syzbot


possible deadlock in kbd_event

Status: upstream: reported on 2025/10/14 00:10
Subsystems: fs serial
Labels: prio:high
[Documentation on labels]
Reported-by: syzbot+781c8bb5e4d62cc883d3@syzkaller.appspotmail.com
First crash: 218d, last: 13h26m
✨ AI Jobs (2)
ID Workflow Result Correct Bug Created Started Finished Revision Error
2d792942-3bfe-45ad-9e49-7d472a063fa2 assessment-security DenialOfService: ✅ Exploitable: ❌ FilesystemTrigger: ❌ NetworkTrigger: ❌ PeripheralTrigger: ❌ RemoteTrigger: ❌ Unprivileged: ✅ UserNamespace: ❌ VMGuestTrigger: ❌ VMHostTrigger: ❌ possible deadlock in kbd_event 2026/05/12 21:47 2026/05/12 22:03 2026/05/12 22:57 ac1aeadbb84e4988133fcdf26ca80803a538fe09
6a5e4858-605f-4a7b-9c77-899114b2fd94 repro possible deadlock in kbd_event 2026/03/06 01:30 2026/03/06 01:30 2026/03/06 01:38 31e9c887f7dc24e04b3ca70d0d54fc34141844b0
Discussions (6)
Title Replies (including bot) Last reply
[syzbot] Monthly serial report (May 2026) 0 (1) 2026/05/02 20:32
[syzbot] Monthly serial report (Apr 2026) 0 (1) 2026/04/01 13:14
[syzbot] Monthly serial report (Nov 2025) 0 (1) 2025/11/27 12:43
[syzbot] Monthly kernfs report (Nov 2025) 0 (1) 2025/11/25 08:46
[syzbot] Monthly serial report (Oct 2025) 0 (1) 2025/10/27 05:54
[syzbot] [serial?] possible deadlock in kbd_event 0 (1) 2025/10/14 00:10

Sample crash report:
netlink: 'syz.9.10196': attribute type 2 has an invalid length.
=====================================================
WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected
syzkaller #0 Tainted: G             L     
-----------------------------------------------------
syz.9.10196/5141 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire:
ffff88807b868440 (&tty->flow.lock){....}-{3:3}, at: class_spinlock_irqsave_constructor include/linux/spinlock.h:619 [inline]
ffff88807b868440 (&tty->flow.lock){....}-{3:3}, at: stop_tty+0x2f/0x140 drivers/tty/tty_io.c:765

and this task is already holding:
ffffffff8f20b658 (kbd_event_lock){..-.}-{3:3}, at: spin_lock include/linux/spinlock.h:342 [inline]
ffffffff8f20b658 (kbd_event_lock){..-.}-{3:3}, at: class_spinlock_constructor include/linux/spinlock.h:587 [inline]
ffffffff8f20b658 (kbd_event_lock){..-.}-{3:3}, at: kbd_event+0xd7/0x42f0 drivers/tty/vt/keyboard.c:1578
which would create a new lock dependency:
 (kbd_event_lock){..-.}-{3:3} -> (&tty->flow.lock){....}-{3:3}

but this new dependency connects a SOFTIRQ-irq-safe lock:
 (kbd_event_lock){..-.}-{3:3}

