[ 67.124686][ T571] 8021q: 802.1Q VLAN Support v1.8
[ 73.781414][ T617] gre: GRE over IPv4 demultiplexor driver
[ 73.803521][ T617] ip_gre: GRE over IPv4 tunneling driver
[ 75.447740][ T635] lag: Mode changed to "loadbalance"
[ 75.903844][ T638] lag: Port device veth2 added
[ 76.430797][ T642] lag: Port device veth4 added
[ 76.779393][ T644] 8021q: adding VLAN 0 to HW filter on device lag
[ 76.941509][ T645] br1: port 1(lag) entered blocking state
[ 76.942675][ T645] br1: port 1(lag) entered disabled state
[ 76.942910][ T645] lag: entered allmulticast mode
[ 76.943077][ T645] veth2: entered allmulticast mode
[ 76.943404][ T645] veth4: entered allmulticast mode
[ 76.945741][ T645] veth2: entered promiscuous mode
[ 76.946037][ T645] veth4: entered promiscuous mode
[ 77.133409][ T646] br1: port 1(lag) entered blocking state
[ 77.133824][ T646] br1: port 1(lag) entered forwarding state
[ 86.299435][ T680] Mirror/redirect action on
[ 99.981845][ C3] ==================================================================
[ 99.982168][ C3] BUG: KASAN: slab-use-after-free in ___neigh_create+0xd58/0xf30
[ 99.982465][ C3] Write of size 8 at addr ffff8880082a2818 by task mausezahn/695
[ 99.982748][ C3]
[ 99.982847][ C3] CPU: 3 UID: 0 PID: 695 Comm: mausezahn Not tainted 6.12.0-rc3-virtme #1
[ 99.983139][ C3] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 99.983577][ C3] Call Trace:
[ 99.983726][ C3]
[ 99.983826][ C3] dump_stack_lvl+0x82/0xd0
[ 99.984028][ C3] print_address_description.constprop.0+0x2c/0x3b0
[ 99.984282][ C3] ? ___neigh_create+0xd58/0xf30
[ 99.984477][ C3] print_report+0xb4/0x270
[ 99.984670][ C3] ? kasan_addr_to_slab+0x25/0x80
[ 99.984879][ C3] kasan_report+0xbd/0xf0
[ 99.985024][ C3] ? ___neigh_create+0xd58/0xf30
[ 99.985226][ C3] ___neigh_create+0xd58/0xf30
[ 99.985416][ C3] ip_finish_output2+0xb79/0x17f0
[ 99.985610][ C3] ? mark_lock+0x38/0x3e0
[ 99.985756][ C3] ? __pfx_ip_finish_output2+0x10/0x10
[ 99.985950][ C3] ? __ip_finish_output+0x10f/0x770
[ 99.986142][ C3] ip_output+0x16b/0x4f0
[ 99.986292][ C3] ? __pfx_ip_output+0x10/0x10
[ 99.986485][ C3] ? ip_local_out+0x25/0x3b0
[ 99.986674][ C3] iptunnel_xmit+0x578/0x930
[ 99.986869][ C3] ? dst_cache_per_cpu_dst_set+0x64/0x100
[ 99.987065][ C3] ip_tunnel_xmit+0x1403/0x2830
[ 99.987263][ C3] ? __pfx_ip_tunnel_xmit+0x10/0x10
[ 99.987452][ C3] ? kasan_set_track+0x1f/0x20
[ 99.987649][ C3] ? __kasan_kmalloc+0x7f/0x90
[ 99.987841][ C3] ? skb_release_data+0x48b/0x6a0
[ 99.988041][ C3] __gre_xmit+0x4af/0xa40 [ip_gre]
[ 99.988235][ C3] ? __pfx___gre_xmit+0x10/0x10 [ip_gre]
[ 99.988429][ C3] ? __pfx_pskb_expand_head+0x10/0x10
[ 99.988622][ C3] ? __pfx_packet_rcv+0x10/0x10
[ 99.988815][ C3] gre_tap_xmit+0x433/0x580 [ip_gre]
[ 99.989009][ C3] dev_hard_start_xmit+0x10e/0x360
[ 99.989201][ C3] sch_direct_xmit+0x1e0/0xa60
[ 99.989400][ C3] ? __lock_acquire+0xb3f/0x1580
[ 99.989591][ C3] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 99.989782][ C3] ? __pfx_sch_direct_xmit+0x10/0x10
[ 99.989972][ C3] ? __dev_xmit_skb+0x95b/0x10b0
[ 99.990163][ C3] ? lock_acquire+0x32/0xc0
[ 99.990352][ C3] ? __dev_xmit_skb+0x95b/0x10b0
