syzbot


WARNING: suspicious RCU usage in dev_deactivate_queue

Status: upstream: reported C repro on 2024/07/18 02:03
Subsystems: net
[Documentation on labels]
Reported-by: syzbot+ca9ad1d31885c81155b6@syzkaller.appspotmail.com
First crash: 221d, last: 1h48m
Cause bisection: failed (error log, bisect log)
  
Discussions (7)
Title Replies (including bot) Last reply
[syzbot] Monthly net report (Feb 2025) 0 (1) 2025/02/05 12:44
[syzbot] Monthly net report (Jan 2025) 0 (1) 2025/01/06 10:01
[syzbot] Monthly net report (Dec 2024) 0 (1) 2024/12/05 09:04
[syzbot] Monthly net report (Nov 2024) 0 (1) 2024/11/04 08:49
[syzbot] Monthly net report (Oct 2024) 0 (1) 2024/10/03 09:02
[syzbot] Monthly net report (Sep 2024) 0 (1) 2024/09/02 08:21
[syzbot] [net?] WARNING: suspicious RCU usage in dev_deactivate_queue 1 (3) 2024/07/18 11:36
Last patch testing requests (1)
Created Duration User Patch Repo Result
2024/07/18 10:53 24m hdanton@sina.com patch https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git 523b23f0bee3 OK log

Sample crash report:
=============================
WARNING: suspicious RCU usage
6.13.0-rc5-syzkaller-00012-g0bc21e701a6f #0 Not tainted
-----------------------------
net/sched/sch_generic.c:1290 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
3 locks held by kworker/u8:7/3461:
 #0: ffff88802fd91148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3204 [inline]
 #0: ffff88802fd91148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_scheduled_works+0x93b/0x1840 kernel/workqueue.c:3310
 #1: ffffc9000cc67d00 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3205 [inline]
 #1: ffffc9000cc67d00 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x976/0x1840 kernel/workqueue.c:3310
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x174/0x3170 drivers/net/bonding/bond_main.c:2960

stack backtrace:
CPU: 1 UID: 0 PID: 3461 Comm: kworker/u8:7 Not tainted 6.13.0-rc5-syzkaller-00012-g0bc21e701a6f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: bond0 bond_mii_monitor
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 lockdep_rcu_suspicious+0x226/0x340 kernel/locking/lockdep.c:6845
 dev_deactivate_queue+0x8f/0x160 net/sched/sch_generic.c:1290
 netdev_for_each_tx_queue include/linux/netdevice.h:2562 [inline]
 dev_deactivate_many+0xc8/0xb10 net/sched/sch_generic.c:1363
 dev_deactivate+0x184/0x280 net/sched/sch_generic.c:1403
 linkwatch_do_dev+0x10a/0x170 net/core/link_watch.c:180
 ethtool_op_get_link+0x15/0x60 net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1f1/0x3f0 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x49a/0x3170 drivers/net/bonding/bond_main.c:2962
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>

=============================
WARNING: suspicious RCU usage
6.13.0-rc5-syzkaller-00012-g0bc21e701a6f #0 Not tainted
-----------------------------
./include/linux/rtnetlink.h:156 suspicious rcu_dereference_protected() usage!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
3 locks held by kworker/u8:7/3461:
 #0: ffff88802fd91148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3204 [inline]
 #0: ffff88802fd91148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_scheduled_works+0x93b/0x1840 kernel/workqueue.c:3310
 #1: ffffc9000cc67d00 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3205 [inline]
 #1: ffffc9000cc67d00 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x976/0x1840 kernel/workqueue.c:3310
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x174/0x3170 drivers/net/bonding/bond_main.c:2960

