kernel panic at kern/arch/x86/trap.c:325, from core 2: Proc-ful Page Fault in the Kernel at 0x0000000020000080! 17:40:29 executing program 0: openat$net_ipifc_clone(0xffffffffffffff9c, &(0x7f0000000000), 0x11, 0x3, 0x0) openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000040), 0x8, 0x3, 0x0) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000080), 0x13, 0x3, 0x0) 17:40:29 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8, 0x20000, 0xc9) r1 = openat$net_ndb(0xffffffffffffff9c, &(0x7f0000000040), 0x9, 0x3, 0x0) close(r1) fcntl$F_SETFL(0xffffffffffffff9c, 0x4, 0x188800) abort_sysc_fd(0xffffffffffffffff) r2 = openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000080), 0x12, 0x1, 0x0) close(r2) openat$proc_self_text(0xffffffffffffff9c, &(0x7f00000000c0), 0x10, 0x1, 0x0) fcntl$F_SETFL(r0, 0x4, 0x100400) write(r1, &(0x7f0000000100)="3af68ef0a9950610cc971f9522e3eeee01e2dff1", 0x14) fcntl$F_SETFL(r1, 0x4, 0xc00) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000140), 0xc, 0x3, 0x0) r3 = openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000180), 0xd, 0x3, 0x0) read(r0, &(0x7f00000001c0)=""/42, 0x2a) r4 = openat$net_ether0_1_ifstats(0xffffffffffffff9c, &(0x7f0000000200), 0x16, 0x1, 0x0) close(r4) close(r3) openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f0000000240), 0x13, 0x3, 0x0) openat$net_ether0_0_type(0xffffffffffffff9c, &(0x7f0000000280), 0x13, 0x1, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f00000002c0), 0xd, 0x3, 0x0) 17:40:29 executing program 1: r0 = openat$proc_self_profile(0xffffffffffffff9c, &(0x7f00000001c0), 0x13, 0x1, 0x0) r1 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000180), 0xf, 0x3, 0x0) fd2path(r1, &(0x7f0000000080)=""/4086, 0xff6) write(r1, &(0x7f0000001080)="b2a3e1b12a3a49fb5fefb418548aa8d0821be728ccf8c357dab1315dfbb02a0cd1eb79", 0x23) fcntl$F_GETFL(r0, 0x3) r2 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000180), 0xf, 0x3, 0x0) fd2path(r2, &(0x7f0000000080)=""/4086, 0xff6) tcgetattr(r2, &(0x7f0000000000)) openat$dev_sysctl(0xffffffffffffff9c, &(0x7f0000000040), 0xc, 0x3, 0x0) 17:40:30 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x8, 0x87ec78357c4e88d1) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x8, 0x20000, 0x2) r1 = openat(r0, &(0x7f0000000080)='./file0\x00', 0x8, 0x400, 0x150) symlink(&(0x7f00000000c0)='./file0\x00', 0x8, &(0x7f0000000100)='./file0\x00', 0x8) r2 = openat$net_ether0_0_stats(0xffffffffffffff9c, &(0x7f0000000140), 0x14, 0x1, 0x0) fcntl$F_GETFD(r2, 0x1) symlink(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)='./file0\x00', 0x8) llseek(r1, 0x6, 0x1e95, &(0x7f0000000200), 0x1) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000240), 0x12, 0x1, 0x0) fstat(0xffffffffffffff9c, &(0x7f0000000280)) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000300), 0x12, 0x3, 0x0) symlink(&(0x7f0000000340)='./file0\x00', 0x8, &(0x7f0000000380)='./file0\x00', 0x8) openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f00000003c0), 0x12, 0x1, 0x0) nmount(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', 0x8, 0x2) fcntl$F_SYNC(r1, 0x65) r3 = openat$net_tcp_1_listen(0xffffffffffffff9c, &(0x7f0000000440), 