./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor527606551 <...> Warning: Permanently added '10.128.1.103' (ECDSA) to the list of known hosts. execve("./syz-executor527606551", ["./syz-executor527606551"], 0x7ffd07823800 /* 10 vars */) = 0 brk(NULL) = 0x5555571a5000 brk(0x5555571a5c40) = 0x5555571a5c40 arch_prctl(ARCH_SET_FS, 0x5555571a5300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 set_tid_address(0x5555571a55d0) = 304 set_robust_list(0x5555571a55e0, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f18abc7bdc0, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f18abc7c490}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f18abc7be60, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f18abc7c490}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor527606551", 4096) = 27 brk(0x5555571c6c40) = 0x5555571c6c40 brk(0x5555571c7000) = 0x5555571c7000 mprotect(0x7f18abd3c000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 futex(0x7f18abd4242c, FUTEX_WAKE_PRIVATE, 1000000) = 0 mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f18abc4c000 mprotect(0x7f18abc4d000, 131072, PROT_READ|PROT_WRITE) = 0 clone(child_stack=0x7f18abc6c3f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID./strace-static-x86_64: Process 305 attached , parent_tid=[305], tls=0x7f18abc6c700, child_tidptr=0x7f18abc6c9d0) = 305 [pid 305] set_robust_list(0x7f18abc6c9e0, 24 [pid 304] futex(0x7f18abd42428, FUTEX_WAKE_PRIVATE, 1000000 [pid 305] <... set_robust_list resumed>) = 0 [pid 304] <... futex resumed>) = 0 [pid 304] futex(0x7f18abd4242c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] openat(AT_FDCWD, "/dev/net/tun", O_RDONLY) = 3 [pid 305] futex(0x7f18abd4242c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 305] <... futex resumed>) = 1 [pid 304] futex(0x7f18abd42428, FUTEX_WAKE_PRIVATE, 1000000 [pid 305] ioctl(3, TUNSETIFF, 0x20000200 [pid 304] <... futex resumed>) = 0 [pid 304] futex(0x7f18abd4242c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] <... ioctl resumed>) = 0 [pid 305] futex(0x7f18abd4242c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 305] <... futex resumed>) = 1 [pid 304] futex(0x7f18abd42428, FUTEX_WAKE_PRIVATE, 1000000 [pid 305] socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE [pid 304] <... futex resumed>) = 0 [pid 304] futex(0x7f18abd4242c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] <... socket resumed>) = 4 [pid 305] futex(0x7f18abd4242c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 305] <... futex resumed>) = 1 [pid 304] futex(0x7f18abd42428, FUTEX_WAKE_PRIVATE, 1000000 [ 20.476960][ T22] audit: type=1400 audit(1655512949.869:73): avc: denied { execmem } for pid=304 comm="syz-executor527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [pid 305] socket(AF_PACKET, SOCK_DGRAM, htons(ETH_P_ALL) [pid 304] <... futex resumed>) = 0 [pid 305] <... socket resumed>) = 5 [pid 304] futex(0x7f18abd4242c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] futex(0x7f18abd4242c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 304] futex(0x7f18abd42428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f18abd4242c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] <... futex resumed>) = 1 [pid 305] ioctl(5, SIOCGIFINDEX, {ifr_name="rose0", ifr_ifindex=13}) = 0 [pid 305] futex(0x7f18abd4242c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 304] futex(0x7f18abd42428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f18abd4242c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] <... futex resumed>) = 1 [pid 305] ioctl(3, TUNSETQUEUE, 0x20000340) = 0 [pid 305] futex(0x7f18abd4242c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 305] <... futex resumed>) = 1 [pid 304] futex(0x7f18abd42428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f18abd4242c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [ 20.508846][ T22] audit: type=1400 audit(1655512949.899:74): avc: denied { read } for pid=193 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 20.529719][ T22] audit: type=1400 audit(1655512949.909:75): avc: denied { create } for pid=304 comm="syz-executor527" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 20.550944][ T22] audit: type=1400 audit(1655512949.949:76): avc: denied { ioctl } for pid=304 comm="syz-executor527" path="socket:[10881]" dev="sockfs" ino=10881 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [pid 305] sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x34\x00\x00\x00\x11\x00\x01\xe9\x0d\x7d\x1f\xc7\x4e\x1b\xed\x42\xec\x45\xb2\xfc\x0d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=52}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0 [pid 304] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 304] futex(0x7f18abd4242c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=0}) = -1 ETIMEDOUT (Connection timed out) [pid 304] futex(0x7f18abd4242c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=0}) = -1 ETIMEDOUT (Connection timed out) [pid 304] futex(0x7f18abd4243c, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f18abc2b000 [pid 304] mprotect(0x7f18abc2c000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 304] clone(child_stack=0x7f18abc4b3f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[308], tls=0x7f18abc4b700, child_tidptr=0x7f18abc4b9d0) = 308 ./strace-static-x86_64: Process 308 attached [pid 304] futex(0x7f18abd42438, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f18abd4243c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 308] set_robust_list(0x7f18abc4b9e0, 24) = 0 [ 20.576694][ T305] netlink: 20 bytes leftover after parsing attributes in process `syz-executor527'. [pid 308] ioctl(3, TUNSETIFF, 0x20000200) = 0 [pid 308] futex(0x7f18abd4243c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 308] <... futex resumed>) = 1 [ 20.630054][ T305] ================================================================== [ 20.638136][ T305] BUG: KASAN: slab-out-of-bounds in netif_napi_del+0x2c/0x7a0 [ 20.645568][ T305] Write of size 8 at addr ffff8881ddb17f10 by task syz-executor527/305 [ 20.653773][ T305] [ 20.656074][ T305] CPU: 0 PID: 305 Comm: syz-executor527 Not tainted 5.4.190-syzkaller-00044-g77dc925ddffb #0 [ 20.666208][ T305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 20.676229][ T305] Call Trace: [ 20.679491][ T305] dump_stack+0x18e/0x1d5 [ 20.683871][ T305] ? netif_napi_del+0x2c/0x7a0 [ 20.688614][ T305] print_address_description+0x8c/0x630 [ 20.694146][ T305] ? printk+0x76/0x96 [ 20.698099][ T305] ? netif_napi_del+0x2c/0x7a0 [ 20.702843][ T305] ? vprintk_emit+0x3aa/0x3f0 [ 20.707489][ T305] ? netif_napi_del+0x2c/0x7a0 [ 20.712242][ T305] __kasan_report+0xf6/0x130 [ 20.716802][ T305] ? netif_napi_del+0x2c/0x7a0 [ 20.721542][ T305] kasan_report+0x30/0x60 [pid 308] futex(0x7f18abd42438, FUTEX_WAIT_PRIVATE, 0, NULL [pid 304] exit_group(0) = ? [pid 308] <... futex resumed>) = ? [pid 308] +++ exited with 0 +++ [ 20.725851][ T305] check_memory_region+0x298/0x2d0 [ 20.730936][ T305] netif_napi_del+0x2c/0x7a0 [ 20.735495][ T305] free_netdev+0x188/0x310 [ 20.739881][ T305] netdev_run_todo+0xa79/0xc80 [ 20.745138][ T305] ? mutex_lock+0x6c/0xc0 [ 20.749438][ T305] rtnetlink_rcv_msg+0xa49/0xb90 [ 20.754347][ T305] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 20.760129][ T305] ? avc_denied+0x158/0x1c0 [ 20.764603][ T305] ? avc_has_perm_noaudit+0x2b0/0x370 [ 20.769944][ T305] ? avc_has_perm+0x7c/0x1c0 [ 20.774500][ T305] ? avc_has_perm+0xfd/0x1c0 [ 20.779063][ T305] netlink_rcv_skb+0x190/0x3a0 [ 20.783798][ T305] ? rtnetlink_bind+0x80/0x80 [ 20.788446][ T305] netlink_unicast+0x771/0x8d0 [ 20.793177][ T305] netlink_sendmsg+0x913/0xb90 [ 20.797908][ T305] ? netlink_getsockopt+0x840/0x840 [ 20.803070][ T305] ____sys_sendmsg+0x4ee/0x7c0 [ 20.807797][ T305] __sys_sendmsg+0x235/0x2f0 [ 20.812355][ T305] do_syscall_64+0xcb/0x1c0 [ 20.816824][ T305] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 20.822681][ T305] RIP: 0033:0x7f18abcb9e29 [ 20.827073][ T305] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 81 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 20.846642][ T305] RSP: 