stack backtrace:
CPU: 1 UID: 0 PID: 3461 Comm: kworker/u8:7 Not tainted 6.13.0-rc5-syzkaller-00012-g0bc21e701a6f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: bond0 bond_mii_monitor
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 lockdep_rcu_suspicious+0x226/0x340 kernel/locking/lockdep.c:6845
 dev_ingress_queue include/linux/rtnetlink.h:156 [inline]
 dev_deactivate_many+0x18f/0xb10 net/sched/sch_generic.c:1365
 dev_deactivate+0x184/0x280 net/sched/sch_generic.c:1403
 linkwatch_do_dev+0x10a/0x170 net/core/link_watch.c:180
 ethtool_op_get_link+0x15/0x60 net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1f1/0x3f0 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x49a/0x3170 drivers/net/bonding/bond_main.c:2962
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
BUG: sleeping function called from invalid context at net/core/dev.c:11403
in_atomic(): 0, irqs_disabled(): 0, non_block: 0, pid: 3461, name: kworker/u8:7
preempt_count: 0, expected: 0
RCU nest depth: 1, expected: 0
3 locks held by kworker/u8:7/3461:
 #0: ffff88802fd91148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3204 [inline]
 #0: ffff88802fd91148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_scheduled_works+0x93b/0x1840 kernel/workqueue.c:3310
 #1: ffffc9000cc67d00 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3205 [inline]
 #1: ffffc9000cc67d00 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x976/0x1840 kernel/workqueue.c:3310
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x174/0x3170 drivers/net/bonding/bond_main.c:2960
CPU: 0 UID: 0 PID: 3461 Comm: kworker/u8:7 Not tainted 6.13.0-rc5-syzkaller-00012-g0bc21e701a6f #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: bond0 bond_mii_monitor
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 __might_resched+0x5d4/0x780 kernel/sched/core.c:8758
 synchronize_net+0x1b/0x50 net/core/dev.c:11403
 dev_deactivate_many+0x4a7/0xb10 net/sched/sch_generic.c:1377
 dev_deactivate+0x184/0x280 net/sched/sch_generic.c:1403
 linkwatch_do_dev+0x10a/0x170 net/core/link_watch.c:180
 ethtool_op_get_link+0x15/0x60 net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1f1/0x3f0 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x49a/0x3170 drivers/net/bonding/bond_main.c:2962
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>

=============================
WARNING: suspicious RCU usage
6.13.0-rc5-syzkaller-00012-g0bc21e701a6f #0 Tainted: G        W         
-----------------------------
kernel/rcu/tree_exp.h:949 Illegal synchronize_rcu_expedited() in RCU read-side critical section!

other info that might help us debug this:


rcu_scheduler_active = 2, debug_locks = 1
3 locks held by kworker/u8:7/3461:
 #0: ffff88802fd91148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3204 [inline]
 #0: ffff88802fd91148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_scheduled_works+0x93b/0x1840 kernel/workqueue.c:3310
 #1: ffffc9000cc67d00 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3205 [inline]
 #1: ffffc9000cc67d00 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x976/0x1840 kernel/workqueue.c:3310
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x174/0x3170 drivers/net/bonding/bond_main.c:2960

stack backtrace:
CPU: 0 UID: 0 PID: 3461 Comm: kworker/u8:7 Tainted: G        W          6.13.0-rc5-syzkaller-00012-g0bc21e701a6f #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: bond0 bond_mii_monitor
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 lockdep_rcu_suspicious+0x226/0x340 kernel/locking/lockdep.c:6845
 synchronize_rcu_expedited+0x12e/0x830 kernel/rcu/tree_exp.h:946
 dev_deactivate_many+0x4a7/0xb10 net/sched/sch_generic.c:1377
 dev_deactivate+0x184/0x280 net/sched/sch_generic.c:1403
 linkwatch_do_dev+0x10a/0x170 net/core/link_watch.c:180
 ethtool_op_get_link+0x15/0x60 net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1f1/0x3f0 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x49a/0x3170 drivers/net/bonding/bond_main.c:2962
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>

