kernel panic at kern/src/ns/chan.c:334, from core 3: cclose 0x0000000000000000 Stack Backtrace on Core 3: #01 [<0xffffffffc200a39c>] in backtrace at src/kdebug.c:235 #02 [<0xffffffffc2009b35>] in _panic at src/init.c:268 #03 [<0xffffffffc203187a>] in cclose at src/ns/chan.c:334 #04 [<0xffffffffc2033281>] in walk_symlink at src/ns/chan.c:1739 #05 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #06 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #07 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #08 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #09 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #10 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #11 [<0xffffffffc2032d82>] in walk at src/ns/chan.c:890 #12 [<0xffffffffc2033459>] in __namec_from at src/ns/chan.c:1162 #13 [<0xffffffffc2034043>] in namec at src/ns/chan.c:1552 #14 [<0xffffffffc203de95>] in sysremove at src/ns/sysfile.c:854 #15 [<0xffffffffc20563f5>] in sys_unlink at src/syscall.c:1998 #16 [<0xffffffffc2059a29>] in syscall at src/syscall.c:2560 #17 [<0xffffffffc205a5d8>] in run_local_syscall at src/syscall.c:2597 #18 [<0xffffffffc205ab19>] in prep_syscalls at src/syscall.c:2617 #19 [<0xffffffffc20ac432>] in sysenter_callwrapper at arch/x86/trap.c:877 kernel panic at kern/drivers/dev/mnt.c:1131, from core 0: rpc tags Stack Backtrace on Core 0: #01 [<0xffffffffc200a39c>] in backtrace at src/kdebug.c:235 #02 [<0xffffffffc2009b35>] in _panic at src/init.c:268 #03 [<0xffffffffc207f09a>] in mntralloc at drivers/dev/mnt.c:1131 #04 [<0xffffffffc207f143>] in mntflushalloc at drivers/dev/mnt.c:1058 #05 [<0xffffffffc207f5e0>] in mountio at drivers/dev/mnt.c:854 #06 [<0xffffffffc207f6d5>] in mountrpc at drivers/dev/mnt.c:783 #07 [<0xffffffffc2080208>] in mntopencreate at drivers/dev/mnt.c:568 #08 [<0xffffffffc2080368>] in mntopen at drivers/dev/mnt.c:585 #09 [<0xffffffffc2033860>] in __namec_from at src/ns/chan.c:1260 #10 [<0xffffffffc2034043>] in namec at src/ns/chan.c:1552 #11 [<0xffffffffc20415e6>] in sysopenat at src/ns/sysfile.c:597 #12 [<0xffffffffc2058f6f>] in sys_openat at src/syscall.c:1791 #13 [<0xffffffffc2059a29>] in syscall at src/syscall.c:2560 #14 [<0xffffffffc205a5d8>] in run_local_syscall at src/syscall.c:2597 #15 [<0xffffffffc205ab19>] in prep_syscalls at src/syscall.c:2617 #16 [<0xffffffffc20ac432>] in sysenter_callwrapper at arch/x86/trap.c:877 rbx 0x0000100000006a70 rcx 0x0000300000001000 rdx 0x0000000000000000 rbp 0x0000300000006f40 rsi 0x0000000000000008 rdi 0x00000000200000c0 r8 0x0000000000000000 r9 0x0000000000000000 r10 0x0000000000000000 r11 0x0000000000000200 r12 0x0000300000006f00 r13 0x0000000000000008 r14 0x0000000000000000 r15 0x0000000000000000 trap 0x0000000d General Protection gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000000 rip 0x000000000040ced9 cs 0x------------0023 flag 0x0000000000010286 rsp 0x0000300000006ef8 ss 0x------------001b err 0x0 (for PFs: User 4, Wr 2, Rd 1), aux 0x0000000000000000 Addr 0x000000000040ced9 is in syz-executor at offset 0x000000000000ced9 VM Regions for proc 91 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b5000): 0x00000005, 0x00000001, 0xffff800014f70220, 0x0000000000000000 01: (0x00000000004b5000 - 0x00000000004b6000): 0x00000005, 0x00000002, 0xffff800014f70220, 0x00000000000b5000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff800014f70220, 0x00000000000b6000 03: (0x00000000006b9000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff800014f70220, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000003d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 2: Offsets only matter for shared libraries #01 Addr 0x000000000040ced9 is in syz-executor at offset 0x000000000000ced9 #02 Addr 0x000000000040cd76 is in syz-executor at offset 0x000000000000cd76 #03 Addr 0x000000000040cec2 is in syz-executor at offset 0x000000000000cec2 #04 Addr 0x00000000004084f8 is in syz-executor at offset 0x00000000000084f8 #05 Addr 0x0000000000403f59 is in syz-executor at offset 0x0000000000003f59 #06 Addr 0x00000000004148cc is in syz-executor at offset 0x00000000000148cc #07 Addr 0x00000000004148d1 is in syz-executor at offset 0x00000000000148d1