./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor141662214 <...> forked to background, child pid 192 Starting sshd: OK syzkaller syzkaller login: [ 13.898342][ T22] kauditd_printk_skb: 60 callbacks suppressed [ 13.898348][ T22] audit: type=1400 audit(1655519958.449:71): avc: denied { transition } for pid=265 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.904188][ T22] audit: type=1400 audit(1655519958.449:72): avc: denied { write } for pid=265 comm="sh" path="pipe:[9781]" dev="pipefs" ino=9781 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 [ 14.529184][ T266] sshd (266) used greatest stack depth: 26944 bytes left Warning: Permanently added '10.128.10.27' (ECDSA) to the list of known hosts. execve("./syz-executor141662214", ["./syz-executor141662214"], 0x7ffecc9bfdb0 /* 10 vars */) = 0 brk(NULL) = 0x555557294000 brk(0x555557294c40) = 0x555557294c40 arch_prctl(ARCH_SET_FS, 0x555557294300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 set_tid_address(0x5555572945d0) = 304 set_robust_list(0x5555572945e0, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7fd159230380, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7fd159230a50}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7fd159230420, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7fd159230a50}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor141662214", 4096) = 27 brk(0x5555572b5c40) = 0x5555572b5c40 brk(0x5555572b6000) = 0x5555572b6000 mprotect(0x7fd1592f0000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x5555572945d0) = 305 ./strace-static-x86_64: Process 305 attached [pid 305] set_robust_list(0x5555572945e0, 24) = 0 [pid 305] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 305] setpgid(0, 0) = 0 [pid 305] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 305] write(3, "1000", 4) = 4 [pid 305] close(3) = 0 [pid 305] futex(0x7fd1592f642c, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7fd159200000 [pid 305] mprotect(0x7fd159201000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 305] clone(child_stack=0x7fd1592203f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID./strace-static-x86_64: Process 306 attached [pid 306] set_robust_list(0x7fd1592209e0, 24) = 0 [pid 305] <... clone resumed>, parent_tid=[306], tls=0x7fd159220700, child_tidptr=0x7fd1592209d0) = 306 [pid 306] futex(0x7fd1592f6428, FUTEX_WAIT_PRIVATE, 0, NULL [pid 305] futex(0x7fd1592f6428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 306] <... futex resumed>) = -1 EAGAIN (Resource temporarily unavailable) [pid 305] futex(0x7fd1592f642c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 306] openat(AT_FDCWD, "/dev/net/tun", O_RDONLY) = 3 [pid 306] futex(0x7fd1592f642c, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7fd1592f6428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7fd1592f642c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 306] ioctl(3, TUNSETIFF, 0x20000200) = 0 [pid 306] futex(0x7fd1592f642c, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 306] futex(0x7fd1592f6428, FUTEX_WAIT_PRIVATE, 0, NULL [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7fd1592f6428, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 306] <... futex resumed>) = 0 [pid 306] socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE [pid 305] futex(0x7fd1592f642c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 306] <... socket resumed>) = 4 [pid 306] futex(0x7fd1592f642c, FUTEX_WAKE_PRIVATE, 1000000 [pid 305] <... futex resumed>) = -1 EAGAIN (Resource temporarily unavailable) [pid 306] <... futex resumed>) = 0 [pid 306] futex(0x7fd1592f6428, FUTEX_WAIT_PRIVATE, 0, NULL [pid 305] futex(0x7fd1592f6428, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 306] <... futex resumed>) = 0 [pid 306] socket(AF_PACKET, SOCK_DGRAM, htons(ETH_P_ALL)) = 5 [pid 306] futex(0x7fd1592f642c, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 306] futex(0x7fd1592f6428, FUTEX_WAIT_PRIVATE, 0, NULL [pid 305] futex(0x7fd1592f642c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}) = -1 EAGAIN (Resource temporarily unavailable) [pid 305] futex(0x7fd1592f6428, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 305] futex(0x7fd1592f642c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 