syzbot


possible deadlock in input_event (2)

Status: upstream: reported C repro on 2021/11/10 17:01
Subsystems: kernfs
[Documentation on labels]
Reported-by: syzbot+d4c06e848a1c1f9f726f@syzkaller.appspotmail.com
First crash: 923d, last: 2h02m
Cause bisection: the issue happens on the oldest tested release (bisect log)
Crash: possible deadlock in input_event (log)
Repro: C syz .config
  
Discussions (10)
Title Replies (including bot) Last reply
[syzbot] Monthly kernfs report (May 2024) 0 (1) 2024/05/08 08:25
[syzbot] possible deadlock in input_event (2) 3 (8) 2024/04/20 09:53
[syzbot] Monthly kernfs report (Mar 2024) 0 (1) 2024/03/06 12:53
[syzbot] Monthly kernfs report (Feb 2024) 0 (1) 2024/02/02 21:05
[syzbot] Monthly kernfs report (Jan 2024) 0 (1) 2024/01/02 13:36
[syzbot] Monthly kernfs report (Nov 2023) 0 (1) 2023/11/29 13:03
[syzbot] Monthly fs report (Nov 2023) 0 (1) 2023/11/11 01:08
[syzbot] Monthly fs report (Oct 2023) 0 (1) 2023/10/10 13:22
[syzbot] Monthly fs report (Aug 2023) 0 (1) 2023/08/08 12:55
[syzbot] Monthly fs report (Jul 2023) 0 (1) 2023/07/10 09:36
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.1 possible deadlock in input_event origin:upstream C 127 3d02h 332d 0/3 upstream: reported C repro on 2023/06/23 12:11
upstream possible deadlock in input_event C done 2740 923d 1227d 0/26 closed as dup on 2021/07/07 07:31
linux-5.15 possible deadlock in input_event origin:upstream missing-backport C 126 5d05h 308d 0/3 upstream: reported C repro on 2023/07/17 14:44
Last patch testing requests (13)
Created Duration User Patch Repo Result
2024/04/20 08:14 37m aha310510@gmail.com patch upstream report log
2024/04/20 06:15 1h02m aha310510@gmail.com patch upstream report log
2024/04/19 16:33 22m aha310510@gmail.com patch upstream error OK
2023/09/14 21:08 24m retest repro upstream OK log
2023/09/14 21:08 20m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 19m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 31m retest repro upstream OK log
Fix bisection attempts (1)
Created Duration User Patch Repo Result
2023/04/02 08:31 34m bisect fix upstream job log (0) log

Sample crash report:
=====================================================
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected
6.9.0-syzkaller-09699-geb6a9339efeb #0 Not tainted
-----------------------------------------------------
syz-executor107/5100 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire:
ffffffff8e00a058 (tasklist_lock){.+.+}-{2:2}, at: send_sigurg+0xee/0x3c0 fs/fcntl.c:871

and this task is already holding:
ffff88802539e118 (&f->f_owner.lock){....}-{2:2}, at: send_sigurg+0x29/0x3c0 fs/fcntl.c:855
which would create a new lock dependency:
 (&f->f_owner.lock){....}-{2:2} -> (tasklist_lock){.+.+}-{2:2}

but this new dependency connects a HARDIRQ-irq-safe lock:
 (&dev->event_lock#2){-...}-{2:2}

