syzbot


WARNING: suspicious RCU usage in dev_activate

Status: auto-obsoleted due to no activity on 2025/12/05 01:11
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+2120b9a8f96b3fa90bad@syzkaller.appspotmail.com
First crash: 563d, last: 147d
Cause bisection: failed (error log, bisect log)
  
Fix bisection: failed (error log, bisect log)
  
Discussions (2)
Title Replies (including bot) Last reply
[syzbot] [net?] WARNING: suspicious RCU usage in dev_activate 2 (5) 2024/09/16 03:23
[RFC PATCH 2/2] net: bonding: don't call ethtool methods under RCU 5 (5) 2024/07/19 16:37
Last patch testing requests (10)
Created Duration User Patch Repo Result
2025/12/05 00:27 42m retest repro upstream OK log
2025/12/03 04:56 23m retest repro upstream OK log
2025/12/02 23:14 32m retest repro upstream OK log
2025/11/01 10:38 29m retest repro upstream OK log
2025/10/16 20:08 1h14m retest repro upstream OK log
2025/09/25 22:42 1h06m retest repro upstream report log
2025/09/23 22:48 19m retest repro upstream report log
2025/09/23 22:48 16m retest repro upstream report log
2025/08/23 03:19 50m retest repro upstream report log
2025/08/07 18:16 38m retest repro upstream report log
Fix bisection attempts (2)
Created Duration User Patch Repo Result
2025/07/17 18:15 28m bisect fix upstream error job log
2025/06/13 21:36 4h13m bisect fix upstream OK (0) job log log

Sample crash report:
=============================
WARNING: suspicious RCU usage
6.15.0-rc6-syzkaller-00052-g9f35e33144ae #0 Not tainted
-----------------------------
net/sched/sch_generic.c:1251 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
3 locks held by kworker/u8:7/5026:
 #0: ffff888033bd2948 ((wq_completion)bond0#4){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3213 [inline]
 #0: ffff888033bd2948 ((wq_completion)bond0#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b1/0x17a0 kernel/workqueue.c:3319
 #1: ffffc9000de07c60 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3214 [inline]
 #1: ffffc9000de07c60 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ec/0x17a0 kernel/workqueue.c:3319
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x153/0x2e00 drivers/net/bonding/bond_main.c:2959

stack backtrace:
CPU: 1 UID: 0 PID: 5026 Comm: kworker/u8:7 Not tainted 6.15.0-rc6-syzkaller-00052-g9f35e33144ae #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: bond0 bond_mii_monitor
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 lockdep_rcu_suspicious+0x140/0x1d0 kernel/locking/lockdep.c:6865
 dev_activate+0xa1/0x1150 net/sched/sch_generic.c:1251
 linkwatch_do_dev+0x100/0x170 net/core/link_watch.c:182
 ethtool_op_get_link+0x15/0x70 net/ethtool/ioctl.c:63
 bond_check_dev_link+0x447/0x6c0 drivers/net/bonding/bond_main.c:866
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2739 [inline]
 bond_mii_monitor+0x428/0x2e00 drivers/net/bonding/bond_main.c:2961
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17a0 kernel/workqueue.c:3319
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x4e/0x80 arch/x86/kernel/process.c:153
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>

=============================
WARNING: suspicious RCU usage
6.15.0-rc6-syzkaller-00052-g9f35e33144ae #0 Not tainted
-----------------------------
net/sched/sch_generic.c:1229 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
3 locks held by kworker/u8:7/5026:
 #0: ffff888033bd2948 ((wq_completion)bond0#4){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3213 [inline]
 #0: ffff888033bd2948 ((wq_completion)bond0#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b1/0x17a0 kernel/workqueue.c:3319
 #1: ffffc9000de07c60 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3214 [inline]
 #1: ffffc9000de07c60 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ec/0x17a0 kernel/workqueue.c:3319
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x153/0x2e00 drivers/net/bonding/bond_main.c:2959

stack backtrace:
CPU: 1 UID: 0 PID: 5026 Comm: kworker/u8:7 Not tainted 6.15.0-rc6-syzkaller-00052-g9f35e33144ae #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: bond0 bond_mii_monitor
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 lockdep_rcu_suspicious+0x140/0x1d0 kernel/locking/lockdep.c:6865
 transition_one_qdisc+0x8f/0x1c0 net/sched/sch_generic.c:1229
 netdev_for_each_tx_queue include/linux/netdevice.h:2650 [inline]
 dev_activate+0x7cd/0x1150 net/sched/sch_generic.c:1259
 linkwatch_do_dev+0x100/0x170 net/core/link_watch.c:182
 ethtool_op_get_link+0x15/0x70 net/ethtool/ioctl.c:63
 bond_check_dev_link+0x447/0x6c0 drivers/net/bonding/bond_main.c:866
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2739 [inline]
 bond_mii_monitor+0x428/0x2e00 drivers/net/bonding/bond_main.c:2961
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17a0 kernel/workqueue.c:3319
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x4e/0x80 arch/x86/kernel/process.c:153
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>

