Starting System Logging Service... Starting Permit User Sessions... Starting getty on tty2-tty6 if dbus and logind are not available... [ OK ] Started Regular background program processing daemon. Starting OpenBSD Secure Shell server... [ OK ] Started System Logging Service. [ OK ] Started Permit User Sessions. [ OK ] Found device /dev/ttyS0. [ OK ] Started OpenBSD Secure Shell server. [ OK ] Started getty on tty2-tty6 if dbus and logind are not available. [ OK ] Listening on Load/Save RF Kill Switch Status /dev/rfkill Watch. [ OK ] Started Getty on tty6. [ OK ] Started Getty on tty5. [ OK ] Started Getty on tty4. [ OK ] Started Getty on tty3. [ OK ] Started Getty on tty2. [ OK ] Started Getty on tty1. [ OK ] Started Serial Getty on ttyS0. [ OK ] Reached target Login Prompts. [ OK ] Reached target Multi-User System. [ OK ] Reached target Graphical Interface. Starting Update UTMP about System Runlevel Changes... Starting Load/Save RF Kill Switch Status... [ OK ] Started Update UTMP about System Runlevel Changes. [ OK ] Started Load/Save RF Kill Switch Status. Warning: Permanently added '10.128.0.23' (ECDSA) to the list of known hosts. executing program [ 77.794885][ T37] audit: type=1400 audit(1629573400.424:8): avc: denied { execmem } for pid=8443 comm="syz-executor036" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 Debian GNU/Linux 9 syzkaller ttyS0 syzkaller login: [ 78.060405][ T26] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 78.420540][ T26] usb 1-1: config 0 has an invalid interface number: 123 but max is 0 [ 78.429005][ T26] usb 1-1: config 0 has an invalid descriptor of length 0, skipping remainder of the config [ 78.439686][ T26] usb 1-1: config 0 has no interface number 0 [ 78.446484][ T26] usb 1-1: config 0 interface 123 altsetting 0 has 0 endpoint descriptors, different from the interface descriptor's value: 15 [ 78.620539][ T26] usb 1-1: New USB device found, idVendor=0781, idProduct=0100, bcdDevice= 1.00 [ 78.629584][ T26] usb 1-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 78.638135][ T26] usb 1-1: Product: syz [ 78.642440][ T26] usb 1-1: Manufacturer: syz [ 78.647041][ T26] usb 1-1: SerialNumber: syz [ 78.658819][ T26] usb 1-1: config 0 descriptor?? [ 78.901762][ T8443] [ 78.904107][ T8443] ===================================================== [ 78.911028][ T8443] WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected [ 78.918461][ T8443] 5.14.0-rc6-syzkaller #0 Not tainted [ 78.923813][ T8443] ----------------------------------------------------- [ 78.930727][ T8443] syz-executor036/8443 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: [ 78.938789][ T8443] ffff888016d4e978 (&f->f_owner.lock){.+.+}-{2:2}, at: send_sigio+0x24/0x380 [ 78.947597][ T8443] [ 78.947597][ T8443] and this task is already holding: [ 78.954944][ T8443] ffff88802aa379f0 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x132/0x460 [ 78.963634][ T8443] which would create a new lock dependency: [ 78.969505][ T8443] (&new->fa_lock){....}-{2:2} -> (&f->f_owner.lock){.+.+}-{2:2} [ 78.977255][ T8443] [ 78.977255][ T8443] but this new dependency connects a HARDIRQ-irq-safe lock: [ 78.986699][ T8443] (&dev->event_lock){-...