... which became SOFTIRQ-irq-safe at:
  lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
  __raw_spin_lock include/linux/spinlock_api_smp.h:158 [inline]
  _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:158
  spin_lock include/linux/spinlock.h:342 [inline]
  class_spinlock_constructor include/linux/spinlock.h:587 [inline]
  kbd_event+0xd7/0x42f0 drivers/tty/vt/keyboard.c:1578
  input_handle_events_default+0xd4/0x1a0 drivers/input/input.c:2558
  input_pass_values+0x288/0x890 drivers/input/input.c:128
  input_event_dispose+0x3e5/0x6b0 drivers/input/input.c:353
  input_inject_event+0x1dc/0x330 drivers/input/input.c:424
  kd_sound_helper+0x101/0x210 drivers/tty/vt/keyboard.c:257
  input_handler_for_each_handle+0x101/0x1c0 drivers/input/input.c:2537
  call_timer_fn+0x192/0x5e0 kernel/time/timer.c:1748
  expire_timers kernel/time/timer.c:1799 [inline]
  __run_timers kernel/time/timer.c:2374 [inline]
  __run_timer_base+0x652/0x8b0 kernel/time/timer.c:2386
  run_timer_base kernel/time/timer.c:2395 [inline]
  run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2405
  handle_softirqs+0x22a/0x840 kernel/softirq.c:622
  __do_softirq kernel/softirq.c:656 [inline]
  invoke_softirq kernel/softirq.c:496 [inline]
  __irq_exit_rcu+0xca/0x220 kernel/softirq.c:735
  irq_exit_rcu+0x9/0x30 kernel/softirq.c:752
  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1061 [inline]
  sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1061
  asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
  __get_user_pages+0x22d/0x2720 mm/gup.c:-1
  __get_user_pages_locked mm/gup.c:1692 [inline]
  faultin_page_range+0x240/0x8c0 mm/gup.c:1912
  madvise_populate mm/madvise.c:969 [inline]
  madvise_do_behavior+0x2e5/0x540 mm/madvise.c:1927
  do_madvise+0x1fa/0x2e0 mm/madvise.c:2022
  __do_sys_madvise mm/madvise.c:2031 [inline]
  __se_sys_madvise mm/madvise.c:2029 [inline]
  __x64_sys_madvise+0xa6/0xc0 mm/madvise.c:2029
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
  entry_SYSCALL_64_after_hwframe+0x77/0x7f

to a SOFTIRQ-irq-unsafe lock:
 (tasklist_lock){.+.+}-{3:3}

... which became SOFTIRQ-irq-unsafe at:
...
  lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
  __raw_read_lock include/linux/rwlock_api_smp.h:163 [inline]
  _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:232
  __do_wait+0xde/0x740 kernel/exit.c:1679
  do_wait+0x1e7/0x510 kernel/exit.c:1723
  kernel_wait+0xd6/0x1c0 kernel/exit.c:1899
  call_usermodehelper_exec_sync kernel/umh.c:136 [inline]
  call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163
  process_one_work kernel/workqueue.c:3314 [inline]
  process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3397
  worker_thread+0xa53/0xfc0 kernel/workqueue.c:3478
  kthread+0x389/0x470 kernel/kthread.c:436
  ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245

other info that might help us debug this:

Chain exists of:
  kbd_event_lock --> &tty->flow.lock --> tasklist_lock

 Possible interrupt unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(tasklist_lock);
                               local_irq_disable();
                               lock(kbd_event_lock);
                               lock(&tty->flow.lock);
  <Interrupt>
    lock(kbd_event_lock);

 *** DEADLOCK ***

5 locks held by syz.9.10196/5141:
 #0: ffff88802c0da110 (&evdev->mutex){+.+.}-{4:4}, at: evdev_write+0x1ae/0x4c0 drivers/input/evdev.c:511
 #1: ffff88802bfa2230 (&dev->event_lock#2){..-.}-{3:3}, at: class_spinlock_irqsave_constructor include/linux/spinlock.h:619 [inline]
 #1: ffff88802bfa2230 (&dev->event_lock#2){..-.}-{3:3}, at: input_inject_event+0xa4/0x330 drivers/input/input.c:419
 #2: ffffffff8e95cde0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:300 [inline]
 #2: ffffffff8e95cde0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:838 [inline]
 #2: ffffffff8e95cde0 (rcu_read_lock){....}-{1:3}, at: class_rcu_constructor include/linux/rcupdate.h:1181 [inline]
 #2: ffffffff8e95cde0 (rcu_read_lock){....}-{1:3}, at: input_inject_event+0xb5/0x330 drivers/input/input.c:420
 #3: ffffffff8e95cde0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:300 [inline]
 #3: ffffffff8e95cde0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:838 [inline]
 #3: ffffffff8e95cde0 (rcu_read_lock){....}-{1:3}, at: class_rcu_constructor include/linux/rcupdate.h:1181 [inline]
 #3: ffffffff8e95cde0 (rcu_read_lock){....}-{1:3}, at: input_pass_values+0x8d/0x890 drivers/input/input.c:119
 #4: ffffffff8f20b658 (kbd_event_lock){..-.}-{3:3}, at: spin_lock include/linux/spinlock.h:342 [inline]
 #4: ffffffff8f20b658 (kbd_event_lock){..-.}-{3:3}, at: class_spinlock_constructor include/linux/spinlock.h:587 [inline]
 #4: ffffffff8f20b658 (kbd_event_lock){..-.}-{3:3}, at: kbd_event+0xd7/0x42f0 drivers/tty/vt/keyboard.c:1578

