syzbot


possible deadlock in input_event (2)

Status: upstream: reported C repro on 2021/11/10 17:01
Subsystems: kernfs
[Documentation on labels]
Reported-by: syzbot+d4c06e848a1c1f9f726f@syzkaller.appspotmail.com
First crash: 761d, last: 4h35m
Cause bisection: the issue happens on the oldest tested release (bisect log)
Crash: possible deadlock in input_event (log)
Repro: C syz .config
  
Discussions (6)
Title Replies (including bot) Last reply
[syzbot] Monthly kernfs report (Nov 2023) 0 (1) 2023/11/29 13:03
[syzbot] Monthly fs report (Nov 2023) 0 (1) 2023/11/11 01:08
[syzbot] Monthly fs report (Oct 2023) 0 (1) 2023/10/10 13:22
[syzbot] Monthly fs report (Aug 2023) 0 (1) 2023/08/08 12:55
[syzbot] Monthly fs report (Jul 2023) 0 (1) 2023/07/10 09:36
[syzbot] possible deadlock in input_event (2) 0 (2) 2021/12/13 02:42
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.1 possible deadlock in input_event origin:upstream C 22 18d 171d 0/3 upstream: reported C repro on 2023/06/23 12:11
upstream possible deadlock in input_event C done 2740 762d 1066d 0/25 closed as dup on 2021/07/07 07:31
linux-5.15 possible deadlock in input_event origin:upstream missing-backport C 42 4d22h 147d 0/3 upstream: reported C repro on 2023/07/17 14:44
Last patch testing requests (10)
Created Duration User Patch Repo Result
2023/09/14 21:08 24m retest repro upstream OK log
2023/09/14 21:08 20m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 19m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 31m retest repro upstream OK log
Fix bisection attempts (1)
Created Duration User Patch Repo Result
2023/04/02 08:31 34m bisect fix upstream job log (0) log

Sample crash report:
=====================================================
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected
6.7.0-rc1-syzkaller-00125-g7475e51b8796 #0 Not tainted
-----------------------------------------------------
syz-executor271/5067 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire:
ffff88801c73a618 (&f->f_owner.lock){....}-{2:2}, at: send_sigio+0x28/0x3c0 fs/fcntl.c:780

and this task is already holding:
ffff888073d6e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync_rcu fs/fcntl.c:998 [inline]
ffff888073d6e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync fs/fcntl.c:1019 [inline]
ffff888073d6e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x138/0x4f0 fs/fcntl.c:1012
which would create a new lock dependency:
 (&new->fa_lock){....}-{2:2} -> (&f->f_owner.lock){....}-{2:2}

but this new dependency connects a HARDIRQ-irq-safe lock:
 (&dev->event_lock#2){-...}-{2:2}

... which became HARDIRQ-irq-safe at:
  lock_acquire kernel/locking/lockdep.c:5753 [inline]
  lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
  __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
  _raw_spin_lock_irqsave+0x3a/0x50 kernel/locking/spinlock.c:162
  input_event drivers/input/input.c:434 [inline]
  input_event+0x70/0xa0 drivers/input/input.c:427
  input_report_key include/linux/input.h:425 [inline]
  psmouse_report_standard_buttons+0x30/0x80 drivers/input/mouse/psmouse-base.c:128
  psmouse_report_standard_packet drivers/input/mouse/psmouse-base.c:146 [inline]
  psmouse_process_byte+0x39c/0x8a0 drivers/input/mouse/psmouse-base.c:237
  psmouse_handle_byte+0x41/0x560 drivers/input/mouse/psmouse-base.c:279
  psmouse_receive_byte+0x243/0xe10 drivers/input/mouse/psmouse-base.c:426
  ps2_interrupt+0x1fe/0x5a0 drivers/input/serio/libps2.c:613
  serio_interrupt+0x8d/0x150 drivers/input/serio/serio.c:998
  i8042_interrupt+0x3f2/0x8a0 drivers/input/serio/i8042.c:606
  __handle_irq_event_percpu+0x22a/0x750 kernel/irq/handle.c:158
  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
  handle_irq_event+0xab/0x1e0 kernel/irq/handle.c:210
  handle_edge_irq+0x261/0xcf0 kernel/irq/chip.c:831
  generic_handle_irq_desc include/linux/irqdesc.h:161 [inline]
  handle_irq arch/x86/kernel/irq.c:238 [inline]
  __common_interrupt+0xdb/0x240 arch/x86/kernel/irq.c:257
  common_interrupt+0xab/0xd0 arch/x86/kernel/irq.c:247
  asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:636
  __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
  _raw_spin_unlock_irqrestore+0x31/0x70 kernel/locking/spinlock.c:194
  kthread+0x1fd/0x3a0 kernel/kthread.c:380
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242

