syzbot


possible deadlock in input_event (2)

Status: upstream: reported C repro on 2021/11/10 17:01
Subsystems: kernfs
[Documentation on labels]
Reported-by: syzbot+d4c06e848a1c1f9f726f@syzkaller.appspotmail.com
First crash: 908d, last: 8h16m
Cause bisection: the issue happens on the oldest tested release (bisect log)
Crash: possible deadlock in input_event (log)
Repro: C syz .config
  
Discussions (9)
Title Replies (including bot) Last reply
[syzbot] possible deadlock in input_event (2) 3 (8) 2024/04/20 09:53
[syzbot] Monthly kernfs report (Mar 2024) 0 (1) 2024/03/06 12:53
[syzbot] Monthly kernfs report (Feb 2024) 0 (1) 2024/02/02 21:05
[syzbot] Monthly kernfs report (Jan 2024) 0 (1) 2024/01/02 13:36
[syzbot] Monthly kernfs report (Nov 2023) 0 (1) 2023/11/29 13:03
[syzbot] Monthly fs report (Nov 2023) 0 (1) 2023/11/11 01:08
[syzbot] Monthly fs report (Oct 2023) 0 (1) 2023/10/10 13:22
[syzbot] Monthly fs report (Aug 2023) 0 (1) 2023/08/08 12:55
[syzbot] Monthly fs report (Jul 2023) 0 (1) 2023/07/10 09:36
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.1 possible deadlock in input_event origin:upstream C 118 10h46m 318d 0/3 upstream: reported C repro on 2023/06/23 12:11
upstream possible deadlock in input_event C done 2740 909d 1213d 0/26 closed as dup on 2021/07/07 07:31
linux-5.15 possible deadlock in input_event origin:upstream missing-backport C 115 21h04m 294d 0/3 upstream: reported C repro on 2023/07/17 14:44
Last patch testing requests (13)
Created Duration User Patch Repo Result
2024/04/20 08:14 37m aha310510@gmail.com patch upstream report log
2024/04/20 06:15 1h02m aha310510@gmail.com patch upstream report log
2024/04/19 16:33 22m aha310510@gmail.com patch upstream error OK
2023/09/14 21:08 24m retest repro upstream OK log
2023/09/14 21:08 20m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 19m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 31m retest repro upstream OK log
Fix bisection attempts (1)
Created Duration User Patch Repo Result
2023/04/02 08:31 34m bisect fix upstream job log (0) log

Sample crash report:
=====================================================
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected
6.9.0-rc6-syzkaller-00227-g3d25a941ea50 #0 Not tainted
-----------------------------------------------------
syz-executor374/5083 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire:
ffff88801e8b60c0 (&new->fa_lock){....}-{2:2}, at: kill_fasync_rcu fs/fcntl.c:1008 [inline]
ffff88801e8b60c0 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x19e/0x4d0 fs/fcntl.c:1029

and this task is already holding:
ffff888029979028 (&client->buffer_lock){....}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
ffff888029979028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values+0xf2/0xad0 drivers/input/evdev.c:261
which would create a new lock dependency:
 (&client->buffer_lock){....}-{2:2} -> (&new->fa_lock){....}-{2:2}

but this new dependency connects a HARDIRQ-irq-safe lock:
 (&dev->event_lock#2){-...}-{2:2}

