syzbot


possible deadlock in evdev_pass_values (2)

Status: upstream: reported on 2023/04/21 09:42
Subsystems: input
[Documentation on labels]
Reported-by: syzbot+13d3cb2a3dc61e6092f5@syzkaller.appspotmail.com
First crash: 917d, last: 2d19h
Discussions (27)
Title Replies (including bot) Last reply
[syzbot] Monthly input report (Oct 2025) 0 (1) 2025/10/16 08:36
[syzbot] Monthly input report (Sep 2025) 0 (1) 2025/09/15 06:53
[syzbot] Monthly input report (Aug 2025) 0 (1) 2025/08/14 12:42
[syzbot] Monthly input report (Jul 2025) 0 (1) 2025/07/14 07:23
[syzbot] Monthly input report (Jun 2025) 0 (1) 2025/06/13 12:25
[syzbot] Monthly input report (May 2025) 0 (1) 2025/05/12 13:34
[syzbot] Monthly input report (Apr 2025) 0 (1) 2025/04/09 07:11
[syzbot] Monthly input report (Mar 2025) 0 (1) 2025/03/08 22:15
[syzbot] Monthly input report (Jan 2025) 0 (1) 2025/01/06 10:01
[syzbot] Monthly input report (Dec 2024) 0 (1) 2024/12/05 09:04
[syzbot] Monthly input report (Nov 2024) 0 (1) 2024/11/04 08:58
[syzbot] Monthly input report (Oct 2024) 0 (1) 2024/10/03 09:03
[syzbot] Monthly input report (Sep 2024) 0 (1) 2024/09/02 08:17
[syzbot] Monthly input report (Aug 2024) 0 (1) 2024/08/02 07:26
[syzbot] Monthly input report (Jul 2024) 0 (1) 2024/07/01 10:27
[syzbot] Monthly input report (May 2024) 0 (1) 2024/05/31 06:48
[syzbot] Monthly input report (Apr 2024) 0 (1) 2024/04/29 12:34
[syzbot] Monthly input report (Mar 2024) 0 (1) 2024/03/19 12:48
[syzbot] Monthly input report (Feb 2024) 0 (1) 2024/02/17 20:23
[syzbot] Monthly input report (Jan 2024) 0 (1) 2024/01/17 09:21
[syzbot] Monthly input report (Dec 2023) 0 (1) 2023/12/16 23:58
[syzbot] Monthly input report (Nov 2023) 0 (1) 2023/11/16 04:11
[syzbot] Monthly input report (Oct 2023) 0 (1) 2023/10/16 08:53
[syzbot] Monthly fs report (Aug 2023) 0 (1) 2023/08/08 12:55
[syzbot] Monthly fs report (Jul 2023) 0 (1) 2023/07/10 09:36
[syzbot] Monthly fs report (May 2023) 0 (1) 2023/05/06 14:02
[syzbot] [fs?] possible deadlock in evdev_pass_values (2) 0 (1) 2023/04/21 09:42
Similar bugs (11)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream possible deadlock in evdev_pass_values fuse kernfs 4 351 921d 1744d 0/29 closed as dup on 2021/07/02 09:55
linux-5.15 possible deadlock in evdev_pass_values (3) 4 11 418d 451d 0/3 auto-obsoleted due to no activity on 2024/11/05 23:17
linux-6.1 possible deadlock in evdev_pass_values (3) 4 17 503d 570d 0/3 auto-obsoleted due to no activity on 2024/08/12 15:10
linux-5.15 possible deadlock in evdev_pass_values (4) 4 2 258d 269d 0/3 auto-obsoleted due to no activity on 2025/05/14 14:17
linux-6.1 possible deadlock in evdev_pass_values 4 1 841d 841d 0/3 auto-obsoleted due to no activity on 2023/10/09 19:52
linux-6.6 possible deadlock in evdev_pass_values 4 2 73d 82d 0/2 upstream: reported on 2025/07/29 23:28
linux-5.15 possible deadlock in evdev_pass_values 4 6 719d 822d 0/3 auto-obsoleted due to no activity on 2024/02/09 07:09
linux-6.1 possible deadlock in evdev_pass_values (4) 4 12 4d16h 199d 0/3 upstream: reported on 2025/04/03 09:00
linux-5.15 possible deadlock in evdev_pass_values (2) 4 22 537d 614d 0/3 auto-obsoleted due to no activity on 2024/07/10 03:27
linux-6.1 possible deadlock in evdev_pass_values (2) 4 1 702d 702d 0/3 auto-obsoleted due to no activity on 2024/02/25 22:49
linux-5.15 possible deadlock in evdev_pass_values (5) 4 3 4d19h 55d 0/3 upstream: reported on 2025/08/26 05:46

