[....] Starting enhanced syslogd: rsyslogd[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting periodic command scheduler: cron[?25l[?1c7[ ok 8[?25h[?0c. [....] Starting OpenBSD Secure Shell server: sshd[ 25.779109] random: sshd: uninitialized urandom read (32 bytes read) [?25l[?1c7[ ok 8[?25h[?0c. Debian GNU/Linux 7 syzkaller ttyS0 syzkaller login: [ 29.002578] random: sshd: uninitialized urandom read (32 bytes read) [ 29.450283] random: sshd: uninitialized urandom read (32 bytes read) [ 30.215408] random: sshd: uninitialized urandom read (32 bytes read) Warning: Permanently added '10.128.15.206' (ECDSA) to the list of known hosts. [ 35.907919] random: sshd: uninitialized urandom read (32 bytes read) 2018/09/12 10:07:48 fuzzer started [ 37.213820] random: cc1: uninitialized urandom read (8 bytes read) 2018/09/12 10:07:50 dialing manager at 10.128.0.26:42863 2018/09/12 10:07:51 syscalls: 1 2018/09/12 10:07:51 code coverage: enabled 2018/09/12 10:07:51 comparison tracing: enabled 2018/09/12 10:07:51 setuid sandbox: enabled 2018/09/12 10:07:51 namespace sandbox: enabled 2018/09/12 10:07:51 fault injection: enabled 2018/09/12 10:07:51 leak checking: CONFIG_DEBUG_KMEMLEAK is not enabled 2018/09/12 10:07:51 net packed injection: enabled 2018/09/12 10:07:51 net device setup: enabled [ 39.809182] random: crng init done 10:12:12 executing program 0: clone(0x2102001ff9, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) pipe(&(0x7f0000000040)={0xffffffffffffffff}) getsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000140)={@loopback, @broadcast, @rand_addr}, &(0x7f0000000180)=0xc) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$TUNSETVNETBE(r0, 0x400454de, &(0x7f0000000080)) ioctl$sock_inet_SIOCGARP(0xffffffffffffff9c, 0x8954, &(0x7f0000000280)={{0x2, 0x0, @rand_addr}, {0x7, @link_local}, 0x0, {0x2, 0xffffffffffffffff, @rand_addr=0x2}, 'ip6_vti0\x00'}) 10:12:12 executing program 1: clone(0x1000802102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f00000002c0), 0xffffffffffffffff) r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/zero\x00', 0x200, 0x0) r1 = getpid() sendmmsg(r0, &(0x7f00000007c0)=[{{0x0, 0x0, &(0x7f0000000480), 0x0, &(0x7f0000000580)}}], 0x1, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) ioctl$TIOCMGET(r0, 0x5415, &(0x7f0000000180)) ioctl$TIOCMBIC(0xffffffffffffffff, 0x5417, &(0x7f0000000040)) fsetxattr$trusted_overlay_origin(r0, &(0x7f00000000c0)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x0) 10:12:12 executing program 5: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000300)='/dev/vcsa#\x00', 0x0, 0x0) r1 = getpid() pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000240)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) sched_setscheduler(r1, 0x5, &(0x7f0000000000)) setsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000080), 0x4) rt_sigtimedwait(&(0x7f00000000c0), 0x0, &(0x7f0000000100), 0x8) getresgid(&(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000200)) 10:12:12 executing program 2: creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$RTC_PLL_SET(0xffffffffffffffff, 0x40207012, &(0x7f0000000040)) mount(&(0x7f0000000080)=ANY=[], &(0x7f0000000340)='./file0\x00', &(0x7f00000003c0)='9p\x00', 0x0, 0x0) mount(&(0x7f0000000480)=ANY=[], &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='rootfs\x00', 0x0, &(0x7f00000005c0)='/selinux/avc/cache_stats\x00') ioctl$PIO_FONTRESET(0xffffffffffffffff, 0x4b6d, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000600)=@filter={'filter\x00', 0xe, 0x4, 0x310, 0x0, 0xf8, 0xf8, 0x218, 0xf8, 0x2d8, 0x2d8, 0x2d8, 0x2d8, 0x2d8, 0x4, &(0x7f0000000080), {[{{@uncond, 0x0, 0x98, 0xf8}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @random="f985b8d6431e"}}}, {{@uncond, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}, {{@ip={@multicast1, @remote, 0x0, 0x0, 'teql0\x00', 'ip6gre0\x00'}, 0x0, 0x98, 0xc0}, @REJECT={0x28, 'REJECT\x00'}}], {{[], 0x0, 0x70, 0x98}, {0x28}}}}, 0x370) ioctl$LOOP_SET_BLOCK_SIZE(0xffffffffffffffff, 0x4c09, 0x0) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)) seccomp(0x1, 