syzbot


possible deadlock in input_event (2)

Status: upstream: reported C repro on 2021/11/10 17:01
Subsystems: fs
[Documentation on labels]
Reported-by: syzbot+d4c06e848a1c1f9f726f@syzkaller.appspotmail.com
First crash: 1107d, last: 15h23m
Cause bisection: the issue happens on the oldest tested release (bisect log)
Crash: possible deadlock in input_event (log)
Repro: C syz .config
  
Discussions (11)
Title Replies (including bot) Last reply
[syzbot] Monthly fs report (Jul 2024) 0 (1) 2024/07/18 07:59
[syzbot] Monthly kernfs report (May 2024) 0 (1) 2024/05/08 08:25
[syzbot] possible deadlock in input_event (2) 3 (8) 2024/04/20 09:53
[syzbot] Monthly kernfs report (Mar 2024) 0 (1) 2024/03/06 12:53
[syzbot] Monthly kernfs report (Feb 2024) 0 (1) 2024/02/02 21:05
[syzbot] Monthly kernfs report (Jan 2024) 0 (1) 2024/01/02 13:36
[syzbot] Monthly kernfs report (Nov 2023) 0 (1) 2023/11/29 13:03
[syzbot] Monthly fs report (Nov 2023) 0 (1) 2023/11/11 01:08
[syzbot] Monthly fs report (Oct 2023) 0 (1) 2023/10/10 13:22
[syzbot] Monthly fs report (Aug 2023) 0 (1) 2023/08/08 12:55
[syzbot] Monthly fs report (Jul 2023) 0 (1) 2023/07/10 09:36
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.1 possible deadlock in input_event origin:upstream missing-backport C done 253 9d01h 516d 0/3 upstream: reported C repro on 2023/06/23 12:11
upstream possible deadlock in input_event C done 2740 1107d 1411d 0/28 closed as dup on 2021/07/07 07:31
linux-5.15 possible deadlock in input_event origin:upstream missing-backport C 248 5d21h 492d 0/3 upstream: reported C repro on 2023/07/17 14:44
Last patch testing requests (13)
Created Duration User Patch Repo Result
2024/04/20 08:14 37m aha310510@gmail.com patch upstream report log
2024/04/20 06:15 1h02m aha310510@gmail.com patch upstream report log
2024/04/19 16:33 22m aha310510@gmail.com patch upstream error
2023/09/14 21:08 24m retest repro upstream OK log
2023/09/14 21:08 20m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 19m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 31m retest repro upstream OK log
Fix bisection attempts (1)
Created Duration User Patch Repo Result
2023/04/02 08:31 34m bisect fix upstream OK (0) job log log

Sample crash report:
=====================================================
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected
6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0 Not tainted
-----------------------------------------------------
syz-executor756/5084 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire:
ffff88801b348618 (&f->f_owner.lock){....}-{2:2}, at: send_sigio+0x28/0x3c0 fs/fcntl.c:816

and this task is already holding:
ffff88807957e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync_rcu fs/fcntl.c:1028 [inline]
ffff88807957e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync fs/fcntl.c:1049 [inline]
ffff88807957e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x138/0x4f0 fs/fcntl.c:1042
which would create a new lock dependency:
 (&new->fa_lock){....}-{2:2} -> (&f->f_owner.lock){....}-{2:2}

but this new dependency connects a HARDIRQ-irq-safe lock:
 (&dev->event_lock#2){-...}-{2:2}

