./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor293923963 <...> Warning: Permanently added '10.128.0.243' (ECDSA) to the list of known hosts. execve("./syz-executor293923963", ["./syz-executor293923963"], 0x7ffed4892e80 /* 10 vars */) = 0 brk(NULL) = 0x555555b5f000 brk(0x555555b5fc40) = 0x555555b5fc40 arch_prctl(ARCH_SET_FS, 0x555555b5f300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 set_tid_address(0x555555b5f5d0) = 303 set_robust_list(0x555555b5f5e0, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f73c8d16380, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f73c8d16a50}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f73c8d16420, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f73c8d16a50}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor293923963", 4096) = 27 brk(0x555555b80c40) = 0x555555b80c40 brk(0x555555b81000) = 0x555555b81000 mprotect(0x7f73c8dd6000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555555b5f5d0) = 304 ./strace-static-x86_64: Process 304 attached [pid 304] set_robust_list(0x555555b5f5e0, 24) = 0 [pid 304] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 304] setpgid(0, 0) = 0 [pid 304] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 304] write(3, "1000", 4) = 4 [pid 304] close(3) = 0 [pid 304] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f73c8ce6000 [pid 304] mprotect(0x7f73c8ce7000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 304] clone(child_stack=0x7f73c8d063f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[305], tls=0x7f73c8d06700, child_tidptr=0x7f73c8d069d0) = 305 [pid 304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 305 attached [pid 305] set_robust_list(0x7f73c8d069e0, 24) = 0 [pid 305] openat(AT_FDCWD, "/dev/net/tun", O_RDONLY) = 3 [pid 305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] <... futex resumed>) = 1 [pid 305] ioctl(3, TUNSETIFF, 0x20000200) = 0 [pid 305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] <... futex resumed>) = 1 [pid 305] socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 4 [pid 305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] <... futex resumed>) = 1 [pid 305] socket(AF_PACKET, SOCK_DGRAM, htons(ETH_P_ALL)) = 5 [pid 305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] <... futex resumed>) = 1 [pid 305] ioctl(5, SIOCGIFINDEX, {ifr_name="rose0", ifr_ifindex=13}) = 0 [pid 305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] <... futex resumed>) = 1 [pid 305] ioctl(3, TUNSETQUEUE, 0x20000340) = 0 [pid 305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 [pid 304] <... futex resumed>) = 0 [pid 304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 305] <... futex resumed>) = 1 [ 20.760209][ T22] audit: type=1400 audit(1655517152.140:73): avc: denied { execmem } for pid=303 comm="syz-executor293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.788424][ T305] netlink: 20 bytes leftover after parsing attributes in process `syz-executor293'. [pid 305] sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x34\x00\x00\x00\x11\x00\x01\xe9\x0d\x7d\x1f\xc7\x4e\x1b\xed\x42\xec\x45\xb2\xfc\x0d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=52}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0 [pid 304] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=0}) = -1 ETIMEDOUT (Connection timed out) [pid 304] futex(0x7f73c8ddc43c, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f73c8cc5000 [pid 304] mprotect(0x7f73c8cc6000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 304] clone(child_stack=0x7f73c8ce53f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[308], tls=0x7f73c8ce5700, child_tidptr=0x7f73c8ce59d0) = 308 [pid 304] futex(0x7f73c8ddc438, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 304] futex(0x7f73c8ddc43c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 308 attached [pid 308] set_robust_list(0x7f73c8ce59e0, 24) = 0 [ 20.788772][ T22] audit: type=1400 audit(1655517152.170:74): avc: denied { create } for pid=304 comm="syz-executor293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 20.817718][ T22] audit: type=1400 audit(1655517152.170:75): avc: denied { ioctl } for pid=304 comm="syz-executor293" path="socket:[985]" dev="sockfs" ino=985 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [pid 308] ioctl(3, TUNSETIFF, 0x20000200) = 0 [pid 308] futex(0x7f73c8ddc43c, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 308] futex(0x7f73c8ddc438, FUTEX_WAIT_PRIVATE, 0, NULL [pid 304] <... futex resumed>) = 0 [ 20.843042][ T22] audit: type=1400 audit(1655517152.190:76): avc: denied { read } for pid=192 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 20.880622][ T305] ================================================================== [ 20.888886][ T305] BUG: KASAN: slab-out-of-bounds in netif_napi_del+0x2c/0x7a0 [ 20.896482][ T305] Write of size 8 at addr ffff8881dd703f10 by task syz-executor293/305 [ 20.904688][ T305] [ 20.906997][ T305] CPU: 0 PID: 305 Comm: syz-executor293 Not tainted 5.4.190-syzkaller-00044-g77dc925ddffb #0 [ 20.917432][ T305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 20.927465][ T305] Call Trace: [ 20.930850][ T305] dump_stack+0x18e/0x1d5 [ 20.935215][ T305] ? netif_napi_del+0x2c/0x7a0 [ 20.939979][ T305] print_address_description+0x8c/0x630 [ 20.945763][ T305] ? printk+0x76/0x96 [ 20.949862][ T305] ? netif_napi_del+0x2c/0x7a0 [ 20.954609][ T305] ? vprintk_emit+0x3aa/0x3f0 [pid 304] exit_group(0 [pid 308] <... futex resumed>) = ? [pid 304] <... exit_group resumed>) = ? [pid 308] +++ exited with 0 +++ [ 20.959266][ T305] ? netif_napi_del+0x2c/0x7a0 [ 20.964103][ T305] __kasan_report+0xf6/0x130 [ 20.968709][ T305] ? netif_napi_del+0x2c/0x7a0 [ 20.973459][ T305] kasan_report+0x30/0x60 [ 20.978021][ T305] check_memory_region+0x298/0x2d0 [ 20.983131][ T305] netif_napi_del+0x2c/0x7a0 [ 20.987696][ T305] free_netdev+0x188/0x310 [ 20.992082][ T305] netdev_run_todo+0xa79/0xc80 [ 20.996820][ T305] ? mutex_lock+0x6c/0xc0 [ 21.001267][ T305] rtnetlink_rcv_msg+0xa49/0xb90 [ 21.006189][ T305] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 21.011988][ T305] ? avc_denied+0x158/0x1c0 [ 21.016527][ T305] ? avc_has_perm_noaudit+0x2b0/0x370 [ 21.021878][ T305] ? avc_has_perm+0x7c/0x1c0 [ 21.026437][ T305] ? avc_has_perm+0xfd/0x1c0 [ 21.031006][ T305] netlink_rcv_skb+0x190/0x3a0 [ 21.035869][ T305] ? rtnetlink_bind+0x80/0x80 [ 21.040534][ T305] netlink_unicast+0x771/0x8d0 [ 21.045274][ T305] netlink_sendmsg+0x913/0xb90 [ 21.050020][ T305] ? netlink_getsockopt+0x840/0x840 [ 21.055193][ T305] ____sys_sendmsg+0x4ee/0x7c0 [ 21.059938][ T305] __sys_sendmsg+0x235/0x2f0 [ 21.064512][ T305] do_syscall_64+0xcb/0x1c0 [ 21.069004][ T305] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.074880][ T305] RIP: 0033:0x7f73c8d54a69 [ 21.079274][ T305] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 21.098950][ T305] RSP: 002b:00007f73c8d06308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 21.107344][ T305] RAX: ffffffffffffffda RBX: 00007f73c8ddc428 RCX: 00007f73c8d54a69 [ 21.115292][ T305] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 21.123242][ T305] RBP: 00007f73c8ddc420 R08: 0000000000000000 R09: 0000000000000000 [ 21.131210][ T305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73c8ddc42c [ 21.139165][ T305] R13: 00007f73c8daa064 R14: 74656e2f7665642f R15: 0000000000022000 [ 21.147246][ T305] [ 21.149653][ T305] Allocated by task 155: [ 21.153961][ T305] __kasan_kmalloc+0x131/0x1e0 [ 21.158711][ T305] inode_doinit_use_xattr+0x58/0x3d0 [ 21.163976][ T305] inode_doinit_with_dentry+0x9c6/0xf30 [ 21.169491][ T305] security_d_instantiate+0xa5/0x100 [ 21.174767][ T305] d_splice_alias+0x6c/0x3b0 [ 21.179343][ T305] kernfs_iop_lookup+0x17a/0x1f0 [ 21.184365][ T305] path_openat+0x1fc2/0x3710 [ 21.188946][ T305] do_filp_open+0x19a/0x3a0 [ 21.193426][ T305] do_sys_open+0x2e3/0x700 [ 21.197821][ T305] do_syscall_64+0xcb/0x1c0 [ 21.202301][ T305] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.208164][ T305] [ 21.210483][ T305] Freed by task 155: [ 21.214398][ T305] __kasan_slab_free+0x178/0x240 [ 21.219306][ T305] slab_free_freelist_hook+0x80/0x150 [ 21.224650][ T305] kfree+0xc6/0x260 [ 21.228426][ T305] inode_doinit_use_xattr+0x251/0x3d0 [ 21.233780][ T305] inode_doinit_with_dentry+0x9c6/0xf30 [ 21.239305][ T305] security_d_instantiate+0xa5/0x100 [ 21.244563][ T305] d_splice_alias+0x6c/0x3b0 [ 21.249119][ T305] kernfs_iop_lookup+0x17a/0x1f0 [ 21.254025][ T305] path_openat+0x1fc2/0x3710 [ 21.259016][ T305] do_filp_open+0x19a/0x3a0 [ 21.268011][ T305] do_sys_open+0x2e3/0x700 [ 21.272406][ T305] do_syscall_64+0xcb/0x1c0 [ 21.276885][ T305] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.282751][ T305] [ 21.285049][ T305] The buggy address belongs to the object at ffff8881dd703e00 [ 21.285049][ T305] which belongs to the cache kmalloc-256 of size 256 [ 21.299088][ T305] The buggy address is located 16 bytes to the right of [ 21.299088][ T305] 256-byte region [ffff8881dd703e00, ffff8881dd703f00) [ 21.312854][ T305] The buggy address belongs to the page: [ 21.318470][ T305] page:ffffea000775c080 refcount:1 mapcount:0 mapping:ffff8881f5c02780 index:0x0 compound_mapcount: 0 [ 21.329370][ T305] flags: 0x8000000000010200(slab|head) [ 21.334801][ T305] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5c02780 [ 21.343449][ T305] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000 [ 21.352010][ T305] page dumped because: kasan: bad access detected [ 21.358480][ T305] page_owner tracks the page as allocated [ 21.364166][ T305] page last allocated via order 1, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC) [ 21.378364][ T305] prep_new_page+0x194/0x380 [ 21.382932][ T305] get_page_from_freelist+0x524/0x560 [ 21.388345][ T305] __alloc_pages_nodemask+0x2ab/0x6f0 [ 21.393694][ T305] alloc_slab_page+0x39/0x3e0 [ 21.398340][ T305] new_slab+0x97/0x450 [ 21.402390][ T305] ___slab_alloc+0x320/0x4b0 [ 21.406959][ T305] __slab_alloc+0x5a/0x90 [ 21.411268][ T305] kmem_cache_alloc_trace+0x129/0x240 [ 21.416610][ T305] inode_doinit_use_xattr+0x58/0x3d0 [ 21.421880][ T305] inode_doinit_with_dentry+0x9c6/0xf30 [ 21.427416][ T305] security_d_instantiate+0xa5/0x100 [ 21.432669][ T305] d_splice_alias+0x6c/0x3b0 [ 21.437280][ T305] kernfs_iop_lookup+0x17a/0x1f0 [ 21.442210][ T305] path_openat+0x1fc2/0x3710 [ 21.446779][ T305] do_filp_open+0x19a/0x3a0 [ 21.451561][ T305] do_sys_open+0x2e3/0x700 [ 21.455942][ T305] page_owner free stack trace missing [ 21.461281][ T305] [ 21.463601][ T305] Memory state around the buggy address: [ 21.469208][ T305] ffff8881dd703e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.477237][ T305] ffff8881dd703e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 21.485267][ T305] >ffff8881dd703f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.493305][ T305] ^ [ 21.497862][ T305] ffff8881dd703f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.505904][ T305] ffff8881dd704000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.513936][ T305] ================================================================== [ 21.521972][ T305] Disabling lock debugging due to kernel taint [ 21.529397][ T305] kasan: CONFIG_KASAN_INLINE enabled [ 21.534786][ T305] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 21.542960][ T305] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 21.549977][ T305] CPU: 1 PID: 305 Comm: syz-executor293 Tainted: G B 5.4.190-syzkaller-00044-g77dc925ddffb #0 [ 21.561477][ T305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 21.571508][ T305] RIP: 0010:netif_napi_del+0x28f/0x7a0 [ 21.577036][ T305] Code: 00 74 08 4c 89 ff e8 d0 39 32 fe 49 8b 2f 49 39 ef 75 10 e8 03 cd 05 fe eb 35 90 e8 fb cc 05 fe 48 89 dd 