[ 1537.630673][T12968] veth0: entered allmulticast mode [ 1537.631042][T12968] veth1: entered allmulticast mode [ 1537.631364][T12968] veth2: entered allmulticast mode [ 1537.631666][T12968] veth3: entered allmulticast mode [ 1562.532109][T13164] ================================================================== [ 1562.532403][T13164] BUG: KASAN: slab-use-after-free in neigh_flush_dev.isra.0+0x629/0x650 [ 1562.532636][T13164] Read of size 8 at addr ffff888005465810 by task ip/13164 [ 1562.532845][T13164] [ 1562.532921][T13164] CPU: 1 UID: 0 PID: 13164 Comm: ip Not tainted 6.12.0-rc3-virtme #1 [ 1562.533128][T13164] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 1562.533444][T13164] Call Trace: [ 1562.533574][T13164] [ 1562.533650][T13164] dump_stack_lvl+0x82/0xd0 [ 1562.533798][T13164] print_address_description.constprop.0+0x2c/0x3b0 [ 1562.533973][T13164] ? neigh_flush_dev.isra.0+0x629/0x650 [ 1562.534129][T13164] print_report+0xb4/0x270 [ 1562.534264][T13164] ? kasan_addr_to_slab+0x25/0x80 [ 1562.534398][T13164] kasan_report+0xbd/0xf0 [ 1562.534530][T13164] ? neigh_flush_dev.isra.0+0x629/0x650 [ 1562.534667][T13164] neigh_flush_dev.isra.0+0x629/0x650 [ 1562.534805][T13164] ? lock_acquire+0x32/0xc0 [ 1562.534942][T13164] __neigh_ifdown.isra.0+0x74/0x440 [ 1562.535075][T13164] ? blocking_notifier_call_chain+0x50/0x90 [ 1562.535249][T13164] neigh_ifdown+0x10/0x20 [ 1562.535351][T13164] fib_inetaddr_event+0x1e8/0x280 [ 1562.535488][T13164] notifier_call_chain+0xcd/0x150 [ 1562.535626][T13164] blocking_notifier_call_chain+0x66/0x90 [ 1562.535760][T13164] __inet_del_ifa+0x394/0xcd0 [ 1562.535900][T13164] inet_rtm_deladdr+0x381/0x770 [ 1562.536037][T13164] ? __pfx_inet_rtm_deladdr+0x10/0x10 [ 1562.536178][T13164] rtnetlink_rcv_msg+0x2fb/0xc10 [ 1562.536317][T13164] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1562.536453][T13164] ? hlock_class+0x4e/0x130 [ 1562.536588][T13164] ? mark_lock+0x38/0x3e0 [ 1562.536692][T13164] ? __lock_acquire+0xb3f/0x1580 [ 1562.536826][T13164] netlink_rcv_skb+0x130/0x360 [ 1562.536962][T13164] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1562.537098][T13164] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1562.537236][T13164] ? netlink_deliver_tap+0x13e/0x340 [ 1562.537377][T13164] ? netlink_deliver_tap+0xc3/0x340 [ 1562.537545][T13164] netlink_unicast+0x44b/0x710 [ 1562.537683][T13164] ? __pfx_netlink_unicast+0x10/0x10 [ 1562.537819][T13164] ? find_held_lock+0x2c/0x110 [ 1562.537959][T13164] netlink_sendmsg+0x723/0xbe0 [ 1562.538095][T13164] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1562.538230][T13164] ? __might_fault+0xc3/0x170 [ 1562.538402][T13164] ? __import_iovec+0x35d/0x5d0 [ 1562.538619][T13164] ____sys_sendmsg+0x7ac/0xa10 [ 1562.538809][T13164] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1562.539014][T13164] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1562.539269][T13164] ___sys_sendmsg+0xee/0x170 [ 1562.539482][T13164] ? __pfx_stack_trace_save+0x10/0x10 [ 1562.539699][T13164] ? __pfx____sys_sendmsg+0x10/0x10 [ 1562.539916][T13164] ? __pfx_validate_chain+0x10/0x10 [ 1562.540136][T13164] ? __pfx_slab_free_after_rcu_debug+0x10/0x10 [ 1562.540400][T13164] ? kasan_save_stack+0x34/0x50 [ 1562.540611][T13164] ? kasan_save_stack+0x24/0x50 [ 1562.540813][T13164] ? __kasan_record_aux_stack+0x8e/0xa0 [ 