syzbot


possible deadlock in evdev_pass_values

Status: upstream: reported on 2025/07/29 23:28
Reported-by: syzbot+f1cb8bac1f12be8a38f7@syzkaller.appspotmail.com
First crash: 23d, last: 14d
Similar bugs (10)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream possible deadlock in evdev_pass_values fuse kernfs 4 351 863d 1685d 0/29 closed as dup on 2021/07/02 09:55
linux-5.15 possible deadlock in evdev_pass_values (3) 4 11 359d 392d 0/3 auto-obsoleted due to no activity on 2024/11/05 23:17
linux-6.1 possible deadlock in evdev_pass_values (3) 4 17 444d 511d 0/3 auto-obsoleted due to no activity on 2024/08/12 15:10
linux-5.15 possible deadlock in evdev_pass_values (4) 4 2 199d 210d 0/3 auto-obsoleted due to no activity on 2025/05/14 14:17
linux-6.1 possible deadlock in evdev_pass_values 4 1 782d 782d 0/3 auto-obsoleted due to no activity on 2023/10/09 19:52
linux-5.15 possible deadlock in evdev_pass_values 4 6 660d 763d 0/3 auto-obsoleted due to no activity on 2024/02/09 07:09
upstream possible deadlock in evdev_pass_values (2) input 4 1354 6d09h 854d 0/29 upstream: reported on 2023/04/21 09:42
linux-6.1 possible deadlock in evdev_pass_values (4) 4 11 9d13h 141d 0/3 upstream: reported on 2025/04/03 09:00
linux-5.15 possible deadlock in evdev_pass_values (2) 4 22 478d 555d 0/3 auto-obsoleted due to no activity on 2024/07/10 03:27
linux-6.1 possible deadlock in evdev_pass_values (2) 4 1 643d 643d 0/3 auto-obsoleted due to no activity on 2024/02/25 22:49

Sample crash report:
=====================================================
WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected
6.6.101-syzkaller #0 Not tainted
-----------------------------------------------------
syz.6.13001/12090 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire:
ffff88801ee9cde0 (&new->fa_lock){....}-{2:2}, at: kill_fasync_rcu fs/fcntl.c:990 [inline]
ffff88801ee9cde0 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x192/0x4b0 fs/fcntl.c:1011

and this task is already holding:
ffff88805ed09028 (&client->buffer_lock){..-.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
ffff88805ed09028 (&client->buffer_lock){..-.}-{2:2}, at: evdev_pass_values+0xcb/0xab0 drivers/input/evdev.c:261
which would create a new lock dependency:
 (&client->buffer_lock){..-.}-{2:2} -> (&new->fa_lock){....}-{2:2}

but this new dependency connects a SOFTIRQ-irq-safe lock:
 (&client->buffer_lock){..-.}-{2:2}

... which became SOFTIRQ-irq-safe at:
  lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
  __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
  _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
  spin_lock include/linux/spinlock.h:351 [inline]
  evdev_pass_values+0xcb/0xab0 drivers/input/evdev.c:261
  evdev_events+0x1d8/0x330 drivers/input/evdev.c:306
  input_to_handler drivers/input/input.c:129 [inline]
  input_pass_values+0x907/0x1300 drivers/input/input.c:161
  input_event_dispose+0x346/0x6c0 drivers/input/input.c:378
  input_event+0x8c/0xc0 drivers/input/input.c:435
  input_sync include/linux/input.h:450 [inline]
  hidinput_report_event+0xa1/0xf0 drivers/hid/hid-input.c:1733
  hid_report_raw_event+0x151d/0x1760 drivers/hid/hid-core.c:2033
  hid_input_report+0x434/0x520 drivers/hid/hid-core.c:2100
  hid_irq_in+0x479/0x6d0 drivers/hid/usbhid/hid-core.c:284
  __usb_hcd_giveback_urb+0x35f/0x520 drivers/usb/core/hcd.c:1650
  dummy_timer+0x8a3/0x31b0 drivers/usb/gadget/udc/dummy_hcd.c:1993
  __run_hrtimer kernel/time/hrtimer.c:1755 [inline]
  __hrtimer_run_queues+0x51e/0xc40 kernel/time/hrtimer.c:1819
  hrtimer_run_softirq+0x187/0x2b0 kernel/time/hrtimer.c:1836
  handle_softirqs+0x280/0x820 kernel/softirq.c:578
  __do_softirq kernel/softirq.c:612 [inline]
  invoke_softirq kernel/softirq.c:452 [inline]
  __irq_exit_rcu+0xc7/0x190 kernel/softirq.c:661
  irq_exit_rcu+0x9/0x20 kernel/softirq.c:673
  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1088 [inline]
  sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1088
  asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687
  debug_lockdep_rcu_enabled+0x0/0x30
  rcu_read_unlock include/linux/rcupdate.h:815 [inline]
  count_memcg_event_mm+0x2cf/0x3b0 include/linux/memcontrol.h:1104
  mm_account_fault mm/memory.c:5200 [inline]
  handle_mm_fault+0x2857/0x4920 mm/memory.c:5347
  do_user_addr_fault+0xad0/0x12e0 arch/x86/mm/fault.c:1324
  handle_page_fault arch/x86/mm/fault.c:1465 [inline]
  exc_page_fault+0x67/0x110 arch/x86/mm/fault.c:1521
  asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:608