306] <... futex resumed>) = 0 [pid 306] ioctl(5, SIOCGIFINDEX, {ifr_name="rose0", ifr_ifindex=13}) = 0 [pid 306] futex(0x7fd1592f642c, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7fd1592f6428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7fd1592f642c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [ 20.742054][ T22] audit: type=1400 audit(1655519965.289:73): avc: denied { execmem } for pid=304 comm="syz-executor141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [pid 306] ioctl(3, TUNSETQUEUE, 0x20000340) = 0 [pid 306] futex(0x7fd1592f642c, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7fd1592f6428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7fd1592f642c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [ 20.774553][ T22] audit: type=1400 audit(1655519965.319:74): avc: denied { read } for pid=193 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 20.795516][ T22] audit: type=1400 audit(1655519965.319:75): avc: denied { create } for pid=305 comm="syz-executor141" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 20.796755][ T306] netlink: 20 bytes leftover after parsing attributes in process `syz-executor141'. [pid 306] sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x34\x00\x00\x00\x11\x00\x01\xe9\x0d\x7d\x1f\xc7\x4e\x1b\xed\x42\xec\x45\xb2\xfc\x0d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=53}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0 [pid 305] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 305] futex(0x7fd1592f642c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=0}) = -1 ETIMEDOUT (Connection timed out) [pid 305] futex(0x7fd1592f643c, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7fd1591df000 [pid 305] mprotect(0x7fd1591e0000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 305] clone(child_stack=0x7fd1591ff3f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[309], tls=0x7fd1591ff700, child_tidptr=0x7fd1591ff9d0) = 309 [pid 305] futex(0x7fd1592f6438, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7fd1592f643c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 309 attached [pid 309] set_robust_list(0x7fd1591ff9e0, 24) = 0 [pid 309] ioctl(3, TUNSETIFF, 0x20000200) = 0 [pid 309] futex(0x7fd1592f643c, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 305] <... futex resumed>) = 0 [ 20.815926][ T22] audit: type=1400 audit(1655519965.329:76): avc: denied { ioctl } for pid=305 comm="syz-executor141" path="socket:[10813]" dev="sockfs" ino=10813 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 20.887867][ T306] ================================================================== [ 20.895966][ T306] BUG: KASAN: slab-out-of-bounds in netif_napi_del+0x2c/0x7a0 [ 20.903390][ T306] Write of size 8 at addr ffff8881dd7d7f10 by task syz-executor141/306 [ 20.911686][ T306] [ 20.914007][ T306] CPU: 1 PID: 306 Comm: syz-executor141 Not tainted 5.4.190-syzkaller-00044-g77dc925ddffb #0 [ 20.924160][ T306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 20.934198][ T306] Call Trace: [ 20.937463][ T306] dump_stack+0x18e/0x1d5 [ 20.941771][ T306] ? netif_napi_del+0x2c/0x7a0 [ 20.946504][ T306] print_address_description+0x8c/0x630 [ 20.952020][ T306] ? printk+0x76/0x96 [ 20.955997][ T306] ? netif_napi_del+0x2c/0x7a0 [ 20.960741][ T306] ? vprintk_emit+0x3aa/0x3f0 [ 20.965398][ T306] ? netif_napi_del+0x2c/0x7a0 [ 20.970130][ T306] __kasan_report+0xf6/0x130 [ 20.974692][ T306] ? netif_napi_del+0x2c/0x7a0 [ 20.979594][ T306] kasan_report+0x30/0x60 [pid 309] futex(0x7fd1592f6438, FUTEX_WAIT_PRIVATE, 0, NULL [pid 305] exit_group(0) = ? [pid 309] <... futex resumed>) = ? [pid 309] +++ exited with 0 +++ [ 20.983898][ T306] check_memory_region+0x298/0x2d0 [ 20.988983][ T306] netif_napi_del+0x2c/0x7a0 [ 20.993552][ T306] free_netdev+0x188/0x310 [ 20.997938][ T306] netdev_run_todo+0xa79/0xc80 [ 21.002672][ T306] ? mutex_lock+0x6c/0xc0 [ 21.006995][ T306] rtnetlink_rcv_msg+0xa49/0xb90 [ 21.011901][ T306] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 21.017672][ T306] ? avc_denied+0x158/0x1c0 [ 21.022167][ T306] ? avc_has_perm_noaudit+0x2b0/0x370 [ 21.027517][ T306] ? avc_has_perm+0x7c/0x1c0 [ 21.032095][ T306] ? avc_has_perm+0xfd/0x1c0 [ 21.036676][ T306] netlink_rcv_skb+0x190/0x3a0 [ 21.041415][ T306] ? rtnetlink_bind+0x80/0x80 [ 21.046072][ T306] netlink_unicast+0x771/0x8d0 [ 21.050823][ T306] netlink_sendmsg+0x913/0xb90 [ 21.055559][ T306] ? netlink_getsockopt+0x840/0x840 [ 21.060741][ T306] ____sys_sendmsg+0x4ee/0x7c0 [ 21.065476][ T306] __sys_sendmsg+0x235/0x2f0 [ 21.070039][ T306] do_syscall_64+0xcb/0x1c0 [ 21.074524][ T306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.080383][ T306] RIP: 0033:0x7fd15926ea69 [ 21.084766][ T306] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 21.104342][ T306] RSP: 002b:00007fd159220308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 21.112730][ T306] RAX: ffffffffffffffda RBX: 00007fd1592f6428 RCX: 00007fd15926ea69 [ 21.120678][ T306] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 21.128620][ T306] RBP: 00007fd1592f6420 R08: 0000000000000000 R09: 0000000000000000 [ 21.136567][ T306] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1592f642c [ 21.144505][ T306] R13: 00007fd1592c4064 R14: 74656e2f7665642f R15: 0000000000022000 [ 21.152455][ T306] [ 21.154750][ T306] Allocated by task 155: [ 21.158961][ T306] __kasan_kmalloc+0x131/0x1e0 [ 21.163690][ T306] kmem_cache_alloc+0xd0/0x210 [ 21.168423][ T306] getname_flags+0xb8/0x4e0 [ 21.172892][ T306] do_sys_open+0x2a3/0x700 [ 21.177279][ T306] do_syscall_64+0xcb/0x1c0 [ 21.181746][ T306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.187600][ T306] [ 21.189896][ T306] Freed by task 155: [ 21.193757][ T306] __kasan_slab_free+0x178/0x240 [ 21.198677][ T306] slab_free_freelist_hook+0x80/0x150 [ 21.204024][ T306] kmem_cache_free+0xa9/0x1d0 [ 21.208665][ T306] do_sys_open+0x59a/0x700 [ 21.213047][ T306] do_syscall_64+0xcb/0x1c0 [ 21.217518][ T306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.223382][ T306] [ 21.225684][ T306] The buggy address belongs to the object at ffff8881dd7d6600 [ 21.225684][ T306] which belongs to the cache names_cache of size 4096 [ 21.239789][ T306] The buggy address is located 2320 bytes to the right of [ 21.239789][ T306] 4096-byte region [ffff8881dd7d6600, ffff8881dd7d7600) [ 21.253725][ T306] The buggy address belongs to the page: [ 21.259330][ T306] page:ffffea000775f400 refcount:1 mapcount:0 mapping:ffff8881f5cfb680 index:0x0 compound_mapcount: 0 [ 21.270224][ T306] flags: 0x8000000000010200(slab|head) [ 21.275652][ T306] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5cfb680 [ 21.284204][ T306] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 21.292748][ T306] page dumped because: kasan: bad access detected [ 21.299122][ T306] page_owner tracks the page as allocated [ 21.304806][ T306] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC) [ 21.319791][ T306] prep_new_page+0x194/0x380 [ 21.324355][ T306] get_page_from_freelist+0x524/0x560 [ 21.329708][ T306] __alloc_pages_nodemask+0x2ab/0x6f0 [ 21.335047][ T306] alloc_slab_page+0x39/0x3e0 [ 21.339697][ T306] new_slab+0x97/0x450 [ 21.343759][ T306] ___slab_alloc+0x320/0x4b0 [ 21.348327][ T306] __slab_alloc+0x5a/0x90 [ 21.352635][ T306] kmem_cache_alloc+0x100/0x210 [ 21.357474][ T306] getname_flags+0xb8/0x4e0 [ 21.361950][ T306] __x64_sys_unlink+0x38/0x50 [ 21.366599][ T306] do_syscall_64+0xcb/0x1c0 [ 21.371073][ T306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.377013][ T306] page_owner free stack trace missing [ 21.382346][ T306] [ 21.384654][ T306] Memory state around the buggy address: [ 21.390254][ T306] ffff8881dd7d7e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.398282][ T306] ffff8881dd7d7e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.406308][ T306] >ffff8881dd7d7f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.414330][ T306] ^ [ 21.418887][ T306] ffff8881dd7d7f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.426911][ T306] ffff8881dd7d8000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.434933][ T306] ================================================================== [ 21.442955][ T306] Disabling lock debugging due to kernel taint [ 21.449166][ T306] kasan: CONFIG_KASAN_INLINE enabled [ 21.454475][ T306] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 21.462598][ T306] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 21.469508][ T306] CPU: 0 PID: 306 Comm: syz-executor141 