===================================================== WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected syzkaller #0 Tainted: G L ----------------------------------------------------- syz.3.6666/28450 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: ffffffff8e60a058 (tasklist_lock){.+.+}-{3:3}, at: send_sigio+0x101/0x370 fs/fcntl.c:932 and this task is already holding: ffff88802bb97ba0 (&f_owner->lock){....}-{3:3}, at: send_sigio+0x38/0x370 fs/fcntl.c:918 which would create a new lock dependency: (&f_owner->lock){....}-{3:3} -> (tasklist_lock){.+.+}-{3:3} but this new dependency connects a SOFTIRQ-irq-safe lock: (&client->buffer_lock){..-.}-{3:3} ... which became SOFTIRQ-irq-safe at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_spin_lock include/linux/spinlock_api_smp.h:158 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:158 spin_lock include/linux/spinlock.h:342 [inline] evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261 evdev_events+0x1e6/0x340 drivers/input/evdev.c:306 input_pass_values+0x288/0x890 drivers/input/input.c:128 input_event_dispose+0x3e5/0x6b0 drivers/input/input.c:353 input_inject_event+0x1dc/0x330 drivers/input/input.c:424 led_trigger_event+0x138/0x210 drivers/leds/led-triggers.c:420 kbd_propagate_led_state drivers/tty/vt/keyboard.c:1065 [inline] kbd_bh+0x1c6/0x2e0 drivers/tty/vt/keyboard.c:1244 tasklet_action_common+0x2da/0x4b0 kernel/softirq.c:938 handle_softirqs+0x22a/0x840 kernel/softirq.c:622 run_ksoftirqd+0x36/0x60 kernel/softirq.c:1076 smpboot_thread_fn+0x541/0xa50 kernel/smpboot.c:160 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 to a SOFTIRQ-irq-unsafe lock: (tasklist_lock){.+.+}-{3:3} ... which became SOFTIRQ-irq-unsafe at: ... lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_read_lock include/linux/rwlock_api_smp.h:163 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:232 __do_wait+0xde/0x740 kernel/exit.c:1677 do_wait+0x1e7/0x510 kernel/exit.c:1721 kernel_wait+0xd6/0x1c0 kernel/exit.c:1897 call_usermodehelper_exec_sync kernel/umh.c:136 [inline] call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163 process_one_work kernel/workqueue.c:3302 [inline] process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3385 worker_thread+0xa53/0xfc0 kernel/workqueue.c:3466 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 other info that might help us debug this: Chain exists of: &client->buffer_lock --> &f_owner->lock --> tasklist_lock Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(tasklist_lock); local_irq_disable(); lock(&client->buffer_lock); lock(&f_owner->lock); lock(&client->buffer_lock); *** DEADLOCK *** 6 locks held by syz.3.6666/28450: #0: ffff88802525c410 (sb_writers#5){.+.+}-{0:0}, at: mnt_want_write+0x41/0x90 fs/namespace.c:493 #1: ffffffff8eb03450 (file_rwsem){.+.+}-{0:0}, at: __break_lease+0x4de/0x1e00 fs/locks.c:1628 #2: ffff88804bcaa228 (&ctx->flc_lock){+.+.}-{3:3}, at: spin_lock include/linux/spinlock.h:342 [inline] #2: ffff88804bcaa228 (&ctx->flc_lock){+.+.}-{3:3}, at: __break_lease+0x4e8/0x1e00 fs/locks.c:1629 #3: ffffffff8e95cb20 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:300 [inline] #3: ffffffff8e95cb20 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:838 [inline] #3: ffffffff8e95cb20 (rcu_read_lock){....}-{1:3}, at: kill_fasync+0x53/0x4d0 fs/fcntl.c:1158 #4: ffff8880491b7de0 (&new->fa_lock){....