=============================
WARNING: suspicious RCU usage
6.15.0-rc6-syzkaller-00052-g9f35e33144ae #0 Not tainted
-----------------------------
./include/linux/rtnetlink.h:163 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
3 locks held by kworker/u8:7/5026:
 #0: ffff888033bd2948 ((wq_completion)bond0#4){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3213 [inline]
 #0: ffff888033bd2948 ((wq_completion)bond0#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b1/0x17a0 kernel/workqueue.c:3319
 #1: ffffc9000de07c60 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3214 [inline]
 #1: ffffc9000de07c60 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ec/0x17a0 kernel/workqueue.c:3319
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x153/0x2e00 drivers/net/bonding/bond_main.c:2959

stack backtrace:
CPU: 0 UID: 0 PID: 5026 Comm: kworker/u8:7 Not tainted 6.15.0-rc6-syzkaller-00052-g9f35e33144ae #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: bond0 bond_mii_monitor
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 lockdep_rcu_suspicious+0x140/0x1d0 kernel/locking/lockdep.c:6865
 dev_ingress_queue include/linux/rtnetlink.h:163 [inline]
 dev_activate+0x8a8/0x1150 net/sched/sch_generic.c:1260
 linkwatch_do_dev+0x100/0x170 net/core/link_watch.c:182
 ethtool_op_get_link+0x15/0x70 net/ethtool/ioctl.c:63
 bond_check_dev_link+0x447/0x6c0 drivers/net/bonding/bond_main.c:866
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2739 [inline]
 bond_mii_monitor+0x428/0x2e00 drivers/net/bonding/bond_main.c:2961
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17a0 kernel/workqueue.c:3319
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x4e/0x80 arch/x86/kernel/process.c:153
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
BUG: sleeping function called from invalid context at kernel/locking/rwsem.c:1523
in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 5026, name: kworker/u8:7
preempt_count: 0, expected: 0
RCU nest depth: 1, expected: 0
3 locks held by kworker/u8:7/5026:
 #0: ffff888033bd2948 ((wq_completion)bond0#4){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3213 [inline]
 #0: ffff888033bd2948 ((wq_completion)bond0#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b1/0x17a0 kernel/workqueue.c:3319
 #1: ffffc9000de07c60 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3214 [inline]
 #1: ffffc9000de07c60 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ec/0x17a0 kernel/workqueue.c:3319
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x153/0x2e00 drivers/net/bonding/bond_main.c:2959
CPU: 1 UID: 0 PID: 5026 Comm: kworker/u8:7 Not tainted 6.15.0-rc6-syzkaller-00052-g9f35e33144ae #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: bond0 bond_mii_monitor
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 __might_resched+0x495/0x610 kernel/sched/core.c:8818
 down_read+0x22/0x2e0 kernel/locking/rwsem.c:1523
 wireless_nlevent_flush net/wireless/wext-core.c:351 [inline]
 wext_netdev_notifier_call+0x28/0x110 net/wireless/wext-core.c:371
 notifier_call_chain+0x1b6/0x3e0 kernel/notifier.c:85
 netif_state_change+0x284/0x3a0 net/core/dev.c:1530
 linkwatch_do_dev+0x117/0x170 net/core/link_watch.c:186
 ethtool_op_get_link+0x15/0x70 net/ethtool/ioctl.c:63
 bond_check_dev_link+0x447/0x6c0 drivers/net/bonding/bond_main.c:866
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2739 [inline]
 bond_mii_monitor+0x428/0x2e00 drivers/net/bonding/bond_main.c:2961
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17a0 kernel/workqueue.c:3319
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x4e/0x80 arch/x86/kernel/process.c:153
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>

