[....] Starting enhanced syslogd: rsyslogd[ 15.739233] audit: type=1400 audit(1518461745.491:4): avc: denied { syslog } for pid=3655 comm="rsyslogd" capability=34 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. Starting mcstransd: [....] Starting file context maintaining daemon: restorecond[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.36' (ECDSA) to the list of known hosts. 2018/02/12 18:55:56 fuzzer started 2018/02/12 18:55:56 dialing manager at 10.128.0.26:33975 2018/02/12 18:55:59 kcov=true, comps=false 2018/02/12 18:56:00 executing program 0: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000bdb000)='./file0\x00', 0x0) mount(&(0x7f0000e07000)='./file0\x00', &(0x7f0000027000)='./file0\x00', &(0x7f00004db000-0x6)='ramfs\x00', 0x0, &(0x7f000054d000)) r0 = creat(&(0x7f0000016000-0xc)='./file0/bus\x00', 0x0) writev(r0, &(0x7f0000b87000)=[{&(0x7f0000a10000)='}', 0x1}], 0x1) r1 = open(&(0x7f0000002000)='./file0/bus\x00', 0x0, 0x0) sendfile(r0, r1, &(0x7f0000803000), 0x4) 2018/02/12 18:56:00 executing program 7: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x5e, &(0x7f0000326000)={@broadcast=[0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @dev={[0xaa, 0xaa, 0xaa, 0xaa]}, [], {@ipv6={0x86dd, {0x0, 0x6, "06f526", 0x28, 0x29, 0x0, @remote={0xfe, 0x80, [], 0xffffffffffffffff, 0xbb}, @mcast2={0xff, 0x2, [], 0x1}, {[], @icmpv6=@echo_reply={0x81, 0x0, 0x0, 0x0, 0x0, "0c8f314669996066405efcde1c384a4fbf50260439ba8a50bae4953316537ab3"}}}}}}, &(0x7f0000775000)={0x0, 0x1, [0x0]}) 2018/02/12 18:56:00 executing program 3: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r0, &(0x7f0000056000)={&(0x7f0000a86000)=@in={0x2, 0xffffffffffffffff, @empty}, 0x10, &(0x7f0000394000)=[], 0x0, &(0x7f0000136000)=[{0x10, 0x0, 0x7}], 0x10}, 0x8080) 2018/02/12 18:56:00 executing program 4: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x800000000001, 0x84) connect$inet(r0, &(0x7f0000a66000)={0x2, 0xffffffffffffffff, @rand_addr=0x7fffffff}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x4) writev(r1, &(0x7f000051c000)=[{&(0x7f0000b8d000-0x49)="480000001400190d09004beafd0d8c560a847f0080ffe00600000000000000a2bc5603ca00000fff89000000200000000101ff0000000309ff5bffff00c7e5ed5e00000000000000", 0x48}], 0x1) 2018/02/12 18:56:00 executing program 5: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, &(0x7f0000ace000-0x71), 0x0, 0x0, &(0x7f0000f2f000-0x1c)={0xa, 0x3, 0x0, @mcast1={0xff, 0x1, [], 0x1}, 0x8}, 0x1c) 2018/02/12 18:56:00 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x183, &(0x7f0000005000-0x4f)={@local={[0xaa, 0xaa, 0xaa, 0xaa], 0x0, 0xaa}, @link_local={0x1, 0x80, 0xc2}, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @empty, @multicast1=0xe0000001, {[]}}, @udp={0xffffffffffffffff, 0xffffffffffffffff, 0x8}}}}}, 0x0) 2018/02/12 18:56:00 executing program 1: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x78, 