... which became HARDIRQ-irq-safe at:
  lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
  __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
  _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
  input_event+0x91/0xd0 drivers/input/input.c:434
  input_report_key include/linux/input.h:425 [inline]
  psmouse_report_standard_buttons drivers/input/mouse/psmouse-base.c:128 [inline]
  psmouse_report_standard_packet+0x54/0x200 drivers/input/mouse/psmouse-base.c:146
  psmouse_process_byte+0x48c/0x680 drivers/input/mouse/psmouse-base.c:237
  psmouse_handle_byte+0x49/0x4c0 drivers/input/mouse/psmouse-base.c:279
  ps2_interrupt+0x17c/0x8e0 drivers/input/serio/libps2.c:613
  serio_interrupt+0x90/0x140 drivers/input/serio/serio.c:998
  i8042_interrupt+0x375/0x770 drivers/input/serio/i8042.c:606
  __handle_irq_event_percpu+0x29a/0xa80 kernel/irq/handle.c:158
  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
  handle_irq_event+0x89/0x1f0 kernel/irq/handle.c:210
  handle_edge_irq+0x25f/0xc20 kernel/irq/chip.c:831
  generic_handle_irq_desc include/linux/irqdesc.h:161 [inline]
  handle_irq arch/x86/kernel/irq.c:238 [inline]
  __common_interrupt+0x138/0x230 arch/x86/kernel/irq.c:257
  common_interrupt+0xa5/0xd0 arch/x86/kernel/irq.c:247
  asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693
  account_kernel_stack+0x289/0x3f0 kernel/fork.c:540
  exit_task_stack_account+0x2a/0x340 kernel/fork.c:554
  do_exit+0x1cee/0x27e0 kernel/exit.c:919
  call_usermodehelper_exec_async+0x37a/0x380 kernel/umh.c:123
  ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

to a HARDIRQ-irq-unsafe lock:
 (tasklist_lock){.+.+}-{2:2}

... which became HARDIRQ-irq-unsafe at:
...
  lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
  __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
  _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
  __do_wait+0x12d/0x850 kernel/exit.c:1587
  do_wait+0x1e9/0x560 kernel/exit.c:1631
  kernel_wait+0xe9/0x240 kernel/exit.c:1807
  call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
  call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164
  process_one_work kernel/workqueue.c:3267 [inline]
  process_scheduled_works+0xa10/0x17c0 kernel/workqueue.c:3348
  worker_thread+0x86d/0xd70 kernel/workqueue.c:3429
  kthread+0x2f0/0x390 kernel/kthread.c:388
  ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

other info that might help us debug this:

Chain exists of:
  &dev->event_lock#2 --> &client->buffer_lock --> tasklist_lock

 Possible interrupt unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(tasklist_lock);
                               local_irq_disable();
                               lock(&dev->event_lock#2);
                               lock(&client->buffer_lock);
  <Interrupt>
    lock(&dev->event_lock#2);

 *** DEADLOCK ***

7 locks held by syz-executor374/5083:
 #0: ffff8880250bd110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x272/0x7c0 drivers/input/evdev.c:513
 #1: ffff888019f03230 (&dev->event_lock#2){-...}-{2:2}, at: input_inject_event+0xc5/0x340 drivers/input/input.c:460
 #2: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
 #2: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline]
 #2: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0xd5/0x340 drivers/input/input.c:462
 #3: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
 #3: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline]
 #3: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: input_pass_values+0x9d/0x1200 drivers/input/input.c:153
 #4: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
 #4: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline]
 #4: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x6f/0x300 drivers/input/evdev.c:298
 #5: ffff888029979028 (&client->buffer_lock){....}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
 #5: ffff888029979028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values+0xf2/0xad0 drivers/input/evdev.c:261
 #6: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
 #6: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline]
 #6: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x55/0x4d0 fs/fcntl.c:1028