0x12, 0x3, 0x0) close(r3) openat$proc_self_mem(0xffffffffffffff9c, &(0x7f0000000480), 0xf, 0x1, 0x0) close(0xffffffffffffffff) abort_sysc_fd(0xffffffffffffffff) 17:40:32 executing program 7: r0 = openat$dev_pid(0xffffffffffffff9c, &(0x7f0000000340), 0x9, 0x1, 0x0) llseek(r0, 0x80006, 0x9, &(0x7f0000000040), 0xf007011cfbaca8e2) 17:40:32 executing program 4: r0 = openat$proc_self_segment(0xffffffffffffff9c, &(0x7f0000000000), 0x13, 0x1, 0x0) fd2path(0xffffffffffffffff, &(0x7f0000000040)=""/159, 0x9f) fstat(0xffffffffffffffff, &(0x7f0000000100)) write(r0, &(0x7f0000000180)="b65959451b4e39da472fac94fff5ebda12fdcb9b778c9444fd62b1401189dfdfd4183871f321772e8ce98bc4d2495810d41c27d3f8d645ec97dcd927812b96734d0d9246e643738eff96fcae66f51ae5", 0x50) r1 = openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000200), 0xc, 0x3, 0x0) r2 = openat$net_ipifc_0_status(0xffffffffffffff9c, &(0x7f0000000240), 0x14, 0x1, 0x0) write(r2, &(0x7f0000000280)="0248aba62f865d5774bf73f82f208069c028516094b2ca516bb882587107fbdcffc00da11115862315dc2a7215c634f6efc4bd04b8a9e9a68844da1af18dd520ff15e2290a9b3410053443221e75b635407e4777826c013015a07f8e6bd3e901ba5bcf7577495c797b686274469d0914fb72d9b52ae10e54696b6eb2d0837e9c5d68c458c434a546621d8e3094af7cf90fe9ba442c6677", 0x97) r3 = openat$dev_caphash(0xffffffffffffff9c, &(0x7f0000000340), 0xd, 0x3, 0x0) close(r3) close(r0) llseek(r0, 0x1f, 0x1, &(0x7f0000000380), 0x0) r4 = openat(r1, &(0x7f00000003c0)='./file0\x00', 0x8, 0x8000, 0x20) fcntl$F_GETFD(r0, 0x1) openat(r3, &(0x7f0000000400)='./file0/file0\x00', 0xe, 0x40, 0x24) fcntl$F_SETFL(r0, 0x4, 0x0) read(r4, &(0x7f0000000440)=""/162, 0xa2) abort_sysc_fd(r4) readlink(&(0x7f0000000500)='./file0/file0\x00', 0xe, &(0x7f0000000540)=""/166, 0xa6) r5 = openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000600), 0x13, 0x1, 0x0) fcntl$F_SYNC(r5, 0x65) 17:40:32 executing program 2: rename(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='./file0\x00', 0x8) r0 = openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f00000000c0), 0x12, 0x3, 0x0) abort_sysc_fd(0xffffffffffffffff) fcntl$F_GETFD(r0, 0x1) 17:40:32 executing program 3: r0 = openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000000), 0xd, 0x3, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2, 0x10010, r0, 0x1) r1 = openat$net_tcp_0_listen(0xffffffffffffff9c, &(0x7f0000000040), 0x12, 0x3, 0x0) r2 = openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000080), 0x13, 0x1, 0x0) read(r2, &(0x7f00000000c0)=""/101, 0x65) openat$net_ether0_1_type(0xffffffffffffff9c, &(0x7f0000000140), 0x13, 0x1, 0x0) r3 = openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000180), 0x10, 0x3, 0x0) fstat(r3, &(0x7f00000001c0)) r4 = openat$net_tcp_1_local(0xffffffffffffff9c, &(0x7f0000000240), 0x11, 0x1, 0x0) fcntl$F_GETFD(r4, 0x1) fd2path(r1, &(0x7f0000000280)=""/193, 0xc1) r5 = openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000380), 0x10, 0x3, 0x0) fcntl$F_DUPFD(r3, 0x0, r5, 0x1) r6 = openat$proc_self_profile(0xffffffffffffff9c, &(0x7f00000003c0), 0x13, 0x1, 0x0) r7 = openat$dev_null(0xffffffffffffff9c, &(0x7f0000000400), 0xa, 0x1, 