Tainted: G B 5.4.190-syzkaller-00044-g77dc925ddffb #0 [ 21.481005][ T306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 21.491034][ T306] RIP: 0010:netif_napi_del+0x28f/0x7a0 [ 21.496567][ T306] Code: 00 74 08 4c 89 ff e8 d0 39 32 fe 49 8b 2f 49 39 ef 75 10 e8 03 cd 05 fe eb 35 90 e8 fb cc 05 fe 48 89 dd 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 a2 39 32 fe 48 8b 5d 00 48 89 ef [ 21.516149][ T306] RSP: 0018:ffff8881e140f790 EFLAGS: 00010246 [ 21.522183][ T306] RAX: 0000000000000000 RBX: 1ffff1103bafafff RCX: ffffffff835a6db0 [ 21.530123][ T306] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8881dd7d7f38 [ 21.538067][ T306] RBP: 0000000000000000 R08: ffffffff835a6b83 R09: fffffbfff0d3170d [ 21.546018][ T306] R10: fffffbfff0d3170d R11: 1ffffffff0d3170c R12: ffff8881dd7d7f00 [ 21.553956][ T306] R13: dffffc0000000000 R14: ffff8881dd7d7f00 R15: ffff8881dd7d7f38 [ 21.561896][ T306] FS: 00007fd159220700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 21.570789][ T306] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.577343][ T306] CR2: 00007fd1592c3c88 CR3: 00000001deb92000 CR4: 00000000003406f0 [ 21.585289][ T306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.593232][ T306] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.601172][ T306] Call Trace: [ 21.604435][ T306] free_netdev+0x188/0x310 [ 21.608821][ T306] netdev_run_todo+0xa79/0xc80 [ 21.613566][ T306] ? mutex_lock+0x6c/0xc0 [ 21.617884][ T306] rtnetlink_rcv_msg+0xa49/0xb90 [ 21.622821][ T306] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 21.628597][ T306] ? avc_denied+0x158/0x1c0 [ 21.633085][ T306] ? avc_has_perm_noaudit+0x2b0/0x370 [ 21.638427][ T306] ? avc_has_perm+0x7c/0x1c0 [ 21.642987][ T306] ? avc_has_perm+0xfd/0x1c0 [ 21.647557][ T306] netlink_rcv_skb+0x190/0x3a0 [ 21.652299][ T306] ? rtnetlink_bind+0x80/0x80 [ 21.656944][ T306] netlink_unicast+0x771/0x8d0 [ 21.661689][ T306] netlink_sendmsg+0x913/0xb90 [ 21.666421][ T306] ? netlink_getsockopt+0x840/0x840 [ 21.671585][ T306] ____sys_sendmsg+0x4ee/0x7c0 [ 21.676330][ T306] __sys_sendmsg+0x235/0x2f0 [ 21.680908][ T306] do_syscall_64+0xcb/0x1c0 [ 21.685393][ T306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.691260][ T306] RIP: 0033:0x7fd15926ea69 [ 21.695652][ T306] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 21.715240][ T306] RSP: 002b:00007fd159220308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 21.723638][ T306] RAX: ffffffffffffffda RBX: 00007fd1592f6428 RCX: 00007fd15926ea69 [ 21.731586][ T306] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 21.739531][ T306] RBP: 00007fd1592f6420 R08: 0000000000000000 R09: 0000000000000000 [ 21.747477][ T306] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fd1592f642c [ 21.755421][ T306] R13: 00007fd1592c4064 R14: 74656e2f7665642f R15: 0000000000022000 [ 21.763465][ T306] Modules linked in: [ 21.767452][ T306] ---[ end trace 0658115b3e64bdde ]--- [ 21.772899][ T306] RIP: 0010:netif_napi_del+0x28f/0x7a0 [ 21.778378][ T306] Code: 00 74 08 4c 89 ff e8 d0 39 32 fe 49 8b 2f 49 39 ef 75 10 e8 03 cd 05 fe eb 35 90 e8 fb cc 05 fe 48 89 dd 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 a2 39 32 fe 48 8b 5d 00 48 89 ef [ 21.798004][ T306] RSP: 0018:ffff8881e140f790 EFLAGS: 00010246 [ 21.804042][ T306] RAX: 0000000000000000 RBX: 1ffff1103bafafff RCX: ffffffff835a6db0 [ 21.812014][ T306] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8881dd7d7f38 [ 21.820008][ T306] RBP: 0000000000000000 R08: ffffffff835a6b83 R09: fffffbfff0d3170d [ 21.827986][ T306] R10: fffffbfff0d3170d R11: 1ffffffff0d3170c R12: ffff8881dd7d7f00 [ 21.836130][ T306] R13: dffffc0000000000 R14: ffff8881dd7d7f00 R15: ffff8881dd7d7f38 [ 21.844114][ T306] FS: 00007fd159220700(0000) GS:ffff8881f6e00000(0000) knlGS:0000000000000000 [ 21.853045][ T306] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.859624][ T306] CR2: 00007fd1592c3c88 CR3: 00000001deb92000 CR4: 00000000003406f0 [ 21.867617][ T306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.875568][ T306] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.883544][ T306] Kernel panic - not syncing: Fatal exception [ 21.889739][ T306] Kernel Offset: disabled [ 21.894489][ T306] Rebooting in 86400 seconds..