002b:00007f18abc6c308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 20.855027][ T305] RAX: ffffffffffffffda RBX: 00007f18abd42428 RCX: 00007f18abcb9e29 [ 20.862963][ T305] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 20.870900][ T305] RBP: 00007f18abd42420 R08: 0000000000000000 R09: 0000000000000000 [ 20.878836][ T305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f18abd4242c [ 20.886772][ T305] R13: 00007f18abd10004 R14: 74656e2f7665642f R15: 0000000000022000 [ 20.894712][ T305] [ 20.897022][ T305] Allocated by task 299: [ 20.901233][ T305] __kasan_kmalloc+0x131/0x1e0 [ 20.905972][ T305] __kmalloc_track_caller+0xfb/0x280 [ 20.911221][ T305] __alloc_skb+0xb5/0x4d0 [ 20.915516][ T305] __napi_alloc_skb+0x11f/0x540 [ 20.920341][ T305] page_to_skb+0x39/0x910 [ 20.924637][ T305] receive_mergeable+0x73e/0x2300 [ 20.929628][ T305] receive_buf+0x104/0x1940 [ 20.934093][ T305] virtnet_poll+0x554/0x10b0 [ 20.938647][ T305] napi_poll+0x195/0x670 [ 20.942856][ T305] net_rx_action+0x2dd/0x890 [ 20.947418][ T305] __do_softirq+0x23e/0x643 [ 20.951968][ T305] [ 20.954264][ T305] Freed by task 0: [ 20.957948][ T305] (stack is not available) [ 20.962325][ T305] [ 20.964622][ T305] The buggy address belongs to the object at ffff8881ddb17800 [ 20.964622][ T305] which belongs to the cache kmalloc-1k of size 1024 [ 20.978637][ T305] The buggy address is located 784 bytes to the right of [ 20.978637][ T305] 1024-byte region [ffff8881ddb17800, ffff8881ddb17c00) [ 20.992476][ T305] The buggy address belongs to the page: [ 20.998076][ T305] page:ffffea000776c400 refcount:1 mapcount:0 mapping:ffff8881f5c02280 index:0x0 compound_mapcount: 0 [ 21.008966][ T305] flags: 0x8000000000010200(slab|head) [ 21.014390][ T305] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5c02280 [ 21.023035][ T305] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 21.031578][ T305] page dumped because: kasan: bad access detected [ 21.037962][ T305] page_owner tracks the page as allocated [ 21.043645][ T305] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd2a20(GFP_ATOMIC|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC) [ 21.058012][ T305] prep_new_page+0x194/0x380 [ 21.062565][ T305] get_page_from_freelist+0x524/0x560 [ 21.067900][ T305] __alloc_pages_nodemask+0x2ab/0x6f0 [ 21.073254][ T305] alloc_slab_page+0x39/0x3e0 [ 21.077985][ T305] new_slab+0x97/0x450 [ 21.082019][ T305] ___slab_alloc+0x320/0x4b0 [ 21.086574][ T305] __slab_alloc+0x5a/0x90 [ 21.090867][ T305] __kmalloc_track_caller+0x168/0x280 [ 21.096207][ T305] __alloc_skb+0xb5/0x4d0 [ 21.100508][ T305] __napi_alloc_skb+0x11f/0x540 [ 21.105322][ T305] page_to_skb+0x39/0x910 [ 21.109625][ T305] receive_mergeable+0x73e/0x2300 [ 21.114633][ T305] receive_buf+0x104/0x1940 [ 21.119111][ T305] virtnet_poll+0x554/0x10b0 [ 21.123663][ T305] napi_poll+0x195/0x670 [ 21.127872][ T305] net_rx_action+0x2dd/0x890 [ 21.132423][ T305] page_owner free stack trace missing [ 21.137754][ T305] [ 21.140048][ T305] Memory state around the buggy address: [ 21.145654][ T305] ffff8881ddb17e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.153679][ T305] ffff8881ddb17e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.161704][ T305] >ffff8881ddb17f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.169726][ T305] ^ [ 21.174278][ T305] ffff8881ddb17f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.182302][ T305] ffff8881ddb18000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.190327][ T305] ================================================================== [ 21.198358][ T305] Disabling lock debugging due to kernel taint [ 21.205244][ T305] kasan: CONFIG_KASAN_INLINE enabled [ 21.210550][ T305] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 21.218590][ T305] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 21.225498][ T305] CPU: 0 PID: 305 Comm: syz-executor527 Tainted: G B 5.4.190-syzkaller-00044-g77dc925ddffb #0 [ 21.237005][ T305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 21.247044][ T305] RIP: 0010:netif_napi_del+0x28f/0x7a0 [ 21.252481][ T305] Code: 00 74 08 4c 89 ff