}-{2:2} [ 78.986722][ T8443] [ 78.986722][ T8443] ... which became HARDIRQ-irq-safe at: [ 78.999408][ T8443] lock_acquire+0x1ab/0x510 [ 79.003998][ T8443] _raw_spin_lock_irqsave+0x39/0x50 [ 79.009289][ T8443] input_event+0x7b/0xb0 [ 79.013607][ T8443] psmouse_report_standard_buttons+0x2c/0x80 [ 79.019668][ T8443] psmouse_process_byte+0x1e1/0x890 [ 79.024945][ T8443] psmouse_handle_byte+0x41/0x1b0 [ 79.030062][ T8443] psmouse_interrupt+0x304/0xf00 [ 79.035080][ T8443] serio_interrupt+0x88/0x150 [ 79.039833][ T8443] i8042_interrupt+0x27a/0x520 [ 79.044691][ T8443] __handle_irq_event_percpu+0x303/0x8f0 [ 79.050401][ T8443] handle_irq_event+0x102/0x280 [ 79.055330][ T8443] handle_edge_irq+0x25f/0xd00 [ 79.060190][ T8443] __common_interrupt+0x9d/0x210 [ 79.065218][ T8443] common_interrupt+0x9f/0xd0 [ 79.069975][ T8443] asm_common_interrupt+0x1e/0x40 [ 79.075077][ T8443] _raw_spin_unlock_irqrestore+0x38/0x70 [ 79.080787][ T8443] i8042_command+0x12e/0x150 [ 79.085456][ T8443] i8042_aux_write+0xd7/0x120 [ 79.090211][ T8443] ps2_do_sendbyte+0x2cf/0x710 [ 79.095054][ T8443] ps2_sendbyte+0x58/0x150 [ 79.099547][ T8443] cypress_ps2_sendbyte+0x2e/0x160 [ 79.104825][ T8443] cypress_send_ext_cmd+0x1d0/0x8e0 [ 79.110113][ T8443] cypress_detect+0x75/0x190 [ 79.114780][ T8443] psmouse_try_protocol+0x211/0x370 [ 79.120060][ T8443] psmouse_extensions+0x557/0x930 [ 79.125161][ T8443] psmouse_switch_protocol+0x52a/0x740 [ 79.130700][ T8443] psmouse_connect+0x5e9/0xfd0 [ 79.135535][ T8443] serio_driver_probe+0x72/0xa0 [ 79.140459][ T8443] really_probe+0x23c/0xcd0 [ 79.145039][ T8443] __driver_probe_device+0x338/0x4d0 [ 79.150400][ T8443] driver_probe_device+0x4c/0x1a0 [ 79.155501][ T8443] __driver_attach+0x22d/0x4e0 [ 79.160342][ T8443] bus_for_each_dev+0x147/0x1d0 [ 79.165266][ T8443] serio_handle_event+0x5f6/0xa30 [ 79.170375][ T8443] process_one_work+0x98d/0x1630 [ 79.175454][ T8443] worker_thread+0x658/0x11f0 [ 79.180226][ T8443] kthread+0x3e5/0x4d0 [ 79.184377][ T8443] ret_from_fork+0x1f/0x30 [ 79.188901][ T8443] [ 79.188901][ T8443] to a HARDIRQ-irq-unsafe lock: [ 79.195908][ T8443] (&f->f_owner.lock){.+.+}-{2:2} [ 79.195936][ T8443] [ 79.195936][ T8443] ... which became HARDIRQ-irq-unsafe at: [ 79.208813][ T8443] ... [ 79.208822][ T8443] lock_acquire+0x1ab/0x510 [ 79.215989][ T8443] _raw_read_lock+0x5b/0x70 [ 79.220572][ T8443] f_getown+0x23/0x2a0 [ 79.224731][ T8443] sock_ioctl+0x4ba/0x6a0 [ 79.229143][ T8443] __x64_sys_ioctl+0x193/0x200 [ 79.233993][ T8443] do_syscall_64+0x35/0xb0 [ 79.238504][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.244660][ T8443] [ 79.244660][ T8443] other info that might help us debug this: [ 79.244660][ T8443] [ 79.254896][ T8443] Chain exists of: [ 79.254896][ T8443] &dev->event_lock --> &new->fa_lock --> &f->f_owner.lock [ 79.254896][ T8443] [ 79.268032][ T8443] Possible interrupt unsafe locking scenario: [ 79.268032][ T8443] [ 79.276348][ T8443] CPU0 CPU1 [ 79.281704][ T8443] ---- ---- [ 79.287056][ T8443] lock(&f->f_owner.lock); [ 79.291646][ T8443] local_irq_disable(); [ 79.298392][ T8443] lock(&dev->event_lock); [ 79.305498][ T8443] lock(&new->fa_lock); [ 79.312254][ T8443] [ 79.315692][ T8443] lock(&dev->event_lock); [ 79.320355][ T8443] [ 79.320355][ T8443] *** DEADLOCK *** [ 79.320355][ T8443] [ 79.328487][ T8443] 8 locks held by syz-executor036/8443: [ 79.334052][ T8443] #0: ffff8880265ca110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x1d3/0x760 [ 79.343192][ T8443] #1: ffff8880246f6230 (&dev->event_lock){-...