syzbot


INFO: rcu detected stall in NF_HOOK (2)

Status: upstream: reported C repro on 2024/10/10 12:45
Subsystems: netfilter
[Documentation on labels]
Reported-by: syzbot+34c2df040c6cfa15fdfe@syzkaller.appspotmail.com
First crash: 369d, last: 1d00h
Cause bisection: the cause commit could be any of (bisect log):
  781773e3b680 sched/fair: Implement ENQUEUE_DELAYED
  a1c446611e31 sched,freezer: Mark TASK_FROZEN special
  e1459a50ba31 sched: Teach dequeue_task() about special task states
  f12e148892ed sched/fair: Prepare pick_next_task() for delayed dequeue
  152e11f6df29 sched/fair: Implement delayed dequeue
  2e0199df252a sched/fair: Prepare exit/cleanup paths for delayed_dequeue
  54a58a787791 sched/fair: Implement DELAY_ZERO
  
Fix bisection: failed (error log, bisect log)
  
Discussions (6)
Title Replies (including bot) Last reply
[syzbot] Monthly netfilter report (Jun 2025) 0 (1) 2025/06/19 08:20
[syzbot] Monthly netfilter report (Apr 2025) 0 (1) 2025/04/17 08:38
[syzbot] Monthly netfilter report (Jan 2025) 0 (1) 2025/01/13 12:40
[syzbot] Monthly netfilter report (Dec 2024) 0 (1) 2024/12/13 13:16
[syzbot] Monthly netfilter report (Nov 2024) 0 (1) 2024/11/13 11:07
[syzbot] [netfilter?] INFO: rcu detected stall in NF_HOOK (2) 0 (1) 2024/10/10 12:45
Similar bugs (6)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in NF_HOOK netfilter usb 1 C error 13 376d 391d 0/29 closed as dup on 2024/06/20 17:29
linux-5.15 INFO: rcu detected stall in NF_HOOK 1 1 496d 496d 0/3 auto-obsoleted due to no activity on 2024/06/15 14:02
linux-5.15 INFO: rcu detected stall in NF_HOOK (3) 1 2 175d 194d 0/3 auto-obsoleted due to no activity on 2025/05/01 22:51
linux-6.1 INFO: rcu detected stall in NF_HOOK origin:lts-only 1 syz unreliable 20 42d 407d 0/3 upstream: reported syz repro on 2024/06/04 14:31
linux-5.15 INFO: rcu detected stall in NF_HOOK (2) 1 1 378d 378d 0/3 auto-obsoleted due to no activity on 2024/10/11 06:09
android-54 BUG: soft lockup in NF_HOOK 1 1 399d 399d 0/2 auto-obsoleted due to no activity on 2024/09/10 19:37
Last patch testing requests (4)
Created Duration User Patch Repo Result
2025/07/11 15:59 34m retest repro net-next report log
2025/07/11 14:54 25m retest repro upstream report log
2025/02/10 19:29 24m retest repro net-next report log
2024/12/02 19:06 21m retest repro net-next report log

