===================================================== WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected syzkaller #0 Tainted: G L ----------------------------------------------------- syz.4.28568/22938 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire: ffff88807ffc0750 (&new->fa_lock){....}-{3:3}, at: kill_fasync_rcu fs/fcntl.c:1135 [inline] ffff88807ffc0750 (&new->fa_lock){....}-{3:3}, at: kill_fasync+0x199/0x4d0 fs/fcntl.c:1159 and this task is already holding: ffff88806a1ee028 (&client->buffer_lock){..-.}-{3:3}, at: spin_lock include/linux/spinlock.h:341 [inline] ffff88806a1ee028 (&client->buffer_lock){..-.}-{3:3}, at: evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261 which would create a new lock dependency: (&client->buffer_lock){..-.}-{3:3} -> (&new->fa_lock){....}-{3:3} but this new dependency connects a SOFTIRQ-irq-safe lock: (&client->buffer_lock){..-.}-{3:3} ... which became SOFTIRQ-irq-safe at: lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_spin_lock include/linux/spinlock_api_smp.h:158 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:341 [inline] evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261 evdev_events+0x1e6/0x340 drivers/input/evdev.c:306 input_pass_values+0x288/0x890 drivers/input/input.c:128 input_event_dispose+0x3e5/0x6b0 drivers/input/input.c:353 input_inject_event+0x1dd/0x340 drivers/input/input.c:424 led_trigger_event+0x138/0x210 drivers/leds/led-triggers.c:420 kbd_propagate_led_state drivers/tty/vt/keyboard.c:1065 [inline] kbd_bh+0x1f3/0x300 drivers/tty/vt/keyboard.c:1244 tasklet_action_common+0x2da/0x4b0 kernel/softirq.c:925 handle_softirqs+0x22a/0x870 kernel/softirq.c:622 run_ksoftirqd+0x36/0x60 kernel/softirq.c:1063 smpboot_thread_fn+0x541/0xa50 kernel/smpboot.c:160 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 to a SOFTIRQ-irq-unsafe lock: (tasklist_lock){.+.+}-{3:3} ... which became SOFTIRQ-irq-unsafe at: ... lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_read_lock include/linux/rwlock_api_smp.h:161 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228 __do_wait+0xde/0x740 kernel/exit.c:1672 do_wait+0x1e7/0x540 kernel/exit.c:1716 kernel_wait+0xd6/0x1c0 kernel/exit.c:1892 call_usermodehelper_exec_sync kernel/umh.c:136 [inline] call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0xb02/0x1830 kernel/workqueue.c:3358 worker_thread+0xa50/0xfc0 kernel/workqueue.c:3439 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 other info that might help us debug this: Chain exists of: &client->buffer_lock --> &new->fa_lock --> tasklist_lock Possible interrupt unsafe locking scenario: CPU0 CPU1 ---- ---- lock(tasklist_lock); local_irq_disable(); lock(&client->buffer_lock); lock(&new->fa_lock); lock(&client->buffer_lock); *** DEADLOCK *** 7 locks held by syz.4.28568/22938: #0: ffff88802b6d1118 (&evdev->mutex){+.+.}-{4:4}, at: evdev_write+0x1ae/0x4c0 drivers/input/evdev.c:511 #1: ffff88801e7cf230 (&dev->event_lock#2){..-.}-{3:3}, at: class_spinlock_irqsave_constructor include/linux/spinlock.h:618 [inline] #1: ffff88801e7cf230 (&dev->event_lock#2){..-.}-{3:3}, at: input_inject_event+0xa5/0x340 drivers/input/input.c:419 #2: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline] #2: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline] #2: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: class_rcu_constructor include/linux/rcupdate.h:1193 [inline] #2: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: input_inject_event+0xb6/0x340 drivers/input/input.c:420 #3: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline] #3: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline] #3: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: class_rcu_constructor include/linux/rcupdate.h:1193 [inline] #3: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: input_pass_values+0x8d/0x890 drivers/input/input.c:119 #4: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline] #4: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline] #4: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: evdev_events+0x79/0x340 drivers/input/evdev.c:298 #5: ffff88806a1ee028 (&client->buffer_lock){..-.