1562.541016][T13164] ? __call_rcu_common.constprop.0+0xa1/0x4b0 [ 1562.541266][T13164] ? __x64_sys_close+0x7c/0xd0 [ 1562.541465][T13164] ? do_syscall_64+0xc1/0x1d0 [ 1562.541670][T13164] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1562.541920][T13164] ? __lock_acquire+0xb3f/0x1580 [ 1562.542133][T13164] ? find_held_lock+0x2c/0x110 [ 1562.542335][T13164] ? __lock_release+0x103/0x460 [ 1562.542545][T13164] ? fdget+0x52/0x1e0 [ 1562.542703][T13164] __sys_sendmsg+0xcd/0x170 [ 1562.542904][T13164] ? __pfx___sys_sendmsg+0x10/0x10 [ 1562.543102][T13164] ? __virt_addr_valid+0x22b/0x430 [ 1562.543314][T13164] do_syscall_64+0xc1/0x1d0 [ 1562.543521][T13164] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1562.543776][T13164] RIP: 0033:0x7f57537207b7 [ 1562.543991][T13164] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 1562.544710][T13164] RSP: 002b:00007ffc3b622af8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1562.545014][T13164] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f57537207b7 [ 1562.545324][T13164] RDX: 0000000000000000 RSI: 00007ffc3b622b60 RDI: 0000000000000005 [ 1562.545627][T13164] RBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000078 [ 1562.545927][T13164] R10: 00007f57535deef8 R11: 0000000000000246 R12: 00007ffc3b6232b0 [ 1562.546233][T13164] R13: 000000006716766e R14: 0000000000496600 R15: 00007ffc3b6232b8 [ 1562.546527][T13164] [ 1562.546689][T13164] [ 1562.546803][T13164] Allocated by task 13143: [ 1562.547014][T13164] kasan_save_stack+0x24/0x50 [ 1562.547205][T13164] kasan_save_track+0x14/0x30 [ 1562.547340][T13164] __kasan_kmalloc+0x7f/0x90 [ 1562.547488][T13164] __kmalloc_noprof+0x1ab/0x3a0 [ 1562.547627][T13164] neigh_alloc+0xc4/0x9d0 [ 1562.547730][T13164] ___neigh_create+0x6d/0xf30 [ 1562.547866][T13164] neigh_add+0x8f8/0xdd0 [ 1562.547967][T13164] rtnetlink_rcv_msg+0x2fb/0xc10 [ 1562.548106][T13164] netlink_rcv_skb+0x130/0x360 [ 1562.548245][T13164] netlink_unicast+0x44b/0x710 [ 1562.548381][T13164] netlink_sendmsg+0x723/0xbe0 [ 1562.548524][T13164] ____sys_sendmsg+0x7ac/0xa10 [ 1562.548660][T13164] ___sys_sendmsg+0xee/0x170 [ 1562.548796][T13164] __sys_sendmsg+0xcd/0x170 [ 1562.548929][T13164] do_syscall_64+0xc1/0x1d0 [ 1562.549068][T13164] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1562.549239][T13164] [ 1562.549309][T13164] Freed by task 9478: [ 1562.549420][T13164] kasan_save_stack+0x24/0x50 [ 1562.549567][T13164] kasan_save_track+0x14/0x30 [ 1562.549701][T13164] kasan_save_free_info+0x3b/0x60 [ 1562.549837][T13164] __kasan_slab_free+0x38/0x50 [ 1562.549973][T13164] kmem_cache_free_bulk.part.0+0x1f2/0x5b0 [ 1562.550138][T13164] kvfree_rcu_bulk+0x4b9/0x5d0 [ 1562.550276][T13164] kvfree_rcu_drain_ready+0x2ab/0x860 [ 1562.550411][T13164] kfree_rcu_monitor+0x26/0xe0 [ 1562.550557][T13164] process_one_work+0xe55/0x16d0 [ 1562.550691][T13164] worker_thread+0x58c/0xce0 [ 1562.550824][T13164] kthread+0x28a/0x350 [ 1562.550927][T13164] ret_from_fork+0x31/0x70 [ 1562.551067][T13164] ret_from_fork_asm+0x1a/0x30 [ 1562.551207][T13164] [ 1562.551276][T13164] Last potentially related work creation: [ 1562.551414][T13164] kasan_save_stack+0x24/0x50 [ 1562.551561][T13164] __kasan_record_aux_stack+0x8e/0xa0 [ 1562.551702][T13164] kvfree_call_rcu+0x114/0x4b0 [ 1562.551841][T13164] neigh_remove_one+0x1a3/0x200 [ 1562.551976][T13164] neigh_delete+0x29f/0x490 [ 