the dependencies between SOFTIRQ-irq-safe lock and the holding lock:
-> (kbd_event_lock){..-.}-{3:3} {
   IN-SOFTIRQ-W at:
                    lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                    __raw_spin_lock include/linux/spinlock_api_smp.h:158 [inline]
                    _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:158
                    spin_lock include/linux/spinlock.h:342 [inline]
                    class_spinlock_constructor include/linux/spinlock.h:587 [inline]
                    kbd_event+0xd7/0x42f0 drivers/tty/vt/keyboard.c:1578
                    input_handle_events_default+0xd4/0x1a0 drivers/input/input.c:2558
                    input_pass_values+0x288/0x890 drivers/input/input.c:128
                    input_event_dispose+0x3e5/0x6b0 drivers/input/input.c:353
                    input_inject_event+0x1dc/0x330 drivers/input/input.c:424
                    kd_sound_helper+0x101/0x210 drivers/tty/vt/keyboard.c:257
                    input_handler_for_each_handle+0x101/0x1c0 drivers/input/input.c:2537
                    call_timer_fn+0x192/0x5e0 kernel/time/timer.c:1748
                    expire_timers kernel/time/timer.c:1799 [inline]
                    __run_timers kernel/time/timer.c:2374 [inline]
                    __run_timer_base+0x652/0x8b0 kernel/time/timer.c:2386
                    run_timer_base kernel/time/timer.c:2395 [inline]
                    run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2405
                    handle_softirqs+0x22a/0x840 kernel/softirq.c:622
                    __do_softirq kernel/softirq.c:656 [inline]
                    invoke_softirq kernel/softirq.c:496 [inline]
                    __irq_exit_rcu+0xca/0x220 kernel/softirq.c:735
                    irq_exit_rcu+0x9/0x30 kernel/softirq.c:752
                    instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1061 [inline]
                    sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1061
                    asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
                    __get_user_pages+0x22d/0x2720 mm/gup.c:-1
                    __get_user_pages_locked mm/gup.c:1692 [inline]
                    faultin_page_range+0x240/0x8c0 mm/gup.c:1912
                    madvise_populate mm/madvise.c:969 [inline]
                    madvise_do_behavior+0x2e5/0x540 mm/madvise.c:1927
                    do_madvise+0x1fa/0x2e0 mm/madvise.c:2022
                    __do_sys_madvise mm/madvise.c:2031 [inline]
                    __se_sys_madvise mm/madvise.c:2029 [inline]
                    __x64_sys_madvise+0xa6/0xc0 mm/madvise.c:2029
                    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
                    do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
                    entry_SYSCALL_64_after_hwframe+0x77/0x7f
   INITIAL USE at:
                   lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                   __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:132 [inline]
                   _raw_spin_lock_irqsave+0x40/0x60 kernel/locking/spinlock.c:166
                   class_spinlock_irqsave_constructor include/linux/spinlock.h:619 [inline]
                   vt_reset_unicode+0x2b/0x160 drivers/tty/vt/keyboard.c:2194
                   reset_vc+0x68/0x1b0 drivers/tty/vt/vt_ioctl.c:966
                   vc_init+0x70/0x4a0 drivers/tty/vt/vt.c:3823
                   con_init+0x377/0x6a0 drivers/tty/vt/vt.c:3889
                   console_init+0x10b/0x4a0 kernel/printk/printk.c:4407
                   start_kernel+0x230/0x3e0 init/main.c:1157
                   x86_64_start_reservations+0x24/0x30 arch/x86/kernel/head64.c:310
                   x86_64_start_kernel+0x143/0x1c0 arch/x86/kernel/head64.c:291
                   common_startup_64+0x13e/0x147
 }
 ... key      at: [<ffffffff8f20b658>] kbd_event_lock+0x18/0xa0 keyboard.c:-1