0x3e3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff7fffffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$loop(&(0x7f00005cb000-0xb)='/dev/loop#\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0481273, &(0x7f0000f58000)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "000000000100000000001bf3ffffff000065000000edff00007db0e6330ee7f9b319d8000018e58d1c43473000e05026fb0000008001d1a7335d5bffff0001d7", "cea40005003500f7ff0002ff000000000000000000810000dc01867dfffe0200"}) 2018/02/12 18:56:00 executing program 2: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f000076a000-0x9)='/dev/sg#\x00', 0x0, 0x28001) write$evdev(r0, &(0x7f0000256000-0x30)=[{{0x77359400}}, {}], 0xffe3) syzkaller login: [ 30.830522] audit: type=1400 audit(1518461760.581:5): avc: denied { sys_admin } for pid=3869 comm="syz-executor0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 30.866744] IPVS: Creating netns size=2536 id=1 [ 30.890480] audit: type=1400 audit(1518461760.641:6): avc: denied { net_admin } for pid=3872 comm="syz-executor3" capability=12 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 30.925662] IPVS: Creating netns size=2536 id=2 [ 30.962274] IPVS: Creating netns size=2536 id=3 [ 31.000288] IPVS: Creating netns size=2536 id=4 [ 31.043768] IPVS: Creating netns size=2536 id=5 [ 31.088200] IPVS: Creating netns size=2536 id=6 [ 31.150082] IPVS: Creating netns size=2536 id=7 [ 31.216399] IPVS: Creating netns size=2536 id=8 [ 32.666619] audit: type=1400 audit(1518461762.421:7): avc: denied { sys_chroot } for pid=3872 comm="syz-executor3" capability=18 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 2018/02/12 18:56:02 executing program 3: mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x581000, 0x10) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x1b, &(0x7f0000000000)={@mcast1, 0x0}, &(0x7f0000d58000)=0x14) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) fstat(r0, &(0x7f0000001000)={0x0, 0x0, 0x0, 0x0, 0x0}) mmap(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000000)={{{@in6=@dev={0xfe, 0x80, [], 0x0, 0x16}, @in=@multicast1=0xe0000001, 0x0, 0x1, 0x2, 0x0, 0xa, 0xa0, 0x20, 0x0, r1, r2}, {0x6, 0x1, 0x0, 0xe653, 0x2, 0xffffffffffffffff, 0x26addbb4, 0x100}, {0x8, 0x6, 0x4dd1, 0x26400000000}, 0x9, 0x7, 0x2, 0x1, 0x2, 0x3}, {{@in6=@remote={0xfe, 0x80, [], 0x0, 0xbb}, 0x1, 0x33}, 0xa, @in6=@dev={0xfe, 0x80, [], 0x0, 0xc}, 0x6, 0x3, 0x2, 0x40, 0x7, 0x3f}}, 0xe8) mmap(&(0x7f0000000000/0xf74000)=nil, 0xf74000, 0x3, 0x32, 0xffffffffffffffff, 0x0) r3 = socket$inet6(0xa, 0x2, 0x0) sendmsg(r3, &(0x7f0000f74000-0x38)={&(0x7f000072f000-0x10)=@in={0x2, 0x0, @empty}, 0xfd25, &(0x7f00008fd000-0x50)=[], 0x0, &(0x7f0000f73000)=[{0x70, 0x1bf, 0x0, "1dfe17bab4f0fc792aa72726ced74ed2b0ddec1b54fa0e4a004a89ce71e57de1aedf095a3cf5cbd84d34817b29ab1048f74ff09acba761f2e53adbcee21831daf69b14e33353c1da3c4853e730b1670ee60a159dc17985dcd8b6bc6f76b2"}, {0x148, 0x18f, 0x7, "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"}], 0x1b8}, 0x880) mmap(&(0x7f0000f74000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCADDDLCI(r3, 0x8980, &(0x7f0000b68000-0x12)={@generic="f0fb3046dee54c09b570bfa19fb954d8", 