kernel panic at kern/src/ns/chan.c:810, from core 1: Got a walk from a symlink that wasn't ..! Stack Backtrace on Core 1: #01 [<0xffffffffc200a3ec>] in backtrace at src/kdebug.c:235 #02 [<0xffffffffc2009b85>] in _panic at src/init.c:268 #03 [<0xffffffffc2033556>] in walk at src/ns/chan.c:810 #04 [<0xffffffffc20336e9>] in __namec_from at src/ns/chan.c:1162 #05 [<0xffffffffc20342d3>] in namec at src/ns/chan.c:1552 #06 [<0xffffffffc2041886>] in sysopenat at src/ns/sysfile.c:597 #07 [<0xffffffffc205916f>] in sys_openat at src/syscall.c:1806 #08 [<0xffffffffc2059df9>] in syscall at src/syscall.c:2575 #09 [<0xffffffffc205a9a8>] in run_local_syscall at src/syscall.c:2612 #10 [<0xffffffffc205aee9>] in prep_syscalls at src/syscall.c:2632 #11 [<0xffffffffc20ac7d2>] in sysenter_callwrapper at arch/x86/trap.c:877 HW TRAP frame (partial) at 0xffffffffc8e380e0 on core 2 rax 0xb77262e733fef6e1 rbx 0x0000100000006a70 rcx 0x0000300000001000 rdx 0x0000000000000000 rbp 0x0000300000006f40 rsi 0x0000000000000008 rdi 0x0000000020000a40 r8 0x0000000000000000 r9 0x0000000000000000 r10 0x0000000000000000 ROS(Core 1)> r11 0x0000000000000200 r12 0x0000300000006f00 r13 0x0000000000000008 r14 0x0000000000000000 r15 0x0000000000000000 trap 0x0000000d General Protection gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000000 rip 0x000000000040cf59 cs 0x------------0023 flag 0x0000000000010286 rsp 0x0000300000006ef8 ss 0x------------001b err 0x0 (for PFs: User 4, Wr 2, Rd 1), aux 0x0000000000000000 Addr 0x000000000040cf59 is in syz-executor at offset 0x000000000000cf59 VM Regions for proc 43 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b6000): 0x00000005, 0x00000001, 0xffff80000495e820, 0x0000000000000000 01: (0x00000000004b6000 - 0x00000000004b7000): 0x00000005, 0x00000002, 0xffff80000495e820, 0x00000000000b6000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff80000495e820, 0x00000000000b6000 03: (0x00000000006b9000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff80000495e820, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000005d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 2: Offsets only matter for shared libraries #01 Addr 0x000000000040cf59 is in syz-executor at offset 0x000000000000cf59 #02 Addr 0x000000000040cdf6 is in syz-executor at offset 0x000000000000cdf6 #03 Addr 0x000000000040cf42 is in syz-executor at offset 0x000000000000cf42 #04 Addr 0x0000000000408578 is in syz-executor at offset 0x0000000000008578 #05 Addr 0x0000000000403fd9 is in syz-executor at offset 0x0000000000003fd9 #06 Addr 0x000000000041494c is in syz-executor at offset 0x000000000001494c #07 Addr 0x0000000000414951 is in syz-executor at offset 0x0000000000014951