}-{3:3}, at: spin_lock include/linux/spinlock.h:341 [inline] #5: ffff88806a1ee028 (&client->buffer_lock){..-.}-{3:3}, at: evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261 #6: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:312 [inline] #6: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:850 [inline] #6: ffffffff8e7603e0 (rcu_read_lock){....}-{1:3}, at: kill_fasync+0x53/0x4d0 fs/fcntl.c:1158 the dependencies between SOFTIRQ-irq-safe lock and the holding lock: -> (&client->buffer_lock){..-.}-{3:3} { IN-SOFTIRQ-W at: lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_spin_lock include/linux/spinlock_api_smp.h:158 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:341 [inline] evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261 evdev_events+0x1e6/0x340 drivers/input/evdev.c:306 input_pass_values+0x288/0x890 drivers/input/input.c:128 input_event_dispose+0x3e5/0x6b0 drivers/input/input.c:353 input_inject_event+0x1dd/0x340 drivers/input/input.c:424 led_trigger_event+0x138/0x210 drivers/leds/led-triggers.c:420 kbd_propagate_led_state drivers/tty/vt/keyboard.c:1065 [inline] kbd_bh+0x1f3/0x300 drivers/tty/vt/keyboard.c:1244 tasklet_action_common+0x2da/0x4b0 kernel/softirq.c:925 handle_softirqs+0x22a/0x870 kernel/softirq.c:622 run_ksoftirqd+0x36/0x60 kernel/softirq.c:1063 smpboot_thread_fn+0x541/0xa50 kernel/smpboot.c:160 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 INITIAL USE at: lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_spin_lock include/linux/spinlock_api_smp.h:158 [inline] _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154 spin_lock include/linux/spinlock.h:341 [inline] evdev_handle_get_val+0x70/0x9f0 drivers/input/evdev.c:898 evdev_do_ioctl drivers/input/evdev.c:-1 [inline] evdev_ioctl_handler+0x127b/0x1fe0 drivers/input/evdev.c:1270 __do_compat_sys_ioctl fs/ioctl.c:695 [inline] __se_compat_sys_ioctl fs/ioctl.c:638 [inline] __ia32_compat_sys_ioctl+0x5ea/0x950 fs/ioctl.c:638 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x20d/0x640 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e } ... key at: [] evdev_open.__key.27+0x0/0x20 the dependencies between the lock to be acquired and SOFTIRQ-irq-unsafe lock: -> (tasklist_lock){.+.+}-{3:3} { HARDIRQ-ON-R at: lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_read_lock include/linux/rwlock_api_smp.h:161 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228 __do_wait+0xde/0x740 kernel/exit.c:1672 do_wait+0x1e7/0x540 kernel/exit.c:1716 kernel_wait+0xd6/0x1c0 kernel/exit.c:1892 call_usermodehelper_exec_sync kernel/umh.c:136 [inline] call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0xb02/0x1830 kernel/workqueue.c:3358 worker_thread+0xa50/0xfc0 kernel/workqueue.c:3439 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 SOFTIRQ-ON-R at: lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_read_lock include/linux/rwlock_api_smp.h:161 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228 __do_wait+0xde/0x740 kernel/exit.c:1672 do_wait+0x1e7/0x540 kernel/exit.c:1716 kernel_wait+0xd6/0x1c0 kernel/exit.c:1892 call_usermodehelper_exec_sync kernel/umh.c:136 [inline] call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0xb02/0x1830 kernel/workqueue.c:3358 worker_thread+0xa50/0xfc0 kernel/workqueue.c:3439 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 INITIAL USE at: lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_write_lock_irq include/linux/rwlock_api_smp.h:211 [inline] _raw_write_lock_irq+0x3d/0x50 kernel/locking/spinlock.c:326 copy_process+0x247a/0x3cf0 kernel/fork.c:2369 kernel_clone+0x248/0x8e0 kernel/fork.c:2654 user_mode_thread+0x110/0x180 kernel/fork.c:2730 rest_init+0x23/0x300 init/main.c:725 start_kernel+0x385/0x3d0 init/main.c:1210 x86_64_start_reservations+0x24/0x30 arch/x86/kernel/head64.c:310 x86_64_start_kernel+0x143/0x1c0 arch/x86/kernel/head64.c:291 common_startup_64+0x13e/0x147 INITIAL READ USE at: lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_read_lock include/linux/rwlock_api_smp.h:161 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228 __do_wait+0xde/0x740 kernel/exit.c:1672 do_wait+0x1e7/0x540 kernel/exit.c:1716 kernel_wait+0xd6/0x1c0 