kernel panic at kern/arch/x86/trap.c:325, from core 3: Proc-ful Page Fault in the Kernel at 0x0000000020000080! HW TRAP frame at 0xfffffff0010b5be0 on core 3 rax 0x000080001ac2d060 rbx 0x0000000020000080 rcx 0x00000000000000ba rdx 0x00000000000005d7 rbp 0xfffffff0010b5cb8 rsi 0xffff8000053d3020 rdi 0x0000000020000080 r8 0x00000000000005d7 r9 0x0000000000000020 r10 0x0000000000008000 r11 0xffffffffc20c4208 r12 0x00000000000005d7 r13 0x0000000020000080 r14 0xffff8000053d3020 r15 0xffff8000053d3020 trap 0x0000000e Page Fault gsbs 0xffffffffc8f7a340 fsbs 0x0000000000000000 err 0x--------00000003 rip 0xffffffffc20b4daa cs 0x------------0008 flag 0x0000000000010203 rsp 0xfffffff0010b5ca0 ss 0x------------0010 Backtrace of kernel context on Core 3: #01 [<0xffffffffc20b4daa>] in bcopy at arch/x86/support64.S:54 #02 [< [inline] >] in readmem at src/ns/util.c:17 #02 [<0xffffffffc2045689>] in readstr at src/ns/util.c:51 #03 [<0xffffffffc2015357>] in ipread at src/net/devip.c:890 #04 [<0xffffffffc203fe9d>] in rread at src/ns/sysfile.c:772 #05 [<0xffffffffc20401fb>] in sysread at src/ns/sysfile.c:830 #06 [<0xffffffffc20593e9>] in sys_read at src/syscall.c:1786 #07 [<0xffffffffc205a249>] in syscall at src/syscall.c:2582 #08 [<0xffffffffc205add8>] in run_local_syscall at src/syscall.c:2619 #09 [<0xffffffffc205b319>] in prep_syscalls at src/syscall.c:2639 #10 [<0xffffffffc20b7a92>] in sysenter_callwrapper at arch/x86/trap.c:932 02:38:50 executing program 0: vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) vmm_ctl$VMM_CTL_GET_FLAGS(0x3) 02:38:50 executing program 1: wstat(&(0x7f00000001c0)='./file0/file0\x00', 0xe, &(0x7f0000000200)=""/102384, 0x18ff0, 0x0) 02:38:55 executing program 0: r0 = openat$net_tcp_0_data(0xffffffffffffff9c, &(0x7f0000000080), 0x10, 0x3, 0x0) close(0xffffffffffffff9c) fcntl$F_GETFD(r0, 0x1) 02:38:55 executing program 1: r0 = openat$proc_self_ns(0xffffffffffffff9c, &(0x7f0000000000), 0xe, 0x1, 0x0) llseek(r0, 0x1, 0x4, &(0x7f0000000040), 0x0) close(r0) fcntl$F_SYNC(r0, 0x65) close(r0) openat$dev_empty(0xffffffffffffff9c, &(0x7f0000000080), 0xc, 0x3, 0x0) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f00000000c0), 0x12, 0x3, 0x0) r1 = openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000100), 0x12, 0x3, 0x0) r2 = openat$dev_zero(0xffffffffffffff9c, &(0x7f0000000140), 0xa, 0x1, 0x0) r3 = openat$net_ipifc_0_data(0xffffffffffffff9c, &(0x7f0000000180), 0x12, 0x3, 0x0) write(r3, &(0x7f00000001c0)="eadfafd1509b652ed3d0fd68eb357a6ad7fb09f05b29d4ad87ff36981d34c0bb1c64cd40d9176e2da5e7b9a5dce2e61430d6dfb1edc50ea79ad58febf24c5c253330fedad69689af80d300f7eaa76eca477197c2bfec95c2cbb35b677d058929ee9326d56797ff860a0b4ebcc4ddbfb3d52692f1119a", 0x76) close(r3) llseek(r2, 0x3ff, 0x400, &(0x7f0000000240), 0x2) openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000280), 0xc, 0x3, 0x0) r4 = openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f00000002c0), 0x13, 0x1, 0x0) read(r4, &(0x7f0000000300)=""/150, 0x96) fcntl$F_SETFL(r1, 0x4, 0x8000) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f00000003c0), 0x12, 0x3, 0x0) fcntl$F_SETFL(r0, 0x4, 0x108000) read(0xffffffffffffffff, &(0x7f0000000440)=""/64, 0x40)