to a SOFTIRQ-irq-unsafe lock:
 (tasklist_lock){.+.+}-{2:2}

... which became SOFTIRQ-irq-unsafe at:
...
  lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
  __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
  _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
  do_wait+0x294/0xaf0 kernel/exit.c:1607
  kernel_wait+0xac/0x170 kernel/exit.c:1797
  call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
  call_usermodehelper_exec_work+0xb9/0x220 kernel/umh.c:164
  process_one_work kernel/workqueue.c:2634 [inline]
  process_scheduled_works+0xa45/0x15b0 kernel/workqueue.c:2711
  worker_thread+0xa55/0xfc0 kernel/workqueue.c:2792
  kthread+0x2fa/0x390 kernel/kthread.c:388
  ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152
  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293

other info that might help us debug this:

Chain exists of:
  &client->buffer_lock --> &new->fa_lock --> tasklist_lock

 Possible interrupt unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(tasklist_lock);
                               local_irq_disable();
                               lock(&client->buffer_lock);
                               lock(&new->fa_lock);
  <Interrupt>
    lock(&client->buffer_lock);

 *** DEADLOCK ***

7 locks held by syz.6.13001/12090:
 #0: ffff888144fed110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x17b/0x470 drivers/input/evdev.c:513
 #1: ffff888018f32230 (&dev->event_lock#2){-.-.}-{2:2}, at: input_inject_event+0xab/0x320 drivers/input/input.c:460
 #2: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:334 [inline]
 #2: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:786 [inline]
 #2: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0xbc/0x320 drivers/input/input.c:462
 #3: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:334 [inline]
 #3: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:786 [inline]
 #3: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: input_pass_values+0xa3/0x1300 drivers/input/input.c:153
 #4: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:334 [inline]
 #4: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:786 [inline]
 #4: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x79/0x330 drivers/input/evdev.c:298
 #5: ffff88805ed09028 (&client->buffer_lock){..-.}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
 #5: ffff88805ed09028 (&client->buffer_lock){..-.}-{2:2}, at: evdev_pass_values+0xcb/0xab0 drivers/input/evdev.c:261
 #6: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:334 [inline]
 #6: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:786 [inline]
 #6: ffffffff8cd2fba0 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x53/0x4b0 fs/fcntl.c:1010