the dependencies between HARDIRQ-irq-safe lock and the holding lock:
 -> (&dev->event_lock#2){-...}-{2:2} {
    IN-HARDIRQ-W at:
                      lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                      __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                      _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
                      input_event+0x91/0xd0 drivers/input/input.c:434
                      input_report_key include/linux/input.h:425 [inline]
                      psmouse_report_standard_buttons drivers/input/mouse/psmouse-base.c:128 [inline]
                      psmouse_report_standard_packet+0x54/0x200 drivers/input/mouse/psmouse-base.c:146
                      psmouse_process_byte+0x48c/0x680 drivers/input/mouse/psmouse-base.c:237
                      psmouse_handle_byte+0x49/0x4c0 drivers/input/mouse/psmouse-base.c:279
                      ps2_interrupt+0x17c/0x8e0 drivers/input/serio/libps2.c:613
                      serio_interrupt+0x90/0x140 drivers/input/serio/serio.c:998
                      i8042_interrupt+0x375/0x770 drivers/input/serio/i8042.c:606
                      __handle_irq_event_percpu+0x29a/0xa80 kernel/irq/handle.c:158
                      handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
                      handle_irq_event+0x89/0x1f0 kernel/irq/handle.c:210
                      handle_edge_irq+0x25f/0xc20 kernel/irq/chip.c:831
                      generic_handle_irq_desc include/linux/irqdesc.h:161 [inline]
                      handle_irq arch/x86/kernel/irq.c:238 [inline]
                      __common_interrupt+0x138/0x230 arch/x86/kernel/irq.c:257
                      common_interrupt+0xa5/0xd0 arch/x86/kernel/irq.c:247
                      asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693
                      account_kernel_stack+0x289/0x3f0 kernel/fork.c:540
                      exit_task_stack_account+0x2a/0x340 kernel/fork.c:554
                      do_exit+0x1cee/0x27e0 kernel/exit.c:919
                      call_usermodehelper_exec_async+0x37a/0x380 kernel/umh.c:123
                      ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
                      ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    INITIAL USE at:
                     lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                     __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                     _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
                     input_inject_event+0xc5/0x340 drivers/input/input.c:460
                     led_trigger_event+0x11c/0x1e0 drivers/leds/led-triggers.c:392
                     kbd_led_trigger_activate+0xbd/0x100 drivers/tty/vt/keyboard.c:1036
                     led_trigger_set+0x541/0x950 drivers/leds/led-triggers.c:198
                     led_match_default_trigger drivers/leds/led-triggers.c:256 [inline]
                     led_trigger_set_default+0x229/0x260 drivers/leds/led-triggers.c:274
                     led_classdev_register_ext+0x773/0x960 drivers/leds/led-class.c:561
                     led_classdev_register include/linux/leds.h:271 [inline]
                     input_leds_connect+0x497/0x640 drivers/input/input-leds.c:145
                     input_attach_handler drivers/input/input.c:1064 [inline]
                     input_register_device+0xcfa/0x1090 drivers/input/input.c:2396
                     atkbd_connect+0x752/0xa00 drivers/input/keyboard/atkbd.c:1342
                     serio_connect_driver drivers/input/serio/serio.c:44 [inline]
                     serio_driver_probe+0x7f/0xa0 drivers/input/serio/serio.c:775
                     really_probe+0x2b8/0xad0 drivers/base/dd.c:656
                     __driver_probe_device+0x1a2/0x390 drivers/base/dd.c:798
                     driver_probe_device+0x50/0x430 drivers/base/dd.c:828
                     __driver_attach+0x45f/0x710 drivers/base/dd.c:1214
                     bus_for_each_dev+0x239/0x2b0 drivers/base/bus.c:368
                     serio_attach_driver drivers/input/serio/serio.c:804 [inline]
                     serio_handle_event+0x1c7/0x920 drivers/input/serio/serio.c:224
                     process_one_work kernel/workqueue.c:3267 [inline]
                     process_scheduled_works+0xa10/0x17c0 kernel/workqueue.c:3348
                     worker_thread+0x86d/0xd70 kernel/workqueue.c:3429
                     kthread+0x2f0/0x390 kernel/kthread.c:388
                     ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
                     ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
  }
  ... key      at: [<ffffffff94a94760>] input_allocate_device.__key.5+0x0/0x20
-> (&client->buffer_lock){....}-{2:2} {
   INITIAL USE at:
                   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
                   _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
                   spin_lock include/linux/spinlock.h:351 [inline]
                   evdev_pass_values+0xf2/0xad0 drivers/input/evdev.c:261
                   evdev_events+0x1c2/0x300 drivers/input/evdev.c:306
                   input_to_handler drivers/input/input.c:129 [inline]
                   input_pass_values+0x84d/0x1200 drivers/input/input.c:161
                   input_event_dispose+0x36c/0x650 drivers/input/input.c:378
                   input_handle_event+0xa71/0xbe0 drivers/input/input.c:406
                   input_inject_event+0x22f/0x340 drivers/input/input.c:465
                   evdev_write+0x672/0x7c0 drivers/input/evdev.c:530
                   vfs_write+0x2a4/0xcb0 fs/read_write.c:588
                   ksys_write+0x1a0/0x2c0 fs/read_write.c:643
                   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                   do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
                   entry_SYSCALL_64_after_hwframe+0x77/0x7f
 }
 ... key      at: [<ffffffff94a94a00>] evdev_open.__key.24+0x0/0x20
 ... acquired at:
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
   _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
   spin_lock include/linux/spinlock.h:351 [inline]
   evdev_pass_values+0xf2/0xad0 drivers/input/evdev.c:261
   evdev_events+0x1c2/0x300 drivers/input/evdev.c:306
   input_to_handler drivers/input/input.c:129 [inline]
   input_pass_values+0x84d/0x1200 drivers/input/input.c:161
   input_event_dispose+0x36c/0x650 drivers/input/input.c:378
   input_handle_event+0xa71/0xbe0 drivers/input/input.c:406
   input_inject_event+0x22f/0x340 drivers/input/input.c:465
   evdev_write+0x672/0x7c0 drivers/input/evdev.c:530
   vfs_write+0x2a4/0xcb0 fs/read_write.c:588
   ksys_write+0x1a0/0x2c0 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f