to a HARDIRQ-irq-unsafe lock:
 (tasklist_lock){.+.+}-{2:2}

... which became HARDIRQ-irq-unsafe at:
...
  lock_acquire kernel/locking/lockdep.c:5753 [inline]
  lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
  __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
  _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
  __do_wait+0x105/0x890 kernel/exit.c:1585
  do_wait+0x212/0x530 kernel/exit.c:1629
  kernel_wait+0xa0/0x150 kernel/exit.c:1805
  call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
  call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
  process_one_work+0x886/0x15d0 kernel/workqueue.c:2630
  process_scheduled_works kernel/workqueue.c:2703 [inline]
  worker_thread+0x8b9/0x1290 kernel/workqueue.c:2784
  kthread+0x2c6/0x3a0 kernel/kthread.c:388
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242

other info that might help us debug this:

Chain exists of:
  &dev->event_lock#2 --> &new->fa_lock --> tasklist_lock

 Possible interrupt unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(tasklist_lock);
                               local_irq_disable();
                               lock(&dev->event_lock#2);
                               lock(&new->fa_lock);
  <Interrupt>
    lock(&dev->event_lock#2);

 *** DEADLOCK ***

8 locks held by syz-executor271/5067:
 #0: ffff888021418110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x201/0x750 drivers/input/evdev.c:513
 #1: ffff888021101230 (&dev->event_lock#2){-...}-{2:2}, at: input_inject_event+0xa4/0x370 drivers/input/input.c:460
 #2: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:301 [inline]
 #2: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:747 [inline]
 #2: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0xca/0x370 drivers/input/input.c:462
 #3: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:301 [inline]
 #3: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:747 [inline]
 #3: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: input_pass_values+0xb2/0x840 drivers/input/input.c:153
 #4: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:301 [inline]
 #4: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:747 [inline]
 #4: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x87/0x390 drivers/input/evdev.c:298
 #5: ffff888079dc4028 (&client->buffer_lock){....}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
 #5: ffff888079dc4028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values+0x10e/0x9b0 drivers/input/evdev.c:261
 #6: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:301 [inline]
 #6: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:747 [inline]
 #6: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: kill_fasync fs/fcntl.c:1018 [inline]
 #6: ffffffff8cfabce0 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x6d/0x4f0 fs/fcntl.c:1012
 #7: ffff888073d6e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync_rcu fs/fcntl.c:998 [inline]
 #7: ffff888073d6e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync fs/fcntl.c:1019 [inline]
 #7: ffff888073d6e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x138/0x4f0 fs/fcntl.c:1012