the dependencies between the lock to be acquired
 and SOFTIRQ-irq-unsafe lock:
   -> (tasklist_lock){.+.+}-{3:3} {
      HARDIRQ-ON-R at:
                          lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                          __raw_read_lock include/linux/rwlock_api_smp.h:163 [inline]
                          _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:232
                          __do_wait+0xde/0x740 kernel/exit.c:1679
                          do_wait+0x1e7/0x510 kernel/exit.c:1723
                          kernel_wait+0xd6/0x1c0 kernel/exit.c:1899
                          call_usermodehelper_exec_sync kernel/umh.c:136 [inline]
                          call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163
                          process_one_work kernel/workqueue.c:3314 [inline]
                          process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3397
                          worker_thread+0xa53/0xfc0 kernel/workqueue.c:3478
                          kthread+0x389/0x470 kernel/kthread.c:436
                          ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158
                          ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
      SOFTIRQ-ON-R at:
                          lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                          __raw_read_lock include/linux/rwlock_api_smp.h:163 [inline]
                          _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:232
                          __do_wait+0xde/0x740 kernel/exit.c:1679
                          do_wait+0x1e7/0x510 kernel/exit.c:1723
                          kernel_wait+0xd6/0x1c0 kernel/exit.c:1899
                          call_usermodehelper_exec_sync kernel/umh.c:136 [inline]
                          call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163
                          process_one_work kernel/workqueue.c:3314 [inline]
                          process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3397
                          worker_thread+0xa53/0xfc0 kernel/workqueue.c:3478
                          kthread+0x389/0x470 kernel/kthread.c:436
                          ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158
                          ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
      INITIAL USE at:
                         lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                         __raw_write_lock_irq include/linux/rwlock_api_smp.h:213 [inline]
                         _raw_write_lock_irq+0x3d/0x50 kernel/locking/spinlock.c:330
                         copy_process+0x2b4c/0x4440 kernel/fork.c:2411
                         kernel_clone+0x284/0x8f0 kernel/fork.c:2721
                         user_mode_thread+0x110/0x180 kernel/fork.c:2797
                         rest_init+0x23/0x300 init/main.c:727
                         start_kernel+0x38a/0x3e0 init/main.c:1220
                         x86_64_start_reservations+0x24/0x30 arch/x86/kernel/head64.c:310
                         x86_64_start_kernel+0x143/0x1c0 arch/x86/kernel/head64.c:291
                         common_startup_64+0x13e/0x147
      INITIAL READ USE at:
                              lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                              __raw_read_lock include/linux/rwlock_api_smp.h:163 [inline]
                              _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:232
                              __do_wait+0xde/0x740 kernel/exit.c:1679
                              do_wait+0x1e7/0x510 kernel/exit.c:1723
                              kernel_wait+0xd6/0x1c0 kernel/exit.c:1899
                              call_usermodehelper_exec_sync kernel/umh.c:136 [inline]
                              call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163
                              process_one_work kernel/workqueue.c:3314 [inline]
                              process_scheduled_works+0xb5d/0x1860 kernel/workqueue.c:3397
                              worker_thread+0xa53/0xfc0 kernel/workqueue.c:3478
                              kthread+0x389/0x470 kernel/kthread.c:436
                              ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158
                              ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
    }
    ... key      at: [<ffffffff8e60a058>] tasklist_lock+0x18/0x40
    ... acquired at:
   __raw_read_lock include/linux/rwlock_api_smp.h:163 [inline]
   _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:232
   send_sigurg+0x12b/0x420 fs/fcntl.c:978
   sk_send_sigurg+0x6c/0x2e0 net/core/sock.c:3672
   queue_oob+0x42c/0x4f0 net/unix/af_unix.c:2368
   unix_stream_sendmsg+0xcb1/0xe80 net/unix/af_unix.c:2502
   sock_sendmsg_nosec net/socket.c:787 [inline]
   __sock_sendmsg net/socket.c:802 [inline]
   ____sys_sendmsg+0x972/0x9f0 net/socket.c:2698
   ___sys_sendmsg+0x2a5/0x360 net/socket.c:2752
   __sys_sendmmsg+0x27c/0x4e0 net/socket.c:2841
   __do_sys_sendmmsg net/socket.c:2868 [inline]
   __se_sys_sendmmsg net/socket.c:2865 [inline]
   __x64_sys_sendmmsg+0xa0/0xc0 net/socket.c:2865
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