[ 99.990542][ C3] __dev_xmit_skb+0xaff/0x10b0
[ 99.990729][ C3] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 99.990935][ C3] ? trace_lock_acquire+0x14d/0x1f0
[ 99.991132][ C3] ? __pfx___dev_xmit_skb+0x10/0x10
[ 99.991338][ C3] ? __dev_queue_xmit+0x1e4/0x18b0
[ 99.991529][ C3] ? lock_acquire+0x32/0xc0
[ 99.991722][ C3] ? __dev_queue_xmit+0x1e4/0x18b0
[ 99.991912][ C3] __dev_queue_xmit+0x778/0x18b0
[ 99.992104][ C3] ? __pfx___lock_release+0x10/0x10
[ 99.992295][ C3] ? __pfx_do_raw_spin_lock+0x10/0x10
[ 99.992495][ C3] ? __pfx___dev_queue_xmit+0x10/0x10
[ 99.992689][ C3] ? __create_object+0x5e/0xb0
[ 99.992883][ C3] ? trace_kmem_cache_alloc+0x2d/0xe0
[ 99.993077][ C3] ? kmem_cache_alloc_noprof+0x119/0x250
[ 99.993275][ C3] ? __copy_skb_header+0xaf/0x490
[ 99.993468][ C3] ? __skb_clone+0x57a/0x760
[ 99.993662][ C3] tcf_mirred_to_dev+0x754/0xeb0 [act_mirred]
[ 99.993901][ C3] ? __lock_release+0x103/0x460
[ 99.994102][ C3] ? is_bpf_text_address+0x67/0x120
[ 99.994296][ C3] tcf_mirred_act+0x33b/0x780 [act_mirred]
[ 99.994533][ C3] ? trace_lock_acquire+0x14d/0x1f0
[ 99.994727][ C3] tcf_action_exec.part.0+0x112/0x3d0
[ 99.994947][ C3] fl_classify+0x508/0x680 [cls_flower]
[ 99.995149][ C3] ? __pfx_fl_classify+0x10/0x10 [cls_flower]
[ 99.995390][ C3] ? get_stack_info_noinstr+0x18/0x110
[ 99.995596][ C3] ? get_stack_info+0x35/0xc0
[ 99.995790][ C3] ? stack_access_ok+0xda/0x1f0
[ 99.995986][ C3] ? arch_stack_walk+0x68/0xf0
[ 99.996180][ C3] ? unwind_next_frame+0x12af/0x1d00
[ 99.996378][ C3] ? hlock_class+0x4e/0x130
[ 99.996577][ C3] ? validate_chain+0x130/0x9b0
[ 99.996775][ C3] ? __pfx_unwind_next_frame+0x10/0x10
[ 99.996967][ C3] ? __pfx_validate_chain+0x10/0x10
[ 99.997158][ C3] ? hlock_class+0x4e/0x130
[ 99.997355][ C3] ? validate_chain+0x130/0x9b0
[ 99.997551][ C3] ? __lock_acquire+0xb3f/0x1580
[ 99.997746][ C3] ? __pfx_validate_chain+0x10/0x10
[ 99.997939][ C3] ? hlock_class+0x4e/0x130
[ 99.998131][ C3] ? mark_lock+0x38/0x3e0
[ 99.998277][ C3] ? hlock_class+0x4e/0x130
[ 99.998477][ C3] __tcf_classify+0x329/0x7d0
[ 99.998680][ C3] tcf_classify+0x283/0x930
[ 99.998871][ C3] ? __pfx___lock_release+0x10/0x10
[ 99.999066][ C3] ? __pfx_lock_acquire.part.0+0x10/0x10
[ 99.999259][ C3] ? __pfx_tcf_classify+0x10/0x10
[ 99.999461][ C3] tc_run+0x2be/0x700
[ 99.999607][ C3] ? sock_def_readable+0x123/0x300
[ 99.999799][ C3] ? __pfx_tc_run+0x10/0x10
[ 99.999989][ C3] ? packet_rcv+0xd18/0x13b0
[ 100.000185][ C3] __netif_receive_skb_core.constprop.0+0x11d6/0x2ee0
[ 100.000432][ C3] ? kmem_cache_free+0xf8/0x340
[ 100.000624][ C3] ? __pfx___netif_receive_skb_core.constprop.0+0x10/0x10
[ 100.000866][ C3] ? hlock_class+0x4e/0x130
[ 100.001056][ C3] ? mark_lock+0x38/0x3e0
[ 100.001202][ C3] ? __lock_acquire+0xb3f/0x1580
[ 100.001395][ C3] ? process_backlog+0x332/0x1180
[ 100.001595][ C3] ? lock_acquire.part.0+0xeb/0x330
[ 100.001787][ C3] ? process_backlog+0x332/0x1180
[ 100.001977][ C3] ? process_backlog+0x332/0x1180
[ 100.002170][ C3] __netif_receive_skb_one_core+0xaf/0x1b0
[ 100.002412][ C3] ? __pfx___netif_receive_skb_one_core+0x10/0x10
[ 100.002654][ C3] ? process_backlog+0x332/0x1180
