[   13.253977] random: sshd: uninitialized urandom read (32 bytes read, 31 bits of entropy available)
[....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   36.987096] random: sshd: uninitialized urandom read (32 bytes read, 41 bits of entropy available)
[   37.404833] random: sshd: uninitialized urandom read (32 bytes read, 41 bits of entropy available)
[   37.992011] random: sshd: uninitialized urandom read (32 bytes read, 112 bits of entropy available)
[   38.126828] random: sshd: uninitialized urandom read (32 bytes read, 117 bits of entropy available)
Warning: Permanently added 'ci-android-44-kasan-gce-2,10.128.0.22' (ECDSA) to the list of known hosts.
[   43.615130] random: sshd: uninitialized urandom read (32 bytes read, 123 bits of entropy available)
executing program
[   43.769408] 
[   43.771074] =====================================
[   43.775876] [ BUG: bad unlock balance detected! ]
[   43.780680] 4.4.104-ged884eb #2 Not tainted
[   43.784959] -------------------------------------
[   43.789761] syzkaller823721/3340 is trying to release lock (mrt_lock) at:
[   43.796882] [<ffffffff8338bdc0>] ipmr_mfc_seq_stop+0xd0/0x110
[   43.802726] but there are no more locks to release!
[   43.807701] 
[   43.807701] other info that might help us debug this:
[   43.814326] 1 lock held by syzkaller823721/3340:
[   43.819041]  #0:  (&p->lock){+.+.+.}, at: [<ffffffff81564285>] seq_read+0xd5/0x1270
[   43.827372] 
[   43.827372] stack backtrace:
[   43.831831] CPU: 0 PID: 3340 Comm: syzkaller823721 Not tainted 4.4.104-ged884eb #2
[   43.839499] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   43.848818]  0000000000000000 94ea5097a8d8878e ffff8801d616f940 ffffffff81cc9b0f
[   43.856764]  ffffffff84769898 ffff8800b95edf00 ffff8801d616f970 ffffffff81226a84
[   43.864711]  dffffc0000000000 ffffffff84769898 00000000ffffffff ffff8800b95ee770
[   43.872656] Call Trace:
[   43.875210]  [<ffffffff81cc9b0f>] dump_stack+0x8e/0xcf
[   43.880455]  [<ffffffff81226a84>] print_unlock_imbalance_bug+0x174/0x1a0
[   43.887261]  [<ffffffff8123192a>] lock_release+0x72a/0xc10
[   43.892853]  [<ffffffff814daa66>] ? memcpy+0x36/0x40
[   43.897931]  [<ffffffff8338bdc0>] ? ipmr_mfc_seq_stop+0xd0/0x110
[   43.904040]  [<ffffffff8374abea>] _raw_read_unlock+0x1a/0x50
[   43.909801]  [<ffffffff8338bdc0>] ipmr_mfc_seq_stop+0xd0/0x110
[   43.915735]  [<ffffffff81563857>] traverse+0x347/0x950
[   43.920974]  [<ffffffff81563510>] ? seq_buf_alloc+0x40/0x40
[   43.926647]  [<ffffffff8156491b>] seq_read+0x76b/0x1270
[   43.931971]  [<ffffffff8122b69f>] ? __lock_acquire+0xb5f/0x4b50
[   43.937991]  [<ffffffff815641b0>] ? seq_lseek+0x350/0x350
[   43.943488]  [<ffffffff8122ab40>] ? debug_check_no_locks_freed+0x2c0/0x2c0
[   43.950464]  [<ffffffff81639c8c>] proc_reg_read+0xbc/0x180
[   43.956048]  [<ffffffff814f6d4a>] __vfs_read+0xda/0x3e0
[   43.961372]  [<ffffffff814f6c70>] ? vfs_iter_write+0x2d0/0x2d0
[   43.967306]  [<ffffffff815bee10>] ? fsnotify+0xe40/0xe40
[   43.972719]  [<ffffffff81b0ce6d>] ? security_file_permission+0x13d/0x190
[   43.979517]  [<ffffffff814f86fb>] ? rw_verify_area+0xbb/0x2c0
[   43.985363]  [<ffffffff814f89e1>] vfs_read+0xe1/0x340
[   43.990517]  [<ffffffff8154f9bd>] ? __fget_light+0x7d/0x1b0
[   43.996189]  [<ffffffff814fb71e>] SyS_pread64+0x11e/0x150
[   44.001689]  [<ffffffff814fb600>] ? SyS_write+0x1c0/0x1c0
[   44.007187]  [<ffffffff81003044>] ? lockdep_sys_exit_thunk+0x12/0x14
[   44.013641]  [<ffffffff8374b236>] entry_SYSCALL_64_fastpath+0x16/0x76