... which became HARDIRQ-irq-safe at:
  lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
  __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
  _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
  input_event+0x91/0xd0 drivers/input/input.c:434
  input_report_key include/linux/input.h:425 [inline]
  psmouse_report_standard_buttons drivers/input/mouse/psmouse-base.c:128 [inline]
  psmouse_report_standard_packet+0x54/0x200 drivers/input/mouse/psmouse-base.c:146
  psmouse_process_byte+0x48c/0x680 drivers/input/mouse/psmouse-base.c:237
  psmouse_handle_byte+0x49/0x4c0 drivers/input/mouse/psmouse-base.c:279
  ps2_interrupt+0x17c/0x8e0 drivers/input/serio/libps2.c:613
  serio_interrupt+0x90/0x140 drivers/input/serio/serio.c:998
  i8042_interrupt+0x375/0x770 drivers/input/serio/i8042.c:606
  __handle_irq_event_percpu+0x29a/0xa80 kernel/irq/handle.c:158
  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
  handle_irq_event+0x89/0x1f0 kernel/irq/handle.c:210
  handle_edge_irq+0x25f/0xc20 kernel/irq/chip.c:831
  generic_handle_irq_desc include/linux/irqdesc.h:173 [inline]
  handle_irq arch/x86/kernel/irq.c:247 [inline]
  call_irq_handler arch/x86/kernel/irq.c:259 [inline]
  __common_interrupt+0x136/0x230 arch/x86/kernel/irq.c:285
  common_interrupt+0xa5/0xd0 arch/x86/kernel/irq.c:278
  asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693
  __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
  _raw_spin_unlock_irqrestore+0xd8/0x140 kernel/locking/spinlock.c:194
  spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
  i8042_command drivers/input/serio/i8042.c:356 [inline]
  i8042_aux_write+0x116/0x1a0 drivers/input/serio/i8042.c:391
  serio_write include/linux/serio.h:125 [inline]
  ps2_do_sendbyte+0x20f/0x730 drivers/input/serio/libps2.c:58
  ps2_sendbyte+0x60/0x120 drivers/input/serio/libps2.c:113
  cypress_ps2_sendbyte drivers/input/mouse/cypress_ps2.c:42 [inline]
  cypress_ps2_read_cmd_status drivers/input/mouse/cypress_ps2.c:116 [inline]
  cypress_send_ext_cmd+0x221/0x910 drivers/input/mouse/cypress_ps2.c:189
  cypress_detect+0x93/0x230 drivers/input/mouse/cypress_ps2.c:205
  psmouse_do_detect drivers/input/mouse/psmouse-base.c:1006 [inline]
  psmouse_try_protocol drivers/input/mouse/psmouse-base.c:1020 [inline]
  psmouse_extensions+0xc2e/0x1560 drivers/input/mouse/psmouse-base.c:1143
  psmouse_switch_protocol+0x308/0x7d0 drivers/input/mouse/psmouse-base.c:1537
  psmouse_connect+0x8e4/0x14b0 drivers/input/mouse/psmouse-base.c:1626
  serio_connect_driver drivers/input/serio/serio.c:44 [inline]
  serio_driver_probe+0x7f/0xa0 drivers/input/serio/serio.c:775
  really_probe+0x2b8/0xad0 drivers/base/dd.c:656
  __driver_probe_device+0x1a2/0x390 drivers/base/dd.c:798
  driver_probe_device+0x50/0x430 drivers/base/dd.c:828
  __driver_attach+0x45f/0x710 drivers/base/dd.c:1214
  bus_for_each_dev+0x239/0x2b0 drivers/base/bus.c:368
  serio_attach_driver drivers/input/serio/serio.c:804 [inline]
  serio_handle_event+0x1c7/0x920 drivers/input/serio/serio.c:224
  process_one_work kernel/workqueue.c:3231 [inline]
  process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
  worker_thread+0x86d/0xd70 kernel/workqueue.c:3393
  kthread+0x2f0/0x390 kernel/kthread.c:389
  ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

to a HARDIRQ-irq-unsafe lock:
 (tasklist_lock){.+.+}-{2:2}

... which became HARDIRQ-irq-unsafe at:
...
  lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
  __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
  _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
  __do_wait+0x12d/0x850 kernel/exit.c:1586
  do_wait+0x1e9/0x560 kernel/exit.c:1630
  kernel_wait+0xe9/0x240 kernel/exit.c:1806
  call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
  call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164
  process_one_work kernel/workqueue.c:3231 [inline]
  process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
  worker_thread+0x86d/0xd70 kernel/workqueue.c:3393
  kthread+0x2f0/0x390 kernel/kthread.c:389
  ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

other info that might help us debug this:

Chain exists of:
  &dev->event_lock#2 --> &f->f_owner.lock --> tasklist_lock

 Possible interrupt unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(tasklist_lock);
                               local_irq_disable();
                               lock(&dev->event_lock#2);
                               lock(&f->f_owner.lock);
  <Interrupt>
    lock(&dev->event_lock#2);

 *** DEADLOCK ***

2 locks held by syz-executor107/5100:
 #0: ffff888079abb358 (sk_lock-AF_INET){+.+.}-{0:0}, at: lock_sock include/net/sock.h:1602 [inline]
 #0: ffff888079abb358 (sk_lock-AF_INET){+.+.}-{0:0}, at: tcp_sendmsg+0x22/0x50 net/ipv4/tcp.c:1347
 #1: ffff88802539e118 (&f->f_owner.lock){....}-{2:2}, at: send_sigurg+0x29/0x3c0 fs/fcntl.c:855

