syzbot


possible deadlock in input_event (2)

Status: upstream: reported C repro on 2021/11/10 17:01
Subsystems: kernfs
[Documentation on labels]
Reported-by: syzbot+d4c06e848a1c1f9f726f@syzkaller.appspotmail.com
First crash: 860d, last: 1d15h
Cause bisection: the issue happens on the oldest tested release (bisect log)
Crash: possible deadlock in input_event (log)
Repro: C syz .config
  
Discussions (9)
Title Replies (including bot) Last reply
[syzbot] Monthly kernfs report (Mar 2024) 0 (1) 2024/03/06 12:53
[syzbot] Monthly kernfs report (Feb 2024) 0 (1) 2024/02/02 21:05
[syzbot] Monthly kernfs report (Jan 2024) 0 (1) 2024/01/02 13:36
[syzbot] Monthly kernfs report (Nov 2023) 0 (1) 2023/11/29 13:03
[syzbot] Monthly fs report (Nov 2023) 0 (1) 2023/11/11 01:08
[syzbot] Monthly fs report (Oct 2023) 0 (1) 2023/10/10 13:22
[syzbot] Monthly fs report (Aug 2023) 0 (1) 2023/08/08 12:55
[syzbot] Monthly fs report (Jul 2023) 0 (1) 2023/07/10 09:36
[syzbot] possible deadlock in input_event (2) 0 (2) 2021/12/13 02:42
Similar bugs (3)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-6.1 possible deadlock in input_event origin:upstream C 24 8d01h 270d 0/3 upstream: reported C repro on 2023/06/23 12:11
upstream possible deadlock in input_event C done 2740 860d 1165d 0/26 closed as dup on 2021/07/07 07:31
linux-5.15 possible deadlock in input_event origin:upstream missing-backport C 44 1d10h 245d 0/3 upstream: reported C repro on 2023/07/17 14:44
Last patch testing requests (10)
Created Duration User Patch Repo Result
2023/09/14 21:08 24m retest repro upstream OK log
2023/09/14 21:08 20m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/14 21:08 19m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 19m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 20m retest repro upstream OK log
2023/09/13 21:42 31m retest repro upstream OK log
Fix bisection attempts (1)
Created Duration User Patch Repo Result
2023/04/02 08:31 34m bisect fix upstream job log (0) log

Sample crash report:
=====================================================
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected
6.8.0-rc7-syzkaller-00142-g3aaa8ce7a335 #0 Not tainted
-----------------------------------------------------
syz-executor326/5062 [HC0[0]:SC0[0]:HE0:SE1] is trying to acquire:
ffff8880788a1018 (&new->fa_lock){....}-{2:2}, at: kill_fasync_rcu fs/fcntl.c:998 [inline]
ffff8880788a1018 (&new->fa_lock){....}-{2:2}, at: kill_fasync fs/fcntl.c:1019 [inline]
ffff8880788a1018 (&new->fa_lock){....}-{2:2}, at: kill_fasync+0x138/0x4f0 fs/fcntl.c:1012

and this task is already holding:
ffff88801aebc028 (&client->buffer_lock){....}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
ffff88801aebc028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values+0x10e/0x9b0 drivers/input/evdev.c:261
which would create a new lock dependency:
 (&client->buffer_lock){....}-{2:2} -> (&new->fa_lock){....}-{2:2}

but this new dependency connects a HARDIRQ-irq-safe lock:
 (&dev->event_lock#2){-...}-{2:2}

... which became HARDIRQ-irq-safe at:
  lock_acquire kernel/locking/lockdep.c:5754 [inline]
  lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
  __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
  _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162
  input_event drivers/input/input.c:434 [inline]
  input_event+0x70/0xa0 drivers/input/input.c:427
  input_report_key include/linux/input.h:425 [inline]
  psmouse_report_standard_buttons+0x30/0x80 drivers/input/mouse/psmouse-base.c:128
  psmouse_report_standard_packet drivers/input/mouse/psmouse-base.c:146 [inline]
  psmouse_process_byte+0x39c/0x8a0 drivers/input/mouse/psmouse-base.c:237
  psmouse_handle_byte+0x44/0x570 drivers/input/mouse/psmouse-base.c:279
  psmouse_receive_byte+0x243/0xe20 drivers/input/mouse/psmouse-base.c:426
  ps2_interrupt+0x20b/0x5b0 drivers/input/serio/libps2.c:613
  serio_interrupt+0x8f/0x150 drivers/input/serio/serio.c:998
  i8042_interrupt+0x3f5/0x8a0 drivers/input/serio/i8042.c:606
  __handle_irq_event_percpu+0x22a/0x750 kernel/irq/handle.c:158
  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
  handle_irq_event+0xab/0x1e0 kernel/irq/handle.c:210
  handle_edge_irq+0x263/0xd10 kernel/irq/chip.c:831
  generic_handle_irq_desc include/linux/irqdesc.h:161 [inline]
  handle_irq arch/x86/kernel/irq.c:238 [inline]
  __common_interrupt+0xde/0x250 arch/x86/kernel/irq.c:257
  common_interrupt+0xab/0xd0 arch/x86/kernel/irq.c:247
  asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:640
  __sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:527
  klist_next+0x2a8/0x520 lib/klist.c:405
  next_device drivers/base/bus.c:324 [inline]
  bus_for_each_dev+0xfb/0x1d0 drivers/base/bus.c:367
  bus_add_driver+0x2ed/0x640 drivers/base/bus.c:673
  driver_register+0x15c/0x4b0 drivers/base/driver.c:246
  usb_register_driver+0x21d/0x4d0 drivers/usb/core/driver.c:1068
  do_one_initcall+0x11c/0x670 init/main.c:1236
  do_initcall_level init/main.c:1298 [inline]
  do_initcalls init/main.c:1314 [inline]
  do_basic_setup init/main.c:1333 [inline]
  kernel_init_freeable+0x68d/0xc10 init/main.c:1551
  kernel_init+0x1c/0x2a0 init/main.c:1441
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:243

