Title | Replies (including bot) | Last reply |
---|---|---|
WARNING: suspicious RCU usage in corrupted | 1 (2) | 2019/04/08 15:02 |
syzbot |
sign-in | mailing list | source | docs |
Title | Replies (including bot) | Last reply |
---|---|---|
WARNING: suspicious RCU usage in corrupted | 1 (2) | 2019/04/08 15:02 |
Kernel | Title | Repro | Cause bisect | Fix bisect | Count | Last | Reported | Patched | Status |
---|---|---|---|---|---|---|---|---|---|
upstream | WARNING: suspicious RCU usage in corrupted (2) net | C | unreliable | 7 | 1060d | 1071d | 22/28 | fixed on 2023/02/24 13:50 |
random: sshd: uninitialized urandom read (32 bytes read) random: sshd: uninitialized urandom read (32 bytes read) IPVS: ftp: loaded support on port[0] = 21 ============================= WARNING: suspicious RCU usage 4.17.0-rc4+ #64 Not tainted ----------------------------- arch/x86/kernel/traps.c:537 entry code didn't wake RCU! other info that might help us debug this: RCU used illegally from idle CPU! rcu_scheduler_active = 2, debug_locks = 1 RCU used illegally from extended quiescent state! no locks held by swapper/0/0. stack backtrace:
Time | Kernel | Commit | Syzkaller | Config | Log | Report | Syz repro | C repro | VM info | Assets (help?) | Manager | Title |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2018/05/09 14:17 | upstream | 036db8bd9637 | 12c7428a | .config | console log | report | syz | ci-upstream-kasan-gce-386 |