1562.552111][T13164] rtnetlink_rcv_msg+0x2fb/0xc10 [ 1562.552246][T13164] netlink_rcv_skb+0x130/0x360 [ 1562.552391][T13164] netlink_unicast+0x44b/0x710 [ 1562.552544][T13164] netlink_sendmsg+0x723/0xbe0 [ 1562.552681][T13164] ____sys_sendmsg+0x7ac/0xa10 [ 1562.552815][T13164] ___sys_sendmsg+0xee/0x170 [ 1562.552951][T13164] __sys_sendmsg+0xcd/0x170 [ 1562.553091][T13164] do_syscall_64+0xc1/0x1d0 [ 1562.553227][T13164] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1562.553395][T13164] [ 1562.553478][T13164] The buggy address belongs to the object at ffff888005465800 [ 1562.553478][T13164] which belongs to the cache kmalloc-1k of size 1024 [ 1562.553801][T13164] The buggy address is located 16 bytes inside of [ 1562.553801][T13164] freed 1024-byte region [ffff888005465800, ffff888005465c00) [ 1562.554129][T13164] [ 1562.554198][T13164] The buggy address belongs to the physical page: [ 1562.554363][T13164] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x5460 [ 1562.554620][T13164] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0 [ 1562.554824][T13164] flags: 0x80000000000040(head|node=0|zone=1) [ 1562.554995][T13164] page_type: f5(slab) [ 1562.555104][T13164] raw: 0080000000000040 ffff8880010430c0 ffffea0000148410 ffffea000014b810 [ 1562.555346][T13164] raw: 0000000000000000 00000000000a000a 00000001f5000000 0000000000000000 [ 1562.555645][T13164] head: 0080000000000040 ffff8880010430c0 ffffea0000148410 ffffea000014b810 [ 1562.555889][T13164] head: 0000000000000000 00000000000a000a 00000001f5000000 0000000000000000 [ 1562.556128][T13164] head: 0080000000000003 ffffea0000151801 ffffffffffffffff 0000000000000000 [ 1562.556372][T13164] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000 [ 1562.556620][T13164] page dumped because: kasan: bad access detected [ 1562.556790][T13164] [ 1562.556857][T13164] Memory state around the buggy address: [ 1562.556987][T13164] ffff888005465700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1562.557185][T13164] ffff888005465780: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc [ 1562.557381][T13164] >ffff888005465800: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1562.557583][T13164] ^ [ 1562.557719][T13164] ffff888005465880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1562.557912][T13164] ffff888005465900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 1562.558103][T13164] ================================================================== [ 1562.558319][T13164] Disabling lock debugging due to kernel taint [ 1562.558526][T13164] Oops: general protection fault, probably for non-canonical address 0xe092bc3bc00004a0: 0000 [#1] PREEMPT SMP KASAN NOPTI [ 1562.558852][T13164] KASAN: maybe wild-memory-access in range [0x049601de00002500-0x049601de00002507] [ 1562.559077][T13164] CPU: 1 UID: 0 PID: 13164 Comm: ip Tainted: G B 6.12.0-rc3-virtme #1 [ 1562.559332][T13164] Tainted: [B]=BAD_PAGE [ 1562.559442][T13164] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014 [ 1562.559741][T13164] RIP: 0010:neigh_flush_dev.isra.0+0x10a/0x650 [ 1562.559912][T13164] Code: 0f 85 ef 04 00 00 49 8d 7f 08 49 8b 1f 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 cc 04 00 00 49 8b 6f 08 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 19 05 00 00 48 89 5d 00 48 85 db 74 1a 48 8d [ 1562.560381][T13164] RSP: 0018:ffffc90003b0f388 EFLAGS: 00010207 [ 1562.560560][T13164] RAX: 0092c03bc00004a0 RBX: ffff888003a34100 RCX: ffffffffb50796f0 [ 1562.560755][T13164] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff888005465808 [ 1562.560951][T13164] RBP: 049601de00002506 R08: 0000000000000001 R09: fffffbfff7096280 [ 1562.561172][T13164] R10: ffffffffb84b1407 R11: 205d343631333154 R12: ffff88800546593c [ 1562.561379][T13164] R13: dffffc0000000000 R14: ffff88800323c000 R15: ffff888005465800 [ 1562.561584][T13164] FS: 00007f5753514800(0000) GS:ffff888036080000(0000) knlGS:0000000000000000 [ 1562.561812][T13164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1562.561979][T13164] CR2: 00000000004e2a90 CR3: 0000000009cbc003 CR4: 0000000000772ef0 [ 1562.562173][T13164] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1562.562386][T13164] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1562.562675][T13164] PKRU: 55555554 [ 1562.562838][T13164] Call Trace: [ 1562.562976][T13164] [ 1562.563052][T13164] ? die_addr+0x41/0xa0 [ 1562.563158][T13164] ? exc_general_protection+0x14d/0x230 [ 1562.563296][T13164] ? asm_exc_general_protection+0x26/0x30 [ 1562.563427][T13164] ? neigh_flush_dev.isra.0+0x5d0/0x650 [ 1562.563578][T13164] ? neigh_flush_dev.isra.0+0x10a/0x650 [ 1562.563710][T13164] ? neigh_flush_dev.isra.0+0x5d0/0x650 [ 1562.563838][T13164] ? lock_acquire+0x32/0xc0 [ 1562.563971][T13164] __neigh_ifdown.isra.0+0x74/0x440 [ 1562.564104][T13164] ? blocking_notifier_call_chain+0x50/0x90 [ 1562.564273][T13164] neigh_ifdown+0x10/0x20 [ 1562.564371][T13164] fib_inetaddr_event+0x1e8/0x280 [ 1562.564516][T13164] notifier_call_chain+0xcd/0x150 [ 1562.564655][T13164] blocking_notifier_call_chain+0x66/0x90 [ 1562.564787][T13164] __inet_del_ifa+0x394/0xcd0 [ 1562.564920][T13164] inet_rtm_deladdr+0x381/0x770 [ 1562.565052][T13164] ? __pfx_inet_rtm_deladdr+0x10/0x10 [ 1562.565187][T13164] rtnetlink_rcv_msg+0x2fb/0xc10 [ 1562.565320][T13164] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1562.565463][T13164] ? hlock_class+0x4e/0x130 [ 1562.565596][T13164] ? mark_lock+0x38/0x3e0 [ 1562.565700][T13164] ? __lock_acquire+0xb3f/0x1580 [ 1562.565831][T13164] netlink_rcv_skb+0x130/0x360 [ 1562.565968][T13164] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1562.566098][T13164] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1562.566232][T13164] ? netlink_deliver_tap+0x13e/0x340 [ 1562.566362][T13164] ? netlink_deliver_tap+0xc3/0x340 [ 1562.566584][T13164] netlink_unicast+0x44b/0x710 [ 1562.566714][T13164] ? __pfx_netlink_unicast+0x10/0x10 [ 1562.566850][T13164] ? find_held_lock+0x2c/0x110 [ 1562.566982][T13164] netlink_sendmsg+0x723/0xbe0 [ 1562.567115][T13164] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1562.567323][T13164] ? __might_fault+0xc3/0x170 [ 1562.567463][T13164] ? __import_iovec+0x35d/0x5d0 [ 1562.567595][T13164] ____sys_sendmsg+0x7ac/0xa10 [ 1562.567728][T13164] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1562.567939][T13164] ? __pfx_copy_msghdr_from_user+0x10/0x10 [ 1562.568120][T13164] ___sys_sendmsg+0xee/0x170 [ 1562.568251][T13164] ? __pfx_stack_trace_save+0x10/0x10 [ 1562.568384][T13164] ? __pfx____sys_sendmsg+0x10/0x10 [ 1562.568596][T13164] ? __pfx_validate_chain+0x10/0x10 [ 1562.568726][T13164] ? __pfx_slab_free_after_rcu_debug+0x10/0x10 [ 1562.568890][T13164] ? kasan_save_stack+0x34/0x50 [ 