the dependencies between HARDIRQ-irq-safe lock and the holding lock:
   -> (&dev->event_lock#2){-...}-{2:2} {
      IN-HARDIRQ-W at:
                          lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                          __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                          _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
                          input_event+0x91/0xd0 drivers/input/input.c:434
                          input_report_key include/linux/input.h:425 [inline]
                          psmouse_report_standard_buttons drivers/input/mouse/psmouse-base.c:128 [inline]
                          psmouse_report_standard_packet+0x54/0x200 drivers/input/mouse/psmouse-base.c:146
                          psmouse_process_byte+0x48c/0x680 drivers/input/mouse/psmouse-base.c:237
                          psmouse_handle_byte+0x49/0x4c0 drivers/input/mouse/psmouse-base.c:279
                          ps2_interrupt+0x17c/0x8e0 drivers/input/serio/libps2.c:613
                          serio_interrupt+0x90/0x140 drivers/input/serio/serio.c:998
                          i8042_interrupt+0x375/0x770 drivers/input/serio/i8042.c:606
                          __handle_irq_event_percpu+0x29a/0xa80 kernel/irq/handle.c:158
                          handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
                          handle_irq_event+0x89/0x1f0 kernel/irq/handle.c:210
                          handle_edge_irq+0x25f/0xc20 kernel/irq/chip.c:831
                          generic_handle_irq_desc include/linux/irqdesc.h:173 [inline]
                          handle_irq arch/x86/kernel/irq.c:247 [inline]
                          call_irq_handler arch/x86/kernel/irq.c:259 [inline]
                          __common_interrupt+0x136/0x230 arch/x86/kernel/irq.c:285
                          common_interrupt+0xa5/0xd0 arch/x86/kernel/irq.c:278
                          asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693
                          __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
                          _raw_spin_unlock_irqrestore+0xd8/0x140 kernel/locking/spinlock.c:194
                          spin_unlock_irqrestore include/linux/spinlock.h:406 [inline]
                          i8042_command drivers/input/serio/i8042.c:356 [inline]
                          i8042_aux_write+0x116/0x1a0 drivers/input/serio/i8042.c:391
                          serio_write include/linux/serio.h:125 [inline]
                          ps2_do_sendbyte+0x20f/0x730 drivers/input/serio/libps2.c:58
                          ps2_sendbyte+0x60/0x120 drivers/input/serio/libps2.c:113
                          cypress_ps2_sendbyte drivers/input/mouse/cypress_ps2.c:42 [inline]
                          cypress_ps2_read_cmd_status drivers/input/mouse/cypress_ps2.c:116 [inline]
                          cypress_send_ext_cmd+0x221/0x910 drivers/input/mouse/cypress_ps2.c:189
                          cypress_detect+0x93/0x230 drivers/input/mouse/cypress_ps2.c:205
                          psmouse_do_detect drivers/input/mouse/psmouse-base.c:1006 [inline]
                          psmouse_try_protocol drivers/input/mouse/psmouse-base.c:1020 [inline]
                          psmouse_extensions+0xc2e/0x1560 drivers/input/mouse/psmouse-base.c:1143
                          psmouse_switch_protocol+0x308/0x7d0 drivers/input/mouse/psmouse-base.c:1537
                          psmouse_connect+0x8e4/0x14b0 drivers/input/mouse/psmouse-base.c:1626
                          serio_connect_driver drivers/input/serio/serio.c:44 [inline]
                          serio_driver_probe+0x7f/0xa0 drivers/input/serio/serio.c:775
                          really_probe+0x2b8/0xad0 drivers/base/dd.c:656
                          __driver_probe_device+0x1a2/0x390 drivers/base/dd.c:798
                          driver_probe_device+0x50/0x430 drivers/base/dd.c:828
                          __driver_attach+0x45f/0x710 drivers/base/dd.c:1214
                          bus_for_each_dev+0x239/0x2b0 drivers/base/bus.c:368
                          serio_attach_driver drivers/input/serio/serio.c:804 [inline]
                          serio_handle_event+0x1c7/0x920 drivers/input/serio/serio.c:224
                          process_one_work kernel/workqueue.c:3231 [inline]
                          process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
                          worker_thread+0x86d/0xd70 kernel/workqueue.c:3393
                          kthread+0x2f0/0x390 kernel/kthread.c:389
                          ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
                          ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
      INITIAL USE at:
                         lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                         __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                         _raw_spin_lock_irqsave+0xd5/0x120 kernel/locking/spinlock.c:162
                         input_inject_event+0xc5/0x340 drivers/input/input.c:460
                         led_trigger_event+0x11c/0x1e0 drivers/leds/led-triggers.c:392
                         kbd_led_trigger_activate+0xbd/0x100 drivers/tty/vt/keyboard.c:1036
                         led_trigger_set+0x541/0x950 drivers/leds/led-triggers.c:198
                         led_match_default_trigger drivers/leds/led-triggers.c:256 [inline]
                         led_trigger_set_default+0x229/0x260 drivers/leds/led-triggers.c:274
                         led_classdev_register_ext+0x773/0x960 drivers/leds/led-class.c:561
                         led_classdev_register include/linux/leds.h:271 [inline]
                         input_leds_connect+0x497/0x640 drivers/input/input-leds.c:145
                         input_attach_handler drivers/input/input.c:1064 [inline]
                         input_register_device+0xcfa/0x1090 drivers/input/input.c:2396
                         atkbd_connect+0x752/0xa00 drivers/input/keyboard/atkbd.c:1342
                         serio_connect_driver drivers/input/serio/serio.c:44 [inline]
                         serio_driver_probe+0x7f/0xa0 drivers/input/serio/serio.c:775
                         really_probe+0x2b8/0xad0 drivers/base/dd.c:656
                         __driver_probe_device+0x1a2/0x390 drivers/base/dd.c:798
                         driver_probe_device+0x50/0x430 drivers/base/dd.c:828
                         __driver_attach+0x45f/0x710 drivers/base/dd.c:1214
                         bus_for_each_dev+0x239/0x2b0 drivers/base/bus.c:368
                         serio_attach_driver drivers/input/serio/serio.c:804 [inline]
                         serio_handle_event+0x1c7/0x920 drivers/input/serio/serio.c:224
                         process_one_work kernel/workqueue.c:3231 [inline]
                         process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
                         worker_thread+0x86d/0xd70 kernel/workqueue.c:3393
                         kthread+0x2f0/0x390 kernel/kthread.c:389
                         ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
                         ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    }
    ... key      at: [<ffffffff94afef60>] input_allocate_device.__key.5+0x0/0x20
  -> (&client->buffer_lock){....}-{2:2} {
     INITIAL USE at:
                       lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                       __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
                       _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
                       spin_lock include/linux/spinlock.h:351 [inline]
                       evdev_pass_values+0xf2/0xad0 drivers/input/evdev.c:261
                       evdev_events+0x1c2/0x300 drivers/input/evdev.c:306
                       input_to_handler drivers/input/input.c:129 [inline]
                       input_pass_values+0x84d/0x1200 drivers/input/input.c:161
                       input_event_dispose+0x36c/0x650 drivers/input/input.c:378
                       input_handle_event+0xa71/0xbe0 drivers/input/input.c:406
                       input_inject_event+0x22f/0x340 drivers/input/input.c:465
                       evdev_write+0x672/0x7c0 drivers/input/evdev.c:530
                       vfs_write+0x2a2/0xc50 fs/read_write.c:588
                       ksys_write+0x1a0/0x2c0 fs/read_write.c:643
                       do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                       do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
                       entry_SYSCALL_64_after_hwframe+0x77/0x7f
   }
   ... key      at: [<ffffffff94aff200>] evdev_open.__key.24+0x0/0x20
   ... acquired at:
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
   _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
   spin_lock include/linux/spinlock.h:351 [inline]
   evdev_pass_values+0xf2/0xad0 drivers/input/evdev.c:261
   evdev_events+0x1c2/0x300 drivers/input/evdev.c:306
   input_to_handler drivers/input/input.c:129 [inline]
   input_pass_values+0x84d/0x1200 drivers/input/input.c:161
   input_event_dispose+0x36c/0x650 drivers/input/input.c:378
   input_handle_event+0xa71/0xbe0 drivers/input/input.c:406
   input_inject_event+0x22f/0x340 drivers/input/input.c:465
   evdev_write+0x672/0x7c0 drivers/input/evdev.c:530
   vfs_write+0x2a2/0xc50 fs/read_write.c:588
   ksys_write+0x1a0/0x2c0 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

