[....] Starting enhanced syslogd: rsyslogd[ 13.472083] audit: type=1400 audit(1516430924.768:5): avc: denied { syslog } for pid=3507 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 18.736757] audit: type=1400 audit(1516430930.033:6): avc: denied { map } for pid=3646 comm="bash" path="/bin/bash" dev="sda1" ino=1457 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:file_t:s0 tclass=file permissive=1 Warning: Permanently added '10.128.0.31' (ECDSA) to the list of known hosts. 2018/01/20 06:48:56 fuzzer started [ 25.191875] audit: type=1400 audit(1516430936.488:7): avc: denied { map } for pid=3657 comm="syz-fuzzer" path="/root/syz-fuzzer" dev="sda1" ino=16479 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:user_home_t:s0 tclass=file permissive=1 2018/01/20 06:48:56 dialing manager at 10.128.0.26:38913 [ 28.893669] can: request_module (can-proto-0) failed. [ 28.903642] can: request_module (can-proto-0) failed. 2018/01/20 06:49:00 kcov=true, comps=true [ 29.450693] audit: type=1400 audit(1516430940.747:8): avc: denied { map } for pid=3657 comm="syz-fuzzer" path="/sys/kernel/debug/kcov" dev="debugfs" ino=8899 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=system_u:object_r:debugfs_t:s0 tclass=file permissive=1 2018/01/20 06:49:02 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000aaa000)={0x2, 0x78, 0x47, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000)=0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00002a0000)='/dev/loop#\x00', 0x0, 0x5) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000beb000-0x98)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "000000000100000001001bf3ffff00000065000000010000007db0e6f10efbf9a219d8f6aa6bd58d1c43473100e85026e7ff40f9b55bd1b3335d5bffff0001f3", "cfa40005000000f7ffffffff00000000000000ffb833220182ab867d00", [0x0, 0x0], 0x0}) 2018/01/20 06:49:02 executing program 3: mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local={[0xaa, 0xaa, 0xaa, 0xaa], 0xffffffffffffffff, 0xaa}, @empty=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [], {@ipv6={0x86dd, {0x0, 0x6, "0c0001", 0x8, 0x3a, 0x0, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xffffffffffffffff, 0xaa}, @local={0xfe, 0x80, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xffffffffffffffff, 0xaa}, {[], @icmpv6=@echo_request={0x80, 0x0, 0x0, 0x0, 0x0, ""}}}}}}, 0x0) 2018/01/20 06:49:02 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f00009a9000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = open(&(0x7f00005e9000)='./file0\x00', 0x2, 0x0) ioctl$KVM_GET_REG_LIST(r2, 0xc008aeb0, &(0x7f00000ff000-0x30)={0x5, [0x8, 0x1, 0x4, 0x8, 0x3f]}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x20) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f00001db000)={&(0x7f0000e96000)='./file0\x00', 0x0, 0x8}, 0x10) bpf$BPF_PROG_ATTACH(0x8, &(0x7f0000c8b000-0x10)={r1, r4, 0x4, 0x0}, 0xb) ioctl$KVM_RUN(r3, 0xae80, 0x0) clock_getres(0x3, &(0x7f0000b21000-0x10)={0x0, 0x0}) ptrace$setsig(0x4203, 0x0, 0x0, &(0x7f00000a4000)={0x0, 0x0, 0x0, 0x0}) r5 = accept4$ipx(0xffffffffffffffff, &(0x7f0000c25000-0x10)={0x0, 0x0, 0x0, ""/6, 0x0, 0x0}, &(0x7f0000149000-0x4)=0x10, 