kernel warning at kern/src/event.c:374, from core 3: [kernel] Null ev_q - kernel code should check before sending! Stack Backtrace on Core 3: #01 [<0xffffffffc200a38c>] in backtrace at src/kdebug.c:229 #02 [<0xffffffffc2009bb4>] in _warn at src/init.c:322 #03 [<0xffffffffc2007732>] in send_event at src/event.c:374 #04 [<0xffffffffc2056a45>] in sys_send_event at src/syscall.c:1439 #05 [<0xffffffffc205a019>] in syscall at src/syscall.c:2465 #06 [<0xffffffffc205a1f8>] in run_local_syscall at src/syscall.c:2500 #07 [<0xffffffffc205a739>] in prep_syscalls at src/syscall.c:2520 #08 [<0xffffffffc20abee2>] in sysenter_callwrapper at arch/x86/trap.c:854 Unhandled user trap in vcore context from VC 0 HW TRAP frame (partial) at 0xffffffffc8995e20 on core 1 rax 0x000000005a5a4e80 rbx 0x0000300000006e90 rcx 0x0000000000000150 rdx 0x000010000000a4c0 rbp 0x0000300000006e80 rsi 0x000010000000a5c0 rdi 0x000000005a5a4f80 r8 0x000000005a5a5a5a r9 0x000000005a5a4e80 r10 0x0000000000000000 r11 0x0000000000000200 r12 0x000000000040fec0 r13 0x000010000000a4c0 r14 0x0000000000000004 r15 0x00007f7fffa01200 trap 0x0000000e Page Fault gsbs 0x0000000000000000 fsbs 0x0000000000000000 err 0x--------00000006 rip 0x000000000040fca6 cs 0x------------0023 flag 0x0000000000010202 rsp 0x0000300000006d80 ss 0x------------001b err 0x6 (for PFs: User 4, Wr 2, Rd 1), aux 0x000000005a5a4f80 Addr 0x000000000040fca6 is in syz-executor at offset 0x000000000000fca6 VM Regions for proc 89 NR: Range: Prot, Flags, File, Off 00: (0x0000000000400000 - 0x00000000004b5000): 0x00000005, 0x00000001, 0xffff8000084df820, 0x0000000000000000 01: (0x00000000004b5000 - 0x00000000004b6000): 0x00000005, 0x00000002, 0xffff8000084df820, 0x00000000000b5000 02: (0x00000000006b6000 - 0x00000000006b9000): 0x00000003, 0x00000002, 0xffff8000084df820, 0x00000000000b6000 03: (0x00000000006b9000 - 0x00000000008e5000): 0x00000003, 0x00000002, 0x0000000000000000, 0x0000000000000000 04: (0x0000000020000000 - 0x0000000021000000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 05: (0x0000100000000000 - 0x0000100000024000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 06: (0x0000300000000000 - 0x0000300000001000): 0x00000003, 0x00000002, 0xffff8000084df820, 0x0000000000000000 07: (0x0000300000001000 - 0x0000300000005000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 08: (0x0000300000005000 - 0x0000300000007000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 09: (0x0000300000007000 - 0x0000300000019000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 10: (0x0000300000019000 - 0x000030000003d000): 0x00000007, 0x00000022, 0x0000000000000000, 0x0000000000000000 11: (0x00007f7fff8ff000 - 0x00007f7fff9ff000): 0x00000003, 0x00000022, 0x0000000000000000, 0x0000000000000000 Backtrace of user context on Core 1: Offsets only matter for shared libraries #01 Addr 0x000000000040fca6 is in syz-executor at offset 0x000000000000fca6 #02 Addr 0x00000000004100ce is in syz-executor at offset 0x00000000000100ce #03 Addr 0x000000000041567d is in syz-executor at offset 0x000000000001567d #04 Addr 0x0000000000407f6b is in syz-executor at offset 0x0000000000007f6b #05 Addr 0x0000000000414ad0 is in syz-executor at offset 0x0000000000014ad0 #06 Addr 0x000000000040849a is in syz-executor at offset 0x000000000000849a #07 Addr 0x0000000000403e89 is in syz-executor at offset 0x0000000000003e89 #08 Addr 0x00000000004147fc is in syz-executor at offset 0x00000000000147fc #09 Addr 0x0000000000414801 is in syz-executor at offset 0x0000000000014801