}-{3:3}, at: kill_fasync_rcu fs/fcntl.c:1135 [inline] #4: ffff8880491b7de0 (&new->fa_lock){....}-{3:3}, at: kill_fasync+0x199/0x4d0 fs/fcntl.c:1159 #5: ffff88802bb97ba0 (&f_owner->lock){....}-{3:3}, at: send_sigio+0x38/0x370 fs/fcntl.c:918 the dependencies between SOFTIRQ-irq-safe lock and the holding lock: -> (&client->buffer_lock){..-.}-{3:3} { IN-SOFTIRQ-W at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_spin_lock include/linux/spinlock_api_smp.h:158 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:158 spin_lock include/linux/spinlock.h:342 [inline] evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261 evdev_events+0x1e6/0x340 drivers/input/evdev.c:306 input_pass_values+0x288/0x890 drivers/input/input.c:128 input_event_dispose+0x3e5/0x6b0 drivers/input/input.c:353 input_inject_event+0x1dc/0x330 drivers/input/input.c:424 led_trigger_event+0x138/0x210 drivers/leds/led-triggers.c:420 kbd_propagate_led_state drivers/tty/vt/keyboard.c:1065 [inline] kbd_bh+0x1c6/0x2e0 drivers/tty/vt/keyboard.c:1244 tasklet_action_common+0x2da/0x4b0 kernel/softirq.c:938 handle_softirqs+0x22a/0x840 kernel/softirq.c:622 run_ksoftirqd+0x36/0x60 kernel/softirq.c:1076 smpboot_thread_fn+0x541/0xa50 kernel/smpboot.c:160 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 INITIAL USE at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_spin_lock include/linux/spinlock_api_smp.h:158 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:158 spin_lock include/linux/spinlock.h:342 [inline] evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261 evdev_events+0x1e6/0x340 drivers/input/evdev.c:306 input_pass_values+0x288/0x890 drivers/input/input.c:128 input_event_dispose+0x3e5/0x6b0 drivers/input/input.c:353 input_inject_event+0x1dc/0x330 drivers/input/input.c:424 led_trigger_event+0x138/0x210 drivers/leds/led-triggers.c:420 kbd_propagate_led_state drivers/tty/vt/keyboard.c:1065 [inline] kbd_bh+0x1c6/0x2e0 drivers/tty/vt/keyboard.c:1244 tasklet_action_common+0x2da/0x4b0 kernel/softirq.c:938 handle_softirqs+0x22a/0x840 kernel/softirq.c:622 run_ksoftirqd+0x36/0x60 kernel/softirq.c:1076 smpboot_thread_fn+0x541/0xa50 kernel/smpboot.c:160 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 } ... key at: [] evdev_open.__key.27+0x0/0x20 -> (&new->fa_lock){....}-{3:3} { INITIAL USE at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_write_lock_irq include/linux/rwlock_api_smp.h:213 [inline] _raw_write_lock_irq+0x3d/0x50 kernel/locking/spinlock.c:330 fasync_remove_entry+0xf1/0x1c0 fs/fcntl.c:1012 sock_fasync+0x85/0xf0 net/socket.c:1539 __fput+0x890/0xa60 fs/file_table.c:507 task_work_run+0x1d9/0x270 kernel/task_work.c:233 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] __exit_to_user_mode_loop kernel/entry/common.c:67 [inline] exit_to_user_mode_loop+0xed/0x480 kernel/entry/common.c:98 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:207 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:238 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:328 [inline] __do_fast_syscall_32+0x446/0x6e0 arch/x86/entry/syscall_32.c:310 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e INITIAL READ USE at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:174 [inline] _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:240 kill_fasync_rcu fs/fcntl.c:1135 [inline] kill_fasync+0x199/0x4d0 fs/fcntl.c:1159 sock_wake_async+0x137/0x160 net/socket.c:-1 sk_wake_async_rcu include/net/sock.h:2593 [inline] sock_def_readable+0x3c1/0x550 net/core/sock.c:3616 __sock_queue_rcv_skb+0x72b/0xb90 net/core/sock.c:518 sock_queue_rcv_skb_reason+0x4e/0x90 net/core/sock.c:533 raw_rcv_skb net/ipv4/raw.c:303 [inline] raw_rcv+0x6a4/0x930 net/ipv4/raw.c:323 raw_v4_input net/ipv4/raw.c:193 [inline] raw_local_deliver+0xaa2/0xf40 net/ipv4/raw.c:204 ip_protocol_deliver_rcu+0x46/0x440 net/ipv4/ip_input.c:195 ip_local_deliver_finish+0x3bb/0x6f0 net/ipv4/ip_input.c:241 NF_HOOK+0x336/0x3c0 include/linux/netfilter.h:318 NF_HOOK+0x336/0x3c0 include/linux/netfilter.h:318 __netif_receive_skb_one_core net/core/dev.c:6209 [inline] __netif_receive_skb net/core/dev.c:6322 [inline] netif_receive_skb_internal net/core/dev.c:6408 [inline] netif_receive_skb+0x45b/0xbf0 net/core/dev.c:6467 tun_rx_batched+0x1de/0x790 drivers/net/tun.c:1487 tun_get_user+0x2bbc/0x43e0 drivers/net/tun.c:1955 tun_chr_write_iter+0x113/0x200 drivers/net/tun.c:2001 new_sync_write fs/read_write.c:595 [inline] vfs_write+0x61d/0xb90 fs/read_write.c:688 ksys_write+0x150/0x270 fs/read_write.c:740 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] do_int80_emulation+0x181/0x530 arch/x86/entry/syscall_32.c:172 asm_int80_emulation+0x1a/0x20 arch/x86/include/asm/idtentry.h:621 } ... key at: [] fasync_insert_entry.__key+0x0/0x20 ... acquired at: __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:174 [inline] _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:240 kill_fasync_rcu fs/fcntl.c:1135 [inline] kill_fasync+0x199/0x4d0 fs/fcntl.c:1159 __pass_event drivers/input/evdev.c:240 [inline] evdev_pass_values+0x627/0xbd0 drivers/input/evdev.c:278 evdev_events+0x1e6/0x340 drivers/input/evdev.c:306 input_pass_values+0x288/0x890 drivers/input/input.c:128 input_event_dispose+0x330/0x6b0 drivers/input/input.c:342 input_inject_event+0x1dc/0x330 drivers/input/input.c:424 evdev_write+0x325/0x4c0 drivers/input/evdev.c:528 vfs_write+0x29a/0xb90 fs/read_write.c:686 ksys_write+0x150/0x270 fs/read_write.c:740 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x229/0x6e0 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e -> (&f_owner->lock){....}-{3:3} { INITIAL USE at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_write_lock_irq include/linux/rwlock_api_smp.h:213 [inline] _raw_write_lock_irq+0x3d/0x50 kernel/locking/spinlock.c:330 __f_setown+0x67/0x370 fs/fcntl.c:136 f_setown+0x23a/0x300 fs/fcntl.c:183 sock_ioctl+0x615/0x7f0 net/socket.c:1375 compat_sock_ioctl_trans net/socket.c:-1 [inline] compat_sock_ioctl+0x288/0xcb0 net/socket.c:3639 __do_compat_sys_ioctl fs/ioctl.c:695 [inline] __se_compat_sys_ioctl fs/ioctl.c:638 [inline] __ia32_compat_sys_ioctl+0x5ea/0x950 fs/ioctl.c:638 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x229/0x6e0 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e INITIAL READ USE at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:174 [inline] _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:240 send_sigurg+0x55/0x420 fs/fcntl.c:962 sk_send_sigurg+0x6c/0x2e0 net/core/sock.c:3672 tcp_check_urg+0x200/0x760 net/ipv4/tcp_input.c:6203 tcp_urg+0x15d/0x410 net/ipv4/tcp_input.c:6244 tcp_rcv_established+0xf7b/0x2800 net/ipv4/tcp_input.c:6647 tcp_v4_do_rcv+0x964/0x13c0 net/ipv4/tcp_ipv4.c:1852 sk_backlog_rcv include/net/sock.h:1190 [inline] __release_sock+0x265/0x3a0 net/core/sock.c:3216 release_sock+0x190/0x260 net/core/sock.c:3815 do_tcp_setsockopt+0x1a9e/0x2060 net/ipv4/tcp.c:4173 do_sock_setsockopt+0x17c/0x1b0 net/socket.c:2381 __sys_setsockopt net/socket.c:2406 [inline] __do_sys_setsockopt net/socket.c:2412 [inline] __se_sys_setsockopt net/socket.c:2409 [inline] __ia32_sys_setsockopt+0x13d/0x1b0 net/socket.c:2409 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x229/0x6e0 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e } ... key at: [] file_f_owner_allocate.