kernel panic at kern/drivers/dev/ether.c:317, from core 3: assertion failed: BHLEN(bp) >= offsetof(struct etherpkt, data) 22:59:15 executing program 2: fcntl$F_SETFD(0xffffffffffffffff, 0x2, 0xf837d298ade9d0aa) 22:59:15 executing program 6: r0 = openat$net_ether0_2_type(0xffffffffffffff9c, &(0x7f0000000380), 0x13, 0x1, 0x0) close(r0) openat$net_tcp_0_err(0xffffffffffffff9c, &(0x7f00000000c0), 0xf, 0x3, 0x0) fcntl$F_SETFL(r0, 0x4, 0x600) Stack Backtrace on Core 3: #01 [<0xffffffffc200aa6c>] in backtrace at src/kdebug.c:235 #02 [<0xffffffffc200a205>] in _panic at src/init.c:275 #03 [<0xffffffffc2079553>] in etheriq at drivers/dev/ether.c:317 #04 [<0xffffffffc207971e>] in etheroq at drivers/dev/ether.c:426 #05 [<0xffffffffc207999f>] in etherwrite at drivers/dev/ether.c:508 #06 [<0xffffffffc2040bc9>] in rwrite at src/ns/sysfile.c:1136 #07 [<0xffffffffc2040e1b>] in syswrite at src/ns/sysfile.c:1154 #08 [<0xffffffffc2059389>] in sys_write at src/syscall.c:1798 #09 [<0xffffffffc205a249>] in syscall at src/syscall.c:2582 #10 [<0xffffffffc205add8>] in run_local_syscall at src/syscall.c:2619 #11 [<0xffffffffc205b319>] in prep_syscalls at src/syscall.c:2639 #12 [<0xffffffffc20b7a92>] in sysenter_callwrapper at arch/x86/trap.c:932 22:59:15 executing program 0: r0 = openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000200), 0x10, 0x1, 0x0) fcntl$F_GETFD(r0, 0x1) 22:59:20 executing program 3: r0 = openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000200), 0x13, 0x1, 0x0) close(r0) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000000), 0x13, 0x3, 0x0) write(r0, &(0x7f0000000040), 0x0) 22:59:20 executing program 1: r0 = openat$dev_pgrpid(0xffffffffffffff9c, &(0x7f0000000100), 0xc, 0x1, 0x0) fd2path(r0, &(0x7f0000000000)=""/25, 0x19) 22:59:20 executing program 4: r0 = openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000200), 0x13, 0x1, 0x0) close(r0) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000000), 0x13, 0x3, 0x0) write(r0, &(0x7f0000000040), 0x0) 22:59:20 executing program 5: openat$net_tcp_1_ctl(0xffffffffffffff9c, &(0x7f0000000040), 0xfffffffffffffcd2, 0x3, 0x0) 22:59:20 executing program 7: tcgetattr(0xffffffffffffffff, &(0x7f0000000000)) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) openat$net_tcp_1_data(0xffffffffffffff9c, &(0x7f0000000000), 0x10, 0x3, 0x0) 22:59:20 executing program 2: self_notify(0x0, 0x7, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0}, 0x0) 22:59:20 executing program 6: openat$dev_sdctl(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x3, 0x0) 22:59:20 executing program 0: r0 = openat$net_udp_0_remote(0xffffffffffffff9c, &(0x7f0000000000), 0x12, 0x1, 0x0) read(r0, &(0x7f0000000040)=""/200, 0xc8) 22:59:25 executing program 3: readlink(&(0x7f0000000200)='./file1\x00', 0xfffffffffffffec5, &(0x7f0000000240)=""/96, 0x4f) 22:59:25 executing program 1: r0 = proc_create(0x0, 0x0, 0x0, 0x0, 0x0) waitpid(r0, &(0x7f0000000100), 0x1) 22:59:25 executing program 4: r0 = openat$net_ipifc_0_remote(0xffffffffffffff9c, &(0x7f0000000100), 0x14, 0x1, 0x0) tcgetattr(r0, &(0x7f0000000380)) 22:59:25 executing program 5: symlink(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='./file0\x00', 0x8) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000000), 0x14, 0x3, 0x0)