[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [ 61.371747][ T24] audit: type=1800 audit(1558136748.242:25): pid=8976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="cron" dev="sda1" ino=2414 res=0 [ 61.417733][ T24] audit: type=1800 audit(1558136748.242:26): pid=8976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="mcstrans" dev="sda1" ino=2457 res=0 [ 61.459266][ T24] audit: type=1800 audit(1558136748.252:27): pid=8976 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="startpar" name="restorecond" dev="sda1" ino=2436 res=0 [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 Warning: Permanently added '10.128.0.252' (ECDSA) to the list of known hosts. 2019/05/17 23:46:00 fuzzer started 2019/05/17 23:46:03 dialing manager at 10.128.0.26:37669 2019/05/17 23:46:03 syscalls: 1006 2019/05/17 23:46:03 code coverage: enabled 2019/05/17 23:46:03 comparison tracing: enabled 2019/05/17 23:46:03 extra coverage: extra coverage is not supported by the kernel 2019/05/17 23:46:03 setuid sandbox: enabled 2019/05/17 23:46:03 namespace sandbox: enabled 2019/05/17 23:46:03 Android sandbox: /sys/fs/selinux/policy does not exist 2019/05/17 23:46:03 fault injection: enabled 2019/05/17 23:46:03 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2019/05/17 23:46:03 net packet injection: enabled 2019/05/17 23:46:03 net device setup: enabled 23:46:04 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe16, 0x0, 0x0, 0xffffffffffffffa0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") shutdown(r0, 0x1) syzkaller login: [ 78.232229][ T9143] IPVS: ftp: loaded support on port[0] = 21 [ 78.242987][ T9143] NET: Registered protocol family 30 [ 78.249443][ T9143] Failed to register TIPC socket type 23:46:05 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f319bd070") r1 = socket$inet6(0xa, 0x80002, 0x0) r2 = socket(0x1a, 0x2, 0x0) setsockopt$netlink_NETLINK_LISTEN_ALL_NSID(r2, 0x10e, 0x8, &(0x7f00000001c0)=0x1ff, 0x4) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f0000000000)={@loopback, 0x8, 0x0, 0xff, 0x100000000000001}, 0xfffffffffffffffb) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote, 0x6}, 0x1c) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0xffffffffffffff7c, &(0x7f00000bfff0)={&(0x7f0000006440)=@updpolicy={0xb8, 0x19, 0x1, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NODE_GET(r2, &(0x7f0000000380)={&(0x7f0000000200), 0xc, &(0x7f0000000340)={&(0x7f0000000280)={0xa0, r4, 0x4, 0x70bd29, 0x25dfdbfe, {}, [@TIPC_NLA_LINK={0x4}, @TIPC_NLA_LINK={0x88, 0x4, [@TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_PROP={0x1c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x98bf}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1970}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}]}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xd82}]}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x400c805}, 0x4000000) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, &(0x7f00000000c0)={@mcast2={0xff, 0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa4ffffff]}, 0x800, 0x0, 0xff}, 0x21) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000100)={0x9, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, &(0x7f0000000180)=0x28) 23:46:05 executing program 2: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'rfc4309(morus1280-avx2)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x5, 0x0, 0x0) [ 78.553897][ T9145] IPVS: ftp: loaded support on port[0] = 21 [ 78.564992][ T9145] NET: Registered protocol family 30 [ 78.588087][ T9145] Failed to register TIPC socket type [ 78.865934][ T9147] IPVS: ftp: loaded support on port[0] = 21 [ 78.892784][ T9147] NET: Registered protocol family 30 [ 78.908122][ T9147] Failed to register TIPC socket type 23:46:06 executing program 3: r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0xb, 0x7f, 0x7, 0x5, 0x1}, 0x2c) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000140)={r0, &(0x7f0000000040), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={0xffffffffffffffff, &(0x7f0000000000)="827021baca", 0x0}, 0x18) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000000)={r0, &(0x7f0000000180), 0x0}, 0x18) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r0, &(0x7f0000000000), 0x0}, 0x20) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000180)={r0, &(0x7f00000003c0), 0x0}, 0x18) [ 79.373956][ T9149] IPVS: ftp: loaded support on port[0] = 21 [ 79.392767][ T9149] NET: Registered protocol family 30 [ 79.418305][ T9149] Failed to register TIPC socket type 23:46:06 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000000)='team\x00') sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f000000e640)={0x0, 0x3, &(0x7f0000000080)={&(0x7f000000dd40)={0x20, r1, 0x105, 