[ 100.002846][ C3] ? lock_acquire+0x32/0xc0
[ 100.003035][ C3] ? process_backlog+0x332/0x1180
[ 100.003227][ C3] process_backlog+0x372/0x1180
[ 100.003422][ C3] __napi_poll.constprop.0+0xa2/0x460
[ 100.003614][ C3] net_rx_action+0x50e/0xce0
[ 100.003814][ C3] ? __pfx_net_rx_action+0x10/0x10
[ 100.004004][ C3] ? clockevents_program_event+0xf6/0x300
[ 100.004199][ C3] ? kvm_clock_get_cycles+0x18/0x30
[ 100.004393][ C3] ? ktime_get+0xb7/0x200
[ 100.004538][ C3] ? clockevents_program_event+0x1ea/0x300
[ 100.004776][ C3] ? hrtimer_interrupt+0x31d/0x770
[ 100.004983][ C3] handle_softirqs+0x1f6/0x5c0
[ 100.005177][ C3] ? __dev_queue_xmit+0x79a/0x18b0
[ 100.005376][ C3] do_softirq+0x4d/0xa0
[ 100.005521][ C3]
[ 100.005621][ C3]
[ 100.005719][ C3] __local_bh_enable_ip+0xf6/0x120
[ 100.005912][ C3] ? __dev_queue_xmit+0x79a/0x18b0
[ 100.006102][ C3] __dev_queue_xmit+0x7af/0x18b0
[ 100.006300][ C3] ? __pfx___dev_queue_xmit+0x10/0x10
[ 100.006492][ C3] ? packet_parse_headers+0x231/0x9d0
[ 100.006691][ C3] ? __pfx_sock_alloc_send_pskb+0x10/0x10
[ 100.006883][ C3] ? __pfx_packet_parse_headers+0x10/0x10
[ 100.007076][ C3] ? skb_copy_datagram_from_iter+0xe6/0x6f0
[ 100.007319][ C3] ? dev_get_by_index+0x172/0x270
[ 100.007516][ C3] packet_snd+0xdf9/0x1900
[ 100.007715][ C3] ? __lock_release+0x103/0x460
[ 100.007910][ C3] ? __might_fault+0x11b/0x170
[ 100.008103][ C3] ? __pfx_packet_snd+0x10/0x10
[ 100.008308][ C3] ? trace_lock_acquire+0x14d/0x1f0
[ 100.008502][ C3] ? __might_fault+0xc3/0x170
[ 100.008698][ C3] ? __might_fault+0x11b/0x170
[ 100.008898][ C3] __sys_sendto+0x377/0x400
[ 100.009089][ C3] ? __pfx___sys_sendto+0x10/0x10
[ 100.009287][ C3] ? sock_ioctl+0x3b6/0x590
[ 100.009477][ C3] ? __pfx___lock_release+0x10/0x10
[ 100.009671][ C3] ? __pfx___up_read+0x10/0x10
[ 100.009865][ C3] ? do_user_addr_fault+0x972/0xe30
[ 100.010064][ C3] ? do_user_addr_fault+0x97c/0xe30
[ 100.010261][ C3] __x64_sys_sendto+0xe0/0x1c0
[ 100.010452][ C3] ? lockdep_hardirqs_on_prepare+0x275/0x410
[ 100.010689][ C3] do_syscall_64+0xc1/0x1d0
[ 100.010888][ C3] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 100.011124][ C3] RIP: 0033:0x7f28c4d2985a
[ 100.011321][ C3] Code: d8 64 89 02 48 c7 c0 ff ff ff ff eb b8 0f 1f 00 f3 0f 1e fa 41 89 ca 64 8b 04 25 18 00 00 00 85 c0 75 15 b8 2c 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 7e c3 0f 1f 44 00 00 41 54 48 83 ec 30 44 89
[ 100.012010][ C3] RSP: 002b:00007ffc3c30dc28 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[ 100.012301][ C3] RAX: ffffffffffffffda RBX: 00000000360009d0 RCX: 00007f28c4d2985a
[ 100.012591][ C3] RDX: 000000000000002a RSI: 0000000036000c92 RDI: 0000000000000005
[ 100.012879][ C3] RBP: 0000000036000c92 R08: 00007ffc3c30dc30 R09: 0000000000000014
[ 100.013168][ C3] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
[ 100.013462][ C3] R13: 000000000000002a R14: 00007ffc3c30dc30 R15: 0000000000000000
[ 100.013763][ C3]
[ 100.013951][ C3]
[ 100.014058][ C3] Allocated by task 695:
[ 100.014212][ C3] kasan_save_stack+0x24/0x50
[ 100.014421][ C3] kasan_save_track+0x14/0x30
[ 100.014621][ C3] __kasan_kmalloc+0x7f/0x90
[ 100.014817][ C3] __kmalloc_noprof+0x1ab/0x3a0