0x0, &(0x7f0000000140)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x100000058fe4}]}) syz_execute_func(&(0x7f0000000380)="af8055a0596969ef69dc00d99066410f60bad33f00007c2aaf200f382143fd64a741dfe0400f01efe5e57d0fecec1a1a01460f01ee31a3b786e6989f") 10:12:12 executing program 3: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = getpid() ptrace$getregs(0xe, r0, 0x2, &(0x7f0000000680)=""/4096) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) sched_setscheduler(0x0, 0x5, &(0x7f0000000200)) ioctl$FS_IOC_SETVERSION(r1, 0x40087602, &(0x7f0000000000)) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r1, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffe000/0x1000)=nil, 0x1000}, &(0x7f00000000c0)=0x10) 10:12:12 executing program 4: clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, &(0x7f0000000640), 0xffffffffffffffff) r0 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x0, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000200)) ioctl$EXT4_IOC_SWAP_BOOT(0xffffffffffffffff, 0x6611) bind(r0, &(0x7f0000000000)=@in6={0xa, 0x0, 0x4, @mcast1, 0x5}, 0x80) ioctl$TIOCLINUX7(r0, 0x541c, &(0x7f0000004900)={0x7, 0xffffffff}) lseek(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000280)={{{@in6=@dev, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@dev}}, &(0x7f0000000380)=0xe8) getresgid(&(0x7f00000003c0)=0x0, &(0x7f0000000400), &(0x7f0000000440)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000480)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@multicast1}}, &(0x7f0000000580)=0xe8) r5 = dup2(r0, r0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000680)={{{@in=@rand_addr, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6}}, &(0x7f0000000780)=0xe8) lstat(&(0x7f00000007c0)='./file0\x00', &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$IPT_SO_GET_ENTRIES(r0, 0x0, 0x41, &(0x7f0000000880)={'mangle\x00', 0x4a, "28e22ae1c34b4ac4e4e2b470cc509296f396f5392601f647bf0261ea506080d322a0f04ad6570fd51cbb01e446380e2566cab9acf90ad83ff1179967bfd46f37aae53b63bb6ad09aa6c6"}, &(0x7f0000000900)=0x6e) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000041c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@mcast2}}, &(0x7f00000042c0)=0xe8) fsetxattr$system_posix_acl(r5, &(0x7f0000004940)='system.posix_acl_default\x00', &(0x7f0000004980)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x3, r7}, {0x2, 0x6, r4}, {0x2, 0x0, r4}, {0x2, 0x4}, {0x2, 0x4, r2}, {0x2, 0x4, r9}, {0x2, 0x1}], {0x4, 0x1}, [{0x8, 0x6}, {0x8, 0x2}, {0x8, 0x6}, {}], {0x10, 0x1}, {0x20, 0x1}}, 0x84, 0x2) getgroups(0x5, &(0x7f0000004300)=[0xee00, 0x0, 0xee00, 0x0, 0xffffffffffffffff]) sendmsg$nl_route(r0, &(0x7f0000004800)={&(0x7f0000004600)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f00000047c0)={&(0x7f0000004640)=@getlink={0x30, 0x12, 0xc00, 0x70bd25, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x1000, 0x80}, [@IFLA_PHYS_PORT_ID={0x8, 0x22, "5337498a"}, @IFLA_LINKMODE={0x8, 0x11, 0xbc}]}, 0x30}, 0x1, 0x0, 0x0, 0x1}, 0x4081) accept4$unix(r5, &(0x7f0000004580), &(0x7f00000005c0)=0xf9, 0x804) r11 = getgid() sendmmsg$unix(r0, &(0x7f0000004500)=[{&(0x7f00000000c0)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000240)=[{&(0x7f0000000180)="0a81af658b2015a5505bc67a0d818addb7471680e2f64963371e3f20af187cf5587ffa7fa78a44fa419be73190e8869d4c88313eb274f1bd0b457b0631a69d63b0cb32ffc1842f87b7cfe1af", 0x4c}], 0x1, &(0x7f0000000a00)=[@rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r1, r2, r3}, @cred={0x20, 0x1, 0x2, r1, r4}, @cred={0x20, 0x1, 0x2, r1, r6, r8}], 0x80, 0x20000000}, {&(0x7f0000000ac0)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000004100)=[{&(0x7f0000004040)="7ec777ed08a7742612544d716177296f54d2aef60866c311ca68037175fa4983285ea87545457b36", 0x28}], 0x1, &(0x7f0000004400)=[@rights={0x18, 0x1, 0x1, [r0, r0]}, @rights={0x20, 0x1, 0x1, [r0, r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r1, r9, r10}, @rights={0x20, 0x1, 0x1, [r0, r0, r0]}, @cred={0x20, 0x1, 0x2, r1, 0x0, r11}, @rights={0x30, 0x1, 0x1, [r0, r0, r0, r0, r0, r0, r0, r0]}], 0xc8}], 0x2, 