0x0) close(r7) fcntl$F_DUPFD(r6, 0x0, r5, 0x0) fcntl$F_SETFL(r3, 0x4, 0x400) mmap(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x20830, 0xffffffffffffff9c, 0x6) fd2path(r1, &(0x7f0000000440)=""/141, 0x8d) 17:40:34 executing program 1: mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) r0 = openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000000), 0x13, 0x3, 0x0) fcntl$F_GETFL(r0, 0x3) r1 = openat$net_ether0_ifstats(0xffffffffffffff9c, &(0x7f0000000040), 0x14, 0x1, 0x0) tcgetattr(r1, &(0x7f0000000080)) write(r1, &(0x7f00000000c0)="99cbbff6835bf96689ff3faed2f55eea2bc2e3be3ed57bea5e76acb3c0768922395c32db87cc2cca746143d1e3586b803d77517e6a226ee0c0cc2ad43a66d5803ecffc1c8ec97b9251d6415c394129094961d7ce8633437b7bf172db319fe0e268ca3632e65521", 0x67) r2 = openat$net_ipifc_1_local(0xffffffffffffff9c, &(0x7f0000000140), 0x13, 0x1, 0x0) close(r2) r3 = openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000180), 0x12, 0x1, 0x0) fcntl$F_DUPFD(r0, 0x0, r3, 0x0) fd2path(r3, &(0x7f00000001c0)=""/108, 0x6c) r4 = openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000240), 0x10, 0x3, 0x0) openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000280), 0xa, 0x1, 0x0) llseek(r4, 0x8001, 0x1000, &(0x7f00000002c0), 0x2) fstat(r4, &(0x7f0000000300)) r5 = openat$net_ipifc_1_data(0xffffffffffffff9c, &(0x7f0000000380), 0x12, 0x3, 0x0) read(r5, &(0x7f00000003c0)=""/134, 0x86) openat(r4, &(0x7f0000000480)='./file0\x00', 0x8, 0x100000, 0x20) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f00000004c0), 0x12, 0x1, 0x0) close(0xffffffffffffff9c) 17:40:34 executing program 5: abort_sysc_fd(0xffffffffffffffff) r0 = openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000040), 0xc, 0x1, 0x0) r1 = openat$proc_self_ns(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) read(r0, &(0x7f00000000c0)=""/77, 0x4d) fcntl$F_GETFD(0xffffffffffffffff, 0x1) fd2path(0xffffffffffffffff, 0x0, 0x0) vmm_ctl$VMM_CTL_GET_EXITS(0x1) close(r1) r2 = openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000640), 0x10, 0x1, 0x0) proc_create(0x0, 0x0, &(0x7f00000006c0)='/dev/kprint\x00', 0xc, 0x0) proc_create(&(0x7f0000000000)='./file0/file0/file0\x00', 0x14, &(0x7f0000000080)='/troc/self/maps\x00', 0x10, 0x1) fcntl$F_DUPFD(r0, 0x0, r2, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) 17:40:35 executing program 6: r0 = openat$dev_hostowner(0xffffffffffffff9c, &(0x7f0000000000), 0xf, 0x3, 0x0) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x1, 0x38032, r0, 0x0) openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000140), 0x14, 0x1, 0x0) fstat(r0, &(0x7f00000001c0)) fd2path(r0, &(0x7f0000000180)=""/10, 0xa) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000100), 0xc, 0x1, 0x0) read(r0, &(0x7f0000000080)=""/78, 0x4e) openat(r0, &(0x7f0000000040)='./file0\x00', 0x8, 0x80, 0x92) 17:40:37 executing program 7: r0 = openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000000), 0x12, 0x3, 0x0) close(r0) r1 = openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000040), 0x12, 0x1, 0x0) close(r1) llseek(r1, 0x7, 0x9, &(0x7f0000000080), 0x1) r2 = openat$dev_pid(0xffffffffffffff9c, &(0x7f00000000c0), 