[ 100.015026][ C3] p9_fcall_init+0x7d/0x220
[ 100.015223][ C3] p9_tag_alloc+0x1bd/0x700
[ 100.015419][ C3] p9_client_prepare_req+0xe6/0x290
[ 100.015619][ C3] p9_client_rpc+0x18d/0x930
[ 100.015817][ C3] p9_client_read_once+0x1f1/0x860
[ 100.016015][ C3] p9_client_read+0xfd/0x160
[ 100.016226][ C3] v9fs_issue_read+0x10c/0x2d0
[ 100.016428][ C3] netfs_dispatch_unbuffered_reads.isra.0+0x4e6/0x8f0
[ 100.016675][ C3] netfs_unbuffered_read+0x8e/0x310
[ 100.016874][ C3] netfs_unbuffered_read_iter_locked+0x52e/0x6f0
[ 100.017120][ C3] netfs_unbuffered_read_iter+0xa4/0xe0
[ 100.017316][ C3] do_iter_readv_writev+0x433/0x670
[ 100.017517][ C3] vfs_iter_read+0x11e/0x520
[ 100.017717][ C3] backing_file_read_iter+0x4c8/0x6f0
[ 100.017907][ C3] ovl_read_iter+0x200/0x270
[ 100.018093][ C3] vfs_read+0x74c/0xcd0
[ 100.018233][ C3] ksys_read+0xf5/0x1e0
[ 100.018372][ C3] do_syscall_64+0xc1/0x1d0
[ 100.018568][ C3] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 100.018799][ C3]
[ 100.018890][ C3] Freed by task 695:
[ 100.019027][ C3] kasan_save_stack+0x24/0x50
[ 100.019214][ C3] kasan_save_track+0x14/0x30
[ 100.019396][ C3] kasan_save_free_info+0x3b/0x60
[ 100.019585][ C3] __kasan_slab_free+0x38/0x50
[ 100.019767][ C3] kfree+0xf3/0x340
[ 100.019905][ C3] p9_req_put+0x1cd/0x220
[ 100.020045][ C3] p9_client_read_once+0x2d9/0x860
[ 100.020227][ C3] p9_client_read+0xfd/0x160
[ 100.020409][ C3] v9fs_issue_read+0x10c/0x2d0
[ 100.020600][ C3] netfs_dispatch_unbuffered_reads.isra.0+0x4e6/0x8f0
[ 100.020964][ C3] netfs_unbuffered_read+0x8e/0x310
[ 100.021158][ C3] netfs_unbuffered_read_iter_locked+0x52e/0x6f0
[ 100.021401][ C3] netfs_unbuffered_read_iter+0xa4/0xe0
[ 100.021595][ C3] do_iter_readv_writev+0x433/0x670
[ 100.021906][ C3] vfs_iter_read+0x11e/0x520
[ 100.022104][ C3] backing_file_read_iter+0x4c8/0x6f0
[ 100.022302][ C3] ovl_read_iter+0x200/0x270
[ 100.022498][ C3] vfs_read+0x74c/0xcd0
[ 100.022653][ C3] ksys_read+0xf5/0x1e0
[ 100.022802][ C3] do_syscall_64+0xc1/0x1d0
[ 100.022997][ C3] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 100.023245][ C3]
[ 100.023345][ C3] The buggy address belongs to the object at ffff8880082a2800
[ 100.023345][ C3] which belongs to the cache kmalloc-1k of size 1024
[ 100.023941][ C3] The buggy address is located 24 bytes inside of
[ 100.023941][ C3] freed 1024-byte region [ffff8880082a2800, ffff8880082a2c00)
[ 100.024429][ C3]
[ 100.024529][ C3] The buggy address belongs to the physical page:
[ 100.024772][ C3] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x82a0
[ 100.025113][ C3] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 100.025391][ C3] flags: 0x80000000000040(head|node=0|zone=1)
[ 100.025636][ C3] page_type: f5(slab)
[ 100.025779][ C3] raw: 0080000000000040 ffff8880010430c0 ffffea0000245e10 ffffea0000152210
[ 100.026219][ C3] raw: 0000000000000000 00000000000a000a 00000001f5000000 0000000000000000
[ 100.026547][ C3] head: 0080000000000040 ffff8880010430c0 ffffea0000245e10 ffffea0000152210
[ 100.026878][ C3] head: 0000000000000000 00000000000a000a 00000001f5000000 0000000000000000