0x0, 0x0, {0x3803}, [{{0x8}, {0x4}}]}, 0x20}}, 0x0) [ 80.071919][ T9151] IPVS: ftp: loaded support on port[0] = 21 [ 80.102296][ T9151] NET: Registered protocol family 30 [ 80.107872][ T9151] Failed to register TIPC socket type 23:46:07 executing program 5: socket$kcm(0x10, 0x2000400000003, 0x10) r0 = syz_init_net_socket$ax25(0x3, 0x3, 0xc7) sendto(r0, &(0x7f0000000180)="029b196bd726766f2eb023a81492e51729a18b255e812b8aa9414525e4bbbbeb1e9920049617f60ca672b7e7c1ad2dc3363a37afdfd0369af5c60be71c979e8ff7b00ba73bfc976f0871fe60ec80eb568cf714c300be69f59fb7c2c58cc97c908487ba8c9081eb98b60a6434b920f7fd14644550610fa40c8ee490b9fc567b15124998a01001b55718b673611444c8f0eb1f30f2e6444e138c931028e97280467afd806aa6", 0xa5, 0x20000000, 0x0, 0x0) r1 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000001240)="2e0000002800813ee45ae087185082cf0400b0eba06ec4000023000500000800000000000000000051894dd65b2f", 0x2e}], 0x1}, 0x0) [ 80.786237][ T9153] IPVS: ftp: loaded support on port[0] = 21 [ 80.823971][ T9153] NET: Registered protocol family 30 [ 80.848069][ T9153] Failed to register TIPC socket type [ 81.170485][ T9143] chnl_net:caif_netlink_parms(): no params data found [ 81.590912][ T9143] bridge0: port 1(bridge_slave_0) entered blocking state [ 81.698151][ T9143] bridge0: port 1(bridge_slave_0) entered disabled state [ 81.789241][ T9143] device bridge_slave_0 entered promiscuous mode [ 81.864983][ T9143] bridge0: port 2(bridge_slave_1) entered blocking state [ 81.978383][ T9143] bridge0: port 2(bridge_slave_1) entered disabled state [ 82.102574][ T9143] device bridge_slave_1 entered promiscuous mode [ 82.572609][ T9143] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 82.962914][ T9143] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 83.634427][ T9143] team0: Port device team_slave_0 added [ 84.114599][ T9143] team0: Port device team_slave_1 added [ 85.204721][ T9143] device hsr_slave_0 entered promiscuous mode [ 85.552162][ T9143] device hsr_slave_1 entered promiscuous mode [ 88.103522][ T9143] 8021q: adding VLAN 0 to HW filter on device bond0 [ 88.810108][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 88.849767][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 89.011197][ T9143] 8021q: adding VLAN 0 to HW filter on device team0 [ 89.384200][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 89.469905][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 89.649703][ T3485] bridge0: port 1(bridge_slave_0) entered blocking state [ 89.657105][ T3485] bridge0: port 1(bridge_slave_0) entered forwarding state [ 90.049504][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 90.057948][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 90.259081][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 90.449392][ T22] bridge0: port 2(bridge_slave_1) entered blocking state [ 90.456514][ T22] bridge0: port 2(bridge_slave_1) entered forwarding state [ 90.724321][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 90.920359][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 91.101690][ T9236] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 91.150264][ T9236] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 91.403086][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 91.450444][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 91.571285][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 91.790214][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 91.969929][ T22] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 92.188586][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 92.220687][ T3485] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 92.419030][ T9143] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 92.979300][ T9143] 8021q: adding VLAN 0 to HW filter on device batadv0 23:46:23 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe16, 0x0, 0x0, 0xffffffffffffffa0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") shutdown(r0, 0x1) 23:46:24 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe16, 0x0, 0x0, 0xffffffffffffffa0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") shutdown(r0, 0x1) 23:46:27 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe16, 0x0, 0x0, 0xffffffffffffffa0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") shutdown(r0, 0x1) [ 101.290668][ T9642] IPVS: ftp: loaded support on port[0] = 21 [ 101.425667][ T9644] IPVS: ftp: loaded support on port[0] = 21 [ 101.731027][ T9642] NET: Registered protocol family 30 [ 101.736374][ T9642] Failed to register TIPC socket type [ 101.765559][ T9645] IPVS: ftp: loaded support on port[0] = 21 [ 101.922124][ T9644] list_add double add: new=ffffffff89544ab0, prev=ffffffff89334ac0, next=ffffffff89544ab0. [ 102.053961][ T9646] IPVS: ftp: loaded support on port[0] = 21 [ 102.398224][ T9644] ------------[ cut here ]------------ [ 102.403733][ T9644] kernel BUG at lib/list_debug.c:29! 