kernel panic at kern/src/ns/chan.c:334, from core 2: cclose 0x0000000000000000 Stack Backtrace on Core 2: #01 [<0xffffffffc200a39c>] in backtrace at src/kdebug.c:235 #02 [<0xffffffffc2009b35>] in _panic at src/init.c:268 #03 [<0xffffffffc203187a>] in cclose at src/ns/chan.c:334 #04 [<0xffffffffc2033281>] in walk_symlink at src/ns/chan.c:1739 #05 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #06 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #07 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #08 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #09 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #10 [<0xffffffffc203326c>] in walk_symlink at src/ns/chan.c:1737 #11 [<0xffffffffc2032d82>] in walk at src/ns/chan.c:890 #12 [<0xffffffffc2033459>] in __namec_from at src/ns/chan.c:1162 #13 [<0xffffffffc2034043>] in namec at src/ns/chan.c:1552 #14 [<0xffffffffc203de95>] in sysremove at src/ns/sysfile.c:854 #15 [<0xffffffffc2056455>] in sys_rmdir at src/syscall.c:2144 #16 [<0xffffffffc2059a29>] in syscall at src/syscall.c:2560 #17 [<0xffffffffc205a5d8>] in run_local_syscall at src/syscall.c:2597 #18 [<0xffffffffc205ab19>] in prep_syscalls at src/syscall.c:2617 #19 [<0xffffffffc20ac432>] in sysenter_callwrapper at arch/x86/trap.c:877 HW TRAP frame (partial) at 0xffffffffc89963a0 on core 3 rax 0x000000005a5a4e80 rbx 0x0000300000006e90 rcx 0x0000000000000150 rdx 0x000010000000a4c0 ROS(Core 2)> rbp 0x0000300000006e80 rsi 0x000010000000a5c0 rdi 0x000000005a5a4f80 r8 0x000000005a5a5a5a r9 0x000000005a5a4e80 r10 0x0000000000000000 r11 0x0000000000000200 r12 0x000000000040ff90 r13 0x000010000000a4c0 r14 0x0000000000000004 r15 0x00007f7fffa01200 trap 0x0000000e Page Fault gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000006 rip 0x000000000040fd76 cs 0x------------0023 flag 0x0000000000010202 rsp 0x0000300000006d80 ss 0x------------001b err 0x6 (for PFs: User 4, Wr 2, Rd 1), aux 0x000000005a5a4f80 Addr 0x000000000040fd76 is in syz-executor at offset 0x000000000000fd76 VM Regions for proc 85 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b5000): 0x00000005, 0x00000001, 0xffff800004969020, 0x0000000000000000 01: (0x00000000004b5000 - 0x00000000004b6000): 0x00000005, 0x00000002, 0xffff800004969020, 0x00000000000b5000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff800004969020, 0x00000000000b6000 03: (0x00000000006b9000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff800004969020, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000003d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 3: Offsets only matter for shared libraries #01 Addr 0x000000000040fd76 is in syz-executor at offset 0x000000000000fd76 #02 Addr 0x000000000041019e is in syz-executor at offset 0x000000000001019e #03 Addr 0x000000000041574d is in syz-executor at offset 0x000000000001574d #04 Addr 0x000000000040803b is in syz-executor at offset 0x000000000000803b #05 Addr 0x0000000000414ba0 is in syz-executor at offset 0x0000000000014ba0 #06 Addr 0x000000000040856a is in syz-executor at offset 0x000000000000856a #07 Addr 0x0000000000403f59 is in syz-executor at offset 0x0000000000003f59 #08 Addr 0x00000000004148cc is in syz-executor at offset 0x00000000000148cc #09 Addr 0x00000000004148d1 is in syz-executor at offset 0x00000000000148d1