the dependencies between the lock to be acquired
 and HARDIRQ-irq-unsafe lock:
  -> (tasklist_lock){.+.+}-{2:2} {
     HARDIRQ-ON-R at:
                        lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                        __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                        _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                        __do_wait+0x12d/0x850 kernel/exit.c:1587
                        do_wait+0x1e9/0x560 kernel/exit.c:1631
                        kernel_wait+0xe9/0x240 kernel/exit.c:1807
                        call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                        call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164
                        process_one_work kernel/workqueue.c:3267 [inline]
                        process_scheduled_works+0xa10/0x17c0 kernel/workqueue.c:3348
                        worker_thread+0x86d/0xd70 kernel/workqueue.c:3429
                        kthread+0x2f0/0x390 kernel/kthread.c:388
                        ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
                        ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
     SOFTIRQ-ON-R at:
                        lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                        __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                        _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                        __do_wait+0x12d/0x850 kernel/exit.c:1587
                        do_wait+0x1e9/0x560 kernel/exit.c:1631
                        kernel_wait+0xe9/0x240 kernel/exit.c:1807
                        call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                        call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164
                        process_one_work kernel/workqueue.c:3267 [inline]
                        process_scheduled_works+0xa10/0x17c0 kernel/workqueue.c:3348
                        worker_thread+0x86d/0xd70 kernel/workqueue.c:3429
                        kthread+0x2f0/0x390 kernel/kthread.c:388
                        ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
                        ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
     INITIAL USE at:
                       lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                       __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                       _raw_write_lock_irq+0xd3/0x120 kernel/locking/spinlock.c:326
                       copy_process+0x228b/0x3df0 kernel/fork.c:2516
                       kernel_clone+0x226/0x8f0 kernel/fork.c:2797
                       user_mode_thread+0x132/0x1a0 kernel/fork.c:2875
                       rest_init+0x23/0x300 init/main.c:704
                       start_kernel+0x47a/0x500 init/main.c:1081
                       x86_64_start_reservations+0x2a/0x30 arch/x86/kernel/head64.c:507
                       x86_64_start_kernel+0x99/0xa0 arch/x86/kernel/head64.c:488
                       common_startup_64+0x13e/0x147
     INITIAL READ USE at:
                            lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                            __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                            _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                            __do_wait+0x12d/0x850 kernel/exit.c:1587
                            do_wait+0x1e9/0x560 kernel/exit.c:1631
                            kernel_wait+0xe9/0x240 kernel/exit.c:1807
                            call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                            call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164
                            process_one_work kernel/workqueue.c:3267 [inline]
                            process_scheduled_works+0xa10/0x17c0 kernel/workqueue.c:3348
                            worker_thread+0x86d/0xd70 kernel/workqueue.c:3429
                            kthread+0x2f0/0x390 kernel/kthread.c:388
                            ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
                            ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
   }
   ... key      at: [<ffffffff8e00a058>] tasklist_lock+0x18/0x40
   ... acquired at:
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
   __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
   _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
   send_sigio+0xfc/0x360 fs/fcntl.c:810
   kill_fasync_rcu fs/fcntl.c:1015 [inline]
   kill_fasync+0x23a/0x4d0 fs/fcntl.c:1029
   lease_break_callback+0x26/0x30 fs/locks.c:558
   __break_lease+0x6d5/0x1820 fs/locks.c:1592
   break_lease include/linux/filelock.h:431 [inline]
   do_dentry_open+0x871/0x15a0 fs/open.c:946
   do_open fs/namei.c:3642 [inline]
   path_openat+0x2860/0x3240 fs/namei.c:3799
   do_filp_open+0x235/0x490 fs/namei.c:3826
   do_sys_openat2+0x13e/0x1d0 fs/open.c:1406
   do_sys_open fs/open.c:1421 [inline]
   __do_sys_open fs/open.c:1429 [inline]
   __se_sys_open fs/open.c:1425 [inline]
   __x64_sys_open+0x225/0x270 fs/open.c:1425
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