0x800) ioctl$sock_SIOCINQ(r5, 0x541b, &(0x7f00007d7000-0x4)=0x0) setns(r0, 0x8000000) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000348000-0x10)={0xf001, 0x404000, 0x0}) r6 = dup3(r3, r0, 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000bf7000)={0x10005, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) getsockopt$netrom_NETROM_T1(r6, 0x103, 0x1, &(0x7f0000e32000)=0x0, &(0x7f0000b77000-0x4)=0x4) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000fea000-0xe8)={{{@in6=@remote={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xffffffffffffffff, 0x0}, @in6=@local={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0xffffffffffffffff, 0x0}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, {0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, {{@in6=@mcast2={0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0}, 0xffffffffffffffff, 0x0}, 0x0, @in6=@ipv4={[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], [0x0, 0x0], @loopback=0x0}, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, &(0x7f0000e96000-0x4)=0xe8) ioprio_get$uid(0x0, r7) ioctl$KVM_SMI(r3, 0xaeb7) ioctl$KVM_RUN(r3, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f00000d5000/0x18000)=nil, &(0x7f0000de9000)=[@text64={0x40, &(0x7f0000bff000-0x41)="0f20d835200000000f22d80f0118470f35f3ab77644ebe0f59128182818201bc8c6a000000674b0f015e9dc483996ba7d900f300004f4f21ae5ddc", 0x3b}], 0x1, 0x0, &(0x7f0000b8d000-0x20)=[@flags={0x3, 0x100}, @cr4={0x1, 0x0}], 0x2) socket$nl_generic(0x10, 0x3, 0x10) ioctl$KVM_RUN(r6, 0xae80, 0x0) io_setup(0xffffffff80000000, &(0x7f000017b000-0x8)=0x0) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r6, 0x84, 0x72, &(0x7f0000b11000-0xc)={0x0, 0x3, 0x30}, &(0x7f0000c39000)=0xc) setsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f0000155000)={r8, 0x4, 0xfe8c, 0x9, 0x3b4e, 0xfffffffffffffffc}, 0x14) clock_gettime(0x0, &(0x7f0000ad9000-0x10)={0x0, 0x0}) 2018/01/20 06:49:02 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mknod(&(0x7f0000e8a000-0x6)='./bus\x00', 0x1000000001000, 0x0) sched_setaffinity(0x0, 0x8, &(0x7f0000dee000)=0x9) creat(&(0x7f0000748000-0x6)='./bus\x00', 0x0) open(&(0x7f00009b6000)='./bus\x00', 0x0, 0x0) 2018/01/20 06:49:02 executing program 4: mmap(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat$vnet(0xffffffffffffff9c, &(0x7f0000001000-0xf)='/dev/vhost-net\x00', 0x2, 0x0) ioctl$int_in(r0, 0xaf01, &(0x7f00001e3000)=0x0) r1 = dup2(r0, r0) ioctl$VHOST_SET_MEM_TABLE(r1, 0x4008af03, &(0x7f00002ba000-0xc8)={0x0, 0x0, []}) 2018/01/20 06:49:02 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x32, &(0x7f000018f000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @empty=[0x0, 0x0, 0x14, 0x0, 0x0, 0x0], [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0xffffffffffffffff, 0x0, 0x0, 0x11, 0x0, @multicast1=0xe0000001, @multicast1=0xe0000001, {[]}}, @dccp={{0x3, 0xffffffffffffffff, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "d73cde", 0x0, "f53475"}, ""}}}}}, 0x0) 2018/01/20 06:49:02 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000057c000)={0x2, 0x78, 0x48, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000)=0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(&(0x7f000048a000)='/dev/loop#\x00', 