Sample crash report:
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	1-...!: (1 GPs behind) idle=0814/1/0x4000000000000000 softirq=17439/17440 fqs=1
rcu: 	(detected by 0, t=10502 jiffies, g=12129, q=289 ncpus=2)
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 36 Comm: kworker/u8:2 Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
Workqueue: ipv6_addrconf addrconf_dad_work
RIP: 0010:qdisc_dev include/net/sch_generic.h:574 [inline]
RIP: 0010:advance_sched+0x80/0xc90 net/sched/sch_taprio.c:916
Code: 00 fc ff df 80 3c 08 00 74 08 48 89 df e8 d8 df 94 f8 48 8b 1b 48 89 d8 48 c1 e8 03 48 b9 00 00 00 00 00 fc ff df 80 3c 08 00 <74> 08 48 89 df e8 b6 df 94 f8 48 8b 1b 48 83 c3 36 48 89 d8 48 c1
RSP: 0018:ffffc90000a07dd0 EFLAGS: 00000046
RAX: 1ffff11004969000 RBX: ffff888024b48000 RCX: dffffc0000000000
RDX: 0000000000010100 RSI: 0000000000000000 RDI: ffff8880284fc340
RBP: ffffc90000a07fe8 R08: ffffffff8fa1f5f7 R09: 1ffffffff1f43ebe
R10: dffffc0000000000 R11: ffffffff898ed350 R12: ffff8880284fc340
R13: ffff8880284fc000 R14: dffffc0000000000 R15: ffff88801d2e64d8
FS:  0000000000000000(0000) GS:ffff888125d1b000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f5e8928ea10 CR3: 00000000761fc000 CR4: 0000000000350ef0
Call Trace:
 <IRQ>
 __run_hrtimer kernel/time/hrtimer.c:1761 [inline]
 __hrtimer_run_queues+0x52c/0xc60 kernel/time/hrtimer.c:1825
 hrtimer_interrupt+0x45b/0xaa0 kernel/time/hrtimer.c:1887
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1039 [inline]
 __sysvec_apic_timer_interrupt+0x10b/0x410 arch/x86/kernel/apic/apic.c:1056
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1050 [inline]
 sysvec_apic_timer_interrupt+0x52/0xc0 arch/x86/kernel/apic/apic.c:1050
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:__sanitizer_cov_trace_pc+0x0/0x70 kernel/kcov.c:210
Code: 89 fb e8 23 00 00 00 48 8b 3d c4 d0 fb 0b 48 89 de 5b e9 13 b9 58 00 cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 48 8b 04 24 65 48 8b 0c 25 08 50 a0 92 65 8b 15 a8 1c
RSP: 0018:ffffc90000a08218 EFLAGS: 00000246
RAX: 0000000000000000 RBX: 0000000000000001 RCX: ffff88801d2e5a00
RDX: 0000000000000100 RSI: 00000000fffffffd RDI: 00000000fffffffd
RBP: ffffc90000a08378 R08: ffffc90000a084a0 R09: ffffc90000a084b0
R10: dffffc0000000000 R11: fffff52000141062 R12: 1ffff1100538510c
R13: ffff888029c288c0 R14: ffff888029c28800 R15: ffff888029c288c8
 __find_rr_leaf+0x2f9/0x6d0 net/ipv6/route.c:873
 find_rr_leaf net/ipv6/route.c:890 [inline]
 rt6_select net/ipv6/route.c:934 [inline]
 fib6_table_lookup+0x39f/0xa80 net/ipv6/route.c:2232
 ip6_pol_route+0x222/0x1180 net/ipv6/route.c:2268
 pol_lookup_func include/net/ip6_fib.h:617 [inline]
 fib6_rule_lookup+0x52f/0x6f0 net/ipv6/fib6_rules.c:120
 ip6_route_input_lookup net/ipv6/route.c:2337 [inline]
 ip6_route_input+0x6ce/0xa50 net/ipv6/route.c:2640
 ip6_rcv_finish+0x141/0x2d0 net/ipv6/ip6_input.c:77
 NF_HOOK+0x30c/0x3a0 include/linux/netfilter.h:317
 __netif_receive_skb_one_core net/core/dev.c:5977 [inline]
 __netif_receive_skb+0xd3/0x380 net/core/dev.c:6090
 process_backlog+0x60e/0x14f0 net/core/dev.c:6442
 __napi_poll+0xc7/0x480 net/core/dev.c:7414
 napi_poll net/core/dev.c:7478 [inline]
 net_rx_action+0x707/0xe30 net/core/dev.c:7605
 handle_softirqs+0x286/0x870 kernel/softirq.c:579
 do_softirq+0xec/0x180 kernel/softirq.c:480
 </IRQ>
 <TASK>
 __local_bh_enable_ip+0x17d/0x1c0 kernel/softirq.c:407
 local_bh_enable include/linux/bottom_half.h:33 [inline]
 rcu_read_unlock_bh include/linux/rcupdate.h:910 [inline]
 __dev_queue_xmit+0x1cd7/0x3a70 net/core/dev.c:4740
 neigh_output include/net/neighbour.h:539 [inline]
 ip6_finish_output2+0x11fe/0x16a0 net/ipv6/ip6_output.c:141
 __ip6_finish_output net/ipv6/ip6_output.c:-1 [inline]
 ip6_finish_output+0x234/0x7d0 net/ipv6/ip6_output.c:226
 NF_HOOK include/linux/netfilter.h:317 [inline]
 ndisc_send_skb+0xb47/0x1400 net/ipv6/ndisc.c:513
 ndisc_send_ns+0xcb/0x150 net/ipv6/ndisc.c:671
 addrconf_dad_work+0xaae/0x14b0 net/ipv6/addrconf.c:4281
 process_one_work kernel/workqueue.c:3238 [inline]
 process_scheduled_works+0xae1/0x17b0 kernel/workqueue.c:3321
 worker_thread+0x8a0/0xda0 kernel/workqueue.c:3402
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
rcu: rcu_preempt kthread starved for 10500 jiffies! g12129 f0x0 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:27128 pid:16    tgid:16    ppid:2      task_flags:0x208040 flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5397 [inline]
 __schedule+0x16f5/0x4d00 kernel/sched/core.c:6786
 __schedule_loop kernel/sched/core.c:6864 [inline]
 schedule+0x165/0x360 kernel/sched/core.c:6879
 schedule_timeout+0x12b/0x270 kernel/time/sleep_timeout.c:99
 rcu_gp_fqs_loop+0x301/0x1540 kernel/rcu/tree.c:2054
 rcu_gp_kthread+0x99/0x390 kernel/rcu/tree.c:2256
 kthread+0x711/0x8a0 kernel/kthread.c:464
 ret_from_fork+0x3fc/0x770 arch/x86/kernel/process.c:148
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
CPU: 0 UID: 0 PID: 6043 Comm: sed Not tainted 6.16.0-rc6-syzkaller-00002-g155a3c003e55 #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025
RIP: 0010:csd_lock_wait kernel/smp.c:340 [inline]
RIP: 0010:smp_call_function_many_cond+0xf69/0x12d0 kernel/smp.c:885
Code: 00 45 8b 2f 44 89 ee 83 e6 01 31 ff e8 d0 78 0b 00 41 83 e5 01 49 bd 00 00 00 00 00 fc ff df 75 07 e8 7b 74 0b 00 eb 37 f3 90 <43> 0f b6 04 2c 84 c0 75 10 41 f7 07 01 00 00 00 74 1e e8 60 74 0b
RSP: 0018:ffffc9000402f6e0 EFLAGS: 00000293
RAX: ffffffff81b4bf10 RBX: ffff8880b863b1c0 RCX: ffff88802b67da00
RDX: 0000000000000000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: ffffc9000402f840 R08: ffffffff8fa1f5f7 R09: 1ffffffff1f43ebe
R10: dffffc0000000000 R11: fffffbfff1f43ebf R12: 1ffff110170e7f5d
R13: dffffc0000000000 R14: 0000000000000001 R15: ffff8880b873fae8
FS:  0000000000000000(0000) GS:ffff888125c1b000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f4861bbe368 CR3: 000000000df38000 CR4: 0000000000350ef0
Call Trace:
 <TASK>
 on_each_cpu_cond_mask+0x3f/0x80 kernel/smp.c:1052
 __flush_tlb_multi arch/x86/include/asm/paravirt.h:91 [inline]
 flush_tlb_multi arch/x86/mm/tlb.c:1361 [inline]
 flush_tlb_mm_range+0x6b1/0x12c0 arch/x86/mm/tlb.c:1451
 tlb_flush arch/x86/include/asm/tlb.h:23 [inline]
 tlb_flush_mmu_tlbonly include/asm-generic/tlb.h:490 [inline]
 tlb_flush_mmu+0x1a7/0x680 mm/mmu_gather.c:403
 tlb_finish_mmu+0xc3/0x1d0 mm/mmu_gather.c:497
 exit_mmap+0x44c/0xb50 mm/mmap.c:1297
 __mmput+0x118/0x420 kernel/fork.c:1121
 exit_mm+0x1da/0x2c0 kernel/exit.c:581
 do_exit+0x648/0x22e0 kernel/exit.c:952
 do_group_exit+0x21c/0x2d0 kernel/exit.c:1105
 __do_sys_exit_group kernel/exit.c:1116 [inline]
 __se_sys_exit_group kernel/exit.c:1114 [inline]
 __x64_sys_exit_group+0x3f/0x40 kernel/exit.c:1114
 x64_sys_call+0x21ba/0x21c0 arch/x86/include/generated/asm/syscalls_64.h:232
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xfa/0x3b0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f5e893be6c5
Code: Unable to access opcode bytes at 0x7f5e893be69b.
RSP: 002b:00007fff2e137de8 EFLAGS: 00000206 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 00007f5e894bffe8 RCX: 00007f5e893be6c5
RDX: 00000000000000e7 RSI: ffffffffffffff88 RDI: 0000000000000000
RBP: 0000000000000001 R08: 0000000000000000 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000000
R13: 0000000000000000 R14: 00007f5e894be680 R15: 00007f5e894c0000
 </TASK>