the dependencies between HARDIRQ-irq-safe lock and the holding lock:
  -> (&dev->event_lock#2){-...}-{2:2} {
     IN-HARDIRQ-W at:
                        lock_acquire kernel/locking/lockdep.c:5753 [inline]
                        lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
                        __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                        _raw_spin_lock_irqsave+0x3a/0x50 kernel/locking/spinlock.c:162
                        input_event drivers/input/input.c:434 [inline]
                        input_event+0x70/0xa0 drivers/input/input.c:427
                        input_report_key include/linux/input.h:425 [inline]
                        psmouse_report_standard_buttons+0x30/0x80 drivers/input/mouse/psmouse-base.c:128
                        psmouse_report_standard_packet drivers/input/mouse/psmouse-base.c:146 [inline]
                        psmouse_process_byte+0x39c/0x8a0 drivers/input/mouse/psmouse-base.c:237
                        psmouse_handle_byte+0x41/0x560 drivers/input/mouse/psmouse-base.c:279
                        psmouse_receive_byte+0x243/0xe10 drivers/input/mouse/psmouse-base.c:426
                        ps2_interrupt+0x1fe/0x5a0 drivers/input/serio/libps2.c:613
                        serio_interrupt+0x8d/0x150 drivers/input/serio/serio.c:998
                        i8042_interrupt+0x3f2/0x8a0 drivers/input/serio/i8042.c:606
                        __handle_irq_event_percpu+0x22a/0x750 kernel/irq/handle.c:158
                        handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
                        handle_irq_event+0xab/0x1e0 kernel/irq/handle.c:210
                        handle_edge_irq+0x261/0xcf0 kernel/irq/chip.c:831
                        generic_handle_irq_desc include/linux/irqdesc.h:161 [inline]
                        handle_irq arch/x86/kernel/irq.c:238 [inline]
                        __common_interrupt+0xdb/0x240 arch/x86/kernel/irq.c:257
                        common_interrupt+0xab/0xd0 arch/x86/kernel/irq.c:247
                        asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:636
                        __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:151 [inline]
                        _raw_spin_unlock_irqrestore+0x31/0x70 kernel/locking/spinlock.c:194
                        kthread+0x1fd/0x3a0 kernel/kthread.c:380
                        ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                        ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
     INITIAL USE at:
                       lock_acquire kernel/locking/lockdep.c:5753 [inline]
                       lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
                       __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                       _raw_spin_lock_irqsave+0x3a/0x50 kernel/locking/spinlock.c:162
                       input_inject_event+0xa4/0x370 drivers/input/input.c:460
                       __led_set_brightness drivers/leds/led-core.c:52 [inline]
                       led_set_brightness_nopm drivers/leds/led-core.c:316 [inline]
                       led_set_brightness_nosleep drivers/leds/led-core.c:347 [inline]
                       led_set_brightness+0x211/0x290 drivers/leds/led-core.c:309
                       led_trigger_event drivers/leds/led-triggers.c:391 [inline]
                       led_trigger_event+0xb2/0x240 drivers/leds/led-triggers.c:381
                       kbd_led_trigger_activate+0xc6/0x100 drivers/tty/vt/keyboard.c:1036
                       led_trigger_set+0x589/0xc00 drivers/leds/led-triggers.c:198
                       led_trigger_set_default drivers/leds/led-triggers.c:263 [inline]
                       led_trigger_set_default+0x1d2/0x230 drivers/leds/led-triggers.c:250
                       led_classdev_register_ext+0x78d/0xa10 drivers/leds/led-class.c:569
                       led_classdev_register include/linux/leds.h:279 [inline]
                       input_leds_connect+0x54a/0x8d0 drivers/input/input-leds.c:139
                       input_attach_handler.isra.0+0x17c/0x250 drivers/input/input.c:1064
                       input_register_device+0xb1e/0x1130 drivers/input/input.c:2396
                       atkbd_connect+0x5e2/0xa20 drivers/input/keyboard/atkbd.c:1298
                       serio_connect_driver drivers/input/serio/serio.c:44 [inline]
                       serio_driver_probe+0x71/0xa0 drivers/input/serio/serio.c:775
                       call_driver_probe drivers/base/dd.c:579 [inline]
                       really_probe+0x234/0xc90 drivers/base/dd.c:658
                       __driver_probe_device+0x1de/0x4b0 drivers/base/dd.c:800
                       driver_probe_device+0x4c/0x1a0 drivers/base/dd.c:830
                       __driver_attach+0x274/0x570 drivers/base/dd.c:1216
                       bus_for_each_dev+0x13c/0x1d0 drivers/base/bus.c:368
                       serio_attach_driver drivers/input/serio/serio.c:804 [inline]
                       serio_handle_event+0x2b8/0xa90 drivers/input/serio/serio.c:224
                       process_one_work+0x886/0x15d0 kernel/workqueue.c:2630
                       process_scheduled_works kernel/workqueue.c:2703 [inline]
                       worker_thread+0x8b9/0x1290 kernel/workqueue.c:2784
                       kthread+0x2c6/0x3a0 kernel/kthread.c:388
                       ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                       ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
   }
   ... key      at: [<ffffffff92ad8620>] __key.6+0x0/0x40
 -> (&client->buffer_lock){....}-{2:2} {
    INITIAL USE at:
                     lock_acquire kernel/locking/lockdep.c:5753 [inline]
                     lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
                     __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
                     _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
                     spin_lock include/linux/spinlock.h:351 [inline]
                     evdev_pass_values+0x10e/0x9b0 drivers/input/evdev.c:261
                     evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
                     input_to_handler+0x29e/0x4c0 drivers/input/input.c:129
                     input_pass_values+0x5c9/0x840 drivers/input/input.c:161
                     input_event_dispose+0x377/0x630 drivers/input/input.c:378
                     input_handle_event+0x11c/0xd80 drivers/input/input.c:406
                     input_inject_event+0x1bb/0x370 drivers/input/input.c:465
                     evdev_write+0x456/0x750 drivers/input/evdev.c:530
                     vfs_write+0x2a4/0xdf0 fs/read_write.c:582
                     ksys_write+0x1f0/0x250 fs/read_write.c:637
                     do_syscall_x64 arch/x86/entry/common.c:51 [inline]
                     do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
                     entry_SYSCALL_64_after_hwframe+0x63/0x6b
  }
  ... key      at: [<ffffffff92ad8aa0>] __key.3+0x0/0x40
  ... acquired at:
   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
   _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
   spin_lock include/linux/spinlock.h:351 [inline]
   evdev_pass_values+0x10e/0x9b0 drivers/input/evdev.c:261
   evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
   input_to_handler+0x29e/0x4c0 drivers/input/input.c:129
   input_pass_values+0x5c9/0x840 drivers/input/input.c:161
   input_event_dispose+0x377/0x630 drivers/input/input.c:378
   input_handle_event+0x11c/0xd80 drivers/input/input.c:406
   input_inject_event+0x1bb/0x370 drivers/input/input.c:465
   evdev_write+0x456/0x750 drivers/input/evdev.c:530
   vfs_write+0x2a4/0xdf0 fs/read_write.c:582
   ksys_write+0x1f0/0x250 fs/read_write.c:637
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x63/0x6b