  -> (&f_owner->lock){....}-{3:3} {
     INITIAL USE at:
                       lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                       __raw_write_lock_irq include/linux/rwlock_api_smp.h:213 [inline]
                       _raw_write_lock_irq+0x3d/0x50 kernel/locking/spinlock.c:330
                       __f_setown+0x67/0x370 fs/fcntl.c:136
                       generic_add_lease fs/locks.c:1924 [inline]
                       generic_setlease+0xacf/0xfd0 fs/locks.c:2000
                       do_fcntl_add_lease+0x35e/0x470 fs/locks.c:2102
                       fcntl_setlease+0x123/0x180 fs/locks.c:2127
                       do_fcntl+0x8b3/0x1a20 fs/fcntl.c:535
                       __do_sys_fcntl fs/fcntl.c:602 [inline]
                       __se_sys_fcntl+0xc8/0x150 fs/fcntl.c:587
                       do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
                       do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
                       entry_SYSCALL_64_after_hwframe+0x77/0x7f
     INITIAL READ USE at:
                            lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                            __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:174 [inline]
                            _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:240
                            send_sigio+0x38/0x370 fs/fcntl.c:918
                            dnotify_handle_event+0x169/0x440 fs/notify/dnotify/dnotify.c:113
                            fsnotify_handle_event fs/notify/fsnotify.c:301 [inline]
                            send_to_group fs/notify/fsnotify.c:375 [inline]
                            fsnotify+0x168e/0x1ae0 fs/notify/fsnotify.c:592
                            __fsnotify_parent+0x50d/0x620 fs/notify/fsnotify.c:238
                            fsnotify_parent include/linux/fsnotify.h:96 [inline]
                            fsnotify_path include/linux/fsnotify.h:113 [inline]
                            fsnotify_file include/linux/fsnotify.h:127 [inline]
                            fsnotify_access include/linux/fsnotify.h:425 [inline]
                            vfs_read+0x854/0xa70 fs/read_write.c:578
                            ksys_pread64 fs/read_write.c:765 [inline]
                            __do_sys_pread64 fs/read_write.c:773 [inline]
                            __se_sys_pread64 fs/read_write.c:770 [inline]
                            __x64_sys_pread64+0x199/0x230 fs/read_write.c:770
                            do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
                            do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
                            entry_SYSCALL_64_after_hwframe+0x77/0x7f
   }
   ... key      at: [<ffffffff9a4c2880>] file_f_owner_allocate.__key+0x0/0x20
   ... acquired at:
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:174 [inline]
   _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:240
   send_sigio+0x38/0x370 fs/fcntl.c:918
   kill_fasync_rcu fs/fcntl.c:1144 [inline]
   kill_fasync+0x24d/0x4d0 fs/fcntl.c:1159
   sock_wake_async+0x137/0x160 net/socket.c:-1
   sk_wake_async_rcu include/net/sock.h:2593 [inline]
   sock_def_readable+0x3c1/0x550 net/core/sock.c:3616
   queue_oob+0x45e/0x4f0 net/unix/af_unix.c:2370
   unix_stream_sendmsg+0xcb1/0xe80 net/unix/af_unix.c:2502
   sock_sendmsg_nosec net/socket.c:787 [inline]
   __sock_sendmsg net/socket.c:802 [inline]
   ____sys_sendmsg+0x972/0x9f0 net/socket.c:2698
   ___sys_sendmsg+0x2a5/0x360 net/socket.c:2752
   __sys_sendmmsg+0x27c/0x4e0 net/socket.c:2841
   __do_sys_sendmmsg net/socket.c:2868 [inline]
   __se_sys_sendmmsg net/socket.c:2865 [inline]
   __x64_sys_sendmmsg+0xa0/0xc0 net/socket.c:2865
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

