[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 25.852901] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. [ 27.178440] random: sshd: uninitialized urandom read (32 bytes read) Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 27.650706] random: sshd: uninitialized urandom read (32 bytes read) [ 28.448745] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.10.24' (ECDSA) to the list of known hosts. [ 34.265314] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/12 07:50:38 fuzzer started [ 35.466539] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/12 07:50:40 dialing manager at 10.128.0.26:42863 2018/09/12 07:50:41 syscalls: 1 2018/09/12 07:50:41 code coverage: enabled 2018/09/12 07:50:41 comparison tracing: enabled 2018/09/12 07:50:41 setuid sandbox: enabled 2018/09/12 07:50:41 namespace sandbox: enabled 2018/09/12 07:50:41 fault injection: enabled 2018/09/12 07:50:41 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/12 07:50:41 net packed injection: enabled 2018/09/12 07:50:41 net device setup: enabled [ 38.233837] random: crng init done 07:54:31 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x16, &(0x7f0000000140)=ANY=[@ANYBLOB="61128c000000000061134c0000000000bf2000000000000007000000080000002d0301000000000095000000000000006926000000000000bf67000000000000570600000f0000006706000002000000070600000ee60000bf050000000000001f650000000000006707000002000000070700004c0000001f75000000000000bf54000000000000070400000400f9ffbd43010000000000950000000000000005000000000000009500000000000000"], &(0x7f0000000100)='GPL\x00'}, 0x48) 07:54:31 executing program 1: socket$packet(0x11, 0x3, 0x300) perf_event_open(&(0x7f0000000180)={0x2, 0x70, 0x3e5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$packet(0x11, 0x2, 0x300) r0 = socket$kcm(0x11, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000200)={&(0x7f00000000c0)=@nfc={0x27, 0x3, 0x0, 0xffffff7f}, 0x80}, 0x0) 07:54:31 executing program 5: getpid() capset(&(0x7f0000000040), &(0x7f0000000080)) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000380)="42568055a07a7a69ef69dc00d990c841ff0f1837d9cb0f38d4c4022d9b65fec19086d9f28fc9e5e5c422c98c56002b74742e1a1a010d64ac1e5d31a3b786e2989f7f") 07:54:31 executing program 2: memfd_create(&(0x7f0000000040)='$}posix_acl_access\x00', 0x0) write$P9_RMKNOD(0xffffffffffffffff, &(0x7f00000001c0)={0x14}, 0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000400)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e54175455d0f2e1a1a010d64ac1e5d31a3b786e2989f7f") dup2(0xffffffffffffff9c, 0xffffffffffffffff) getpid() getpgid(0x0) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000004c0)) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000002c0)={{{@in6=@mcast2, @in6=@mcast1}}, {{@in=@broadcast}, 0x0, @in=@loopback}}, &(0x7f00000000c0)=0xe8) getpgrp(0x0) ioctl$UI_END_FF_UPLOAD(0xffffffffffffffff, 0x406855c9, &(0x7f0000000140)={0x0, 0x0, {0x0, 0x0, 0x0, {}, {}, @cond}}) rt_sigprocmask(0x0, &(0x7f0000000080), &(0x7f0000000200), 0x8) 07:54:31 executing program 3: syslog(0x0, &(0x7f0000000380)=""/147, 0x93) open(&(0x7f0000000540)='./file0\x00', 0x0, 0x0) syz_genetlink_get_family_id$team(&(0x7f0000000700)='team\x00') getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000980)={{{@in6, @in6}}, {{}, 0x0, @in6=@dev}}, &(0x7f0000000a80)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000ac0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000b00)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000002440)={0x0, @multicast2, @loopback}, &(0x7f0000002480)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000002600)={0x0, @loopback, @loopback}, &(0x7f0000002640)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002780)={'irlan0\x00'}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000003e40)={{{@in6=@mcast2, @in=@dev}}, {{@in6=@remote}, 0x0, @in=@multicast1}}, &(0x7f0000003f40)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000004040)={{{@in6=@ipv4, @in=@loopback}}, {{}, 0x0, @in=@broadcast}}, &(0x7f0000004140)=0xe8) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000041c0)={{{@in=@rand_addr, @in=@multicast2}}, {{@in6=@mcast1}, 