-> (&new->fa_lock){....}-{2:2} {
   INITIAL READ USE at:
                        lock_acquire kernel/locking/lockdep.c:5753 [inline]
                        lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
                        __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                        _raw_read_lock_irqsave+0x70/0x90 kernel/locking/spinlock.c:236
                        kill_fasync_rcu fs/fcntl.c:998 [inline]
                        kill_fasync fs/fcntl.c:1019 [inline]
                        kill_fasync+0x138/0x4f0 fs/fcntl.c:1012
                        __pass_event drivers/input/evdev.c:240 [inline]
                        evdev_pass_values+0x619/0x9b0 drivers/input/evdev.c:278
                        evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
                        input_to_handler+0x29e/0x4c0 drivers/input/input.c:129
                        input_pass_values+0x5c9/0x840 drivers/input/input.c:161
                        input_event_dispose+0x377/0x630 drivers/input/input.c:378
                        input_handle_event+0x11c/0xd80 drivers/input/input.c:406
                        input_inject_event+0x1bb/0x370 drivers/input/input.c:465
                        evdev_write+0x456/0x750 drivers/input/evdev.c:530
                        vfs_write+0x2a4/0xdf0 fs/read_write.c:582
                        ksys_write+0x1f0/0x250 fs/read_write.c:637
                        do_syscall_x64 arch/x86/entry/common.c:51 [inline]
                        do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
                        entry_SYSCALL_64_after_hwframe+0x63/0x6b
 }
 ... key      at: [<ffffffff92832a00>] __key.0+0x0/0x40
 ... acquired at:
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0x70/0x90 kernel/locking/spinlock.c:236
   kill_fasync_rcu fs/fcntl.c:998 [inline]
   kill_fasync fs/fcntl.c:1019 [inline]
   kill_fasync+0x138/0x4f0 fs/fcntl.c:1012
   __pass_event drivers/input/evdev.c:240 [inline]
   evdev_pass_values+0x619/0x9b0 drivers/input/evdev.c:278
   evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
   input_to_handler+0x29e/0x4c0 drivers/input/input.c:129
   input_pass_values+0x5c9/0x840 drivers/input/input.c:161
   input_event_dispose+0x377/0x630 drivers/input/input.c:378
   input_handle_event+0x11c/0xd80 drivers/input/input.c:406
   input_inject_event+0x1bb/0x370 drivers/input/input.c:465
   evdev_write+0x456/0x750 drivers/input/evdev.c:530
   vfs_write+0x2a4/0xdf0 fs/read_write.c:582
   ksys_write+0x1f0/0x250 fs/read_write.c:637
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x63/0x6b


