nbuf 4096, STAT_FIX_LEN_9P 49 BIT16SZ 2, GBIT16(buf) 0 kernel panic at kern/src/ns/chan.c:324, from core 3: This is bad! 16:59:00 executing program 1: r0 = proc_create(&(0x7f0000000180)='./file0\x00', 0x8, &(0x7f00000001c0)="1000", 0x2, 0x0) notify(r0, 0x2, &(0x7f0000000240)={0xf, 0x6, 0xfffffffffffffff9, &(0x7f0000000200)="be6a56e38ddb1c183dd9", 0x100000000}) notify(0x0, 0x5, &(0x7f0000000100)={0x7, 0x2, 0x6c, &(0x7f0000000000)="9e80a2985af67542d46ff61296bdcf53612fbc462f6637c8d0a5173a41c4fffce2dec8703782cd64121c2842a8e3bad12470ec58aa0e8410bf0ef058c419be120837b0cacfcfac4a071a7ef47012637ea7c84743797b145ff8b462734b2129b8c41eae7a4c1ef4d6de24d13dcd049de7792b350406d689210612e3ed8b91e555ceb4120fbf0d88f294d963a33fabcd9fdaabff9612dcf9744c221f1d369c83f7757c31f7c79d5de6de92c891e2a121379c5a05e57b5ca6827343d187bc4b22eb60d804c6", 0x6}) cclose 0x0000000000000000 Stack Backtrace on Core 3: #01 [<0xffffffffc200a3b7>] in backtrace at src/kdebug.c:219 #02 [<0xffffffffc2009b7c>] in _panic at src/init.c:266 #03 [<0xffffffffc2031967>] in cclose at src/ns/chan.c:324 #04 [<0xffffffffc20332f9>] in walk_symlink at src/ns/chan.c:1695 #05 [<0xffffffffc20332e4>] in walk_symlink at src/ns/chan.c:1693 #06 [<0xffffffffc20332e4>] in walk_symlink at src/ns/chan.c:1693 #07 [<0xffffffffc20332e4>] in walk_symlink at src/ns/chan.c:1693 #08 [<0xffffffffc20332e4>] in walk_symlink at src/ns/chan.c:1693 #09 [<0xffffffffc20332e4>] in walk_symlink at src/ns/chan.c:1693 #10 [<0xffffffffc20332e4>] in walk_symlink at src/ns/chan.c:1693 #11 [<0xffffffffc2032e02>] in walk at src/ns/chan.c:864 #12 [<0xffffffffc20334d9>] in __namec_from at src/ns/chan.c:1131 #13 [<0xffffffffc20340af>] in namec at src/ns/chan.c:1509 #14 [<0xffffffffc203defd>] in sysrename at src/ns/sysfile.c:869 #15 [<0xffffffffc2055a12>] in sys_rename at src/syscall.c:2349 #16 [<0xffffffffc2059149>] in syscall at src/syscall.c:2528 #17 [<0xffffffffc2059304>] in run_local_syscall at src/syscall.c:2563 #18 [<0xffffffffc2059839>] in prep_syscalls at src/syscall.c:2583 #19 [<0xffffffffc20aaf1a>] in sysenter_callwrapper at arch/x86/trap.c:859 16:59:05 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x8, 0x81, 0x40) fcntl$F_GETFL(r0, 0x3) 16:59:06 executing program 1: mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0xe01d, 0xffffffffffffff9c, 0x0) r0 = proc_create(&(0x7f0000000080)='./file0\x00', 0xffffffffffffffa9, &(0x7f00000000c0)='\x00', 0xff02, 0x0) poke_ksched(r0, 0x0)