kernel panic at kern/arch/x86/trap.c:325, from core 1: Proc-ful Page Fault in the Kernel at 0x0000000020000080! HW TRAP frame at 0xfffffff0010b5be0 on core 1 rax 0x000080001c981060 rbx 0x0000000020000080 rcx 0x0000000000000002 rdx 0x0000000000000014 rbp 0xfffffff0010b5cb8 rsi 0xffff80000367f020 rdi 0x0000000020000080 r8 0x0000000000000014 r9 0x0000000000000020 r10 0x0000000000008000 r11 0xffffffffc20c41f5 r12 0x0000000000000014 r13 0x0000000020000080 r14 0xffff80000367f020 r15 0xffff80000367f020 trap 0x0000000e Page Fault gsbs 0xffffffffc8f79dc0 fsbs 0x0000000000000000 err 0x--------00000003 rip 0xffffffffc20b4daa cs 0x------------0008 flag 0x0000000000010203 rsp 0xfffffff0010b5ca0 ss 0x------------0010 Backtrace of kernel context on Core 1: #01 [<0xffffffffc20b4daa>] in bcopy at arch/x86/support64.S:54 #02 [< [inline] >] in readmem at src/ns/util.c:17 #02 [<0xffffffffc2045689>] in readstr at src/ns/util.c:51 #03 [<0xffffffffc2015357>] in ipread at src/net/devip.c:890 #04 [<0xffffffffc203fe9d>] in rread at src/ns/sysfile.c:772 #05 [<0xffffffffc20401fb>] in sysread at src/ns/sysfile.c:830 #06 [<0xffffffffc20593e9>] in sys_read at src/syscall.c:1786 #07 [<0xffffffffc205a249>] in syscall at src/syscall.c:2582 #08 [<0xffffffffc205add8>] in run_local_syscall at src/syscall.c:2619 #09 [<0xffffffffc205b319>] in prep_syscalls at src/syscall.c:2639 #10 [<0xffffffffc20b7a92>] in sysenter_callwrapper at arch/x86/trap.c:932 07:02:59 executing program 0: close(0xffffffffffffffff) r0 = openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000000), 0xd, 0x3, 0x0) read(r0, &(0x7f0000000040)=""/215, 0xd7) openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000140), 0x10, 0x1, 0x0) r1 = openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000180), 0x13, 0x1, 0x0) r2 = openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f00000001c0), 0x14, 0x1, 0x0) openat(r2, &(0x7f0000000200)='./file0\x00', 0x8, 0x10000, 0x0) read(0xffffffffffffffff, &(0x7f0000000240)=""/4096, 0x1000) abort_sysc_fd(r2) r3 = openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000001240), 0x12, 0x1, 0x0) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000001280), 0x13, 0x1, 0x0) openat$proc_self_profile(0xffffffffffffff9c, &(0x7f00000012c0), 0x13, 0x1, 0x0) fcntl$F_SETFL(r2, 0x4, 0x100400) tcgetattr(r3, &(0x7f0000001300)) close(r0) r4 = openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f0000001340), 0xf, 0x3, 0x0) abort_sysc_fd(r4) read(r1, &(0x7f0000001380)=""/166, 0xa6) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000001440), 0x12, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x912, 0xffffffffffffffff, 0x29) 07:03:04 executing program 0: tcgetattr(0xffffffffffffffff, &(0x7f0000000000)) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) openat$net_udp_0_listen(0xffffffffffffff9c, &(0x7f0000000000), 0x12, 0x3, 0x0) r0 = openat$dev_klog(0xffffffffffffff9c, &(0x7f0000000140), 0xa, 0x1, 0x0) fcntl$F_GETFL(r0, 0x3)