to a HARDIRQ-irq-unsafe lock:
 (tasklist_lock){.+.+}-{2:2}

... which became HARDIRQ-irq-unsafe at:
...
  lock_acquire kernel/locking/lockdep.c:5754 [inline]
  lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
  __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
  _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
  __do_wait+0x105/0x890 kernel/exit.c:1580
  do_wait+0x212/0x530 kernel/exit.c:1624
  kernel_wait+0xa0/0x160 kernel/exit.c:1800
  call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
  call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
  process_one_work+0x889/0x15e0 kernel/workqueue.c:2633
  process_scheduled_works kernel/workqueue.c:2706 [inline]
  worker_thread+0x8b9/0x12a0 kernel/workqueue.c:2787
  kthread+0x2c6/0x3b0 kernel/kthread.c:388
  ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
  ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:243

other info that might help us debug this:

Chain exists of:
  &dev->event_lock#2 --> &client->buffer_lock --> tasklist_lock

 Possible interrupt unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(tasklist_lock);
                               local_irq_disable();
                               lock(&dev->event_lock#2);
                               lock(&client->buffer_lock);
  <Interrupt>
    lock(&dev->event_lock#2);

 *** DEADLOCK ***

7 locks held by syz-executor326/5062:
 #0: ffff888024179110 (&evdev->mutex){+.+.}-{3:3}, at: evdev_write+0x201/0x760 drivers/input/evdev.c:513
 #1: ffff888018f5b230 (&dev->event_lock#2){-...}-{2:2}, at: input_inject_event+0xa4/0x370 drivers/input/input.c:460
 #2: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
 #2: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
 #2: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: input_inject_event+0xca/0x370 drivers/input/input.c:462
 #3: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
 #3: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
 #3: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: input_pass_values+0xb2/0x840 drivers/input/input.c:153
 #4: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
 #4: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
 #4: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: evdev_events+0x87/0x390 drivers/input/evdev.c:298
 #5: ffff88801aebc028 (&client->buffer_lock){....}-{2:2}, at: spin_lock include/linux/spinlock.h:351 [inline]
 #5: ffff88801aebc028 (&client->buffer_lock){....}-{2:2}, at: evdev_pass_values+0x10e/0x9b0 drivers/input/evdev.c:261
 #6: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:298 [inline]
 #6: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:750 [inline]
 #6: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: kill_fasync fs/fcntl.c:1018 [inline]
 #6: ffffffff8d7ad220 (rcu_read_lock){....}-{1:2}, at: kill_fasync+0x6d/0x4f0 fs/fcntl.c:1012

