[ 517.203877][ T3207] veth2: entered promiscuous mode
[ 537.780142][ T3234] 8021q: 802.1Q VLAN Support v1.8
[ 563.339102][ T3272] ==================================================================
[ 563.339346][ T3272] BUG: KASAN: slab-use-after-free in neigh_flush_dev.isra.0+0x5e7/0x650
[ 563.339570][ T3272] Write of size 8 at addr ffff888005becc18 by task ip/3272
[ 563.339788][ T3272]
[ 563.339866][ T3272] CPU: 1 UID: 0 PID: 3272 Comm: ip Not tainted 6.12.0-rc3-virtme #1
[ 563.340079][ T3272] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 563.340398][ T3272] Call Trace:
[ 563.340513][ T3272]
[ 563.340609][ T3272] dump_stack_lvl+0x82/0xd0
[ 563.340775][ T3272] print_address_description.constprop.0+0x2c/0x3b0
[ 563.341005][ T3272] ? neigh_flush_dev.isra.0+0x5e7/0x650
[ 563.341150][ T3272] print_report+0xb4/0x270
[ 563.341345][ T3272] ? kasan_addr_to_slab+0x25/0x80
[ 563.341511][ T3272] kasan_report+0xbd/0xf0
[ 563.341620][ T3272] ? neigh_flush_dev.isra.0+0x5e7/0x650
[ 563.341803][ T3272] neigh_flush_dev.isra.0+0x5e7/0x650
[ 563.342029][ T3272] ? lock_acquire+0x32/0xc0
[ 563.342259][ T3272] __neigh_ifdown.isra.0+0x74/0x440
[ 563.342492][ T3272] ? blocking_notifier_call_chain+0x50/0x90
[ 563.342739][ T3272] neigh_ifdown+0x10/0x20
[ 563.342869][ T3272] fib_inetaddr_event+0x1e8/0x280
[ 563.343016][ T3272] notifier_call_chain+0xcd/0x150
[ 563.343171][ T3272] blocking_notifier_call_chain+0x66/0x90
[ 563.343321][ T3272] __inet_del_ifa+0x394/0xcd0
[ 563.343468][ T3272] inet_rtm_deladdr+0x381/0x770
[ 563.343626][ T3272] ? __pfx_inet_rtm_deladdr+0x10/0x10
[ 563.343787][ T3272] rtnetlink_rcv_msg+0x2fb/0xc10
[ 563.343951][ T3272] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 563.344093][ T3272] ? hlock_class+0x4e/0x130
[ 563.344257][ T3272] ? mark_lock+0x38/0x3e0
[ 563.344367][ T3272] ? __lock_acquire+0xb3f/0x1580
[ 563.344512][ T3272] netlink_rcv_skb+0x130/0x360
[ 563.344676][ T3272] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 563.344839][ T3272] ? __pfx_netlink_rcv_skb+0x10/0x10
[ 563.345005][ T3272] ? netlink_deliver_tap+0x13e/0x340
[ 563.345155][ T3272] ? netlink_deliver_tap+0xc3/0x340
[ 563.345313][ T3272] netlink_unicast+0x44b/0x710
[ 563.345458][ T3272] ? __pfx_netlink_unicast+0x10/0x10
[ 563.345605][ T3272] ? find_held_lock+0x2c/0x110
[ 563.345776][ T3272] netlink_sendmsg+0x723/0xbe0
[ 563.345926][ T3272] ? __pfx_netlink_sendmsg+0x10/0x10
[ 563.346084][ T3272] ? __might_fault+0xc3/0x170
[ 563.346229][ T3272] ? __import_iovec+0x35d/0x5d0
[ 563.346381][ T3272] ____sys_sendmsg+0x7ac/0xa10
[ 563.346573][ T3272] ? __pfx_____sys_sendmsg+0x10/0x10
[ 563.346738][ T3272] ? __pfx_copy_msghdr_from_user+0x10/0x10
[ 563.346937][ T3272] ___sys_sendmsg+0xee/0x170
[ 563.347082][ T3272] ? __pfx_stack_trace_save+0x10/0x10
[ 563.347241][ T3272] ? __pfx____sys_sendmsg+0x10/0x10
[ 563.347385][ T3272] ? __pfx_validate_chain+0x10/0x10
[ 563.347546][ T3272] ? __pfx_slab_free_after_rcu_debug+0x10/0x10
[ 563.347726][ T3272] ? kasan_save_stack+0x34/0x50
[ 563.347884][ T3272] ? kasan_save_stack+0x24/0x50
[ 563.348034][ T3272] ? __kasan_record_aux_stack+0x8e/0xa0
[ 563.348181][ T3272] ? __call_rcu_common.constprop.0+0xa1/0x4b0
[ 563.348374][ T3272] ? __x64_sys_close+0x7c/0xd0
[ 563.348521][ T3272] ? do_syscall_64+0xc1/0x1d0
[ 563.348676][ T3272] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 563.348876][ T3272] ? __lock_acquire+0xb3f/0x1580