 -> (&new->fa_lock){....}-{2:2} {
    INITIAL READ USE at:
                          lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                          __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                          _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236
                          kill_fasync_rcu fs/fcntl.c:1028 [inline]
                          kill_fasync+0x19e/0x4d0 fs/fcntl.c:1049
                          __pass_event drivers/input/evdev.c:240 [inline]
                          evdev_pass_values+0x58a/0xad0 drivers/input/evdev.c:278
                          evdev_events+0x1c2/0x300 drivers/input/evdev.c:306
                          input_to_handler drivers/input/input.c:129 [inline]
                          input_pass_values+0x84d/0x1200 drivers/input/input.c:161
                          input_event_dispose+0x36c/0x650 drivers/input/input.c:378
                          input_handle_event+0xa71/0xbe0 drivers/input/input.c:406
                          input_inject_event+0x22f/0x340 drivers/input/input.c:465
                          evdev_write+0x672/0x7c0 drivers/input/evdev.c:530
                          vfs_write+0x2a2/0xc50 fs/read_write.c:588
                          ksys_write+0x1a0/0x2c0 fs/read_write.c:643
                          do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                          do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
                          entry_SYSCALL_64_after_hwframe+0x77/0x7f
  }
  ... key      at: [<ffffffff94805d80>] fasync_insert_entry.__key+0x0/0x20
  ... acquired at:
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236
   kill_fasync_rcu fs/fcntl.c:1028 [inline]
   kill_fasync+0x19e/0x4d0 fs/fcntl.c:1049
   __pass_event drivers/input/evdev.c:240 [inline]
   evdev_pass_values+0x58a/0xad0 drivers/input/evdev.c:278
   evdev_events+0x1c2/0x300 drivers/input/evdev.c:306
   input_to_handler drivers/input/input.c:129 [inline]
   input_pass_values+0x84d/0x1200 drivers/input/input.c:161
   input_event_dispose+0x36c/0x650 drivers/input/input.c:378
   input_handle_event+0xa71/0xbe0 drivers/input/input.c:406
   input_inject_event+0x22f/0x340 drivers/input/input.c:465
   evdev_write+0x672/0x7c0 drivers/input/evdev.c:530
   vfs_write+0x2a2/0xc50 fs/read_write.c:588
   ksys_write+0x1a0/0x2c0 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> (&f->f_owner.lock){....}-{2:2} {
   INITIAL USE at:
                   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                   __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                   _raw_write_lock_irq+0xd3/0x120 kernel/locking/spinlock.c:326
                   f_modown+0x38/0x340 fs/fcntl.c:93
                   __f_setown fs/fcntl.c:112 [inline]
                   f_setown_ex fs/fcntl.c:202 [inline]
                   do_fcntl+0x13ad/0x1730 fs/fcntl.c:418
                   __do_sys_fcntl fs/fcntl.c:492 [inline]
                   __se_sys_fcntl+0xd2/0x1c0 fs/fcntl.c:477
                   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                   do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
                   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   INITIAL READ USE at:
                        lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                        __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                        _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236
                        send_sigio+0x33/0x360 fs/fcntl.c:816
                        kill_fasync_rcu fs/fcntl.c:1035 [inline]
                        kill_fasync+0x23a/0x4d0 fs/fcntl.c:1049
                        __pass_event drivers/input/evdev.c:240 [inline]
                        evdev_pass_values+0x58a/0xad0 drivers/input/evdev.c:278
                        evdev_events+0x1c2/0x300 drivers/input/evdev.c:306
                        input_to_handler drivers/input/input.c:129 [inline]
                        input_pass_values+0x84d/0x1200 drivers/input/input.c:161
                        input_event_dispose+0x36c/0x650 drivers/input/input.c:378
                        input_handle_event+0xa71/0xbe0 drivers/input/input.c:406
                        input_inject_event+0x22f/0x340 drivers/input/input.c:465
                        evdev_write+0x672/0x7c0 drivers/input/evdev.c:530
                        vfs_write+0x2a2/0xc50 fs/read_write.c:588
                        ksys_write+0x1a0/0x2c0 fs/read_write.c:643
                        do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                        do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
                        entry_SYSCALL_64_after_hwframe+0x77/0x7f
 }
 ... key      at: [<ffffffff94805120>] init_file.__key+0x0/0x20
 ... acquired at:
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0xdd/0x130 kernel/locking/spinlock.c:236
   send_sigio+0x33/0x360 fs/fcntl.c:816
   kill_fasync_rcu fs/fcntl.c:1035 [inline]
   kill_fasync+0x23a/0x4d0 fs/fcntl.c:1049
   __pass_event drivers/input/evdev.c:240 [inline]
   evdev_pass_values+0x58a/0xad0 drivers/input/evdev.c:278
   evdev_events+0x1c2/0x300 drivers/input/evdev.c:306
   input_to_handler drivers/input/input.c:129 [inline]
   input_pass_values+0x84d/0x1200 drivers/input/input.c:161
   input_event_dispose+0x36c/0x650 drivers/input/input.c:378
   input_handle_event+0xa71/0xbe0 drivers/input/input.c:406
   input_inject_event+0x22f/0x340 drivers/input/input.c:465
   evdev_write+0x672/0x7c0 drivers/input/evdev.c:530
   vfs_write+0x2a2/0xc50 fs/read_write.c:588
   ksys_write+0x1a0/0x2c0 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f