the dependencies between HARDIRQ-irq-safe lock and the holding lock:
 -> (&dev->event_lock#2){-...}-{2:2} {
    IN-HARDIRQ-W at:
                      lock_acquire kernel/locking/lockdep.c:5754 [inline]
                      lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
                      __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                      _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162
                      input_event drivers/input/input.c:434 [inline]
                      input_event+0x70/0xa0 drivers/input/input.c:427
                      input_report_key include/linux/input.h:425 [inline]
                      psmouse_report_standard_buttons+0x30/0x80 drivers/input/mouse/psmouse-base.c:128
                      psmouse_report_standard_packet drivers/input/mouse/psmouse-base.c:146 [inline]
                      psmouse_process_byte+0x39c/0x8a0 drivers/input/mouse/psmouse-base.c:237
                      psmouse_handle_byte+0x44/0x570 drivers/input/mouse/psmouse-base.c:279
                      psmouse_receive_byte+0x243/0xe20 drivers/input/mouse/psmouse-base.c:426
                      ps2_interrupt+0x20b/0x5b0 drivers/input/serio/libps2.c:613
                      serio_interrupt+0x8f/0x150 drivers/input/serio/serio.c:998
                      i8042_interrupt+0x3f5/0x8a0 drivers/input/serio/i8042.c:606
                      __handle_irq_event_percpu+0x22a/0x750 kernel/irq/handle.c:158
                      handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
                      handle_irq_event+0xab/0x1e0 kernel/irq/handle.c:210
                      handle_edge_irq+0x263/0xd10 kernel/irq/chip.c:831
                      generic_handle_irq_desc include/linux/irqdesc.h:161 [inline]
                      handle_irq arch/x86/kernel/irq.c:238 [inline]
                      __common_interrupt+0xde/0x250 arch/x86/kernel/irq.c:257
                      common_interrupt+0xab/0xd0 arch/x86/kernel/irq.c:247
                      asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:640
                      __sanitizer_cov_trace_pc+0x0/0x60 kernel/kcov.c:527
                      klist_next+0x2a8/0x520 lib/klist.c:405
                      next_device drivers/base/bus.c:324 [inline]
                      bus_for_each_dev+0xfb/0x1d0 drivers/base/bus.c:367
                      bus_add_driver+0x2ed/0x640 drivers/base/bus.c:673
                      driver_register+0x15c/0x4b0 drivers/base/driver.c:246
                      usb_register_driver+0x21d/0x4d0 drivers/usb/core/driver.c:1068
                      do_one_initcall+0x11c/0x670 init/main.c:1236
                      do_initcall_level init/main.c:1298 [inline]
                      do_initcalls init/main.c:1314 [inline]
                      do_basic_setup init/main.c:1333 [inline]
                      kernel_init_freeable+0x68d/0xc10 init/main.c:1551
                      kernel_init+0x1c/0x2a0 init/main.c:1441
                      ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                      ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:243
    INITIAL USE at:
                     lock_acquire kernel/locking/lockdep.c:5754 [inline]
                     lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
                     __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
                     _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162
                     input_inject_event+0xa4/0x370 drivers/input/input.c:460
                     __led_set_brightness drivers/leds/led-core.c:52 [inline]
                     led_set_brightness_nopm drivers/leds/led-core.c:316 [inline]
                     led_set_brightness_nosleep drivers/leds/led-core.c:347 [inline]
                     led_set_brightness+0x211/0x290 drivers/leds/led-core.c:309
                     led_trigger_event drivers/leds/led-triggers.c:378 [inline]
                     led_trigger_event+0xb2/0x240 drivers/leds/led-triggers.c:368
                     kbd_led_trigger_activate+0xc6/0x100 drivers/tty/vt/keyboard.c:1036
                     led_trigger_set+0x58c/0xc10 drivers/leds/led-triggers.c:198
                     led_trigger_set_default drivers/leds/led-triggers.c:263 [inline]
                     led_trigger_set_default+0x1d2/0x230 drivers/leds/led-triggers.c:250
                     led_classdev_register_ext+0x791/0xa10 drivers/leds/led-class.c:555
                     led_classdev_register include/linux/leds.h:279 [inline]
                     input_leds_connect+0x54a/0x8e0 drivers/input/input-leds.c:139
                     input_attach_handler.isra.0+0x181/0x260 drivers/input/input.c:1064
                     input_register_device+0xb22/0x1140 drivers/input/input.c:2396
                     atkbd_connect+0x5e2/0xa20 drivers/input/keyboard/atkbd.c:1342
                     serio_connect_driver drivers/input/serio/serio.c:44 [inline]
                     serio_driver_probe+0x74/0xa0 drivers/input/serio/serio.c:775
                     call_driver_probe drivers/base/dd.c:579 [inline]
                     really_probe+0x23a/0xcb0 drivers/base/dd.c:658
                     __driver_probe_device+0x1de/0x4b0 drivers/base/dd.c:800
                     driver_probe_device+0x4c/0x1b0 drivers/base/dd.c:830
                     __driver_attach+0x283/0x580 drivers/base/dd.c:1216
                     bus_for_each_dev+0x13c/0x1d0 drivers/base/bus.c:368
                     serio_attach_driver drivers/input/serio/serio.c:804 [inline]
                     serio_handle_event+0x2bb/0xa90 drivers/input/serio/serio.c:224
                     process_one_work+0x889/0x15e0 kernel/workqueue.c:2633
                     process_scheduled_works kernel/workqueue.c:2706 [inline]
                     worker_thread+0x8b9/0x12a0 kernel/workqueue.c:2787
                     kthread+0x2c6/0x3b0 kernel/kthread.c:388
                     ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                     ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:243
  }
  ... key      at: [<ffffffff94908c00>] __key.6+0x0/0x40
-> (&client->buffer_lock){....}-{2:2} {
   INITIAL USE at:
                   lock_acquire kernel/locking/lockdep.c:5754 [inline]
                   lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
                   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
                   _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
                   spin_lock include/linux/spinlock.h:351 [inline]
                   evdev_pass_values+0x10e/0x9b0 drivers/input/evdev.c:261
                   evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
                   input_to_handler+0x2a1/0x4d0 drivers/input/input.c:129
                   input_pass_values+0x5c9/0x840 drivers/input/input.c:161
                   input_event_dispose+0x37a/0x630 drivers/input/input.c:378
                   input_handle_event+0x11c/0xd80 drivers/input/input.c:406
                   input_inject_event+0x1bb/0x370 drivers/input/input.c:465
                   evdev_write+0x456/0x760 drivers/input/evdev.c:530
                   vfs_write+0x298/0x1110 fs/read_write.c:588
                   ksys_write+0x1f8/0x260 fs/read_write.c:643
                   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                   do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83
                   entry_SYSCALL_64_after_hwframe+0x6f/0x77
 }
 ... key      at: [<ffffffff94909080>] __key.3+0x0/0x40
 ... acquired at:
   __raw_spin_lock include/linux/spinlock_api_smp.h:133 [inline]
   _raw_spin_lock+0x2e/0x40 kernel/locking/spinlock.c:154
   spin_lock include/linux/spinlock.h:351 [inline]
   evdev_pass_values+0x10e/0x9b0 drivers/input/evdev.c:261
   evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
   input_to_handler+0x2a1/0x4d0 drivers/input/input.c:129
   input_pass_values+0x5c9/0x840 drivers/input/input.c:161
   input_event_dispose+0x37a/0x630 drivers/input/input.c:378
   input_handle_event+0x11c/0xd80 drivers/input/input.c:406
   input_inject_event+0x1bb/0x370 drivers/input/input.c:465
   evdev_write+0x456/0x760 drivers/input/evdev.c:530
   vfs_write+0x298/0x1110 fs/read_write.c:588
   ksys_write+0x1f8/0x260 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x6f/0x77