[ 563.349043][ T3272] ? find_held_lock+0x2c/0x110
[ 563.349189][ T3272] ? __lock_release+0x103/0x460
[ 563.349335][ T3272] ? fdget+0x52/0x1e0
[ 563.349446][ T3272] __sys_sendmsg+0xcd/0x170
[ 563.349589][ T3272] ? __pfx___sys_sendmsg+0x10/0x10
[ 563.349732][ T3272] ? __virt_addr_valid+0x22b/0x430
[ 563.349961][ T3272] do_syscall_64+0xc1/0x1d0
[ 563.350192][ T3272] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 563.350475][ T3272] RIP: 0033:0x7fc05d56e7b7
[ 563.350721][ T3272] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 563.351433][ T3272] RSP: 002b:00007ffc6417aab8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 563.351654][ T3272] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc05d56e7b7
[ 563.351883][ T3272] RDX: 0000000000000000 RSI: 00007ffc6417ab20 RDI: 0000000000000005
[ 563.352097][ T3272] RBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000078
[ 563.352312][ T3272] R10: 00007fc05d42cef8 R11: 0000000000000246 R12: 00007ffc6417b270
[ 563.352523][ T3272] R13: 0000000067169bff R14: 0000000000496600 R15: 00007ffc6417b278
[ 563.352739][ T3272]
[ 563.352867][ T3272]
[ 563.352943][ T3272] Allocated by task 3272:
[ 563.353053][ T3272] kasan_save_stack+0x24/0x50
[ 563.353202][ T3272] kasan_save_track+0x14/0x30
[ 563.353344][ T3272] __kasan_kmalloc+0x7f/0x90
[ 563.353484][ T3272] __kmalloc_noprof+0x1ab/0x3a0
[ 563.353628][ T3272] p9_fcall_init+0x7d/0x220
[ 563.353781][ T3272] p9_tag_alloc+0x1bd/0x700
[ 563.353923][ T3272] p9_client_prepare_req+0xe6/0x290
[ 563.354070][ T3272] p9_client_rpc+0x18d/0x930
[ 563.354214][ T3272] p9_client_read_once+0x1f1/0x860
[ 563.354358][ T3272] p9_client_read+0xfd/0x160
[ 563.354501][ T3272] v9fs_issue_read+0x10c/0x2d0
[ 563.354643][ T3272] netfs_dispatch_unbuffered_reads.isra.0+0x4e6/0x8f0
[ 563.354834][ T3272] netfs_unbuffered_read+0x8e/0x310
[ 563.354975][ T3272] netfs_unbuffered_read_iter_locked+0x52e/0x6f0
[ 563.355152][ T3272] netfs_unbuffered_read_iter+0xa4/0xe0
[ 563.355298][ T3272] do_iter_readv_writev+0x433/0x670
[ 563.355452][ T3272] vfs_iter_read+0x11e/0x520
[ 563.355601][ T3272] backing_file_read_iter+0x4c8/0x6f0
[ 563.355747][ T3272] ovl_read_iter+0x200/0x270
[ 563.355919][ T3272] vfs_read+0x74c/0xcd0
[ 563.356031][ T3272] ksys_read+0xf5/0x1e0
[ 563.356138][ T3272] do_syscall_64+0xc1/0x1d0
[ 563.356300][ T3272] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 563.356487][ T3272]
[ 563.356561][ T3272] Freed by task 3272:
[ 563.356682][ T3272] kasan_save_stack+0x24/0x50
[ 563.356845][ T3272] kasan_save_track+0x14/0x30
[ 563.357004][ T3272] kasan_save_free_info+0x3b/0x60
[ 563.357150][ T3272] __kasan_slab_free+0x38/0x50
[ 563.357298][ T3272] kfree+0xf3/0x340
[ 563.357414][ T3272] p9_req_put+0x1cd/0x220
[ 563.357523][ T3272] p9_client_read_once+0x2d9/0x860
[ 563.357680][ T3272] p9_client_read+0xfd/0x160
[ 563.357867][ T3272] v9fs_issue_read+0x10c/0x2d0
[ 563.358094][ T3272] netfs_dispatch_unbuffered_reads.isra.0+0x4e6/0x8f0
[ 563.358300][ T3272] netfs_unbuffered_read+0x8e/0x310
[ 563.358443][ T3272] netfs_unbuffered_read_iter_locked+0x52e/0x6f0
[ 563.358618][ T3272] netfs_unbuffered_read_iter+0xa4/0xe0
[ 563.358769][ T3272] do_iter_readv_writev+0x433/0x670
[ 563.358913][ T3272] vfs_iter_read+0x11e/0x520
[ 563.359060][ T3272] backing_file_read_iter+0x4c8/0x6f0
