[ 13.253977] random: sshd: uninitialized urandom read (32 bytes read, 31 bits of entropy available) [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c. [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[1G[[32m ok [39;49m8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 36.987096] random: sshd: uninitialized urandom read (32 bytes read, 41 bits of entropy available) [ 37.404833] random: sshd: uninitialized urandom read (32 bytes read, 41 bits of entropy available) [ 37.992011] random: sshd: uninitialized urandom read (32 bytes read, 112 bits of entropy available) [ 38.126828] random: sshd: uninitialized urandom read (32 bytes read, 117 bits of entropy available) Warning: Permanently added 'ci-android-44-kasan-gce-2,10.128.0.22' (ECDSA) to the list of known hosts. [ 43.615130] random: sshd: uninitialized urandom read (32 bytes read, 123 bits of entropy available) executing program [ 43.769408] [ 43.771074] ===================================== [ 43.775876] [ BUG: bad unlock balance detected! ] [ 43.780680] 4.4.104-ged884eb #2 Not tainted [ 43.784959] ------------------------------------- [ 43.789761] syzkaller823721/3340 is trying to release lock (mrt_lock) at: [ 43.796882] [<ffffffff8338bdc0>] ipmr_mfc_seq_stop+0xd0/0x110 [ 43.802726] but there are no more locks to release! [ 43.807701] [ 43.807701] other info that might help us debug this: [ 43.814326] 1 lock held by syzkaller823721/3340: [ 43.819041] #0: (&p->lock){+.+.+.}, at: [<ffffffff81564285>] seq_read+0xd5/0x1270 [ 43.827372] [ 43.827372] stack backtrace: [ 43.831831] CPU: 0 PID: 3340 Comm: syzkaller823721 Not tainted 4.4.104-ged884eb #2 [ 43.839499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 43.848818] 0000000000000000 94ea5097a8d8878e ffff8801d616f940 ffffffff81cc9b0f [ 43.856764] ffffffff84769898 ffff8800b95edf00 ffff8801d616f970 ffffffff81226a84 [ 43.864711] dffffc0000000000 ffffffff84769898 00000000ffffffff ffff8800b95ee770 [ 43.872656] Call Trace: [ 43.875210] [<ffffffff81cc9b0f>] dump_stack+0x8e/0xcf [ 43.880455] [<ffffffff81226a84>] print_unlock_imbalance_bug+0x174/0x1a0 [ 43.887261] [<ffffffff8123192a>] lock_release+0x72a/0xc10 [ 43.892853] [<ffffffff814daa66>] ? memcpy+0x36/0x40 [ 43.897931] [<ffffffff8338bdc0>] ? ipmr_mfc_seq_stop+0xd0/0x110 [ 43.904040] [<ffffffff8374abea>] _raw_read_unlock+0x1a/0x50 [ 43.909801] [<ffffffff8338bdc0>] ipmr_mfc_seq_stop+0xd0/0x110 [ 43.915735] [<ffffffff81563857>] traverse+0x347/0x950 [ 43.920974] [<ffffffff81563510>] ? seq_buf_alloc+0x40/0x40 [ 43.926647] [<ffffffff8156491b>] seq_read+0x76b/0x1270 [ 43.931971] [<ffffffff8122b69f>] ? __lock_acquire+0xb5f/0x4b50 [ 43.937991] [<ffffffff815641b0>] ? seq_lseek+0x350/0x350 [ 43.943488] [<ffffffff8122ab40>] ? debug_check_no_locks_freed+0x2c0/0x2c0 [ 43.950464] [<ffffffff81639c8c>] proc_reg_read+0xbc/0x180 [ 43.956048] [<ffffffff814f6d4a>] __vfs_read+0xda/0x3e0 [ 43.961372] [<ffffffff814f6c70>] ? vfs_iter_write+0x2d0/0x2d0 [ 43.967306] [<ffffffff815bee10>] ? fsnotify+0xe40/0xe40 [ 43.972719] [<ffffffff81b0ce6d>] ? security_file_permission+0x13d/0x190 [ 43.979517] [<ffffffff814f86fb>] ? rw_verify_area+0xbb/0x2c0 [ 43.985363] [<ffffffff814f89e1>] vfs_read+0xe1/0x340 [ 43.990517] [<ffffffff8154f9bd>] ? __fget_light+0x7d/0x1b0 [ 43.996189] [<ffffffff814fb71e>] SyS_pread64+0x11e/0x150 [ 44.001689] [<ffffffff814fb600>] ? SyS_write+0x1c0/0x1c0 [ 44.007187] [<ffffffff81003044>] ? lockdep_sys_exit_thunk+0x12/0x14 [ 44.013641] [<ffffffff8374b236>] entry_SYSCALL_64_fastpath+0x16/0x76