kernel/exit.c:1892 call_usermodehelper_exec_sync kernel/umh.c:136 [inline] call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0xb02/0x1830 kernel/workqueue.c:3358 worker_thread+0xa50/0xfc0 kernel/workqueue.c:3439 kthread+0x388/0x470 kernel/kthread.c:467 ret_from_fork+0x51e/0xb90 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 } ... key at: [] tasklist_lock+0x18/0x40 ... acquired at: __raw_read_lock include/linux/rwlock_api_smp.h:161 [inline] _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228 send_sigurg+0x12b/0x420 fs/fcntl.c:978 sk_send_sigurg+0x6c/0x2e0 net/core/sock.c:3669 queue_oob+0x42c/0x4f0 net/unix/af_unix.c:2352 unix_stream_sendmsg+0xcb1/0xe80 net/unix/af_unix.c:2486 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0xa68/0xad0 net/socket.c:2592 ___sys_sendmsg+0x2a5/0x360 net/socket.c:2646 __sys_sendmsg+0x183/0x260 net/socket.c:2678 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x20d/0x640 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e -> (&f_owner->lock){....}-{3:3} { INITIAL USE at: lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_write_lock_irq include/linux/rwlock_api_smp.h:211 [inline] _raw_write_lock_irq+0x3d/0x50 kernel/locking/spinlock.c:326 __f_setown+0x67/0x370 fs/fcntl.c:136 generic_add_lease fs/locks.c:1908 [inline] generic_setlease+0xacf/0xff0 fs/locks.c:1984 do_fcntl_add_lease+0x35e/0x470 fs/locks.c:2086 fcntl_setlease+0x123/0x180 fs/locks.c:2111 do_fcntl+0x8b3/0x1a20 fs/fcntl.c:535 do_compat_fcntl64+0x51e/0x7e0 fs/fcntl.c:800 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x20d/0x640 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e INITIAL READ USE at: lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:172 [inline] _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:236 send_sigurg+0x55/0x420 fs/fcntl.c:962 sk_send_sigurg+0x6c/0x2e0 net/core/sock.c:3669 queue_oob+0x42c/0x4f0 net/unix/af_unix.c:2352 unix_stream_sendmsg+0xcb1/0xe80 net/unix/af_unix.c:2486 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0xa68/0xad0 net/socket.c:2592 ___sys_sendmsg+0x2a5/0x360 net/socket.c:2646 __sys_sendmmsg+0x2e7/0x4e0 net/socket.c:2728 __compat_sys_sendmmsg net/compat.c:360 [inline] __do_compat_sys_sendmmsg net/compat.c:367 [inline] __se_compat_sys_sendmmsg net/compat.c:364 [inline] __ia32_compat_sys_sendmmsg+0xa2/0xc0 net/compat.c:364 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x20d/0x640 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e } ... key at: [] file_f_owner_allocate.__key+0x0/0x20 ... acquired at: __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:172 [inline] _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:236 send_sigio+0x38/0x370 fs/fcntl.c:918 kill_fasync_rcu fs/fcntl.c:1144 [inline] kill_fasync+0x24d/0x4d0 fs/fcntl.c:1159 lease_break_callback+0x26/0x30 fs/locks.c:577 __break_lease+0x81c/0x1e80 fs/locks.c:1657 break_lease include/linux/filelock.h:484 [inline] do_dentry_open+0x1010/0x14e0 fs/open.c:940 vfs_open+0x3b/0x340 fs/open.c:1081 do_open fs/namei.c:4671 [inline] path_openat+0x2e08/0x3860 fs/namei.c:4830 do_file_open+0x23e/0x4a0 fs/namei.c:4859 do_sys_openat2+0x113/0x200 fs/open.c:1366 do_sys_open fs/open.c:1372 [inline] __do_compat_sys_openat fs/open.c:1434 [inline] __se_compat_sys_openat fs/open.c:1432 [inline] __ia32_compat_sys_openat+0x131/0x160 fs/open.c:1432 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x20d/0x640 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e -> (&new->fa_lock){....}-{3:3} { INITIAL USE at: lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_write_lock_irq include/linux/rwlock_api_smp.h:211 [inline] _raw_write_lock_irq+0x3d/0x50 kernel/locking/spinlock.c:326 fasync_remove_entry+0xf1/0x1c0 fs/fcntl.c:1012 __fput+0x8a5/0xa70 fs/file_table.c:466 task_work_run+0x1d9/0x270 kernel/task_work.c:233 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] __exit_to_user_mode_loop kernel/entry/common.c:67 [inline] exit_to_user_mode_loop+0xed/0x480 kernel/entry/common.c:98 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:325 [inline] __do_fast_syscall_32+0x415/0x640 arch/x86/entry/syscall_32.c:310 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e INITIAL READ USE at: lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:172 [inline] _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:236 kill_fasync_rcu fs/fcntl.c:1135 [inline] kill_fasync+0x199/0x4d0 fs/fcntl.c:1159 wakeup_pipe_readers fs/splice.c:183 [inline] vmsplice_to_pipe fs/splice.c:1558 [inline] __do_sys_vmsplice fs/splice.c:1610 [inline] __se_sys_vmsplice+0x100d/0x1490 fs/splice.c:1580 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x20d/0x640 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e } ... key at: [] fasync_insert_entry.