 -> (&new->fa_lock){...-}-{3:3} {
    IN-SOFTIRQ-R at:
                      lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                      __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:174 [inline]
                      _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:240
                      kill_fasync_rcu fs/fcntl.c:1135 [inline]
                      kill_fasync+0x199/0x4d0 fs/fcntl.c:1159
                      sock_wake_async+0x137/0x160 net/socket.c:-1
                      sk_stream_write_space+0x394/0x520 net/core/stream.c:48
                      tcp_new_space net/ipv4/tcp_input.c:6051 [inline]
                      __tcp_check_space+0x504/0x9f0 net/ipv4/tcp_input.c:6068
                      tcp_check_space include/net/tcp.h:796 [inline]
                      tcp_data_snd_check net/ipv4/tcp_input.c:6076 [inline]
                      tcp_rcv_established+0x109e/0x2800 net/ipv4/tcp_input.c:6658
                      tcp_v4_do_rcv+0x903/0x13c0 net/ipv4/tcp_ipv4.c:1851
                      tcp_v4_rcv+0x26d4/0x3040 net/ipv4/tcp_ipv4.c:2244
                      ip_protocol_deliver_rcu+0x221/0x440 net/ipv4/ip_input.c:207
                      ip_local_deliver_finish+0x3bb/0x6f0 net/ipv4/ip_input.c:241
                      NF_HOOK+0x336/0x3c0 include/linux/netfilter.h:318
                      NF_HOOK+0x336/0x3c0 include/linux/netfilter.h:318
                      __netif_receive_skb_one_core net/core/dev.c:6202 [inline]
                      __netif_receive_skb net/core/dev.c:6315 [inline]
                      process_backlog+0xaa3/0x1950 net/core/dev.c:6666
                      __napi_poll+0xae/0x340 net/core/dev.c:7733
                      napi_poll net/core/dev.c:7796 [inline]
                      net_rx_action+0x627/0xf70 net/core/dev.c:7953
                      handle_softirqs+0x22a/0x840 kernel/softirq.c:622
                      run_ksoftirqd+0x36/0x60 kernel/softirq.c:1076
                      smpboot_thread_fn+0x541/0xa50 kernel/smpboot.c:160
                      kthread+0x389/0x470 kernel/kthread.c:436
                      ret_from_fork+0x514/0xb70 arch/x86/kernel/process.c:158
                      ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
    INITIAL USE at:
                     lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                     __raw_write_lock_irq include/linux/rwlock_api_smp.h:213 [inline]
                     _raw_write_lock_irq+0x3d/0x50 kernel/locking/spinlock.c:330
                     fasync_remove_entry+0xf1/0x1c0 fs/fcntl.c:1012
                     lease_modify+0x4f7/0x6c0 fs/locks.c:1514
                     locks_remove_lease fs/locks.c:2773 [inline]
                     locks_remove_file+0x5f0/0xf70 fs/locks.c:2798
                     __fput+0x3ae/0xa60 fs/file_table.c:502
                     task_work_run+0x1d9/0x270 kernel/task_work.c:233
                     resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
                     __exit_to_user_mode_loop kernel/entry/common.c:67 [inline]
                     exit_to_user_mode_loop+0xf3/0x4d0 kernel/entry/common.c:98
                     __exit_to_user_mode_prepare include/linux/irq-entry-common.h:207 [inline]
                     syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:238 [inline]
                     syscall_exit_to_user_mode include/linux/entry-common.h:318 [inline]
                     do_syscall_64+0x33e/0xf80 arch/x86/entry/syscall_64.c:100
                     entry_SYSCALL_64_after_hwframe+0x77/0x7f
    INITIAL READ USE at:
                          lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                          __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:174 [inline]
                          _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:240
                          kill_fasync_rcu fs/fcntl.c:1135 [inline]
                          kill_fasync+0x199/0x4d0 fs/fcntl.c:1159
                          anon_pipe_write+0x10d7/0x1480 fs/pipe.c:597
                          aio_write+0x5cd/0x870 fs/aio.c:1688
                          __io_submit_one fs/aio.c:-1 [inline]
                          io_submit_one+0x7bb/0x14c0 fs/aio.c:2107
                          __do_sys_io_submit fs/aio.c:2166 [inline]
                          __se_sys_io_submit+0x195/0x340 fs/aio.c:2136
                          do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
                          do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
                          entry_SYSCALL_64_after_hwframe+0x77/0x7f
  }
  ... key      at: [<ffffffff9a4c28a0>] fasync_insert_entry.__key+0x0/0x20
  ... acquired at:
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:174 [inline]
   _raw_read_lock_irqsave+0x48/0x60 kernel/locking/spinlock.c:240
   kill_fasync_rcu fs/fcntl.c:1135 [inline]
   kill_fasync+0x199/0x4d0 fs/fcntl.c:1159
   tty_wakeup drivers/tty/tty_io.c:515 [inline]
   __start_tty+0x18c/0x220 drivers/tty/tty_io.c:777
   start_tty drivers/tty/tty_io.c:794 [inline]
   tty_send_xchar+0x1cf/0x4b0 drivers/tty/tty_io.c:1153
   tty_ioctl+0x9c5/0xde0 drivers/tty/tty_io.c:2801
   vfs_ioctl fs/ioctl.c:51 [inline]
   __do_sys_ioctl fs/ioctl.c:597 [inline]
   __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> (&tty->flow.lock){....}-{3:3} {
   INITIAL USE at:
                   lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
                   __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:132 [inline]
                   _raw_spin_lock_irqsave+0x40/0x60 kernel/locking/spinlock.c:166
                   class_spinlock_irqsave_constructor include/linux/spinlock.h:619 [inline]
                   start_tty+0x1b/0x50 drivers/tty/tty_io.c:793
                   n_tty_set_termios+0xa7c/0x10a0 drivers/tty/n_tty.c:1848
                   tty_set_termios+0xdb3/0x1800 drivers/tty/tty_ioctl.c:348
                   set_termios+0x566/0x710 drivers/tty/tty_ioctl.c:516
                   tty_mode_ioctl+0x4a6/0x7d0 drivers/tty/tty_ioctl.c:-1
                   tty_ioctl+0x9c5/0xde0 drivers/tty/tty_io.c:2801
                   vfs_ioctl fs/ioctl.c:51 [inline]
                   __do_sys_ioctl fs/ioctl.c:597 [inline]
                   __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:583
                   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
                   do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
                   entry_SYSCALL_64_after_hwframe+0x77/0x7f
 }
 ... key      at: [<ffffffff9a7a2620>] alloc_tty_struct.__key.35+0x0/0x20
 ... acquired at:
   __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:132 [inline]
   _raw_spin_lock_irqsave+0x40/0x60 kernel/locking/spinlock.c:166
   class_spinlock_irqsave_constructor include/linux/spinlock.h:619 [inline]
   stop_tty+0x2f/0x140 drivers/tty/tty_io.c:765
   kbd_keycode drivers/tty/vt/keyboard.c:1565 [inline]
   kbd_event+0x2f91/0x42f0 drivers/tty/vt/keyboard.c:1583
   input_handle_events_default+0xd4/0x1a0 drivers/input/input.c:2558
   input_pass_values+0x288/0x890 drivers/input/input.c:128
   input_event_dispose+0x330/0x6b0 drivers/input/input.c:342
   input_inject_event+0x1dc/0x330 drivers/input/input.c:424
   evdev_write+0x325/0x4c0 drivers/input/evdev.c:528
   vfs_write+0x29a/0xb90 fs/read_write.c:686
   ksys_write+0x150/0x270 fs/read_write.c:740
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f


