[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 16.107177] random: sshd: uninitialized urandom read (32 bytes read, 32 bits of entropy available) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 21.211818] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available) [ 21.577866] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available) [ 22.395112] random: sshd: uninitialized urandom read (32 bytes read, 98 bits of entropy available) [ 22.573805] random: sshd: uninitialized urandom read (32 bytes read, 104 bits of entropy available) Warning: Permanently added '10.128.15.231' (ECDSA) to the list of known hosts. [ 27.971877] random: sshd: uninitialized urandom read (32 bytes read, 112 bits of entropy available) executing program executing program [ 28.075547] [ 28.077182] ===================================== [ 28.081996] [ BUG: bad unlock balance detected! ] [ 28.086808] 4.4.107-g610c835 #12 Not tainted [ 28.091185] ------------------------------------- [ 28.095992] syzkaller557605/3317 is trying to release lock (mrt_lock) at: [ 28.103112] [] ipmr_mfc_seq_stop+0xe4/0x140 [ 28.108960] but there are no more locks to release! [ 28.113942] [ 28.113942] other info that might help us debug this: [ 28.120575] 1 lock held by syzkaller557605/3317: [ 28.125295] #0: (&p->lock){+.+.+.}, at: [] seq_read+0xdd/0x1270 [ 28.133631] [ 28.133631] stack backtrace: [ 28.138095] CPU: 1 PID: 3317 Comm: syzkaller557605 Not tainted 4.4.107-g610c835 #12 [ 28.145855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 28.155188] 0000000000000000 247e9464362ba762 ffff8801d01c7910 ffffffff81d0457d [ 28.163320] ffffffff8476ab98 ffff8800b493af80 ffffffff833c77d4 ffffffff8476ab98 [ 28.171265] ffff8800b493b7c8 ffff8801d01c7940 ffffffff812301a4 dffffc0000000000 [ 28.179231] Call Trace: [ 28.181788] [] dump_stack+0xc1/0x124 [ 28.187128] [] ? ipmr_mfc_seq_stop+0xe4/0x140 [ 28.193586] [] print_unlock_imbalance_bug+0x174/0x1a0 [ 28.200393] [] lock_release+0x72a/0xc10 [ 28.205991] [] ? memcpy+0x45/0x50 [ 28.211058] [] ? ipmr_mfc_seq_stop+0xe4/0x140 [ 28.217182] [] _raw_read_unlock+0x1a/0x50 [ 28.222944] [] ipmr_mfc_seq_stop+0xe4/0x140 [ 28.228889] [] traverse+0x3a7/0x900 [ 28.234134] [] ? seq_buf_alloc+0x80/0x80 [ 28.239810] [] seq_read+0x7ea/0x1270 [ 28.245413] [] ? seq_lseek+0x3c0/0x3c0 [ 28.250923] [] ? do_futex+0x3e3/0x1670 [ 28.256439] [] ? __vma_link_rb+0x20e/0x310 [ 28.262290] [] ? __vma_link_file+0x10c/0x160 [ 28.268315] [] ? seq_lseek+0x3c0/0x3c0 [ 28.273824] [] proc_reg_read+0xef/0x170 [ 28.279413] [] ? proc_reg_write+0x170/0x170 [ 28.285364] [] __vfs_read+0x103/0x440 [ 28.290781] [] ? vfs_iter_write+0x2d0/0x2d0 [ 28.296717] [] ? fsnotify+0x5ad/0xee0 [ 28.302132] [] ? fsnotify+0xee0/0xee0 [ 28.307564] [] ? avc_policy_seqno+0x9/0x20 [ 28.313419] [] ? selinux_file_permission+0x348/0x460 executing program [ 28.320142] [] ? security_file_permission+0x89/0x1e0 [ 28.326872] [] ? rw_verify_area+0x100/0x2f0 [ 28.332809] [] vfs_read+0x123/0x3a0 [ 28.338056] [] SyS_pread64+0x13f/0x170 [ 28.343566] [] ? SyS_write+0x1b0/0x1b0 [ 28.349071] [] ? lockdep_sys_exit_thunk+0x12/0x14 [ 28.355533] [] entry_SYSCALL_64_fastpath+0x16/0x76