Sample crash report:
=====================================================
WARNING: SOFTIRQ-safe -> SOFTIRQ-unsafe lock order detected
syzkaller #0 Not tainted
-----------------------------------------------------
syz.3.5876/23744 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire:
ffff88806b1ec600 (&new->fa_lock){....}-{3:3}, at: kill_fasync_rcu fs/fcntl.c:1122 [inline]
ffff88806b1ec600 (&new->fa_lock){....}-{3:3}, at: kill_fasync+0x199/0x4d0 fs/fcntl.c:1146

and this task is already holding:
ffff8880276f6028 (&client->buffer_lock){..-.}-{3:3}, at: spin_lock include/linux/spinlock.h:351 [inline]
ffff8880276f6028 (&client->buffer_lock){..-.}-{3:3}, at: evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261
which would create a new lock dependency:
 (&client->buffer_lock){..-.}-{3:3} -> (&new->fa_lock){....}-{3:3}

but this new dependency connects a SOFTIRQ-irq-safe lock:
 (&client->buffer_lock){..-.}-{3:3}

... which became SOFTIRQ-irq-safe at:
  lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
  __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
  _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
  spin_lock include/linux/spinlock.h:351 [inline]
  evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261
  evdev_events+0x1e6/0x340 drivers/input/evdev.c:306
  input_pass_values+0x288/0x890 drivers/input/input.c:128
  input_event_dispose+0x3e5/0x6b0 drivers/input/input.c:353
  input_event+0x89/0xe0 drivers/input/input.c:396
  hidinput_hid_event+0x1302/0x1ca0 drivers/hid/hid-input.c:1725
  hid_process_event+0x4be/0x620 drivers/hid/hid-core.c:1565
  hid_process_report drivers/hid/hid-core.c:1713 [inline]
  hid_report_raw_event+0xe91/0x16d0 drivers/hid/hid-core.c:2074
  __hid_input_report drivers/hid/hid-core.c:2144 [inline]
  hid_input_report+0x43e/0x520 drivers/hid/hid-core.c:2166
  hid_irq_in+0x47e/0x6d0 drivers/hid/usbhid/hid-core.c:286
  __usb_hcd_giveback_urb+0x376/0x540 drivers/usb/core/hcd.c:1661
  dummy_timer+0x85f/0x44c0 drivers/usb/gadget/udc/dummy_hcd.c:1995
  __run_hrtimer kernel/time/hrtimer.c:1777 [inline]
  __hrtimer_run_queues+0x52c/0xc60 kernel/time/hrtimer.c:1841
  hrtimer_run_softirq+0x187/0x2b0 kernel/time/hrtimer.c:1858
  handle_softirqs+0x286/0x870 kernel/softirq.c:622
  __do_softirq kernel/softirq.c:656 [inline]
  invoke_softirq kernel/softirq.c:496 [inline]
  __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723
  irq_exit_rcu+0x9/0x30 kernel/softirq.c:739
  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]
  sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052
  asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
  deref_stack_reg arch/x86/kernel/unwind_orc.c:403 [inline]
  unwind_next_frame+0xc34/0x2390 arch/x86/kernel/unwind_orc.c:585
  arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25
  stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122
  kasan_save_stack mm/kasan/common.c:56 [inline]
  kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
  poison_kmalloc_redzone mm/kasan/common.c:400 [inline]
  __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:417
  kasan_kmalloc include/linux/kasan.h:262 [inline]
  __kmalloc_cache_noprof+0x3d5/0x6f0 mm/slub.c:5748
  kmalloc_noprof include/linux/slab.h:957 [inline]
  kzalloc_noprof include/linux/slab.h:1094 [inline]
  kernfs_fop_open+0x397/0xca0 fs/kernfs/file.c:641
  do_dentry_open+0x953/0x13f0 fs/open.c:965
  vfs_open+0x3b/0x340 fs/open.c:1097
  do_open fs/namei.c:3975 [inline]
  path_openat+0x2ee5/0x3830 fs/namei.c:4134
  do_filp_open+0x1fa/0x410 fs/namei.c:4161
  do_sys_openat2+0x121/0x1c0 fs/open.c:1437
  do_sys_open fs/open.c:1452 [inline]
  __do_sys_openat fs/open.c:1468 [inline]
  __se_sys_openat fs/open.c:1463 [inline]
  __x64_sys_openat+0x138/0x170 fs/open.c:1463
  do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
  do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
  entry_SYSCALL_64_after_hwframe+0x77/0x7f

