[ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. Debian GNU/Linux 9 syzkaller ttyS0 Warning: Permanently added '10.128.0.135' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 73.155009][ T8443] [ 73.157511][ T8443] ===================================================== [ 73.157519][ T8443] WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected [ 73.157530][ T8443] 5.13.0-rc7-syzkaller #0 Not tainted [ 73.157540][ T8443] ----------------------------------------------------- [ 73.157545][ T8443] syz-executor188/8443 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 73.157568][ T8443] ffff8880166be138 (&f->f_owner.lock){.+.+}-{2:2}, at: send_sigio+0x24/0x370 [ 73.157631][ T8443] [ 73.157631][ T8443] and this task is already holding: [ 73.157637][ T8443] ffff88802206c018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x14b/0x460 [ 73.157681][ T8443] which would create a new lock dependency: [ 73.157687][ T8443] (&new->fa_lock){....}-{2:2} -> (&f->f_owner.lock){.+.+}-{2:2} [ 73.157733][ T8443] [ 73.157733][ T8443] but this new dependency connects a HARDIRQ-irq-safe lock: [ 73.157742][ T8443] (&dev->event_lock){-...}-{2:2} [ 73.243455][ T8443] [ 73.243455][ T8443] ... which became HARDIRQ-irq-safe at: [ 73.243470][ T8443] lock_acquire+0x1ab/0x510 [ 73.243500][ T8443] _raw_spin_lock_irqsave+0x39/0x50 [ 73.243537][ T8443] input_event+0x7b/0xb0 [ 73.243555][ T8443] psmouse_report_standard_buttons+0x2c/0x80 [ 73.243580][ T8443] psmouse_process_byte+0x1e1/0x890 [ 73.243604][ T8443] psmouse_handle_byte+0x41/0x1b0 [ 73.243626][ T8443] psmouse_interrupt+0x304/0xf00 [ 73.243648][ T8443] serio_interrupt+0x88/0x150 [ 73.243669][ T8443] i8042_interrupt+0x27a/0x520 [ 73.243690][ T8443] __handle_irq_event_percpu+0x303/0x8f0 [ 73.243711][ T8443] handle_irq_event+0x102/0x290 [ 73.313972][ T8443] handle_edge_irq+0x25f/0xd00 [ 73.314008][ T8443] __common_interrupt+0x9e/0x200 [ 73.314029][ T8443] common_interrupt+0x9f/0xd0 [ 73.314053][ T8443] asm_common_interrupt+0x1e/0x40 [ 73.314074][ T8443] _raw_spin_unlock_irqrestore+0x38/0x70 [ 73.314094][ T8443] i8042_command+0x12e/0x150 [ 73.314116][ T8443] i8042_aux_write+0xd7/0x120 [ 73.314137][ T8443] ps2_do_sendbyte+0x2cf/0x720 [ 73.353954][ T8443] ps2_sendbyte+0x58/0x150 [ 73.353987][ T8443] cypress_ps2_sendbyte+0x2e/0x160 [ 73.354007][ T8443] cypress_send_ext_cmd+0x1d0/0x8e0 [ 73.354027][ T8443] cypress_detect+0x75/0x190 [ 73.354047][ T8443] psmouse_try_protocol+0x211/0x370 [ 73.354072][ T8443] psmouse_extensions+0x557/0x930 [ 73.354095][ T8443] psmouse_switch_protocol+0x52a/0x740 [ 73.354118][ T8443] psmouse_connect+0x5e9/0xfd0 [ 73.354141][ T8443] serio_driver_probe+0x72/0xa0 [ 73.354161][ T8443] really_probe+0x291/0xf60 [ 73.354182][ T8443] driver_probe_device+0x298/0x410 [ 73.354202][ T8443] device_driver_attach+0x228/0x290 [ 73.414916][ T8443] __driver_attach+0x190/0x340 [ 73.414949][ T8443] bus_for_each_dev+0x147/0x1d0 [ 73.414965][ T8443] serio_handle_event+0x5f6/0xa30 [ 73.414987][ T8443] process_one_work+0x98d/0x1600 [ 73.415010][ T8443] worker_thread+0x64c/0x1120 [ 73.415032][ T8443] kthread+0x3b1/0x4a0 [ 73.415050][ T8443] ret_from_fork+0x1f/0x30 [ 73.415071][ T8443] [ 73.415071][ T8443] to a HARDIRQ-irq-unsafe lock: [ 73.415080][ T8443] (&f->f_owner.lock){.