__key+0x0/0x20 ... acquired at: __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:174 [inline] _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:240 send_sigio+0x38/0x370 fs/fcntl.c:918 kill_fasync_rcu fs/fcntl.c:1144 [inline] kill_fasync+0x24d/0x4d0 fs/fcntl.c:1159 lease_break_callback+0x26/0x30 fs/locks.c:577 __break_lease+0x81c/0x1e00 fs/locks.c:1657 break_deleg include/linux/filelock.h:504 [inline] try_break_deleg include/linux/filelock.h:523 [inline] vfs_mkdir+0x513/0x630 fs/namei.c:5257 filename_mkdirat+0x285/0x510 fs/namei.c:5294 __do_sys_mkdirat fs/namei.c:5315 [inline] __se_sys_mkdirat+0x35/0x150 fs/namei.c:5312 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x229/0x6e0 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e the dependencies between the lock to be acquired and SOFTIRQ-irq-unsafe lock: -> (tasklist_lock){.+.+}-{3:3} { HARDIRQ-ON-R at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_read_lock include/linux/rwlock_api_smp.h:163 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:232 __do_wait+0xde/0x740 kernel/exit.c:1677 do_wait+0x1e7/0x510 kernel/exit.c:1721 kernel_wait+0xd6/0x1c0 kernel/exit.c:1897 call_usermodehelper_exec_sync kernel/umh.c:136 [inline] call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163 process_one_work kernel/workqueue.c:3302 [inline] process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3385 worker_thread+0xa53/0xfc0 kernel/workqueue.c:3466 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 SOFTIRQ-ON-R at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_read_lock include/linux/rwlock_api_smp.h:163 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:232 __do_wait+0xde/0x740 kernel/exit.c:1677 do_wait+0x1e7/0x510 kernel/exit.c:1721 kernel_wait+0xd6/0x1c0 kernel/exit.c:1897 call_usermodehelper_exec_sync kernel/umh.c:136 [inline] call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163 process_one_work kernel/workqueue.c:3302 [inline] process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3385 worker_thread+0xa53/0xfc0 kernel/workqueue.c:3466 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 INITIAL USE at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_write_lock_irq include/linux/rwlock_api_smp.h:213 [inline] _raw_write_lock_irq+0x3d/0x50 kernel/locking/spinlock.c:330 copy_process+0x2b5e/0x4450 kernel/fork.c:2413 kernel_clone+0x284/0x8f0 kernel/fork.c:2723 user_mode_thread+0x110/0x180 kernel/fork.c:2799 rest_init+0x23/0x300 init/main.c:727 start_kernel+0x38a/0x3e0 init/main.c:1220 x86_64_start_reservations+0x24/0x30 arch/x86/kernel/head64.c:310 x86_64_start_kernel+0x143/0x1c0 arch/x86/kernel/head64.c:291 common_startup_64+0x13e/0x147 INITIAL READ USE at: lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_read_lock include/linux/rwlock_api_smp.h:163 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:232 __do_wait+0xde/0x740 kernel/exit.c:1677 do_wait+0x1e7/0x510 kernel/exit.c:1721 kernel_wait+0xd6/0x1c0 kernel/exit.c:1897 call_usermodehelper_exec_sync