the dependencies between SOFTIRQ-irq-safe lock and the holding lock:
-> (&client->buffer_lock){..-.}-{2:2} {
   IN-SOFTIRQ-W at:
                    lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
                    __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
                    _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
                    spin_lock include/linux/spinlock.h:351 [inline]
                    evdev_pass_values+0xcb/0xab0 drivers/input/evdev.c:261
                    evdev_events+0x1d8/0x330 drivers/input/evdev.c:306
                    input_to_handler drivers/input/input.c:129 [inline]
                    input_pass_values+0x907/0x1300 drivers/input/input.c:161
                    input_event_dispose+0x346/0x6c0 drivers/input/input.c:378
                    input_event+0x8c/0xc0 drivers/input/input.c:435
                    input_sync include/linux/input.h:450 [inline]
                    hidinput_report_event+0xa1/0xf0 drivers/hid/hid-input.c:1733
                    hid_report_raw_event+0x151d/0x1760 drivers/hid/hid-core.c:2033
                    hid_input_report+0x434/0x520 drivers/hid/hid-core.c:2100
                    hid_irq_in+0x479/0x6d0 drivers/hid/usbhid/hid-core.c:284
                    __usb_hcd_giveback_urb+0x35f/0x520 drivers/usb/core/hcd.c:1650
                    dummy_timer+0x8a3/0x31b0 drivers/usb/gadget/udc/dummy_hcd.c:1993
                    __run_hrtimer kernel/time/hrtimer.c:1755 [inline]
                    __hrtimer_run_queues+0x51e/0xc40 kernel/time/hrtimer.c:1819
                    hrtimer_run_softirq+0x187/0x2b0 kernel/time/hrtimer.c:1836
                    handle_softirqs+0x280/0x820 kernel/softirq.c:578
                    __do_softirq kernel/softirq.c:612 [inline]
                    invoke_softirq kernel/softirq.c:452 [inline]
                    __irq_exit_rcu+0xc7/0x190 kernel/softirq.c:661
                    irq_exit_rcu+0x9/0x20 kernel/softirq.c:673
                    instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1088 [inline]
                    sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1088
                    asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:687
                    debug_lockdep_rcu_enabled+0x0/0x30
                    rcu_read_unlock include/linux/rcupdate.h:815 [inline]
                    count_memcg_event_mm+0x2cf/0x3b0 include/linux/memcontrol.h:1104
                    mm_account_fault mm/memory.c:5200 [inline]
                    handle_mm_fault+0x2857/0x4920 mm/memory.c:5347
                    do_user_addr_fault+0xad0/0x12e0 arch/x86/mm/fault.c:1324
                    handle_page_fault arch/x86/mm/fault.c:1465 [inline]
                    exc_page_fault+0x67/0x110 arch/x86/mm/fault.c:1521
                    asm_exc_page_fault+0x26/0x30 arch/x86/include/asm/idtentry.h:608
   INITIAL USE at:
                   lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
                   __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                   _raw_spin_lock_irqsave+0xa8/0xf0 kernel/locking/spinlock.c:162
                   evdev_set_mask drivers/input/evdev.c:980 [inline]
                   evdev_do_ioctl drivers/input/evdev.c:1117 [inline]
                   evdev_ioctl_handler+0x191d/0x1df0 drivers/input/evdev.c:1272
                   vfs_ioctl fs/ioctl.c:51 [inline]
                   __do_sys_ioctl fs/ioctl.c:871 [inline]
                   __se_sys_ioctl+0xfd/0x170 fs/ioctl.c:857
                   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
                   do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81
                   entry_SYSCALL_64_after_hwframe+0x68/0xd2
 }
 ... key      at: [<ffffffff9720e8a0>] evdev_open.__key.28+0x0/0x20

the dependencies between the lock to be acquired
 and SOFTIRQ-irq-unsafe lock:
  -> (tasklist_lock){.+.+}-{2:2} {
     HARDIRQ-ON-R at:
                        lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
                        __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                        _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                        do_wait+0x294/0xaf0 kernel/exit.c:1607
                        kernel_wait+0xac/0x170 kernel/exit.c:1797
                        call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                        call_usermodehelper_exec_work+0xb9/0x220 kernel/umh.c:164
                        process_one_work kernel/workqueue.c:2634 [inline]
                        process_scheduled_works+0xa45/0x15b0 kernel/workqueue.c:2711
                        worker_thread+0xa55/0xfc0 kernel/workqueue.c:2792
                        kthread+0x2fa/0x390 kernel/kthread.c:388
                        ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152
                        ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293
     SOFTIRQ-ON-R at:
                        lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
                        __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                        _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                        do_wait+0x294/0xaf0 kernel/exit.c:1607
                        kernel_wait+0xac/0x170 kernel/exit.c:1797
                        call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                        call_usermodehelper_exec_work+0xb9/0x220 kernel/umh.c:164
                        process_one_work kernel/workqueue.c:2634 [inline]
                        process_scheduled_works+0xa45/0x15b0 kernel/workqueue.c:2711
                        worker_thread+0xa55/0xfc0 kernel/workqueue.c:2792
                        kthread+0x2fa/0x390 kernel/kthread.c:388
                        ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152
                        ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293
     INITIAL USE at:
                       lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
                       __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                       _raw_write_lock_irq+0xa3/0xe0 kernel/locking/spinlock.c:326
                       copy_process+0x225d/0x3d70 kernel/fork.c:2631
                       kernel_clone+0x21b/0x840 kernel/fork.c:2914
                       user_mode_thread+0xde/0x130 kernel/fork.c:2992
                       rest_init+0x27/0x300 init/main.c:697
                       arch_call_rest_init+0xe/0x10 init/main.c:829
                       start_kernel+0x459/0x4e0 init/main.c:1074
                       x86_64_start_reservations+0x2a/0x30 arch/x86/kernel/head64.c:555
                       copy_bootdata+0x0/0xe0 arch/x86/kernel/head64.c:536
                       secondary_startup_64_no_verify+0x179/0x17b
     INITIAL READ USE at:
                            lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
                            __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                            _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                            do_wait+0x294/0xaf0 kernel/exit.c:1607
                            kernel_wait+0xac/0x170 kernel/exit.c:1797
                            call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                            call_usermodehelper_exec_work+0xb9/0x220 kernel/umh.c:164
                            process_one_work kernel/workqueue.c:2634 [inline]
                            process_scheduled_works+0xa45/0x15b0 kernel/workqueue.c:2711
                            worker_thread+0xa55/0xfc0 kernel/workqueue.c:2792
                            kthread+0x2fa/0x390 kernel/kthread.c:388
                            ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152
                            ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293
   }
   ... key      at: [<ffffffff8ca0a058>] tasklist_lock+0x18/0x40
   ... acquired at:
   __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
   _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
   send_sigurg+0xf0/0x3c0 fs/fcntl.c:827
   sk_send_sigurg+0x6f/0xc0 net/core/sock.c:3387
   queue_oob+0x3d7/0x4e0 net/unix/af_unix.c:2207
   unix_stream_sendmsg+0xaa2/0xba0 net/unix/af_unix.c:2326
   sock_sendmsg_nosec net/socket.c:730 [inline]
   __sock_sendmsg net/socket.c:745 [inline]
   ____sys_sendmsg+0x5bf/0x950 net/socket.c:2595
   ___sys_sendmsg+0x220/0x290 net/socket.c:2649
   __sys_sendmmsg+0x275/0x4a0 net/socket.c:2735
   __do_sys_sendmmsg net/socket.c:2764 [inline]
   __se_sys_sendmmsg net/socket.c:2761 [inline]
   __x64_sys_sendmmsg+0xa0/0xb0 net/socket.c:2761
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81
   entry_SYSCALL_64_after_hwframe+0x68/0xd2