the dependencies between the lock to be acquired
 and HARDIRQ-irq-unsafe lock:
  -> (tasklist_lock){.+.+}-{2:2} {
     HARDIRQ-ON-R at:
                        lock_acquire kernel/locking/lockdep.c:5754 [inline]
                        lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
                        __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                        _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
                        __do_wait+0x105/0x890 kernel/exit.c:1580
                        do_wait+0x212/0x530 kernel/exit.c:1624
                        kernel_wait+0xa0/0x160 kernel/exit.c:1800
                        call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                        call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
                        process_one_work+0x889/0x15e0 kernel/workqueue.c:2633
                        process_scheduled_works kernel/workqueue.c:2706 [inline]
                        worker_thread+0x8b9/0x12a0 kernel/workqueue.c:2787
                        kthread+0x2c6/0x3b0 kernel/kthread.c:388
                        ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                        ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:243
     SOFTIRQ-ON-R at:
                        lock_acquire kernel/locking/lockdep.c:5754 [inline]
                        lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
                        __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                        _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
                        __do_wait+0x105/0x890 kernel/exit.c:1580
                        do_wait+0x212/0x530 kernel/exit.c:1624
                        kernel_wait+0xa0/0x160 kernel/exit.c:1800
                        call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                        call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
                        process_one_work+0x889/0x15e0 kernel/workqueue.c:2633
                        process_scheduled_works kernel/workqueue.c:2706 [inline]
                        worker_thread+0x8b9/0x12a0 kernel/workqueue.c:2787
                        kthread+0x2c6/0x3b0 kernel/kthread.c:388
                        ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                        ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:243
     INITIAL USE at:
                       lock_acquire kernel/locking/lockdep.c:5754 [inline]
                       lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
                       __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                       _raw_write_lock_irq+0x36/0x50 kernel/locking/spinlock.c:326
                       copy_process+0x6add/0x97b0 kernel/fork.c:2621
                       kernel_clone+0xfd/0x930 kernel/fork.c:2902
                       user_mode_thread+0xb4/0xf0 kernel/fork.c:2980
                       rest_init+0x27/0x2b0 init/main.c:695
                       arch_call_rest_init+0x13/0x40 init/main.c:827
                       start_kernel+0x39f/0x480 init/main.c:1072
                       x86_64_start_reservations+0x18/0x30 arch/x86/kernel/head64.c:555
                       x86_64_start_kernel+0xb2/0xc0 arch/x86/kernel/head64.c:536
                       secondary_startup_64_no_verify+0x170/0x17b
     INITIAL READ USE at:
                            lock_acquire kernel/locking/lockdep.c:5754 [inline]
                            lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
                            __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
                            _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
                            __do_wait+0x105/0x890 kernel/exit.c:1580
                            do_wait+0x212/0x530 kernel/exit.c:1624
                            kernel_wait+0xa0/0x160 kernel/exit.c:1800
                            call_usermodehelper_exec_sync kernel/umh.c:137 [inline]
                            call_usermodehelper_exec_work+0xf1/0x170 kernel/umh.c:164
                            process_one_work+0x889/0x15e0 kernel/workqueue.c:2633
                            process_scheduled_works kernel/workqueue.c:2706 [inline]
                            worker_thread+0x8b9/0x12a0 kernel/workqueue.c:2787
                            kthread+0x2c6/0x3b0 kernel/kthread.c:388
                            ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147
                            ret_from_fork_asm+0x1b/0x30 arch/x86/entry/entry_64.S:243
   }
   ... key      at: [<ffffffff8d40a098>] tasklist_lock+0x18/0x40
   ... acquired at:
   __raw_read_lock include/linux/rwlock_api_smp.h:150 [inline]
   _raw_read_lock+0x5f/0x70 kernel/locking/spinlock.c:228
   send_sigio+0xb4/0x3c0 fs/fcntl.c:794
   kill_fasync_rcu fs/fcntl.c:1005 [inline]
   kill_fasync fs/fcntl.c:1019 [inline]
   kill_fasync+0x1f6/0x4f0 fs/fcntl.c:1012
   lease_break_callback+0x23/0x30 fs/locks.c:521
   __break_lease+0x711/0x1810 fs/locks.c:1536
   break_lease include/linux/filelock.h:360 [inline]
   break_lease include/linux/filelock.h:350 [inline]
   do_dentry_open+0x675/0x18c0 fs/open.c:944
   do_open fs/namei.c:3645 [inline]
   path_openat+0x1e00/0x29a0 fs/namei.c:3802
   do_filp_open+0x1de/0x440 fs/namei.c:3829
   do_sys_openat2+0x17a/0x1e0 fs/open.c:1404
   do_sys_open fs/open.c:1419 [inline]
   __do_sys_open fs/open.c:1427 [inline]
   __se_sys_open fs/open.c:1423 [inline]
   __x64_sys_open+0x154/0x1e0 fs/open.c:1423
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x6f/0x77