0x6}) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x6, &(0x7f000003e000-0x8c)={0x0, @in6={{0xa, 0x1, 0x100000000, @mcast2={0xff, 0x2, [], 0x1}, 0x54f}}}, &(0x7f0000f74000)=0x8c) mmap(&(0x7f0000f74000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000f74000/0x1000)=nil, 0x1000, 0x3, 0x32, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(r3, 0x84, 0x70, &(0x7f0000f74000)={r4, @in={{0x2, 0x2, @loopback=0x7f000001}}, [0x8, 0x4, 0x93, 0xf101, 0x2, 0x4, 0x5, 0x100000001, 0x800, 0x8, 0x20, 0x10, 0x2, 0x3, 0xc39e]}, &(0x7f0000f74000)=0x108) getpeername$inet6(r3, &(0x7f00004d6000)={0x0, 0xffffffffffffffff, 0x0, @loopback}, &(0x7f000032c000-0x4)=0x1c) socket$inet(0x2, 0x800, 0x5) 2018/02/12 18:56:02 executing program 6: mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) mkdir(&(0x7f000082f000)='./control\x00', 0x0) mmap(&(0x7f0000011000/0x3000)=nil, 0x3000, 0x1, 0x32, 0xffffffffffffffff, 0x0) r0 = userfaultfd(0x0) ioctl$UFFDIO_API(r0, 0xc018aa3f, &(0x7f0000e4c000)={0xaa}) ioctl$UFFDIO_REGISTER(r0, 0xc020aa00, &(0x7f0000044000-0x20)={{&(0x7f0000011000/0x3000)=nil, 0x3000}, 0x1}) r1 = creat(&(0x7f0000f96000)='./control/file0\x00', 0x0) write$sndseq(r1, &(0x7f0000012000-0x2e)=[{0x0, 0x0, 0x0, 0x0, @tick, {}, {}, @time=@time}], 0x1c) unlink(&(0x7f0000d61000)='./control/file0\x00') rmdir(&(0x7f0000ef9000-0xa)='./control\x00') mknod(&(0x7f00006e6000)='./control/file1\x00', 0x0, 0x0) unlink(&(0x7f00005e7000)='./control/file0\x00') mmap(&(0x7f0000000000/0xfff000)=nil, 0xfff000, 0x3, 0x32, 0xffffffffffffffff, 0x0) ioctl$UFFDIO_ZEROPAGE(r0, 0x8010aa02, &(0x7f00005b8000-0x10)={&(0x7f0000011000/0x3000)=nil, 0x3000}) fcntl$setsig(r1, 0xa, 0x3) [ 32.948485] audit: type=1400 audit(1518461762.701:8): avc: denied { dac_override } for pid=4887 comm="syz-executor6" capability=1 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 [ 33.214672] ================================================================== [ 33.222045] BUG: KASAN: double-free or invalid-free in relay_open+0x603/0x860 [ 33.229285] [ 33.230887] CPU: 1 PID: 4989 Comm: syz-executor1 Not tainted 4.9.80-g8a174b47 #31 [ 33.238477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.247803] ffff8801b813f8b8 ffffffff81d94be9 ffffea0006dc9e80 ffff8801b727a780 [ 33.255781] ffff8801da001280 ffffffff8137d923 0000000000000282 ffff8801b813f8f0 [ 33.263756] ffffffff8153e113 ffff8801b727a780 ffffffff8137d923 ffff8801da001280 [ 33.271730] Call Trace: [ 33.274293] [] dump_stack+0xc1/0x128 [ 33.279632] [] ? relay_open+0x603/0x860 [ 33.285227] [] print_address_description+0x73/0x280 [ 33.291861] [] ? relay_open+0x603/0x860 [ 33.297454] [] ? relay_open+0x603/0x860 [ 33.303050] [] kasan_report_double_free+0x64/0xa0 [ 33.309511] [] kasan_slab_free+0xa4/0xc0 [ 33.315189] [] kfree+0x103/0x300 [ 33.320174] [] relay_open+0x603/0x860 [ 33.325682] [] do_blk_trace_setup+0x3e9/0x950 [ 33.331799] [] blk_trace_setup+0xe0/0x1a0 [ 33.337569] [] ? do_blk_trace_setup+0x950/0x950 [ 33.343857] [] ? disk_name+0x98/0x100 [ 33.349277] [] blk_trace_ioctl+0x1de/0x300 [ 33.355130] [] ? compat_blk_trace_setup+0x250/0x250 [ 33.361767] [] ? avc_has_extended_perms+0x3fc/0xf10 [ 33.368404] [] ? get_futex_key+0x1050/0x1050 [ 33.374433] [] ? save_stack_trace+0x16/0x20 [ 33.380376] [] ? save_stack+0x43/0xd0 [ 33.385796] [] ? kasan_slab_free+0x72/0xc0 [ 33.391648] [] blkdev_ioctl+0xb00/0x1a60 [ 33.397326] [] ? blkpg_ioctl+0x930/0x930 [ 33.403006] [] ? __lock_acquire+0x629/0x3640 [ 33.409033] [] ? do_futex+0x3f8/0x15c0 [ 33.414540] [] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 33.421439] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 33.428252] [] block_ioctl+0xde/0x120 [ 33.433670] [] ? blkdev_fallocate+0x440/0x440 [ 33.439785] [] do_vfs_ioctl+0x1aa/0x1140 [ 33.445466] [] ? ioctl_preallocate+0x220/0x220 [ 33.451667] [] ? selinux_file_ioctl+0x355/0x530 [ 33.457954] [] ? selinux_capable+0x40/0x40 [ 33.463806] [] ? __fget+0x201/0x3a0 [ 33.469050] [] ? __fget+0x228/0x3a0 [ 33.474295] [] ? __fget+0x47/0x3a0 [ 33.479459] [] ? security_file_ioctl+0x89/0xb0 [ 33.485663] [] SyS_ioctl+0x8f/0xc0 [ 33.490823] [] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 33.497369] [ 33.498967] Allocated by task 4989: [ 33.502566] save_stack_trace+0x16/0x20 [ 33.506512] save_stack+0x43/0xd0 [ 33.509933] kasan_kmalloc+0xad/0xe0 [ 33.513616] kmem_cache_alloc_trace+0xfb/0x2a0 [ 33.518165] relay_open+0x91/0x860 [ 33.521674] do_blk_trace_setup+0x3e9/0x950 [ 33.525968] blk_trace_setup+0xe0/0x1a0 [ 33.529910] blk_trace_ioctl+0x1de/0x300 [ 33.533939] blkdev_ioctl+0xb00/0x1a60 [ 33.537795] block_ioctl+0xde/0x120 [ 33.541391] do_vfs_ioctl+0x1aa/0x1140 [ 33.545245] SyS_ioctl+0x8f/0xc0 [ 33.548581] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 33.553300] [ 33.554897] Freed by task 4989: [ 33.558145] save_stack_trace+0x16/0x20 [ 33.562088] save_stack+0x43/0xd0 [ 33.565511] kasan_slab_free+0x72/0xc0 [ 33.569372] kfree+0x103/0x300 [ 33.572532] relay_destroy_channel+0x16/0x20 [ 33.576908] relay_open+0x5ea/0x860 [ 33.580502] do_blk_trace_setup+0x3e9/0x950 [ 33.584790] blk_trace_setup+0xe0/0x1a0 [ 33.588733] blk_trace_ioctl+0x1de/0x300 [ 33.592762] blkdev_ioctl+0xb00/0x1a60 [ 33.596618] block_ioctl+0xde/0x120 [ 33.600227] do_vfs_ioctl+0x1aa/0x1140 [ 33.604089] SyS_ioctl+0x8f/0xc0 [ 33.607427] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 33.612149] [ 33.613747] The buggy address belongs to the object at ffff8801b727a780 [ 33.613747] which belongs to the cache kmalloc-512 of size 512 [ 33.626369] The buggy address is located 0 bytes inside of [ 33.626369] 512-byte region [ffff8801b727a780, ffff8801b727a980) [ 33.638034] The buggy address belongs to the page: [ 33.642933] page:ffffea0006dc9e80 count:1 mapcount:0 mapping: (null) index:0x0 compound_mapcount: 0 [ 33.653097] flags: 0x8000000000004080(slab|head) [ 33.657817] page dumped because: kasan: bad access detected [ 33.663581] [ 33.665178] Memory state around the buggy address: [ 