to a SOFTIRQ-irq-unsafe lock:
 (tasklist_lock){.+.+}-{3:3}

... which became SOFTIRQ-irq-unsafe at:
...
  lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
  __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
  _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
  __do_wait+0xde/0x740 kernel/exit.c:1667
  do_wait+0x1f8/0x510 kernel/exit.c:1711
  kernel_wait+0xab/0x170 kernel/exit.c:1887
  call_usermodehelper_exec_sync kernel/umh.c:136 [inline]
  call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163
  process_one_work kernel/workqueue.c:3263 [inline]
  process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
  worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
  kthread+0x711/0x8a0 kernel/kthread.c:463
  ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245

other info that might help us debug this:

Chain exists of:
  &client->buffer_lock --> &new->fa_lock --> tasklist_lock

 Possible interrupt unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(tasklist_lock);
                               local_irq_disable();
                               lock(&client->buffer_lock);
                               lock(&new->fa_lock);
  <Interrupt>
    lock(&client->buffer_lock);

 *** DEADLOCK ***

7 locks held by syz.3.5876/23744:
 #0: ffff888149661118 (&evdev->mutex){+.+.}-{4:4}, at: evdev_write+0x1a1/0x480 drivers/input/evdev.c:511
 #1: ffff8881462e5230 (&dev->event_lock#2){..-.}-{3:3}, at: class_spinlock_irqsave_constructor include/linux/spinlock.h:585 [inline]
 #1: ffff8881462e5230 (&dev->event_lock#2){..-.}-{3:3}, at: input_inject_event+0xa5/0x340 drivers/input/input.c:419
 #2: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #2: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline]
 #2: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: class_rcu_constructor include/linux/rcupdate.h:1195 [inline]
 #2: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: input_inject_event+0xb6/0x340 drivers/input/input.c:420
 #3: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #3: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline]
 #3: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: class_rcu_constructor include/linux/rcupdate.h:1195 [inline]
 #3: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: input_pass_values+0x8d/0x890 drivers/input/input.c:119
 #4: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #4: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline]
 #4: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: evdev_events+0x79/0x340 drivers/input/evdev.c:298
 #5: ffff8880276f6028 (&client->buffer_lock){..-.}-{3:3}, at: spin_lock include/linux/spinlock.h:351 [inline]
 #5: ffff8880276f6028 (&client->buffer_lock){..-.}-{3:3}, at: evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261
 #6: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #6: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:867 [inline]
 #6: ffffffff8e13d2e0 (rcu_read_lock){....}-{1:3}, at: kill_fasync+0x53/0x4d0 fs/fcntl.c:1145