... which became HARDIRQ-irq-safe at:
  lock_acquire kernel/locking/lockdep.c:5754 [inline]
  lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
  __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
  _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162
  input_event drivers/input/input.c:434 [inline]
  input_event+0x70/0xa0 drivers/input/input.c:427
  input_report_key include/linux/input.h:425 [inline]
  psmouse_report_standard_buttons+0x30/0x80 drivers/input/mouse/psmouse-base.c:128
  psmouse_report_standard_packet drivers/input/mouse/psmouse-base.c:146 [inline]
  psmouse_process_byte+0x39c/0x8a0 drivers/input/mouse/psmouse-base.c:237
  psmouse_handle_byte+0x44/0x570 drivers/input/mouse/psmouse-base.c:279
  psmouse_receive_byte+0x243/0xe20 drivers/input/mouse/psmouse-base.c:426
  ps2_interrupt+0x20b/0x5b0 drivers/input/serio/libps2.c:613
  serio_interrupt+0x8f/0x150 drivers/input/serio/serio.c:998
  i8042_interrupt+0x3f5/0x8a0 drivers/input/serio/i8042.c:606
  __handle_irq_event_percpu+0x229/0x7c0 kernel/irq/handle.c:158
  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
  handle_irq_event+0xab/0x1e0 kernel/irq/handle.c:210
  handle_edge_irq+0x263/0xd10 kernel/irq/chip.c:831
  generic_handle_irq_desc include/linux/irqdesc.h:173 [inline]
  handle_irq arch/x86/kernel/irq.c:247 [inline]
  call_irq_handler arch/x86/kernel/irq.c:259 [inline]
  __common_interrupt+0xdf/0x250 arch/x86/kernel/irq.c:285
  common_interrupt+0xab/0xd0 arch/x86/kernel/irq.c:278
  asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693
  native_safe_halt arch/x86/include/asm/irqflags.h:48 [inline]
  arch_safe_halt arch/x86/include/asm/irqflags.h:86 [inline]
  acpi_safe_halt+0x1a/0x20 drivers/acpi/processor_idle.c:112
  acpi_idle_enter+0xc5/0x160 drivers/acpi/processor_idle.c:707
  cpuidle_enter_state+0x85/0x500 drivers/cpuidle/cpuidle.c:267
  cpuidle_enter+0x4e/0xa0 drivers/cpuidle/cpuidle.c:388
  cpuidle_idle_call kernel/sched/idle.c:236 [inline]
  do_idle+0x313/0x3f0 kernel/sched/idle.c:332
  cpu_startup_entry+0x4f/0x60 kernel/sched/idle.c:430
  rest_init+0x16b/0x2b0 init/main.c:747
  start_kernel+0x3df/0x4c0 init/main.c:1103
  x86_64_start_reservations+0x18/0x30 arch/x86/kernel/head64.c:507
  x86_64_start_kernel+0xb2/0xc0 arch/x86/kernel/head64.c:488
  common_startup_64+0x13e/0x148

to a HARDIRQ-irq-unsafe lock:
 (tasklist_lock){.+.+}-{2:2}

... which became HARDIRQ-irq-unsafe at:
...
  lock_acquire kernel/locking/lockdep.c:5754 [inline]
  lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
  __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
  _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
  __do_wait+0x105/0x890 kernel/exit.c:1583
  do_wait+0x219/0x570 kernel/exit.c:1627
  kernel_wait+0xa0/0x160 kernel/exit.c:1803
  call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
  call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
  process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
  process_scheduled_works kernel/workqueue.c:3312 [inline]
  worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
  kthread+0x2c1/0x3a0 kernel/kthread.c:389
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

other info that might help us debug this:

Chain exists of:
  &dev->event_lock#2 --> &new->fa_lock --> tasklist_lock

 Possible interrupt unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(tasklist_lock);
                               local_irq_disable();
                               lock(&dev->event_lock#2);
                               lock(&new->fa_lock);
  <Interrupt>
    lock(&dev->event_lock#2);

 *** DEADLOCK ***

8 locks held by syz-executor756/5084:
 #0: ffff888025343110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x1ff/0x750 drivers/input/evdev.c:513
 #1: ffff888024f8a230 (&dev->event_lock#2){-...}-{2:2}, at: input_inject_event+0xa4/0x370 drivers/input/input.c:460
 #2: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
 #2: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline]
 #2: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0xca/0x370 drivers/input/input.c:462
 #3: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
 #3: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline]
 #3: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: input_pass_values+0xb2/0x840 drivers/input/input.c:153
 #4: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
 #4: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline]
 #4: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x87/0x390 drivers/input/evdev.c:298
 #5: ffff88801aafd028 (&client->buffer_lock){....}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
 #5: ffff88801aafd028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values+0x10e/0x9b0 drivers/input/evdev.c:261
 #6: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
 #6: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:781 [inline]
 #6: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: kill_fasync fs/fcntl.c:1048 [inline]
 #6: ffffffff8dbb18e0 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x6d/0x4f0 fs/fcntl.c:1042
 #7: ffff88807957e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync_rcu fs/fcntl.c:1028 [inline]
 #7: ffff88807957e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync fs/fcntl.c:1049 [inline]
 #7: ffff88807957e018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x138/0x4f0 fs/fcntl.c:1042