stack backtrace:
CPU: 0 UID: 0 PID: 5141 Comm: syz.9.10196 Tainted: G             L      syzkaller #0 PREEMPT(full) 
Tainted: [L]=SOFTLOCKUP
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026
Call Trace:
 <TASK>
 dump_stack_lvl+0xe8/0x150 lib/dump_stack.c:120
 print_bad_irq_dependency kernel/locking/lockdep.c:2616 [inline]
 check_irq_usage kernel/locking/lockdep.c:2857 [inline]
 check_prev_add kernel/locking/lockdep.c:3169 [inline]
 check_prevs_add kernel/locking/lockdep.c:3284 [inline]
 validate_chain kernel/locking/lockdep.c:3908 [inline]
 __lock_acquire+0x2a94/0x2cf0 kernel/locking/lockdep.c:5237
 lock_acquire+0x106/0x350 kernel/locking/lockdep.c:5868
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:132 [inline]
 _raw_spin_lock_irqsave+0x40/0x60 kernel/locking/spinlock.c:166
 class_spinlock_irqsave_constructor include/linux/spinlock.h:619 [inline]
 stop_tty+0x2f/0x140 drivers/tty/tty_io.c:765
 kbd_keycode drivers/tty/vt/keyboard.c:1565 [inline]
 kbd_event+0x2f91/0x42f0 drivers/tty/vt/keyboard.c:1583
 input_handle_events_default+0xd4/0x1a0 drivers/input/input.c:2558
 input_pass_values+0x288/0x890 drivers/input/input.c:128
 input_event_dispose+0x330/0x6b0 drivers/input/input.c:342
 input_inject_event+0x1dc/0x330 drivers/input/input.c:424
 evdev_write+0x325/0x4c0 drivers/input/evdev.c:528
 vfs_write+0x29a/0xb90 fs/read_write.c:686
 ksys_write+0x150/0x270 fs/read_write.c:740
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0x15f/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f9ee579ce59
Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f9ee65d0028 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f9ee5a15fa0 RCX: 00007f9ee579ce59
RDX: 0000000000002250 RSI: 0000200000000040 RDI: 000000000000000a
RBP: 00007f9ee5832d6f R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f9ee5a16038 R14: 00007f9ee5a15fa0 R15: 00007f9ee5b3fa48
 </TASK>