the dependencies between SOFTIRQ-irq-safe lock and the holding lock:
-> (&client->buffer_lock){..-.}-{3:3} {
   IN-SOFTIRQ-W at:
                    lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
                    __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
                    _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
                    spin_lock include/linux/spinlock.h:351 [inline]
                    evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261
                    evdev_events+0x1e6/0x340 drivers/input/evdev.c:306
                    input_pass_values+0x288/0x890 drivers/input/input.c:128
                    input_event_dispose+0x3e5/0x6b0 drivers/input/input.c:353
                    input_event+0x89/0xe0 drivers/input/input.c:396
                    hidinput_hid_event+0x1302/0x1ca0 drivers/hid/hid-input.c:1725
                    hid_process_event+0x4be/0x620 drivers/hid/hid-core.c:1565
                    hid_process_report drivers/hid/hid-core.c:1713 [inline]
                    hid_report_raw_event+0xe91/0x16d0 drivers/hid/hid-core.c:2074
                    __hid_input_report drivers/hid/hid-core.c:2144 [inline]
                    hid_input_report+0x43e/0x520 drivers/hid/hid-core.c:2166
                    hid_irq_in+0x47e/0x6d0 drivers/hid/usbhid/hid-core.c:286
                    __usb_hcd_giveback_urb+0x376/0x540 drivers/usb/core/hcd.c:1661
                    dummy_timer+0x85f/0x44c0 drivers/usb/gadget/udc/dummy_hcd.c:1995
                    __run_hrtimer kernel/time/hrtimer.c:1777 [inline]
                    __hrtimer_run_queues+0x52c/0xc60 kernel/time/hrtimer.c:1841
                    hrtimer_run_softirq+0x187/0x2b0 kernel/time/hrtimer.c:1858
                    handle_softirqs+0x286/0x870 kernel/softirq.c:622
                    __do_softirq kernel/softirq.c:656 [inline]
                    invoke_softirq kernel/softirq.c:496 [inline]
                    __irq_exit_rcu+0xca/0x1f0 kernel/softirq.c:723
                    irq_exit_rcu+0x9/0x30 kernel/softirq.c:739
                    instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]
                    sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1052
                    asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
                    deref_stack_reg arch/x86/kernel/unwind_orc.c:403 [inline]
                    unwind_next_frame+0xc34/0x2390 arch/x86/kernel/unwind_orc.c:585
                    arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25
                    stack_trace_save+0x9c/0xe0 kernel/stacktrace.c:122
                    kasan_save_stack mm/kasan/common.c:56 [inline]
                    kasan_save_track+0x3e/0x80 mm/kasan/common.c:77
                    poison_kmalloc_redzone mm/kasan/common.c:400 [inline]
                    __kasan_kmalloc+0x93/0xb0 mm/kasan/common.c:417
                    kasan_kmalloc include/linux/kasan.h:262 [inline]
                    __kmalloc_cache_noprof+0x3d5/0x6f0 mm/slub.c:5748
                    kmalloc_noprof include/linux/slab.h:957 [inline]
                    kzalloc_noprof include/linux/slab.h:1094 [inline]
                    kernfs_fop_open+0x397/0xca0 fs/kernfs/file.c:641
                    do_dentry_open+0x953/0x13f0 fs/open.c:965
                    vfs_open+0x3b/0x340 fs/open.c:1097
                    do_open fs/namei.c:3975 [inline]
                    path_openat+0x2ee5/0x3830 fs/namei.c:4134
                    do_filp_open+0x1fa/0x410 fs/namei.c:4161
                    do_sys_openat2+0x121/0x1c0 fs/open.c:1437
                    do_sys_open fs/open.c:1452 [inline]
                    __do_sys_openat fs/open.c:1468 [inline]
                    __se_sys_openat fs/open.c:1463 [inline]
                    __x64_sys_openat+0x138/0x170 fs/open.c:1463
                    do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
                    do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
                    entry_SYSCALL_64_after_hwframe+0x77/0x7f
   INITIAL USE at:
                   lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
                   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
                   _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
                   spin_lock include/linux/spinlock.h:351 [inline]
                   evdev_pass_values+0xb9/0xbd0 drivers/input/evdev.c:261
                   evdev_events+0x1aa/0x340 drivers/input/evdev.c:303
                   input_pass_values+0x1c2/0x890 drivers/input/input.c:122
                   input_event_dispose+0x330/0x6b0 drivers/input/input.c:342
                   input_inject_event+0x1dd/0x340 drivers/input/input.c:424
                   evdev_write+0x2fc/0x480 drivers/input/evdev.c:528
                   vfs_write+0x27e/0xb30 fs/read_write.c:684
                   ksys_write+0x145/0x250 fs/read_write.c:738
                   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
                   do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
                   entry_SYSCALL_64_after_hwframe+0x77/0x7f
 }
 ... key      at: [<ffffffff99d593a0>] evdev_open.__key.25+0x0/0x20