23:46:29 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe16, 0x0, 0x0, 0xffffffffffffffa0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") shutdown(r0, 0x1) [ 102.989019][ T9644] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 102.995230][ T9644] CPU: 1 PID: 9644 Comm: syz-executor.1 Not tainted 5.1.0+ #18 [ 103.002770][ T9644] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 103.013020][ T9644] RIP: 0010:__list_add_valid.cold+0x26/0x3c [ 103.018919][ T9644] Code: 56 ff ff ff 4c 89 e1 48 c7 c7 20 4c a3 87 e8 00 60 25 fe 0f 0b 48 89 f2 4c 89 e1 4c 89 ee 48 c7 c7 60 4d a3 87 e8 e9 5f 25 fe <0f> 0b 48 89 f1 48 c7 c7 e0 4c a3 87 4c 89 e6 e8 d5 5f 25 fe 0f 0b [ 103.038533][ T9644] RSP: 0018:ffff8880732efb88 EFLAGS: 00010282 [ 103.044615][ T9644] RAX: 0000000000000058 RBX: ffffffff89544920 RCX: 0000000000000000 [ 103.052591][ T9644] RDX: 0000000000000000 RSI: ffffffff815afbe6 RDI: ffffed100e65df63 [ 103.060581][ T9644] RBP: ffff8880732efba0 R08: 0000000000000058 R09: ffffed1015d06011 [ 103.068573][ T9644] R10: ffffed1015d06010 R11: ffff8880ae830087 R12: ffffffff89544ab0 [ 103.076544][ T9644] R13: ffffffff89544ab0 R14: ffffffff89544ab0 R15: ffffffff89544a50 [ 103.084529][ T9644] FS: 000000000267a940(0000) GS:ffff8880ae900000(0000) knlGS:0000000000000000 [ 103.093467][ T9644] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 103.100046][ T9644] CR2: 0000001b2f22f000 CR3: 00000000732d9000 CR4: 00000000001406e0 [ 103.108020][ T9644] Call Trace: [ 103.111314][ T9644] ? mutex_lock_nested+0x16/0x20 [ 103.116268][ T9644] proto_register+0x459/0x8e0 [ 103.120948][ T9644] ? lockdep_init_map+0x1be/0x6d0 [ 103.125975][ T9644] tipc_socket_init+0x1c/0x70 [ 103.130657][ T9644] tipc_init_net+0x32a/0x5b0 [ 103.135248][ T9644] ? tipc_exit_net+0x40/0x40 [ 103.139848][ T9644] ops_init+0xb6/0x410 [ 103.143958][ T9644] setup_net+0x2d3/0x740 [ 103.148225][ T9644] ? copy_net_ns+0x1c0/0x340 [ 103.152824][ T9644] ? ops_init+0x410/0x410 [ 103.157157][ T9644] ? kasan_check_write+0x14/0x20 [ 103.162103][ T9644] ? down_read_killable+0x51/0x220 [ 103.167230][ T9644] copy_net_ns+0x1df/0x340 [ 103.171655][ T9644] create_new_namespaces+0x400/0x7b0 [ 103.176953][ T9644] unshare_nsproxy_namespaces+0xc2/0x200 [ 103.182603][ T9644] ksys_unshare+0x440/0x980 [ 103.187116][ T9644] ? trace_hardirqs_on+0x67/0x230 [ 103.190299][ T3879] kobject: 'loop0' (00000000b418a8d3): kobject_uevent_env [ 103.192153][ T9644] ? walk_process_tree+0x2d0/0x2d0 [ 103.204389][ T9644] ? blkcg_exit_queue+0x30/0x30 [ 103.209349][ T9644] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 103.214821][ T9644] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.221075][ T9644] ? do_syscall_64+0x26/0x680 [ 103.225764][ T9644] ? lockdep_hardirqs_on+0x418/0x5d0 [ 103.231057][ T9644] __x64_sys_unshare+0x31/0x40 [ 103.235833][ T9644] do_syscall_64+0x103/0x680 [ 103.240442][ T9644] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 103.246337][ T9644] RIP: 0033:0x45b897 [ 103.250242][ T9644] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ad 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 8d 8d fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 103.269975][ T9644] RSP: 002b:00007ffc8c3ec1c8 EFLAGS: 00000206 ORIG_RAX: 0000000000000110 [ 103.278413][ T9644] RAX: ffffffffffffffda RBX: 000000000073c988 RCX: 000000000045b897 [ 103.286393][ T9644] RDX: 0000000000000000 RSI: 00007ffc8c3ec170 RDI: 0000000040000000 [ 103.294381][ T9644] RBP: 00000000000000f8 R08: 0000000000000000 R09: 0000000000000005 [ 103.302366][ T9644] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000414ab0 [ 103.310435][ T9644] R13: 0000000000414b40 R14: 0000000000000000 R15: 0000000000000000 [ 103.311971][ T3879] kobject: 'loop0' (00000000b418a8d3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 103.318438][ T9644] Modules linked in: 23:46:31 executing program 0: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x20000806, &(0x7f0000001180)={0x2, 0x4e23, @local}, 0x10) sendto$inet(r0, &(0x7f0000000000), 0xfffffffffffffe16, 0x0, 0x0, 0xffffffffffffffa0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000000)="0adc1f123c123f319bd070") shutdown(r0, 0x1) [ 104.777537][ T3879] kobject: 'loop0' (00000000b418a8d3): kobject_uevent_env [ 104.910590][ T3879] kobject: 'loop0' (00000000b418a8d3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 106.826906][ T3879] kobject: 'loop0' (00000000b418a8d3): kobject_uevent_env [ 106.926592][ T3879] kobject: 'loop0' (00000000b418a8d3): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 107.442604][ T9675] IPVS: ftp: loaded support on port[0] = 21