e8 d0 39 32 fe 49 8b 2f 49 39 ef 75 10 e8 03 cd 05 fe eb 35 90 e8 fb cc 05 fe 48 89 dd 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 a2 39 32 fe 48 8b 5d 00 48 89 ef [ 21.272053][ T305] RSP: 0018:ffff8881e2db7790 EFLAGS: 00010246 [ 21.278089][ T305] RAX: 0000000000000000 RBX: 1ffff1103bb62fff RCX: ffffffff835a6db0 [ 21.286029][ T305] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8881ddb17f38 [ 21.293978][ T305] RBP: 0000000000000000 R08: ffffffff835a6b83 R09: fffffbfff0d3170d [ 21.301918][ T305] R10: fffffbfff0d3170d R11: 1ffffffff0d3170c R12: ffff8881ddb17f00 [ 21.309856][ T305] R13: dffffc0000000000 R14: ffff8881ddb17f00 R15: ffff8881ddb17f38 [ 21.317798][ T305] FS: 00007f18abc6c700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 21.326692][ T305] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.333253][ T305] CR2: 00007ffee66ba058 CR3: 00000001ddfa2000 CR4: 00000000003406f0 [ 21.341200][ T305] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.349262][ T305] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.357219][ T305] Call Trace: [ 21.360488][ T305] free_netdev+0x188/0x310 [ 21.364872][ T305] netdev_run_todo+0xa79/0xc80 [ 21.369605][ T305] ? mutex_lock+0x6c/0xc0 [ 21.373904][ T305] rtnetlink_rcv_msg+0xa49/0xb90 [ 21.378812][ T305] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 21.384587][ T305] ? avc_denied+0x158/0x1c0 [ 21.389057][ T305] ? avc_has_perm_noaudit+0x2b0/0x370 [ 21.394398][ T305] ? avc_has_perm+0x7c/0x1c0 [ 21.398956][ T305] ? avc_has_perm+0xfd/0x1c0 [ 21.403519][ T305] netlink_rcv_skb+0x190/0x3a0 [ 21.408250][ T305] ? rtnetlink_bind+0x80/0x80 [ 21.412899][ T305] netlink_unicast+0x771/0x8d0 [ 21.417643][ T305] netlink_sendmsg+0x913/0xb90 [ 21.422386][ T305] ? netlink_getsockopt+0x840/0x840 [ 21.427549][ T305] ____sys_sendmsg+0x4ee/0x7c0 [ 21.432278][ T305] __sys_sendmsg+0x235/0x2f0 [ 21.436840][ T305] do_syscall_64+0xcb/0x1c0 [ 21.441309][ T305] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.447174][ T305] RIP: 0033:0x7f18abcb9e29 [ 21.451574][ T305] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 81 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 21.471143][ T305] RSP: 002b:00007f18abc6c308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 21.479518][ T305] RAX: ffffffffffffffda RBX: 00007f18abd42428 RCX: 00007f18abcb9e29 [ 21.487453][ T305] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 21.495395][ T305] RBP: 00007f18abd42420 R08: 0000000000000000 R09: 0000000000000000 [ 21.503335][ T305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f18abd4242c [ 21.511275][ T305] R13: 00007f18abd10004 R14: 74656e2f7665642f R15: 0000000000022000 [ 21.519213][ T305] Modules linked in: [ 21.523145][ T305] ---[ end trace 6244634e42fd974d ]--- [ 21.528589][ T305] RIP: 0010:netif_napi_del+0x28f/0x7a0 [ 21.534049][ T305] Code: 00 74 08 4c 89 ff e8 d0 39 32 fe 49 8b 2f 49 39 ef 75 10 e8 03 cd 05 fe eb 35 90 e8 fb cc 05 fe 48 89 dd 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 a2 39 32 fe 48 8b 5d 00 48 89 ef [ 21.553676][ T305] RSP: 0018:ffff8881e2db7790 EFLAGS: 00010246 [ 21.559738][ T305] RAX: 0000000000000000 RBX: 1ffff1103bb62fff RCX: ffffffff835a6db0 [ 21.567685][ T305] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8881ddb17f38 [ 21.575654][ T305] RBP: 0000000000000000 R08: ffffffff835a6b83 R09: fffffbfff0d3170d [ 21.583624][ T305] R10: fffffbfff0d3170d R11: 1ffffffff0d3170c R12: ffff8881ddb17f00 [ 21.591585][ T305] R13: dffffc0000000000 R14: ffff8881ddb17f00 R15: ffff8881ddb17f38 [ 21.599554][ T305] FS: 00007f18abc6c700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 21.608536][ T305] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.615106][ T305] CR2: 00007ffee66ba058 CR3: 00000001ddfa2000 CR4: 00000000003406f0 [ 21.623077][ T305] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.631058][ T305] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.639023][ T305] Kernel panic - not syncing: Fatal exception [ 21.645264][ T305] Kernel Offset: disabled [ 21.649576][ T305] Rebooting in 86400 seconds..