./strace-static-x86_64 -e \!wait4,clock_nanosleep,nanosleep -s 100 -x -f ./syz-executor293923963

<...>
Warning: Permanently added '10.128.0.243' (ECDSA) to the list of known hosts.
execve("./syz-executor293923963", ["./syz-executor293923963"], 0x7ffed4892e80 /* 10 vars */) = 0
brk(NULL)                               = 0x555555b5f000
brk(0x555555b5fc40)                     = 0x555555b5fc40
arch_prctl(ARCH_SET_FS, 0x555555b5f300) = 0
uname({sysname="Linux", nodename="syzkaller", ...}) = 0
set_tid_address(0x555555b5f5d0)         = 303
set_robust_list(0x555555b5f5e0, 24)     = 0
rt_sigaction(SIGRTMIN, {sa_handler=0x7f73c8d16380, sa_mask=[], sa_flags=SA_RESTORER|SA_SIGINFO, sa_restorer=0x7f73c8d16a50}, NULL, 8) = 0
rt_sigaction(SIGRT_1, {sa_handler=0x7f73c8d16420, sa_mask=[], sa_flags=SA_RESTORER|SA_RESTART|SA_SIGINFO, sa_restorer=0x7f73c8d16a50}, NULL, 8) = 0
rt_sigprocmask(SIG_UNBLOCK, [RTMIN RT_1], NULL, 8) = 0
prlimit64(0, RLIMIT_STACK, NULL, {rlim_cur=8192*1024, rlim_max=RLIM64_INFINITY}) = 0
readlink("/proc/self/exe", "/root/syz-executor293923963", 4096) = 27
brk(0x555555b80c40)                     = 0x555555b80c40
brk(0x555555b81000)                     = 0x555555b81000
mprotect(0x7f73c8dd6000, 16384, PROT_READ) = 0
mmap(0x1ffff000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x1ffff000
mmap(0x20000000, 16777216, PROT_READ|PROT_WRITE|PROT_EXEC, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x20000000
mmap(0x21000000, 4096, PROT_NONE, MAP_PRIVATE|MAP_FIXED|MAP_ANONYMOUS, -1, 0) = 0x21000000
clone(child_stack=NULL, flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0x555555b5f5d0) = 304
./strace-static-x86_64: Process 304 attached
[pid   304] set_robust_list(0x555555b5f5e0, 24) = 0
[pid   304] prctl(PR_SET_PDEATHSIG, SIGKILL) = 0
[pid   304] setpgid(0, 0)               = 0
[pid   304] openat(AT_FDCWD, "/proc/self/oom_score_adj", O_WRONLY|O_CLOEXEC) = 3
[pid   304] write(3, "1000", 4)         = 4
[pid   304] close(3)                    = 0
[pid   304] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000) = 0
[pid   304] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f73c8ce6000
[pid   304] mprotect(0x7f73c8ce7000, 131072, PROT_READ|PROT_WRITE) = 0
[pid   304] clone(child_stack=0x7f73c8d063f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[305], tls=0x7f73c8d06700, child_tidptr=0x7f73c8d069d0) = 305
[pid   304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0
[pid   304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 305 attached
 <unfinished ...>
[pid   305] set_robust_list(0x7f73c8d069e0, 24) = 0
[pid   305] openat(AT_FDCWD, "/dev/net/tun", O_RDONLY) = 3
[pid   305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 <unfinished ...>
[pid   304] <... futex resumed>)        = 0
[pid   304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0
[pid   304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} <unfinished ...>
[pid   305] <... futex resumed>)        = 1
[pid   305] ioctl(3, TUNSETIFF, 0x20000200) = 0
[pid   305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 <unfinished ...>
[pid   304] <... futex resumed>)        = 0
[pid   304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0