the dependencies between the lock to be acquired
 and HARDIRQ-irq-unsafe lock:
 -> (tasklist_lock){.+.+}-{2:2} {
    HARDIRQ-ON-R at:
                      lock_acquire kernel/locking/lockdep.c:5753 [inline]
                      lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
                      __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                      _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
                      __do_wait+0x105/0x890 kernel/exit.c:1585
                      do_wait+0x212/0x530 kernel/exit.c:1629
                      kernel_wait+0xa0/0x150 kernel/exit.c:1805
                      call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                      call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
                      process_one_work+0x886/0x15d0 kernel/workqueue.c:2630
                      process_scheduled_works kernel/workqueue.c:2703 [inline]
                      worker_thread+0x8b9/0x1290 kernel/workqueue.c:2784
                      kthread+0x2c6/0x3a0 kernel/kthread.c:388
                      ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                      ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
    SOFTIRQ-ON-R at:
                      lock_acquire kernel/locking/lockdep.c:5753 [inline]
                      lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
                      __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                      _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
                      __do_wait+0x105/0x890 kernel/exit.c:1585
                      do_wait+0x212/0x530 kernel/exit.c:1629
                      kernel_wait+0xa0/0x150 kernel/exit.c:1805
                      call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                      call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
                      process_one_work+0x886/0x15d0 kernel/workqueue.c:2630
                      process_scheduled_works kernel/workqueue.c:2703 [inline]
                      worker_thread+0x8b9/0x1290 kernel/workqueue.c:2784
                      kthread+0x2c6/0x3a0 kernel/kthread.c:388
                      ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                      ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
    INITIAL USE at:
                     lock_acquire kernel/locking/lockdep.c:5753 [inline]
                     lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
                     __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                     _raw_write_lock_irq+0x36/0x50 kernel/locking/spinlock.c:326
                     copy_process+0x4cfa/0x73f0 kernel/fork.c:2626
                     kernel_clone+0xfd/0x930 kernel/fork.c:2907
                     user_mode_thread+0xb4/0xf0 kernel/fork.c:2985
                     rest_init+0x27/0x2b0 init/main.c:695
                     arch_call_rest_init+0x13/0x30 init/main.c:827
                     start_kernel+0x39f/0x480 init/main.c:1072
                     x86_64_start_reservations+0x18/0x30 arch/x86/kernel/head64.c:555
                     x86_64_start_kernel+0xb2/0xc0 arch/x86/kernel/head64.c:536
                     secondary_startup_64_no_verify+0x166/0x16b
    INITIAL READ USE at:
                          lock_acquire kernel/locking/lockdep.c:5753 [inline]
                          lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
                          __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                          _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
                          __do_wait+0x105/0x890 kernel/exit.c:1585
                          do_wait+0x212/0x530 kernel/exit.c:1629
                          kernel_wait+0xa0/0x150 kernel/exit.c:1805
                          call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                          call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
                          process_one_work+0x886/0x15d0 kernel/workqueue.c:2630
                          process_scheduled_works kernel/workqueue.c:2703 [inline]
                          worker_thread+0x8b9/0x1290 kernel/workqueue.c:2784
                          kthread+0x2c6/0x3a0 kernel/kthread.c:388
                          ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                          ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:242
  }
  ... key      at: [<ffffffff8cc0a098>] tasklist_lock+0x18/0x40
  ... acquired at:
   __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
   _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
   send_sigurg+0xb0/0xc50 fs/fcntl.c:835
   sk_send_sigurg+0x7a/0x370 net/core/sock.c:3396
   queue_oob net/unix/af_unix.c:2184 [inline]
   unix_stream_sendmsg+0xdba/0x10a0 net/unix/af_unix.c:2301
   sock_sendmsg_nosec net/socket.c:730 [inline]
   __sock_sendmsg+0xd5/0x180 net/socket.c:745
   ____sys_sendmsg+0x6ac/0x940 net/socket.c:2584
   ___sys_sendmsg+0x135/0x1d0 net/socket.c:2638
   __sys_sendmsg+0x117/0x1e0 net/socket.c:2667
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x63/0x6b