 -> (&f->f_owner.lock){....}-{2:2} {
    INITIAL USE at:
                     lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                     __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                     _raw_write_lock_irq+0xd3/0x120 kernel/locking/spinlock.c:326
                     f_modown+0x38/0x340 fs/fcntl.c:93
                     __f_setown fs/fcntl.c:112 [inline]
                     f_setown_ex fs/fcntl.c:202 [inline]
                     do_fcntl+0x1359/0x16f0 fs/fcntl.c:399
                     __do_sys_fcntl fs/fcntl.c:472 [inline]
                     __se_sys_fcntl+0xd2/0x1b0 fs/fcntl.c:457
                     do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                     do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
                     entry_SYSCALL_64_after_hwframe+0x77/0x7f
    INITIAL READ USE at:
                          lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                          __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                          _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236
                          send_sigio+0x33/0x360 fs/fcntl.c:796
                          kill_fasync_rcu fs/fcntl.c:1015 [inline]
                          kill_fasync+0x23a/0x4d0 fs/fcntl.c:1029
                          lease_break_callback+0x26/0x30 fs/locks.c:558
                          __break_lease+0x6d5/0x1820 fs/locks.c:1592
                          break_lease include/linux/filelock.h:431 [inline]
                          do_dentry_open+0x871/0x15a0 fs/open.c:946
                          do_open fs/namei.c:3642 [inline]
                          path_openat+0x2860/0x3240 fs/namei.c:3799
                          do_filp_open+0x235/0x490 fs/namei.c:3826
                          do_sys_openat2+0x13e/0x1d0 fs/open.c:1406
                          do_sys_open fs/open.c:1421 [inline]
                          __do_sys_open fs/open.c:1429 [inline]
                          __se_sys_open fs/open.c:1425 [inline]
                          __x64_sys_open+0x225/0x270 fs/open.c:1425
                          do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                          do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
                          entry_SYSCALL_64_after_hwframe+0x77/0x7f
  }
  ... key      at: [<ffffffff9479b020>] init_file.__key+0x0/0x20
  ... acquired at:
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236
   send_sigio+0x33/0x360 fs/fcntl.c:796
   kill_fasync_rcu fs/fcntl.c:1015 [inline]
   kill_fasync+0x23a/0x4d0 fs/fcntl.c:1029
   lease_break_callback+0x26/0x30 fs/locks.c:558
   __break_lease+0x6d5/0x1820 fs/locks.c:1592
   break_lease include/linux/filelock.h:431 [inline]
   do_dentry_open+0x871/0x15a0 fs/open.c:946
   do_open fs/namei.c:3642 [inline]
   path_openat+0x2860/0x3240 fs/namei.c:3799
   do_filp_open+0x235/0x490 fs/namei.c:3826
   do_sys_openat2+0x13e/0x1d0 fs/open.c:1406
   do_sys_open fs/open.c:1421 [inline]
   __do_sys_open fs/open.c:1429 [inline]
   __se_sys_open fs/open.c:1425 [inline]
   __x64_sys_open+0x225/0x270 fs/open.c:1425
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> (&new->fa_lock){....}-{2:2} {
   INITIAL READ USE at:
                        lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                        __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                        _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236
                        kill_fasync_rcu fs/fcntl.c:1008 [inline]
                        kill_fasync+0x19e/0x4d0 fs/fcntl.c:1029
                        lease_break_callback+0x26/0x30 fs/locks.c:558
                        __break_lease+0x6d5/0x1820 fs/locks.c:1592
                        break_lease include/linux/filelock.h:431 [inline]
                        do_dentry_open+0x871/0x15a0 fs/open.c:946
                        do_open fs/namei.c:3642 [inline]
                        path_openat+0x2860/0x3240 fs/namei.c:3799
                        do_filp_open+0x235/0x490 fs/namei.c:3826
                        do_sys_openat2+0x13e/0x1d0 fs/open.c:1406
                        do_sys_open fs/open.c:1421 [inline]
                        __do_sys_open fs/open.c:1429 [inline]
                        __se_sys_open fs/open.c:1425 [inline]
                        __x64_sys_open+0x225/0x270 fs/open.c:1425
                        do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                        do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
                        entry_SYSCALL_64_after_hwframe+0x77/0x7f
 }
 ... key      at: [<ffffffff9479bc80>] fasync_insert_entry.__key+0x0/0x20
 ... acquired at:
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236
   kill_fasync_rcu fs/fcntl.c:1008 [inline]
   kill_fasync+0x19e/0x4d0 fs/fcntl.c:1029
   __pass_event drivers/input/evdev.c:240 [inline]
   evdev_pass_values+0x58a/0xad0 drivers/input/evdev.c:278
   evdev_events+0x1c2/0x300 drivers/input/evdev.c:306
   input_to_handler drivers/input/input.c:129 [inline]
   input_pass_values+0x84d/0x1200 drivers/input/input.c:161
   input_event_dispose+0x36c/0x650 drivers/input/input.c:378
   input_handle_event+0xa71/0xbe0 drivers/input/input.c:406
   input_inject_event+0x22f/0x340 drivers/input/input.c:465
   evdev_write+0x672/0x7c0 drivers/input/evdev.c:530
   vfs_write+0x2a4/0xcb0 fs/read_write.c:588
   ksys_write+0x1a0/0x2c0 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f