the dependencies between HARDIRQ-irq-safe lock and the holding lock:
  -> (&dev->event_lock#2){-...}-{2:2} {
     IN-HARDIRQ-W at:
                        lock_acquire kernel/locking/lockdep.c:5754 [inline]
                        lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
                        __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                        _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162
                        input_event drivers/input/input.c:434 [inline]
                        input_event+0x70/0xa0 drivers/input/input.c:427
                        input_report_key include/linux/input.h:425 [inline]
                        psmouse_report_standard_buttons+0x30/0x80 drivers/input/mouse/psmouse-base.c:128
                        psmouse_report_standard_packet drivers/input/mouse/psmouse-base.c:146 [inline]
                        psmouse_process_byte+0x39c/0x8a0 drivers/input/mouse/psmouse-base.c:237
                        psmouse_handle_byte+0x44/0x570 drivers/input/mouse/psmouse-base.c:279
                        psmouse_receive_byte+0x243/0xe20 drivers/input/mouse/psmouse-base.c:426
                        ps2_interrupt+0x20b/0x5b0 drivers/input/serio/libps2.c:613
                        serio_interrupt+0x8f/0x150 drivers/input/serio/serio.c:998
                        i8042_interrupt+0x3f5/0x8a0 drivers/input/serio/i8042.c:606
                        __handle_irq_event_percpu+0x229/0x7c0 kernel/irq/handle.c:158
                        handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
                        handle_irq_event+0xab/0x1e0 kernel/irq/handle.c:210
                        handle_edge_irq+0x263/0xd10 kernel/irq/chip.c:831
                        generic_handle_irq_desc include/linux/irqdesc.h:173 [inline]
                        handle_irq arch/x86/kernel/irq.c:247 [inline]
                        call_irq_handler arch/x86/kernel/irq.c:259 [inline]
                        __common_interrupt+0xdf/0x250 arch/x86/kernel/irq.c:285
                        common_interrupt+0xab/0xd0 arch/x86/kernel/irq.c:278
                        asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693
                        native_safe_halt arch/x86/include/asm/irqflags.h:48 [inline]
                        arch_safe_halt arch/x86/include/asm/irqflags.h:86 [inline]
                        acpi_safe_halt+0x1a/0x20 drivers/acpi/processor_idle.c:112
                        acpi_idle_enter+0xc5/0x160 drivers/acpi/processor_idle.c:707
                        cpuidle_enter_state+0x85/0x500 drivers/cpuidle/cpuidle.c:267
                        cpuidle_enter+0x4e/0xa0 drivers/cpuidle/cpuidle.c:388
                        cpuidle_idle_call kernel/sched/idle.c:236 [inline]
                        do_idle+0x313/0x3f0 kernel/sched/idle.c:332
                        cpu_startup_entry+0x4f/0x60 kernel/sched/idle.c:430
                        rest_init+0x16b/0x2b0 init/main.c:747
                        start_kernel+0x3df/0x4c0 init/main.c:1103
                        x86_64_start_reservations+0x18/0x30 arch/x86/kernel/head64.c:507
                        x86_64_start_kernel+0xb2/0xc0 arch/x86/kernel/head64.c:488
                        common_startup_64+0x13e/0x148
     INITIAL USE at:
                       lock_acquire kernel/locking/lockdep.c:5754 [inline]
                       lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
                       __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                       _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162
                       input_inject_event+0xa4/0x370 drivers/input/input.c:460
                       __led_set_brightness drivers/leds/led-core.c:52 [inline]
                       led_set_brightness_nopm drivers/leds/led-core.c:316 [inline]
                       led_set_brightness_nosleep drivers/leds/led-core.c:347 [inline]
                       led_set_brightness+0x211/0x290 drivers/leds/led-core.c:309
                       led_trigger_event drivers/leds/led-triggers.c:394 [inline]
                       led_trigger_event+0xda/0x270 drivers/leds/led-triggers.c:382
                       kbd_led_trigger_activate+0xc6/0x100 drivers/tty/vt/keyboard.c:1036
                       led_trigger_set+0x590/0xc50 drivers/leds/led-triggers.c:199
                       led_match_default_trigger drivers/leds/led-triggers.c:256 [inline]
                       led_match_default_trigger drivers/leds/led-triggers.c:250 [inline]
                       led_trigger_set_default drivers/leds/led-triggers.c:274 [inline]
                       led_trigger_set_default+0x1bd/0x2a0 drivers/leds/led-triggers.c:263
                       led_classdev_register_ext+0x7c4/0xab0 drivers/leds/led-class.c:561
                       led_classdev_register include/linux/leds.h:271 [inline]
                       input_leds_connect+0x54a/0x8e0 drivers/input/input-leds.c:145
                       input_attach_handler.isra.0+0x181/0x260 drivers/input/input.c:1064
                       input_register_device+0xb22/0x1140 drivers/input/input.c:2470
                       atkbd_connect+0x5e2/0xa20 drivers/input/keyboard/atkbd.c:1342
                       serio_connect_driver drivers/input/serio/serio.c:44 [inline]
                       serio_driver_probe+0x74/0xa0 drivers/input/serio/serio.c:775
                       call_driver_probe drivers/base/dd.c:578 [inline]
                       really_probe+0x23e/0xa90 drivers/base/dd.c:656
                       __driver_probe_device+0x1de/0x440 drivers/base/dd.c:798
                       driver_probe_device+0x4c/0x1b0 drivers/base/dd.c:828
