kernel panic at kern/src/mm.c:737, from core 3: nbuf 127, STAT_FIX_LEN_9P 49 assertion failed: !pte_is_mapped(pte)BIT16SZ 2, GBIT16(buf) 0 This is bad! Stack Backtrace on Core 3:S t#01 [<10xffffffffc 200a3[b7>] in backtrace 21:48:43 executing program 3: r0 = openat$net_udp_stats(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/stats\x00', 0xf, 0x1, 0x0) r1 = openat$dev_sysstat(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sysstat\x00', 0xd, 0x3, 0x0) openat(r1, &(0x7f0000000040)='./file0\x00', 0x8, 0x1000, 0x40) fcntl$F_DUPFD(r0, 0x0, r1, 0x0) openat$net_ipifc_1_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipifc/1/ctl\x00', 0x11, 0x3, 0x0) 21:48:43 executing program 5: r0 = openat$net_ether0_stats(0xffffffffffffff9c, &(0x7f0000000180)='/net/ether0/stats\x00', 0x12, 0x1, 0x0) read(r0, &(0x7f0000000580)=""/91, 0x5b) llseek(r0, 0x81, 0x9, &(0x7f0000000000), 0x3) 21:48:43 executing program 4: openat$dev_stderr(0xffffffffffffff9c, &(0x7f0000000040)='/dev/stderr\x00', 0xc, 0x3, 0x0) openat$net_udp_0_data(0xffffffffffffff9c, &(0x7f0000000000)='/net/udp/0/data\x00', 0x10, 0x3, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x1c, 0xffffffffffffffff, 0x1aa) 21:48:43 executing program 0: r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8, 0x40, 0x40) 21:48:43 executing program 2: r0 = openat$net_icmp_stats(0xffffffffffffff9c, &(0x7f0000000000)='/net/icmp/stats\x00', 0x10, 0x1, 0x0) r1 = openat$proc_self_profile(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/profile\x00', 0x13, 0x1, 0x0) r2 = openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8, 0x80001, 0x10) r3 = openat$net_ether0_1_data(0xffffffffffffff9c, &(0x7f00000000c0)='/net/ether0/1/data\x00', 0x13, 0x3, 0x0) r4 = openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000100)='/prof/kpctl\x00', 0xc, 0x3, 0x0) write(r2, &(0x7f0000000140)="5f94093d1de12822fad5670f3bf51e3fd92cb2aa93a7a3f815a46faf9972e87b7baf7f7e510a728cdf8dc170696df7d1ed744bf19e", 0x35) openat(r4, &(0x7f0000000180)='./file0\x00', 0x8, 0x3, 0x18) r5 = openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) r6 = openat$dev_osversion(0xffffffffffffff9c, &(0x7f0000000200)='/dev/osversion\x00', 0xf, 0x1, 0x0) openat$proc_self_text(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/text\x00', 0x10, 0x1, 0x0) openat$proc_self_vmstatus(0xffffffffffffff9c, &(0x7f0000000280)='/proc/self/vmstatus\x00', 0x14, 0x1, 0x0) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f00000002c0)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) dup_fds_to(0x0, &(0x7f0000000300)=[{r1}, {r3}, {r1}, {r2}, {r6}, {r0}], 0x6) openat$dev_killkid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$dev_killkid(0xffffffffffffff9c, &(0x7f00000003c0)='/dev/killkid\x00', 0xd, 0x3, 0x0) openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000400)='/dev/stdout\x00', 0xc, 0x3, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000440)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) openat$prof_kptrace_ctl(0xffffffffffffff9c, &(0x7f0000000480)='/prof/kptrace_ctl\x00', 0x12, 0x3, 0x0) openat$net_ipifc_1_status(0xffffffffffffff9c, &(0x7f00000004c0)='/net/ipifc/1/status\x00', 0x14, 0x1, 0x0) openat$net_tcp_2_data(0xffffffffffffff9c, &(0x7f0000000500)='/net/tcp/2/data\x00', 0x10, 0x3, 0x0) openat$prof_mpstat_raw(0xffffffffffffff9c, &(0x7f0000000540)='/prof/mpstat-raw\x00', 0x11, 0x3, 0x0) openat$proc_self_syscall(0xffffffffffffff9c, &(0x7f0000000580)='/proc/self/syscall\x00', 0x13, 0x1, 0x0) openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f00000005c0)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, &(0x7f0000000600)='/net/ether0/clone\x00', 0x12, 0x3, 0x0) openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000640)='/dev/kprint\x00', 0xc, 0x1, 0x0) openat$net_ipifc_1_listen(0xffffffffffffff9c, &(0x7f0000000680)='/net/ipifc/1/listen\x00', 0x14, 0x3, 0x0) openat$net_ether0_2_ctl(0xffffffffffffff9c, &(0x7f00000006c0)='/net/ether0/2/ctl\x00', 0x12, 0x3, 0x0) openat$net_ipifc_0_local(0xffffffffffffff9c, &(0x7f0000000700)='/net/ipifc/0/local\x00', 0x13, 0x1, 0x0) openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000740)='/prof/kpctl\x00', 0xc, 0x3, 0x0) fd2path(r5, &(0x7f0000000780)=""/101, 0x65) <#02 [0<0xffffffffc2009b7cx>]f in _panic f#03 [<0xfffffffffffc200db4f1>] in mapf_fpc2age_at0_addr 0d#04 [<0xbf9ffff2ff>] ifc20n0db92>] in populate_anon_va p#05 [o<0xfpfffffffc2u00fbf2>] lin popaultatee__va