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 a2 39 32 fe 48 8b 5d 00 48 89 ef [ 21.596622][ T305] RSP: 0018:ffff8881e049f790 EFLAGS: 00010246 [ 21.602767][ T305] RAX: 0000000000000000 RBX: 1ffff1103bae07ff RCX: ffffffff835a6db0 [ 21.610708][ T305] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8881dd703f38 [ 21.618666][ T305] RBP: 0000000000000000 R08: ffffffff835a6b83 R09: fffffbfff0d3170d [ 21.626616][ T305] R10: fffffbfff0d3170d R11: 1ffffffff0d3170c R12: ffff8881dd703f00 [ 21.634579][ T305] R13: dffffc0000000000 R14: ffff8881dd703f00 R15: ffff8881dd703f38 [ 21.642526][ T305] FS: 00007f73c8d06700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 21.651431][ T305] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.657985][ T305] CR2: 00007f73c8da9c88 CR3: 00000001dd4c5000 CR4: 00000000003406e0 [ 21.666054][ T305] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.673997][ T305] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.681943][ T305] Call Trace: [ 21.685239][ T305] free_netdev+0x188/0x310 [ 21.689634][ T305] netdev_run_todo+0xa79/0xc80 [ 21.694407][ T305] ? mutex_lock+0x6c/0xc0 [ 21.698714][ T305] rtnetlink_rcv_msg+0xa49/0xb90 [ 21.703632][ T305] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 21.709418][ T305] ? avc_denied+0x158/0x1c0 [ 21.713912][ T305] ? avc_has_perm_noaudit+0x2b0/0x370 [ 21.719258][ T305] ? avc_has_perm+0x7c/0x1c0 [ 21.723817][ T305] ? avc_has_perm+0xfd/0x1c0 [ 21.728552][ T305] netlink_rcv_skb+0x190/0x3a0 [ 21.733293][ T305] ? rtnetlink_bind+0x80/0x80 [ 21.737958][ T305] netlink_unicast+0x771/0x8d0 [ 21.742694][ T305] netlink_sendmsg+0x913/0xb90 [ 21.747430][ T305] ? netlink_getsockopt+0x840/0x840 [ 21.752683][ T305] ____sys_sendmsg+0x4ee/0x7c0 [ 21.757425][ T305] __sys_sendmsg+0x235/0x2f0 [ 21.761987][ T305] do_syscall_64+0xcb/0x1c0 [ 21.766460][ T305] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.772426][ T305] RIP: 0033:0x7f73c8d54a69 [ 21.776811][ T305] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 21.796392][ T305] RSP: 002b:00007f73c8d06308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 21.804777][ T305] RAX: ffffffffffffffda RBX: 00007f73c8ddc428 RCX: 00007f73c8d54a69 [ 21.812734][ T305] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 21.820693][ T305] RBP: 00007f73c8ddc420 R08: 0000000000000000 R09: 0000000000000000 [ 21.828652][ T305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73c8ddc42c [ 21.836594][ T305] R13: 00007f73c8daa064 R14: 74656e2f7665642f R15: 0000000000022000 [ 21.844538][ T305] Modules linked in: [ 21.848720][ T305] ---[ end trace 3e72d5c41413a563 ]--- [ 21.854385][ T305] RIP: 0010:netif_napi_del+0x28f/0x7a0 [ 21.859875][ T305] Code: 00 74 08 4c 89 ff e8 d0 39 32 fe 49 8b 2f 49 39 ef 75 10 e8 03 cd 05 fe eb 35 90 e8 fb cc 05 fe 48 89 dd 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 a2 39 32 fe 48 8b 5d 00 48 89 ef [ 21.879592][ T305] RSP: 0018:ffff8881e049f790 EFLAGS: 00010246 [ 21.885678][ T305] RAX: 0000000000000000 RBX: 1ffff1103bae07ff RCX: ffffffff835a6db0 [ 21.893739][ T305] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8881dd703f38 [ 21.901803][ T305] RBP: 0000000000000000 R08: ffffffff835a6b83 R09: fffffbfff0d3170d [ 21.909749][ T305] R10: fffffbfff0d3170d R11: 1ffffffff0d3170c R12: ffff8881dd703f00 [ 21.917895][ T305] R13: dffffc0000000000 R14: ffff8881dd703f00 R15: ffff8881dd703f38 [ 21.925880][ T305] FS: 00007f73c8d06700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 21.934908][ T305] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.941498][ T305] CR2: 00007f73c8da9c88 CR3: 00000001dd4c5000 CR4: 00000000003406e0 [ 21.949510][ T305] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.957572][ T305] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.965605][ T305] Kernel panic - not syncing: Fatal exception [ 21.971885][ T305] Kernel Offset: disabled [ 21.976202][ T305] Rebooting in 86400 seconds..