=============================
[ BUG: Invalid wait context ]
6.13.0-rc5-syzkaller-00012-g0bc21e701a6f #0 Tainted: G        W         
-----------------------------
kworker/u8:7/3461 is trying to lock:
ffffffff8e93cff8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: exp_funnel_lock kernel/rcu/tree_exp.h:329 [inline]
ffffffff8e93cff8 (rcu_state.exp_mutex){+.+.}-{4:4}, at: synchronize_rcu_expedited+0x451/0x830 kernel/rcu/tree_exp.h:976
other info that might help us debug this:
context-{5:5}
3 locks held by kworker/u8:7/3461:
 #0: ffff88802fd91148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3204 [inline]
 #0: ffff88802fd91148 ((wq_completion)bond0){+.+.}-{0:0}, at: process_scheduled_works+0x93b/0x1840 kernel/workqueue.c:3310
 #1: ffffc9000cc67d00 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_one_work kernel/workqueue.c:3205 [inline]
 #1: ffffc9000cc67d00 ((work_completion)(&(&bond->mii_work)->work)){+.+.}-{0:0}, at: process_scheduled_works+0x976/0x1840 kernel/workqueue.c:3310
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: rcu_lock_acquire include/linux/rcupdate.h:337 [inline]
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: rcu_read_lock include/linux/rcupdate.h:849 [inline]
 #2: ffffffff8e937ae0 (rcu_read_lock){....}-{1:3}, at: bond_mii_monitor+0x174/0x3170 drivers/net/bonding/bond_main.c:2960
stack backtrace:
CPU: 1 UID: 0 PID: 3461 Comm: kworker/u8:7 Tainted: G        W          6.13.0-rc5-syzkaller-00012-g0bc21e701a6f #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: bond0 bond_mii_monitor
Call Trace:
 <TASK>
 __dump_stack lib/dump_stack.c:94 [inline]
 dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120
 print_lock_invalid_wait_context kernel/locking/lockdep.c:4826 [inline]
 check_wait_context kernel/locking/lockdep.c:4898 [inline]
 __lock_acquire+0x15a8/0x2100 kernel/locking/lockdep.c:5176
 lock_acquire+0x1ed/0x550 kernel/locking/lockdep.c:5849
 __mutex_lock_common kernel/locking/mutex.c:585 [inline]
 __mutex_lock+0x1ac/0xee0 kernel/locking/mutex.c:735
 exp_funnel_lock kernel/rcu/tree_exp.h:329 [inline]
 synchronize_rcu_expedited+0x451/0x830 kernel/rcu/tree_exp.h:976
 dev_deactivate_many+0x4a7/0xb10 net/sched/sch_generic.c:1377
 dev_deactivate+0x184/0x280 net/sched/sch_generic.c:1403
 linkwatch_do_dev+0x10a/0x170 net/core/link_watch.c:180
 ethtool_op_get_link+0x15/0x60 net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1f1/0x3f0 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x49a/0x3170 drivers/net/bonding/bond_main.c:2962
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
------------[ cut here ]------------
Voluntary context switch within RCU read-side critical section!
WARNING: CPU: 1 PID: 3461 at kernel/rcu/tree_plugin.h:331 rcu_note_context_switch+0xcf4/0xff0 kernel/rcu/tree_plugin.h:331
Modules linked in:
CPU: 1 UID: 0 PID: 3461 Comm: kworker/u8:7 Tainted: G        W          6.13.0-rc5-syzkaller-00012-g0bc21e701a6f #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: bond0 bond_mii_monitor
RIP: 0010:rcu_note_context_switch+0xcf4/0xff0 kernel/rcu/tree_plugin.h:331
Code: 00 ba 02 00 00 00 e8 7b 13 fe ff 4c 8b b4 24 80 00 00 00 eb 91 c6 05 05 c0 7d 0e 01 90 48 c7 c7 80 ee 0b 8c e8 5d 2b da ff 90 <0f> 0b 90 90 e9 3b f4 ff ff 90 0f 0b 90 45 84 ed 0f 84 00 f4 ff ff
RSP: 0018:ffffc9000cc66f60 EFLAGS: 00010046
RAX: 69d866e7c7b76800 RBX: ffff888032538444 RCX: ffff888032538000
RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc9000cc670b0 R08: ffffffff81601a82 R09: fffffbfff1cfa210
R10: dffffc0000000000 R11: fffffbfff1cfa210 R12: ffff888032538000
R13: 0000000000000000 R14: 1ffff9200198ce04 R15: dffffc0000000000
FS:  0000000000000000(0000) GS:ffff8880b8700000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005637f2819038 CR3: 000000000e736000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <TASK>
 __schedule+0x34b/0x4c30 kernel/sched/core.c:6661
 __schedule_loop kernel/sched/core.c:6833 [inline]
 schedule+0x14b/0x320 kernel/sched/core.c:6848
 schedule_preempt_disabled+0x13/0x30 kernel/sched/core.c:6905
 mutex_optimistic_spin kernel/locking/mutex.c:485 [inline]
 __mutex_lock_common kernel/locking/mutex.c:589 [inline]
 __mutex_lock+0x425/0xee0 kernel/locking/mutex.c:735
 exp_funnel_lock kernel/rcu/tree_exp.h:329 [inline]
 synchronize_rcu_expedited+0x451/0x830 kernel/rcu/tree_exp.h:976
 dev_deactivate_many+0x4a7/0xb10 net/sched/sch_generic.c:1377
 dev_deactivate+0x184/0x280 net/sched/sch_generic.c:1403
 linkwatch_do_dev+0x10a/0x170 net/core/link_watch.c:180
 ethtool_op_get_link+0x15/0x60 net/ethtool/ioctl.c:62
 bond_check_dev_link+0x1f1/0x3f0 drivers/net/bonding/bond_main.c:873
 bond_miimon_inspect drivers/net/bonding/bond_main.c:2740 [inline]
 bond_mii_monitor+0x49a/0x3170 drivers/net/bonding/bond_main.c:2962
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310
 worker_thread+0x870/0xd30 kernel/workqueue.c:3391
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>

