syzbot


possible deadlock in sched_tick

Status: closed as dup on 2024/04/02 09:01
Subsystems: bpf net
[Documentation on labels]
Reported-by: syzbot+a1d7495c905fa16bea17@syzkaller.appspotmail.com
First crash: 272d, last: 267d
Duplicate of
Title Repro Cause bisect Fix bisect Count Last Reported
possible deadlock in ahci_single_level_irq_intr bpf net C 10 266d 274d
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [bpf?] [net?] possible deadlock in sched_tick 1 (2) 2024/04/02 09:01

Sample crash report:
=====================================================
WARNING: HARDIRQ-safe -> HARDIRQ-unsafe lock order detected
6.9.0-rc2-next-20240402-syzkaller #0 Not tainted
-----------------------------------------------------
kworker/u8:4/66 [HC0[0]:SC0[2]:HE0:SE0] is trying to acquire:
ffff8880623718f8 (&htab->buckets[i].lock){+...}-{2:2}, at: spin_lock_bh include/linux/spinlock.h:356 [inline]
ffff8880623718f8 (&htab->buckets[i].lock){+...}-{2:2}, at: sock_hash_delete_elem+0xb0/0x300 net/core/sock_map.c:939

and this task is already holding:
ffff8880b953e698 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:559
which would create a new lock dependency:
 (&rq->__lock){-.-.}-{2:2} -> (&htab->buckets[i].lock){+...}-{2:2}

but this new dependency connects a HARDIRQ-irq-safe lock:
 (&rq->__lock){-.-.}-{2:2}

... which became HARDIRQ-irq-safe at:
  lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
  _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378
  raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:559
  raw_spin_rq_lock kernel/sched/sched.h:1404 [inline]
  rq_lock kernel/sched/sched.h:1718 [inline]
  sched_tick+0xa1/0x6e0 kernel/sched/core.c:5679
  update_process_times+0x202/0x230 kernel/time/timer.c:2491
  tick_periodic+0x190/0x220 kernel/time/tick-common.c:100
  tick_handle_periodic+0x4a/0x160 kernel/time/tick-common.c:112
  timer_interrupt+0x5c/0x70 arch/x86/kernel/time.c:57
  __handle_irq_event_percpu+0x29c/0xa80 kernel/irq/handle.c:158
  handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
  handle_irq_event+0x89/0x1f0 kernel/irq/handle.c:210
  handle_edge_irq+0x25f/0xc20 kernel/irq/chip.c:831
  generic_handle_irq_desc include/linux/irqdesc.h:161 [inline]
  handle_irq arch/x86/kernel/irq.c:238 [inline]
  __common_interrupt+0x13a/0x230 arch/x86/kernel/irq.c:257
  common_interrupt+0xa5/0xd0 arch/x86/kernel/irq.c:247
  asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693
  console_flush_all+0xaad/0xfd0
  console_unlock+0x13b/0x4d0 kernel/printk/printk.c:3048
  vprintk_emit+0x5a6/0x770 kernel/printk/printk.c:2348
  _printk+0xd5/0x120 kernel/printk/printk.c:2373
  cpu_detect_tlb arch/x86/kernel/cpu/common.c:864 [inline]
  identify_boot_cpu+0xae/0xe0 arch/x86/kernel/cpu/common.c:1931
  arch_cpu_finalize_init+0x50/0x140 arch/x86/kernel/cpu/common.c:2309
  start_kernel+0x402/0x500 init/main.c:1060
  x86_64_start_reservations+0x2a/0x30 arch/x86/kernel/head64.c:507
  x86_64_start_kernel+0x99/0xa0 arch/x86/kernel/head64.c:488
  common_startup_64+0x13e/0x147

to a HARDIRQ-irq-unsafe lock:
 (&htab->buckets[i].lock){+...}-{2:2}

... which became HARDIRQ-irq-unsafe at:
...
  lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
  __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
  _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
  spin_lock_bh include/linux/spinlock.h:356 [inline]
  sock_hash_delete_elem+0xb0/0x300 net/core/sock_map.c:939
  0xffffffffa0001b4a
  bpf_dispatcher_nop_func include/linux/bpf.h:1233 [inline]
  __bpf_prog_run include/linux/filter.h:667 [inline]
  bpf_prog_run include/linux/filter.h:674 [inline]
  __bpf_trace_run kernel/trace/bpf_trace.c:2396 [inline]
  bpf_trace_run2+0x2ec/0x530 kernel/trace/bpf_trace.c:2437
  trace_sys_enter+0x93/0xd0 include/trace/events/syscalls.h:18
  syscall_trace_enter+0xf8/0x150 kernel/entry/common.c:61
  syscall_enter_from_user_mode_work include/linux/entry-common.h:168 [inline]
  syscall_enter_from_user_mode include/linux/entry-common.h:198 [inline]
  do_syscall_64+0xcc/0x240 arch/x86/entry/common.c:79
  entry_SYSCALL_64_after_hwframe+0x72/0x7a

other info that might help us debug this:

 Possible interrupt unsafe locking scenario:

       CPU0                    CPU1
       ----                    ----
  lock(&htab->buckets[i].lock);
                               local_irq_disable();
                               lock(&rq->__lock);
                               lock(&htab->buckets[i].lock);
  <Interrupt>
    lock(&rq->__lock);

 *** DEADLOCK ***

4 locks held by kworker/u8:4/66:
 #0: ffff88802b0e9148 ((wq_completion)bat_events){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3193 [inline]
 #0: ffff88802b0e9148 ((wq_completion)bat_events){+.+.}-{0:0}, at: process_scheduled_works+0x90a/0x1830 kernel/workqueue.c:3299
 #1: ffffc900020afd00 ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3194 [inline]
 #1: ffffc900020afd00 ((work_completion)(&(&bat_priv->nc.work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x945/0x1830 kernel/workqueue.c:3299
 #2: ffff8880b953e698 (&rq->__lock){-.-.}-{2:2}, at: raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:559
 #3: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_lock_acquire include/linux/rcupdate.h:329 [inline]
 #3: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: rcu_read_lock include/linux/rcupdate.h:841 [inline]
 #3: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: __bpf_trace_run kernel/trace/bpf_trace.c:2395 [inline]
 #3: ffffffff8e334da0 (rcu_read_lock){....}-{1:2}, at: bpf_trace_run4+0x244/0x580 kernel/trace/bpf_trace.c:2439