stack backtrace:
CPU: 0 PID: 5083 Comm: syz-executor374 Not tainted 6.9.0-rc6-syzkaller-00227-g3d25a941ea50 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 print_bad_irq_dependency kernel/locking/lockdep.c:2626 [inline]
 check_irq_usage kernel/locking/lockdep.c:2865 [inline]
 check_prev_add kernel/locking/lockdep.c:3138 [inline]
 check_prevs_add kernel/locking/lockdep.c:3253 [inline]
 validate_chain+0x4dc7/0x58e0 kernel/locking/lockdep.c:3869
 __lock_acquire+0x1346/0x1fd0 kernel/locking/lockdep.c:5137
 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
 _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236
 kill_fasync_rcu fs/fcntl.c:1008 [inline]
 kill_fasync+0x19e/0x4d0 fs/fcntl.c:1029
 __pass_event drivers/input/evdev.c:240 [inline]
 evdev_pass_values+0x58a/0xad0 drivers/input/evdev.c:278
 evdev_events+0x1c2/0x300 drivers/input/evdev.c:306
 input_to_handler drivers/input/input.c:129 [inline]
 input_pass_values+0x84d/0x1200 drivers/input/input.c:161
 input_event_dispose+0x36c/0x650 drivers/input/input.c:378
 input_handle_event+0xa71/0xbe0 drivers/input/input.c:406
 input_inject_event+0x22f/0x340 drivers/input/input.c:465
 evdev_write+0x672/0x7c0 drivers/input/evdev.c:530
 vfs_write+0x2a4/0xcb0 fs/read_write.c:588
 ksys_write+0x1a0/0x2c0 fs/read_write.c:643
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fd123599b39
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fd12352f228 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fd123621418 RCX: 00007fd123599b39
RDX: 0000000000002250 RSI: 0000000020000040 RDI: 0000000000000006
RBP: 00007fd123621410 R08: 00007fd12352f6c0 R09: 00007fd12352f6c0
R10: 