 -> (&f->f_owner.lock){....}-{2:2} {
    INITIAL USE at:
                     lock_acquire kernel/locking/lockdep.c:5754 [inline]
                     lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
                     __raw_write_lock_irq include/linux/rwlock_api_smp.h:195 [inline]
                     _raw_write_lock_irq+0x36/0x50 kernel/locking/spinlock.c:326
                     f_modown+0x2a/0x380 fs/fcntl.c:92
                     __f_setown fs/fcntl.c:111 [inline]
                     f_setown_ex fs/fcntl.c:201 [inline]
                     do_fcntl+0xce2/0x1270 fs/fcntl.c:385
                     __do_sys_fcntl fs/fcntl.c:456 [inline]
                     __se_sys_fcntl fs/fcntl.c:441 [inline]
                     __x64_sys_fcntl+0x174/0x1f0 fs/fcntl.c:441
                     do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                     do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83
                     entry_SYSCALL_64_after_hwframe+0x6f/0x77
    INITIAL READ USE at:
                          lock_acquire kernel/locking/lockdep.c:5754 [inline]
                          lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
                          __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                          _raw_read_lock_irqsave+0x74/0x90 kernel/locking/spinlock.c:236
                          send_sigio+0x28/0x3c0 fs/fcntl.c:780
                          kill_fasync_rcu fs/fcntl.c:1005 [inline]
                          kill_fasync fs/fcntl.c:1019 [inline]
                          kill_fasync+0x1f6/0x4f0 fs/fcntl.c:1012
                          lease_break_callback+0x23/0x30 fs/locks.c:521
                          __break_lease+0x711/0x1810 fs/locks.c:1536
                          break_lease include/linux/filelock.h:360 [inline]
                          break_lease include/linux/filelock.h:350 [inline]
                          do_dentry_open+0x675/0x18c0 fs/open.c:944
                          do_open fs/namei.c:3645 [inline]
                          path_openat+0x1e00/0x29a0 fs/namei.c:3802
                          do_filp_open+0x1de/0x440 fs/namei.c:3829
                          do_sys_openat2+0x17a/0x1e0 fs/open.c:1404
                          do_sys_open fs/open.c:1419 [inline]
                          __do_sys_open fs/open.c:1427 [inline]
                          __se_sys_open fs/open.c:1423 [inline]
                          __x64_sys_open+0x154/0x1e0 fs/open.c:1423
                          do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                          do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83
                          entry_SYSCALL_64_after_hwframe+0x6f/0x77
  }
  ... key      at: [<ffffffff94654920>] __key.4+0x0/0x40
  ... acquired at:
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0x74/0x90 kernel/locking/spinlock.c:236
   send_sigio+0x28/0x3c0 fs/fcntl.c:780
   kill_fasync_rcu fs/fcntl.c:1005 [inline]
   kill_fasync fs/fcntl.c:1019 [inline]
   kill_fasync+0x1f6/0x4f0 fs/fcntl.c:1012
   lease_break_callback+0x23/0x30 fs/locks.c:521
   __break_lease+0x711/0x1810 fs/locks.c:1536
   break_lease include/linux/filelock.h:360 [inline]
   break_lease include/linux/filelock.h:350 [inline]
   do_dentry_open+0x675/0x18c0 fs/open.c:944
   do_open fs/namei.c:3645 [inline]
   path_openat+0x1e00/0x29a0 fs/namei.c:3802
   do_filp_open+0x1de/0x440 fs/namei.c:3829
   do_sys_openat2+0x17a/0x1e0 fs/open.c:1404
   do_sys_open fs/open.c:1419 [inline]
   __do_sys_open fs/open.c:1427 [inline]
   __se_sys_open fs/open.c:1423 [inline]
   __x64_sys_open+0x154/0x1e0 fs/open.c:1423
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x6f/0x77