0x0, 0x0) 2018/01/20 06:49:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f0000c22000)='/dev/loop#\x00', 0x0, 0x0) read(r0, &(0x7f0000572000-0x86)=""/134, 0x86) [ 31.524978] audit: type=1400 audit(1516430942.821:9): avc: denied { map } for pid=3657 comm="syz-fuzzer" path="/root/syzkaller-shm182487696" dev="sda1" ino=16481 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:file_t:s0 tclass=file permissive=1 [ 32.490662] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 32.860137] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 33.113674] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 33.435672] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 33.591121] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 33.779924] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.107361] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 34.131742] IPv6: ADDRCONF(NETDEV_UP): bridge0: link is not ready [ 35.194077] audit: type=1400 audit(1516430946.489:10): avc: denied { sys_admin } for pid=3701 comm="syz-executor7" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 35.274087] audit: type=1400 audit(1516430946.563:11): avc: denied { sys_chroot } for pid=4506 comm="syz-executor7" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 35.303857] ================================================================== [ 35.303886] BUG: KASAN: double-free or invalid-free in relay_open+0x6a1/0xa40 [ 35.303888] [ 35.303899] CPU: 1 PID: 4525 Comm: syz-executor7 Not tainted 4.15.0-rc8+ #269 [ 35.303905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.303909] Call Trace: [ 35.303928] dump_stack+0x194/0x257 [ 35.303947] ? arch_local_irq_restore+0x53/0x53 [ 35.303963] ? show_regs_print_info+0x18/0x18 [ 35.303973] ? __lock_is_held+0xb6/0x140 [ 35.303992] ? relay_open+0x6a1/0xa40 [ 35.304003] print_address_description+0x73/0x250 [ 35.304010] ? relay_open+0x6a1/0xa40 [ 35.304017] ? relay_open+0x6a1/0xa40 [ 35.304027] kasan_report_double_free+0x55/0x80 [ 35.304039] kasan_slab_free+0xa3/0xc0 [ 35.304050] kfree+0xd6/0x260 [ 35.304062] relay_open+0x6a1/0xa40 [ 35.304081] ? relay_open_buf.part.10+0x9b0/0x9b0 [ 35.304096] ? __debugfs_create_file+0x2cf/0x3d0 [ 35.304115] ? debugfs_create_file+0x57/0x70 [ 35.304133] do_blk_trace_setup+0x4a4/0xcd0 [ 35.304151] ? blk_tracer_print_line+0x40/0x40 [ 35.304162] ? __might_sleep+0x95/0x190 [ 35.304184] ? kasan_check_write+0x14/0x20 [ 35.304195] ? _copy_from_user+0x99/0x110 [ 35.304211] __blk_trace_setup+0xbe/0x150 [ 35.304221] ? do_blk_trace_setup+0xcd0/0xcd0 [ 35.304243] ? disk_name+0x98/0x100 [ 35.304264] blk_trace_ioctl+0x206/0x2e0 [ 35.304275] ? blk_add_trace_rq_remap+0x680/0x680 [ 35.304295] ? avc_has_extended_perms+0x7fa/0x12c0 [ 35.304311] blkdev_ioctl+0x1845/0x1e00 [ 35.304324] ? blkpg_ioctl+0xb40/0xb40 [ 35.304332] ? avc_ss_reset+0x110/0x110 [ 35.304339] ? lock_downgrade+0x980/0x980 [ 35.304363] ? lock_release+0xa40/0xa40 [ 35.304381] ? __lock_is_held+0xb6/0x140 [ 35.304440] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 35.304455] ? get_unused_fd_flags+0x190/0x190 [ 