[ 15.936858] random: sshd: uninitialized urandom read (32 bytes read, 32 bits of entropy available) [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 20.645923] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available) [ 20.946297] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available) [ 21.701841] random: sshd: uninitialized urandom read (32 bytes read, 89 bits of entropy available) [ 33.175197] random: sshd: uninitialized urandom read (32 bytes read, 100 bits of entropy available) Warning: Permanently added '10.128.15.227' (ECDSA) to the list of known hosts. [ 38.544516] random: sshd: uninitialized urandom read (32 bytes read, 104 bits of entropy available) executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program executing program [ 39.482973] [ 39.484622] ===================================== [ 39.489428] [ BUG: bad unlock balance detected! ] [ 39.494254] 4.4.107-g610c835 #4 Not tainted [ 39.498575] ------------------------------------- [ 39.503382] syzkaller711920/3642 is trying to release lock (mrt_lock) at: [ 39.510508] [] ipmr_mfc_seq_stop+0xe4/0x140 [ 39.516358] but there are no more locks to release! [ 39.521335] [ 39.521335] other info that might help us debug this: [ 39.527966] 1 lock held by syzkaller711920/3642: [ 39.532685] #0: (&p->lock){+.+.+.}, at: [] seq_read+0xdd/0x1270 [ 39.541014] [ 39.541014] stack backtrace: [ 39.545481] CPU: 1 PID: 3642 Comm: syzkaller711920 Not tainted 4.4.107-g610c835 #4 [ 39.553157] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 39.562477] 0000000000000000 87ce8978ebf6b07c ffff8801cf807860 ffffffff81d0457d [ 39.570428] ffffffff8476ab98 ffff8801d0768000 ffffffff833c77d4 ffffffff8476ab98 [ 39.578384] ffff8801d0768848 ffff8801cf807890 ffffffff812301a4 dffffc0000000000 [ 39.586343] Call Trace: [ 39.588901] [] dump_stack+0xc1/0x124 [ 39.594233] [] ? ipmr_mfc_seq_stop+0xe4/0x140 [ 39.600345] [] print_unlock_imbalance_bug+0x174/0x1a0 [ 39.607151] [] lock_release+0x72a/0xc10 [ 39.612749] [] ? memcpy+0x45/0x50 [ 39.617817] [] ? ipmr_mfc_seq_stop+0xe4/0x140 [ 39.623931] [] _raw_read_unlock+0x1a/0x50 [ 39.629692] [] ipmr_mfc_seq_stop+0xe4/0x140 [ 39.635633] [] traverse+0x3a7/0x900 [ 39.640876] [] ? seq_buf_alloc+0x80/0x80 [ 39.646554] [] seq_read+0x7ea/0x1270 [ 39.651885] [] ? seq_lseek+0x3c0/0x3c0 [ 39.657387] [] ? seq_lseek+0x3c0/0x3c0 [ 39.662892] [] proc_reg_read+0xef/0x170 [ 39.668481] [] ? proc_reg_write+0x170/0x170 [ 39.674422] [] __vfs_read+0x103/0x440 [ 39.679836] [] ? vfs_iter_write+0x2d0/0x2d0 [ 39.685775] [] ? fsnotify+0x5ad/0xee0 [ 39.691189] [] ? fsnotify+0xee0/0xee0 [ 39.696610] [] ? avc_policy_seqno+0x9/0x20 [ 39.702462] [] ? selinux_file_permission+0x348/0x460 [ 39.709179] [] ? security_file_permission+0x89/0x1e0 [ 39.715916] [] ? rw_verify_area+0x100/0x2f0 [ 39.721863] [] vfs_read+0x123/0x3a0 [ 39.727110] [] SyS_pread64+0x13f/0x170 [ 39.732614] [] ? SyS_write+0x1b0/0x1b0 [ 39.738128] [] sys32_pread+0x39/0x50 [ 39.743469] [] ? sys32_waitpid+0x30/0x30 [ 39.749153] [] do_fast_syscall_32+0x314/0x890 [ 39.755268] [] sysenter_flags_fixed+0xd/0x17