the dependencies between HARDIRQ-irq-safe lock and the holding lock:
-> (&rq->__lock){-.-.}-{2:2} {
   IN-HARDIRQ-W at:
                    lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                    _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378
                    raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:559
                    raw_spin_rq_lock kernel/sched/sched.h:1404 [inline]
                    rq_lock kernel/sched/sched.h:1718 [inline]
                    sched_tick+0xa1/0x6e0 kernel/sched/core.c:5679
                    update_process_times+0x202/0x230 kernel/time/timer.c:2491
                    tick_periodic+0x190/0x220 kernel/time/tick-common.c:100
                    tick_handle_periodic+0x4a/0x160 kernel/time/tick-common.c:112
                    timer_interrupt+0x5c/0x70 arch/x86/kernel/time.c:57
                    __handle_irq_event_percpu+0x29c/0xa80 kernel/irq/handle.c:158
                    handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
                    handle_irq_event+0x89/0x1f0 kernel/irq/handle.c:210
                    handle_edge_irq+0x25f/0xc20 kernel/irq/chip.c:831
                    generic_handle_irq_desc include/linux/irqdesc.h:161 [inline]
                    handle_irq arch/x86/kernel/irq.c:238 [inline]
                    __common_interrupt+0x13a/0x230 arch/x86/kernel/irq.c:257
                    common_interrupt+0xa5/0xd0 arch/x86/kernel/irq.c:247
                    asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693
                    console_flush_all+0xaad/0xfd0
                    console_unlock+0x13b/0x4d0 kernel/printk/printk.c:3048
                    vprintk_emit+0x5a6/0x770 kernel/printk/printk.c:2348
                    _printk+0xd5/0x120 kernel/printk/printk.c:2373
                    cpu_detect_tlb arch/x86/kernel/cpu/common.c:864 [inline]
                    identify_boot_cpu+0xae/0xe0 arch/x86/kernel/cpu/common.c:1931
                    arch_cpu_finalize_init+0x50/0x140 arch/x86/kernel/cpu/common.c:2309
                    start_kernel+0x402/0x500 init/main.c:1060
                    x86_64_start_reservations+0x2a/0x30 arch/x86/kernel/head64.c:507
                    x86_64_start_kernel+0x99/0xa0 arch/x86/kernel/head64.c:488
                    common_startup_64+0x13e/0x147
   IN-SOFTIRQ-W at:
                    lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                    _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378
                    raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:559
                    raw_spin_rq_lock kernel/sched/sched.h:1404 [inline]
                    rq_lock kernel/sched/sched.h:1718 [inline]
                    ttwu_queue kernel/sched/core.c:4055 [inline]
                    try_to_wake_up+0x7d3/0x1470 kernel/sched/core.c:4378
                    call_timer_fn+0x18e/0x650 kernel/time/timer.c:1793
                    expire_timers kernel/time/timer.c:1844 [inline]
                    __run_timers kernel/time/timer.c:2418 [inline]
                    __run_timer_base+0x66a/0x8e0 kernel/time/timer.c:2429
                    run_timer_base kernel/time/timer.c:2438 [inline]
                    run_timer_softirq+0xb7/0x170 kernel/time/timer.c:2448
                    __do_softirq+0x2c6/0x980 kernel/softirq.c:554
                    invoke_softirq kernel/softirq.c:428 [inline]
                    __irq_exit_rcu+0xf2/0x1c0 kernel/softirq.c:633
                    irq_exit_rcu+0x9/0x30 kernel/softirq.c:645
                    instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]
                    sysvec_apic_timer_interrupt+0xa6/0xc0 arch/x86/kernel/apic/apic.c:1043
                    asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
                    native_safe_halt arch/x86/include/asm/irqflags.h:48 [inline]
                    arch_safe_halt arch/x86/include/asm/irqflags.h:86 [inline]
                    default_idle+0x13/0x20 arch/x86/kernel/process.c:742
                    default_idle_call+0x74/0xb0 kernel/sched/idle.c:117
                    cpuidle_idle_call kernel/sched/idle.c:191 [inline]
                    do_idle+0x22f/0x5d0 kernel/sched/idle.c:332
                    cpu_startup_entry+0x42/0x60 kernel/sched/idle.c:430
                    rest_init+0x2dc/0x300 init/main.c:738
                    start_kernel+0x47a/0x500 init/main.c:1094
                    x86_64_start_reservations+0x2a/0x30 arch/x86/kernel/head64.c:507
                    x86_64_start_kernel+0x99/0xa0 arch/x86/kernel/head64.c:488
                    common_startup_64+0x13e/0x147
   INITIAL USE at:
                   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                   _raw_spin_lock_nested+0x31/0x40 kernel/locking/spinlock.c:378
                   raw_spin_rq_lock_nested+0x2a/0x140 kernel/sched/core.c:559
                   raw_spin_rq_lock kernel/sched/sched.h:1404 [inline]
                   _raw_spin_rq_lock_irqsave kernel/sched/sched.h:1423 [inline]
                   rq_lock_irqsave kernel/sched/sched.h:1702 [inline]
                   rq_attach_root+0xee/0x540 kernel/sched/topology.c:494
                   sched_init+0x64e/0xc30 kernel/sched/core.c:10041
                   start_kernel+0x1ab/0x500 init/main.c:965
                   x86_64_start_reservations+0x2a/0x30 arch/x86/kernel/head64.c:507
                   x86_64_start_kernel+0x99/0xa0 arch/x86/kernel/head64.c:488
                   common_startup_64+0x13e/0x147
 }
 ... key      at: [<ffffffff92937080>] sched_init.__key+0x0/0x20

