./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor4292563794 <...> forked to background, child pid 192 [ 6.606860][ T190] dhcpcd (190) used greatest stack depth: 26576 bytes left Starting sshd: OK syzkaller syzkaller login: [ 13.496920][ T22] kauditd_printk_skb: 60 callbacks suppressed [ 13.496928][ T22] audit: type=1400 audit(1656886339.989:71): avc: denied { transition } for pid=265 comm="sshd" path="/bin/sh" dev="sda1" ino=73 scontext=system_u:system_r:initrc_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 13.502182][ T22] audit: type=1400 audit(1656886339.999:72): avc: denied { write } for pid=265 comm="sh" path="pipe:[1680]" dev="pipefs" ino=1680 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:initrc_t tclass=fifo_file permissive=1 Warning: Permanently added '10.128.1.20' (ECDSA) to the list of known hosts. execve("./syz-executor4292563794", ["./syz-executor4292563794"], 0x7fffa68c72a0 /* 10 vars */) = 0 brk(NULL) = 0x555556f76000 brk(0x555556f76c40) = 0x555556f76c40 arch_prctl(ARCH_SET_FS, 0x555556f76300) = 0 uname({sysname="Linux", nodename="syzkaller", ...}) = 0 set_tid_address(0x555556f765d0) = 304 set_robust_list(0x555556f765e0, 24) = 0 rt_sigaction(SIGRTMIN, {sa_handler=0x7f6ac0c8f380, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f6ac0c8fa50}, NULL, 8) = 0 rt_sigaction(SIGRT_1, {sa_handler=0x7f6ac0c8f420, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f6ac0c8fa50}, NULL, 8) = 0 rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0 prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0 readlink("/proc/self/exe", "/root/syz-executor4292563794", 4096) = 28 brk(0x555556f97c40) = 0x555556f97c40 brk(0x555556f98000) = 0x555556f98000 mprotect(0x7f6ac0d4f000, 16384, PROT_READ) = 0 mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000 mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000 mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000 clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555556f765d0) = 305 ./strace-static-x86_64: Process 305 attached [pid 305] set_robust_list(0x555556f765e0, 24) = 0 [pid 305] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0 [pid 305] setpgid(0, 0) = 0 [pid 305] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3 [pid 305] write(3, "1000", 4) = 4 [pid 305] close(3) = 0 [pid 305] futex(0x7f6ac0d5542c, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f6ac0c5f000 [pid 305] mprotect(0x7f6ac0c60000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 305] clone(child_stack=0x7f6ac0c7f3f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[306], tls=0x7f6ac0c7f700, child_tidptr=0x7f6ac0c7f9d0) = 306 [pid 305] futex(0x7f6ac0d55428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7f6ac0d5542c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 306 attached [pid 306] set_robust_list(0x7f6ac0c7f9e0, 24) = 0 [pid 306] openat(AT_FDCWD, "/dev/net/tun", O_RDONLY) = 3 [pid 306] futex(0x7f6ac0d5542c, FUTEX_WAKE_PRIVATE, 1000000 [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7f6ac0d55428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7f6ac0d5542c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 306] <... futex resumed>) = 1 [pid 306] ioctl(3, TUNSETIFF, 0x20000200) = 0 [pid 306] futex(0x7f6ac0d5542c, FUTEX_WAKE_PRIVATE, 1000000 [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7f6ac0d55428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7f6ac0d5542c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 