[ 100.027322][ C3] head: 0080000000000003 ffffea000020a801 ffffffffffffffff 0000000000000000
[ 100.027675][ C3] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[ 100.028148][ C3] page dumped because: kasan: bad access detected
[ 100.028394][ C3]
[ 100.028495][ C3] Memory state around the buggy address:
[ 100.028700][ C3] ffff8880082a2700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 100.029111][ C3] ffff8880082a2780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 100.029402][ C3] >ffff8880082a2800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 100.029698][ C3] ^
[ 100.030006][ C3] ffff8880082a2880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 100.030295][ C3] ffff8880082a2900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 100.030580][ C3] ==================================================================
[ 100.031027][ C3] Disabling lock debugging due to kernel taint
[ 101.953298][ T63] br1: port 1(lag) entered disabled state
[ 102.965886][ T38] Oops: general protection fault, probably for non-canonical address 0xe0a9fc3960000056: 0000 [#1] PREEMPT SMP KASAN NOPTI
[ 102.966391][ T38] KASAN: maybe wild-memory-access in range [0x055001cb000002b0-0x055001cb000002b7]
[ 102.966635][ T38] CPU: 1 UID: 0 PID: 38 Comm: kworker/u18:0 Tainted: G B 6.12.0-rc3-virtme #1
[ 102.966915][ T38] Tainted: [B]=BAD_PAGE
[ 102.967036][ T38] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 102.967356][ T38] Workqueue: events_unbound linkwatch_event
[ 102.967572][ T38] RIP: 0010:neigh_flush_dev.isra.0+0x10a/0x650
[ 102.967762][ T38] Code: 0f 85 ef 04 00 00 49 8d 7f 08 49 8b 1f 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 cc 04 00 00 49 8b 6f 08 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 19 05 00 00 48 89 5d 00 48 85 db 74 1a 48 8d
[ 102.968273][ T38] RSP: 0018:ffffc900002b7a08 EFLAGS: 00010207
[ 102.968450][ T38] RAX: 00aa003960000056 RBX: ffff8880066a7240 RCX: ffffffff9d0796f0
[ 102.968655][ T38] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8880082a2808
[ 102.968867][ T38] RBP: 055001cb000002b7 R08: 0000000000000000 R09: 0000000000000000
[ 102.969084][ T38] R10: ffffffff9f571f0f R11: ffffc900002b7619 R12: ffff8880082a293c
[ 102.969291][ T38] R13: dffffc0000000000 R14: ffff8880083f2000 R15: ffff8880082a2800
[ 102.969498][ T38] FS: 0000000000000000(0000) GS:ffff88802f480000(0000) knlGS:0000000000000000
[ 102.969741][ T38] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 102.969921][ T38] CR2: 0000559835991398 CR3: 0000000033326005 CR4: 0000000000772ef0
[ 102.970148][ T38] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 102.970356][ T38] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 102.970562][ T38] PKRU: 55555554
[ 102.970669][ T38] Call Trace:
[ 102.970778][ T38]
[ 102.970850][ T38] ? die_addr+0x41/0xa0
[ 102.970961][ T38] ? exc_general_protection+0x14d/0x230
[ 102.971107][ T38] ? asm_exc_general_protection+0x26/0x30
[ 102.971246][ T38] ? neigh_flush_dev.isra.0+0x5d0/0x650
[ 102.971389][ T38] ? neigh_flush_dev.isra.0+0x10a/0x650
[ 102.971550][ T38] ? neigh_flush_dev.isra.0+0x5d0/0x650
[ 102.971689][ T38] ? lock_acquire+0x32/0xc0
