330320] [] ? SyS_write+0x1b0/0x1b0 [ 28.335821] [] ? lockdep_sys_exit_thunk+0x12/0x14 [ 28.342283] [] entry_SYSCALL_64_fastpath+0x16/0x76