306] <... futex resumed>) = 1 [pid 306] socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 4 [pid 306] futex(0x7f6ac0d5542c, FUTEX_WAKE_PRIVATE, 1000000 [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7f6ac0d55428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7f6ac0d5542c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 306] <... futex resumed>) = 1 [pid 306] socket(AF_PACKET, SOCK_DGRAM, htons(ETH_P_ALL)) = 5 [pid 306] futex(0x7f6ac0d5542c, FUTEX_WAKE_PRIVATE, 1000000 [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7f6ac0d55428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7f6ac0d5542c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 306] <... futex resumed>) = 1 [pid 306] ioctl(5, SIOCGIFINDEX, {ifr_name="rose0", ifr_ifindex=13}) = 0 [pid 306] futex(0x7f6ac0d5542c, FUTEX_WAKE_PRIVATE, 1000000 [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7f6ac0d55428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7f6ac0d5542c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [pid 306] <... futex resumed>) = 1 [pid 306] ioctl(3, TUNSETQUEUE, 0x20000340) = 0 [pid 306] futex(0x7f6ac0d5542c, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 305] <... futex resumed>) = 0 [pid 305] futex(0x7f6ac0d55428, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7f6ac0d5542c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} [ 20.301942][ T22] audit: type=1400 audit(1656886346.799:73): avc: denied { execmem } for pid=304 comm="syz-executor429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 20.326658][ T22] audit: type=1400 audit(1656886346.819:74): avc: denied { create } for pid=305 comm="syz-executor429" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [pid 306] sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x34\x00\x00\x00\x11\x00\x01\xe9\x0d\x7d\x1f\xc7\x4e\x1b\xed\x42\xec\x45\xb2\xfc\x0d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=52}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0 [pid 305] <... futex resumed>) = -1 ETIMEDOUT (Connection timed out) [pid 305] futex(0x7f6ac0d5543c, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f6ac0c3e000 [pid 305] mprotect(0x7f6ac0c3f000, 131072, PROT_READ|PROT_WRITE) = 0 [pid 305] clone(child_stack=0x7f6ac0c5e3f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[309], tls=0x7f6ac0c5e700, child_tidptr=0x7f6ac0c5e9d0) = 309 [pid 305] futex(0x7f6ac0d55438, FUTEX_WAKE_PRIVATE, 1000000) = 0 [pid 305] futex(0x7f6ac0d5543c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 309 attached [pid 309] set_robust_list(0x7f6ac0c5e9e0, 24) = 0 [pid 309] ioctl(3, TUNSETIFF, 0x20000200) = 0 [pid 309] futex(0x7f6ac0d5543c, FUTEX_WAKE_PRIVATE, 1000000) = 1 [pid 309] futex(0x7f6ac0d55438, FUTEX_WAIT_PRIVATE, 0, NULL [pid 305] <... futex resumed>) = 0 [ 20.347024][ T22] audit: type=1400 audit(1656886346.819:75): avc: denied { ioctl } for pid=305 comm="syz-executor429" path="socket:[1830]" dev="sockfs" ino=1830 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 20.349215][ T306] netlink: 20 bytes leftover after parsing attributes in process `syz-executor429'. [ 20.371911][ T22] audit: type=1400 audit(1656886346.819:76): avc: denied { read } for pid=193 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1 [ 20.459999][ T306] ================================================================== [ 20.468177][ T306] BUG: KASAN: slab-out-of-bounds in netif_napi_del+0x2c/0x7a0 [ 20.475603][ T306] Write of size 8 at addr ffff8881dd037f10 by task syz-executor429/306 [ 20.483823][ T306] [ 20.486140][ T306] CPU: 0 PID: 306 Comm: syz-executor429 Not tainted 5.4.190-syzkaller-00060-g148e4ba7f4fc #0 [ 20.496360][ T306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 20.506386][ T306] Call Trace: [ 20.509667][ T306] dump_stack+0x18e/0x1d5 [ 20.513971][ T306] ? netif_napi_del+0x2c/0x7a0 [ 20.518766][ T306] print_address_description+0x8c/0x630 [ 20.524303][ T306] ? printk+0x76/0x96 [ 20.528257][ T306] ? netif_napi_del+0x2c/0x7a0 [ 20.532989][ T306] ? vprintk_emit+0x3aa/0x3f0 [ 20.537645][ T306] ? netif_napi_del+0x2c/0x7a0 [ 20.542388][ T306] __kasan_report+0xf6/0x130 [ 20.547132][ T306] ? netif_napi_del+0x2c/0x7a0 [ 20.551883][ T306] kasan_report+0x30/0x60 [ 20.556286][ T306] check_memory_region+0x298/0x2d0 [ 20.561636][ T306] netif_napi_del+0x2c/0x7a0 [ 20.566199][ T306] free_netdev+0x188/0x310 [ 20.570584][ T306] netdev_run_todo+0xa79/0xc80 [ 20.575329][ T306] ? mutex_lock+0x6c/0xc0 [ 20.579629][ T306] rtnetlink_rcv_msg+0xa49/0xb90 [ 20.584548][ T306] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 20.590341][ T306] ? avc_denied+0x158/0x1c0 [ 20.594834][ T306] ? avc_has_perm_noaudit+0x2b0/0x370 [ 20.600183][ T306] ? avc_has_perm+0x7c/0x1c0 [ 20.605102][ T306] ? avc_has_perm+0xfd/0x1c0 [ 20.609670][ T306] netlink_rcv_skb+0x190/0x3a0 [ 20.614403][ T306] ? rtnetlink_bind+0x80/0x80 [ 20.619047][ T306] netlink_unicast+0x771/0x8d0 [ 20.623802][ T306] netlink_sendmsg+0x913/0xb90 [ 20.628554][ T306] ? netlink_getsockopt+0x840/0x840 [ 20.633732][ T306] ____sys_sendmsg+0x4ee/0x7c0 [ 20.638471][ T306] __sys_sendmsg+0x235/0x2f0 [ 20.643043][ T306] do_syscall_64+0xcb/0x1c0 [ 20.647524][ T306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 20.653738][ T306] RIP: 0033:0x7f6ac0ccda69 [ 20.658138][ T306] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 20.677717][ T306] RSP: 002b:00007f6ac0c7f308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 20.686115][ T306] RAX: ffffffffffffffda RBX: 00007f6ac0d55428 RCX: 00007f6ac0ccda69 [ 20.694058][ T306] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 20.702013][ T306] RBP: 00007f6ac0d55420 R08: 0000000000000000 R09: 0000000000000000 [ 20.710223][ T306] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ac0d5542c [ 20.718163][ T306] R13: 00007f6ac0d23064 R14: 74656e2f7665642f R15: 0000000000022000 [ 20.726105][ T306] [ 20.728401][ T306] Allocated by task 155: [ 20.732615][ T306] __kasan_kmalloc+0x131/0x1e0 [ 20.737347][ T306] kmem_cache_alloc+0xd0/0x210 [ 20.742080][ T306] getname_flags+0xb8/0x4e0 [ 20.746553][ T306] do_sys_open+0x2a3/0x700 [ 20.750935][ T306] do_syscall_64+0xcb/0x1c0 [ 20.755405][ T306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 20.761256][ T306] [ 20.763552][ T306] Freed by task 155: [ 20.767412][ T306] __kasan_slab_free+0x178/0x240 [ 20.772316][ T306] slab_free_freelist_hook+0x80/0x150 [ 20.777652][ T306] kmem_cache_free+0xa9/0x1d0 [ 20.782312][ T306] do_sys_open+0x59a/0x700 [ 20.786693][ T306] do_syscall_64+0xcb/0x1c0 [ 20.791163][ T306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 20.797013][ T306] [ 20.799312][ T306] The buggy address belongs to the object at ffff8881dd036600 [ 20.799312][ T306] which belongs to the cache names_cache of size 4096 [ 20.813415][ T306] The