[ 102.971831][ T38] __neigh_ifdown.isra.0+0x74/0x440
[ 102.971974][ T38] neigh_carrier_down+0x13/0x20
[ 102.972112][ T38] arp_netdev_event+0x238/0x330
[ 102.972258][ T38] ? trace_notifier_run+0xe2/0x140
[ 102.972398][ T38] notifier_call_chain+0xcd/0x150
[ 102.972537][ T38] netdev_state_change+0xf5/0x120
[ 102.972678][ T38] ? __pfx_netdev_state_change+0x10/0x10
[ 102.972814][ T38] ? dev_deactivate+0xc1/0x1b0
[ 102.972952][ T38] ? trace_lock_release+0x10e/0x180
[ 102.973090][ T38] linkwatch_do_dev+0xd2/0x100
[ 102.973233][ T38] __linkwatch_run_queue+0x1df/0x650
[ 102.973374][ T38] ? trace_lock_acquire+0x14d/0x1f0
[ 102.973526][ T38] ? __pfx___linkwatch_run_queue+0x10/0x10
[ 102.973697][ T38] ? process_one_work+0xe0b/0x16d0
[ 102.973838][ T38] ? lock_acquire+0x32/0xc0
[ 102.973974][ T38] linkwatch_event+0x40/0x60
[ 102.974109][ T38] process_one_work+0xe55/0x16d0
[ 102.974246][ T38] ? __pfx___lock_release+0x10/0x10
[ 102.974384][ T38] ? __pfx_process_one_work+0x10/0x10
[ 102.974527][ T38] ? assign_work+0x16c/0x240
[ 102.974668][ T38] worker_thread+0x58c/0xce0
[ 102.974806][ T38] ? __pfx_worker_thread+0x10/0x10
[ 102.974956][ T38] kthread+0x28a/0x350
[ 102.975060][ T38] ? __pfx_kthread+0x10/0x10
[ 102.975198][ T38] ret_from_fork+0x31/0x70
[ 102.975339][ T38] ? __pfx_kthread+0x10/0x10
[ 102.975476][ T38] ret_from_fork_asm+0x1a/0x30
[ 102.975645][ T38]
[ 102.975759][ T38] Modules linked in: act_mirred bridge stp llc ip_gre gre 8021q act_tunnel_key cls_matchall act_gact cls_flower sch_ingress vxlan ip6_udp_tunnel udp_tunnel vrf veth
[ 102.976217][ T38] ---[ end trace 0000000000000000 ]---
[ 102.976360][ T38] RIP: 0010:neigh_flush_dev.isra.0+0x10a/0x650
[ 102.976537][ T38] Code: 0f 85 ef 04 00 00 49 8d 7f 08 49 8b 1f 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 cc 04 00 00 49 8b 6f 08 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 19 05 00 00 48 89 5d 00 48 85 db 74 1a 48 8d
[ 102.977032][ T38] RSP: 0018:ffffc900002b7a08 EFLAGS: 00010207
[ 102.977205][ T38] RAX: 00aa003960000056 RBX: ffff8880066a7240 RCX: ffffffff9d0796f0
[ 102.977411][ T38] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff8880082a2808
[ 102.977621][ T38] RBP: 055001cb000002b7 R08: 0000000000000000 R09: 0000000000000000
[ 102.977830][ T38] R10: ffffffff9f571f0f R11: ffffc900002b7619 R12: ffff8880082a293c
[ 102.978036][ T38] R13: dffffc0000000000 R14: ffff8880083f2000 R15: ffff8880082a2800
[ 102.978238][ T38] FS: 0000000000000000(0000) GS:ffff88802f480000(0000) knlGS:0000000000000000
[ 102.978474][ T38] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 102.978657][ T38] CR2: 0000559835991398 CR3: 0000000033326005 CR4: 0000000000772ef0
[ 102.978870][ T38] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 102.979075][ T38] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 102.979280][ T38] PKRU: 55555554
[ 102.979386][ T38] Kernel panic - not syncing: Fatal exception in interrupt
[ 102.979726][ T38] Kernel Offset: 0x19c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[ 102.980053][ T38] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---
WAIT TIMEOUT stderr
Ctrl-C stderr
Ctrl-C stderr
WAIT TIMEOUT stderr