-> (&f->f_owner.lock){....}-{2:2} {
   INITIAL USE at:
                   lock_acquire kernel/locking/lockdep.c:5753 [inline]
                   lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
                   __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                   _raw_write_lock_irq+0x36/0x50 kernel/locking/spinlock.c:326
                   f_modown+0x2a/0x390 fs/fcntl.c:92
                   __f_setown fs/fcntl.c:111 [inline]
                   f_setown+0xd4/0x2a0 fs/fcntl.c:139
                   do_fcntl+0x11e8/0x1270 fs/fcntl.c:379
                   __do_sys_fcntl fs/fcntl.c:456 [inline]
                   __se_sys_fcntl fs/fcntl.c:441 [inline]
                   __x64_sys_fcntl+0x16c/0x1e0 fs/fcntl.c:441
                   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
                   do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
                   entry_SYSCALL_64_after_hwframe+0x63/0x6b
   INITIAL READ USE at:
                        lock_acquire kernel/locking/lockdep.c:5753 [inline]
                        lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
                        __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                        _raw_read_lock_irqsave+0x70/0x90 kernel/locking/spinlock.c:236
                        send_sigurg+0x22/0xc50 fs/fcntl.c:819
                        sk_send_sigurg+0x7a/0x370 net/core/sock.c:3396
                        queue_oob net/unix/af_unix.c:2184 [inline]
                        unix_stream_sendmsg+0xdba/0x10a0 net/unix/af_unix.c:2301
                        sock_sendmsg_nosec net/socket.c:730 [inline]
                        __sock_sendmsg+0xd5/0x180 net/socket.c:745
                        ____sys_sendmsg+0x6ac/0x940 net/socket.c:2584
                        ___sys_sendmsg+0x135/0x1d0 net/socket.c:2638
                        __sys_sendmsg+0x117/0x1e0 net/socket.c:2667
                        do_syscall_x64 arch/x86/entry/common.c:51 [inline]
                        do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
                        entry_SYSCALL_64_after_hwframe+0x63/0x6b
 }
 ... key      at: [<ffffffff92831ca0>] __key.5+0x0/0x40
 ... acquired at:
   lock_acquire kernel/locking/lockdep.c:5753 [inline]
   lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0x70/0x90 kernel/locking/spinlock.c:236
   send_sigio+0x28/0x3c0 fs/fcntl.c:780
   kill_fasync_rcu fs/fcntl.c:1005 [inline]
   kill_fasync fs/fcntl.c:1019 [inline]
   kill_fasync+0x1f6/0x4f0 fs/fcntl.c:1012
   __pass_event drivers/input/evdev.c:240 [inline]
   evdev_pass_values+0x619/0x9b0 drivers/input/evdev.c:278
   evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
   input_to_handler+0x29e/0x4c0 drivers/input/input.c:129
   input_pass_values+0x5c9/0x840 drivers/input/input.c:161
   input_event_dispose+0x377/0x630 drivers/input/input.c:378
   input_handle_event+0x11c/0xd80 drivers/input/input.c:406
   input_inject_event+0x1bb/0x370 drivers/input/input.c:465
   evdev_write+0x456/0x750 drivers/input/evdev.c:530
   vfs_write+0x2a4/0xdf0 fs/read_write.c:582
   ksys_write+0x1f0/0x250 fs/read_write.c:637
   do_syscall_x64 arch/x86/entry/common.c:51 [inline]
   do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
   entry_SYSCALL_64_after_hwframe+0x63/0x6b