33.670077] ffff8801b727a680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.677406] ffff8801b727a700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 33.684732] >ffff8801b727a780: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.692057] ^ [ 33.695391] ffff8801b727a800: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.702719] ffff8801b727a880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 33.710045] ================================================================== [ 33.717382] Disabling lock debugging due to kernel taint [ 33.723768] Kernel panic - not syncing: panic_on_warn set ... [ 33.723768] [ 33.731128] CPU: 1 PID: 4989 Comm: syz-executor1 Tainted: G B 4.9.80-g8a174b47 #31 [ 33.739931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 33.749254] ffff8801b813f810 ffffffff81d94be9 ffffffff841970c7 ffff8801b813f8e8 [ 33.757225] ffff8801da001200 ffffffff8137d923 0000000000000282 ffff8801b813f8d8 [ 33.765201] ffffffff8142f5c1 0000000041b58ab3 ffffffff8418ab38 ffffffff8142f405 [ 33.773162] Call Trace: [ 33.775723] [] dump_stack+0xc1/0x128 [ 33.781057] [] ? relay_open+0x603/0x860 [ 33.786653] [] panic+0x1bc/0x3a8 [ 33.791641] [] ? percpu_up_read_preempt_enable.constprop.53+0xd7/0xd7 [ 33.799842] [] ? preempt_schedule+0x25/0x30 [ 33.805785] [] ? ___preempt_schedule+0x16/0x18 [ 33.811989] [] ? relay_open+0x603/0x860 [ 33.817582] [] ? relay_open+0x603/0x860 [ 33.823176] [] kasan_end_report+0x50/0x50 [ 33.829033] [] kasan_report_double_free+0x81/0xa0 [ 33.835494] [] kasan_slab_free+0xa4/0xc0 [ 33.841172] [] kfree+0x103/0x300 [ 33.846159] [] relay_open+0x603/0x860 [ 33.851580] [] do_blk_trace_setup+0x3e9/0x950 [ 33.857694] [] blk_trace_setup+0xe0/0x1a0 [ 33.863460] [] ? do_blk_trace_setup+0x950/0x950 [ 33.869751] [] ? disk_name+0x98/0x100 [ 33.875172] [] blk_trace_ioctl+0x1de/0x300 [ 33.881029] [] ? compat_blk_trace_setup+0x250/0x250 [ 33.887665] [] ? avc_has_extended_perms+0x3fc/0xf10 [ 33.894298] [] ? get_futex_key+0x1050/0x1050 [ 33.900327] [] ? save_stack_trace+0x16/0x20 [ 33.906266] [] ? save_stack+0x43/0xd0 [ 33.911684] [] ? kasan_slab_free+0x72/0xc0 [ 33.917541] [] blkdev_ioctl+0xb00/0x1a60 [ 33.923221] [] ? blkpg_ioctl+0x930/0x930 [ 33.928905] [] ? __lock_acquire+0x629/0x3640 [ 33.934940] [] ? do_futex+0x3f8/0x15c0 [ 33.940447] [] ? _raw_spin_unlock_irqrestore+0x5a/0x70 [ 33.947345] [] ? trace_hardirqs_on_caller+0x38b/0x590 [ 33.954156] [] block_ioctl+0xde/0x120 [ 33.959578] [] ? blkdev_fallocate+0x440/0x440 [ 33.965693] [] do_vfs_ioctl+0x1aa/0x1140 [ 33.971372] [] ? ioctl_preallocate+0x220/0x220 [ 33.977573] [] ? selinux_file_ioctl+0x355/0x530 [ 33.983862] [] ? selinux_capable+0x40/0x40 [ 33.989718] [] ? __fget+0x201/0x3a0 [ 33.994965] [] ? __fget+0x228/0x3a0 [ 34.000211] [] ? __fget+0x47/0x3a0 [ 34.005371] [] ? security_file_ioctl+0x89/0xb0 [ 34.011573] [] SyS_ioctl+0x8f/0xc0 [ 34.016734] [] entry_SYSCALL_64_fastpath+0x29/0xe8 [ 34.023708] Dumping ftrace buffer: [ 34.027221] (ftrace buffer empty) [ 34.030900] Kernel Offset: disabled [ 34.034494] Rebooting in 86400 seconds..