 -> (&f->f_owner.lock){...-}-{2:2} {
    IN-SOFTIRQ-R at:
                      lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
                      __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                      _raw_read_lock_irqsave+0xb0/0x100 kernel/locking/spinlock.c:236
                      send_sigurg+0x29/0x3c0 fs/fcntl.c:811
                      sk_send_sigurg+0x6f/0xc0 net/core/sock.c:3387
                      tcp_check_urg+0x200/0x750 net/ipv4/tcp_input.c:5770
                      tcp_urg+0x161/0x3f0 net/ipv4/tcp_input.c:5811
                      tcp_rcv_established+0xa2e/0x1cf0 net/ipv4/tcp_input.c:6166
                      tcp_v6_do_rcv+0x5e7/0x12d0 net/ipv6/tcp_ipv6.c:1480
                      tcp_v6_rcv+0x1fd4/0x26a0 net/ipv6/tcp_ipv6.c:1743
                      ip6_protocol_deliver_rcu+0xb7a/0x13c0 net/ipv6/ip6_input.c:438
                      ip6_input_finish+0x184/0x2c0 net/ipv6/ip6_input.c:483
                      NF_HOOK+0x303/0x390 include/linux/netfilter.h:304
                      NF_HOOK+0x303/0x390 include/linux/netfilter.h:304
                      __netif_receive_skb_one_core net/core/dev.c:5596 [inline]
                      __netif_receive_skb+0xcc/0x290 net/core/dev.c:5710
                      process_backlog+0x380/0x6e0 net/core/dev.c:6038
                      __napi_poll+0xc0/0x460 net/core/dev.c:6600
                      napi_poll net/core/dev.c:6667 [inline]
                      net_rx_action+0x5ea/0xbf0 net/core/dev.c:6803
                      handle_softirqs+0x280/0x820 kernel/softirq.c:578
                      run_ksoftirqd+0x9c/0xf0 kernel/softirq.c:950
                      smpboot_thread_fn+0x635/0xa00 kernel/smpboot.c:164
                      kthread+0x2fa/0x390 kernel/kthread.c:388
                      ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:152
                      ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:293
    INITIAL USE at:
                     lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
                     __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                     _raw_write_lock_irq+0xa3/0xe0 kernel/locking/spinlock.c:326
                     __f_setown+0x3b/0x330 fs/fcntl.c:92
                     generic_add_lease fs/locks.c:1815 [inline]
                     generic_setlease+0xe32/0x1270 fs/locks.c:1895
                     vfs_setlease fs/locks.c:1960 [inline]
                     do_fcntl_add_lease fs/locks.c:1981 [inline]
                     fcntl_setlease+0x268/0x340 fs/locks.c:2003
                     do_fcntl+0x1cb/0x1380 fs/fcntl.c:397
                     __do_sys_fcntl fs/fcntl.c:448 [inline]
                     __se_sys_fcntl+0xc9/0x1a0 fs/fcntl.c:433
                     do_syscall_x64 arch/x86/entry/common.c:51 [inline]
                     do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81
                     entry_SYSCALL_64_after_hwframe+0x68/0xd2
    INITIAL READ USE at:
                          lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
                          __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                          _raw_read_lock_irqsave+0xb0/0x100 kernel/locking/spinlock.c:236
                          send_sigio+0x33/0x360 fs/fcntl.c:772
                          dnotify_handle_event+0x153/0x420 fs/notify/dnotify/dnotify.c:115
                          fsnotify_handle_event fs/notify/fsnotify.c:330 [inline]
                          send_to_group fs/notify/fsnotify.c:378 [inline]
                          fsnotify+0x1466/0x1780 fs/notify/fsnotify.c:584
                          fsnotify_parent include/linux/fsnotify.h:80 [inline]
                          fsnotify_dentry include/linux/fsnotify.h:89 [inline]
                          fsnotify_change+0x220/0x270 include/linux/fsnotify.h:387
                          fat_ioctl_set_attributes fs/fat/file.c:103 [inline]
                          fat_generic_ioctl+0xadb/0xdb0 fs/fat/file.c:165
                          fat_dir_ioctl+0x147/0x2f0 fs/fat/dir.c:804
                          vfs_ioctl fs/ioctl.c:51 [inline]
                          __do_sys_ioctl fs/ioctl.c:871 [inline]
                          __se_sys_ioctl+0xfd/0x170 fs/ioctl.c:857
                          do_syscall_x64 arch/x86/entry/common.c:51 [inline]
                          do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81
                          entry_SYSCALL_64_after_hwframe+0x68/0xd2
  }
  ... key      at: [<ffffffff96f14e40>] init_file.__key+0x0/0x20
  ... acquired at:
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0xb0/0x100 kernel/locking/spinlock.c:236
   send_sigio+0x33/0x360 fs/fcntl.c:772
   kill_fasync_rcu fs/fcntl.c:997 [inline]
   kill_fasync+0x228/0x4b0 fs/fcntl.c:1011
   wakeup_pipe_readers fs/splice.c:183 [inline]
   splice_file_to_pipe+0x100/0x110 fs/splice.c:1236
   do_splice+0x116a/0x1bf0 fs/splice.c:1313
   __do_splice fs/splice.c:1370 [inline]
   __do_sys_splice fs/splice.c:1586 [inline]
   __se_sys_splice+0x37a/0x470 fs/splice.c:1568
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81
   entry_SYSCALL_64_after_hwframe+0x68/0xd2