__key+0x0/0x20 ... acquired at: __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:172 [inline] _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:236 kill_fasync_rcu fs/fcntl.c:1135 [inline] kill_fasync+0x199/0x4d0 fs/fcntl.c:1159 __pass_event drivers/input/evdev.c:240 [inline] evdev_pass_values+0x627/0xbd0 drivers/input/evdev.c:278 evdev_events+0x1e6/0x340 drivers/input/evdev.c:306 input_pass_values+0x288/0x890 drivers/input/input.c:128 input_event_dispose+0x330/0x6b0 drivers/input/input.c:342 input_inject_event+0x1dd/0x340 drivers/input/input.c:424 evdev_write+0x325/0x4c0 drivers/input/evdev.c:528 vfs_write+0x29a/0xb90 fs/read_write.c:686 ksys_write+0x150/0x270 fs/read_write.c:740 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x20d/0x640 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e stack backtrace: CPU: 0 UID: 0 PID: 22938 Comm: syz.4.28568 Tainted: G L syzkaller #0 PREEMPT(full) Tainted: [L]=SOFTLOCKUP Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120 print_bad_irq_dependency kernel/locking/lockdep.c:2616 [inline] check_irq_usage kernel/locking/lockdep.c:2857 [inline] check_prev_add kernel/locking/lockdep.c:3169 [inline] check_prevs_add kernel/locking/lockdep.c:3284 [inline] validate_chain kernel/locking/lockdep.c:3908 [inline] __lock_acquire+0x2a94/0x2cf0 kernel/locking/lockdep.c:5237 lock_acquire+0xf0/0x2e0 kernel/locking/lockdep.c:5868 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:172 [inline] _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:236 kill_fasync_rcu fs/fcntl.c:1135 [inline] kill_fasync+0x199/0x4d0 fs/fcntl.c:1159 __pass_event drivers/input/evdev.c:240 [inline] evdev_pass_values+0x627/0xbd0 drivers/input/evdev.c:278 evdev_events+0x1e6/0x340 drivers/input/evdev.c:306 input_pass_values+0x288/0x890 drivers/input/input.c:128 input_event_dispose+0x330/0x6b0 drivers/input/input.c:342 input_inject_event+0x1dd/0x340 drivers/input/input.c:424 evdev_write+0x325/0x4c0 drivers/input/evdev.c:528 vfs_write+0x29a/0xb90 fs/read_write.c:686 ksys_write+0x150/0x270 fs/read_write.c:740 do_syscall_32_irqs_on arch/x86/entry/syscall_32.c:83 [inline] __do_fast_syscall_32+0x20d/0x640 arch/x86/entry/syscall_32.c:307 do_fast_syscall_32+0x33/0x70 arch/x86/entry/syscall_32.c:332 entry_SYSENTER_compat_after_hwframe+0x84/0x8e RIP: 0023:0xf7f78f6c Code: 90 85 d2 74 0a 89 ce 81 e6 ff 0f 00 00 89 32 85 c0 74 05 c1 e9 0c 89 08 31 c0 5e 5d c3 90 0f 1f 00 51 52 55 89 e5 0f 34 cd 80 <5d> 5a 59 c3 58 b8 77 00 00 00 cd 80 0f 0b 90 90 90 90 90 90 b8 ad RSP: 002b:00000000f543650c EFLAGS: 00000206 ORIG_RAX: 0000000000000004 RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000080002200 RDX: 0000000000000130 RSI: 0000000000000000 RDI: 0000000000000000 RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000 R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 ---------------- Code disassembly (best guess): 0: 90 nop 1: 85 d2 test %edx,%edx 3: 74 0a je 0xf 5: 89 ce mov %ecx,%esi 7: 81 e6 ff 0f 00 00 and $0xfff,%esi d: 89 32 mov %esi,(%rdx) f: 85 c0 test %eax,%eax 11: 74 05 je 0x18 13: c1 e9 0c shr $0xc,%ecx 16: 89 08 mov %ecx,(%rax) 18: 31 c0 xor %eax,%eax 1a: 5e pop %rsi 1b: 5d pop %rbp 1c: c3 ret 1d: 90 nop 1e: 0f 1f 00 nopl (%rax) 21: 51 push %rcx 22: 52 push %rdx 23: 55 push %rbp 24: 89 e5 mov %esp,%ebp 26: 0f 34 sysenter 28: cd 80 int $0x80 * 2a: 5d pop %rbp <-- trapping instruction 2b: 5a pop %rdx 2c: 59 pop %rcx 2d: c3 ret 2e: 58 pop %rax 2f: b8 77 00 00 00 mov $0x77,%eax 34: cd 80 int $0x80 36: 0f 0b ud2 38: 90 nop 39: 90 nop 3a: 90 nop 3b: 90 nop 3c: 90 nop 3d: 90 nop 3e: b8 .byte 0xb8 3f: ad lods %ds:(%rsi),%eax