the dependencies between the lock to be acquired
 and HARDIRQ-irq-unsafe lock:
-> (tasklist_lock){.+.+}-{2:2} {
   HARDIRQ-ON-R at:
                    lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                    __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                    _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                    __do_wait+0x12d/0x850 kernel/exit.c:1586
                    do_wait+0x1e9/0x560 kernel/exit.c:1630
                    kernel_wait+0xe9/0x240 kernel/exit.c:1806
                    call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                    call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164
                    process_one_work kernel/workqueue.c:3231 [inline]
                    process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
                    worker_thread+0x86d/0xd70 kernel/workqueue.c:3393
                    kthread+0x2f0/0x390 kernel/kthread.c:389
                    ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
                    ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
   SOFTIRQ-ON-R at:
                    lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                    __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                    _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                    __do_wait+0x12d/0x850 kernel/exit.c:1586
                    do_wait+0x1e9/0x560 kernel/exit.c:1630
                    kernel_wait+0xe9/0x240 kernel/exit.c:1806
                    call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                    call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164
                    process_one_work kernel/workqueue.c:3231 [inline]
                    process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
                    worker_thread+0x86d/0xd70 kernel/workqueue.c:3393
                    kthread+0x2f0/0x390 kernel/kthread.c:389
                    ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
                    ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
   INITIAL USE at:
                   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                   __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                   _raw_write_lock_irq+0xd3/0x120 kernel/locking/spinlock.c:326
                   copy_process+0x228b/0x3dc0 kernel/fork.c:2516
                   kernel_clone+0x226/0x8f0 kernel/fork.c:2797
                   user_mode_thread+0x132/0x1a0 kernel/fork.c:2875
                   rest_init+0x23/0x300 init/main.c:712
                   start_kernel+0x47a/0x500 init/main.c:1103
                   x86_64_start_reservations+0x2a/0x30 arch/x86/kernel/head64.c:507
                   x86_64_start_kernel+0x99/0xa0 arch/x86/kernel/head64.c:488
                   common_startup_64+0x13e/0x147
   INITIAL READ USE at:
                        lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                        __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                        _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
                        __do_wait+0x12d/0x850 kernel/exit.c:1586
                        do_wait+0x1e9/0x560 kernel/exit.c:1630
                        kernel_wait+0xe9/0x240 kernel/exit.c:1806
                        call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                        call_usermodehelper_exec_work+0xbd/0x230 kernel/umh.c:164
                        process_one_work kernel/workqueue.c:3231 [inline]
                        process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3312
                        worker_thread+0x86d/0xd70 kernel/workqueue.c:3393
                        kthread+0x2f0/0x390 kernel/kthread.c:389
                        ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
                        ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 }
 ... key      at: [<ffffffff8e00a058>] tasklist_lock+0x18/0x40
 ... acquired at:
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
   __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
   _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
   send_sigurg+0xee/0x3c0 fs/fcntl.c:871
   sk_send_sigurg+0x75/0x2f0 net/core/sock.c:3411
   tcp_check_urg+0x207/0x740 net/ipv4/tcp_input.c:5784
   tcp_urg+0x15c/0x450 net/ipv4/tcp_input.c:5825
   tcp_rcv_established+0xfac/0x2020 net/ipv4/tcp_input.c:6174
   tcp_v4_do_rcv+0x965/0xc60 net/ipv4/tcp_ipv4.c:1914
   sk_backlog_rcv include/net/sock.h:1106 [inline]
   __release_sock+0x214/0x350 net/core/sock.c:2983
   release_sock+0x61/0x1f0 net/core/sock.c:3549
   tcp_sendmsg+0x3a/0x50 net/ipv4/tcp.c:1349
   sock_sendmsg_nosec net/socket.c:730 [inline]
   __sock_sendmsg+0x1a6/0x270 net/socket.c:745
   __sys_sendto+0x3a4/0x4f0 net/socket.c:2192
   __do_sys_sendto net/socket.c:2204 [inline]
   __se_sys_sendto net/socket.c:2200 [inline]
   __x64_sys_sendto+0xde/0x100 net/socket.c:2200
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f