[ 563.359215][ T3272] ovl_read_iter+0x200/0x270
[ 563.359360][ T3272] vfs_read+0x74c/0xcd0
[ 563.359481][ T3272] ksys_read+0xf5/0x1e0
[ 563.359589][ T3272] do_syscall_64+0xc1/0x1d0
[ 563.359730][ T3272] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 563.359927][ T3272]
[ 563.360003][ T3272] The buggy address belongs to the object at ffff888005becc00
[ 563.360003][ T3272] which belongs to the cache kmalloc-1k of size 1024
[ 563.360361][ T3272] The buggy address is located 24 bytes inside of
[ 563.360361][ T3272] freed 1024-byte region [ffff888005becc00, ffff888005bed000)
[ 563.360721][ T3272]
[ 563.360810][ T3272] The buggy address belongs to the physical page:
[ 563.360997][ T3272] page: refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0x5be8
[ 563.361297][ T3272] head: order:3 mapcount:0 entire_mapcount:0 nr_pages_mapped:0 pincount:0
[ 563.361522][ T3272] flags: 0x80000000000040(head|node=0|zone=1)
[ 563.361708][ T3272] page_type: f5(slab)
[ 563.361834][ T3272] raw: 0080000000000040 ffff8880010430c0 ffffea00001fb810 ffff888001040e68
[ 563.362104][ T3272] raw: 0000000000000000 00000000000a000a 00000001f5000000 0000000000000000
[ 563.362369][ T3272] head: 0080000000000040 ffff8880010430c0 ffffea00001fb810 ffff888001040e68
[ 563.362628][ T3272] head: 0000000000000000 00000000000a000a 00000001f5000000 0000000000000000
[ 563.362908][ T3272] head: 0080000000000003 ffffea000016fa01 ffffffffffffffff 0000000000000000
[ 563.363172][ T3272] head: 0000000000000008 0000000000000000 00000000ffffffff 0000000000000000
[ 563.363435][ T3272] page dumped because: kasan: bad access detected
[ 563.363612][ T3272]
[ 563.363683][ T3272] Memory state around the buggy address:
[ 563.363843][ T3272] ffff888005becb00: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 563.364051][ T3272] ffff888005becb80: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc
[ 563.364267][ T3272] >ffff888005becc00: fa fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 563.364484][ T3272] ^
[ 563.364625][ T3272] ffff888005becc80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 563.364866][ T3272] ffff888005becd00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb
[ 563.365071][ T3272] ==================================================================
[ 563.365306][ T3272] Disabling lock debugging due to kernel taint
[ 563.365600][ T3272] Oops: general protection fault, probably for non-canonical address 0xe0403c3860000199: 0000 [#1] PREEMPT SMP KASAN NOPTI
[ 563.366048][ T3272] KASAN: maybe wild-memory-access in range [0x020201c300000cc8-0x020201c300000ccf]
[ 563.366288][ T3272] CPU: 1 UID: 0 PID: 3272 Comm: ip Tainted: G B 6.12.0-rc3-virtme #1
[ 563.366703][ T3272] Tainted: [B]=BAD_PAGE
[ 563.366849][ T3272] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.16.3-0-ga6ed6b701f0a-prebuilt.qemu.org 04/01/2014
[ 563.367250][ T3272] RIP: 0010:neigh_flush_dev.isra.0+0x10a/0x650
[ 563.367536][ T3272] Code: 0f 85 ef 04 00 00 49 8d 7f 08 49 8b 1f 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 cc 04 00 00 49 8b 6f 08 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 19 05 00 00 48 89 5d 00 48 85 db 74 1a 48 8d
[ 563.368059][ T3272] RSP: 0018:ffffc90000a1f388 EFLAGS: 00010206
[ 563.368317][ T3272] RAX: 0040403860000199 RBX: ffff888006457540 RCX: ffffffffa5c796f0