kernel/umh.c:136 [inline] call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163 process_one_work kernel/workqueue.c:3302 [inline] process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3385 worker_thread+0xa53/0xfc0 kernel/workqueue.c:3466 kthread+0x388/0x470 kernel/kthread.c:436 ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 } ... key at: [] tasklist_lock+0x18/0x40 ... acquired at: __raw_read_lock include/linux/rwlock_api_smp.h:163 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:232 send_sigio+0x101/0x370 fs/fcntl.c:932 kill_fasync_rcu fs/fcntl.c:1144 [inline] kill_fasync+0x24d/0x4d0 fs/fcntl.c:1159 lease_break_callback+0x26/0x30 fs/locks.c:577 __break_lease+0x81c/0x1e00 fs/locks.c:1657 vfs_truncate+0x449/0x540 fs/open.c:112 ksys_truncate+0xf3/0x1c0 fs/open.c:142 __do_compat_sys_truncate fs/open.c:160 [inline] __se_compat_sys_truncate fs/open.c:158 [inline] __ia32_compat_sys_truncate+0x5b/0x70 fs/open.c:158 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x229/0x6e0 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e stack backtrace: CPU: 0 UID: 0 PID: 28450 Comm: syz.3.6666 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 print_bad_irq_dependency kernel/locking/lockdep.c:2616 [inline] check_irq_usage kernel/locking/lockdep.c:2857 [inline] check_prev_add kernel/locking/lockdep.c:3169 [inline] check_prevs_add kernel/locking/lockdep.c:3284 [inline] validate_chain kernel/locking/lockdep.c:3908 [inline] __lock_acquire+0x2a94/0x2cf0 kernel/locking/lockdep.c:5237 lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868 __raw_read_lock include/linux/rwlock_api_smp.h:163 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:232 send_sigio+0x101/0x370 fs/fcntl.c:932 kill_fasync_rcu fs/fcntl.c:1144 [inline] kill_fasync+0x24d/0x4d0 fs/fcntl.c:1159 lease_break_callback+0x26/0x30 fs/locks.c:577 __break_lease+0x81c/0x1e00 fs/locks.c:1657 vfs_truncate+0x449/0x540 fs/open.c:112 ksys_truncate+0xf3/0x1c0 fs/open.c:142 __do_compat_sys_truncate fs/open.c:160 [inline] __se_compat_sys_truncate fs/open.c:158 [inline] __ia32_compat_sys_truncate+0x5b/0x70 fs/open.c:158 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x229/0x6e0 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e RIP: 0023:0xf704f01c Code: 90 85 d2 74 0a 89 ce 81 e6 ff 0f 00 00 89 32 85 c0 74 05 c1 e9 0c 89 08 31 c0 5e 5d c3 90 0f 1f 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 58 b8 RSP: 002b:00000000f541c50c EFLAGS: 00000206 ORIG_RAX: 000000000000005c RAX: ffffffffffffffda RBX: 0000000080000040 RCX: 0000000000000000 RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 ---------------- Code disassembly (best guess): 0: 90 nop 1: 85 d2 test %edx,%edx 3: 74 0a je 0xf 5: 89 ce mov %ecx,%esi 7: 81 e6 ff 0f 00 00 and $0xfff,%esi d: 89 32 mov %esi,(%rdx) f: 85 c0 test %eax,%eax 11: 74 05 je 0x18 13: c1 e9 0c shr $0xc,%ecx 16: 89 08 mov %ecx,(%rax) 18: 31 c0 xor %eax,%eax 1a: 5e pop %rsi 1b: 5d pop %rbp 1c: c3 ret 1d: 90 nop 1e: 0f 1f 00 nopl (%rax) 21: 51 push %rcx 22: 52 push %rdx 23: 55 push %rbp 24: 89 e5 mov %esp,%ebp 26: 0f 34 sysenter 28: cd 80 int $0x80 * 2a: 5d pop %rbp <-- trapping instruction 2b: 5a pop %rdx 2c: 59 pop %rcx 2d: c3 ret 2e: 90 nop 2f: 90 nop 30: 90 nop 31: 90 nop 32: 90 nop 33: 90 nop 34: 90 nop 35: 90 nop 36: 90 nop 37: 90 nop 38: 90 nop 39: 90 nop 3a: 90 nop 3b: 90 nop 3c: 90 nop 3d: 90 nop 3e: 58 pop %rax 3f: b8 .byte 0xb8