stack backtrace:
CPU: 0 PID: 5067 Comm: syz-executor271 Not tainted 6.7.0-rc1-syzkaller-00125-g7475e51b8796 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106
 print_bad_irq_dependency kernel/locking/lockdep.c:2626 [inline]
 check_irq_usage+0xe18/0x1470 kernel/locking/lockdep.c:2865
 check_prev_add kernel/locking/lockdep.c:3138 [inline]
 check_prevs_add kernel/locking/lockdep.c:3253 [inline]
 validate_chain kernel/locking/lockdep.c:3868 [inline]
 __lock_acquire+0x247a/0x3b10 kernel/locking/lockdep.c:5136
 lock_acquire kernel/locking/lockdep.c:5753 [inline]
 lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5718
 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
 _raw_read_lock_irqsave+0x70/0x90 kernel/locking/spinlock.c:236
 send_sigio+0x28/0x3c0 fs/fcntl.c:780
 kill_fasync_rcu fs/fcntl.c:1005 [inline]
 kill_fasync fs/fcntl.c:1019 [inline]
 kill_fasync+0x1f6/0x4f0 fs/fcntl.c:1012
 __pass_event drivers/input/evdev.c:240 [inline]
 evdev_pass_values+0x619/0x9b0 drivers/input/evdev.c:278
 evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
 input_to_handler+0x29e/0x4c0 drivers/input/input.c:129
 input_pass_values+0x5c9/0x840 drivers/input/input.c:161
 input_event_dispose+0x377/0x630 drivers/input/input.c:378
 input_handle_event+0x11c/0xd80 drivers/input/input.c:406
 input_inject_event+0x1bb/0x370 drivers/input/input.c:465
 evdev_write+0x456/0x750 drivers/input/evdev.c:530
 vfs_write+0x2a4/0xdf0 fs/read_write.c:582
 ksys_write+0x1f0/0x250 fs/read_write.c:637
 do_syscall_x64 arch/x86/entry/common.c:51 [inline]
 do_syscall_64+0x40/0x110 arch/x86/entry/common.c:82
 entry_SYSCALL_64_after_hwframe+0x63/0x6b
RIP: 0033:0x7f35ad61c329
Code: 48 83 c4 28 c3 e8 37 17 00 00 0f 1f 80 00 00 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffea7e2fab8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007ffea7e2fc88 RCX: 00007f35ad61c329
RDX: 0000000000002778 RSI: 0000000020000040 RDI: 0000000000000006
RBP: 00007f35ad68f610 R08: 00007ffea7e2fc88 R09: 00007ffea7e2fc88
R10: 000000000000001f R11: 0000000000000246 R12: 0000000000000001