1562.569023][T13164] ? kasan_save_stack+0x24/0x50 [ 1562.569230][T13164] ? __kasan_record_aux_stack+0x8e/0xa0 [ 1562.569373][T13164] ? __call_rcu_common.constprop.0+0xa1/0x4b0 [ 1562.569546][T13164] ? __x64_sys_close+0x7c/0xd0 [ 1562.569676][T13164] ? do_syscall_64+0xc1/0x1d0 [ 1562.569883][T13164] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1562.570044][T13164] ? __lock_acquire+0xb3f/0x1580 [ 1562.570176][T13164] ? find_held_lock+0x2c/0x110 [ 1562.570306][T13164] ? __lock_release+0x103/0x460 [ 1562.570525][T13164] ? fdget+0x52/0x1e0 [ 1562.570631][T13164] __sys_sendmsg+0xcd/0x170 [ 1562.570761][T13164] ? __pfx___sys_sendmsg+0x10/0x10 [ 1562.570892][T13164] ? __virt_addr_valid+0x22b/0x430 [ 1562.571104][T13164] do_syscall_64+0xc1/0x1d0 [ 1562.571233][T13164] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1562.571393][T13164] RIP: 0033:0x7f57537207b7 [ 1562.571603][T13164] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10 [ 1562.572163][T13164] RSP: 002b:00007ffc3b622af8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1562.572378][T13164] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f57537207b7 [ 1562.572664][T13164] RDX: 0000000000000000 RSI: 00007ffc3b622b60 RDI: 0000000000000005 [ 1562.572863][T13164] RBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000078 [ 1562.573141][T13164] R10: 00007f57535deef8 R11: 0000000000000246 R12: 00007ffc3b6232b0 [ 1562.573337][T13164] R13: 000000006716766e R14: 0000000000496600 R15: 00007ffc3b6232b8 [ 1562.573536][T13164] [ 1562.573637][T13164] Modules linked in: dummy vxlan ip6_udp_tunnel udp_tunnel act_mirred cls_matchall ip_gre act_gact cls_flower sch_ingress ip6_gre ip6_tunnel tunnel6 gre bridge stp llc 8021q vrf veth [ 1562.574183][T13164] ---[ end trace 0000000000000000 ]--- [ 1562.574323][T13164] RIP: 0010:neigh_flush_dev.isra.0+0x10a/0x650 [ 1562.574572][T13164] Code: 0f 85 ef 04 00 00 49 8d 7f 08 49 8b 1f 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 cc 04 00 00 49 8b 6f 08 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 19 05 00 00 48 89 5d 00 48 85 db 74 1a 48 8d [ 1562.575110][T13164] RSP: 0018:ffffc90003b0f388 EFLAGS: 00010207 [ 1562.575286][T13164] RAX: 0092c03bc00004a0 RBX: ffff888003a34100 RCX: ffffffffb50796f0 [ 1562.575481][T13164] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff888005465808 [ 1562.575824][T13164] RBP: 049601de00002506 R08: 0000000000000001 R09: fffffbfff7096280 [ 1562.576022][T13164] R10: ffffffffb84b1407 R11: 205d343631333154 R12: ffff88800546593c [ 1562.576230][T13164] R13: dffffc0000000000 R14: ffff88800323c000 R15: ffff888005465800 [ 1562.576516][T13164] FS: 00007f5753514800(0000) GS:ffff888036080000(0000) knlGS:0000000000000000 [ 1562.576744][T13164] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1562.576910][T13164] CR2: 00000000004e2a90 CR3: 0000000009cbc003 CR4: 0000000000772ef0 [ 1562.577183][T13164] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1562.577385][T13164] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1562.577583][T13164] PKRU: 55555554 [ 1562.577755][T13164] Kernel panic - not syncing: Fatal exception in interrupt [ 1562.578043][T13164] Kernel Offset: 0x31c00000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff) [ 1562.578344][T13164] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]--- WAIT TIMEOUT stderr Ctrl-C stderr Ctrl-C stderr WAIT TIMEOUT stderr