Crashes (2911):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/05/04 19:00 upstream 3d25a941ea50 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/04 18:20 upstream 7367539ad4b0 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/04/28 14:18 upstream 2c8159388952 07b455f9 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/04/20 16:06 upstream 13a2e429f644 af24b050 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/04/11 19:45 upstream 480e035fc4c7 478efa7f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/04/05 10:58 upstream 480e035fc4c7 0ee3535e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/04/05 08:40 upstream fe46a7dd189e 0ee3535e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/03/30 06:29 upstream 480e035fc4c7 c52bcb23 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/08 11:28 upstream 3aaa8ce7a335 cf82cde1 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/03/07 21:55 upstream 135288b73cef 2b789849 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/02/25 21:34 upstream ab0a97cffa0b 8d446f15 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/12/28 19:09 upstream f5837722ffec fb427a07 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/12/19 16:29 upstream 2cf4f94d8e86 3ad490ea .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/11/17 12:09 upstream 7475e51b8796 cb976f63 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2023/11/11 22:59 upstream 3ca112b71f35 6d6dbf8a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/11/11 00:27 upstream ac347a0655db 45e9b83e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/07 14:42 upstream be3ca57cfb77 83211397 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/10/28 05:32 upstream 888cf78c29e2 3c418d72 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/09/22 21:45 upstream dc912ba91b7e 0b6a67ac .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/28 19:33 upstream 8d025e2092e2 ceaf7ddd .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/12/28 14:07 upstream f5837722ffec fb427a07 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/12/25 02:43 upstream 861deac3b092 fb427a07 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/12/11 12:26 upstream a39b6ac3781d 28b24332 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/10/15 01:47 upstream 727fb8376504 f757a323 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/08/25 15:38 upstream 4f9e7fabf864 03d9c195 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/07/17 05:26 upstream 20edcec23f92 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2023/07/15 20:26 upstream b6e6cc1f78c7 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/02/03 02:22 upstream 9f266ccaa2f5 16d19e30 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2022/10/03 06:30 upstream a962b54e162c feb56351 .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/09/19 04:11 upstream 38eddeedbbea dd9a85ff .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/18 16:02 upstream 274a2eebf80c d58e263f .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/11 05:36 upstream 200e340f2196 a6201f11 .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/04 08:15 upstream 200e340f2196 1c9013ac .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/07/14 17:11 upstream 4a57a8400075 5d921b08 .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/07/14 06:21 upstream 4a57a8400075 5d921b08 .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2022/07/12 23:29 upstream 72a8e05d4f66 d91dd8ea .config strace log report syz C ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/07/01 20:53 upstream a175eca0f3d7 1434eec0 .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2022/06/15 11:43 upstream 018ab4fabddd 127d1faf .config strace log report syz C ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/04/27 07:23 upstream cf424ef014ac 1fa34c1b .config console log report syz C ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2021/12/13 02:41 upstream 90d9fbc16b69 49ca1f59 .config console log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2024/04/28 22:06 linux-next bb7a2467e6be 07b455f9 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/10/26 17:48 linux-next 2ef7141596ee 23afc60f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/02/26 20:07 linux-next 8232539f864c ee50e71c .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2022/04/24 13:37 linux-next f1244c81da13 131df97d .config console log report syz C ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/08/05 16:52 upstream 024ff300db33 4ffcc9ef .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2023/07/11 17:16 upstream 3f01e9fed845 2f19aa4f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/06/15 18:24 upstream b6dad5178cea 757d26ed .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/06/15 04:44 upstream b6dad5178cea 76decb82 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/01/05 11:40 upstream 512dee0c00ad 1dac8c7a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/12/23 04:32 upstream 8395ae05cb5a 9da18ae8 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2022/12/03 07:34 upstream a4412fdd49dc e080de16 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/11/29 18:56 upstream ca57f02295f1 05dc7993 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/11/22 11:50 upstream eb7081409f94 1c576c23 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/11/16 15:46 upstream 81e7cfa3a9eb 3a127a31 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/10/05 08:23 upstream a5088ee7251e eab8f949 .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/09/19 03:16 upstream 38eddeedbbea dd9a85ff .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce possible deadlock in input_event