[pid   304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} <unfinished ...>
[pid   305] <... futex resumed>)        = 1
[pid   305] socket(AF_NETLINK, SOCK_RAW, NETLINK_ROUTE) = 4
[pid   305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 <unfinished ...>
[pid   304] <... futex resumed>)        = 0
[pid   304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0
[pid   304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} <unfinished ...>
[pid   305] <... futex resumed>)        = 1
[pid   305] socket(AF_PACKET, SOCK_DGRAM, htons(ETH_P_ALL)) = 5
[pid   305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 <unfinished ...>
[pid   304] <... futex resumed>)        = 0
[pid   304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0
[pid   304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} <unfinished ...>
[pid   305] <... futex resumed>)        = 1
[pid   305] ioctl(5, SIOCGIFINDEX, {ifr_name="rose0", ifr_ifindex=13}) = 0
[pid   305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 <unfinished ...>
[pid   304] <... futex resumed>)        = 0
[pid   304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0
[pid   304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} <unfinished ...>
[pid   305] <... futex resumed>)        = 1
[pid   305] ioctl(3, TUNSETQUEUE, 0x20000340) = 0
[pid   305] futex(0x7f73c8ddc42c, FUTEX_WAKE_PRIVATE, 1000000 <unfinished ...>
[pid   304] <... futex resumed>)        = 0
[pid   304] futex(0x7f73c8ddc428, FUTEX_WAKE_PRIVATE, 1000000) = 0
[pid   304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000} <unfinished ...>
[pid   305] <... futex resumed>)        = 1
[   20.760209][   T22] audit: type=1400 audit(1655517152.140:73): avc:  denied  { execmem } for  pid=303 comm="syz-executor293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1
[   20.788424][  T305] netlink: 20 bytes leftover after parsing attributes in process `syz-executor293'.
[pid   305] sendmsg(4, {msg_name=NULL, msg_namelen=0, msg_iov=[{iov_base="\x34\x00\x00\x00\x11\x00\x01\xe9\x0d\x7d\x1f\xc7\x4e\x1b\xed\x42\xec\x45\xb2\xfc\x0d\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00", iov_len=52}], msg_iovlen=1, msg_controllen=0, msg_flags=0}, 0 <unfinished ...>
[pid   304] <... futex resumed>)        = -1 ETIMEDOUT (Connection timed out)
[pid   304] futex(0x7f73c8ddc42c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=0}) = -1 ETIMEDOUT (Connection timed out)
[pid   304] futex(0x7f73c8ddc43c, FUTEX_WAKE_PRIVATE, 1000000) = 0
[pid   304] mmap(NULL, 135168, PROT_NONE, MAP_PRIVATE|MAP_ANONYMOUS|MAP_STACK, -1, 0) = 0x7f73c8cc5000
[pid   304] mprotect(0x7f73c8cc6000, 131072, PROT_READ|PROT_WRITE) = 0
[pid   304] clone(child_stack=0x7f73c8ce53f0, flags=CLONE_VM|CLONE_FS|CLONE_FILES|CLONE_SIGHAND|CLONE_THREAD|CLONE_SYSVSEM|CLONE_SETTLS|CLONE_PARENT_SETTID|CLONE_CHILD_CLEARTID, parent_tid=[308], tls=0x7f73c8ce5700, child_tidptr=0x7f73c8ce59d0) = 308
[pid   304] futex(0x7f73c8ddc438, FUTEX_WAKE_PRIVATE, 1000000) = 0
[pid   304] futex(0x7f73c8ddc43c, FUTEX_WAIT_PRIVATE, 0, {tv_sec=0, tv_nsec=50000000}./strace-static-x86_64: Process 308 attached
 <unfinished ...>
[pid   308] set_robust_list(0x7f73c8ce59e0, 24) = 0