                       __driver_attach+0x283/0x580 drivers/base/dd.c:1214
                       bus_for_each_dev+0x13c/0x1d0 drivers/base/bus.c:368
                       serio_attach_driver drivers/input/serio/serio.c:804 [inline]
                       serio_handle_event+0x2bb/0xa90 drivers/input/serio/serio.c:224
                       process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
                       process_scheduled_works kernel/workqueue.c:3312 [inline]
                       worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
                       kthread+0x2c1/0x3a0 kernel/kthread.c:389
                       ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                       ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
   }
   ... key      at: [<ffffffff94e28160>] __key.6+0x0/0x40
 -> (&client->buffer_lock){....}-{2:2} {
    INITIAL USE at:
                     lock_acquire kernel/locking/lockdep.c:5754 [inline]
                     lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
                     __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
                     _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
                     spin_lock include/linux/spinlock.h:351 [inline]
                     evdev_pass_values+0x10e/0x9b0 drivers/input/evdev.c:261
                     evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
                     input_to_handler+0x2a1/0x4d0 drivers/input/input.c:129
                     input_pass_values+0x5c9/0x840 drivers/input/input.c:161
                     input_event_dispose+0x37a/0x630 drivers/input/input.c:378
                     input_handle_event+0x11c/0xd80 drivers/input/input.c:406
                     input_inject_event+0x1bb/0x370 drivers/input/input.c:465
                     evdev_write+0x450/0x750 drivers/input/evdev.c:530
                     vfs_write+0x29a/0x1140 fs/read_write.c:588
                     ksys_write+0x1f8/0x260 fs/read_write.c:643
                     do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                     do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
                     entry_SYSCALL_64_after_hwframe+0x77/0x7f
  }
  ... key      at: [<ffffffff94e285e0>] __key.1+0x0/0x40
  ... acquired at:
   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
   _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
   spin_lock include/linux/spinlock.h:351 [inline]
   evdev_pass_values+0x10e/0x9b0 drivers/input/evdev.c:261
   evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
   input_to_handler+0x2a1/0x4d0 drivers/input/input.c:129
   input_pass_values+0x5c9/0x840 drivers/input/input.c:161
   input_event_dispose+0x37a/0x630 drivers/input/input.c:378
   input_handle_event+0x11c/0xd80 drivers/input/input.c:406
   input_inject_event+0x1bb/0x370 drivers/input/input.c:465
   evdev_write+0x450/0x750 drivers/input/evdev.c:530
   vfs_write+0x29a/0x1140 fs/read_write.c:588
   ksys_write+0x1f8/0x260 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> (&new->fa_lock){....}-{2:2} {
   INITIAL READ USE at:
                        lock_acquire kernel/locking/lockdep.c:5754 [inline]
                        lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
                        __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                        _raw_read_lock_irqsave+0x74/0x90 kernel/locking/spinlock.c:236
                        kill_fasync_rcu fs/fcntl.c:1028 [inline]
                        kill_fasync fs/fcntl.c:1049 [inline]
                        kill_fasync+0x138/0x4f0 fs/fcntl.c:1042
                        __pass_event drivers/input/evdev.c:240 [inline]
                        evdev_pass_values+0x619/0x9b0 drivers/input/evdev.c:278
                        evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
                        input_to_handler+0x2a1/0x4d0 drivers/input/input.c:129
                        input_pass_values+0x5c9/0x840 drivers/input/input.c:161
                        input_event_dispose+0x37a/0x630 drivers/input/input.c:378
                        input_handle_event+0x11c/0xd80 drivers/input/input.c:406
                        input_inject_event+0x1bb/0x370 drivers/input/input.c:465
                        evdev_write+0x450/0x750 drivers/input/evdev.c:530
                        vfs_write+0x29a/0x1140 fs/read_write.c:588
                        ksys_write+0x1f8/0x260 fs/read_write.c:643
                        do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                        do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
                        entry_SYSCALL_64_after_hwframe+0x77/0x7f
 }
 ... key      at: [<ffffffff94b75bc0>] __key.0+0x0/0x40
 ... acquired at:
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0x74/0x90 kernel/locking/spinlock.c:236
   kill_fasync_rcu fs/fcntl.c:1028 [inline]
   kill_fasync fs/fcntl.c:1049 [inline]
   kill_fasync+0x138/0x4f0 fs/fcntl.c:1042
   __pass_event drivers/input/evdev.c:240 [inline]
   evdev_pass_values+0x619/0x9b0 drivers/input/evdev.c:278
   evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
   input_to_handler+0x2a1/0x4d0 drivers/input/input.c:129
   input_pass_values+0x5c9/0x840 drivers/input/input.c:161
   input_event_dispose+0x37a/0x630 drivers/input/input.c:378
   input_handle_event+0x11c/0xd80 drivers/input/input.c:406
   input_inject_event+0x1bb/0x370 drivers/input/input.c:465
   evdev_write+0x450/0x750 drivers/input/evdev.c:530
   vfs_write+0x29a/0x1140 fs/read_write.c:588
   ksys_write+0x1f8/0x260 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f


