Warning: Permanently added '10.128.10.53' (ECDSA) to the list of known hosts. executing program syzkaller login: [ 69.439937][ T5] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 69.800140][ T5] usb 1-1: config 0 has an invalid interface number: 123 but max is 0 [ 69.809411][ T5] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 69.821941][ T5] usb 1-1: config 0 has no interface number 0 [ 69.828712][ T5] usb 1-1: config 0 interface 123 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 15 [ 70.000143][ T5] usb 1-1: New USB device found, idVendor=0781, idProduct=0100, bcdDevice= 1.00 [ 70.010481][ T5] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 70.019425][ T5] usb 1-1: Product: syz [ 70.025683][ T5] usb 1-1: Manufacturer: syz [ 70.031706][ T5] usb 1-1: SerialNumber: syz [ 70.045753][ T5] usb 1-1: config 0 descriptor?? [ 70.291342][ T8478] [ 70.293847][ T8478] ===================================================== [ 70.301703][ T8478] WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected [ 70.309795][ T8478] 5.11.0-rc2-syzkaller #0 Not tainted [ 70.315456][ T8478] ----------------------------------------------------- [ 70.322895][ T8478] syz-executor435/8478 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 70.331348][ T8478] ffff88801c992638 (&f->f_owner.lock){.+.+}-{2:2}, at: send_sigio+0x24/0x360 [ 70.340479][ T8478] [ 70.340479][ T8478] and this task is already holding: [ 70.347903][ T8478] ffff88802063e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x14b/0x460 [ 70.357265][ T8478] which would create a new lock dependency: [ 70.363396][ T8478] (&new->fa_lock){....}-{2:2} -> (&f->f_owner.lock){.+.+}-{2:2} [ 70.371318][ T8478] [ 70.371318][ T8478] but this new dependency connects a HARDIRQ-irq-safe lock: [ 70.382246][ T8478] (&dev->event_lock){-...}-{2:2} [ 70.382269][ T8478] [ 70.382269][ T8478] ... which became HARDIRQ-irq-safe at: [ 70.398078][ T8478] lock_acquire+0x29d/0x740 [ 70.402780][ T8478] _raw_spin_lock_irqsave+0x39/0x50 [ 70.408711][ T8478] input_event+0x7b/0xb0 [ 70.413418][ T8478] psmouse_report_standard_buttons+0x2c/0x80 [ 70.421003][ T8478] psmouse_process_byte+0x1e1/0x890 [ 70.428526][ T8478] psmouse_handle_byte+0x41/0x1b0 [ 70.434904][ T8478] psmouse_interrupt+0x304/0xf00 [ 70.440667][ T8478] serio_interrupt+0x88/0x150 [ 70.445879][ T8478] i8042_interrupt+0x27a/0x520 [ 70.451032][ T8478] __handle_irq_event_percpu+0x303/0x8f0 [ 70.457499][ T8478] handle_irq_event+0x102/0x290 [ 70.463161][ T8478] handle_edge_irq+0x25f/0xd00 [ 70.468111][ T8478] asm_call_irq_on_stack+0xf/0x20 [ 70.473687][ T8478] common_interrupt+0x120/0x200 [ 70.478830][ T8478] asm_common_interrupt+0x1e/0x40 [ 70.484704][ T8478] unwind_next_frame+0x445/0x1f90 [ 70.490401][ T8478] arch_stack_walk+0x7d/0xe0 [ 70.495287][ T8478] stack_trace_save+0x8c/0xc0 [ 70.500609][ T8478] kasan_save_stack+0x1b/0x40 [ 70.505704][ T8478] ____kasan_kmalloc.constprop.0+0x82/0xa0 [ 70.512981][ T8478] kmem_cache_alloc+0x1c6/0x440 [ 70.518158][ T8478] __anon_vma_prepare+0x5d/0x560 [ 70.523282][ T8478] handle_mm_fault+0x87d/0x5640 [ 70.528364][ T8478] __get_user_pages+0x7ca/0x1490 [ 70.534304][ T8478] __get_user_pages_remote+0x18f/0x810 [ 70.540769][ T8478] get_user_pages_remote+0x63/0x90 [ 70.546396][ T8478] get_arg_page+0xba/0x200 [ 70.550915][ T8478] copy_string_kernel+0x1b4/0x520 [ 70.556282][ T8478] kernel_execve+0x25c/0x460 [ 70.562143][ T8478] call_usermodehelper_exec_async+0x2de/0x580 [ 70.570748][ T8478] ret_from_fork+0x1f/0x30 [ 70.576328][ T8478] [ 70.576328][ T8478] to a HARDIRQ-irq-unsafe lock: [ 70.584496][ T8478] (&f->f_owner.lock){.+.+}-{2:2} [ 70.584527][ T8478] [ 70.584527][ T8478] ... which became HARDIRQ-irq-unsafe at: [ 70.599367][ T8478] ... [ 70.599375][ T8478] lock_acquire+0x29d/0x740 [ 70.607479][ T8478] _raw_read_lock+0x5b/0x70 [ 70.612408][ T8478] f_getown+0x1b/0xb0 [ 70.616871][ T8478] sock_ioctl+0x4ba/0x6a0 [ 70.621785][ T8478] __x64_sys_ioctl+0x193/0x200 [ 70.627035][ T8478] do_syscall_64+0x2d/0x70 [ 70.631653][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 70.637687][ T8478] [ 70.637687][ T8478] other info that might help us debug this: [ 70.637687][ T8478] [ 70.649376][ T8478] Chain exists of: [ 70.649376][ T8478] &dev->event_lock --> &new->fa_lock --> &f->f_owner.lock [ 70.649376][ T8478] [ 70.662673][ T8478] Possible interrupt unsafe locking scenario: [ 70.662673][ T8478] [ 70.671389][ T8478] CPU0 CPU1 [ 70.677115][ T8478] ---- ---- [ 70.682906][ T8478] lock(&f->f_owner.lock); [ 70.687593][ T8478] local_irq_disable(); [ 70.694345][ T8478] lock(&dev->event_lock); [ 70.701457][ T8478] lock(&new->fa_lock); [ 70.708517][ T8478] [ 70.712241][ T8478] lock(&dev->event_lock); [ 70.717425][ T8478] [ 70.717425][ T8478] *** DEADLOCK *** [ 70.717425][ T8478] [ 70.726061][ T8478] 8 locks held by syz-executor435/8478: [ 70.732151][ T8478] #0: ffff88801d245110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x1d3/0x760 [ 70.742189][ T8478] #1: ffff888145044230 (&dev->event_lock){-...}-{2:2}, at: input_inject_event+0xa6/0x310 [ 70.753441][ T8478] #2: ffffffff8b363860 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0x92/0x310 [ 70.764025][ T8478] #3: ffffffff8b363860 (rcu_read_lock){....}-{1:2}, at: input_pass_values.part.0+0x0/0x700 [ 70.774529][ T8478] #4: ffffffff8b363860 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x59/0x3f0 [ 70.784299][ T8478] #5: ffff888147dfc028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values.part.0+0xf6/0x970 [ 70.797040][ T8478] #6: ffffffff8b363860 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x3d/0x460 [ 70.806161][ T8478] #7: ffff88802063e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x14b/0x460 [ 70.815968][ T8478] [ 70.815968][ T8478] the dependencies between HARDIRQ-irq-safe lock and the holding lock: [ 70.826977][ T8478] -> (&dev->event_lock){-...