syzbot


possible deadlock in uinput_request_submit

Status: upstream: reported C repro on 2024/04/26 04:42
Subsystems: input
[Documentation on labels]
Reported-by: syzbot+159077b1355b8cd72757@syzkaller.appspotmail.com
First crash: 546d, last: 3d22h
Cause bisection: failed (error log, bisect log)
  
Discussions (17)
Title Replies (including bot) Last reply
[syzbot] Monthly input report (Oct 2025) 0 (1) 2025/10/16 08:36
[syzbot] Monthly input report (Sep 2025) 0 (1) 2025/09/15 06:53
[syzbot] Monthly input report (Aug 2025) 0 (1) 2025/08/14 12:42
[syzbot] Monthly input report (Jul 2025) 0 (1) 2025/07/14 07:23
[syzbot] Monthly input report (Jun 2025) 0 (1) 2025/06/13 12:25
[syzbot] Monthly input report (May 2025) 0 (1) 2025/05/12 13:34
[syzbot] Monthly input report (Apr 2025) 0 (1) 2025/04/09 07:11
[syzbot] Monthly input report (Mar 2025) 0 (1) 2025/03/08 22:15
[syzbot] Monthly input report (Feb 2025) 0 (1) 2025/02/05 12:43
[syzbot] Monthly input report (Jan 2025) 0 (1) 2025/01/06 10:01
[syzbot] Monthly input report (Dec 2024) 0 (1) 2024/12/05 09:04
[syzbot] Monthly input report (Nov 2024) 0 (1) 2024/11/04 08:58
[syzbot] Monthly input report (Sep 2024) 0 (1) 2024/09/02 08:17
[syzbot] Monthly input report (Aug 2024) 0 (1) 2024/08/02 07:26
[syzbot] Monthly input report (Jul 2024) 0 (1) 2024/07/01 10:27
[syzbot] Monthly input report (May 2024) 0 (1) 2024/05/31 06:48
[syzbot] [input?] [ext4?] possible deadlock in uinput_request_submit 2 (5) 2024/04/26 15:03
Similar bugs (3)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.1 possible deadlock in uinput_request_submit origin:upstream missing-backport 4 C error 10 9d09h 533d 0/3 upstream: reported C repro on 2024/05/05 13:52
android-49 possible deadlock in uinput_request_submit 4 C 5 2272d 2381d 0/3 public: reported C repro on 2019/04/14 09:33
linux-5.15 possible deadlock in uinput_request_submit origin:upstream 4 C 8 13d 533d 0/3 upstream: reported C repro on 2024/05/05 13:53
Last patch testing requests (12)
Created Duration User Patch Repo Result
2025/09/08 17:22 16m retest repro upstream report log
2025/09/08 17:22 16m retest repro upstream report log
2025/09/08 17:22 16m retest repro upstream report log
2025/09/08 17:40 13m retest repro upstream report log
2025/09/08 17:22 24m retest repro upstream report log
2025/08/24 10:17 27m retest repro upstream report log
2025/08/24 10:17 18m retest repro upstream report log
2025/08/24 10:17 17m retest repro upstream report log
2025/08/24 10:17 19m retest repro upstream report log
2025/08/24 10:17 19m retest repro upstream report log
2024/04/26 14:35 24m hdanton@sina.com patch https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git 7b4f2bc91c15 OK log
2024/04/26 11:02 23m hdanton@sina.com patch https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git 7b4f2bc91c15 report log
Fix bisection attempts (1)
Created Duration User Patch Repo Result
2024/10/06 00:17 2h52m bisect fix upstream OK (0) job log log

Sample crash report:
======================================================
WARNING: possible circular locking dependency detected
syzkaller #0 Not tainted
------------------------------------------------------
syz.5.36/6229 is trying to acquire lock:
ffff888030a81070 (&newdev->mutex){+.+.}-{4:4}, at: uinput_request_send drivers/input/misc/uinput.c:151 [inline]
ffff888030a81070 (&newdev->mutex){+.+.}-{4:4}, at: uinput_request_submit+0x188/0x6f0 drivers/input/misc/uinput.c:182

but task is already holding lock:
ffff88807b3dc8b0 (&ff->mutex){+.+.}-{4:4}, at: class_mutex_constructor include/linux/mutex.h:228 [inline]
ffff88807b3dc8b0 (&ff->mutex){+.+.}-{4:4}, at: input_ff_upload+0x398/0xb30 drivers/input/ff-core.c:122

which lock already depends on the new lock.


the existing dependency chain (in reverse order) is:

-> #3 (&ff->mutex){+.+.}-{4:4}:
       lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
       __mutex_lock_common kernel/locking/mutex.c:598 [inline]
       __mutex_lock+0x187/0x1350 kernel/locking/mutex.c:760
       class_mutex_constructor include/linux/mutex.h:228 [inline]
       input_ff_flush+0x5d/0x170 drivers/input/ff-core.c:231
       input_flush_device+0xb4/0x110 drivers/input/input.c:627
       evdev_release+0xe1/0x800 drivers/input/evdev.c:435
       __fput+0x44c/0xa70 fs/file_table.c:468
       fput_close_sync+0x119/0x200 fs/file_table.c:573
       __do_sys_close fs/open.c:1587 [inline]
       __se_sys_close fs/open.c:1572 [inline]
       __x64_sys_close+0x7f/0x110 fs/open.c:1572
       do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
       do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> #2 (&dev->mutex#2){+.+.}-{4:4}:
       lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
       __mutex_lock_common kernel/locking/mutex.c:598 [inline]
       __mutex_lock+0x187/0x1350 kernel/locking/mutex.c:760
       class_mutex_intr_constructor include/linux/mutex.h:230 [inline]
       input_register_handle+0x18f/0x530 drivers/input/input.c:2653
       kbd_connect+0xc3/0x140 drivers/tty/vt/keyboard.c:1580
       input_attach_handler drivers/input/input.c:993 [inline]
       input_register_device+0xd00/0x1140 drivers/input/input.c:2412
       acpi_button_add+0x6b1/0xb50 drivers/acpi/button.c:621
       acpi_device_probe+0xa8/0x2d0 drivers/acpi/bus.c:1076
       call_driver_probe drivers/base/dd.c:-1 [inline]
       really_probe+0x26d/0x9e0 drivers/base/dd.c:659
       __driver_probe_device+0x18c/0x2f0 drivers/base/dd.c:801
       driver_probe_device+0x4f/0x430 drivers/base/dd.c:831
       __driver_attach+0x452/0x700 drivers/base/dd.c:1217
       bus_for_each_dev+0x233/0x2b0 drivers/base/bus.c:370
       bus_add_driver+0x345/0x640 drivers/base/bus.c:678
       driver_register+0x23a/0x320 drivers/base/driver.c:249
       do_one_initcall+0x236/0x820 init/main.c:1269
       do_initcall_level+0x104/0x190 init/main.c:1331
       do_initcalls+0x59/0xa0 init/main.c:1347
       kernel_init_freeable+0x334/0x4b0 init/main.c:1579
       kernel_init+0x1d/0x1d0 init/main.c:1469
       ret_from_fork+0x439/0x7d0 arch/x86/kernel/process.c:148
       ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245

-> #1 (input_mutex){+.+.}-{4:4}:
       lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
       __mutex_lock_common kernel/locking/mutex.c:598 [inline]
       __mutex_lock+0x187/0x1350 kernel/locking/mutex.c:760
       class_mutex_intr_constructor include/linux/mutex.h:230 [inline]
       input_register_device+0xa76/0x1140 drivers/input/input.c:2408
       uinput_create_device+0x422/0x670 drivers/input/misc/uinput.c:365
       uinput_ioctl_handler+0x3f0/0x1570 drivers/input/misc/uinput.c:918
       vfs_ioctl fs/ioctl.c:51 [inline]
       __do_sys_ioctl fs/ioctl.c:598 [inline]
       __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:584
       do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
       do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> #0 (&newdev->mutex){+.+.}-{4:4}:
       check_prev_add kernel/locking/lockdep.c:3165 [inline]
       check_prevs_add kernel/locking/lockdep.c:3284 [inline]
       validate_chain+0xb9b/0x2140 kernel/locking/lockdep.c:3908
       __lock_acquire+0xab9/0xd20 kernel/locking/lockdep.c:5237
       lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
       __mutex_lock_common kernel/locking/mutex.c:598 [inline]
       __mutex_lock+0x187/0x1350 kernel/locking/mutex.c:760
       uinput_request_send drivers/input/misc/uinput.c:151 [inline]
       uinput_request_submit+0x188/0x6f0 drivers/input/misc/uinput.c:182
       uinput_dev_upload_effect+0x150/0x1e0 drivers/input/misc/uinput.c:257
       input_ff_upload+0x5fb/0xb30 drivers/input/ff-core.c:148
       evdev_do_ioctl drivers/input/evdev.c:1181 [inline]
       evdev_ioctl_handler+0x1644/0x1f10 drivers/input/evdev.c:1270
       vfs_ioctl fs/ioctl.c:51 [inline]
       __do_sys_ioctl fs/ioctl.c:598 [inline]
       __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:584
       do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
       do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
       entry_SYSCALL_64_after_hwframe+0x77/0x7f

other info that might help us debug this:

Chain exists of:
  &newdev->mutex --> &dev->mutex#2 --> &ff->mutex

 Possible unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&ff->mutex);
                               lock(&dev->mutex#2);
                               lock(&ff->mutex);
  lock(&newdev->mutex);

 *** DEADLOCK ***

2 locks held by syz.5.36/6229:
 #0: ffff88802ea9d118 (&evdev->mutex){+.+.}-{4:4}, at: evdev_ioctl_handler+0x121/0x1f10 drivers/input/evdev.c:1261
 #1: ffff88807b3dc8b0 (&ff->mutex){+.+.}-{4:4}, at: class_mutex_constructor include/linux/mutex.h:228 [inline]
 #1: ffff88807b3dc8b0 (&ff->mutex){+.+.}-{4:4}, at: input_ff_upload+0x398/0xb30 drivers/input/ff-core.c:122

stack backtrace:
CPU: 0 UID: 0 PID: 6229 Comm: syz.5.36 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_circular_bug+0x2ee/0x310 kernel/locking/lockdep.c:2043
 check_noncircular+0x134/0x160 kernel/locking/lockdep.c:2175
 check_prev_add kernel/locking/lockdep.c:3165 [inline]
 check_prevs_add kernel/locking/lockdep.c:3284 [inline]
 validate_chain+0xb9b/0x2140 kernel/locking/lockdep.c:3908
 __lock_acquire+0xab9/0xd20 kernel/locking/lockdep.c:5237
 lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5868
 __mutex_lock_common kernel/locking/mutex.c:598 [inline]
 __mutex_lock+0x187/0x1350 kernel/locking/mutex.c:760
 uinput_request_send drivers/input/misc/uinput.c:151 [inline]
 uinput_request_submit+0x188/0x6f0 drivers/input/misc/uinput.c:182
 uinput_dev_upload_effect+0x150/0x1e0 drivers/input/misc/uinput.c:257
 input_ff_upload+0x5fb/0xb30 drivers/input/ff-core.c:148
 evdev_do_ioctl drivers/input/evdev.c:1181 [inline]
 evdev_ioctl_handler+0x1644/0x1f10 drivers/input/evdev.c:1270
 vfs_ioctl fs/ioctl.c:51 [inline]
 __do_sys_ioctl fs/ioctl.c:598 [inline]
 __se_sys_ioctl+0xfc/0x170 fs/ioctl.c:584
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f7554d8eec9
Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007fff16defc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
RAX: ffffffffffffffda RBX: 00007f7554fe5fa0 RCX: 00007f7554d8eec9
RDX: 0000200000000300 RSI: 0000000040304580 RDI: 0000000000000003
RBP: 00007f7554e11f91 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f7554fe5fa0 R14: 00007f7554fe5fa0 R15: 0000000000000003
 </TASK>
input: syz1 as /devices/virtual/input/input22