-> (&new->fa_lock){....}-{2:2} {
   INITIAL READ USE at:
                        lock_acquire kernel/locking/lockdep.c:5754 [inline]
                        lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
                        __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
                        _raw_read_lock_irqsave+0x74/0x90 kernel/locking/spinlock.c:236
                        kill_fasync_rcu fs/fcntl.c:998 [inline]
                        kill_fasync fs/fcntl.c:1019 [inline]
                        kill_fasync+0x138/0x4f0 fs/fcntl.c:1012
                        lease_break_callback+0x23/0x30 fs/locks.c:521
                        __break_lease+0x711/0x1810 fs/locks.c:1536
                        break_lease include/linux/filelock.h:360 [inline]
                        break_lease include/linux/filelock.h:350 [inline]
                        do_dentry_open+0x675/0x18c0 fs/open.c:944
                        do_open fs/namei.c:3645 [inline]
                        path_openat+0x1e00/0x29a0 fs/namei.c:3802
                        do_filp_open+0x1de/0x440 fs/namei.c:3829
                        do_sys_openat2+0x17a/0x1e0 fs/open.c:1404
                        do_sys_open fs/open.c:1419 [inline]
                        __do_sys_open fs/open.c:1427 [inline]
                        __se_sys_open fs/open.c:1423 [inline]
                        __x64_sys_open+0x154/0x1e0 fs/open.c:1423
                        do_syscall_x64 arch/x86/entry/common.c:52 [inline]
                        do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83
                        entry_SYSCALL_64_after_hwframe+0x6f/0x77
 }
 ... key      at: [<ffffffff94655680>] __key.0+0x0/0x40
 ... acquired at:
   lock_acquire kernel/locking/lockdep.c:5754 [inline]
   lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
   __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
   _raw_read_lock_irqsave+0x74/0x90 kernel/locking/spinlock.c:236
   kill_fasync_rcu fs/fcntl.c:998 [inline]
   kill_fasync fs/fcntl.c:1019 [inline]
   kill_fasync+0x138/0x4f0 fs/fcntl.c:1012
   __pass_event drivers/input/evdev.c:240 [inline]
   evdev_pass_values+0x619/0x9b0 drivers/input/evdev.c:278
   evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
   input_to_handler+0x2a1/0x4d0 drivers/input/input.c:129
   input_pass_values+0x5c9/0x840 drivers/input/input.c:161
   input_event_dispose+0x37a/0x630 drivers/input/input.c:378
   input_handle_event+0x11c/0xd80 drivers/input/input.c:406
   input_inject_event+0x1bb/0x370 drivers/input/input.c:465
   evdev_write+0x456/0x760 drivers/input/evdev.c:530
   vfs_write+0x298/0x1110 fs/read_write.c:588
   ksys_write+0x1f8/0x260 fs/read_write.c:643
   do_syscall_x64 arch/x86/entry/common.c:52 [inline]
   do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83
   entry_SYSCALL_64_after_hwframe+0x6f/0x77