vt#06 [<0xfffffef_ffc2056110>] inva sfffys_populfff0ate_va 0#07 [<0xffff0ffffc2059149>] in syscall 0#08 [<0xffffffffc82059304>] in run_local_syscall 8#09 [<0xffffffffc2059839>] in prep_syscalls d#10 [<300xfffff ffofnc 2c0oaaf1ra>]e in s 2y s e rntear_caxl l wra0pper x 0000000000000000 rbx 0xffff800015a132a0 rcx 0xfffffff000088ea0 rdx 0xfffffff000088d6c rbp 0xfffffff000088e38 rsi 0x0000000000000000 rd ri d0xfffffff000088eia0 E ntering0 Nanwan's Dungeonx on Core 3 (Ifnts on): fType ' for a help' for a list of colmimanstds . oROS(Core f3 )00 r8 0x0000002f92d964a0 r9 0xffffffffc8790880 r10 0x0000000000000030 r11 0xffff8000030a8420 r12 0xffff80000218aac0 r13 0x0000000020000940 r14 0x0000000000000073 r15 0x000000000000001d trap 0x0000000e Page Fault gsbs 0xffffffffc8667ec0 fsbs 0x0000000000000000 err 0x--------00000000 rip 0xffffffffc2058134 cs 0x------------0008 flag 0x0000000000010246 rsp 0xfffffff000088df8 ss 0x------------0010 Backtrace of kernel context on Core 2: #01 [<0xffffffffc2058134>] in sys_readlink at src/syscall.c:2037 #02 [<0xffffffffc2059149>] in syscall at src/syscall.c:2528 #03 [<0xffffffffc2059304>] in run_local_syscall at src/syscall.c:2563 #04 [<0xffffffffc2059839>] in prep_syscalls at src/syscall.c:2583 #05 [<0xffffffffc20aaf1a>] in sysenter_callwrapper at arch/x86/trap.c:859 kernel panic at kern/arch/x86/trap.c:311, from core 2: Proc-ful Page Fault in the Kernel at 0x000000000000001b! Stack Backtrace on Core 2: #01 [<0xffffffffc200a3b7>] in backtrace at src/kdebug.c:219 #02 [<0xffffffffc2009b7c>] in _panic at src/init.c:266 #03 [< [inline] >] in __handler_kernel_page_fault at arch/x86/trap.c:311 #03 [< [inline] >] in __handle_page_fault at arch/x86/trap.c:327 #03 [< [inline] >] in trap_dispatch at arch/x86/trap.c:589 #03 [<0xffffffffc20aa649>] in trap at arch/x86/trap.c:674 21:48:48 executing program 7: r0 = openat$dev_drivers(0xffffffffffffff9c, &(0x7f0000000080)='/dev/drivers\x00', 0xd, 0x1, 0x0) openat$net_cs(0xffffffffffffff9c, &(0x7f0000000000)='/net/cs\x00', 0x8, 0x3, 0x0) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000040)='/net/tcp/1/remote\x00', 0x12, 0x1, 0x0) llseek(r0, 0x0, 0x0, &(0x7f0000000240), 0x0) 21:48:48 executing program 1: r0 = openat$net_tcp_2_status(0xffffffffffffff9c, &(0x7f00000001c0)='/net/tcp/2/status\x00', 0x12, 0x1, 0x0) openat$net_ether0_1_stats(0xffffffffffffff9c, &(0x7f0000000080)='/net/ether0/1/stats\x00', 0x14, 0x1, 0x0) tcgetattr(r0, &(0x7f0000000040)) openat$net_tcp_1_status(0xffffffffffffff9c, &(0x7f0000000000)='/net/tcp/1/status\x00', 0x12, 0x1, 0x0) 21:48:48 executing program 6: openat$dev_kmesg(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/kmesg\x00', 0x8c, 0x1, 0x0) openat$net_iprouter(0xffffffffffffff9c, &(0x7f0000000100)='/net/iprouter\x00', 0x31c, 0x3, 0x0) 21:48:48 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x1, 0x80, 0x0) r1 = openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000040)='/dev/swap\x00', 0xa, 0x3, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8, 0x31ef72ea1038bf53, 0x40) openat(r1, &(0x7f0000000100)='./file0\x00', 0x8, 0x8000, 0x10) fcntl$F_DUPFD(r0, 0x0, r1, 0x1) openat$dev_bintime(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/bintime\x00', 0xd, 0x3, 0x0) vmm_ctl$VMM_CTL_SET_EXITS(0x2, 0xffffffffffffffff) 21:48:48 executing program 0: r0 = openat$proc_self_core(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/core\x00', 0x10, 0x1, 0x0) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x8, 0x40, 0x40) 21:48:48 executing program 3: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) access(&(0x7f0000000000)='./file0\x00', 0x8, 0x0) wstat(&(0x7f0000000040)='./file0\x00', 0x8, &(0x7f0000000080), 0x0, 0x0) 21:48:49 executing program 2: r0 = openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kprint\x00', 0xc, 0x1, 0x0) fcntl$F_GETFD(r0, 0x1) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/net/ether0/0/ctl\x00', 0x12, 0x3, 0x0) 21:48:49 executing program 4: r0 = openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000080)='/net/ipifc/0/snoop\x00', 0x13, 0x1, 0x0) openat$dev_stdin(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/stdin\x00', 0xb, 0x3, 0x0) llseek(r0, 0x0, 0x0, &(0x7f0000000040), 0x0) openat$proc_self_ctl(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/ctl\x00', 0xf, 0x3, 0x0) openat$proc_self_wait(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/wait\x00', 0x10, 0x1, 0x0)