35.304471] ? rcu_note_context_switch+0x710/0x710 [ 35.304494] block_ioctl+0xde/0x120 [ 35.304510] ? blkdev_fallocate+0x3b0/0x3b0 [ 35.304519] do_vfs_ioctl+0x1b1/0x1520 [ 35.304527] ? _cond_resched+0x14/0x30 [ 35.304546] ? ioctl_preallocate+0x2b0/0x2b0 [ 35.304562] ? selinux_capable+0x40/0x40 [ 35.304582] ? SyS_futex+0x269/0x390 [ 35.304614] ? security_file_ioctl+0x89/0xb0 [ 35.304632] SyS_ioctl+0x8f/0xc0 [ 35.304649] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 35.304657] RIP: 0033:0x452ee9 [ 35.304662] RSP: 002b:00007f64a9df4c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 [ 35.304671] RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ee9 [ 35.304676] RDX: 0000000020beaf68 RSI: 00000000c0481273 RDI: 0000000000000013 [ 35.304681] RBP: 000000000000061b R08: 0000000000000000 R09: 0000000000000000 [ 35.304686] R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f8328 [ 35.304691] R13: 00000000ffffffff R14: 00007f64a9df56d4 R15: 0000000000000000 [ 35.304724] [ 35.304728] Allocated by task 4525: [ 35.304736] save_stack+0x43/0xd0 [ 35.304742] kasan_kmalloc+0xad/0xe0 [ 35.304750] kmem_cache_alloc_trace+0x136/0x750 [ 35.304757] relay_open+0xf2/0xa40 [ 35.304766] do_blk_trace_setup+0x4a4/0xcd0 [ 35.304774] __blk_trace_setup+0xbe/0x150 [ 35.304781] blk_trace_ioctl+0x206/0x2e0 [ 35.304787] blkdev_ioctl+0x1845/0x1e00 [ 35.304794] block_ioctl+0xde/0x120 [ 35.304800] do_vfs_ioctl+0x1b1/0x1520 [ 35.304806] SyS_ioctl+0x8f/0xc0 [ 35.304812] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 35.304814] [ 35.304818] Freed by task 4525: [ 35.304825] save_stack+0x43/0xd0 [ 35.304831] kasan_slab_free+0x71/0xc0 [ 35.304836] kfree+0xd6/0x260 [ 35.304842] relay_open+0x84a/0xa40 [ 35.304848] do_blk_trace_setup+0x4a4/0xcd0 [ 35.304854] __blk_trace_setup+0xbe/0x150 [ 35.304861] blk_trace_ioctl+0x206/0x2e0 [ 35.304867] blkdev_ioctl+0x1845/0x1e00 [ 35.304874] block_ioctl+0xde/0x120 [ 35.304880] do_vfs_ioctl+0x1b1/0x1520 [ 35.304886] SyS_ioctl+0x8f/0xc0 [ 35.304893] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 35.304895] [ 35.304901] The buggy address belongs to the object at ffff8801c8ec2340 [ 35.304901] which belongs to the cache kmalloc-512 of size 512 [ 35.304907] The buggy address is located 0 bytes inside of [ 35.304907] 512-byte region [ffff8801c8ec2340, ffff8801c8ec2540) [ 35.304910] The buggy address belongs to the page: [ 35.304916] page:ffffea000723b080 count:1 mapcount:0 mapping:ffff8801c8ec20c0 index:0x0 [ 35.304923] flags: 0x2fffc0000000100(slab) [ 35.304935] raw: 02fffc0000000100 ffff8801c8ec20c0 0000000000000000 0000000100000006 [ 35.304943] raw: ffffea000730cfa0 ffff8801dac01748 ffff8801dac00940 0000000000000000 [ 35.304947] page dumped because: kasan: bad access detected [ 35.304949] [ 35.304951] Memory state around the buggy address: [ 35.304958] ffff8801c8ec2200: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.304964] ffff8801c8ec2280: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 35.304969] >ffff8801c8ec2300: fc fc fc fc fc fc fc fc fb fb fb fb fb fb fb fb [ 35.304973] ^ [ 35.304979] ffff8801c8ec2380: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.304985] ffff8801c8ec2400: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 