stack backtrace:
CPU: 0 PID: 5062 Comm: syz-executor326 Not tainted 6.8.0-rc7-syzkaller-00142-g3aaa8ce7a335 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/25/2024
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0xd9/0x1b0 lib/dump_stack.c:106
 print_bad_irq_dependency kernel/locking/lockdep.c:2626 [inline]
 check_irq_usage+0xe3c/0x1490 kernel/locking/lockdep.c:2865
 check_prev_add kernel/locking/lockdep.c:3138 [inline]
 check_prevs_add kernel/locking/lockdep.c:3253 [inline]
 validate_chain kernel/locking/lockdep.c:3869 [inline]
 __lock_acquire+0x2465/0x3b40 kernel/locking/lockdep.c:5137
 lock_acquire kernel/locking/lockdep.c:5754 [inline]
 lock_acquire+0x1ae/0x520 kernel/locking/lockdep.c:5719
 __raw_read_lock_irqsave include/linux/rwlock_api_smp.h:160 [inline]
 _raw_read_lock_irqsave+0x74/0x90 kernel/locking/spinlock.c:236
 kill_fasync_rcu fs/fcntl.c:998 [inline]
 kill_fasync fs/fcntl.c:1019 [inline]
 kill_fasync+0x138/0x4f0 fs/fcntl.c:1012
 __pass_event drivers/input/evdev.c:240 [inline]
 evdev_pass_values+0x619/0x9b0 drivers/input/evdev.c:278
 evdev_events+0x1b7/0x390 drivers/input/evdev.c:306
 input_to_handler+0x2a1/0x4d0 drivers/input/input.c:129
 input_pass_values+0x5c9/0x840 drivers/input/input.c:161
 input_event_dispose+0x37a/0x630 drivers/input/input.c:378
 input_handle_event+0x11c/0xd80 drivers/input/input.c:406
 input_inject_event+0x1bb/0x370 drivers/input/input.c:465
 evdev_write+0x456/0x760 drivers/input/evdev.c:530
 vfs_write+0x298/0x1110 fs/read_write.c:588
 ksys_write+0x1f8/0x260 fs/read_write.c:643
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd5/0x270 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x6f/0x77
RIP: 0033:0x7f4ec8a82f79
Code: 28 00 00 00 75 05 48 83 c4 28 c3 e8 c1 17 00 00 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b0 ff ff ff f7 d8 64 89 01 48
RSP: 002b:00007f4ec8a42228 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
RAX: ffffffffffffffda RBX: 00007f4ec8b0a408 RCX: 00007f4ec8a82f79
RDX: 0000000000002ad8 RSI: 0000000020000040 RDI: 0000000000000004
RBP: 00007f4ec8b0a400 R08: 00007f4ec8a426c0 R09: 00007f4ec8a426c0
R10: 00007f4ec8a426c0 R11: 0000000000000246 R12: 00007f4ec8b0a40c
R13: 00007f4ec8ad7018 R14: 0030656c69662f2e R15: 00007ffdeb484698