stack backtrace:
CPU: 1 PID: 5100 Comm: syz-executor107 Not tainted 6.9.0-syzkaller-09699-geb6a9339efeb #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 print_bad_irq_dependency kernel/locking/lockdep.c:2626 [inline]
 check_irq_usage kernel/locking/lockdep.c:2865 [inline]
 check_prev_add kernel/locking/lockdep.c:3138 [inline]
 check_prevs_add kernel/locking/lockdep.c:3253 [inline]
 validate_chain+0x4dc7/0x58e0 kernel/locking/lockdep.c:3869
 __lock_acquire+0x1346/0x1fd0 kernel/locking/lockdep.c:5137
 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
 __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
 _raw_read_lock+0x36/0x50 kernel/locking/spinlock.c:228
 send_sigurg+0xee/0x3c0 fs/fcntl.c:871
 sk_send_sigurg+0x75/0x2f0 net/core/sock.c:3411
 tcp_check_urg+0x207/0x740 net/ipv4/tcp_input.c:5784
 tcp_urg+0x15c/0x450 net/ipv4/tcp_input.c:5825
 tcp_rcv_established+0xfac/0x2020 net/ipv4/tcp_input.c:6174
 tcp_v4_do_rcv+0x965/0xc60 net/ipv4/tcp_ipv4.c:1914
 sk_backlog_rcv include/net/sock.h:1106 [inline]
 __release_sock+0x214/0x350 net/core/sock.c:2983
 release_sock+0x61/0x1f0 net/core/sock.c:3549
 tcp_sendmsg+0x3a/0x50 net/ipv4/tcp.c:1349
 sock_sendmsg_nosec net/socket.c:730 [inline]
 __sock_sendmsg+0x1a6/0x270 net/socket.c:745
 __sys_sendto+0x3a4/0x4f0 net/socket.c:2192
 __do_sys_sendto net/socket.c:2204 [inline]
 __se_sys_sendto net/socket.c:2200 [inline]
 __x64_sys_sendto+0xde/0x100 net/socket.c:2200
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf5/0x240 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f7c2353cdd9
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 d1 19 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffcfdf15968 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 00007f7c2353cdd9
RDX: 0000000000000001 RSI: 00000000200012c0 RDI: 0000000000000007
RBP: 00007ffcfdf159b0 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000011 R11: 0000000000000246 R12: 00000000000f4240
R13: 0000000000000000 R14: 00007ffcfdf15994 R15: 00007ffcfdf159a0
 </TASK>