0x5) [ 299.929994] IPVS: ftp: loaded support on port[0] = 21 [ 299.948248] IPVS: ftp: loaded support on port[0] = 21 [ 299.967183] IPVS: ftp: loaded support on port[0] = 21 [ 299.976558] IPVS: ftp: loaded support on port[0] = 21 [ 300.017958] IPVS: ftp: loaded support on port[0] = 21 [ 300.023578] kasan: CONFIG_KASAN_INLINE enabled [ 300.028408] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 300.035784] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 300.042008] CPU: 1 PID: 5580 Comm: syz-executor3 Not tainted 4.19.0-rc3-next-20180912+ #72 [ 300.047319] kobject: 'tunl0' (00000000d6132101): kobject_add_internal: parent: 'net', set: 'devices' [ 300.050417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 300.061039] kobject: 'tunl0' (00000000d6132101): kobject_uevent_env [ 300.069190] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 300.069209] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 300.075861] kobject: 'tunl0' (00000000d6132101): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 300.080358] RSP: 0018:ffff88015e2e7928 EFLAGS: 00010206 [ 300.080370] RAX: dffffc0000000000 RBX: ffff8801cb6d0e00 RCX: ffffffff8160aca1 [ 300.080378] RDX: 01d2f5b5adb5cd2b RSI: ffffffff833deb15 RDI: 0e97adad6dae6959 [ 300.080385] RBP: ffff88015e2e7948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 300.080393] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801d7a7ee40 [ 300.080401] R13: 0e97adad6dae6951 R14: ffff8801cb6d0e98 R15: ffff8801cb6d0e98 [ 300.080417] FS: 00000000014fd940(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 300.103821] kobject: 'queues' (00000000b7fe8287): kobject_add_internal: parent: 'tunl0', set: '' [ 300.108575] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 300.108584] CR2: 0000000000482e00 CR3: 000000015e18e000 CR4: 00000000001406e0 [ 300.108593] Call Trace: [ 300.108720] vfs_get_tree+0x1cb/0x5c0 [ 300.108741] mq_create_mount+0xe3/0x190 [ 300.115482] kobject: 'queues' (00000000b7fe8287): kobject_uevent_env [ 300.121394] mq_init_ns+0x15a/0x210 [ 300.121405] copy_ipcs+0x3d2/0x580 [ 300.121416] ? ipcns_get+0xe0/0xe0 [ 300.121487] ? do_mount+0x1db0/0x1db0 [ 300.121535] ? kmem_cache_alloc+0x33a/0x730 [ 300.129317] kobject: 'queues' (00000000b7fe8287): kobject_uevent_env: filter function caused the event to drop! [ 300.136133] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.143853] kobject: 'rx-0' (00000000a011c8bc): kobject_add_internal: parent: 'queues', set: 'queues' [ 300.150659] ? perf_event_namespaces+0x136/0x400 [ 300.150714] create_new_namespaces+0x376/0x900 [ 300.159454] kobject: 'rx-0' (00000000a011c8bc): kobject_uevent_env [ 300.168346] ? sys_ni_syscall+0x20/0x20 [ 300.168365] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 300.168455] ? ns_capable_common+0x13f/0x170 [ 300.175008] kobject: 'rx-0' (00000000a011c8bc): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 300.181523] unshare_nsproxy_namespaces+0xc3/0x1f0 [ 300.181591] ksys_unshare+0x79c/0x10b0 [ 300.181615] ? walk_process_tree+0x440/0x440 [ 300.185403] kobject: 'tx-0' (0000000058d64290): kobject_add_internal: parent: 'queues', set: 'queues' [ 300.188035] ? lock_downgrade+0x900/0x900 [ 300.188055] ? kasan_check_read+0x11/0x20 [ 300.193153] kobject: 'tx-0' (0000000058d64290): kobject_uevent_env [ 300.198497] ? do_raw_spin_unlock+0xa7/0x2f0 [ 300.198511] ? do_raw_spin_trylock+0x1c0/0x1c0 [ 300.198528] ? kasan_check_write+0x14/0x20 [ 300.198540] ? do_raw_read_unlock+0x3f/0x60 [ 300.198586] ? do_syscall_64+0x9a/0x820 [ 300.203473] kobject: 'tx-0' (0000000058d64290): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 300.205712] ? do_syscall_64+0x9a/0x820 [ 300.210335] kobject: 'gre0' (0000000052f4fff2): kobject_add_internal: parent: 'net', set: 'devices' [ 300.213035] ? lockdep_hardirqs_on+0x421/0x5c0 [ 300.218738] kobject: 'gre0' (0000000052f4fff2): kobject_uevent_env [ 300.227631] ? trace_hardirqs_on+0xbd/0x310 [ 300.227736] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.233867] kobject: 'gre0' (0000000052f4fff2): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 