Crashes (1601):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2023/11/17 12:09 upstream 7475e51b8796 cb976f63 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2023/11/11 22:59 upstream 3ca112b71f35 6d6dbf8a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/11/11 00:27 upstream ac347a0655db 45e9b83e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/07 14:42 upstream be3ca57cfb77 83211397 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/10/28 05:32 upstream 888cf78c29e2 3c418d72 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/09/22 21:45 upstream dc912ba91b7e 0b6a67ac .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/12/11 12:26 upstream a39b6ac3781d 28b24332 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/10/15 01:47 upstream 727fb8376504 f757a323 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/08/25 15:38 upstream 4f9e7fabf864 03d9c195 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/07/17 05:26 upstream 20edcec23f92 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2023/07/15 20:26 upstream b6e6cc1f78c7 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/02/03 02:22 upstream 9f266ccaa2f5 16d19e30 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2022/10/03 06:30 upstream a962b54e162c feb56351 .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/09/19 04:11 upstream 38eddeedbbea dd9a85ff .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/18 16:02 upstream 274a2eebf80c d58e263f .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/11 05:36 upstream 200e340f2196 a6201f11 .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/04 08:15 upstream 200e340f2196 1c9013ac .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/07/14 17:11 upstream 4a57a8400075 5d921b08 .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/07/14 06:21 upstream 4a57a8400075 5d921b08 .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2022/07/12 23:29 upstream 72a8e05d4f66 d91dd8ea .config strace log report syz C ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/07/01 20:53 upstream a175eca0f3d7 1434eec0 .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2022/06/15 11:43 upstream 018ab4fabddd 127d1faf .config strace log report syz C ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/04/27 07:23 upstream cf424ef014ac 1fa34c1b .config console log report syz C ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2021/12/13 02:41 upstream 90d9fbc16b69 49ca1f59 .config console log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2023/10/26 17:48 linux-next 2ef7141596ee 23afc60f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/02/26 20:07 linux-next 8232539f864c ee50e71c .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2022/04/24 13:37 linux-next f1244c81da13 131df97d .config console log report syz C ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/08/05 16:52 upstream 024ff300db33 4ffcc9ef .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2023/07/11 17:16 upstream 3f01e9fed845 2f19aa4f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/06/15 18:24 upstream b6dad5178cea 757d26ed .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/06/15 04:44 upstream b6dad5178cea 76decb82 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/01/05 11:40 upstream 512dee0c00ad 1dac8c7a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/12/23 04:32 upstream 8395ae05cb5a 9da18ae8 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2022/12/03 07:34 upstream a4412fdd49dc e080de16 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/11/29 18:56 upstream ca57f02295f1 05dc7993 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/11/22 11:50 upstream eb7081409f94 1c576c23 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/11/16 15:46 upstream 81e7cfa3a9eb 3a127a31 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/10/05 08:23 upstream a5088ee7251e eab8f949 .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/09/19 03:16 upstream 38eddeedbbea dd9a85ff .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce possible deadlock in input_event
2022/09/19 02:45 upstream 38eddeedbbea dd9a85ff .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/09/07 23:30 upstream 0066f1b0e275 c5b7bc57 .config strace log report syz C ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/08/04 02:29 upstream 200e340f2196 1c9013ac .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2023/12/10 00:14 upstream b10a3ccaf6e3 28b24332 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/12/08 13:00 upstream 5e3f5b81de80 28b24332 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/12/07 22:28 upstream 9ace34a8e446 28b24332 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/12/07 15:24 upstream bee0e7762ad2 28b24332 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2023/12/07 12:39 upstream bee0e7762ad2 28b24332 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/12/06 18:28 upstream bee0e7762ad2 e3299f55 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2023/12/06 14:55 upstream bee0e7762ad2 e3299f55 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/12/05 02:56 upstream bee0e7762ad2 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/12/02 09:21 upstream 815fb87b7530 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/12/02 03:54 upstream 815fb87b7530 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/12/01 16:52 upstream 994d5c58e50e f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/12/01 04:19 upstream e8f60209d6cf f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/12/01 02:45 upstream e8f60209d6cf f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/12/01 01:40 upstream e8f60209d6cf f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/30 06:02 upstream 3b47bc037bd4 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/11/30 05:00 upstream 3b47bc037bd4 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/29 13:20 upstream 18d46e76d7c2 6e78f9ce .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/28 16:52 upstream df60cee26a2e 1adfb6f6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/27 04:26 upstream d2da77f431ac 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2023/11/27 03:11 upstream d2da77f431ac 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/26 14:11 upstream 090472ed9c92 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/25 23:44 upstream b46ae77f6787 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/24 05:54 upstream d3fa86b1a7b4 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/11/24 04:08 upstream d3fa86b1a7b4 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/11/23 23:51 upstream d3fa86b1a7b4 fc59b78e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/22 22:52 upstream 9b6de136b5f0 03e12510 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2023/12/11 04:14 upstream a39b6ac3781d 28b24332 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/12/10 01:15 upstream b10a3ccaf6e3 28b24332 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/12/09 05:27 upstream f2e8a57ee903 28b24332 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/12/08 17:25 upstream 5e3f5b81de80 28b24332 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/12/07 14:20 upstream bee0e7762ad2 28b24332 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/12/06 17:05 upstream bee0e7762ad2 e3299f55 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/12/05 00:15 upstream bee0e7762ad2 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/12/03 18:30 upstream 33cc938e65a9 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/12/03 17:03 upstream 33cc938e65a9 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/12/03 05:21 upstream 1b8af6552cb7 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/12/03 04:13 upstream 1b8af6552cb7 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/29 19:25 upstream 3b47bc037bd4 6e78f9ce .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/28 12:28 upstream df60cee26a2e 9fe51b7c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/28 11:13 upstream df60cee26a2e 9fe51b7c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/27 20:26 upstream 2cc14f52aeb7 9fe51b7c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/27 15:48 upstream 2cc14f52aeb7 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/27 01:24 upstream d2da77f431ac 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/26 00:54 upstream b46ae77f6787 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/25 11:48 upstream 0f5cc96c367f 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/25 10:17 upstream 0f5cc96c367f 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/23 15:17 upstream 9b6de136b5f0 fc59b78e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/07/20 17:11 upstream 46670259519f d922ca7e .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in input_event
2021/11/10 12:51 upstream cb690f5238d7 75b04091 .config console log report info ci-upstream-kasan-gce-386 possible deadlock in input_event
2021/11/10 04:33 upstream cb690f5238d7 55fa030c .config console log report info ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/22 08:08 linux-next 288736c822de cb976f63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
* Struck through repros no longer work on HEAD.