[   20.788772][   T22] audit: type=1400 audit(1655517152.170:74): avc:  denied  { create } for  pid=304 comm="syz-executor293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[   20.817718][   T22] audit: type=1400 audit(1655517152.170:75): avc:  denied  { ioctl } for  pid=304 comm="syz-executor293" path="socket:[985]" dev="sockfs" ino=985 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[pid   308] ioctl(3, TUNSETIFF, 0x20000200) = 0
[pid   308] futex(0x7f73c8ddc43c, FUTEX_WAKE_PRIVATE, 1000000) = 1
[pid   308] futex(0x7f73c8ddc438, FUTEX_WAIT_PRIVATE, 0, NULL <unfinished ...>
[pid   304] <... futex resumed>)        = 0
[   20.843042][   T22] audit: type=1400 audit(1655517152.190:76): avc:  denied  { read } for  pid=192 comm="dhcpcd" scontext=system_u:system_r:dhcpc_t tcontext=system_u:system_r:dhcpc_t tclass=netlink_kobject_uevent_socket permissive=1
[   20.880622][  T305] ==================================================================
[   20.888886][  T305] BUG: KASAN: slab-out-of-bounds in netif_napi_del+0x2c/0x7a0
[   20.896482][  T305] Write of size 8 at addr ffff8881dd703f10 by task syz-executor293/305
[   20.904688][  T305] 
[   20.906997][  T305] CPU: 0 PID: 305 Comm: syz-executor293 Not tainted 5.4.190-syzkaller-00044-g77dc925ddffb #0
[   20.917432][  T305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   20.927465][  T305] Call Trace:
[   20.930850][  T305]  dump_stack+0x18e/0x1d5
[   20.935215][  T305]  ? netif_napi_del+0x2c/0x7a0
[   20.939979][  T305]  print_address_description+0x8c/0x630
[   20.945763][  T305]  ? printk+0x76/0x96
[   20.949862][  T305]  ? netif_napi_del+0x2c/0x7a0
[   20.954609][  T305]  ? vprintk_emit+0x3aa/0x3f0
[pid   304] exit_group(0 <unfinished ...>
[pid   308] <... futex resumed>)        = ?
[pid   304] <... exit_group resumed>)   = ?
[pid   308] +++ exited with 0 +++
[   20.959266][  T305]  ? netif_napi_del+0x2c/0x7a0
[   20.964103][  T305]  __kasan_report+0xf6/0x130
[   20.968709][  T305]  ? netif_napi_del+0x2c/0x7a0
[   20.973459][  T305]  kasan_report+0x30/0x60
[   20.978021][  T305]  check_memory_region+0x298/0x2d0
[   20.983131][  T305]  netif_napi_del+0x2c/0x7a0
[   20.987696][  T305]  free_netdev+0x188/0x310
[   20.992082][  T305]  netdev_run_todo+0xa79/0xc80
[   20.996820][  T305]  ? mutex_lock+0x6c/0xc0
[   21.001267][  T305]  rtnetlink_rcv_msg+0xa49/0xb90
[   21.006189][  T305]  ? _raw_spin_unlock_irqrestore+0x57/0x80
[   21.011988][  T305]  ? avc_denied+0x158/0x1c0
[   21.016527][  T305]  ? avc_has_perm_noaudit+0x2b0/0x370
[   21.021878][  T305]  ? avc_has_perm+0x7c/0x1c0
[   21.026437][  T305]  ? avc_has_perm+0xfd/0x1c0
[   21.031006][  T305]  netlink_rcv_skb+0x190/0x3a0
[   21.035869][  T305]  ? rtnetlink_bind+0x80/0x80
[   21.040534][  T305]  netlink_unicast+0x771/0x8d0
[   21.045274][  T305]  netlink_sendmsg+0x913/0xb90
[   21.050020][  T305]  ? netlink_getsockopt+0x840/0x840
[   21.055193][  T305]  ____sys_sendmsg+0x4ee/0x7c0
[   21.059938][  T305]  __sys_sendmsg+0x235/0x2f0
[   21.064512][  T305]  do_syscall_64+0xcb/0x1c0
[   21.069004][  T305]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   21.074880][  T305] RIP: 0033:0x7f73c8d54a69