[ 563.368533][ T3272] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff888005becc08
[ 563.368745][ T3272] RBP: 020201c300000cc8 R08: 0000000000000000 R09: 0000000000000000
[ 563.369062][ T3272] R10: ffffffffa8171f0f R11: ffffffffa6600130 R12: ffff888005becd3c
[ 563.369278][ T3272] R13: dffffc0000000000 R14: ffff888005b31000 R15: ffff888005becc00
[ 563.369558][ T3272] FS: 00007fc05d362800(0000) GS:ffff888036080000(0000) knlGS:0000000000000000
[ 563.369820][ T3272] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 563.370020][ T3272] CR2: 00000000004e3370 CR3: 0000000003b0a005 CR4: 0000000000772ef0
[ 563.370305][ T3272] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 563.370524][ T3272] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 563.370746][ T3272] PKRU: 55555554
[ 563.370868][ T3272] Call Trace:
[ 563.371046][ T3272]
[ 563.371133][ T3272] ? die_addr+0x41/0xa0
[ 563.371257][ T3272] ? exc_general_protection+0x14d/0x230
[ 563.371400][ T3272] ? asm_exc_general_protection+0x26/0x30
[ 563.371551][ T3272] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 563.371816][ T3272] ? neigh_flush_dev.isra.0+0x5d0/0x650
[ 563.371968][ T3272] ? neigh_flush_dev.isra.0+0x10a/0x650
[ 563.372104][ T3272] ? neigh_flush_dev.isra.0+0x5d0/0x650
[ 563.372252][ T3272] ? lock_acquire+0x32/0xc0
[ 563.372479][ T3272] __neigh_ifdown.isra.0+0x74/0x440
[ 563.372628][ T3272] ? blocking_notifier_call_chain+0x50/0x90
[ 563.372823][ T3272] neigh_ifdown+0x10/0x20
[ 563.372947][ T3272] fib_inetaddr_event+0x1e8/0x280
[ 563.373086][ T3272] notifier_call_chain+0xcd/0x150
[ 563.373224][ T3272] blocking_notifier_call_chain+0x66/0x90
[ 563.373373][ T3272] __inet_del_ifa+0x394/0xcd0
[ 563.373514][ T3272] inet_rtm_deladdr+0x381/0x770
[ 563.373761][ T3272] ? __pfx_inet_rtm_deladdr+0x10/0x10
[ 563.373984][ T3272] rtnetlink_rcv_msg+0x2fb/0xc10
[ 563.374180][ T3272] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 563.374337][ T3272] ? hlock_class+0x4e/0x130
[ 563.374477][ T3272] ? mark_lock+0x38/0x3e0
[ 563.374657][ T3272] ? __lock_acquire+0xb3f/0x1580
[ 563.374817][ T3272] netlink_rcv_skb+0x130/0x360
[ 563.374956][ T3272] ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[ 563.375100][ T3272] ? __pfx_netlink_rcv_skb+0x10/0x10
[ 563.375331][ T3272] ? netlink_deliver_tap+0x13e/0x340
[ 563.375484][ T3272] ? netlink_deliver_tap+0xc3/0x340
[ 563.375621][ T3272] netlink_unicast+0x44b/0x710
[ 563.375767][ T3272] ? __pfx_netlink_unicast+0x10/0x10
[ 563.375925][ T3272] ? find_held_lock+0x2c/0x110
[ 563.376064][ T3272] netlink_sendmsg+0x723/0xbe0
[ 563.376201][ T3272] ? __pfx_netlink_sendmsg+0x10/0x10
[ 563.376363][ T3272] ? __might_fault+0xc3/0x170
[ 563.376504][ T3272] ? __import_iovec+0x35d/0x5d0
[ 563.376738][ T3272] ____sys_sendmsg+0x7ac/0xa10
[ 563.376897][ T3272] ? __pfx_____sys_sendmsg+0x10/0x10
[ 563.377044][ T3272] ? __pfx_copy_msghdr_from_user+0x10/0x10
[ 563.377218][ T3272] ___sys_sendmsg+0xee/0x170
[ 563.377451][ T3272] ? __pfx_stack_trace_save+0x10/0x10
[ 563.377590][ T3272] ? __pfx____sys_sendmsg+0x10/0x10
[ 563.377750][ T3272] ? __pfx_validate_chain+0x10/0x10
[ 563.377899][ T3272] ? __pfx_slab_free_after_rcu_debug+0x10/0x10
[ 563.378161][ T3272] ? kasan_save_stack+0x34/0x50
[ 563.378299][ T3272] ? kasan_save_stack+0x24/0x50
[ 563.378435][ T3272] ? __kasan_record_aux_stack+0x8e/0xa0