2022/09/19 02:45 upstream 38eddeedbbea dd9a85ff .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/09/07 23:30 upstream 0066f1b0e275 c5b7bc57 .config strace log report syz C ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/08/04 02:29 upstream 200e340f2196 1c9013ac .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2024/05/06 16:59 upstream dd5a440a31fa c035c6de .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/06 15:23 upstream dd5a440a31fa 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/06 02:16 upstream b9158815de52 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/06 01:10 upstream b9158815de52 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/05 20:57 upstream b9158815de52 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/05 17:19 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/05 16:15 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/05 14:48 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/05 11:32 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/05 06:42 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/05 05:21 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/05 01:07 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/05 00:03 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/04 21:14 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/04 14:56 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/04 12:19 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/04 10:49 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/05/04 02:07 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/05/03 22:51 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/03 22:44 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/03 15:05 upstream f03359bca01b 375d4445 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/03 12:28 upstream f03359bca01b 375d4445 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/03 10:41 upstream f03359bca01b 375d4445 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/05/03 07:11 upstream 49a73b1652c5 ddfc15a1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/03 06:02 upstream 49a73b1652c5 ddfc15a1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/03 04:12 upstream 49a73b1652c5 ddfc15a1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/03 03:02 upstream 49a73b1652c5 ddfc15a1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/02 21:57 upstream 49a73b1652c5 ddfc15a1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/05/02 21:44 upstream 49a73b1652c5 ddfc15a1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/02 20:37 upstream 49a73b1652c5 ddfc15a1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/02 19:40 upstream 49a73b1652c5 3ba885bc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/02 18:32 upstream 49a73b1652c5 3ba885bc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/04/30 18:46 upstream 50dffbf77180 9e0e6af1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/03/28 12:37 upstream fe46a7dd189e 120789fd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/05/06 09:00 upstream dd5a440a31fa d884b519 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/05/05 19:39 upstream b9158815de52 610f2a54 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/05/05 09:08 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/05/05 09:07 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/05/05 07:48 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/05/04 13:21 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/05/04 08:45 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in input_event
2024/05/04 07:13 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in input_event
2024/05/03 18:10 upstream 3d25a941ea50 610f2a54 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in input_event
2021/11/10 12:51 upstream cb690f5238d7 75b04091 .config console log report info ci-upstream-kasan-gce-386 possible deadlock in input_event
2021/11/10 04:33 upstream cb690f5238d7 55fa030c .config console log report info ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/05/06 10:08 linux-next 2b84edefcad1 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2024/05/06 03:53 linux-next 9221b2819b8a 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2024/05/05 22:06 linux-next 9221b2819b8a 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2024/05/05 03:04 linux-next 9221b2819b8a 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2024/05/04 18:06 linux-next 9221b2819b8a 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2024/05/03 09:48 linux-next 9221b2819b8a 375d4445 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
* Struck through repros no longer work on HEAD.