=============================
[ BUG: Invalid wait context ]
6.15.0-rc6-syzkaller-00052-g9f35e33144ae #0 Tainted: G        W          
-----------------------------
kworker/u8:7/5026 is trying to lock:
ffffffff8f2ea6d0 (net_rwsem){++++}-{4:4}, at: wireless_nlevent_flush net/wireless/wext-core.c:351 [inline]
ffffffff8f2ea6d0 (net_rwsem){++++}-{4:4}, at: wext_netdev_notifier_call+0x28/0x110 net/wireless/wext-core.c:371
other info that might help us debug this:
context-{5:5}
3 locks held by kworker/u8:7/5026:
 #0: ffff888033bd2948 ((wq_completion)bond0#4){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3213 [inline]
 #0: ffff888033bd2948 ((wq_completion)bond0#4){+.+.}-{0:0}, at: process_scheduled_works+0x9b1/0x17a0 kernel/workqueue.c:3319
 #1: ffffc9000de07c60 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3214 [inline]
 #1: ffffc9000de07c60 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x9ec/0x17a0 kernel/workqueue.c:3319
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:331 [inline]
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #2: ffffffff8df3dce0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x153/0x2e00 drivers/net/bonding/bond_main.c:2959
stack backtrace:
CPU: 1 UID: 0 PID: 5026 Comm: kworker/u8:7 Tainted: G        W           6.15.0-rc6-syzkaller-00052-g9f35e33144ae #0 PREEMPT(full) 
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: bond0 bond_mii_monitor
Call Trace:
 <TASK>
 dump_stack_lvl+0x189/0x250 lib/dump_stack.c:120
 print_lock_invalid_wait_context kernel/locking/lockdep.c:4831 [inline]
 check_wait_context kernel/locking/lockdep.c:4903 [inline]
 __lock_acquire+0xbcf/0xd20 kernel/locking/lockdep.c:5185
 lock_acquire+0x120/0x360 kernel/locking/lockdep.c:5866
 down_read+0x46/0x2e0 kernel/locking/rwsem.c:1524
 wireless_nlevent_flush net/wireless/wext-core.c:351 [inline]
 wext_netdev_notifier_call+0x28/0x110 net/wireless/wext-core.c:371
 notifier_call_chain+0x1b6/0x3e0 kernel/notifier.c:85
 netif_state_change+0x284/0x3a0 net/core/dev.c:1530
 linkwatch_do_dev+0x117/0x170 net/core/link_watch.c:186
 ethtool_op_get_link+0x15/0x70 net/ethtool/ioctl.c:63
 bond_check_dev_link+0x447/0x6c0 drivers/net/bonding/bond_main.c:866
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2739 [inline]
 bond_mii_monitor+0x428/0x2e00 drivers/net/bonding/bond_main.c:2961
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xade/0x17a0 kernel/workqueue.c:3319
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3400
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x4e/0x80 arch/x86/kernel/process.c:153
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>

