vm_soft_fault: va 0x6c not covered by area in address space vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x6c, ip 0x223953, write 0, user 1, thread 0x12f vm_page_fault: sending team "/bin/sh" 0x12f SIGSEGV, ip 0x223953 ("sh_seg0ro" +0x23953) stack trace: 0x00224ee7 (sh_seg0ro + 0x24ee7) 0x00223fef (sh_seg0ro + 0x23fef) 0x00223762 (sh_seg0ro + 0x23762) 0x00226034 (sh_seg0ro + 0x26034) 0x00225f59 (sh_seg0ro + 0x25f59) 0x00223f36 (sh_seg0ro + 0x23f36) 0x00223762 (sh_seg0ro + 0x23762) 0x0021f13e (sh_seg0ro + 0x1f13e) 0x0021d222 (sh_seg0ro + 0x1d222) 0x00215d63 (sh_seg0ro + 0x15d63) 0x001007c8 (runtime_loader_seg0ro + 0x7c8) 0x7ffe6fec (/bin/sh_main_stack + 0xffffec) vm_soft_fault: va 0x0 not covered by area in address space vm_page_fault: vm_soft_fault returned error 'Bad address' on fault at 0x0, ip 0x80086495, write 0, user 0, thread 0x12f debug_server: Thread 303 entered the debugger: Segment violation stack trace, current PC 0x223953 execute_command_internal + 0x63: (0x7ffe6d0c) 0x224ee7 execute_command_internal + 0x15f7 (closest symbol) (0x7ffe6d4c) 0x223fef execute_command_internal + 0x6ff (0x7ffe6dac) 0x223762 execute_command + 0x62 (0x7ffe6dfc) 0x226034 execute_command_internal + 0x2744 (closest symbol) (0x7ffe6e2c) 0x225f59 execute_command_internal + 0x2669 (closest symbol) (0x7ffe6e5c) 0x223f36 execute_command_internal + 0x646 (0x7ffe6eac) 0x223762 execute_command + 0x62 (0x7ffe6efc) 0x21f13e reader_loop + 0x1ee (0x7ffe6f2c) 0x21d222 main + 0x7a2 (0x7ffe6f6c) 0x215d63 _start + 0x4f (0x7ffe6fac) 0x1007c8 (runtime_loader_seg0ro + 0x7c8)