}-{2:2}, at: input_inject_event+0xa6/0x320 [ 79.353111][ T8443] #2: ffffffff8b979840 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0x92/0x320 [ 79.362955][ T8443] #3: ffffffff8b979840 (rcu_read_lock){....}-{1:2}, at: input_pass_values.part.0+0x0/0x710 [ 79.373041][ T8443] #4: ffffffff8b979840 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x59/0x3e0 [ 79.382174][ T8443] #5: ffff888036444028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values.part.0+0xf6/0x970 [ 79.392955][ T8443] #6: ffffffff8b979840 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x3d/0x460 [ 79.402084][ T8443] #7: ffff88802aa379f0 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x132/0x460 [ 79.411212][ T8443] [ 79.411212][ T8443] the dependencies between HARDIRQ-irq-safe lock and the holding lock: [ 79.421601][ T8443] -> (&dev->event_lock){-...}-{2:2} { [ 79.427149][ T8443] IN-HARDIRQ-W at: [ 79.431303][ T8443] lock_acquire+0x1ab/0x510 [ 79.437796][ T8443] _raw_spin_lock_irqsave+0x39/0x50 [ 79.444984][ T8443] input_event+0x7b/0xb0 [ 79.451214][ T8443] psmouse_report_standard_buttons+0x2c/0x80 [ 79.459194][ T8443] psmouse_process_byte+0x1e1/0x890 [ 79.466388][ T8443] psmouse_handle_byte+0x41/0x1b0 [ 79.473418][ T8443] psmouse_interrupt+0x304/0xf00 [ 79.480347][ T8443] serio_interrupt+0x88/0x150 [ 79.487012][ T8443] i8042_interrupt+0x27a/0x520 [ 79.493768][ T8443] __handle_irq_event_percpu+0x303/0x8f0 [ 79.501526][ T8443] handle_irq_event+0x102/0x280 [ 79.508400][ T8443] handle_edge_irq+0x25f/0xd00 [ 79.515175][ T8443] __common_interrupt+0x9d/0x210 [ 79.522111][ T8443] common_interrupt+0x9f/0xd0 [ 79.528785][ T8443] asm_common_interrupt+0x1e/0x40 [ 79.535814][ T8443] _raw_spin_unlock_irqrestore+0x38/0x70 [ 79.543455][ T8443] i8042_command+0x12e/0x150 [ 79.550037][ T8443] i8042_aux_write+0xd7/0x120 [ 79.556704][ T8443] ps2_do_sendbyte+0x2cf/0x710 [ 79.563482][ T8443] ps2_sendbyte+0x58/0x150 [ 79.569891][ T8443] cypress_ps2_sendbyte+0x2e/0x160 [ 79.576995][ T8443] cypress_send_ext_cmd+0x1d0/0x8e0 [ 79.584183][ T8443] cypress_detect+0x75/0x190 [ 79.590764][ T8443] psmouse_try_protocol+0x211/0x370 [ 79.597955][ T8443] psmouse_extensions+0x557/0x930 [ 79.604971][ T8443] psmouse_switch_protocol+0x52a/0x740 [ 79.612427][ T8443] psmouse_connect+0x5e9/0xfd0 [ 79.619187][ T8443] serio_driver_probe+0x72/0xa0 [ 79.626028][ T8443] really_probe+0x23c/0xcd0 [ 79.632527][ T8443] __driver_probe_device+0x338/0x4d0 [ 79.639815][ T8443] driver_probe_device+0x4c/0x1a0 [ 79.646838][ T8443] __driver_attach+0x22d/0x4e0 [ 79.653599][ T8443] bus_for_each_dev+0x147/0x1d0 [ 79.660439][ T8443] serio_handle_event+0x5f6/0xa30 [ 79.667485][ T8443] process_one_work+0x98d/0x1630 [ 79.674414][ T8443] worker_thread+0x658/0x11f0 [ 79.681086][ T8443] kthread+0x3e5/0x4d0 [ 79.687186][ T8443] ret_from_fork+0x1f/0x30 [ 79.693609][ T8443] INITIAL USE at: [ 79.697665][ T8443] lock_acquire+0x1ab/0x510 [ 79.704071][ T8443] _raw_spin_lock_irqsave+0x39/0x50 [ 79.711170][ T8443] input_inject_event+0xa6/0x320 [ 79.718010][ T8443] led_set_brightness_nosleep+0xe6/0x1a0 [ 79.725564][ T8443] led_set_brightness+0x134/0x170 [ 79.732487][ T8443] led_trigger_event+0x75/0xd0 [ 79.739237][ T8443] kbd_led_trigger_activate+0xc9/0x100 [ 79.746603][ T8443] led_trigger_set+0x61e/0xbd0 [ 79.753267][ T8443] led_trigger_set_default+0x1a6/0x230 [ 79.760623][ T8443] led_classdev_register_ext+0x5b1/0x7c0 [ 79.768158][ T8443] input_leds_connect+0x4bd/0x860 [ 79.775102][ T8443] input_attach_handler+0x180/0x1f0 [ 79.782206][ T8443] input_register_device.cold+0xf0/0x303 [ 79.789745][ T8443] atkbd_connect+0x739/0xa00 [ 79.796240][ T8443] serio_driver_probe+0x72/0xa0 [ 79.802995][ T8443] really_probe+0x23c/0xcd0 [ 79.809404][ T8443] __driver_probe_device+0x338/0x4d0 [ 79.816590][ T8443] driver_probe_device+0x4c/0x1a0 [ 79.823518][ T8443] __driver_attach+0x22d/0x4e0 [ 79.830203][ T8443] bus_for_each_dev+0x147/0x1d0 [ 79.836971][ T8443] serio_handle_event+0x5f6/0xa30 [ 79.843911][ T8443] process_one_work+0x98d/0x1630 [ 79.850754][ T8443] worker_thread+0x658/0x11f0 [ 79.857335][ T8443] kthread+0x3e5/0x4d0 [ 79.863304][ T8443] ret_from_fork+0x1f/0x30 [ 79.869631][ T8443] } [ 79.872288][ T8443] ... key at: [] __key.8+0x0/0x40 [ 79.879567][ T8443] -> (&client->buffer_lock){....}-{2:2} { [ 79.885376][ T8443] INITIAL USE at: [ 79.889342][ T8443] lock_acquire+0x1ab/0x510 [ 79.895579][ T8443] _raw_spin_lock+0x2a/0x40 [ 79.901808][ T8443] evdev_pass_values.part.0+0xf6/0x970 [ 79.909000][ T8443] evdev_events+0x359/0x3e0 [ 79.915232][ T8443] input_to_handler+0x2a0/0x4c0 [ 79.921831][ T8443] input_pass_values.part.0+0x230/0x710 [ 79.929112][ T8443] input_handle_event+0x373/0x1440 [ 79.936045][ T8443] input_inject_event+0x1bd/0x320 [ 79.942804][ T8443] evdev_write+0x430/0x760 [ 79.948958][ T8443] vfs_write+0x28e/0xa40 [ 79.954966][ T8443] ksys_write+0x1ee/0x250 [ 79.961034][ T8443] do_syscall_64+0x35/0xb0 [ 79.967191][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 79.974822][ T8443] } [ 79.977396][ T8443] ... key at: [] __key.4+0x0/0x40 [ 79.984590][ T8443] ... acquired at: [ 79.988466][ T8443] _raw_spin_lock+0x2a/0x40 [ 79.993136][ T8443] evdev_pass_values.part.0+0xf6/0x970 [ 79.998825][ T8443] evdev_events+0x359/0x3e0 [ 80.003502][ T8443] input_to_handler+0x2a0/0x4c0 [ 80.008523][ T8443] input_pass_values.part.0+0x230/0x710 [ 80.014241][ T8443] input_handle_event+0x373/0x1440 [ 80.019519][ T8443] input_inject_event+0x1bd/0x320 [ 80.024712][ T8443] evdev_write+0x430/0x760 [ 80.029296][ T8443] vfs_write+0x28e/0xa40 [ 80.033723][ T8443] ksys_write+0x1ee/0x250 [ 80.038220][ T8443] do_syscall_64+0x35/0xb0 [ 80.042805][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.048871][ T8443] [ 80.051183][ T8443] -> (&new->fa_lock){....