0x9, 0x1, 0x0) fcntl$F_SYNC(r2, 0x65) openat$dev_kmesg(0xffffffffffffff9c, &(0x7f0000000100), 0xb, 0x1, 0x0) fcntl$F_GETFL(r1, 0x3) mmap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x2000000, 0x24011, r0, 0x32e) fcntl$F_GETFL(r1, 0x3) fcntl$F_SETFL(r2, 0x4, 0x0) openat(r2, &(0x7f0000000140)='./file0\x00', 0x8, 0x121c02, 0x81) openat$prof_kpdata(0xffffffffffffff9c, &(0x7f0000000180), 0xd, 0x3, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f00000001c0), 0x11, 0x1, 0x0) tcgetattr(r0, &(0x7f0000000200)) fcntl$F_SYNC(r2, 0x65) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000240), 0x16, 0x1, 0x0) r3 = openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000280), 0xa, 0x1, 0x0) fcntl$F_GETFL(r3, 0x3) 17:40:37 executing program 4: openat$proc_self_proc(0xffffffffffffff9c, &(0x7f00000001c0), 0x10, 0x1, 0x0) r0 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000180), 0xf, 0x3, 0x0) openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000000), 0xa, 0x1, 0x0) r1 = openat$net_udp_clone(0xffffffffffffff9c, &(0x7f0000000180), 0xf, 0x3, 0x0) fd2path(r1, &(0x7f0000000080)=""/4086, 0xff6) openat$prof_kptrace(0xffffffffffffff9c, &(0x7f00000010c0), 0xe, 0x3, 0x0) openat(r1, &(0x7f0000001080)='./file0\x00', 0x8, 0x400, 0x80) fd2path(r0, &(0x7f0000000080)=""/4086, 0xff6) llseek(r0, 0x7fff, 0x2, &(0x7f0000000080), 0x2) fcntl$F_GETFL(0xffffffffffffff9c, 0x3) openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f0000000040), 0x12, 0x1, 0x0) 17:40:37 executing program 2: stat(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)) proc_create(&(0x7f00000000c0)='./file0\x00', 0x8, &(0x7f0000000100)=',\xc3+)/\'\x00', 0x7, 0x1) symlink(&(0x7f0000000140)='./file0\x00', 0x8, &(0x7f0000000180)='./file0\x00', 0x8) mkdir(&(0x7f00000001c0)='./file0\x00', 0x8, 0x100) unlink(&(0x7f0000000200)='./file0\x00', 0x8) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x8, 0x200, 0x60) r1 = openat(r0, &(0x7f0000000280)='./file0\x00', 0x8, 0x10000, 0x4) nmount(r0, &(0x7f00000002c0)='./file0/file0\x00', 0xe, 0x0) nunmount(&(0x7f0000000300)='./file1\x00', 0x8, &(0x7f0000000340)='./file0/file0\x00', 0xe) rmdir(&(0x7f0000000380)='./file0\x00', 0x8) nunmount(&(0x7f00000003c0)='./file0\x00', 0x8, &(0x7f0000000400)='./file0\x00', 0x8) mkdir(&(0x7f0000000440)='./file0\x00', 0x8, 0x8) mkdir(&(0x7f0000000480)='./file0/file0\x00', 0xe, 0x0) fd2path(r1, &(0x7f00000004c0)=""/171, 0xab) r2 = openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f0000000580), 0x12, 0x3, 0x0) openat$net_ipifc_stats(0xffffffffffffff9c, &(0x7f00000005c0), 0x11, 0x1, 0x0) exec(&(0x7f0000000600)='./file0/file0\x00', 0xe, &(0x7f0000000640)=',\xc3+)/\'\x00', 0x7) rmdir(&(0x7f0000000680)='./file1\x00', 0x8) r3 = openat$dev_hostowner(0xffffffffffffff9c, &(0x7f00000006c0), 0xf, 0x3, 0x0) fcntl$F_DUPFD(r2, 0x0, r3, 0x1) 17:40:37 executing program 3: tcgetattr(0xffffffffffffffff, &(0x7f0000000000)) openat$net_ether0_2_ifstats(0xffffffffffffff9c, &(0x7f0000000040), 0x16, 0x1, 0x0) openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000080), 0x13, 0x1, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000000), 0xc, 0x3, 0x0)