the dependencies between the lock to be acquired
 and HARDIRQ-irq-unsafe lock:
 -> (tasklist_lock){.+.+}-{2:2} {
    HARDIRQ-ON-R at:
                      lock_acquire kernel/locking/lockdep.c:5754 [inline]
                      lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
                      __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                      _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
                      __do_wait+0x105/0x890 kernel/exit.c:1583
                      do_wait+0x219/0x570 kernel/exit.c:1627
                      kernel_wait+0xa0/0x160 kernel/exit.c:1803
                      call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                      call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
                      process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
                      process_scheduled_works kernel/workqueue.c:3312 [inline]
                      worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
                      kthread+0x2c1/0x3a0 kernel/kthread.c:389
                      ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                      ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    SOFTIRQ-ON-R at:
                      lock_acquire kernel/locking/lockdep.c:5754 [inline]
                      lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
                      __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                      _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
                      __do_wait+0x105/0x890 kernel/exit.c:1583
                      do_wait+0x219/0x570 kernel/exit.c:1627
                      kernel_wait+0xa0/0x160 kernel/exit.c:1803
                      call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                      call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
                      process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
                      process_scheduled_works kernel/workqueue.c:3312 [inline]
                      worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
                      kthread+0x2c1/0x3a0 kernel/kthread.c:389
                      ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                      ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
    INITIAL USE at:
                     lock_acquire kernel/locking/lockdep.c:5754 [inline]
                     lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
                     __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                     _raw_write_lock_irq+0x36/0x50 kernel/locking/spinlock.c:326
                     copy_process+0x441a/0x8f10 kernel/fork.c:2516
                     kernel_clone+0xfd/0x980 kernel/fork.c:2797
                     user_mode_thread+0xb4/0xf0 kernel/fork.c:2875
                     rest_init+0x23/0x2b0 init/main.c:712
                     start_kernel+0x3df/0x4c0 init/main.c:1103
                     x86_64_start_reservations+0x18/0x30 arch/x86/kernel/head64.c:507
                     x86_64_start_kernel+0xb2/0xc0 arch/x86/kernel/head64.c:488
                     common_startup_64+0x13e/0x148
    INITIAL READ USE at:
                          lock_acquire kernel/locking/lockdep.c:5754 [inline]
                          lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
                          __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                          _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
                          __do_wait+0x105/0x890 kernel/exit.c:1583
                          do_wait+0x219/0x570 kernel/exit.c:1627
                          kernel_wait+0xa0/0x160 kernel/exit.c:1803
                          call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                          call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
                          process_one_work+0x9fb/0x1b60 kernel/workqueue.c:3231
                          process_scheduled_works kernel/workqueue.c:3312 [inline]
                          worker_thread+0x6c8/0xf70 kernel/workqueue.c:3393
                          kthread+0x2c1/0x3a0 kernel/kthread.c:389
                          ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                          ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
  }
  ... key      at: [<ffffffff8d80a098>] tasklist_lock+0x18/0x40
  ... acquired at:
   __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
   _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
   send_sigurg+0xb0/0xc30 fs/fcntl.c:871
   sk_send_sigurg+0x7a/0x370 net/core/sock.c:3411
   queue_oob net/unix/af_unix.c:2182 [inline]
   unix_stream_sendmsg+0xe33/0x10f0 net/unix/af_unix.c:2300
   sock_sendmsg_nosec net/socket.c:730 [inline]
   __sock_sendmsg net/socket.c:745 [inline]
   ____sys_sendmsg+0xab5/0xc90 net/socket.c:2585
   ___sys_sendmsg+0x135/0x1e0 net/socket.c:2639
   __sys_sendmsg+0x117/0x1f0 net/socket.c:2668
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f

