kernel panic at kern/arch/x86/trap.c:325, from core 2: Proc-ful Page Fault in the Kernel at 0x0000000020000140! 00:01:13 executing program 5: r0 = openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000000), 0xc, 0x3, 0x0) r1 = openat$net_empty(0xffffffffffffff9c, &(0x7f0000000040), 0xc, 0x3, 0x0) write(r1, &(0x7f0000000080)="80619bac619b32dbe9f7f878812ba48b7297103221a1561576a9c91d70b816457d0d45d2935741127acb", 0x2a) write(r0, &(0x7f00000000c0)="8b2de815158f09613a256c500314f6f85e41b9b60bc8829ccd9223bace34764e3cecf8303b286eba1d009365402473b8cabd491c90a0efffd8dfd269ec03fcb8fa907ee5306d7b1643aa6719eb352801510110faee978a7093ed4275db7b0daf61c091e02101cac3bc974fa8f0c4704857fcf92cbf10af78d67979edba1abf00ef61089ffd6d4d3604d5148554fa2fe8b639dc891900fda5d591eb17bd36665c4357308e8528757cc4868b026b7ba2c54de82d22b6214afa", 0xb8) write(r0, &(0x7f0000000180)="aa5bdb985f4328055cfe96e28f0e4151b7993949b03841b6859fa44edbbf91383e035f72c7cae00c6fe83c1bd52a3266e4c0d3c6903bfddd52732a8383c46ad4b5ccbb7ea4753c10e2d9b375bab0e8c17fed519e6af6b411755db5aea86ba8179eb2d980ff57ce66720b2cd96b4eb5cd920bc460c1920cf2a0ab4632a38e7a65dd9deaee116fd1cf1dd20927e53dd74c2e16124e6bafa1cb734f4f1eab753fbf74bd390a8ef22c6a60245584a2074044a9f3d7edd48449552efb5d4df73413b47a4ec29aa9fdd9ea4cf63e2cc9dd78e95636ceaa82b0816453214d4c58f1372bdf0ed46133544f88aeeed72f9b98d111", 0xf0) r2 = openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000280), 0x12, 0x1, 0x0) r3 = openat$proc_self_segment(0xffffffffffffff9c, &(0x7f00000002c0), 0x13, 0x1, 0x0) abort_sysc_fd(r3) fcntl$F_SETFL(r2, 0x4, 0x80400) openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000300), 0x10, 0x1, 0x0) r4 = openat$proc_self_strace(0xffffffffffffff9c, &(0x7f0000000340), 0x12, 0x1, 0x0) fcntl$F_GETFD(r4, 0x1) openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000380), 0x12, 0x1, 0x0) r5 = openat$net_ether0_2_data(0xffffffffffffff9c, &(0x7f00000003c0), 0x13, 0x3, 0x0) fcntl$F_DUPFD(r4, 0x0, r5, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000400), 0xd, 0x3, 0x0) openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000440), 0xd, 0x3, 0x0) read(r1, &(0x7f0000000480)=""/4096, 0x1000) r6 = openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000001480), 0xc, 0x3, 0x0) abort_sysc_fd(r6) 00:01:13 executing program 0: exec(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='\x1d\xd9\xa8\x81\x8cV\x97\xbaT:\x98\x7f\x16\xae|\x18Z\xf3\x8d)\x10\xb9\xacHi\x81J\x18\x10J\x9e\x11\x9d\xf8\xa0Hd\xf1v\xb9n3`\xe6BAg\xed\xe4\a\xb0\xbd\x1f\xec\xdf\x97\xed\xc1\xe5\x1d3\xe1\xce\xbc\xcc\xddel\x9a\xffgZ\xf5\x94\x13\xb0\\jt\xa2\xe7\xde5NMi\x14u!\xdf\xa2\xc4\xe2\xb5\xbf\r\x04\xeb\x8f\x9c\x19\xd9\a5C\x8e\x93!\x18\x015\xf6\xd6\x98\xaco\xd6|m\x81\x8ca\x89ir\xc21\xa8\x7fA>8\xa5\x99M\xac\x01\xf2L\xccRx7R\xd08\xffc\x80\xad_>]\x1f\b\xc6\x16\x10\xcb?\xea\x18\xc7\x92\x042\":J\x16\xb7+\xc9\x9d=\x86\x94\x05m\xbfUp8\xa6\xa8\x1a|\x80G<\x00\xcd;\xad\xb9\xeb\xb42\x83G]\xb8\xac\xe8\xc8y(\x1f\xa6\bV}$\xa6\x01\xe9t\b\xb3A2CjC\xd2\xf9 $\"\xa6#\x00\x00\x00\x00\x00\x00\x00\x00\x00\x04\x00\x00\x00\x00\x00', 0xf6) r0 = openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000000), 0xd, 0x3, 0x0) close(r0) write(r0, &(0x7f0000000300), 0x0) r1 = openat$prof_mpstat(0xffffffffffffff9c, &(0x7f0000000000), 0xd, 0x3, 0x0) mprotect(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2) close(r1) write(r1, &(0x7f0000000300), 0x0) openat(r1, &(0x7f0000000200)='./file1\x00', 0xfffffffffffffd9c, 0x400, 0x0) nmount(0xffffffffffffffff, &(0x7f0000000140)='./file0/file0\x00', 0xe, 0x1) openat$net_ipifc_1_err(0xffffffffffffff9c, &(0x7f0000000180), 0x11, 0x3, 0x0) 00:01:13 executing program 2: r0 = openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000000), 0x12, 0x3, 0x0) close(r0) r1 = openat$net_arp(0xffffffffffffff9c, &(0x7f0000000040), 0x9, 0x3, 0x0) r2 = openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000080), 0xc, 0x3, 0x0) close(r2) r3 = openat$dev_osversion(0xffffffffffffff9c, &(0x7f00000000c0), 0xf, 0x1, 0x0) openat(r3, &(0x7f0000000100)='./file0\x00', 0x8, 0x400, 0x4) mprotect(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x2000000) llseek(r1, 0xffffffff, 0x79, &(0x7f0000000140), 0x1) openat$net_tcp_2_ctl(0xffffffffffffff9c, &(0x7f0000000180), 0xf, 0x3, 0x0) r4 = openat$net_ipifc_1_remote(0xffffffffffffff9c, &(0x7f00000001c0), 0x14, 0x1, 0x0) r5 = openat$net_udp_0_local(0xffffffffffffff9c, &(0x7f0000000200), 0x11, 0x1, 0x0) r6 = fcntl$F_DUPFD(r0, 0x0, r3, 0x0) close(r6) llseek(r4, 0x6, 0xe000000000000, &(0x7f0000000240), 0x2) close(r4) write(r5, &(0x7f0000000280)="b7bc5e8d69dc2878dab7641ccabdc23b926f9ef1a29958126adc498ceb84dcd28064e170cf4db51a02371667e6b09a8a5b191488efe06115d3012b4266822fe1976c19e8377f0055fc9feb8b5c0488c29db6b450804bf42624d2aab9496de6efd5bb21578c6ec2bf1785e7ef39451df62022da342bebb31e70c1915b2242aabcbcf89721ac7369daadef119f8c1c9bff82ce46e73d18f73403196d91819ab668ceb4dd62e5612382bef2", 0xaa) r7 = openat$dev_cputime(0xffffffffffffff9c, &(0x7f0000000340), 0xd, 0x1, 0x0) fcntl$F_DUPFD(r1, 0x0, r7, 0x1) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000380), 0x13, 0x1, 0x0)