the dependencies between the lock to be acquired
 and SOFTIRQ-irq-unsafe lock:
  -> (tasklist_lock){.+.+}-{3:3} {
     HARDIRQ-ON-R at:
                        lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
                        __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                        _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                        __do_wait+0xde/0x740 kernel/exit.c:1667
                        do_wait+0x1f8/0x510 kernel/exit.c:1711
                        kernel_wait+0xab/0x170 kernel/exit.c:1887
                        call_usermodehelper_exec_sync kernel/umh.c:136 [inline]
                        call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163
                        process_one_work kernel/workqueue.c:3263 [inline]
                        process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
                        worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
                        kthread+0x711/0x8a0 kernel/kthread.c:463
                        ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
                        ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
     SOFTIRQ-ON-R at:
                        lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
                        __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                        _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                        __do_wait+0xde/0x740 kernel/exit.c:1667
                        do_wait+0x1f8/0x510 kernel/exit.c:1711
                        kernel_wait+0xab/0x170 kernel/exit.c:1887
                        call_usermodehelper_exec_sync kernel/umh.c:136 [inline]
                        call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163
                        process_one_work kernel/workqueue.c:3263 [inline]
                        process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
                        worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
                        kthread+0x711/0x8a0 kernel/kthread.c:463
                        ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
                        ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
     INITIAL USE at:
                       lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
                       __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                       _raw_write_lock_irq+0xa2/0xf0 kernel/locking/spinlock.c:326
                       copy_process+0x224f/0x3c00 kernel/fork.c:2327
                       kernel_clone+0x21e/0x840 kernel/fork.c:2609
                       user_mode_thread+0xdd/0x140 kernel/fork.c:2685
                       rest_init+0x23/0x300 init/main.c:722
                       start_kernel+0x3ae/0x410 init/main.c:1111
                       x86_64_start_reservations+0x24/0x30 arch/x86/kernel/head64.c:310
                       x86_64_start_kernel+0x143/0x1c0 arch/x86/kernel/head64.c:291
                       common_startup_64+0x13e/0x147
     INITIAL READ USE at:
                            lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
                            __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                            _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                            __do_wait+0xde/0x740 kernel/exit.c:1667
                            do_wait+0x1f8/0x510 kernel/exit.c:1711
                            kernel_wait+0xab/0x170 kernel/exit.c:1887
                            call_usermodehelper_exec_sync kernel/umh.c:136 [inline]
                            call_usermodehelper_exec_work+0xbe/0x230 kernel/umh.c:163
                            process_one_work kernel/workqueue.c:3263 [inline]
                            process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3346
                            worker_thread+0x8a0/0xda0 kernel/workqueue.c:3427
                            kthread+0x711/0x8a0 kernel/kthread.c:463
                            ret_from_fork+0x4bc/0x870 arch/x86/kernel/process.c:158
                            ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
   }
   ... key      at: [<ffffffff8de0c058>] tasklist_lock+0x18/0x40
   ... acquired at:
   lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
   __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
   _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
   send_sigio+0x101/0x370 fs/fcntl.c:919
   dnotify_handle_event+0x169/0x440 fs/notify/dnotify/dnotify.c:113
   fsnotify_handle_event fs/notify/fsnotify.c:376 [inline]
   send_to_group fs/notify/fsnotify.c:424 [inline]
   fsnotify+0x1814/0x1a80 fs/notify/fsnotify.c:641
   fsnotify_name include/linux/fsnotify.h:55 [inline]
   fsnotify_dirent include/linux/fsnotify.h:61 [inline]
   fsnotify_mkdir include/linux/fsnotify.h:404 [inline]
   vfs_mkdir+0x477/0x510 fs/namei.c:4461
   do_mkdirat+0x247/0x590 fs/namei.c:4486
   __do_sys_mkdirat fs/namei.c:4503 [inline]
   __se_sys_mkdirat fs/namei.c:4501 [inline]
   __x64_sys_mkdirat+0x87/0xa0 fs/namei.c:4501
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