300.242525] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 300.242573] ? __ia32_sys_prlimit64+0x8c0/0x8c0 [ 300.242593] __x64_sys_unshare+0x31/0x40 [ 300.247828] kobject: 'queues' (00000000ca5ed072): kobject_add_internal: parent: 'gre0', set: '' [ 300.251913] do_syscall_64+0x1b9/0x820 [ 300.258838] kobject: 'queues' (00000000ca5ed072): kobject_uevent_env [ 300.262416] ? entry_SYSCALL_64_after_hwframe+0x3e/0xbe [ 300.268323] kobject: 'queues' (00000000ca5ed072): kobject_uevent_env: filter function caused the event to drop! [ 300.272340] ? syscall_return_slowpath+0x5e0/0x5e0 [ 300.282920] kobject: 'rx-0' (00000000f8543a3b): kobject_add_internal: parent: 'queues', set: 'queues' [ 300.287465] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.287482] ? trace_hardirqs_on_caller+0x310/0x310 [ 300.287497] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 300.287516] ? prepare_exit_to_usermode+0x291/0x3b0 [ 300.292400] kobject: 'rx-0' (00000000f8543a3b): kobject_uevent_env [ 300.295791] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 300.305513] kobject: 'rx-0' (00000000f8543a3b): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 300.309274] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 300.309285] RIP: 0033:0x459d87 [ 300.309300] Code: 00 00 00 b8 63 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 10 01 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d 8a fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 300.309312] RSP: 002b:00007fff10eb7b28 EFLAGS: 00000246 [ 300.314313] kobject: 'tx-0' (000000000dedb7ef): kobject_add_internal: parent: 'queues', set: 'queues' [ 300.319754] ORIG_RAX: 0000000000000110 [ 300.319763] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000459d87 [ 300.319771] RDX: 0000000000000000 RSI: 00007fff10eb7b30 RDI: 0000000008000000 [ 300.319779] RBP: 0000000000930b28 R08: 0000000000000000 R09: 0000000000000018 [ 300.319786] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000010 [ 300.319793] R13: 0000000000412cc0 R14: 0000000000000000 R15: 0000000000000000 [ 300.319811] Modules linked in: [ 300.326957] kobject: 'tx-0' (000000000dedb7ef): kobject_uevent_env [ 300.333528] kobject: 'tx-0' (000000000dedb7ef): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 300.337895] ---[ end trace df5dc19b8eb78afe ]--- [ 300.343456] kobject: 'gretap0' (000000002f4b9234): kobject_add_internal: parent: 'net', set: 'devices' [ 300.352072] RIP: 0010:mqueue_get_tree+0xba/0x2e0 [ 300.352089] Code: 4c 8d b3 98 00 00 00 4d 85 ed 0f 84 d1 00 00 00 e8 6b 44 3f fe 49 8d 7d 08 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 <80> 3c 02 00 0f 85 e3 01 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8b [ 300.357702] kobject: 'gretap0' (000000002f4b9234): kobject_uevent_env [ 300.365256] RSP: 0018:ffff88015e2e7928 EFLAGS: 00010206 [ 300.370178] kobject: 'gretap0' (000000002f4b9234): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 300.376183] RAX: dffffc0000000000 RBX: ffff8801cb6d0e00 RCX: ffffffff8160aca1 [ 300.376190] RDX: 01d2f5b5adb5cd2b RSI: ffffffff833deb15 RDI: 0e97adad6dae6959 [ 300.376199] RBP: ffff88015e2e7948 R08: fffffbfff13555fd R09: fffffbfff13555fc [ 300.376212] R10: fffffbfff13555fc R11: ffffffff89aaafe3 R12: ffff8801d7a7ee40 [ 300.381962] kobject: 'queues' (00000000c9caf628): kobject_add_internal: parent: 'gretap0', set: '' [ 300.385879] R13: 0e97adad6dae6951 R14: ffff8801cb6d0e98 R15: ffff8801cb6d0e98 [ 300.395378] kobject: 'queues' (00000000c9caf628): kobject_uevent_env [ 300.400478] FS: 00000000014fd940(0000) GS:ffff8801dad00000(0000) knlGS:0000000000000000 [ 300.400492] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 300.405866] kobject: 'queues' (00000000c9caf628): kobject_uevent_env: filter function caused the event to drop! [ 300.409240] CR2: 0000000000482e00 CR3: 000000015e18e000 CR4: 00000000001406e0 [ 300.409252] Kernel panic - not syncing: Fatal exception [ 300.420229] kobject: 'rx-0' (000000002951168a): kobject_add_internal: parent: 'queues', set: 'queues' [ 300.429885] Kernel Offset: disabled [ 300.763559] Rebooting in 86400 seconds..