0x0, @in6=@mcast1}}, &(0x7f00000042c0)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000004300)={{{@in, @in6}}, {{@in6=@mcast2}, 0x0, @in6=@ipv4}}, &(0x7f0000004400)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000004440)={{{@in6=@dev, @in6=@mcast2}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000004540)=0xe8) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x0, &(0x7f0000004580)={@dev}, &(0x7f00000045c0)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000004640)={@broadcast}, &(0x7f0000004680)=0xc) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000004780)={'team0\x00'}) getsockname$packet(0xffffffffffffff9c, &(0x7f00000047c0), &(0x7f0000004800)=0x14) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000004840)={0x0, @dev, @multicast1}, &(0x7f0000004880)=0xc) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f00000048c0)={@multicast1, @multicast2}, &(0x7f0000004900)=0xc) sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, &(0x7f0000004f40)={&(0x7f00000006c0), 0xc, &(0x7f0000004f00)={&(0x7f0000004940)={0x14}, 0x14}}, 0x0) socket$unix(0x1, 0x0, 0x0) openat$pfkey(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/net/pfkey\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040), &(0x7f0000000080)) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000680)={0xffffffffffffffff, &(0x7f0000000480), &(0x7f0000000580)=""/214}, 0x18) timer_delete(0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000002c80)) getresuid(&(0x7f00000008c0), &(0x7f0000000900), &(0x7f0000000940)) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000380)) recvmsg(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f00000004c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000080), 0x0, &(0x7f00000016c0)=""/231, 0xe7}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f0000001b40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001b80)=0x14) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000001a00)={&(0x7f0000000440), 0xc, &(0x7f00000019c0)={&(0x7f0000001980)=@getlink={0x20}, 0x20}}, 0x0) futex(&(0x7f00000000c0), 0x0, 0x0, &(0x7f0000000300), &(0x7f00000001c0), 0x0) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4000000000058fe4}]}) pipe(&(0x7f0000000480)) add_key$user(&(0x7f00000017c0)='user\x00', &(0x7f0000001800), &(0x7f0000001840), 0x0, 0xfffffffffffffffb) add_key(&(0x7f00000018c0)='id_resolver\x00', &(0x7f0000001a40), &(0x7f0000001a80), 0x0, 0x0) keyctl$link(0x8, 0x0, 0x0) accept$packet(0xffffffffffffff9c, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) futex(&(0x7f0000000200), 0x0, 0x0, &(0x7f0000000240), &(0x7f00000002c0), 0x0) ioctl$BLKZEROOUT(0xffffffffffffffff, 0x127f, &(0x7f0000000180)) syz_execute_func(&(0x7f0000000800)="428055a0636969ef69dc00d9c421a05d2f8a20f2420f58410dc3397c2a0f0fcdae300f38211a40a5c07f41dfe0400f01efe5e57d0fecec1a1a01460f01ee45dfde9f") 07:54:31 executing program 4: futex(&(0x7f0000000040), 0x4, 0x0, &(0x7f00000001c0)={0x0, 0x989680}, &(0x7f0000000140), 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000440)='/proc/sys/net/ipv4/vs/backup_only\x00', 0x2, 0x0) syz_genetlink_get_family_id$team(&(0x7f00000004c0)='team\x00') ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000500)={'team0\x00'}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f00000006c0)={{{@in6=@dev, @in6=@ipv4={[], [], @broadcast}}}, {{@in=@rand_addr}, 0x0, @in6=@local}}, &(0x7f0000000580)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000007c0)={{{@in=@dev, @in=@dev}}, {{@in=@multicast2}, 0x0, @in6=@mcast2}}, &(0x7f00000008c0)=0xe8) accept$packet(0xffffffffffffff9c, &(0x7f0000001900)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000001940)=0xd) getsockname$packet(0xffffffffffffff9c, &(0x7f0000001a00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000001a40)=0x14) seccomp(0x1, 0x0, &(0x7f0000000100)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x58fe4}]}) syz_execute_func(&(0x7f0000000040)="428055a08e6969ef69dc00d990c841ff0f1837c4c3397c2a060f38211a40a5c19086d9f28fc9410feefae5e5f6175d1a01c4c129758298c87b6a31a3b786e2989fc421fae62dff7ad536") ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000001d80)={'vcan0\x00'}) syz_execute_func(&(0x7f0000001400)="42805da0610fef69dc0fc201e5eee5eeff0faa0faa370f38211ac4c19086d9f28fc9410feefac421e572f1f0a6e5e54175440f2e1ac4010d64ac1e5d31a3b7c44379dfb9d6adbe90dfc4c3916efafe9f7f") [ 267.104451] IPVS: ftp: loaded support on port[0] = 21 [ 267.115049] IPVS: ftp: loaded support on port[0] = 21 [ 267.119394] IPVS: ftp: loaded support on port[0] = 21 [ 267.126788] IPVS: ftp: loaded support on port[0] = 21 [ 267.153434] IPVS: ftp: loaded support on port[0] = 21 [ 267.156384] kasan: CONFIG_KASAN_INLINE enabled [ 267.163442] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 267.164460] kobject: 'lo' (00000000ef3a2758): kobject_uevent_env [ 267.170880] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 267.179846] kobject: 'lo' (00000000ef3a2758): fill_kobj_path: path = '/devices/virtual/net/lo' [ 267.183268] CPU: 1 PID: 5597 Comm: syz-executor4 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 267.192128] kobject: 'queues' (0000000014e8d254): kobject_add_internal: parent: 'lo', set: '' [ 267.200413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 267.200437] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 267.200454] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 267.209667] kobject: 'queues' (0000000014e8d254): kobject_uevent_env [ 267.219070] RSP: 0018:ffff88016416f928 EFLAGS: 00010202 [ 267.219083] RAX: dffffc0000000000 RBX: ffff8801cbf34c80 RCX: ffffffff8160aca1 [ 267.219091] RDX: 0000005800000023 RSI: ffffffff833deb15 RDI: 000002c000000118 [ 267.219099] RBP: ffff88016416f948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 267.219113] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801d7b2fa00 [ 267.223896] kobject: 'queues' (0000000014e8d254): kobject_uevent_env: filter function caused the event to drop! [ 267.242796] R13: 000002c000000110 R14: ffff8801cbf34d18 R15: ffff8801cbf34d18 [ 267.242807] FS: 00000000022b0940(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 267.242816] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 267.242824] CR2: 0000000000482e00 CR3: 000000016412f000 CR4: 00000000001406e0 [ 267.242833] Call Trace: [ 267.249347] kobject: 'rx-0' (00000000ca88b0e9): kobject_add_internal: parent: 'queues', set: 'queues' [ 267.254703] vfs_get_tree+0x1cb/0x5c0 [ 267.254720] mq_create_mount+0xe3/0x190 [ 267.254733] mq_init_ns+0x15a/0x210 [ 267.254769] copy_ipcs+0x3d2/0x580 [ 267.254781] ? ipcns_get+0xe0/0xe0 [ 267.254797] ? do_mount+0x1db0/0x1db0 [ 267.254815] ? kmem_cache_alloc+0x33a/0x730 [ 267.262243] kobject: 'rx-0' (00000000ca88b0e9): kobject_uevent_env [ 267.269389] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.276830] kobject: 'rx-0' (00000000ca88b0e9): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 267.283928] ? perf_event_namespaces+0x136/0x400 [ 267.283947] create_new_namespaces+0x376/0x900 [ 267.283965] ? sys_ni_syscall+0x20/0x20 [ 267.283984] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 267.294351] kobject: 'tx-0' (000000006957f6fa): kobject_add_internal: parent: 'queues', set: 'queues' [ 267.301487] ? ns_capable_common+0x13f/0x170 [ 267.301505] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 267.301525] ksys_unshare+0x79c/0x10b0 [ 267.310031] kobject: 'tx-0' (000000006957f6fa): kobject_uevent_env [ 267.315672] ? walk_process_tree+0x440/0x440 [ 267.323093] kobject: 'tx-0' (000000006957f6fa): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 267.325609] ? lock_downgrade+0x900/0x900 [ 267.336900] kobject: 'tunl0' (00000000b88bea0d): kobject_add_internal: parent: 'net', set: 'devices' [ 267.338792] ? kasan_check_read+0x11/0x20 [ 267.343705] kobject: 'tunl0' (00000000b88bea0d): kobject_uevent_env [ 267.346425] ? do_raw_spin_unlock+0xa7/0x2f0 [ 267.350058] kobject: 'tunl0' (00000000b88bea0d): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 267.353506] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 267.357377] kobject: 'queues' (00000000c5ab239a): kobject_add_internal: parent: 'tunl0', set: '' [ 267.361628] ? kasan_check_write+0x14/0x20 [ 267.361642] ? do_raw_read_unlock+0x3f/0x60 [ 267.361661] ? do_syscall_64+0x9a/0x820 [ 267.367995] kobject: 'queues' (00000000c5ab239a): kobject_uevent_env [ 267.373522] ? do_syscall_64+0x9a/0x820 [ 267.373546] ? lockdep_hardirqs_on+0x421/0x5c0 [ 267.373570] ? trace_hardirqs_on+0xbd/0x310 [ 267.383587] kobject: 'queues' (00000000c5ab239a): kobject_uevent_env: filter function caused the event to drop! [ 267.388309] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.397535] kobject: 'rx-0' (000000004ff9027c): kobject_add_internal: parent: 'queues', set: 'queues' [ 267.402408] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 267.402424] ? __ia32_sys_prlimit64+0x8c0/0x8c0 [ 267.402443] __x64_sys_unshare+0x31/0x40 [ 267.402459] do_syscall_64+0x1b9/0x820 [ 267.402479] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 267.413002] kobject: 'rx-0' (000000004ff9027c): kobject_uevent_env [ 267.416790] ? syscall_return_slowpath+0x5e0/0x5e0 [ 267.422168] kobject: 'rx-0' (000000004ff9027c): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 267.425700] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.432530] kobject: 'tx-0' (00000000f6bf9f84): kobject_add_internal: parent: 'queues', set: 'queues' [ 267.436446] ? trace_hardirqs_on_caller+0x310/0x310 [ 267.446998] kobject: 'tx-0' (00000000f6bf9f84): kobject_uevent_env [ 267.450559] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 267.450575] ? prepare_exit_to_usermode+0x291/0x3b0 [ 267.450596] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 267.460417] kobject: 'tx-0' (00000000f6bf9f84): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 267.464026] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 267.471638] kobject: 'tunl0' (00000000db9546ae): kobject_add_internal: parent: 'net', set: 'devices' [ 267.474844] RIP: 0033:0x459d87 [ 267.485426] kobject: 'tunl0' (00000000db9546ae): kobject_uevent_env [ 267.488705] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 267.498667] kobject: 'tunl0' (00000000db9546ae): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 267.502485] RSP: 002b:00007ffc4b903438 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 267.502500] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459d87 [ 267.502508] RDX: 0000000000000000 RSI: 00007ffc4b903440 RDI: 0000000008000000 [ 267.502515] RBP: 0000000000930b28 R08: 0000000000000000 R09: 0000000000000018 [ 267.502523] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 267.502545] R13: 0000000000412cc0 R14: 0000000000000000 R15: 0000000000000000 [ 267.508377] kobject: 'queues' (0000000027d1a78c): kobject_add_internal: parent: 'tunl0', set: '' [ 267.510861] Modules linked in: [ 267.510988] ---[ end trace 8b32804a8e9ccb40 ]--- [ 267.517514] kobject: 'queues' (0000000027d1a78c): kobject_uevent_env [ 267.521954] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 267.521971] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 267.527796] kobject: 'queues' (0000000027d1a78c): kobject_uevent_env: filter function caused the event to drop! [ 267.530903] RSP: 0018:ffff88016416f928 EFLAGS: 00010202 [ 267.541545] kobject: 'rx-0' (00000000f979f162): kobject_add_internal: parent: 'queues', set: 'queues' [ 267.547675] RAX: dffffc0000000000 RBX: ffff8801cbf34c80 RCX: ffffffff8160aca1 [ 267.557539] kobject: 'rx-0' (00000000f979f162): kobject_uevent_env [ 267.562582] RDX: 0000005800000023 RSI: ffffffff833deb15 RDI: 000002c000000118 [ 267.562592] RBP: ffff88016416f948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 267.562607] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801d7b2fa00 [ 267.568229] kobject: 'rx-0' (00000000f979f162): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 267.571370] R13: 000002c000000110 R14: ffff8801cbf34d18 R15: ffff8801cbf34d18 [ 267.571386] FS: 00000000022b0940(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 267.576154] kobject: 'tx-0' (00000000b1ac03bb): kobject_add_internal: parent: 'queues', set: 'queues' [ 267.580666] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 267.580675] CR2: 0000000000482e00 CR3: 000000016412f000 CR4: 00000000001406e0 [ 267.580688] Kernel panic - not syncing: Fatal exception [ 267.587313] kobject: 'tx-0' (00000000b1ac03bb): kobject_uevent_env [ 267.593034] Kernel Offset: disabled [ 267.922805] Rebooting in 86400 seconds..