-> (&f->f_owner.lock){....}-{2:2} {
   INITIAL USE at:
                   lock_acquire kernel/locking/lockdep.c:5754 [inline]
                   lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
                   __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                   _raw_write_lock_irq+0x36/0x50 kernel/locking/spinlock.c:326
                   f_modown+0x2a/0x380 fs/fcntl.c:93
                   __f_setown fs/fcntl.c:112 [inline]
                   f_setown+0xd4/0x2a0 fs/fcntl.c:140
                   do_fcntl+0x11f7/0x1380 fs/fcntl.c:412
                   __do_sys_fcntl fs/fcntl.c:492 [inline]
                   __se_sys_fcntl fs/fcntl.c:477 [inline]
                   __x64_sys_fcntl+0x174/0x200 fs/fcntl.c:477
                   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                   do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
                   entry_SYSCALL_64_after_hwframe+0x77/0x7f
   INITIAL READ USE at:
                        lock_acquire kernel/locking/lockdep.c:5754 [inline]
                        lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
                        __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                        _raw_read_lock_irqsave+0x74/0x90 kernel/locking/spinlock.c:236
                        send_sigurg+0x22/0xc30 fs/fcntl.c:855
                        sk_send_sigurg+0x7a/0x370 net/core/sock.c:3411
                        queue_oob net/unix/af_unix.c:2182 [inline]
                        unix_stream_sendmsg+0xe33/0x10f0 net/unix/af_unix.c:2300
                        sock_sendmsg_nosec net/socket.c:730 [inline]
                        __sock_sendmsg net/socket.c:745 [inline]
                        ____sys_sendmsg+0xab5/0xc90 net/socket.c:2585
                        ___sys_sendmsg+0x135/0x1e0 net/socket.c:2639
                        __sys_sendmsg+0x117/0x1f0 net/socket.c:2668
                        do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                        do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
                        entry_SYSCALL_64_after_hwframe+0x77/0x7f
 }
 ... key      at: [<ffffffff94b74e60>] __key.2+0x0/0x40
 ... acquired at:
   lock_acquire kernel/locking/lockdep.c:5754 [inline]
   lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0x74/0x90 kernel/locking/spinlock.c:236
   send_sigio+0x28/0x3c0 fs/fcntl.c:816
   kill_fasync_rcu fs/fcntl.c:1035 [inline]
   kill_fasync fs/fcntl.c:1049 [inline]
   kill_fasync+0x1f6/0x4f0 fs/fcntl.c:1042
   __pass_event drivers/input/evdev.c:240 [inline]
   evdev_pass_values+0x619/0x9b0 drivers/input/evdev.c:278
   evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
   input_to_handler+0x2a1/0x4d0 drivers/input/input.c:129
   input_pass_values+0x5c9/0x840 drivers/input/input.c:161
   input_event_dispose+0x37a/0x630 drivers/input/input.c:378
   input_handle_event+0x11c/0xd80 drivers/input/input.c:406
   input_inject_event+0x1bb/0x370 drivers/input/input.c:465
   evdev_write+0x450/0x750 drivers/input/evdev.c:530
   vfs_write+0x29a/0x1140 fs/read_write.c:588
   ksys_write+0x1f8/0x260 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x77/0x7f