-> (&new->fa_lock){....}-{2:2} {
   INITIAL USE at:
                   lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
                   __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                   _raw_write_lock_irq+0xa3/0xe0 kernel/locking/spinlock.c:326
                   fasync_remove_entry+0xf4/0x1c0 fs/fcntl.c:867
                   lease_modify+0x1a6/0x390 fs/locks.c:1402
                   locks_remove_lease fs/locks.c:2609 [inline]
                   locks_remove_file+0x4c0/0xe20 fs/locks.c:2634
                   __fput+0x18f/0x970 fs/file_table.c:376
                   task_work_run+0x1ce/0x250 kernel/task_work.c:239
                   resume_user_mode_work include/linux/resume_user_mode.h:49 [inline]
                   exit_to_user_mode_loop+0xe6/0x110 kernel/entry/common.c:177
                   exit_to_user_mode_prepare+0xb1/0x140 kernel/entry/common.c:210
                   __syscall_exit_to_user_mode_work kernel/entry/common.c:291 [inline]
                   syscall_exit_to_user_mode+0x1a/0x50 kernel/entry/common.c:302
                   do_syscall_64+0x61/0xb0 arch/x86/entry/common.c:87
                   entry_SYSCALL_64_after_hwframe+0x68/0xd2
   INITIAL READ USE at:
                        lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
                        __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                        _raw_read_lock_irqsave+0xb0/0x100 kernel/locking/spinlock.c:236
                        kill_fasync_rcu fs/fcntl.c:990 [inline]
                        kill_fasync+0x192/0x4b0 fs/fcntl.c:1011
                        wakeup_pipe_readers fs/splice.c:183 [inline]
                        splice_file_to_pipe+0x100/0x110 fs/splice.c:1236
                        do_splice+0x116a/0x1bf0 fs/splice.c:1313
                        __do_splice fs/splice.c:1370 [inline]
                        __do_sys_splice fs/splice.c:1586 [inline]
                        __se_sys_splice+0x37a/0x470 fs/splice.c:1568
                        do_syscall_x64 arch/x86/entry/common.c:51 [inline]
                        do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81
                        entry_SYSCALL_64_after_hwframe+0x68/0xd2
 }
 ... key      at: [<ffffffff96f15ac0>] fasync_insert_entry.__key+0x0/0x20
 ... acquired at:
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0xb0/0x100 kernel/locking/spinlock.c:236
   kill_fasync_rcu fs/fcntl.c:990 [inline]
   kill_fasync+0x192/0x4b0 fs/fcntl.c:1011
   __pass_event drivers/input/evdev.c:240 [inline]
   evdev_pass_values+0x54b/0xab0 drivers/input/evdev.c:278
   evdev_events+0x1d8/0x330 drivers/input/evdev.c:306
   input_to_handler drivers/input/input.c:129 [inline]
   input_pass_values+0x907/0x1300 drivers/input/input.c:161
   input_event_dispose+0x346/0x6c0 drivers/input/input.c:378
   input_inject_event+0x1f9/0x320 drivers/input/input.c:465
   evdev_write+0x32a/0x470 drivers/input/evdev.c:530
   vfs_write+0x288/0x940 fs/read_write.c:582
   ksys_write+0x147/0x250 fs/read_write.c:637
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81
   entry_SYSCALL_64_after_hwframe+0x68/0xd2