Crashes (1795):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/03/08 11:28 upstream 3aaa8ce7a335 cf82cde1 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2024/03/07 21:55 upstream 135288b73cef 2b789849 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2024/02/25 21:34 upstream ab0a97cffa0b 8d446f15 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/12/28 19:09 upstream f5837722ffec fb427a07 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/12/19 16:29 upstream 2cf4f94d8e86 3ad490ea .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/11/17 12:09 upstream 7475e51b8796 cb976f63 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2023/11/11 22:59 upstream 3ca112b71f35 6d6dbf8a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/11/11 00:27 upstream ac347a0655db 45e9b83e .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/11/07 14:42 upstream be3ca57cfb77 83211397 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/10/28 05:32 upstream 888cf78c29e2 3c418d72 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/09/22 21:45 upstream dc912ba91b7e 0b6a67ac .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/12/28 14:07 upstream f5837722ffec fb427a07 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/12/25 02:43 upstream 861deac3b092 fb427a07 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/12/11 12:26 upstream a39b6ac3781d 28b24332 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/10/15 01:47 upstream 727fb8376504 f757a323 .config console log report syz C [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2023/08/25 15:38 upstream 4f9e7fabf864 03d9c195 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/07/17 05:26 upstream 20edcec23f92 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2023/07/15 20:26 upstream b6e6cc1f78c7 35d9ecc5 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2023/02/03 02:22 upstream 9f266ccaa2f5 16d19e30 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root possible deadlock in input_event
2022/10/03 06:30 upstream a962b54e162c feb56351 .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/09/19 04:11 upstream 38eddeedbbea dd9a85ff .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/18 16:02 upstream 274a2eebf80c d58e263f .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/11 05:36 upstream 200e340f2196 a6201f11 .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/08/04 08:15 upstream 200e340f2196 1c9013ac .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/07/14 17:11 upstream 4a57a8400075 5d921b08 .config strace log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2022/07/14 06:21 upstream 4a57a8400075 5d921b08 .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2022/07/12 23:29 upstream 72a8e05d4f66 d91dd8ea .config strace log report syz C ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/07/01 20:53 upstream a175eca0f3d7 1434eec0 .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2022/06/15 11:43 upstream 018ab4fabddd 127d1faf .config strace log report syz C ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/04/27 07:23 upstream cf424ef014ac 1fa34c1b .config console log report syz C ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2021/12/13 02:41 upstream 90d9fbc16b69 49ca1f59 .config console log report syz C ci-upstream-kasan-gce-root possible deadlock in input_event
2023/10/26 17:48 linux-next 2ef7141596ee 23afc60f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/02/26 20:07 linux-next 8232539f864c ee50e71c .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2022/04/24 13:37 linux-next f1244c81da13 131df97d .config console log report syz C ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
2023/08/05 16:52 upstream 024ff300db33 4ffcc9ef .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2023/07/11 17:16 upstream 3f01e9fed845 2f19aa4f .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/06/15 18:24 upstream b6dad5178cea 757d26ed .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2023/06/15 04:44 upstream b6dad5178cea 76decb82 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2023/01/05 11:40 upstream 512dee0c00ad 1dac8c7a .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/12/23 04:32 upstream 8395ae05cb5a 9da18ae8 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2022/12/03 07:34 upstream a4412fdd49dc e080de16 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/11/29 18:56 upstream ca57f02295f1 05dc7993 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/11/22 11:50 upstream eb7081409f94 1c576c23 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/11/16 15:46 upstream 81e7cfa3a9eb 3a127a31 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root possible deadlock in input_event
2022/10/05 08:23 upstream a5088ee7251e eab8f949 .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/09/19 03:16 upstream 38eddeedbbea dd9a85ff .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce possible deadlock in input_event
2022/09/19 02:45 upstream 38eddeedbbea dd9a85ff .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/09/07 23:30 upstream 0066f1b0e275 c5b7bc57 .config strace log report syz C ci-upstream-kasan-gce-smack-root possible deadlock in input_event
2022/08/04 02:29 upstream 200e340f2196 1c9013ac .config strace log report syz C ci-upstream-kasan-gce possible deadlock in input_event
2024/03/17 22:31 upstream 480e035fc4c7 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/14 17:58 upstream 480e035fc4c7 d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/13 09:44 upstream 9187210eee7d db5b7ff0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/13 05:39 upstream 9187210eee7d db5b7ff0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/13 01:54 upstream 855684c7d938 c35c26ec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/12 19:33 upstream 855684c7d938 c35c26ec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/12 14:01 upstream 855684c7d938 c35c26ec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/12 12:48 upstream 855684c7d938 c35c26ec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/10 17:58 upstream 137e0ec05aeb 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/09 12:30 upstream 09e5c48fea17 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/03/08 07:20 upstream 3aaa8ce7a335 cf82cde1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/02/25 11:38 upstream ab0a97cffa0b 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/02/23 10:11 upstream 1c892cdd8fe0 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/02/22 21:59 upstream 1c892cdd8fe0 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/02/21 19:14 upstream 9fc1ccccfd8d 345111b5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/02/21 13:37 upstream 9fc1ccccfd8d 3af7dd65 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce possible deadlock in input_event
2024/02/09 11:47 upstream 1f719a2f3fa6 7f07e9b0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root possible deadlock in input_event
2024/03/15 21:09 upstream fe46a7dd189e d615901c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/14 11:49 upstream 480e035fc4c7 f919f202 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/13 22:08 upstream 61387b8dcf1d f919f202 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/13 04:12 upstream 9187210eee7d c35c26ec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/11 10:39 upstream e8f897f4afef 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/10 02:28 upstream 005f6f34bd47 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/10 01:19 upstream 005f6f34bd47 6ee49f2e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/08 23:57 upstream 10d48d70e82d 96d142e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/08 06:16 upstream 3aaa8ce7a335 cf82cde1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/07 23:26 upstream 135288b73cef 2b789849 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/07 19:36 upstream 135288b73cef 2b789849 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/07 02:48 upstream 67be068d31d4 f39a7eed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/06 13:47 upstream 5847c9777c30 f39a7eed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/05 14:53 upstream 90d35da658da f39a7eed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/04 14:12 upstream 90d35da658da 3717835d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/03 03:04 upstream 04b8076df253 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/01 06:53 upstream 87adedeba51a 352ab904 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/03/01 04:58 upstream 87adedeba51a 352ab904 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/28 20:22 upstream e326df53af00 d367cbe5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/28 05:43 upstream cf1182944c7c d367cbe5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/27 09:25 upstream 45ec2f5f6ed3 05e69c83 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/27 07:20 upstream 45ec2f5f6ed3 05e69c83 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/26 14:30 upstream d206a76d7d27 edd6a5e9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/26 12:06 upstream d206a76d7d27 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/24 20:12 upstream f2e367d6ad3b 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/24 02:52 upstream 603c04e27c3e 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/22 23:22 upstream 1c892cdd8fe0 8d446f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/21 15:07 upstream 9fc1ccccfd8d 3af7dd65 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/21 01:15 upstream fca7526b7d89 3af7dd65 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/02/19 00:22 upstream b401b621758e 578f7538 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 possible deadlock in input_event
2024/01/08 02:48 upstream 0dd3ee311255 d0304e9c .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream possible deadlock in input_event
2024/03/08 01:07 upstream 135288b73cef cf82cde1 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 possible deadlock in input_event
2021/11/10 12:51 upstream cb690f5238d7 75b04091 .config console log report info ci-upstream-kasan-gce-386 possible deadlock in input_event
2021/11/10 04:33 upstream cb690f5238d7 55fa030c .config console log report info ci-upstream-kasan-gce-386 possible deadlock in input_event
2023/11/22 08:08 linux-next 288736c822de cb976f63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in input_event
* Struck through repros no longer work on HEAD.