Starting OpenBSD Secure Shell server... [ OK ] Started Regular background program processing daemon. [ OK ] Started Daily apt download activities. [ OK ] Started Daily apt upgrade and clean activities. [ OK ] Reached target Timers. [ OK ] Started System Logging Service. [ OK ] Started Permit User Sessions. [ OK ] Found device /dev/ttyS0. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Serial Getty on ttyS0. [ OK ] Started Getty on tty1. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Warning: Permanently added '10.128.0.91' (ECDSA) to the list of known hosts. executing program [ 78.147352][ T37] audit: type=1400 audit(1629556213.526:8): avc: denied { execmem } for pid=8447 comm="syz-executor589" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 [ 78.153765][ T8447] [ 78.170362][ T8447] ===================================================== [ 78.177298][ T8447] WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected [ 78.184778][ T8447] 5.14.0-rc6-syzkaller #0 Not tainted [ 78.190155][ T8447] ----------------------------------------------------- [ 78.197099][ T8447] syz-executor589/8447 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 78.205174][ T8447] ffff88802a623e78 (&f->f_owner.lock){.+.+}-{2:2}, at: send_sigio+0x24/0x380 [ 78.213963][ T8447] [ 78.213963][ T8447] and this task is already holding: [ 78.221346][ T8447] ffff888021c779f0 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x132/0x460 [ 78.230095][ T8447] which would create a new lock dependency: [ 78.236021][ T8447] (&new->fa_lock){....}-{2:2} -> (&f->f_owner.lock){.+.+}-{2:2} [ 78.243745][ T8447] [ 78.243745][ T8447] but this new dependency connects a HARDIRQ-irq-safe lock: [ 78.253210][ T8447] (&dev->event_lock){-...}-{2:2} [ 78.253229][ T8447] [ 78.253229][ T8447] ... which became HARDIRQ-irq-safe at: [ 78.265961][ T8447] lock_acquire+0x1ab/0x510 [ 78.270538][ T8447] _raw_spin_lock_irqsave+0x39/0x50 [ 78.275823][ T8447] input_event+0x7b/0xb0 [ 78.280133][ T8447] psmouse_report_standard_buttons+0x2c/0x80 [ 78.286184][ T8447] psmouse_process_byte+0x1e1/0x890 [ 78.291452][ T8447] psmouse_handle_byte+0x41/0x1b0 [ 78.296647][ T8447] psmouse_interrupt+0x304/0xf00 [ 78.301651][ T8447] serio_interrupt+0x88/0x150 [ 78.306394][ T8447] i8042_interrupt+0x27a/0x520 [ 78.311497][ T8447] __handle_irq_event_percpu+0x303/0x8f0 [ 78.317264][ T8447] handle_irq_event+0x102/0x280 [ 78.322187][ T8447] handle_edge_irq+0x25f/0xd00 [ 78.327033][ T8447] __common_interrupt+0x9d/0x210 [ 78.332039][ T8447] common_interrupt+0x9f/0xd0 [ 78.336886][ T8447] asm_common_interrupt+0x1e/0x40 [ 78.342064][ T8447] _raw_spin_unlock_irqrestore+0x38/0x70 [ 78.347777][ T8447] i8042_command+0x12e/0x150 [ 78.352439][ T8447] i8042_aux_write+0xd7/0x120 [ 78.357182][ T8447] ps2_do_sendbyte+0x2cf/0x710 [ 78.362033][ T8447] ps2_sendbyte+0x58/0x150 [ 78.366952][ T8447] cypress_ps2_sendbyte+0x2e/0x160 [ 78.372144][ T8447] cypress_send_ext_cmd+0x1d0/0x8e0 [ 78.377412][ T8447] cypress_detect+0x75/0x190 [ 78.382086][ T8447] psmouse_try_protocol+0x211/0x370 [ 78.387357][ T8447] psmouse_extensions+0x557/0x930 [ 78.392470][ T8447] psmouse_switch_protocol+0x52a/0x740 [ 78.398003][ T8447] psmouse_connect+0x5e9/0xfd0 [ 78.402834][ T8447] serio_driver_probe+0x72/0xa0 [ 78.407756][ T8447] really_probe+0x23c/0xcd0 [ 78.412328][ T8447] __driver_probe_device+0x338/0x4d0 [ 78.419422][ T8447] driver_probe_device+0x4c/0x1a0 [ 78.424517][ T8447] __driver_attach+0x22d/0x4e0 [ 78.429436][ T8447] bus_for_each_dev+0x147/0x1d0 [ 78.434355][ T8447] serio_handle_event+0x5f6/0xa30 [ 78.439449][ T8447] process_one_work+0x98d/0x1630 [ 78.444459][ T8447] worker_thread+0x658/0x11f0 [ 78.449206][ T8447] kthread+0x3e5/0x4d0 [ 78.453358][ T8447] ret_from_fork+0x1f/0x30 [ 78.457853][ T8447] [ 78.457853][ T8447] to a HARDIRQ-irq-unsafe lock: [ 78.464847][ T8447] (&f->f_owner.lock){.+.+}-{2:2} [ 78.464865][ T8447] [ 78.464865][ T8447] ... which became HARDIRQ-irq-unsafe at: [ 78.477744][ T8447] ... [ 78.477748][ T8447] lock_acquire+0x1ab/0x510 [ 78.484935][ T8447] _raw_read_lock+0x5b/0x70 [ 78.489508][ T8447] do_fcntl+0x8af/0x1210 [ 78.493839][ T8447] __x64_sys_fcntl+0x165/0x1e0 [ 78.498668][ T8447] do_syscall_64+0x35/0xb0 [ 78.503151][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 78.509114][ T8447] [ 78.509114][ T8447] other info that might help us debug this: [ 78.509114][ T8447] [ 78.521843][ T8447] Chain exists of: [ 78.521843][ T8447] &dev->event_lock --> &new->fa_lock --> &f->f_owner.lock [ 78.521843][ T8447] [ 78.534851][ T8447] Possible interrupt unsafe locking scenario: [ 78.534851][ T8447] [ 78.543333][ T8447] CPU0 CPU1 [ 78.548675][ T8447] ---- ---- [ 78.554018][ T8447] lock(&f->f_owner.lock); [ 78.558499][ T8447] local_irq_disable(); [ 78.565232][ T8447] lock(&dev->event_lock); [ 78.572232][ T8447] lock(&new->fa_lock); [ 78.578970][ T8447] [ 78.582399][ T8447] lock(&dev->event_lock); [ 78.587065][ T8447] [ 78.587065][ T8447] *** DEADLOCK *** [ 78.587065][ T8447] [ 78.595182][ T8447] 8 locks held by syz-executor589/8447: [ 78.600700][ T8447] #0: ffff88814725d110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x1d3/0x760 [ 78.609851][ T8447] #1: ffff88801d312230 (&dev->event_lock){-...}-{2:2}, at: input_inject_event+0xa6/0x320 [ 78.619882][ T8447] #2: ffffffff8b979840 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0x92/0x320 [ 78.629559][ T8447] #3: ffffffff8b979840 (rcu_read_lock){....