kernel panic at kern/drivers/dev/ether.c:317, from core 1: assertion failed: BHLEN(bp) >= offsetof(struct etherpkt, data) Stack Backtrace on Core 1: #01 [<0xffffffffc200aa6c>] in backtrace at src/kdebug.c:235 #02 [<0xffffffffc200a205>] in _panic at src/init.c:275 #03 [<0xffffffffc2079553>] in etheriq at drivers/dev/ether.c:317 #04 [<0xffffffffc207971e>] in etheroq at drivers/dev/ether.c:426 #05 [<0xffffffffc207999f>] in etherwrite at drivers/dev/ether.c:508 #06 [<0xffffffffc2040bc9>] in rwrite at src/ns/sysfile.c:1136 #07 [<0xffffffffc2040e1b>] in syswrite at src/ns/sysfile.c:1154 #08 [<0xffffffffc2059389>] in sys_write at src/syscall.c:1798 #09 [<0xffffffffc205a249>] in syscall at src/syscall.c:2582 #10 [<0xffffffffc205add8>] in run_local_syscall at src/syscall.c:2619 #11 [<0xffffffffc205b319>] in prep_syscalls at src/syscall.c:2639 #12 [<0xffffffffc20b7a92>] in sysenter_callwrapper at arch/x86/trap.c:932 04:03:29 executing program 4: r0 = openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000200), 0x13, 0x1, 0x0) close(r0) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000000), 0x13, 0x3, 0x0) write(r0, &(0x7f0000000040), 0x0) 04:03:29 executing program 1: openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000000), 0xc, 0x3, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) openat$net_udp_0_status(0xffffffffffffff9c, &(0x7f0000000000), 0x12, 0x1, 0x0) 04:03:30 executing program 6: openat$prof_kpctl(0xffffffffffffff9c, &(0x7f0000000000), 0xc, 0x3, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) openat$net_ether0_0_ctl(0xffffffffffffff9c, &(0x7f0000000000), 0x12, 0x3, 0x0) 04:03:30 executing program 5: openat$prof_empty(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x3, 0x0) 04:03:30 executing program 0: symlink(&(0x7f0000000000)='./file0\x00', 0x8, &(0x7f0000000040)='./file0\x00', 0x8) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) openat$dev_random(0xffffffffffffff9c, &(0x7f0000000040), 0xc, 0x1, 0x0) 04:03:30 executing program 7: openat$proc_self_strace(0xffffffffffffff9c, &(0x7f00000001c0), 0x3972, 0x1, 0x0) 04:03:30 executing program 3: openat(0xffffffffffffffff, &(0x7f0000000040)='/', 0x1, 0x400, 0x5e) 04:03:30 executing program 2: r0 = openat$proc_self_status(0xffffffffffffff9c, &(0x7f0000000000), 0x12, 0x1, 0x0) read(r0, &(0x7f0000000080)=""/199, 0xc7) 04:03:34 executing program 4: r0 = openat$net_ipifc_1_snoop(0xffffffffffffff9c, &(0x7f0000000200), 0x13, 0x1, 0x0) close(r0) openat$net_ether0_0_data(0xffffffffffffff9c, &(0x7f0000000000), 0x13, 0x3, 0x0) write(r0, &(0x7f0000000040), 0x0) 04:03:35 executing program 6: mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x1) openat$net_tcp_1_remote(0xffffffffffffff9c, &(0x7f0000000080), 0x12, 0x1, 0x0) 04:03:35 executing program 0: r0 = openat$net_ether0_2_stats(0xffffffffffffff9c, &(0x7f00000003c0), 0x14, 0x1, 0x0) fd2path(r0, &(0x7f0000000400)=""/219, 0xdb) 04:03:35 executing program 1: openat$dev_swap(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x3, 0x0) 04:03:35 executing program 7: r0 = openat$dev_kprint(0xffffffffffffff9c, &(0x7f0000000040), 0xc, 0x1, 0x0) openat$proc_self_ns(0xffffffffffffff9c, 0x0, 0x0, 0x1, 0x0) fd2path(0xffffffffffffffff, 0x0, 0x0) vmm_ctl$VMM_CTL_GET_EXITS(0x1) r1 = openat$proc_self_maps(0xffffffffffffff9c, &(0x7f0000000640), 0x10, 0x1, 0x0) proc_create(0x0, 0x0, &(0x7f00000006c0)='/dev/kprint\x00', 0xc, 0x0) fcntl$F_DUPFD(r0, 0x0, r1, 0x0) openat$net_ether0_clone(0xffffffffffffff9c, 0x0, 0x0, 0x3, 0x0) 04:03:35 executing program 3: r0 = openat$proc_self_notepg(0xffffffffffffff9c, &(0x7f0000000040), 0x5, 0x1, 0x0) fstat(r0, &(0x7f0000000080)) 04:03:35 executing program 5: r0 = openat$dev_ppid(0xffffffffffffff9c, &(0x7f0000000000), 0xa, 0x1, 0x0) close(r0) openat$dev_stdout(0xffffffffffffff9c, &(0x7f0000000080), 0xc, 0x3, 0x0) write(r0, &(0x7f0000000200), 0x0) 04:03:35 executing program 2: r0 = openat$net_ipifc_0_snoop(0xffffffffffffff9c, &(0x7f0000000340), 0x13, 0x1, 0x0) fstat(r0, &(0x7f0000000380))