[   21.079274][  T305] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   21.098950][  T305] RSP: 002b:00007f73c8d06308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   21.107344][  T305] RAX: ffffffffffffffda RBX: 00007f73c8ddc428 RCX: 00007f73c8d54a69
[   21.115292][  T305] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004
[   21.123242][  T305] RBP: 00007f73c8ddc420 R08: 0000000000000000 R09: 0000000000000000
[   21.131210][  T305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73c8ddc42c
[   21.139165][  T305] R13: 00007f73c8daa064 R14: 74656e2f7665642f R15: 0000000000022000
[   21.147246][  T305] 
[   21.149653][  T305] Allocated by task 155:
[   21.153961][  T305]  __kasan_kmalloc+0x131/0x1e0
[   21.158711][  T305]  inode_doinit_use_xattr+0x58/0x3d0
[   21.163976][  T305]  inode_doinit_with_dentry+0x9c6/0xf30
[   21.169491][  T305]  security_d_instantiate+0xa5/0x100
[   21.174767][  T305]  d_splice_alias+0x6c/0x3b0
[   21.179343][  T305]  kernfs_iop_lookup+0x17a/0x1f0
[   21.184365][  T305]  path_openat+0x1fc2/0x3710
[   21.188946][  T305]  do_filp_open+0x19a/0x3a0
[   21.193426][  T305]  do_sys_open+0x2e3/0x700
[   21.197821][  T305]  do_syscall_64+0xcb/0x1c0
[   21.202301][  T305]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   21.208164][  T305] 
[   21.210483][  T305] Freed by task 155:
[   21.214398][  T305]  __kasan_slab_free+0x178/0x240
[   21.219306][  T305]  slab_free_freelist_hook+0x80/0x150
[   21.224650][  T305]  kfree+0xc6/0x260
[   21.228426][  T305]  inode_doinit_use_xattr+0x251/0x3d0
[   21.233780][  T305]  inode_doinit_with_dentry+0x9c6/0xf30
[   21.239305][  T305]  security_d_instantiate+0xa5/0x100
[   21.244563][  T305]  d_splice_alias+0x6c/0x3b0
[   21.249119][  T305]  kernfs_iop_lookup+0x17a/0x1f0
[   21.254025][  T305]  path_openat+0x1fc2/0x3710
[   21.259016][  T305]  do_filp_open+0x19a/0x3a0
[   21.268011][  T305]  do_sys_open+0x2e3/0x700
[   21.272406][  T305]  do_syscall_64+0xcb/0x1c0
[   21.276885][  T305]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   21.282751][  T305] 
[   21.285049][  T305] The buggy address belongs to the object at ffff8881dd703e00
[   21.285049][  T305]  which belongs to the cache kmalloc-256 of size 256
[   21.299088][  T305] The buggy address is located 16 bytes to the right of
[   21.299088][  T305]  256-byte region [ffff8881dd703e00, ffff8881dd703f00)
[   21.312854][  T305] The buggy address belongs to the page:
[   21.318470][  T305] page:ffffea000775c080 refcount:1 mapcount:0 mapping:ffff8881f5c02780 index:0x0 compound_mapcount: 0
[   21.329370][  T305] flags: 0x8000000000010200(slab|head)
[   21.334801][  T305] raw: 8000000000010200 dead000000000100 dead000000000122 ffff8881f5c02780
[   21.343449][  T305] raw: 0000000000000000 0000000080100010 00000001ffffffff 0000000000000000
[   21.352010][  T305] page dumped because: kasan: bad access detected
[   21.358480][  T305] page_owner tracks the page as allocated
[   21.364166][  T305] page last allocated via order 1, migratetype Unmovable, gfp_mask 0xd2040(__GFP_IO|__GFP_NOWARN|__GFP_NORETRY|__GFP_COMP|__GFP_NOMEMALLOC)
[   21.378364][  T305]  prep_new_page+0x194/0x380
[   21.382932][  T305]  get_page_from_freelist+0x524/0x560