}-{2:2} { [ 80.056386][ T8443] INITIAL READ USE at: [ 80.060706][ T8443] lock_acquire+0x1ab/0x510 [ 80.067199][ T8443] _raw_read_lock+0x5b/0x70 [ 80.073781][ T8443] kill_fasync+0x132/0x460 [ 80.080189][ T8443] evdev_pass_values.part.0+0x64e/0x970 [ 80.087730][ T8443] evdev_events+0x359/0x3e0 [ 80.094223][ T8443] input_to_handler+0x2a0/0x4c0 [ 80.101069][ T8443] input_pass_values.part.0+0x230/0x710 [ 80.108607][ T8443] input_handle_event+0x373/0x1440 [ 80.115724][ T8443] input_inject_event+0x1bd/0x320 [ 80.122750][ T8443] evdev_write+0x430/0x760 [ 80.129178][ T8443] vfs_write+0x28e/0xa40 [ 80.135432][ T8443] ksys_write+0x1ee/0x250 [ 80.141760][ T8443] do_syscall_64+0x35/0xb0 [ 80.148170][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.156074][ T8443] } [ 80.158644][ T8443] ... key at: [] __key.0+0x0/0x40 [ 80.165756][ T8443] ... acquired at: [ 80.169562][ T8443] _raw_read_lock+0x5b/0x70 [ 80.174237][ T8443] kill_fasync+0x132/0x460 [ 80.178819][ T8443] evdev_pass_values.part.0+0x64e/0x970 [ 80.184555][ T8443] evdev_events+0x359/0x3e0 [ 80.189229][ T8443] input_to_handler+0x2a0/0x4c0 [ 80.194247][ T8443] input_pass_values.part.0+0x230/0x710 [ 80.199959][ T8443] input_handle_event+0x373/0x1440 [ 80.205241][ T8443] input_inject_event+0x1bd/0x320 [ 80.210450][ T8443] evdev_write+0x430/0x760 [ 80.215045][ T8443] vfs_write+0x28e/0xa40 [ 80.219467][ T8443] ksys_write+0x1ee/0x250 [ 80.223977][ T8443] do_syscall_64+0x35/0xb0 [ 80.228570][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.234721][ T8443] [ 80.237034][ T8443] [ 80.237034][ T8443] the dependencies between the lock to be acquired [ 80.237042][ T8443] and HARDIRQ-irq-unsafe lock: [ 80.250676][ T8443] -> (&f->f_owner.lock){.+.+}-{2:2} { [ 80.256058][ T8443] HARDIRQ-ON-R at: [ 80.260233][ T8443] lock_acquire+0x1ab/0x510 [ 80.266505][ T8443] _raw_read_lock+0x5b/0x70 [ 80.272659][ T8443] f_getown+0x23/0x2a0 [ 80.278374][ T8443] sock_ioctl+0x4ba/0x6a0 [ 80.284355][ T8443] __x64_sys_ioctl+0x193/0x200 [ 80.290765][ T8443] do_syscall_64+0x35/0xb0 [ 80.296843][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.304443][ T8443] SOFTIRQ-ON-R at: [ 80.308417][ T8443] lock_acquire+0x1ab/0x510 [ 80.314565][ T8443] _raw_read_lock+0x5b/0x70 [ 80.320709][ T8443] f_getown+0x23/0x2a0 [ 80.326421][ T8443] sock_ioctl+0x4ba/0x6a0 [ 80.332654][ T8443] __x64_sys_ioctl+0x193/0x200 [ 80.339063][ T8443] do_syscall_64+0x35/0xb0 [ 80.345128][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.352670][ T8443] INITIAL READ USE at: [ 80.356988][ T8443] lock_acquire+0x1ab/0x510 [ 80.363478][ T8443] _raw_read_lock+0x5b/0x70 [ 80.369974][ T8443] f_getown+0x23/0x2a0 [ 80.376036][ T8443] sock_ioctl+0x4ba/0x6a0 [ 80.382372][ T8443] __x64_sys_ioctl+0x193/0x200 [ 80.389126][ T8443] do_syscall_64+0x35/0xb0 [ 80.395549][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.403577][ T8443] } [ 80.406073][ T8443] ... key at: [] __key.5+0x0/0x40 [ 80.413185][ T8443] ... acquired at: [ 80.416977][ T8443] lock_acquire+0x1ab/0x510 [ 80.421652][ T8443] _raw_read_lock_irqsave+0x70/0x90 [ 80.427049][ T8443] send_sigio+0x24/0x380 [ 80.431465][ T8443] kill_fasync+0x1ec/0x460 [ 80.436059][ T8443] evdev_pass_values.part.0+0x64e/0x970 [ 80.441784][ T8443] evdev_events+0x359/0x3e0 [ 80.446464][ T8443] input_to_handler+0x2a0/0x4c0 [ 80.451613][ T8443] input_pass_values.part.0+0x230/0x710 [ 80.457591][ T8443] input_handle_event+0x373/0x1440 [ 80.463007][ T8443] input_inject_event+0x1bd/0x320 [ 80.468208][ T8443] evdev_write+0x430/0x760 [ 80.472800][ T8443] vfs_write+0x28e/0xa40 [ 80.477215][ T8443] ksys_write+0x1ee/0x250 [ 80.481715][ T8443] do_syscall_64+0x35/0xb0 [ 80.486323][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.492395][ T8443] [ 80.494709][ T8443] [ 80.494709][ T8443] stack backtrace: [ 80.500591][ T8443] CPU: 0 PID: 8443 Comm: syz-executor036 Not tainted 5.14.0-rc6-syzkaller #0 [ 80.509360][ T8443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 80.519412][ T8443] Call Trace: [ 80.522697][ T8443] dump_stack_lvl+0xcd/0x134 [ 80.527285][ T8443] check_irq_usage.cold+0x4c1/0x6b0 [ 80.532517][ T8443] ? deref_stack_reg+0x150/0x150 [ 80.537662][ T8443] ? print_shortest_lock_dependencies_backwards+0x80/0x80 [ 80.544772][ T8443] ? is_module_text_address+0x29/0x50 [ 80.550139][ T8443] ? check_path.constprop.0+0x24/0x50 [ 80.555522][ T8443] ? register_lock_class+0xb7/0x10c0 [ 80.560806][ T8443] ? stack_trace_save+0x8c/0xc0 [ 80.565649][ T8443] ? lockdep_lock+0xc6/0x200 [ 80.570240][ T8443] ? call_rcu_zapped+0xb0/0xb0 [ 80.575003][ T8443] __lock_acquire+0x2a1f/0x54a0 [ 80.579847][ T8443] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 80.585824][ T8443] lock_acquire+0x1ab/0x510 [ 80.590321][ T8443] ? send_sigio+0x24/0x380 [ 80.594735][ T8443] ? lock_release+0x720/0x720 [ 80.599407][ T8443] ? lock_release+0x720/0x720 [ 80.604076][ T8443] ? lock_release+0x720/0x720 [ 80.608747][ T8443] _raw_read_lock_irqsave+0x70/0x90 [ 80.613941][ T8443] ? send_sigio+0x24/0x380 [ 80.618349][ T8443] send_sigio+0x24/0x380 [ 80.622587][ T8443] kill_fasync+0x1ec/0x460 [ 80.627007][ T8443] evdev_pass_values.part.0+0x64e/0x970 [ 80.632559][ T8443] ? evdev_release+0x410/0x410 [ 80.637341][ T8443] ? __sanitizer_cov_trace_cmp4+0x1c/0x70 [ 80.643059][ T8443] evdev_events+0x359/0x3e0 [ 80.647562][ T8443] ? evdev_pass_values.part.0+0x970/0x970 [ 80.653303][ T8443] input_to_handler+0x2a0/0x4c0 [ 80.658156][ T8443] input_pass_values.part.0+0x230/0x710 [ 80.663695][ T8443] input_handle_event+0x373/0x1440 [ 80.668806][ T8443] input_inject_event+0x1bd/0x320 [ 80.673826][ T8443] evdev_write+0x430/0x760 [ 80.678259][ T8443] ? evdev_read+0xe40/0xe40 [ 80.682775][ T8443] ? security_file_permission+0x248/0x560 [ 80.688490][ T8443] ? evdev_read+0xe40/0xe40 [ 80.692989][ T8443] vfs_write+0x28e/0xa40 [ 80.697402][ T8443] ksys_write+0x1ee/0x250 [ 80.701844][ T8443] ? __ia32_sys_read+0xb0/0xb0 [ 80.706606][ T8443] ? syscall_enter_from_user_mode+0x21/0x70 [ 80.712501][ T8443] do_syscall_64+0x35/0xb0 [ 80.716918][ T8443] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 80.722848][ T8443] RIP: 0033:0x446d59 [ 80.726737][ T8443] Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 21 14 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 c0 ff ff ff f7 d8 64 89 01 48 [ 80.746340][ T8443] RSP: 002b:00007ffdd33065a8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 80.754745][ T8443] RAX: ffffffffffffffda RBX: 0000000000