+.+}-{2:2} [ 73.456189][ T8443] [ 73.456189][ T8443] ... which became HARDIRQ-irq-unsafe at: [ 73.456197][ T8443] ... [ 73.456274][ T8443] lock_acquire+0x1ab/0x510 [ 73.456306][ T8443] _raw_read_lock+0x5b/0x70 [ 73.456327][ T8443] do_fcntl+0x8b4/0x1200 [ 73.456350][ T8443] __x64_sys_fcntl+0x165/0x1e0 [ 73.456369][ T8443] do_syscall_64+0x3a/0xb0 [ 73.456392][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 73.456413][ T8443] [ 73.456413][ T8443] other info that might help us debug this: [ 73.456413][ T8443] [ 73.456420][ T8443] Chain exists of: [ 73.456420][ T8443] &dev->event_lock --> &new->fa_lock --> &f->f_owner.lock [ 73.456420][ T8443] [ 73.456454][ T8443] Possible interrupt unsafe locking scenario: [ 73.456454][ T8443] [ 73.536114][ T8443] CPU0 CPU1 [ 73.536125][ T8443] ---- ---- [ 73.536130][ T8443] lock(&f->f_owner.lock); [ 73.536146][ T8443] local_irq_disable(); [ 73.536151][ T8443] lock(&dev->event_lock); [ 73.536164][ T8443] lock(&new->fa_lock); [ 73.536181][ T8443] [ 73.536184][ T8443] lock(&dev->event_lock); [ 73.536196][ T8443] [ 73.536196][ T8443] *** DEADLOCK *** [ 73.536196][ T8443] [ 73.536201][ T8443] 8 locks held by syz-executor188/8443: [ 73.536216][ T8443] #0: ffff888021e36110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x1d3/0x760 [ 73.536274][ T8443] #1: ffff888021e2a230 (&dev->event_lock){-...}-{2:2}, at: input_inject_event+0xa6/0x310 [ 73.536317][ T8443] #2: ffffffff8bf79860 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0x92/0x310 [ 73.536366][ T8443] #3: ffffffff8bf79860 (rcu_read_lock){....}-{1:2}, at: input_pass_values.part.0+0x0/0x700 [ 73.623873][ T8443] #4: ffffffff8bf79860 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x59/0x3f0 [ 73.623928][ T8443] #5: ffff8880208ca028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values.part.0+0xf6/0x970 [ 73.623983][ T8443] #6: ffffffff8bf79860 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x3d/0x460 [ 73.624032][ T8443] #7: ffff88802206c018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x14b/0x460 [ 73.624082][ T8443] [ 73.624082][ T8443] the dependencies between HARDIRQ-irq-safe lock and the holding lock: [ 73.682943][ T8443] -> (&dev->event_lock){-...