the dependencies between the lock to be acquired
 and HARDIRQ-irq-unsafe lock:
-> (&htab->buckets[i].lock){+...}-{2:2} {
   HARDIRQ-ON-W at:
                    lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                    __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
                    _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
                    spin_lock_bh include/linux/spinlock.h:356 [inline]
                    sock_hash_delete_elem+0xb0/0x300 net/core/sock_map.c:939
                    0xffffffffa0001b4a
                    bpf_dispatcher_nop_func include/linux/bpf.h:1233 [inline]
                    __bpf_prog_run include/linux/filter.h:667 [inline]
                    bpf_prog_run include/linux/filter.h:674 [inline]
                    __bpf_trace_run kernel/trace/bpf_trace.c:2396 [inline]
                    bpf_trace_run2+0x2ec/0x530 kernel/trace/bpf_trace.c:2437
                    trace_sys_enter+0x93/0xd0 include/trace/events/syscalls.h:18
                    syscall_trace_enter+0xf8/0x150 kernel/entry/common.c:61
                    syscall_enter_from_user_mode_work include/linux/entry-common.h:168 [inline]
                    syscall_enter_from_user_mode include/linux/entry-common.h:198 [inline]
                    do_syscall_64+0xcc/0x240 arch/x86/entry/common.c:79
                    entry_SYSCALL_64_after_hwframe+0x72/0x7a
   INITIAL USE at:
                   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
                   __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
                   _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
                   spin_lock_bh include/linux/spinlock.h:356 [inline]
                   sock_hash_delete_elem+0xb0/0x300 net/core/sock_map.c:939
                   0xffffffffa0001b4a
                   bpf_dispatcher_nop_func include/linux/bpf.h:1233 [inline]
                   __bpf_prog_run include/linux/filter.h:667 [inline]
                   bpf_prog_run include/linux/filter.h:674 [inline]
                   __bpf_trace_run kernel/trace/bpf_trace.c:2396 [inline]
                   bpf_trace_run2+0x2ec/0x530 kernel/trace/bpf_trace.c:2437
                   trace_sys_enter+0x93/0xd0 include/trace/events/syscalls.h:18
                   syscall_trace_enter+0xf8/0x150 kernel/entry/common.c:61
                   syscall_enter_from_user_mode_work include/linux/entry-common.h:168 [inline]
                   syscall_enter_from_user_mode include/linux/entry-common.h:198 [inline]
                   do_syscall_64+0xcc/0x240 arch/x86/entry/common.c:79
                   entry_SYSCALL_64_after_hwframe+0x72/0x7a
 }
 ... key      at: [<ffffffff94af5380>] sock_hash_alloc.__key+0x0/0x20
 ... acquired at:
   lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
   __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
   _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
   spin_lock_bh include/linux/spinlock.h:356 [inline]
   sock_hash_delete_elem+0xb0/0x300 net/core/sock_map.c:939
   bpf_prog_2c29ac5cdc6b1842+0x42/0x46
   bpf_dispatcher_nop_func include/linux/bpf.h:1233 [inline]
   __bpf_prog_run include/linux/filter.h:667 [inline]
   bpf_prog_run include/linux/filter.h:674 [inline]
   __bpf_trace_run kernel/trace/bpf_trace.c:2396 [inline]
   bpf_trace_run4+0x334/0x580 kernel/trace/bpf_trace.c:2439
   __traceiter_sched_switch+0x98/0xd0 include/trace/events/sched.h:222
   trace_sched_switch include/trace/events/sched.h:222 [inline]
   __schedule+0x2587/0x4a50 kernel/sched/core.c:6743
   preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7068
   irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
   asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707
   should_resched arch/x86/include/asm/preempt.h:103 [inline]
   __local_bh_enable_ip+0x170/0x200 kernel/softirq.c:389
   spin_unlock_bh include/linux/spinlock.h:396 [inline]
   batadv_nc_purge_paths+0x30f/0x3b0 net/batman-adv/network-coding.c:471
   batadv_nc_worker+0x365/0x610 net/batman-adv/network-coding.c:722
   process_one_work kernel/workqueue.c:3218 [inline]
   process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3299
   worker_thread+0x86d/0xd70 kernel/workqueue.c:3380
   kthread+0x2f0/0x390 kernel/kthread.c:388
   ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
   ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243