buggy address is located 2320 bytes to the right of [ 20.813415][ T306] 4096-byte region [ffff8881dd036600, ffff8881dd037600) [ 20.827340][ T306] The buggy address belongs to the page: [ 20.832944][ T306] page:ffffea0007740c00 refcount:1 mapcount:0 mapping:ffff8881f5cfa280 index:0x0 compound_mapcount: 0 [ 20.844096][ T306] flags: 0x8000000000010200(slab|head) [ 20.849523][ T306] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5cfa280 [ 20.858076][ T306] raw: 0000000000000000 0000000000070007 00000001ffffffff 0000000000000000 [ 20.866628][ T306] page dumped because: kasan: bad access detected [ 20.873004][ T306] page_owner tracks the page as allocated [ 20.878706][ T306] page last allocated via order 3, migratetype Unmovable, gfp_mask 0xd20c0(__GFP_IO|__GFP_FS|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC) [ 20.893683][ T306] prep_new_page+0x194/0x380 [ 20.898237][ T306] get_page_from_freelist+0x524/0x560 [ 20.903574][ T306] __alloc_pages_nodemask+0x2ab/0x6f0 [ 20.908910][ T306] alloc_slab_page+0x39/0x3e0 [ 20.913550][ T306] new_slab+0x97/0x450 [ 20.917596][ T306] ___slab_alloc+0x320/0x4b0 [ 20.922159][ T306] __slab_alloc+0x5a/0x90 [ 20.926455][ T306] kmem_cache_alloc+0x100/0x210 [ 20.931275][ T306] getname_flags+0xb8/0x4e0 [ 20.935758][ T306] do_sys_open+0x2a3/0x700 [ 20.940152][ T306] do_syscall_64+0xcb/0x1c0 [ 20.944619][ T306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 20.950473][ T306] page_owner free stack trace missing [ 20.955807][ T306] [ 20.958101][ T306] Memory state around the buggy address: [ 20.963709][ T306] ffff8881dd037e00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.971745][ T306] ffff8881dd037e80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.980118][ T306] >ffff8881dd037f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 20.988140][ T306] ^ [ 20.992705][ T306] ffff8881dd037f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 21.000749][ T306] ffff8881dd038000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 21.008773][ T306] ================================================================== [ 21.016808][ T306] Disabling lock debugging due to kernel taint [ 21.024806][ T306] kasan: CONFIG_KASAN_INLINE enabled [ 21.030118][ T306] kasan: GPF could be caused by NULL-ptr deref or user memory access [ 21.038163][ T306] general protection fault: 0000 [#1] PREEMPT SMP KASAN [ 21.045069][ T306] CPU: 1 PID: 306 Comm: syz-executor429 Tainted: G B 5.4.190-syzkaller-00060-g148e4ba7f4fc #0 [pid 305] exit_group(0 [pid 309] <... futex resumed>) = ? [pid 305] <... exit_group resumed>) = ? [pid 309] +++ exited with 0 +++ [ 21.056571][ T306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 06/29/2022 [ 21.066614][ T306] RIP: 0010:netif_napi_del+0x28f/0x7a0 [ 21.072043][ T306] Code: 00 74 08 4c 89 ff e8 10 3f 32 fe 49 8b 2f 49 39 ef 75 10 e8 43 d2 05 fe eb 35 90 e8 3b d2 05 fe 48 89 dd 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 e2 3e 32 fe 48 8b 5d 00 48 89 ef [ 21.091619][ T306] RSP: 0018:ffff8881dd67f790 EFLAGS: 00010246 [ 21.097671][ T306] RAX: 0000000000000000 RBX: 1ffff1103ba06fff RCX: ffffffff835a7b10 [ 21.105621][ T306] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8881dd037f38 [ 21.113580][ T306] RBP: 0000000000000000 R08: ffffffff835a78e3 R09: fffffbfff0d3170d [ 21.121525][ T306] R10: fffffbfff0d3170d R11: 1ffffffff0d3170c R12: ffff8881dd037f00 [ 21.129479][ T306] R13: dffffc0000000000 R14: ffff8881dd037f00 R15: ffff8881dd037f38 [ 21.137447][ T306] FS: 00007f6ac0c7f700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 21.146345][ T306] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.152987][ T306] CR2: 000055c20c237b60 CR3: 00000001dd416000 CR4: 00000000003406e0 [ 21.160933][ T306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.168871][ T306] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.176815][ T306] Call Trace: [ 21.180088][ T306] free_netdev+0x188/0x310 [ 21.184492][ T306] netdev_run_todo+0xa79/0xc80 [ 21.189247][ T306] ? mutex_lock+0x6c/0xc0 [ 21.193556][ T306] rtnetlink_rcv_msg+0xa49/0xb90 [ 21.198471][ T306] ? _raw_spin_unlock_irqrestore+0x57/0x80 [ 21.204259][ T306] ? avc_denied+0x158/0x1c0 [ 21.208756][ T306] ? avc_has_perm_noaudit+0x2b0/0x370 [ 21.214105][ T306] ? avc_has_perm+0x7c/0x1c0 [ 21.218665][ T306] ? avc_has_perm+0xfd/0x1c0 [ 21.223243][ T306] netlink_rcv_skb+0x190/0x3a0 [ 21.228006][ T306] ? rtnetlink_bind+0x80/0x80 [ 21.232659][ T306] netlink_unicast+0x771/0x8d0 [ 21.237400][ T306] netlink_sendmsg+0x913/0xb90 [ 21.242185][ T306] ? netlink_getsockopt+0x840/0x840 [ 21.247357][ T306] ____sys_sendmsg+0x4ee/0x7c0 [ 21.252113][ T306] __sys_sendmsg+0x235/0x2f0 [ 21.256676][ T306] do_syscall_64+0xcb/0x1c0 [ 21.261158][ T306] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 21.267034][ T306] RIP: 0033:0x7f6ac0ccda69 [ 21.271433][ T306] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48 [ 21.291127][ T306] RSP: 002b:00007f6ac0c7f308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 21.299524][ T306] RAX: ffffffffffffffda RBX: 00007f6ac0d55428 RCX: 00007f6ac0ccda69 [ 21.307517][ T306] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004 [ 21.315469][ T306] RBP: 00007f6ac0d55420 R08: 0000000000000000 R09: 0000000000000000 [ 21.323422][ T306] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f6ac0d5542c [ 21.331566][ T306] R13: 00007f6ac0d23064 R14: 74656e2f7665642f R15: 0000000000022000 [ 21.339514][ T306] Modules linked in: [ 21.344190][ T306] ---[ end trace b8accaf6266896fd ]--- [ 21.349658][ T306] RIP: 0010:netif_napi_del+0x28f/0x7a0 [ 21.355114][ T306] Code: 00 74 08 4c 89 ff e8 10 3f 32 fe 49 8b 2f 49 39 ef 75 10 e8 43 d2 05 fe eb 35 90 e8 3b d2 05 fe 48 89 dd 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 e2 3e 32 fe 48 8b 5d 00 48 89 ef [ 21.374725][ T306] RSP: 0018:ffff8881dd67f790 EFLAGS: 00010246 [ 21.380870][ T306] RAX: 0000000000000000 RBX: 1ffff1103ba06fff RCX: ffffffff835a7b10 [ 21.388821][ T306] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8881dd037f38 [ 21.396906][ T306] RBP: 0000000000000000 R08: ffffffff835a78e3 R09: fffffbfff0d3170d [ 21.404876][ T306] R10: fffffbfff0d3170d R11: 1ffffffff0d3170c R12: ffff8881dd037f00 [ 21.412844][ T306] R13: dffffc0000000000 R14: ffff8881dd037f00 R15: ffff8881dd037f38 [ 21.420806][ T306] FS: 00007f6ac0c7f700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000 [ 21.429704][ T306] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 21.436334][ T306] CR2: 000055c20c237b60 CR3: 00000001dd416000 CR4: 00000000003406e0 [ 21.444322][ T306] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 21.452298][ T306] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 21.460268][ T306] Kernel panic - not syncing: Fatal exception [ 21.466469][ T306] Kernel Offset: disabled [ 21.470768][ T306] Rebooting in 86400 seconds..