Crashes (789):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/05/14 18:17 upstream 9f35e33144ae a4fa04ef .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root WARNING: suspicious RCU usage in dev_activate
2025/05/12 15:58 upstream 82f2b0b97b36 77908e5f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root WARNING: suspicious RCU usage in dev_activate
2025/04/17 08:40 upstream cfb2e2c57aef 23b969b7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_activate
2025/04/10 05:37 upstream 3b07108ada81 988b336c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root WARNING: suspicious RCU usage in dev_activate
2025/04/03 07:33 upstream 92b71befc349 996a9618 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root WARNING: suspicious RCU usage in dev_activate
2025/04/02 15:34 upstream acc4d5ff0b61 c799dfdd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/29 07:15 upstream eff5f16bfd87 cf25e2c2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_activate
2025/03/28 17:32 upstream acb4f33713b9 49900278 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root WARNING: suspicious RCU usage in dev_activate
2025/03/24 15:40 upstream 586de92313fc 875573af .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root WARNING: suspicious RCU usage in dev_activate
2025/03/22 19:44 upstream 88d324e69ea9 c6512ef7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root WARNING: suspicious RCU usage in dev_activate
2025/03/22 07:21 upstream 88d324e69ea9 c6512ef7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_activate
2025/03/21 05:36 upstream 5fc319360819 62330552 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_activate
2025/03/20 16:30 upstream a7f2e10ecd8f 62330552 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root WARNING: suspicious RCU usage in dev_activate
2025/03/17 02:29 upstream cb82ca153949 e2826670 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root WARNING: suspicious RCU usage in dev_activate
2025/03/14 11:29 upstream 4003c9e78778 e2826670 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_activate
2025/03/13 03:05 upstream 0fed89a961ea 1a5d9317 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root WARNING: suspicious RCU usage in dev_activate
2025/03/12 23:06 upstream 0fed89a961ea 1a5d9317 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/11 17:50 upstream 4d872d51bc9d f2eee6b3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/08 17:15 upstream 2a520073e74f 7e3bd60d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/08 07:13 upstream 21e4543a2e2f 7e3bd60d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/06 18:41 upstream 848e07631744 831e3629 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/06 06:07 upstream bb2281fb05e5 034534df .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/05 05:03 upstream 48a5eed9ad58 c3901742 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/05 02:47 upstream 48a5eed9ad58 c3901742 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/02/17 02:00 upstream ad1b832bf1cf 40a34ec9 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_activate
2025/02/16 23:16 upstream ad1b832bf1cf 40a34ec9 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_activate
2024/11/10 11:35 upstream de2f378f2b77 6b856513 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2024/09/16 03:22 upstream d42f7708e27c 08d8a733 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2024/09/12 19:12 upstream 77f587896757 60e1a995 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_activate
2024/07/02 19:49 upstream 1dfe225e9af5 8373af66 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_activate
2025/04/06 11:02 upstream f4d2ef48250a 1c65791e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 WARNING: suspicious RCU usage in dev_activate
2025/04/02 07:47 upstream acc4d5ff0b61 c799dfdd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 WARNING: suspicious RCU usage in dev_activate
2025/03/30 08:28 upstream 7f2ff7b62617 d3999433 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 WARNING: suspicious RCU usage in dev_activate
2025/03/29 18:37 upstream 7d06015d936c d3999433 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 WARNING: suspicious RCU usage in dev_activate
2025/04/10 20:03 upstream 2eb959eeecc6 1ef3ab4d .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_activate
2025/04/02 16:38 upstream acc4d5ff0b61 684b5338 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_activate
2025/03/31 08:00 upstream 4e82c87058f4 d3999433 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_activate
2025/03/30 03:24 upstream 93d52288679e d3999433 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_activate
2025/03/29 22:52 upstream 7d06015d936c d3999433 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_activate
2025/03/29 04:03 upstream eff5f16bfd87 cf25e2c2 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_activate
2025/03/27 23:29 upstream 1a9239bb4253 928390c4 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_activate
2025/03/26 09:36 upstream 2df0c02dab82 89d30d73 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_activate
2025/03/24 21:07 upstream 38fec10eb60d 875573af .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_activate
2025/03/24 18:28 upstream 38fec10eb60d 875573af .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root WARNING: suspicious RCU usage in dev_activate
2025/03/15 21:43 upstream 3571e8b091f4 e2826670 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_activate
2025/03/13 22:11 upstream 4003c9e78778 e2826670 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_activate
2025/05/11 17:50 upstream 3ce9925823c7 77908e5f .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm64 WARNING: suspicious RCU usage in dev_activate
2025/04/22 10:01 upstream a33b5a08cbbd 2a20f901 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 WARNING: suspicious RCU usage in dev_activate
2025/03/11 05:24 upstream 4d872d51bc9d 16256247 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 WARNING: suspicious RCU usage in dev_activate
2025/03/04 02:13 upstream 99fa936e8e4f c3901742 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 WARNING: suspicious RCU usage in dev_activate
2024/10/23 20:19 upstream c2ee9f594da8 15fa2979 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm64 WARNING: suspicious RCU usage in dev_activate
2025/02/03 14:54 net 235174b2bed8 a21a8419 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/04/10 15:32 net-next 311920774c40 988b336c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/13 19:52 net-next 0ea09cbf8350 44be8b44 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/13 16:42 net-next 0ea09cbf8350 44be8b44 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/13 10:05 net-next 0ea09cbf8350 44be8b44 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/13 07:22 net-next 0ea09cbf8350 1a5d9317 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/13 05:48 net-next 0ea09cbf8350 1a5d9317 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/13 01:21 net-next 0ea09cbf8350 1a5d9317 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/03/12 15:03 net-next 0ea09cbf8350 ee70e6db .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_activate
2024/07/02 19:42 net-next 19e6ad2c7578 8373af66 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_activate
2025/04/08 07:32 linux-next 7702d0130dc0 a2ada0e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING: suspicious RCU usage in dev_activate
2025/04/03 22:05 linux-next fefb886b1344 d7ae3a11 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING: suspicious RCU usage in dev_activate
2025/03/28 19:04 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a2392f333575 49900278 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_activate
2025/03/27 01:30 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a2392f333575 89d30d73 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_activate
2025/03/23 23:56 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a2392f333575 4e8d3850 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_activate
2025/03/23 16:08 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a2392f333575 4e8d3850 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_activate
2025/03/15 12:30 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5618886fdab e2826670 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_activate
2025/03/03 20:21 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e056da87c780 c3901742 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_activate
* Struck through repros no longer work on HEAD.