}-{1:2}, at: input_pass_values.part.0+0x0/0x710 [ 78.639636][ T8447] #4: ffffffff8b979840 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x59/0x3e0 [ 78.648765][ T8447] #5: ffff888011fa3028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values.part.0+0xf6/0x970 [ 78.659568][ T8447] #6: ffffffff8b979840 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x3d/0x460 [ 78.668600][ T8447] #7: ffff888021c779f0 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x132/0x460 [ 78.677733][ T8447] [ 78.677733][ T8447] the dependencies between HARDIRQ-irq-safe lock and the holding lock: [ 78.688122][ T8447] -> (&dev->event_lock){-...}-{2:2} { [ 78.693657][ T8447] IN-HARDIRQ-W at: [ 78.697789][ T8447] lock_acquire+0x1ab/0x510 [ 78.704373][ T8447] _raw_spin_lock_irqsave+0x39/0x50 [ 78.711572][ T8447] input_event+0x7b/0xb0 [ 78.717808][ T8447] psmouse_report_standard_buttons+0x2c/0x80 [ 78.725812][ T8447] psmouse_process_byte+0x1e1/0x890 [ 78.733009][ T8447] psmouse_handle_byte+0x41/0x1b0 [ 78.740031][ T8447] psmouse_interrupt+0x304/0xf00 [ 78.747023][ T8447] serio_interrupt+0x88/0x150 [ 78.753712][ T8447] i8042_interrupt+0x27a/0x520 [ 78.760480][ T8447] __handle_irq_event_percpu+0x303/0x8f0 [ 78.768102][ T8447] handle_irq_event+0x102/0x280 [ 78.774936][ T8447] handle_edge_irq+0x25f/0xd00 [ 78.781690][ T8447] __common_interrupt+0x9d/0x210 [ 78.788727][ T8447] common_interrupt+0x9f/0xd0 [ 78.795410][ T8447] asm_common_interrupt+0x1e/0x40 [ 78.802435][ T8447] _raw_spin_unlock_irqrestore+0x38/0x70 [ 78.810061][ T8447] i8042_command+0x12e/0x150 [ 78.816637][ T8447] i8042_aux_write+0xd7/0x120 [ 78.823294][ T8447] ps2_do_sendbyte+0x2cf/0x710 [ 78.830071][ T8447] ps2_sendbyte+0x58/0x150 [ 78.836569][ T8447] cypress_ps2_sendbyte+0x2e/0x160 [ 78.843733][ T8447] cypress_send_ext_cmd+0x1d0/0x8e0 [ 78.850919][ T8447] cypress_detect+0x75/0x190 [ 78.857491][ T8447] psmouse_try_protocol+0x211/0x370 [ 78.864677][ T8447] psmouse_extensions+0x557/0x930 [ 78.871717][ T8447] psmouse_switch_protocol+0x52a/0x740 [ 78.879168][ T8447] psmouse_connect+0x5e9/0xfd0 [ 78.886023][ T8447] serio_driver_probe+0x72/0xa0 [ 78.892872][ T8447] really_probe+0x23c/0xcd0 [ 78.899366][ T8447] __driver_probe_device+0x338/0x4d0 [ 78.906654][ T8447] driver_probe_device+0x4c/0x1a0 [ 78.913676][ T8447] __driver_attach+0x22d/0x4e0 [ 78.920565][ T8447] bus_for_each_dev+0x147/0x1d0 [ 78.927507][ T8447] serio_handle_event+0x5f6/0xa30 [ 78.934558][ T8447] process_one_work+0x98d/0x1630 [ 78.941526][ T8447] worker_thread+0x658/0x11f0 [ 78.948189][ T8447] kthread+0x3e5/0x4d0 [ 78.954238][ T8447] ret_from_fork+0x1f/0x30 [ 78.960656][ T8447] INITIAL USE at: [ 78.965053][ T8447] lock_acquire+0x1ab/0x510 [ 78.971462][ T8447] _raw_spin_lock_irqsave+0x39/0x50 [ 78.978567][ T8447] input_inject_event+0xa6/0x320 [ 78.985569][ T8447] led_set_brightness_nosleep+0xe6/0x1a0 [ 78.993199][ T8447] led_set_brightness+0x134/0x170 [ 79.000117][ T8447] led_trigger_event+0x75/0xd0 [ 79.006772][ T8447] kbd_led_trigger_activate+0xc9/0x100 [ 79.014125][ T8447] led_trigger_set+0x61e/0xbd0 [ 79.020794][ T8447] led_trigger_set_default+0x1a6/0x230 [ 79.028158][ T8447] led_classdev_register_ext+0x5b1/0x7c0 [ 79.035694][ T8447] input_leds_connect+0x4bd/0x860 [ 79.042610][ T8447] input_attach_handler+0x180/0x1f0 [ 79.049715][ T8447] input_register_device.cold+0xf0/0x303 [ 79.057241][ T8447] atkbd_connect+0x739/0xa00 [ 79.063726][ T8447] serio_driver_probe+0x72/0xa0 [ 79.070469][ T8447] really_probe+0x23c/0xcd0 [ 79.076879][ T8447] __driver_probe_device+0x338/0x4d0 [ 79.084054][ T8447] driver_probe_device+0x4c/0x1a0 [ 79.090985][ T8447] __driver_attach+0x22d/0x4e0 [ 79.097639][ T8447] bus_for_each_dev+0x147/0x1d0 [ 79.104378][ T8447] serio_handle_event+0x5f6/0xa30 [ 79.111293][ T8447] process_one_work+0x98d/0x1630 [ 79.118129][ T8447] worker_thread+0x658/0x11f0 [ 79.124716][ T8447] kthread+0x3e5/0x4d0 [ 79.130683][ T8447] ret_from_fork+0x1f/0x30 [ 79.137002][ T8447] } [ 79.139667][ T8447] ... key at: [] __key.8+0x0/0x40 [ 79.146934][ T8447] -> (&client->buffer_lock){....}-{2:2} { [ 79.152730][ T8447] INITIAL USE at: [ 79.156696][ T8447] lock_acquire+0x1ab/0x510 [ 79.162930][ T8447] _raw_spin_lock+0x2a/0x40 [ 79.169157][ T8447] evdev_pass_values.part.0+0xf6/0x970 [ 79.176337][ T8447] evdev_events+0x359/0x3e0 [ 79.182562][ T8447] input_to_handler+0x2a0/0x4c0 [ 79.189142][ T8447] input_pass_values.part.0+0x230/0x710 [ 79.196406][ T8447] input_handle_event+0x373/0x1440 [ 79.203234][ T8447] input_inject_event+0x1bd/0x320 [ 79.209979][ T8447] evdev_write+0x430/0x760 [ 79.216122][ T8447] vfs_write+0x28e/0xa40 [ 79.222084][ T8447] ksys_write+0x1ee/0x250 [ 79.228131][ T8447] do_syscall_64+0x35/0xb0 [ 79.234371][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.241997][ T8447] } [ 79.244565][ T8447] ... key at: [] __key.4+0x0/0x40 [ 79.251744][ T8447] ... acquired at: [ 79.255612][ T8447] _raw_spin_lock+0x2a/0x40 [ 79.261311][ T8447] evdev_pass_values.part.0+0xf6/0x970 [ 79.266933][ T8447] evdev_events+0x359/0x3e0 [ 79.271588][ T8447] input_to_handler+0x2a0/0x4c0 [ 79.276596][ T8447] input_pass_values.part.0+0x230/0x710 [ 79.282295][ T8447] input_handle_event+0x373/0x1440 [ 79.287561][ T8447] input_inject_event+0x1bd/0x320 [ 79.292752][ T8447] evdev_write+0x430/0x760 [ 79.297346][ T8447] vfs_write+0x28e/0xa40 [ 79.301746][ T8447] ksys_write+0x1ee/0x250 [ 79.306229][ T8447] do_syscall_64+0x35/0xb0 [ 79.310813][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.316869][ T8447] [ 79.319171][ T8447] -> (&new->fa_lock){....}-{2:2} { [ 79.324273][ T8447] INITIAL READ USE at: [ 79.328593][ T8447] lock_acquire+0x1ab/0x510 [ 79.335090][ T8447] _raw_read_lock+0x5b/0x70 [ 79.341663][ T8447] kill_fasync+0x132/0x460 [ 79.348060][ T8447] evdev_pass_values.part.0+0x64e/0x970 [ 79.355585][ T8447] evdev_events+0x359/0x3e0 [ 79.362085][ T8447] input_to_handler+0x2a0/0x4c0 [ 79.368916][ T8447] input_pass_values.part.0+0x230/0x710 [ 79.376440][ T8447] input_handle_event+0x373/0x1440 [ 79.383554][ T8447] input_inject_event+0x1bd/0x320 [ 