}-{2:2} { [ 73.682988][ T8443] IN-HARDIRQ-W at: [ 73.682998][ T8443] lock_acquire+0x1ab/0x510 [ 73.683028][ T8443] _raw_spin_lock_irqsave+0x39/0x50 [ 73.683049][ T8443] input_event+0x7b/0xb0 [ 73.683068][ T8443] psmouse_report_standard_buttons+0x2c/0x80 [ 73.683095][ T8443] psmouse_process_byte+0x1e1/0x890 [ 73.683119][ T8443] psmouse_handle_byte+0x41/0x1b0 [ 73.735586][ T8443] psmouse_interrupt+0x304/0xf00 [ 73.742544][ T8443] serio_interrupt+0x88/0x150 [ 73.749365][ T8443] i8042_interrupt+0x27a/0x520 [ 73.756176][ T8443] __handle_irq_event_percpu+0x303/0x8f0 [ 73.763813][ T8443] handle_irq_event+0x102/0x290 [ 73.770660][ T8443] handle_edge_irq+0x25f/0xd00 [ 73.777430][ T8443] __common_interrupt+0x9e/0x200 [ 73.784512][ T8443] common_interrupt+0x9f/0xd0 [ 73.791240][ T8443] asm_common_interrupt+0x1e/0x40 [ 73.798256][ T8443] _raw_spin_unlock_irqrestore+0x38/0x70 [ 73.805901][ T8443] i8042_command+0x12e/0x150 [ 73.812509][ T8443] i8042_aux_write+0xd7/0x120 [ 73.819188][ T8443] ps2_do_sendbyte+0x2cf/0x720 [ 73.825945][ T8443] ps2_sendbyte+0x58/0x150 [ 73.832352][ T8443] cypress_ps2_sendbyte+0x2e/0x160 [ 73.839551][ T8443] cypress_send_ext_cmd+0x1d0/0x8e0 [ 73.846873][ T8443] cypress_detect+0x75/0x190 [ 73.853643][ T8443] psmouse_try_protocol+0x211/0x370 [ 73.860860][ T8443] psmouse_extensions+0x557/0x930 [ 73.867897][ T8443] psmouse_switch_protocol+0x52a/0x740 [ 73.875457][ T8443] psmouse_connect+0x5e9/0xfd0 [ 73.882216][ T8443] serio_driver_probe+0x72/0xa0 [ 73.889162][ T8443] really_probe+0x291/0xf60 [ 73.895678][ T8443] driver_probe_device+0x298/0x410 [ 73.902794][ T8443] device_driver_attach+0x228/0x290 [ 73.910041][ T8443] __driver_attach+0x190/0x340 [ 73.916811][ T8443] bus_for_each_dev+0x147/0x1d0 [ 73.923645][ T8443] serio_handle_event+0x5f6/0xa30 [ 73.930654][ T8443] process_one_work+0x98d/0x1600 [ 73.937604][ T8443] worker_thread+0x64c/0x1120 [ 73.944270][ T8443] kthread+0x3b1/0x4a0 [ 73.950425][ T8443] ret_from_fork+0x1f/0x30 [ 73.956847][ T8443] INITIAL USE at: [ 73.961105][ T8443] lock_acquire+0x1ab/0x510 [ 73.967859][ T8443] _raw_spin_lock_irqsave+0x39/0x50 [ 73.975054][ T8443] input_inject_event+0xa6/0x310 [ 73.982160][ T8443] led_set_brightness_nosleep+0xe6/0x1a0 [ 73.989700][ T8443] led_set_brightness+0x134/0x170 [ 73.996630][ T8443] led_trigger_event+0x75/0xd0 [ 74.004359][ T8443] kbd_led_trigger_activate+0xc9/0x100 [ 74.012570][ T8443] led_trigger_set+0x61e/0xbd0 [ 74.020208][ T8443] led_trigger_set_default+0x1a6/0x230 [ 74.028255][ T8443] led_classdev_register_ext+0x5b1/0x7c0 [ 74.036058][ T8443] input_leds_connect+0x4bd/0x860 [ 74.043301][ T8443] input_attach_handler+0x180/0x1f0 [ 74.051760][ T8443] input_register_device.cold+0xf0/0x307 [ 74.059357][ T8443] atkbd_connect+0x739/0xa10 [ 74.065875][ T8443] serio_driver_probe+0x72/0xa0 [ 74.072923][ T8443] really_probe+0x291/0xf60 [ 74.079417][ T8443] driver_probe_device+0x298/0x410 [ 74.086645][ T8443] device_driver_attach+0x228/0x290 [ 74.094275][ T8443] __driver_attach+0x190/0x340 [ 74.101069][ T8443] bus_for_each_dev+0x147/0x1d0 [ 74.107916][ T8443] serio_handle_event+0x5f6/0xa30 [ 74.116468][ T8443] process_one_work+0x98d/0x1600 [ 74.124002][ T8443] worker_thread+0x64c/0x1120 [ 74.130785][ T8443] kthread+0x3b1/0x4a0 [ 74.136853][ T8443] ret_from_fork+0x1f/0x30 [ 74.143363][ T8443] } [ 74.146213][ T8443] ... key at: [] __key.8+0x0/0x40 [ 74.153497][ T8443] ... acquired at: [ 74.157482][ T8443] _raw_spin_lock+0x2a/0x40 [ 74.162180][ T8443] evdev_pass_values.part.0+0xf6/0x970 [ 74.167901][ T8443] evdev_events+0x28b/0x3f0 [ 74.172912][ T8443] input_to_handler+0x2a0/0x4c0 [ 74.178159][ T8443] input_pass_values.part.0+0x284/0x700 [ 74.183875][ T8443] input_handle_event+0x373/0x1440 [ 74.189149][ T8443] input_inject_event+0x2f5/0x310 [ 74.194483][ T8443] evdev_write+0x430/0x760 [ 74.199087][ T8443] vfs_write+0x28e/0xa30 [ 74.203493][ T8443] ksys_write+0x1ee/0x250 [ 74.207994][ T8443] do_syscall_64+0x3a/0xb0 [ 74.212598][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.218755][ T8443] [ 74.221152][ T8443] -> (&client->buffer_lock){....}-{2:2} { [ 74.227052][ T8443] INITIAL USE at: [ 74.231025][ T8443] lock_acquire+0x1ab/0x510 [ 74.237326][ T8443] _raw_spin_lock+0x2a/0x40 [ 74.243660][ T8443] evdev_pass_values.part.0+0xf6/0x970 [ 74.250876][ T8443] evdev_events+0x28b/0x3f0 [ 74.257116][ T8443] input_to_handler+0x2a0/0x4c0 [ 74.263720][ T8443] input_pass_values.part.0+0x284/0x700 [ 74.271021][ T8443] input_handle_event+0x373/0x1440 [ 74.278048][ T8443] input_inject_event+0x2f5/0x310 [ 74.284895][ T8443] evdev_write+0x430/0x760 [ 74.291062][ T8443] vfs_write+0x28e/0xa30 [ 74.297263][ T8443] ksys_write+0x1ee/0x250 [ 74.303319][ T8443] do_syscall_64+0x3a/0xb0 [ 74.309688][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.317415][ T8443] } [ 74.320066][ T8443] ... key at: [] __key.4+0x0/0x40 [ 74.327378][ T8443] ... acquired at: [ 74.331270][ T8443] _raw_read_lock+0x5b/0x70 [ 74.335955][ T8443] kill_fasync+0x14b/0x460 [ 74.340532][ T8443] evdev_pass_values.part.0+0x64e/0x970 [ 74.346260][ T8443] evdev_events+0x28b/0x3f0 [ 74.350995][ T8443] input_to_handler+0x2a0/0x4c0 [ 74.356030][ T8443] input_pass_values.part.0+0x284/0x700 [ 74.361742][ T8443] input_handle_event+0x373/0x1440 [ 74.367052][ T8443] input_inject_event+0x2f5/0x310 [ 74.372240][ T8443] evdev_write+0x430/0x760 [ 74.377101][ T8443] vfs_write+0x28e/0xa30 [ 74.381520][ T8443] ksys_write+0x1ee/0x250 [ 74.386012][ T8443] do_syscall_64+0x3a/0xb0 [ 74.390591][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.396644][ T8443] [ 74.398948][ T8443] -> (&new->fa_lock){....}-{2:2} { [ 74.404050][ T8443] INITIAL READ USE at: [ 74.408402][ T8443] lock_acquire+0x1ab/0x510 [ 74.415246][ T8443] _raw_read_lock+0x5b/0x70 [ 74.421998][ T8443] kill_fasync+0x14b/0x460 [ 74.428418][ T8443] evdev_pass_values.part.0+0x64e/0x970 [ 74.435977][ T8443] evdev_events+0x28b/0x3f0 [ 74.442476][ T8443] input_to_handler+0x2a0/0x4c0 [ 74.449436][ T8443] input_pass_values.part.0+0x284/0x700 [ 74.456991][ T8443] input_handle_event+0x373/0x1440 [ 74.464094][ T8443] input_inject_event+0x2f5/0x310 [ 74.471358][ T8443] evdev_write+0x430/0x760 [ 74.477883][ T8443] vfs_write+0x28e/0xa30 [ 74.484501][ T8443] ksys_write+0x1ee/0x250 [ 74.490903][ T8443] do_syscall_64+0x3a/0xb0 [ 74.497599][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.505774][ T8443] } [ 74.508285][ T8443] ... key at: [] __key.0+0x0/0x40 [ 74.515849][ T8443] ... acquired at: [ 74.519749][ T8443] lock_acquire+0x1ab/0x510 [ 74.524428][ T8443] _raw_read_lock_irqsave+0x70/0x90 [ 74.529848][ T8443] send_sigio+0x24/0x370 [ 74.534359][ T8443] kill_fasync+0x205/0x460 [ 74.538943][ T8443] evdev_pass_values.part.0+0x64e/0x970 [ 74.544860][ T8443] evdev_events+0x28b/0x3f0 [ 74.549709][ T8443] input_to_handler+0x2a0/0x4c0 [ 74.554732][ T8443] input_pass_values.part.0+0x284/0x700 [ 74.560536][ T8443] input_handle_event+0x373/0x1440 [ 74.565847][ T8443] input_inject_event+0x2f5/0x310 [ 74.571152][ T8443] evdev_write+0x430/0x760 [ 74.575965][ T8443] vfs_write+0x28e/0xa30 [ 74.580397][ T8443] ksys_write+0x1ee/0x250 [ 74.585001][ T8443] do_syscall_64+0x3a/0xb0 [ 74.589809][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.595895][ T8443] [ 74.598206][ T8443] [ 74.598206][ T8443] the dependencies between the lock to be acquired [ 74.598212][ T8443] and HARDIRQ-irq-unsafe lock: [ 74.612103][ T8443] -> (&f->f_owner.lock){.+.+}-{2:2} { [ 74.617912][ T8443] HARDIRQ-ON-R at: [ 74.621989][ T8443] lock_acquire+0x1ab/0x510 [ 74.628189][ T8443] _raw_read_lock+0x5b/0x70 [ 74.634504][ T8443] do_fcntl+0x8b4/0x1200 [ 74.640402][ T8443] __x64_sys_fcntl+0x165/0x1e0 [ 74.646827][ T8443] do_syscall_64+0x3a/0xb0 [ 74.652913][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.660471][ T8443] SOFTIRQ-ON-R at: [ 74.664762][ T8443] lock_acquire+0x1ab/0x510 [ 74.671158][ T8443] _raw_read_lock+0x5b/0x70 [ 74.677305][ T8443] do_fcntl+0x8b4/0x1200 [ 74.683321][ T8443] __x64_sys_fcntl+0x165/0x1e0 [ 74.689910][ T8443] do_syscall_64+0x3a/0xb0 [ 74.696362][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.704418][ T8443] INITIAL READ USE at: [ 74.708733][ T8443] lock_acquire+0x1ab/0x510 [ 74.715229][ T8443] _raw_read_lock+0x5b/0x70 [ 74.721929][ T8443] do_fcntl+0x8b4/0x1200 [ 74.728179][ T8443] __x64_sys_fcntl+0x165/0x1e0 [ 74.735003][ T8443] do_syscall_64+0x3a/0xb0 [ 74.741523][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.749429][ T8443] } [ 74.751928][ T8443] ... key at: [] __key.5+0x0/0x40 [ 74.759046][ T8443] ... acquired at: [ 74.762851][ T8443] lock_acquire+0x1ab/0x510 [ 74.767710][ T8443] _raw_read_lock_irqsave+0x70/0x90 [ 74.773075][ T8443] send_sigio+0x24/0x370 [ 74.777480][ T8443] kill_fasync+0x205/0x460 [ 74.782069][ T8443] evdev_pass_values.part.0+0x64e/0x970 [ 74.787980][ T8443] evdev_events+0x28b/0x3f0 [ 74.792903][ T8443] input_to_handler+0x2a0/0x4c0 [ 74.798102][ T8443] input_pass_values.part.0+0x284/0x700 [ 74.803817][ T8443] input_handle_event+0x373/0x1440 [ 74.809103][ T8443] input_inject_event+0x2f5/0x310 [ 