[....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c.
[....] Starting OpenBSD Secure Shell server: sshd[   16.107177] random: sshd: uninitialized urandom read (32 bytes read, 32 bits of entropy available)
[?25l[?1c7[ ok 8[?25h[?0c.

Debian GNU/Linux 7 syzkaller ttyS0

syzkaller login: [   21.211818] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available)
[   21.577866] random: sshd: uninitialized urandom read (32 bytes read, 37 bits of entropy available)
[   22.395112] random: sshd: uninitialized urandom read (32 bytes read, 98 bits of entropy available)
[   22.573805] random: sshd: uninitialized urandom read (32 bytes read, 104 bits of entropy available)
Warning: Permanently added '10.128.15.231' (ECDSA) to the list of known hosts.
[   27.971877] random: sshd: uninitialized urandom read (32 bytes read, 112 bits of entropy available)
executing program
executing program
[   28.075547] 
[   28.077182] =====================================
[   28.081996] [ BUG: bad unlock balance detected! ]
[   28.086808] 4.4.107-g610c835 #12 Not tainted
[   28.091185] -------------------------------------
[   28.095992] syzkaller557605/3317 is trying to release lock (mrt_lock) at:
[   28.103112] [<ffffffff833c77d4>] ipmr_mfc_seq_stop+0xe4/0x140
[   28.108960] but there are no more locks to release!
[   28.113942] 
[   28.113942] other info that might help us debug this:
[   28.120575] 1 lock held by syzkaller557605/3317:
[   28.125295]  #0:  (&p->lock){+.+.+.}, at: [<ffffffff8158c38d>] seq_read+0xdd/0x1270
[   28.133631] 
[   28.133631] stack backtrace:
[   28.138095] CPU: 1 PID: 3317 Comm: syzkaller557605 Not tainted 4.4.107-g610c835 #12
[   28.145855] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   28.155188]  0000000000000000 247e9464362ba762 ffff8801d01c7910 ffffffff81d0457d
[   28.163320]  ffffffff8476ab98 ffff8800b493af80 ffffffff833c77d4 ffffffff8476ab98
[   28.171265]  ffff8800b493b7c8 ffff8801d01c7940 ffffffff812301a4 dffffc0000000000
[   28.179231] Call Trace:
[   28.181788]  [<ffffffff81d0457d>] dump_stack+0xc1/0x124
[   28.187128]  [<ffffffff833c77d4>] ? ipmr_mfc_seq_stop+0xe4/0x140
[   28.193586]  [<ffffffff812301a4>] print_unlock_imbalance_bug+0x174/0x1a0
[   28.200393]  [<ffffffff8123b04a>] lock_release+0x72a/0xc10
[   28.205991]  [<ffffffff814fafd5>] ? memcpy+0x45/0x50
[   28.211058]  [<ffffffff833c77d4>] ? ipmr_mfc_seq_stop+0xe4/0x140
[   28.217182]  [<ffffffff8377366a>] _raw_read_unlock+0x1a/0x50
[   28.222944]  [<ffffffff833c77d4>] ipmr_mfc_seq_stop+0xe4/0x140
[   28.228889]  [<ffffffff8158b997>] traverse+0x3a7/0x900
[   28.234134]  [<ffffffff8158b5f0>] ? seq_buf_alloc+0x80/0x80
[   28.239810]  [<ffffffff8158ca9a>] seq_read+0x7ea/0x1270
[   28.245413]  [<ffffffff8158c2b0>] ? seq_lseek+0x3c0/0x3c0
[   28.250923]  [<ffffffff812dda43>] ? do_futex+0x3e3/0x1670
[   28.256439]  [<ffffffff814a8d4e>] ? __vma_link_rb+0x20e/0x310
[   28.262290]  [<ffffffff814a6bdc>] ? __vma_link_file+0x10c/0x160
[   28.268315]  [<ffffffff8158c2b0>] ? seq_lseek+0x3c0/0x3c0
[   28.273824]  [<ffffffff816651ff>] proc_reg_read+0xef/0x170
[   28.279413]  [<ffffffff81665110>] ? proc_reg_write+0x170/0x170
[   28.285364]  [<ffffffff8151aa73>] __vfs_read+0x103/0x440
[   28.290781]  [<ffffffff8151a970>] ? vfs_iter_write+0x2d0/0x2d0
[   28.296717]  [<ffffffff815e878d>] ? fsnotify+0x5ad/0xee0
[   28.302132]  [<ffffffff815e90c0>] ? fsnotify+0xee0/0xee0
[   28.307564]  [<ffffffff81b4d4f9>] ? avc_policy_seqno+0x9/0x20
[   28.313419]  [<ffffffff81b5ebe8>] ? selinux_file_permission+0x348/0x460
executing program
[   28.320142]  [<ffffffff81b443e9>] ? security_file_permission+0x89/0x1e0
[   28.326872]  [<ffffffff8151c600>] ? rw_verify_area+0x100/0x2f0
[   28.332809]  [<ffffffff8151c913>] vfs_read+0x123/0x3a0
[   28.338056]  [<ffffffff8151f61f>] SyS_pread64+0x13f/0x170
[   28.343566]  [<ffffffff8151f4e0>] ? SyS_write+0x1b0/0x1b0
[   28.349071]  [<ffffffff81003044>] ? lockdep_sys_exit_thunk+0x12/0x14
[   28.355533]  [<ffffffff83773d36>] entry_SYSCALL_64_fastpath+0x16/0x76