stack backtrace:
CPU: 1 PID: 5084 Comm: syz-executor756 Not tainted 6.10.0-rc1-syzkaller-00027-g4a4be1ad3a6e #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/02/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:114
 print_bad_irq_dependency kernel/locking/lockdep.c:2626 [inline]
 check_irq_usage+0xe3c/0x1490 kernel/locking/lockdep.c:2865
 check_prev_add kernel/locking/lockdep.c:3138 [inline]
 check_prevs_add kernel/locking/lockdep.c:3253 [inline]
 validate_chain kernel/locking/lockdep.c:3869 [inline]
 __lock_acquire+0x248e/0x3b30 kernel/locking/lockdep.c:5137
 lock_acquire kernel/locking/lockdep.c:5754 [inline]
 lock_acquire+0x1b1/0x560 kernel/locking/lockdep.c:5719
 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
 _raw_read_lock_irqsave+0x74/0x90 kernel/locking/spinlock.c:236
 send_sigio+0x28/0x3c0 fs/fcntl.c:816
 kill_fasync_rcu fs/fcntl.c:1035 [inline]
 kill_fasync fs/fcntl.c:1049 [inline]
 kill_fasync+0x1f6/0x4f0 fs/fcntl.c:1042
 __pass_event drivers/input/evdev.c:240 [inline]
 evdev_pass_values+0x619/0x9b0 drivers/input/evdev.c:278
 evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
 input_to_handler+0x2a1/0x4d0 drivers/input/input.c:129
 input_pass_values+0x5c9/0x840 drivers/input/input.c:161
 input_event_dispose+0x37a/0x630 drivers/input/input.c:378
 input_handle_event+0x11c/0xd80 drivers/input/input.c:406
 input_inject_event+0x1bb/0x370 drivers/input/input.c:465
 evdev_write+0x450/0x750 drivers/input/evdev.c:530
 vfs_write+0x29a/0x1140 fs/read_write.c:588
 ksys_write+0x1f8/0x260 fs/read_write.c:643
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f9b69466a39
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007ffe7e6da398 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f9b69466a39
RDX: 0000000000002778 RSI: 0000000020000040 RDI: 0000000000000006
RBP: 00007f9b694d95f0 R08: 0000000000000006 R09: 0000000000000006
R10: 000000000000001f R11: 0000000000000246 R12: 0000000000000001
R13: 431bde82d7b634db R14: 0000000000000001 R15: 0000000000000001
 </TASK>