Crashes (66):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/09/23 14:24 upstream cec1e6e5d1ab 0ac7291c .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in uinput_request_submit
2025/09/15 06:21 upstream 79e8447ec662 e2beed91 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2025/07/27 05:30 upstream ec2df4364666 fb8f743d .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in uinput_request_submit
2025/07/27 04:11 upstream ec2df4364666 fb8f743d .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in uinput_request_submit
2025/07/26 19:34 upstream 5f33ebd2018c fb8f743d .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in uinput_request_submit
2025/07/26 18:11 upstream 5f33ebd2018c fb8f743d .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in uinput_request_submit
2025/07/23 02:18 upstream 89be9a83ccf1 85deaf45 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in uinput_request_submit
2025/07/23 01:08 upstream 89be9a83ccf1 85deaf45 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in uinput_request_submit
2025/07/22 23:51 upstream 89be9a83ccf1 85deaf45 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in uinput_request_submit
2025/07/22 22:16 upstream 89be9a83ccf1 85deaf45 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in uinput_request_submit
2025/03/07 17:52 upstream 00a7d39898c8 7e3bd60d .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2024/05/05 17:59 upstream 3d25a941ea50 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2024/05/05 16:39 upstream 3d25a941ea50 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2024/05/05 15:55 upstream 3d25a941ea50 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2024/05/05 15:30 upstream 3d25a941ea50 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2024/05/05 15:10 upstream 3d25a941ea50 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2025/09/24 18:08 upstream cec1e6e5d1ab 0abd0691 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/08/25 17:18 upstream 1b237f190eb3 bf27483f .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/03/19 15:13 upstream 81e4f8d68c66 8d0a2921 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root possible deadlock in uinput_request_submit
2025/01/01 13:05 upstream ccb98ccef0e5 d3ccff63 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/01/01 12:04 upstream ccb98ccef0e5 d3ccff63 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/01/01 11:43 upstream ccb98ccef0e5 d3ccff63 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/01/01 11:24 upstream ccb98ccef0e5 d3ccff63 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/07/18 04:51 linux-next 024e09e444bd 0d1223f1 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-rust-kasan-gce possible deadlock in uinput_request_submit
2025/06/05 18:28 linux-next 4f27f06ec121 6b6b5f21 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in uinput_request_submit
2024/04/22 06:27 linux-next 7b4f2bc91c15 af24b050 .config strace log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-linux-next-kasan-gce-root possible deadlock in uinput_request_submit
2025/10/08 11:02 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci bf45a62baffc 7e2882b3 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in uinput_request_submit
2025/09/10 23:39 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci c199ef1fa61a fdeaa69b .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in uinput_request_submit
2024/05/14 23:58 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci fda5695d692c fdb4c10c .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in uinput_request_submit
2024/05/14 22:47 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci fda5695d692c fdb4c10c .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in uinput_request_submit
2024/05/14 15:43 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci fda5695d692c fdb4c10c .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in uinput_request_submit
2024/05/14 14:32 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci fda5695d692c fdb4c10c .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 possible deadlock in uinput_request_submit
2024/04/25 21:02 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 6a71d2909427 8bdc0f22 .config console log report syz C [disk image] [vmlinux] [kernel image] [mounted in repro] ci-upstream-gce-arm64 possible deadlock in uinput_request_submit
2025/10/17 04:21 upstream 98ac9cc4b445 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2025/10/04 14:49 upstream cbf33b8e0b36 49379ee0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2025/10/02 18:45 upstream 7f7072574127 49379ee0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in uinput_request_submit
2025/07/20 10:05 upstream bf61759db409 7117feec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in uinput_request_submit
2025/06/18 10:04 upstream 52da431bf03b e77fae15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2025/06/04 22:44 upstream 1af80d00e1e0 fd5e6e61 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2025/06/04 06:03 upstream f5164456c604 a30356b7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in uinput_request_submit
2025/05/04 02:07 upstream 2a239ffbebb5 b0714e37 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2024/12/19 08:15 upstream c061cf420ded 1432fc84 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in uinput_request_submit
2024/12/15 20:31 upstream 2d8308bf5b67 7cbfbb3a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in uinput_request_submit
2024/07/02 22:43 upstream 1dfe225e9af5 8373af66 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in uinput_request_submit
2024/05/05 13:54 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in uinput_request_submit
2024/05/05 13:54 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in uinput_request_submit
2024/05/05 13:49 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in uinput_request_submit
2025/10/16 09:18 upstream 7ea30958b305 19568248 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root possible deadlock in uinput_request_submit
2025/10/11 03:31 upstream 917167ed1211 ff1712fe .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root possible deadlock in uinput_request_submit
2025/07/04 09:14 upstream 4c06e63b9203 76ad128c .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/07/02 07:09 upstream 66701750d556 bc80e4f0 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/04/12 09:07 upstream e618ee89561b 0bd6db41 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root possible deadlock in uinput_request_submit
2025/02/09 15:02 upstream 9946eaf552b1 ef44b750 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/02/08 11:55 upstream 7ee983c850b4 ef44b750 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root possible deadlock in uinput_request_submit
2025/01/06 14:18 upstream ab75170520d4 f3558dbf .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/01/06 14:18 upstream ab75170520d4 f3558dbf .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/01/01 07:22 upstream ccb98ccef0e5 d3ccff63 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2024/12/15 07:36 upstream a0e3919a2df2 7cbfbb3a .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2024/11/25 05:27 upstream 9f16d5e6f220 68da6d95 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2024/07/20 00:35 upstream 4305ca0087dd 890ce4f3 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2024/05/11 02:29 upstream f4345f05c0df 9026e142 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2024/05/05 13:51 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2024/05/05 00:19 upstream 7367539ad4b0 610f2a54 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in uinput_request_submit
2025/10/01 11:13 linux-next 3b9b1f8df454 65a0eece .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in uinput_request_submit
2024/05/05 13:55 linux-next 9221b2819b8a 610f2a54 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in uinput_request_submit
2024/04/22 04:36 linux-next 7b4f2bc91c15 af24b050 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in uinput_request_submit
* Struck through repros no longer work on HEAD.