stack backtrace:
CPU: 1 PID: 66 Comm: kworker/u8:4 Not tainted 6.9.0-rc2-next-20240402-syzkaller #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024
Workqueue: bat_events batadv_nc_worker
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:88 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:114
 print_bad_irq_dependency kernel/locking/lockdep.c:2626 [inline]
 check_irq_usage kernel/locking/lockdep.c:2865 [inline]
 check_prev_add kernel/locking/lockdep.c:3138 [inline]
 check_prevs_add kernel/locking/lockdep.c:3253 [inline]
 validate_chain+0x4dc7/0x58e0 kernel/locking/lockdep.c:3869
 __lock_acquire+0x1346/0x1fd0 kernel/locking/lockdep.c:5137
 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5754
 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:126 [inline]
 _raw_spin_lock_bh+0x35/0x50 kernel/locking/spinlock.c:178
 spin_lock_bh include/linux/spinlock.h:356 [inline]
 sock_hash_delete_elem+0xb0/0x300 net/core/sock_map.c:939
 bpf_prog_2c29ac5cdc6b1842+0x42/0x46
 bpf_dispatcher_nop_func include/linux/bpf.h:1233 [inline]
 __bpf_prog_run include/linux/filter.h:667 [inline]
 bpf_prog_run include/linux/filter.h:674 [inline]
 __bpf_trace_run kernel/trace/bpf_trace.c:2396 [inline]
 bpf_trace_run4+0x334/0x580 kernel/trace/bpf_trace.c:2439
 __traceiter_sched_switch+0x98/0xd0 include/trace/events/sched.h:222
 trace_sched_switch include/trace/events/sched.h:222 [inline]
 __schedule+0x2587/0x4a50 kernel/sched/core.c:6743
 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7068
 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
 asm_sysvec_reschedule_ipi+0x1a/0x20 arch/x86/include/asm/idtentry.h:707
RIP: 0010:should_resched arch/x86/include/asm/preempt.h:103 [inline]
RIP: 0010:__local_bh_enable_ip+0x170/0x200 kernel/softirq.c:389
Code: 8b e8 f4 94 27 0a 65 66 8b 05 f4 2a aa 7e 66 85 c0 75 5d bf 01 00 00 00 e8 dd 87 0b 00 e8 68 07 43 00 fb 65 8b 05 b8 2a aa 7e <85> c0 75 05 e8 f7 e2 a6 ff 48 c7 44 24 20 0e 36 e0 45 49 c7 04 1c
RSP: 0018:ffffc900020afa00 EFLAGS: 00000286
RAX: 0000000080000000 RBX: 1ffff92000415f44 RCX: ffffffff8172547a
RDX: dffffc0000000000 RSI: ffffffff8bcad5c0 RDI: ffffffff8c1f7ec0
RBP: ffffc900020afab0 R08: ffffffff92f3a5ff R09: 1ffffffff25e74bf
R10: dffffc0000000000 R11: fffffbfff25e74c0 R12: dffffc0000000000
R13: 1ffff92000415f48 R14: ffffc900020afa40 R15: 0000000000000201
 spin_unlock_bh include/linux/spinlock.h:396 [inline]
 batadv_nc_purge_paths+0x30f/0x3b0 net/batman-adv/network-coding.c:471
 batadv_nc_worker+0x365/0x610 net/batman-adv/network-coding.c:722
 process_one_work kernel/workqueue.c:3218 [inline]
 process_scheduled_works+0xa2c/0x1830 kernel/workqueue.c:3299
 worker_thread+0x86d/0xd70 kernel/workqueue.c:3380
 kthread+0x2f0/0x390 kernel/kthread.c:388
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
 </TASK>
----------------
Code disassembly (best guess), 1 bytes skipped:
   0:	e8 f4 94 27 0a       	call   0xa2794f9
   5:	65 66 8b 05 f4 2a aa 	mov    %gs:0x7eaa2af4(%rip),%ax        # 0x7eaa2b01
   c:	7e
   d:	66 85 c0             	test   %ax,%ax
  10:	75 5d                	jne    0x6f
  12:	bf 01 00 00 00       	mov    $0x1,%edi
  17:	e8 dd 87 0b 00       	call   0xb87f9
  1c:	e8 68 07 43 00       	call   0x430789
  21:	fb                   	sti
  22:	65 8b 05 b8 2a aa 7e 	mov    %gs:0x7eaa2ab8(%rip),%eax        # 0x7eaa2ae1
* 29:	85 c0                	test   %eax,%eax <-- trapping instruction
  2b:	75 05                	jne    0x32
  2d:	e8 f7 e2 a6 ff       	call   0xffa6e329
  32:	48 c7 44 24 20 0e 36 	movq   $0x45e0360e,0x20(%rsp)
  39:	e0 45
  3b:	49                   	rex.WB
  3c:	c7                   	.byte 0xc7
  3d:	04 1c                	add    $0x1c,%al

Crashes (18):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/04/02 21:21 linux-next c0b832517f62 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/02 20:29 linux-next c0b832517f62 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/02 17:45 linux-next c0b832517f62 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/02 14:24 linux-next c0b832517f62 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/02 11:04 linux-next c0b832517f62 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/02 10:46 linux-next c0b832517f62 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/02 08:02 linux-next c0b832517f62 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/02 06:20 linux-next c0b832517f62 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/01 23:45 linux-next a6bd6c933339 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/01 18:58 linux-next a6bd6c933339 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/01 04:57 linux-next a6bd6c933339 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/01 00:12 linux-next a6bd6c933339 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/04/01 00:05 linux-next a6bd6c933339 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/03/30 15:22 linux-next a6bd6c933339 6baf5069 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/03/29 17:10 linux-next a6bd6c933339 c52bcb23 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/03/29 07:02 linux-next a6bd6c933339 120789fd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/03/28 23:05 linux-next a6bd6c933339 120789fd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
2024/03/28 19:27 linux-next a6bd6c933339 120789fd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root possible deadlock in sched_tick
* Struck through repros no longer work on HEAD.