Crashes (4950):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/05/31 06:05 upstream 4a4be1ad3a6e 34889ee3 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/05/20 14:50 upstream eb6a9339efeb c0f1611a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/04 19:00 upstream 3d25a941ea50 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/05/04 18:20 upstream 7367539ad4b0 610f2a54 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/04/28 14:18 upstream 2c8159388952 07b455f9 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/04/20 16:06 upstream 13a2e429f644 af24b050 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/04/11 19:45 upstream 480e035fc4c7 478efa7f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/04/05 10:58 upstream 480e035fc4c7 0ee3535e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/04/05 08:40 upstream fe46a7dd189e 0ee3535e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/03/30 06:29 upstream 480e035fc4c7 c52bcb23 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/08 11:28 upstream 3aaa8ce7a335 cf82cde1 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/03/07 21:55 upstream 135288b73cef 2b789849 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/02/25 21:34 upstream ab0a97cffa0b 8d446f15 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/12/28 19:09 upstream f5837722ffec fb427a07 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/12/19 16:29 upstream 2cf4f94d8e86 3ad490ea .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/11/17 12:09 upstream 7475e51b8796 cb976f63 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2023/11/11 22:59 upstream 3ca112b71f35 6d6dbf8a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/11/11 00:27 upstream ac347a0655db 45e9b83e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/07 14:42 upstream be3ca57cfb77 83211397 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/10/28 05:32 upstream 888cf78c29e2 3c418d72 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/09/22 21:45 upstream dc912ba91b7e 0b6a67ac .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/07/26 04:28 upstream 1722389b0d86 3f86dfed .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/06/02 09:20 upstream 89be4025b0db c2e07261 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/05/14 08:01 upstream a5131c3fdf26 fdb4c10c .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/03/28 19:33 upstream 8d025e2092e2 ceaf7ddd .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/12/28 14:07 upstream f5837722ffec fb427a07 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/12/25 02:43 upstream 861deac3b092 fb427a07 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/12/11 12:26 upstream a39b6ac3781d 28b24332 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/10/15 01:47 upstream 727fb8376504 f757a323 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/08/25 15:38 upstream 4f9e7fabf864 03d9c195 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/07/17 05:26 upstream 20edcec23f92 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2023/07/15 20:26 upstream b6e6cc1f78c7 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/02/03 02:22 upstream 9f266ccaa2f5 16d19e30 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2022/10/03 06:30 upstream a962b54e162c feb56351 .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/09/19 04:11 upstream 38eddeedbbea dd9a85ff .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/18 16:02 upstream 274a2eebf80c d58e263f .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/11 05:36 upstream 200e340f2196 a6201f11 .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/04 08:15 upstream 200e340f2196 1c9013ac .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/07/14 17:11 upstream 4a57a8400075 5d921b08 .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2021/12/13 02:41 upstream 90d9fbc16b69 49ca1f59 .config console log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2024/04/28 22:06 linux-next bb7a2467e6be 07b455f9 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/10/26 17:48 linux-next 2ef7141596ee 23afc60f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/02/26 20:07 linux-next 8232539f864c ee50e71c .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/08/05 16:52 upstream 024ff300db33 4ffcc9ef .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2023/07/11 17:16 upstream 3f01e9fed845 2f19aa4f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/06/15 18:24 upstream b6dad5178cea 757d26ed .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/06/15 04:44 upstream b6dad5178cea 76decb82 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/01/05 11:40 upstream 512dee0c00ad 1dac8c7a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/12/23 04:32 upstream 8395ae05cb5a 9da18ae8 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2022/12/03 07:34 upstream a4412fdd49dc e080de16 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/11/29 18:56 upstream ca57f02295f1 05dc7993 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/11/22 11:50 upstream eb7081409f94 1c576c23 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/11/16 15:46 upstream 81e7cfa3a9eb 3a127a31 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/10/05 08:23 upstream a5088ee7251e eab8f949 .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/09/19 03:16 upstream 38eddeedbbea dd9a85ff .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce possible deadlock in input_event
2022/09/19 02:45 upstream 38eddeedbbea dd9a85ff .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/09/07 23:30 upstream 0066f1b0e275 c5b7bc57 .config strace log report syz C ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/08/04 02:29 upstream 200e340f2196 1c9013ac .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2024/11/14 14:12 upstream 0a9b9d17f3a7 77f3eeb7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/11/14 14:12 upstream 0a9b9d17f3a7 77f3eeb7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/11/14 08:15 upstream 0a9b9d17f3a7 a8c99394 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/14 02:08 upstream f1b785f4c787 a8c99394 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/14 00:07 upstream f1b785f4c787 a8c99394 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/13 18:16 upstream f1b785f4c787 a8c99394 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/13 16:53 upstream f1b785f4c787 62026c85 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/13 15:46 upstream f1b785f4c787 62026c85 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/13 10:44 upstream 3022e9d00ebe 62026c85 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/13 08:32 upstream 3022e9d00ebe 62026c85 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/11/13 00:19 upstream 3022e9d00ebe 62026c85 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/12 20:11 upstream 3022e9d00ebe 75bb1b32 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/12 16:00 upstream 2d5404caa8c7 75bb1b32 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/12 06:38 upstream 2d5404caa8c7 75bb1b32 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/11/12 04:04 upstream 2d5404caa8c7 75bb1b32 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/12 04:04 upstream 2d5404caa8c7 75bb1b32 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/12 02:13 upstream 2d5404caa8c7 97fe5517 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/12 01:04 upstream 2d5404caa8c7 97fe5517 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/11 19:59 upstream 2d5404caa8c7 97fe5517 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/11/11 15:52 upstream 2d5404caa8c7 97fe5517 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/11 13:50 upstream 2d5404caa8c7 97fe5517 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/11 12:17 upstream 2d5404caa8c7 97fe5517 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/10 03:36 upstream de2f378f2b77 6b856513 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/11/09 23:22 upstream da4373fbcf00 6b856513 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/11/08 11:46 upstream 906bd684e4b1 179b040e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/11/08 09:03 upstream 906bd684e4b1 179b040e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/11/08 07:59 upstream 906bd684e4b1 179b040e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/11/07 16:15 upstream ff7afaeca1a1 c069283c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/11/07 09:20 upstream 7758b206117d df3dc63b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/06 22:27 upstream 7758b206117d df3dc63b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/11/06 20:30 upstream 7758b206117d 3a465482 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/11/06 03:12 upstream 2e1b3cc9d7f7 3a465482 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/05 11:18 upstream 2e1b3cc9d7f7 509da429 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/04 22:50 upstream 557329bcecc2 509da429 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2024/11/04 21:39 upstream 557329bcecc2 509da429 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/11/15 11:52 upstream cfaaa7d010d1 f6ede3a3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/15 06:00 upstream cfaaa7d010d1 f6ede3a3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/15 00:18 upstream 0a9b9d17f3a7 77f3eeb7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/14 10:55 upstream 0a9b9d17f3a7 a8c99394 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/14 07:04 upstream f1b785f4c787 a8c99394 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/14 04:33 upstream f1b785f4c787 a8c99394 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/13 19:43 upstream f1b785f4c787 a8c99394 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/12 22:54 upstream 3022e9d00ebe 75bb1b32 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/12 14:39 upstream 2d5404caa8c7 75bb1b32 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/11 18:48 upstream 2d5404caa8c7 97fe5517 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/09 09:06 upstream 50643bbc9eb6 6b856513 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/08 20:59 upstream 906bd684e4b1 179b040e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/10/12 12:21 upstream 09f6b0c8904b 084d8178 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/11/20 12:25 upstream bf9aa14fc523 4fca1650 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in input_event
2024/11/18 23:01 upstream 9fb2cfa4635a 571351cb .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in input_event
2024/10/09 09:32 upstream 75b607fab38d 56fb2cb7 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in input_event
2021/11/10 12:51 upstream cb690f5238d7 75b04091 .config console log report info ci-upstream-kasan-gce-386 possible deadlock in input_event
2021/11/10 04:33 upstream cb690f5238d7 55fa030c .config console log report info ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/11/20 15:09 linux-next ac24e26aa08f 4fca1650 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2024/11/13 01:26 linux-next 929beafbe7ac 62026c85 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2024/11/12 05:08 linux-next 929beafbe7ac 75bb1b32 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2024/11/09 00:14 linux-next 929beafbe7ac 6b856513 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2024/11/08 10:22 linux-next 929beafbe7ac 179b040e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
* Struck through repros no longer work on HEAD.