Crashes (185):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/05/16 10:38 upstream 6916d5703ddf a15a64a6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/05/13 23:25 upstream e1914add2799 6ccb967e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/05/07 04:03 upstream 74fe02ce122a cbcd9ea0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/05/04 10:29 upstream 6d35786de281 85f1bcf2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/05/03 19:11 upstream f377d0025eb0 a0d91488 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/05/03 15:40 upstream 66edb901bf87 a0d91488 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/05/03 01:53 upstream 66edb901bf87 a0d91488 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/23 00:26 upstream 2a4c0c11c019 b10da5ec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/22 10:52 upstream 6596a02b2078 4595e353 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/20 21:00 upstream a5d1079c28a5 e65da4ee .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/20 16:10 upstream c1f49dea2b8f e65da4ee .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/20 01:38 upstream c1f49dea2b8f 303e2802 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/19 12:31 upstream faeab166167f 303e2802 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/18 22:24 upstream eb5249b12507 303e2802 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/18 16:23 upstream 8541d8f725c6 303e2802 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/18 07:57 upstream 8541d8f725c6 303e2802 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/18 06:25 upstream 8541d8f725c6 5be7a9de .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/17 17:59 upstream 43cfbdda5af6 24ecfc1e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/16 17:00 upstream 1d51b370a0f8 321ae225 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/15 15:01 upstream 1f5ffc672165 c441f497 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/13 10:50 upstream 028ef9c96e96 9530ccf9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/13 02:37 upstream 028ef9c96e96 38c8e246 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/10 09:42 upstream 9a9c8ce300cd 38c8e246 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/09 17:44 upstream 8b02520ec5f7 38c8e246 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/06 10:02 upstream 591cd656a1bf 4440e7c2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/06 07:02 upstream 1791c390149f 4440e7c2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/04/04 10:54 upstream 7ca6d1cfec80 4440e7c2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/31 13:52 upstream d0c3bcd5b897 aeea1c72 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/30 17:03 upstream 7aaa8047eafd 458630d8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/27 20:02 upstream 46b513250491 74a13a23 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/26 06:45 upstream d2a43e7f89da c6143aac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/21 08:08 upstream c612261bedd6 5b92003d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/15 06:50 upstream 69237f8c1f69 ee8d34d6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/12 23:45 upstream 0257f64bdac7 2f7f359d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/12 10:37 upstream 80234b5ab240 4efadf07 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/11 00:56 upstream b4f0dd314b39 4683d576 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/10 21:06 upstream 1f318b96cc84 4683d576 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/04 11:36 upstream 0031c06807cf e6b6b96b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/03/03 13:54 upstream af4e9ef3d784 4180d919 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/02/28 20:25 upstream 9197e5949a41 43249bac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/02/26 13:49 upstream d9d32e5bd5a4 e0f78d93 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/02/20 17:24 upstream 8bf22c33e7a1 741f5161 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in kbd_event
2026/02/18 18:31 upstream 2961f841b025 77d4d919 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/02/09 11:26 upstream 05f7e89ab973 df949cd9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/02/08 17:12 upstream e7aa57247700 4c131dc4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/02/02 11:10 upstream 18f7fcd5e69a 018ebef2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/01/18 06:48 upstream e84d960149e7 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/01/15 22:20 upstream 944aacb68baf d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in kbd_event
2025/10/13 18:09 upstream 3a8660878839 b6605ba8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2025/10/10 00:07 upstream 18a7e218cfcd 7e2882b3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in kbd_event
2026/05/14 00:33 upstream e1914add2799 6ccb967e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in kbd_event
2026/04/07 21:30 upstream 3036cd0d3328 628666c6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in kbd_event
2026/01/20 00:38 linux-next d08c85ac8894 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-rust-kasan-gce possible deadlock in kbd_event
2025/10/10 07:40 linux-next 0b2f041c47ac ff1712fe .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in kbd_event
* Struck through repros no longer work on HEAD.