Crashes (7422):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/01/03 23:04 upstream 0bc21e701a6f f3558dbf .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2024/12/05 12:44 upstream feffde684ac2 29f61fce .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2024/09/08 02:43 upstream d1f2d51b711a 9750182a .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2024/09/03 17:42 upstream 67784a74e258 512328ba .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2024/09/02 07:15 upstream c9f016e72b5c 1eda0d14 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2024/08/31 00:54 upstream 20371ba12063 f885a8ff .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2024/07/18 01:28 upstream 51835949dda3 03114f55 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2024/12/18 08:47 net 954a2b40719a a0626d3a .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2024/11/28 18:27 net 8d5c1b8c3e71 5df23865 .config strace log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/09 00:51 upstream 9946eaf552b1 ef44b750 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 23:54 upstream 7ee983c850b4 a4f327c2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 12:07 upstream bb066fe812d6 a4f327c2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 09:53 upstream bb066fe812d6 53657d1b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 01:28 upstream bb066fe812d6 53657d1b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/06 21:38 upstream 92514ef226f5 53657d1b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/06 06:51 upstream 92514ef226f5 577d049b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/05 04:56 upstream d009de7d5428 4baca3d6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/04 21:23 upstream d009de7d5428 4baca3d6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/04 19:59 upstream 0de63bb7d919 4baca3d6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/04 11:49 upstream 0de63bb7d919 8f267cef .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/04 06:01 upstream 0de63bb7d919 8f267cef .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/04 05:57 upstream 0de63bb7d919 8f267cef .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/03 13:26 upstream 2014c95afece a21a8419 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/03 07:00 upstream 69e858e0b8b2 568559e4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/03 05:18 upstream 69e858e0b8b2 568559e4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/02 18:52 upstream 69e858e0b8b2 568559e4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/01/13 00:26 upstream be548645527a 6dbc6a9b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/01/08 23:16 upstream 0b7958fa05d5 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/01/06 14:46 upstream ab75170520d4 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2025/01/06 01:38 upstream ab75170520d4 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/09 13:47 upstream 9946eaf552b1 ef44b750 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 11:02 upstream bb066fe812d6 a4f327c2 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 07:06 upstream bb066fe812d6 53657d1b .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 05:33 upstream bb066fe812d6 53657d1b .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/06 11:14 upstream 92514ef226f5 1e1faf27 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/04 16:42 upstream 0de63bb7d919 44c01590 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/04 07:06 upstream 0de63bb7d919 8f267cef .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/04 00:24 upstream 0de63bb7d919 8f267cef .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/03 08:40 upstream 69e858e0b8b2 568559e4 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/02 22:26 upstream 69e858e0b8b2 568559e4 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/01 18:39 upstream 69e858e0b8b2 0dff8567 .config console log report [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/08 07:17 upstream 7ee983c850b4 ef44b750 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu-upstream-386 WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/02 12:14 net 3f1baa91a1fd 568559e4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/02 10:51 net 3f1baa91a1fd 568559e4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/08 03:53 net-next 7bca2b2d5fcc a4f327c2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 21:36 net-next 26db4dbb7478 a4f327c2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/06 02:46 net-next 0bea93fdbaf8 577d049b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 08:16 linux-next ed58d103e6da 53657d1b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 00:07 linux-next 808eb958781e 53657d1b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/06 09:26 linux-next 808eb958781e 577d049b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/05 21:40 linux-next ed88b8b82c53 577d049b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/05 09:09 linux-next ed88b8b82c53 5896748e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/04 09:44 linux-next 40b8e93e17bf 8f267cef .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/03 18:52 linux-next 00f3246adeea a21a8419 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/03 16:46 linux-next 00f3246adeea a21a8419 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/08 23:58 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece ef44b750 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 18:33 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece a4f327c2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/07 03:11 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece 53657d1b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/06 07:52 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece 577d049b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/05 13:59 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece 5896748e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/05 04:12 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece 4baca3d6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/05 03:00 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece 4baca3d6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/04 15:14 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece 8f267cef .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_deactivate_queue
2025/02/03 21:51 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 1950a0af2d55 a21a8419 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 WARNING: suspicious RCU usage in dev_deactivate_queue
2024/08/02 12:30 git://git.kernel.org/pub/scm/linux/kernel/git/riscv/linux.git fixes c562ba719df5 1e9c4cf3 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-riscv64 WARNING: suspicious RCU usage in dev_deactivate_queue
* Struck through repros no longer work on HEAD.