 -> (&f_owner->lock){....}-{3:3} {
    INITIAL USE at:
                     lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
                     __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                     _raw_write_lock_irq+0xa2/0xf0 kernel/locking/spinlock.c:326
                     __f_setown+0x67/0x370 fs/fcntl.c:136
                     fcntl_dirnotify+0x3fa/0x6a0 fs/notify/dnotify/dnotify.c:369
                     do_fcntl+0x6d0/0x1910 fs/fcntl.c:537
                     __do_sys_fcntl fs/fcntl.c:589 [inline]
                     __se_sys_fcntl+0xc8/0x150 fs/fcntl.c:574
                     do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
                     do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
                     entry_SYSCALL_64_after_hwframe+0x77/0x7f
    INITIAL READ USE at:
                          lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
                          __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                          _raw_read_lock_irqsave+0xaf/0x100 kernel/locking/spinlock.c:236
                          send_sigio+0x38/0x370 fs/fcntl.c:905
                          dnotify_handle_event+0x169/0x440 fs/notify/dnotify/dnotify.c:113
                          fsnotify_handle_event fs/notify/fsnotify.c:376 [inline]
                          send_to_group fs/notify/fsnotify.c:424 [inline]
                          fsnotify+0x1814/0x1a80 fs/notify/fsnotify.c:641
                          fsnotify_name include/linux/fsnotify.h:55 [inline]
                          fsnotify_dirent include/linux/fsnotify.h:61 [inline]
                          fsnotify_mkdir include/linux/fsnotify.h:404 [inline]
                          vfs_mkdir+0x477/0x510 fs/namei.c:4461
                          do_mkdirat+0x247/0x590 fs/namei.c:4486
                          __do_sys_mkdirat fs/namei.c:4503 [inline]
                          __se_sys_mkdirat fs/namei.c:4501 [inline]
                          __x64_sys_mkdirat+0x87/0xa0 fs/namei.c:4501
                          do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
                          do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
                          entry_SYSCALL_64_after_hwframe+0x77/0x7f
  }
  ... key      at: [<ffffffff99a3c880>] file_f_owner_allocate.__key+0x0/0x20
  ... acquired at:
   lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0xaf/0x100 kernel/locking/spinlock.c:236
   send_sigio+0x38/0x370 fs/fcntl.c:905
   kill_fasync_rcu fs/fcntl.c:1131 [inline]
   kill_fasync+0x24d/0x4d0 fs/fcntl.c:1146
   lease_break_callback+0x26/0x30 fs/locks.c:558
   __break_lease+0x6a5/0x1620 fs/locks.c:1592
   break_lease include/linux/filelock.h:446 [inline]
   do_dentry_open+0x8b7/0x13f0 fs/open.c:956
   vfs_open+0x3b/0x340 fs/open.c:1097
   do_open fs/namei.c:3975 [inline]
   path_openat+0x2ee5/0x3830 fs/namei.c:4134
   do_filp_open+0x1fa/0x410 fs/namei.c:4161
   do_sys_openat2+0x121/0x1c0 fs/open.c:1437
   do_sys_open fs/open.c:1452 [inline]
   __do_sys_openat fs/open.c:1468 [inline]
   __se_sys_openat fs/open.c:1463 [inline]
   __x64_sys_openat+0x138/0x170 fs/open.c:1463
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> (&new->fa_lock){....}-{3:3} {
   INITIAL USE at:
                   lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
                   __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                   _raw_write_lock_irq+0xa2/0xf0 kernel/locking/spinlock.c:326
                   fasync_remove_entry+0xf1/0x1c0 fs/fcntl.c:999
                   sock_fasync+0x85/0xf0 net/socket.c:1480
                   __fput+0x8a2/0xa70 fs/file_table.c:465
                   task_work_run+0x1d4/0x260 kernel/task_work.c:227
                   resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
                   exit_to_user_mode_loop+0xe9/0x130 kernel/entry/common.c:43
                   exit_to_user_mode_prepare include/linux/irq-entry-common.h:225 [inline]
                   syscall_exit_to_user_mode_work include/linux/entry-common.h:175 [inline]
                   syscall_exit_to_user_mode include/linux/entry-common.h:210 [inline]
                   do_syscall_64+0x2bd/0xfa0 arch/x86/entry/syscall_64.c:100
                   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   INITIAL READ USE at:
                        lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
                        __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                        _raw_read_lock_irqsave+0xaf/0x100 kernel/locking/spinlock.c:236
                        kill_fasync_rcu fs/fcntl.c:1122 [inline]
                        kill_fasync+0x199/0x4d0 fs/fcntl.c:1146
                        sock_wake_async+0x137/0x160 net/socket.c:-1
                        sk_wake_async+0x189/0x280 include/net/sock.h:2539
                        tcp_rcv_state_process+0x1d9d/0x44d0 net/ipv4/tcp_input.c:7029
                        tcp_v6_do_rcv+0x89d/0x13f0 net/ipv6/tcp_ipv6.c:1675
                        sk_backlog_rcv include/net/sock.h:1158 [inline]
                        __release_sock+0x1b8/0x3a0 net/core/sock.c:3180
                        release_sock+0x5f/0x1f0 net/core/sock.c:3735
                        inet_wait_for_connect net/ipv4/af_inet.c:611 [inline]
                        __inet_stream_connect+0x8df/0xe70 net/ipv4/af_inet.c:705
                        inet_stream_connect+0x66/0xa0 net/ipv4/af_inet.c:750
                        __sys_connect_file net/socket.c:2102 [inline]
                        __sys_connect+0x316/0x440 net/socket.c:2121
                        __do_sys_connect net/socket.c:2127 [inline]
                        __se_sys_connect net/socket.c:2124 [inline]
                        __x64_sys_connect+0x7a/0x90 net/socket.c:2124
                        do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
                        do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
                        entry_SYSCALL_64_after_hwframe+0x77/0x7f
 }
 ... key      at: [<ffffffff99a3c8a0>] fasync_insert_entry.__key+0x0/0x20
 ... acquired at:
   lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0xaf/0x100 kernel/locking/spinlock.c:236
   kill_fasync_rcu fs/fcntl.c:1122 [inline]
   kill_fasync+0x199/0x4d0 fs/fcntl.c:1146
   __pass_event drivers/input/evdev.c:240 [inline]
   evdev_pass_values+0x627/0xbd0 drivers/input/evdev.c:278
   evdev_events+0x1e6/0x340 drivers/input/evdev.c:306
   input_pass_values+0x288/0x890 drivers/input/input.c:128
   input_event_dispose+0x330/0x6b0 drivers/input/input.c:342
   input_inject_event+0x1dd/0x340 drivers/input/input.c:424
   evdev_write+0x2fc/0x480 drivers/input/evdev.c:528
   vfs_write+0x27e/0xb30 fs/read_write.c:684
   ksys_write+0x145/0x250 fs/read_write.c:738
   do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
   do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
   entry_SYSCALL_64_after_hwframe+0x77/0x7f