[ 563.378586][ T3272] ? __call_rcu_common.constprop.0+0xa1/0x4b0
[ 563.378841][ T3272] ? __x64_sys_close+0x7c/0xd0
[ 563.378994][ T3272] ? do_syscall_64+0xc1/0x1d0
[ 563.379141][ T3272] ? entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 563.379311][ T3272] ? __lock_acquire+0xb3f/0x1580
[ 563.379527][ T3272] ? find_held_lock+0x2c/0x110
[ 563.379669][ T3272] ? __lock_release+0x103/0x460
[ 563.379819][ T3272] ? fdget+0x52/0x1e0
[ 563.379927][ T3272] __sys_sendmsg+0xcd/0x170
[ 563.380145][ T3272] ? __pfx___sys_sendmsg+0x10/0x10
[ 563.380289][ T3272] ? __virt_addr_valid+0x22b/0x430
[ 563.380439][ T3272] do_syscall_64+0xc1/0x1d0
[ 563.380589][ T3272] entry_SYSCALL_64_after_hwframe+0x77/0x7f
[ 563.380860][ T3272] RIP: 0033:0x7fc05d56e7b7
[ 563.381029][ T3272] Code: 0a 00 f7 d8 64 89 02 48 c7 c0 ff ff ff ff eb b9 0f 1f 00 f3 0f 1e fa 64 8b 04 25 18 00 00 00 85 c0 75 10 b8 2e 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 51 c3 48 83 ec 28 89 54 24 1c 48 89 74 24 10
[ 563.381618][ T3272] RSP: 002b:00007ffc6417aab8 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[ 563.381912][ T3272] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc05d56e7b7
[ 563.382123][ T3272] RDX: 0000000000000000 RSI: 00007ffc6417ab20 RDI: 0000000000000005
[ 563.382426][ T3272] RBP: 0000000000000000 R08: 0000000000000003 R09: 0000000000000078
[ 563.382632][ T3272] R10: 00007fc05d42cef8 R11: 0000000000000246 R12: 00007ffc6417b270
[ 563.382856][ T3272] R13: 0000000067169bff R14: 0000000000496600 R15: 00007ffc6417b278
[ 563.383071][ T3272]
[ 563.383192][ T3272] Modules linked in: 8021q act_gact cls_flower vxlan ip6_udp_tunnel udp_tunnel bridge stp llc sch_ingress vrf veth
[ 563.383606][ T3272] ---[ end trace 0000000000000000 ]---
[ 563.383746][ T3272] RIP: 0010:neigh_flush_dev.isra.0+0x10a/0x650
[ 563.383935][ T3272] Code: 0f 85 ef 04 00 00 49 8d 7f 08 49 8b 1f 48 89 f8 48 c1 e8 03 42 80 3c 28 00 0f 85 cc 04 00 00 49 8b 6f 08 48 89 e8 48 c1 e8 03 <42> 80 3c 28 00 0f 85 19 05 00 00 48 89 5d 00 48 85 db 74 1a 48 8d
[ 563.384514][ T3272] RSP: 0018:ffffc90000a1f388 EFLAGS: 00010206
[ 563.384689][ T3272] RAX: 0040403860000199 RBX: ffff888006457540 RCX: ffffffffa5c796f0
[ 563.384911][ T3272] RDX: 0000000000000000 RSI: 0000000000000008 RDI: ffff888005becc08
[ 563.385115][ T3272] RBP: 020201c300000cc8 R08: 0000000000000000 R09: 0000000000000000
[ 563.385332][ T3272] R10: ffffffffa8171f0f R11: ffffffffa6600130 R12: ffff888005becd3c
[ 563.385616][ T3272] R13: dffffc0000000000 R14: ffff888005b31000 R15: ffff888005becc00
[ 563.385832][ T3272] FS: 00007fc05d362800(0000) GS:ffff888036080000(0000) knlGS:0000000000000000
[ 563.386071][ T3272] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[ 563.386328][ T3272] CR2: 00000000004e3370 CR3: 0000000003b0a005 CR4: 0000000000772ef0
[ 563.386541][ T3272] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
[ 563.386747][ T3272] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
[ 563.386964][ T3272] PKRU: 55555554
[ 563.387070][ T3272] Kernel panic - not syncing: Fatal exception in interrupt
[ 563.387394][ T3272] Kernel Offset: 0x22800000 from 0xffffffff81000000 (relocation range: 0xffffffff80000000-0xffffffffbfffffff)
[ 563.387807][ T3272] ---[ end Kernel panic - not syncing: Fatal exception in interrupt ]---
WAIT TIMEOUT stderr
Ctrl-C stderr
Ctrl-C stderr
WAIT TIMEOUT stderr