79.390566][ T8447] evdev_write+0x430/0x760 [ 79.396960][ T8447] vfs_write+0x28e/0xa40 [ 79.403180][ T8447] ksys_write+0x1ee/0x250 [ 79.409584][ T8447] do_syscall_64+0x35/0xb0 [ 79.416067][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.423955][ T8447] } [ 79.426441][ T8447] ... key at: [] __key.0+0x0/0x40 [ 79.433533][ T8447] ... acquired at: [ 79.437401][ T8447] _raw_read_lock+0x5b/0x70 [ 79.442071][ T8447] kill_fasync+0x132/0x460 [ 79.446661][ T8447] evdev_pass_values.part.0+0x64e/0x970 [ 79.452378][ T8447] evdev_events+0x359/0x3e0 [ 79.457049][ T8447] input_to_handler+0x2a0/0x4c0 [ 79.462058][ T8447] input_pass_values.part.0+0x230/0x710 [ 79.467757][ T8447] input_handle_event+0x373/0x1440 [ 79.473020][ T8447] input_inject_event+0x1bd/0x320 [ 79.478196][ T8447] evdev_write+0x430/0x760 [ 79.482770][ T8447] vfs_write+0x28e/0xa40 [ 79.487182][ T8447] ksys_write+0x1ee/0x250 [ 79.491664][ T8447] do_syscall_64+0x35/0xb0 [ 79.496236][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.502285][ T8447] [ 79.504586][ T8447] [ 79.504586][ T8447] the dependencies between the lock to be acquired [ 79.504592][ T8447] and HARDIRQ-irq-unsafe lock: [ 79.518101][ T8447] -> (&f->f_owner.lock){.+.+}-{2:2} { [ 79.523462][ T8447] HARDIRQ-ON-R at: [ 79.527425][ T8447] lock_acquire+0x1ab/0x510 [ 79.533577][ T8447] _raw_read_lock+0x5b/0x70 [ 79.539713][ T8447] do_fcntl+0x8af/0x1210 [ 79.545603][ T8447] __x64_sys_fcntl+0x165/0x1e0 [ 79.552009][ T8447] do_syscall_64+0x35/0xb0 [ 79.558071][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.565595][ T8447] SOFTIRQ-ON-R at: [ 79.569573][ T8447] lock_acquire+0x1ab/0x510 [ 79.576146][ T8447] _raw_read_lock+0x5b/0x70 [ 79.582299][ T8447] do_fcntl+0x8af/0x1210 [ 79.588171][ T8447] __x64_sys_fcntl+0x165/0x1e0 [ 79.594566][ T8447] do_syscall_64+0x35/0xb0 [ 79.600616][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.608158][ T8447] INITIAL READ USE at: [ 79.612466][ T8447] lock_acquire+0x1ab/0x510 [ 79.618954][ T8447] _raw_read_lock+0x5b/0x70 [ 79.625439][ T8447] do_fcntl+0x8af/0x1210 [ 79.631659][ T8447] __x64_sys_fcntl+0x165/0x1e0 [ 79.638415][ T8447] do_syscall_64+0x35/0xb0 [ 79.644829][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.652704][ T8447] } [ 79.655184][ T8447] ... key at: [] __key.5+0x0/0x40 [ 79.662281][ T8447] ... acquired at: [ 79.666065][ T8447] lock_acquire+0x1ab/0x510 [ 79.670741][ T8447] _raw_read_lock_irqsave+0x70/0x90 [ 79.676097][ T8447] send_sigio+0x24/0x380 [ 79.680513][ T8447] kill_fasync+0x1ec/0x460 [ 79.685098][ T8447] evdev_pass_values.part.0+0x64e/0x970 [ 79.690799][ T8447] evdev_events+0x359/0x3e0 [ 79.695458][ T8447] input_to_handler+0x2a0/0x4c0 [ 79.700466][ T8447] input_pass_values.part.0+0x230/0x710 [ 79.706181][ T8447] input_handle_event+0x373/0x1440 [ 79.711446][ T8447] input_inject_event+0x1bd/0x320 [ 79.716627][ T8447] evdev_write+0x430/0x760 [ 79.721230][ T8447] vfs_write+0x28e/0xa40 [ 79.725654][ T8447] ksys_write+0x1ee/0x250 [ 79.730157][ T8447] do_syscall_64+0x35/0xb0 [ 79.734745][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.740871][ T8447] [ 79.743175][ T8447] [ 79.743175][ T8447] stack backtrace: [ 79.749042][ T8447] CPU: 1 PID: 8447 Comm: syz-executor589 Not tainted 5.14.0-rc6-syzkaller #0 [ 79.757785][ T8447] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 79.767823][ T8447] Call Trace: [ 79.771086][ T8447] dump_stack_lvl+0xcd/0x134 [ 79.775663][ T8447] check_irq_usage.cold+0x4c1/0x6b0 [ 79.780849][ T8447] ? deref_stack_reg+0x150/0x150 [ 79.785786][ T8447] ? print_shortest_lock_dependencies_backwards+0x80/0x80 [ 79.792881][ T8447] ? is_module_text_address+0x29/0x50 [ 79.798239][ T8447] ? check_path.constprop.0+0x24/0x50 [ 79.803611][ T8447] ? register_lock_class+0xb7/0x10c0 [ 79.808877][ T8447] ? stack_trace_save+0x8c/0xc0 [ 79.813708][ T8447] ? lockdep_lock+0xc6/0x200 [ 79.818368][ T8447] ? call_rcu_zapped+0xb0/0xb0 [ 79.823149][ T8447] __lock_acquire+0x2a1f/0x54a0 [ 79.828001][ T8447] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 79.833963][ T8447] lock_acquire+0x1ab/0x510 [ 79.838470][ T8447] ? send_sigio+0x24/0x380 [ 79.842871][ T8447] ? lock_release+0x720/0x720 [ 79.847527][ T8447] ? lock_release+0x720/0x720 [ 79.852184][ T8447] ? lock_release+0x720/0x720 [ 79.856840][ T8447] _raw_read_lock_irqsave+0x70/0x90 [ 79.862019][ T8447] ? send_sigio+0x24/0x380 [ 79.866427][ T8447] send_sigio+0x24/0x380 [ 79.870659][ T8447] kill_fasync+0x1ec/0x460 [ 79.875056][ T8447] evdev_pass_values.part.0+0x64e/0x970 [ 79.880588][ T8447] ? evdev_release+0x410/0x410 [ 79.885345][ T8447] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 79.891047][ T8447] evdev_events+0x359/0x3e0 [ 79.895535][ T8447] ? evdev_pass_values.part.0+0x970/0x970 [ 79.901240][ T8447] input_to_handler+0x2a0/0x4c0 [ 79.906078][ T8447] input_pass_values.part.0+0x230/0x710 [ 79.911605][ T8447] input_handle_event+0x373/0x1440 [ 79.916699][ T8447] input_inject_event+0x1bd/0x320 [ 79.921719][ T8447] evdev_write+0x430/0x760 [ 79.926121][ T8447] ? evdev_read+0xe40/0xe40 [ 79.930613][ T8447] ? security_file_permission+0x248/0x560 [ 79.936324][ T8447] ? evdev_read+0xe40/0xe40 [ 79.940896][ T8447] vfs_write+0x28e/0xa40 [ 79.945134][ T8447] ksys_write+0x1ee/0x250 [ 79.949443][ T8447] ? __ia32_sys_read+0xb0/0xb0 [ 79.954206][ T8447] ? syscall_enter_from_user_mode+0x21/0x70 [ 79.960118][ T8447] do_syscall_64+0x35/0xb0 [ 79.964518][ T8447] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.970406][ T8447] RIP: 0033:0x4434b9 [ 79.974282][ T8447] Code: 28 c3 e8 2a 14 00 00 66 2e 0f 1f 84 00 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 79.993883][ T8447] RSP: 002b:00007ffd15f21428 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 80.002291][ T8447] RAX: ffffff