74.814647][ T8443] evdev_write+0x430/0x760 [ 74.819495][ T8443] vfs_write+0x28e/0xa30 [ 74.824097][ T8443] ksys_write+0x1ee/0x250 [ 74.828932][ T8443] do_syscall_64+0x3a/0xb0 [ 74.833548][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 74.839890][ T8443] [ 74.842229][ T8443] [ 74.842229][ T8443] stack backtrace: [ 74.848108][ T8443] CPU: 1 PID: 8443 Comm: syz-executor188 Not tainted 5.13.0-rc7-syzkaller #0 [ 74.856869][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 74.867007][ T8443] Call Trace: [ 74.870287][ T8443] dump_stack+0x141/0x1d7 [ 74.874644][ T8443] check_irq_usage.cold+0x4d6/0x6c5 [ 74.879859][ T8443] ? print_shortest_lock_dependencies+0x80/0x80 [ 74.886104][ T8443] ? kernel_text_address+0xbd/0xf0 [ 74.891216][ T8443] ? check_path.constprop.0+0x24/0x50 [ 74.896585][ T8443] ? register_lock_class+0xb6/0x1030 [ 74.901864][ T8443] ? stack_trace_save+0x8c/0xc0 [ 74.906736][ T8443] ? lockdep_lock+0xc6/0x200 [ 74.911496][ T8443] ? call_rcu_zapped+0xb0/0xb0 [ 74.916253][ T8443] __lock_acquire+0x2a2f/0x5230 [ 74.921124][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 74.927185][ T8443] lock_acquire+0x1ab/0x510 [ 74.931688][ T8443] ? send_sigio+0x24/0x370 [ 74.936102][ T8443] ? lock_release+0x720/0x720 [ 74.940960][ T8443] ? lock_release+0x720/0x720 [ 74.945822][ T8443] ? lock_release+0x720/0x720 [ 74.950535][ T8443] _raw_read_lock_irqsave+0x70/0x90 [ 74.955826][ T8443] ? send_sigio+0x24/0x370 [ 74.960425][ T8443] send_sigio+0x24/0x370 [ 74.964862][ T8443] kill_fasync+0x205/0x460 [ 74.969270][ T8443] evdev_pass_values.part.0+0x64e/0x970 [ 74.974825][ T8443] ? evdev_release+0x410/0x410 [ 74.979632][ T8443] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 74.985622][ T8443] evdev_events+0x28b/0x3f0 [ 74.990125][ T8443] ? evdev_pass_values.part.0+0x970/0x970 [ 74.995839][ T8443] input_to_handler+0x2a0/0x4c0 [ 75.000785][ T8443] input_pass_values.part.0+0x284/0x700 [ 75.006430][ T8443] input_handle_event+0x373/0x1440 [ 75.011730][ T8443] input_inject_event+0x2f5/0x310 [ 75.016880][ T8443] evdev_write+0x430/0x760 [ 75.021292][ T8443] ? evdev_read+0xe40/0xe40 [ 75.026090][ T8443] ? security_file_permission+0x248/0x560 [ 75.031997][ T8443] ? evdev_read+0xe40/0xe40 [ 75.036511][ T8443] vfs_write+0x28e/0xa30 [ 75.041539][ T8443] ksys_write+0x1ee/0x250 [ 75.045866][ T8443] ? __ia32_sys_read+0xb0/0xb0 [ 75.050765][ T8443] ? syscall_enter_from_user_mode+0x27/0x70 [ 75.056660][ T8443] do_syscall_64+0x3a/0xb0 [ 75.061186][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 75.067091][ T8443] RIP: 0033:0x443589 [ 75.070990][ T8443] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 75.090648][ T8443] RSP: 002b:00007fff0d826408 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 75.099175][ T8443] RAX: ffffffffffffffda RBX: 00000000004004a0 RCX: 0000000000443589 [ 75.107253][ T8443] RDX: 00000000000002b8 RSI: 0000000020000040 RDI: 000000000