stack backtrace:
CPU: 0 PID: 12090 Comm: syz.6.13001 Not tainted 6.6.101-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025
Call Trace:
 <TASK>
 dump_stack_lvl+0x16c/0x230 lib/dump_stack.c:106
 print_bad_irq_dependency kernel/locking/lockdep.c:2626 [inline]
 check_irq_usage kernel/locking/lockdep.c:2865 [inline]
 check_prev_add kernel/locking/lockdep.c:3138 [inline]
 check_prevs_add kernel/locking/lockdep.c:3253 [inline]
 validate_chain kernel/locking/lockdep.c:3869 [inline]
 __lock_acquire+0x678f/0x7c80 kernel/locking/lockdep.c:5137
 lock_acquire+0x197/0x410 kernel/locking/lockdep.c:5754
 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
 _raw_read_lock_irqsave+0xb0/0x100 kernel/locking/spinlock.c:236
 kill_fasync_rcu fs/fcntl.c:990 [inline]
 kill_fasync+0x192/0x4b0 fs/fcntl.c:1011
 __pass_event drivers/input/evdev.c:240 [inline]
 evdev_pass_values+0x54b/0xab0 drivers/input/evdev.c:278
 evdev_events+0x1d8/0x330 drivers/input/evdev.c:306
 input_to_handler drivers/input/input.c:129 [inline]
 input_pass_values+0x907/0x1300 drivers/input/input.c:161
 input_event_dispose+0x346/0x6c0 drivers/input/input.c:378
 input_inject_event+0x1f9/0x320 drivers/input/input.c:465
 evdev_write+0x32a/0x470 drivers/input/evdev.c:530
 vfs_write+0x288/0x940 fs/read_write.c:582
 ksys_write+0x147/0x250 fs/read_write.c:637
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x55/0xb0 arch/x86/entry/common.c:81
 entry_SYSCALL_64_after_hwframe+0x68/0xd2
RIP: 0033:0x7fcafcd8ebe9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fcafdb56038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fcafcfb5fa0 RCX: 00007fcafcd8ebe9
RDX: 0000000000001068 RSI: 0000200000000040 RDI: 0000000000000005
RBP: 00007fcafce11e19 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fcafcfb6038 R14: 00007fcafcfb5fa0 R15: 00007ffebe300898
 </TASK>

Crashes (2):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/08/07 13:38 linux-6.6.y 3a8ababb8b6a 04cffc22 .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-6-kasan possible deadlock in evdev_pass_values
2025/07/29 23:27 linux-6.6.y dbcb8d8e4163 f8f2b4da .config console log report info [disk image] [vmlinux] [kernel image] ci2-linux-6-6-kasan possible deadlock in evdev_pass_values
* Struck through repros no longer work on HEAD.