}-{2:2} { [ 70.832989][ T8478] IN-HARDIRQ-W at: [ 70.837215][ T8478] lock_acquire+0x29d/0x740 [ 70.844839][ T8478] _raw_spin_lock_irqsave+0x39/0x50 [ 70.852350][ T8478] input_event+0x7b/0xb0 [ 70.858930][ T8478] psmouse_report_standard_buttons+0x2c/0x80 [ 70.867083][ T8478] psmouse_process_byte+0x1e1/0x890 [ 70.874661][ T8478] psmouse_handle_byte+0x41/0x1b0 [ 70.881881][ T8478] psmouse_interrupt+0x304/0xf00 [ 70.888957][ T8478] serio_interrupt+0x88/0x150 [ 70.896129][ T8478] i8042_interrupt+0x27a/0x520 [ 70.903334][ T8478] __handle_irq_event_percpu+0x303/0x8f0 [ 70.912721][ T8478] handle_irq_event+0x102/0x290 [ 70.920131][ T8478] handle_edge_irq+0x25f/0xd00 [ 70.927732][ T8478] asm_call_irq_on_stack+0xf/0x20 [ 70.935364][ T8478] common_interrupt+0x120/0x200 [ 70.942841][ T8478] asm_common_interrupt+0x1e/0x40 [ 70.950812][ T8478] unwind_next_frame+0x445/0x1f90 [ 70.958372][ T8478] arch_stack_walk+0x7d/0xe0 [ 70.965777][ T8478] stack_trace_save+0x8c/0xc0 [ 70.972988][ T8478] kasan_save_stack+0x1b/0x40 [ 70.982677][ T8478] ____kasan_kmalloc.constprop.0+0x82/0xa0 [ 70.990928][ T8478] kmem_cache_alloc+0x1c6/0x440 [ 70.998744][ T8478] __anon_vma_prepare+0x5d/0x560 [ 71.007081][ T8478] handle_mm_fault+0x87d/0x5640 [ 71.013940][ T8478] __get_user_pages+0x7ca/0x1490 [ 71.020967][ T8478] __get_user_pages_remote+0x18f/0x810 [ 71.028672][ T8478] get_user_pages_remote+0x63/0x90 [ 71.036552][ T8478] get_arg_page+0xba/0x200 [ 71.043175][ T8478] copy_string_kernel+0x1b4/0x520 [ 71.050433][ T8478] kernel_execve+0x25c/0x460 [ 71.057114][ T8478] call_usermodehelper_exec_async+0x2de/0x580 [ 71.065709][ T8478] ret_from_fork+0x1f/0x30 [ 71.072604][ T8478] INITIAL USE at: [ 71.076770][ T8478] lock_acquire+0x29d/0x740 [ 71.083284][ T8478] _raw_spin_lock_irqsave+0x39/0x50 [ 71.090704][ T8478] input_inject_event+0xa6/0x310 [ 71.097561][ T8478] led_set_brightness_nosleep+0xe6/0x1a0 [ 71.105294][ T8478] led_set_brightness+0x134/0x170 [ 71.112685][ T8478] led_trigger_event+0x70/0xd0 [ 71.119512][ T8478] kbd_led_trigger_activate+0xfa/0x130 [ 71.129052][ T8478] led_trigger_set+0x61e/0xbd0 [ 71.136862][ T8478] led_trigger_set_default+0x1a6/0x230 [ 71.144956][ T8478] led_classdev_register_ext+0x5b1/0x7c0 [ 71.152993][ T8478] input_leds_connect+0x3fb/0x740 [ 71.160380][ T8478] input_attach_handler+0x180/0x1f0 [ 71.167491][ T8478] input_register_device.cold+0xf0/0x307 [ 71.175342][ T8478] atkbd_connect+0x736/0xa00 [ 71.181863][ T8478] serio_driver_probe+0x72/0xa0 [ 71.188779][ T8478] really_probe+0x291/0xde0 [ 71.195382][ T8478] driver_probe_device+0x26b/0x3d0 [ 71.202544][ T8478] device_driver_attach+0x228/0x290 [ 71.209963][ T8478] __driver_attach+0x15b/0x2f0 [ 71.217142][ T8478] bus_for_each_dev+0x147/0x1d0 [ 71.224041][ T8478] serio_handle_event+0x5f6/0xa30 [ 71.231078][ T8478] process_one_work+0x98d/0x15f0 [ 71.238222][ T8478] worker_thread+0x64c/0x1120 [ 71.245349][ T8478] kthread+0x3b1/0x4a0 [ 71.252356][ T8478] ret_from_fork+0x1f/0x30 [ 71.259894][ T8478] } [ 71.264457][ T8478] ... key at: [] __key.8+0x0/0x40 [ 71.271835][ T8478] ... acquired at: [ 71.275951][ T8478] _raw_spin_lock+0x2a/0x40 [ 71.280731][ T8478] evdev_pass_values.part.0+0xf6/0x970 [ 71.287030][ T8478] evdev_events+0x28b/0x3f0 [ 71.292144][ T8478] input_to_handler+0x2a0/0x4c0 [ 71.297520][ T8478] input_pass_values.part.0+0x284/0x700 [ 71.303684][ T8478] input_handle_event+0x373/0x1440 [ 71.309362][ T8478] input_inject_event+0x2f5/0x310 [ 71.314942][ T8478] evdev_write+0x430/0x760 [ 71.319838][ T8478] vfs_write+0x28e/0xa30 [ 71.324270][ T8478] ksys_write+0x1ee/0x250 [ 71.328874][ T8478] do_syscall_64+0x2d/0x70 [ 71.333697][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.340274][ T8478] [ 71.342668][ T8478] -> (&client->buffer_lock){....}-{2:2} { [ 71.348756][ T8478] INITIAL USE at: [ 71.352827][ T8478] lock_acquire+0x29d/0x740 [ 71.359285][ T8478] _raw_spin_lock+0x2a/0x40 [ 71.365615][ T8478] evdev_pass_values.part.0+0xf6/0x970 [ 71.373157][ T8478] evdev_events+0x28b/0x3f0 [ 71.379626][ T8478] input_to_handler+0x2a0/0x4c0 [ 71.386505][ T8478] input_pass_values.part.0+0x284/0x700 [ 71.394018][ T8478] input_handle_event+0x373/0x1440 [ 71.400997][ T8478] input_inject_event+0x2f5/0x310 [ 71.407766][ T8478] evdev_write+0x430/0x760 [ 71.414192][ T8478] vfs_write+0x28e/0xa30 [ 71.420670][ T8478] ksys_write+0x1ee/0x250 [ 71.426814][ T8478] do_syscall_64+0x2d/0x70 [ 71.433183][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.441356][ T8478] } [ 71.443955][ T8478] ... key at: [] __key.4+0x0/0x40 [ 71.451489][ T8478] ... acquired at: [ 71.455548][ T8478] _raw_read_lock+0x5b/0x70 [ 71.460231][ T8478] kill_fasync+0x14b/0x460 [ 71.465099][ T8478] evdev_pass_values.part.0+0x64e/0x970 [ 71.470962][ T8478] evdev_events+0x28b/0x3f0 [ 71.475871][ T8478] input_to_handler+0x2a0/0x4c0 [ 71.480897][ T8478] input_pass_values.part.0+0x284/0x700 [ 71.486799][ T8478] input_handle_event+0x373/0x1440 [ 71.492264][ T8478] input_inject_event+0x2f5/0x310 [ 71.497750][ T8478] evdev_write+0x430/0x760 [ 71.502884][ T8478] vfs_write+0x28e/0xa30 [ 71.507438][ T8478] ksys_write+0x1ee/0x250 [ 71.512538][ T8478] do_syscall_64+0x2d/0x70 [ 71.517360][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.523705][ T8478] [ 71.526099][ T8478] -> (&new->fa_lock){....}-{2:2} { [ 71.531466][ T8478] INITIAL READ USE at: [ 71.536208][ T8478] lock_acquire+0x29d/0x740 [ 71.543200][ T8478] _raw_read_lock+0x5b/0x70 [ 71.549793][ T8478] kill_fasync+0x14b/0x460 [ 71.556210][ T8478] evdev_pass_values.part.0+0x64e/0x970 [ 71.564788][ T8478] evdev_events+0x28b/0x3f0 [ 71.572007][ T8478] input_to_handler+0x2a0/0x4c0 [ 71.579750][ T8478] input_pass_values.part.0+0x284/0x700 [ 71.587564][ T8478] input_handle_event+0x373/0x1440 [ 71.595054][ T8478] input_inject_event+0x2f5/0x310 [ 71.602845][ T8478] evdev_write+0x430/0x760 [ 71.610163][ T8478] vfs_write+0x28e/0xa30 [ 71.616752][ T8478] ksys_write+0x1ee/0x250 [ 71.623343][ T8478] do_syscall_64+0x2d/0x70 [ 71.630122][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.638708][ T8478] } [ 71.641250][ T8478] ... key at: [] __key.0+0x0/0x40 [ 71.648718][ T8478] ... acquired at: [ 71.652658][ T8478] lock_acquire+0x29d/0x740 [ 71.657604][ T8478] _raw_read_lock_irqsave+0x70/0x90 [ 71.662992][ T8478] send_sigio+0x24/0x360 [ 71.667786][ T8478] kill_fasync+0x205/0x460 [ 71.673029][ T8478] evdev_pass_values.part.0+0x64e/0x970 [ 71.679139][ T8478] evdev_events+0x28b/0x3f0 [ 71.684535][ T8478] input_to_handler+0x2a0/0x4c0 [ 71.690132][ T8478] input_pass_values.part.0+0x284/0x700 [ 71.696997][ T8478] input_handle_event+0x373/0x1440 [ 71.703280][ T8478] input_inject_event+0x2f5/0x310 [ 71.709269][ T8478] evdev_write+0x430/0x760 [ 71.714701][ T8478] vfs_write+0x28e/0xa30 [ 71.720172][ T8478] ksys_write+0x1ee/0x250 [ 71.725181][ T8478] do_syscall_64+0x2d/0x70 [ 71.729783][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.737056][ T8478] [ 71.739571][ T8478] [ 71.739571][ T8478] the dependencies between the lock to be acquired [ 71.739578][ T8478] and HARDIRQ-irq-unsafe lock: [ 71.758842][ T8478] -> (&f->f_owner.lock){.+.+}-{2:2} { [ 71.765168][ T8478] HARDIRQ-ON-R at: [ 71.769816][ T8478] lock_acquire+0x29d/0x740 [ 71.776245][ T8478] _raw_read_lock+0x5b/0x70 [ 71.782416][ T8478] f_getown+0x1b/0xb0 [ 71.789006][ T8478] sock_ioctl+0x4ba/0x6a0 [ 71.795232][ T8478] __x64_sys_ioctl+0x193/0x200 [ 71.802438][ T8478] do_syscall_64+0x2d/0x70 [ 71.808674][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.816661][ T8478] SOFTIRQ-ON-R at: [ 71.820940][ T8478] lock_acquire+0x29d/0x740 [ 71.827506][ T8478] _raw_read_lock+0x5b/0x70 [ 71.834138][ T8478] f_getown+0x1b/0xb0 [ 71.840582][ T8478] sock_ioctl+0x4ba/0x6a0 [ 71.846661][ T8478] __x64_sys_ioctl+0x193/0x200 [ 71.853546][ T8478] do_syscall_64+0x2d/0x70 [ 71.859623][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.867841][ T8478] INITIAL READ USE at: [ 71.873287][ T8478] lock_acquire+0x29d/0x740 [ 71.879924][ T8478] _raw_read_lock+0x5b/0x70 [ 71.886749][ T8478] f_getown+0x1b/0xb0 [ 71.892847][ T8478] sock_ioctl+0x4ba/0x6a0 [ 71.899311][ T8478] __x64_sys_ioctl+0x193/0x200 [ 71.906150][ T8478] do_syscall_64+0x2d/0x70 [ 71.912630][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 71.920629][ T8478] } [ 71.923399][ T8478] ... key at: [] __key.5+0x0/0x40 [ 71.931148][ T8478] ... acquired at: [ 71.934976][ T8478] lock_acquire+0x29d/0x740 [ 71.940256][ T8478] _raw_read_lock_irqsave+0x70/0x90 [ 71.946065][ T8478] send_sigio+0x24/0x360 [ 71.950662][ T8478] kill_fasync+0x205/0x460 [ 71.955300][ T8478] evdev_pass_values.part.0+0x64e/0x970 [ 71.961092][ T8478] evdev_events+0x28b/0x3f0 [ 71.966117][ T8478] input_to_handler+0x2a0/0x4c0 [ 71.971446][ T8478] input_pass_values.part.0+0x284/0x700 [ 71.977281][ T8478] input_handle_event+0x373/0x1440 [ 71.982781][ T8478] input_inject_event+0x2f5/0x310 [ 71.988291][ T8478] evdev_write+0x430/0x760 [ 71.993190][ T8478] vfs_write+0x28e/0xa30 [ 71.997702][ T8478] ksys_write+0x1ee/0x250 [ 72.002346][ T8478] do_syscall_64+0x2d/0x70 [ 72.007207][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.013606][ T8478] [ 72.016104][ T8478] [ 72.016104][ T8478] stack backtrace: [ 72.023049][ T8478] CPU: 0 PID: 8478 Comm: syz-executor435 Not tainted 5.11.0-rc2-syzkaller #0 [ 72.032479][ T8478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 72.043464][ T8478] Call Trace: [ 72.047164][ T8478] dump_stack+0x107/0x163 [ 72.051641][ T8478] check_irq_usage.cold+0x4f5/0x6c8 [ 72.057041][ T8478] ? print_shortest_lock_dependencies+0x80/0x80 [ 72.063692][ T8478] ? kernel_text_address+0xbd/0xf0 [ 72.069361][ T8478] ? __kernel_text_address+0x9/0x30 [ 72.075387][ T8478] ? check_path.constprop.0+0x22/0x40 [ 72.080866][ T8478] ? stack_trace_save+0x8c/0xc0 [ 72.085954][ T8478] ? lockdep_lock+0xc6/0x200 [ 72.091121][ T8478] ? call_rcu_zapped+0xb0/0xb0 [ 72.096250][ T8478] __lock_acquire+0x2af6/0x5500 [ 72.101490][ T8478] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 72.107643][ T8478] lock_acquire+0x29d/0x740 [ 72.112178][ T8478] ? send_sigio+0x24/0x360 [ 72.117093][ T8478] ? lock_release+0x710/0x710 [ 72.122085][ T8478] ? lock_release+0x710/0x710 [ 72.127400][ T8478] ? lock_release+0x710/0x710 [ 72.132356][ T8478] _raw_read_lock_irqsave+0x70/0x90 [ 72.138149][ T8478] ? send_sigio+0x24/0x360 [ 72.142729][ T8478] send_sigio+0x24/0x360 [ 72.147487][ T8478] kill_fasync+0x205/0x460 [ 72.152019][ T8478] evdev_pass_values.part.0+0x64e/0x970 [ 72.157805][ T8478] ? evdev_release+0x410/0x410 [ 72.163029][ T8478] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 72.169263][ T8478] evdev_events+0x28b/0x3f0 [ 72.174135][ T8478] ? evdev_pass_values.part.0+0x970/0x970 [ 72.180104][ T8478] input_to_handler+0x2a0/0x4c0 [ 72.185376][ T8478] input_pass_values.part.0+0x284/0x700 [ 72.191266][ T8478] input_handle_event+0x373/0x1440 [ 72.196505][ T8478] input_inject_event+0x2f5/0x310 [ 72.201761][ T8478] evdev_write+0x430/0x760 [ 72.206364][ T8478] ? evdev_read+0xe40/0xe40 [ 72.211543][ T8478] ? security_file_permission+0x248/0x560 [ 72.217550][ T8478] ? evdev_read+0xe40/0xe40 [ 72.222124][ T8478] vfs_write+0x28e/0xa30 [ 72.226568][ T8478] ksys_write+0x1ee/0x250 [ 72.231264][ T8478] ? __ia32_sys_read+0xb0/0xb0 [ 72.236207][ T8478] ? syscall_enter_from_user_mode+0x1d/0x50 [ 72.242414][ T8478] do_syscall_64+0x2d/0x70 [ 72.247014][ T8478] entry_SYSCALL_64_after_hwframe+0x44/0xa9 [ 72.253136][ T8478] RIP: 0033:0x4475b9 [ 72.257582][ T8478] Code: e8 bc af 02 00 48 83 c4 18 c3 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 9b d7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 72.278552][ T8478] RSP: 002b:00007ffd4b0caf48 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 72.287727][ T8478] RAX: ffffffffffffffda RBX: 00000000004002e0 RCX: 00000000004475b9 [ 72.295974][ T8478] RDX: 0000000000035000 RSI: 000