[   21.388345][  T305]  __alloc_pages_nodemask+0x2ab/0x6f0
[   21.393694][  T305]  alloc_slab_page+0x39/0x3e0
[   21.398340][  T305]  new_slab+0x97/0x450
[   21.402390][  T305]  ___slab_alloc+0x320/0x4b0
[   21.406959][  T305]  __slab_alloc+0x5a/0x90
[   21.411268][  T305]  kmem_cache_alloc_trace+0x129/0x240
[   21.416610][  T305]  inode_doinit_use_xattr+0x58/0x3d0
[   21.421880][  T305]  inode_doinit_with_dentry+0x9c6/0xf30
[   21.427416][  T305]  security_d_instantiate+0xa5/0x100
[   21.432669][  T305]  d_splice_alias+0x6c/0x3b0
[   21.437280][  T305]  kernfs_iop_lookup+0x17a/0x1f0
[   21.442210][  T305]  path_openat+0x1fc2/0x3710
[   21.446779][  T305]  do_filp_open+0x19a/0x3a0
[   21.451561][  T305]  do_sys_open+0x2e3/0x700
[   21.455942][  T305] page_owner free stack trace missing
[   21.461281][  T305] 
[   21.463601][  T305] Memory state around the buggy address:
[   21.469208][  T305]  ffff8881dd703e00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.477237][  T305]  ffff8881dd703e80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[   21.485267][  T305] >ffff8881dd703f00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.493305][  T305]                          ^
[   21.497862][  T305]  ffff8881dd703f80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[   21.505904][  T305]  ffff8881dd704000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
[   21.513936][  T305] ==================================================================
[   21.521972][  T305] Disabling lock debugging due to kernel taint
[   21.529397][  T305] kasan: CONFIG_KASAN_INLINE enabled
[   21.534786][  T305] kasan: GPF could be caused by NULL-ptr deref or user memory access
[   21.542960][  T305] general protection fault: 0000 [#1] PREEMPT SMP KASAN
[   21.549977][  T305] CPU: 1 PID: 305 Comm: syz-executor293 Tainted: G    B             5.4.190-syzkaller-00044-g77dc925ddffb #0
[   21.561477][  T305] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011
[   21.571508][  T305] RIP: 0010:netif_napi_del+0x28f/0x7a0
[   21.577036][  T305] Code: 00 74 08 4c 89 ff e8 d0 39 32 fe 49 8b 2f 49 39 ef 75 10 e8 03 cd 05 fe eb 35 90 e8 fb cc 05 fe 48 89 dd 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 a2 39 32 fe 48 8b 5d 00 48 89 ef
[   21.596622][  T305] RSP: 0018:ffff8881e049f790 EFLAGS: 00010246
[   21.602767][  T305] RAX: 0000000000000000 RBX: 1ffff1103bae07ff RCX: ffffffff835a6db0
[   21.610708][  T305] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8881dd703f38
[   21.618666][  T305] RBP: 0000000000000000 R08: ffffffff835a6b83 R09: fffffbfff0d3170d
[   21.626616][  T305] R10: fffffbfff0d3170d R11: 1ffffffff0d3170c R12: ffff8881dd703f00
[   21.634579][  T305] R13: dffffc0000000000 R14: ffff8881dd703f00 R15: ffff8881dd703f38
[   21.642526][  T305] FS:  00007f73c8d06700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
[   21.651431][  T305] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   21.657985][  T305] CR2: 00007f73c8da9c88 CR3: 00000001dd4c5000 CR4: 00000000003406e0
[   21.666054][  T305] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   21.673997][  T305] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   21.681943][  T305] Call Trace:
[   21.685239][  T305]  free_netdev+0x188/0x310
[   21.689634][  T305]  netdev_run_todo+0xa79/0xc80
[   21.694407][  T305]  ? mutex_lock+0x6c/0xc0
[   21.698714][  T305]  rtnetlink_rcv_msg+0xa49/0xb90
[   21.703632][  T305]  ? _raw_spin_unlock_irqrestore+0x57/0x80
[   21.709418][  T305]  ? avc_denied+0x158/0x1c0
[   21.713912][  T305]  ? avc_has_perm_noaudit+0x2b0/0x370
[   21.719258][  T305]  ? avc_has_perm+0x7c/0x1c0
[   21.723817][  T305]  ? avc_has_perm+0xfd/0x1c0
[   21.728552][  T305]  netlink_rcv_skb+0x190/0x3a0
[   21.733293][  T305]  ? rtnetlink_bind+0x80/0x80
[   21.737958][  T305]  netlink_unicast+0x771/0x8d0
[   21.742694][  T305]  netlink_sendmsg+0x913/0xb90
[   21.747430][  T305]  ? netlink_getsockopt+0x840/0x840
[   21.752683][  T305]  ____sys_sendmsg+0x4ee/0x7c0
[   21.757425][  T305]  __sys_sendmsg+0x235/0x2f0
[   21.761987][  T305]  do_syscall_64+0xcb/0x1c0
[   21.766460][  T305]  entry_SYSCALL_64_after_hwframe+0x44/0xa9
[   21.772426][  T305] RIP: 0033:0x7f73c8d54a69
[   21.776811][  T305] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 11 15 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
[   21.796392][  T305] RSP: 002b:00007f73c8d06308 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   21.804777][  T305] RAX: ffffffffffffffda RBX: 00007f73c8ddc428 RCX: 00007f73c8d54a69
[   21.812734][  T305] RDX: 0000000000000000 RSI: 0000000020000180 RDI: 0000000000000004
[   21.820693][  T305] RBP: 00007f73c8ddc420 R08: 0000000000000000 R09: 0000000000000000
[   21.828652][  T305] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f73c8ddc42c
[   21.836594][  T305] R13: 00007f73c8daa064 R14: 74656e2f7665642f R15: 0000000000022000
[   21.844538][  T305] Modules linked in:
[   21.848720][  T305] ---[ end trace 3e72d5c41413a563 ]---
[   21.854385][  T305] RIP: 0010:netif_napi_del+0x28f/0x7a0
[   21.859875][  T305] Code: 00 74 08 4c 89 ff e8 d0 39 32 fe 49 8b 2f 49 39 ef 75 10 e8 03 cd 05 fe eb 35 90 e8 fb cc 05 fe 48 89 dd 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 74 08 48 89 ef e8 a2 39 32 fe 48 8b 5d 00 48 89 ef
[   21.879592][  T305] RSP: 0018:ffff8881e049f790 EFLAGS: 00010246
[   21.885678][  T305] RAX: 0000000000000000 RBX: 1ffff1103bae07ff RCX: ffffffff835a6db0
[   21.893739][  T305] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8881dd703f38
[   21.901803][  T305] RBP: 0000000000000000 R08: ffffffff835a6b83 R09: fffffbfff0d3170d
[   21.909749][  T305] R10: fffffbfff0d3170d R11: 1ffffffff0d3170c R12: ffff8881dd703f00
[   21.917895][  T305] R13: dffffc0000000000 R14: ffff8881dd703f00 R15: ffff8881dd703f38
[   21.925880][  T305] FS:  00007f73c8d06700(0000) GS:ffff8881f6f00000(0000) knlGS:0000000000000000
[   21.934908][  T305] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[   21.941498][  T305] CR2: 00007f73c8da9c88 CR3: 00000001dd4c5000 CR4: 00000000003406e0
[   21.949510][  T305] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[   21.957572][  T305] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[   21.965605][  T305] Kernel panic - not syncing: Fatal exception
[   21.971885][  T305] Kernel Offset: disabled
[   21.976202][  T305] Rebooting in 86400 seconds..