Crashes (3128):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/05/20 14:50 upstream eb6a9339efeb c0f1611a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/04 19:00 upstream 3d25a941ea50 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/04 18:20 upstream 7367539ad4b0 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/04/28 14:18 upstream 2c8159388952 07b455f9 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/04/20 16:06 upstream 13a2e429f644 af24b050 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/04/11 19:45 upstream 480e035fc4c7 478efa7f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/04/05 10:58 upstream 480e035fc4c7 0ee3535e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/04/05 08:40 upstream fe46a7dd189e 0ee3535e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/03/30 06:29 upstream 480e035fc4c7 c52bcb23 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/08 11:28 upstream 3aaa8ce7a335 cf82cde1 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/03/07 21:55 upstream 135288b73cef 2b789849 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/02/25 21:34 upstream ab0a97cffa0b 8d446f15 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/12/28 19:09 upstream f5837722ffec fb427a07 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/12/19 16:29 upstream 2cf4f94d8e86 3ad490ea .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/11/17 12:09 upstream 7475e51b8796 cb976f63 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2023/11/11 22:59 upstream 3ca112b71f35 6d6dbf8a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/11/11 00:27 upstream ac347a0655db 45e9b83e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/07 14:42 upstream be3ca57cfb77 83211397 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/10/28 05:32 upstream 888cf78c29e2 3c418d72 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/09/22 21:45 upstream dc912ba91b7e 0b6a67ac .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/14 08:01 upstream a5131c3fdf26 fdb4c10c .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/03/28 19:33 upstream 8d025e2092e2 ceaf7ddd .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/12/28 14:07 upstream f5837722ffec fb427a07 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/12/25 02:43 upstream 861deac3b092 fb427a07 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/12/11 12:26 upstream a39b6ac3781d 28b24332 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/10/15 01:47 upstream 727fb8376504 f757a323 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/08/25 15:38 upstream 4f9e7fabf864 03d9c195 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/07/17 05:26 upstream 20edcec23f92 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2023/07/15 20:26 upstream b6e6cc1f78c7 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/02/03 02:22 upstream 9f266ccaa2f5 16d19e30 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2022/10/03 06:30 upstream a962b54e162c feb56351 .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/09/19 04:11 upstream 38eddeedbbea dd9a85ff .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/18 16:02 upstream 274a2eebf80c d58e263f .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/11 05:36 upstream 200e340f2196 a6201f11 .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/04 08:15 upstream 200e340f2196 1c9013ac .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/07/14 17:11 upstream 4a57a8400075 5d921b08 .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/07/14 06:21 upstream 4a57a8400075 5d921b08 .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2022/07/12 23:29 upstream 72a8e05d4f66 d91dd8ea .config strace log report syz C ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/07/01 20:53 upstream a175eca0f3d7 1434eec0 .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2022/06/15 11:43 upstream 018ab4fabddd 127d1faf .config strace log report syz C ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2021/12/13 02:41 upstream 90d9fbc16b69 49ca1f59 .config console log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2024/04/28 22:06 linux-next bb7a2467e6be 07b455f9 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/10/26 17:48 linux-next 2ef7141596ee 23afc60f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/02/26 20:07 linux-next 8232539f864c ee50e71c .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/08/05 16:52 upstream 024ff300db33 4ffcc9ef .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2023/07/11 17:16 upstream 3f01e9fed845 2f19aa4f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/06/15 18:24 upstream b6dad5178cea 757d26ed .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/06/15 04:44 upstream b6dad5178cea 76decb82 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/01/05 11:40 upstream 512dee0c00ad 1dac8c7a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/12/23 04:32 upstream 8395ae05cb5a 9da18ae8 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2022/12/03 07:34 upstream a4412fdd49dc e080de16 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/11/29 18:56 upstream ca57f02295f1 05dc7993 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/11/22 11:50 upstream eb7081409f94 1c576c23 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/11/16 15:46 upstream 81e7cfa3a9eb 3a127a31 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/10/05 08:23 upstream a5088ee7251e eab8f949 .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/09/19 03:16 upstream 38eddeedbbea dd9a85ff .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce possible deadlock in input_event
2022/09/19 02:45 upstream 38eddeedbbea dd9a85ff .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/09/07 23:30 upstream 0066f1b0e275 c5b7bc57 .config strace log report syz C ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/08/04 02:29 upstream 200e340f2196 1c9013ac .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2024/05/21 05:20 upstream 70ec81c2e2b4 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/21 04:16 upstream 70ec81c2e2b4 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/05/21 02:37 upstream 1b0361620970 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/21 02:31 upstream 72ece20127a3 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/05/21 00:39 upstream 72ece20127a3 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/05/20 11:17 upstream eb6a9339efeb c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/05/20 10:04 upstream eb6a9339efeb c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/20 09:40 upstream eb6a9339efeb c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/05/19 22:32 upstream 61307b7be41a c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/19 20:47 upstream 61307b7be41a c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/19 19:17 upstream 61307b7be41a c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/05/19 07:08 upstream 0450d2083be6 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/19 05:49 upstream 0450d2083be6 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/19 05:11 upstream 4b377b4868ef c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/19 02:35 upstream 4b377b4868ef c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/05/19 01:23 upstream 4b377b4868ef c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/05/18 20:55 upstream 4b377b4868ef c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/18 18:21 upstream 4b377b4868ef c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/05/18 17:20 upstream 4b377b4868ef c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/18 17:17 upstream 4b377b4868ef c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/18 16:16 upstream 4b377b4868ef c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/05/18 15:12 upstream 4b377b4868ef c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/05/18 13:50 upstream ff2632d7d08e c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/05/18 12:17 upstream 7ee332c9f12b c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/18 11:06 upstream 7ee332c9f12b c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/18 04:39 upstream 7ee332c9f12b c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/18 03:44 upstream 7ee332c9f12b c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/18 02:15 upstream ff2632d7d08e c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/05/18 00:10 upstream ff2632d7d08e a12e99e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/05/17 21:06 upstream ff2632d7d08e a12e99e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/05/17 19:39 upstream ff2632d7d08e a12e99e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/05/17 18:33 upstream ff2632d7d08e a12e99e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/17 17:10 upstream ea5f6ad9ad96 a12e99e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/17 14:41 upstream ea5f6ad9ad96 a12e99e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/05/17 00:32 upstream ea5f6ad9ad96 c2e07261 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/05/17 00:32 upstream ea5f6ad9ad96 c2e07261 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/05/15 01:48 upstream 1b10b390d945 fdb4c10c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/15 00:47 upstream 1b10b390d945 fdb4c10c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/20 13:20 upstream eb6a9339efeb c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/05/19 09:56 upstream 0450d2083be6 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/05/19 08:42 upstream 0450d2083be6 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/05/18 06:18 upstream 7ee332c9f12b c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/05/17 22:25 upstream ff2632d7d08e a12e99e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/05/14 23:45 upstream 4b95dc87362a fdb4c10c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/05/20 20:37 upstream 6e51b4b5bbc0 c2e07261 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/05/18 22:15 upstream 0cc6f45cecb4 c2e07261 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/05/20 17:22 upstream 6e51b4b5bbc0 c2e07261 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in input_event
2024/05/20 03:06 upstream eb6a9339efeb c2e07261 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in input_event
2024/05/19 11:15 upstream 0450d2083be6 c2e07261 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in input_event
2021/11/10 12:51 upstream cb690f5238d7 75b04091 .config console log report info ci-upstream-kasan-gce-386 possible deadlock in input_event
2021/11/10 04:33 upstream cb690f5238d7 55fa030c .config console log report info ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/05/20 06:20 linux-next 632483ea8004 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2024/05/20 01:37 linux-next c75962170e49 c0f1611a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
* Struck through repros no longer work on HEAD.