35.304988] ================================================================== [ 35.304991] Disabling lock debugging due to kernel taint [ 35.304996] Kernel panic - not syncing: panic_on_warn set ... [ 35.304996] [ 35.305005] CPU: 1 PID: 4525 Comm: syz-executor7 Tainted: G B 4.15.0-rc8+ #269 [ 35.305009] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 35.305011] Call Trace: [ 35.305020] dump_stack+0x194/0x257 [ 35.305030] ? arch_local_irq_restore+0x53/0x53 [ 35.305036] ? kasan_end_report+0x32/0x50 [ 35.305044] ? lock_downgrade+0x980/0x980 [ 35.305053] ? vsnprintf+0x1ed/0x1900 [ 35.305065] panic+0x1e4/0x41c [ 35.305072] ? refcount_error_report+0x214/0x214 [ 35.305082] ? add_taint+0x40/0x50 [ 35.305088] ? add_taint+0x1c/0x50 [ 35.305095] ? relay_open+0x6a1/0xa40 [ 35.305101] ? relay_open+0x6a1/0xa40 [ 35.305107] kasan_end_report+0x50/0x50 [ 35.305115] kasan_report_double_free+0x72/0x80 [ 35.305125] kasan_slab_free+0xa3/0xc0 [ 35.305133] kfree+0xd6/0x260 [ 35.305142] relay_open+0x6a1/0xa40 [ 35.305154] ? relay_open_buf.part.10+0x9b0/0x9b0 [ 35.305164] ? __debugfs_create_file+0x2cf/0x3d0 [ 35.305176] ? debugfs_create_file+0x57/0x70 [ 35.305187] do_blk_trace_setup+0x4a4/0xcd0 [ 35.305199] ? blk_tracer_print_line+0x40/0x40 [ 35.305207] ? __might_sleep+0x95/0x190 [ 35.305219] ? kasan_check_write+0x14/0x20 [ 35.305227] ? _copy_from_user+0x99/0x110 [ 35.305236] __blk_trace_setup+0xbe/0x150 [ 35.305243] ? do_blk_trace_setup+0xcd0/0xcd0 [ 35.305254] ? disk_name+0x98/0x100 [ 35.305266] blk_trace_ioctl+0x206/0x2e0 [ 35.305275] ? blk_add_trace_rq_remap+0x680/0x680 [ 35.305289] ? avc_has_extended_perms+0x7fa/0x12c0 [ 35.305299] blkdev_ioctl+0x1845/0x1e00 [ 35.305307] ? blkpg_ioctl+0xb40/0xb40 [ 35.305314] ? avc_ss_reset+0x110/0x110 [ 35.305320] ? lock_downgrade+0x980/0x980 [ 35.305330] ? lock_release+0xa40/0xa40 [ 35.305339] ? __lock_is_held+0xb6/0x140 [ 35.305371] ? trace_event_raw_event_sched_switch+0x800/0x800 [ 35.305380] ? get_unused_fd_flags+0x190/0x190 [ 35.305389] ? rcu_note_context_switch+0x710/0x710 [ 35.305399] block_ioctl+0xde/0x120 [ 35.305409] ? blkdev_fallocate+0x3b0/0x3b0 [ 35.305415] do_vfs_ioctl+0x1b1/0x1520 [ 35.305420] ? _cond_resched+0x14/0x30 [ 35.305431] ? ioctl_preallocate+0x2b0/0x2b0 [ 35.305441] ? selinux_capable+0x40/0x40 [ 35.305452] ? SyS_futex+0x269/0x390 [ 35.305471] ? security_file_ioctl+0x89/0xb0 [ 35.305481] SyS_ioctl+0x8f/0xc0 [ 35.305492] entry_SYSCALL_64_fastpath+0x29/0xa0 [ 35.305497] RIP: 0033:0x452ee9 [ 35.305500] RSP: 002b:00007f64a9df4c58 EFLAGS: 00000212 ORIG_RAX: 0000000000000010 [ 35.305508] RAX: ffffffffffffffda RBX: 000000000071bea0 RCX: 0000000000452ee9 [ 35.305511] RDX: 0000000020beaf68 RSI: 00000000c0481273 RDI: 0000000000000013 [ 35.305515] RBP: 000000000000061b R08: 0000000000000000 R09: 0000000000000000 [ 35.305519] R10: 0000000000000000 R11: 0000000000000212 R12: 00000000006f8328 [ 35.305522] R13: 00000000ffffffff R14: 00007f64a9df56d4 R15: 0000000000000000 [ 35.305979] Dumping ftrace buffer: [ 35.305983] (ftrace buffer empty) [ 35.305986] Kernel Offset: disabled [ 36.092632] Rebooting in 86400 seconds..