stack backtrace:
CPU: 1 UID: 0 PID: 23744 Comm: syz.3.5876 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_bad_irq_dependency kernel/locking/lockdep.c:2616 [inline]
 check_irq_usage kernel/locking/lockdep.c:2857 [inline]
 check_prev_add kernel/locking/lockdep.c:3169 [inline]
 check_prevs_add kernel/locking/lockdep.c:3284 [inline]
 validate_chain+0x1f05/0x2140 kernel/locking/lockdep.c:3908
 __lock_acquire+0xab9/0xd20 kernel/locking/lockdep.c:5237
 lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
 _raw_read_lock_irqsave+0xaf/0x100 kernel/locking/spinlock.c:236
 kill_fasync_rcu fs/fcntl.c:1122 [inline]
 kill_fasync+0x199/0x4d0 fs/fcntl.c:1146
 __pass_event drivers/input/evdev.c:240 [inline]
 evdev_pass_values+0x627/0xbd0 drivers/input/evdev.c:278
 evdev_events+0x1e6/0x340 drivers/input/evdev.c:306
 input_pass_values+0x288/0x890 drivers/input/input.c:128
 input_event_dispose+0x330/0x6b0 drivers/input/input.c:342
 input_inject_event+0x1dd/0x340 drivers/input/input.c:424
 evdev_write+0x2fc/0x480 drivers/input/evdev.c:528
 vfs_write+0x27e/0xb30 fs/read_write.c:684
 ksys_write+0x145/0x250 fs/read_write.c:738
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0xfa0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7fc27e38efc9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fc27f18a038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007fc27e5e5fa0 RCX: 00007fc27e38efc9
RDX: 0000000000001068 RSI: 0000200000000040 RDI: 0000000000000004
RBP: 00007fc27e411f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007fc27e5e6038 R14: 00007fc27e5e5fa0 R15: 00007fc27e70fa28
 </TASK>

Crashes (1445):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/10/17 11:33 upstream 98ac9cc4b445 7adf5298 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/17 09:16 upstream 98ac9cc4b445 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/16 21:00 upstream 98ac9cc4b445 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/16 16:15 upstream 7ea30958b305 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/16 14:04 upstream 7ea30958b305 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/16 07:18 upstream 7ea30958b305 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/16 06:17 upstream 1f4a222b0e33 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/16 04:39 upstream 1f4a222b0e33 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/16 00:40 upstream 1f4a222b0e33 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/15 17:29 upstream 1f4a222b0e33 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/15 14:19 upstream 9b332cece987 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/15 10:25 upstream 9b332cece987 b6605ba8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/14 17:46 upstream 9b332cece987 b6605ba8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/14 15:27 upstream 3a8660878839 b6605ba8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/14 09:15 upstream 3a8660878839 b6605ba8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/13 17:54 upstream 3a8660878839 b6605ba8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/13 17:53 upstream 3a8660878839 b6605ba8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/10/13 12:19 upstream 3a8660878839 ff1712fe .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/27 23:25 upstream fec734e8d564 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/27 12:42 upstream fec734e8d564 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/26 23:46 upstream 083fc6d7fa0d 001c9061 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/26 22:03 upstream 083fc6d7fa0d 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/26 15:34 upstream 4ff71af020ae 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/25 23:18 upstream 4ff71af020ae 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/25 11:27 upstream bf40f4b87761 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/25 10:11 upstream bf40f4b87761 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/24 20:44 upstream 4ea5af085908 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/24 05:29 upstream cec1e6e5d1ab 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/19 12:53 upstream 097a6c336d00 67c37560 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in evdev_pass_values
2025/09/08 17:27 upstream 76eeb9b8de98 d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/08 03:23 upstream 6ab41fca2e80 d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/07 07:00 upstream b236920731dd d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in evdev_pass_values
2025/09/06 21:19 upstream d1d10cea0895 d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/08/31 05:18 upstream c8bc81a52d5a 807a3b61 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in evdev_pass_values
2025/08/23 14:33 upstream 038d61fd6422 bf27483f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in evdev_pass_values
2025/08/08 07:41 upstream bec077162bd0 6a893178 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in evdev_pass_values
2025/07/28 17:44 upstream 038d61fd6422 c4a95487 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in evdev_pass_values
2025/09/13 03:30 upstream 22f20375f5b7 e2beed91 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in evdev_pass_values
2025/09/12 21:04 upstream 320475fbd590 e2beed91 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in evdev_pass_values
2025/09/12 12:02 upstream 320475fbd590 e2beed91 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in evdev_pass_values
2025/09/11 18:39 upstream 02ffd6f89c50 fdeaa69b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in evdev_pass_values
2025/09/10 22:19 upstream 7aac71907bde fdeaa69b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in evdev_pass_values
2025/09/10 01:14 upstream 9dd1835ecda5 fdeaa69b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in evdev_pass_values
2025/09/09 16:54 upstream f777d1112ee5 d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in evdev_pass_values
2025/09/09 01:05 upstream f777d1112ee5 d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in evdev_pass_values
2025/09/08 23:14 upstream f777d1112ee5 d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in evdev_pass_values
2025/09/08 09:34 upstream 76eeb9b8de98 d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in evdev_pass_values
2025/08/26 16:11 upstream fab1beda7597 e12e5ba4 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in evdev_pass_values
2025/07/14 17:11 upstream 347e9f5043c8 d8fc7335 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in evdev_pass_values
2023/04/19 19:50 upstream 789b4a41c247 a219f34e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2023/04/16 17:07 upstream 3e7bb4f24617 ec410564 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in evdev_pass_values
2025/09/19 11:38 linux-next 8f7f8b1b3f4c e2beed91 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in evdev_pass_values
2025/09/05 05:02 linux-next 4ac65880ebca d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in evdev_pass_values
2025/08/09 16:19 linux-next b1549501188c 32a0e5ed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-rust-kasan-gce possible deadlock in evdev_pass_values
* Struck through repros no longer work on HEAD.