Crashes (99):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/07/15 18:25 upstream 155a3c003e55 03fcfc4b .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in NF_HOOK
2025/05/21 03:44 upstream b36ddb9210e6 8f9cf946 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in NF_HOOK
2024/10/06 12:32 net-next d521db38f339 d7906eff .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in NF_HOOK
2025/07/15 21:46 upstream 155a3c003e55 03fcfc4b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in NF_HOOK
2025/02/18 14:52 upstream 2408a807bfc3 c37c7249 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in NF_HOOK
2025/01/16 16:47 upstream 619f0b6fad52 968edaf4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in NF_HOOK
2024/12/29 05:06 upstream 059dd502b263 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in NF_HOOK
2024/12/22 08:23 upstream 48f506ad0b68 d7f584ee .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in NF_HOOK
2024/12/22 02:32 upstream baa172c77ac5 d7f584ee .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in NF_HOOK
2024/12/20 21:13 upstream e9b8ffafd20a 1ac6aa80 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in NF_HOOK
2024/12/12 17:07 upstream 231825b2e1ff 941924eb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in NF_HOOK
2024/12/12 12:37 upstream 231825b2e1ff 941924eb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in NF_HOOK
2024/12/07 18:41 upstream b5f217084ab3 9ac0fdc6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in NF_HOOK
2024/11/18 09:24 upstream adc218676eef cfe3a04a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in NF_HOOK
2024/11/12 20:02 upstream 3022e9d00ebe 75bb1b32 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in NF_HOOK
2024/10/01 20:25 upstream e32cde8d2bd7 ea2b66a6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in NF_HOOK
2024/10/12 14:51 upstream 9e4c6c1ad9a1 084d8178 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in NF_HOOK
2025/06/17 20:46 net 7b4ac12cc929 417d98fa .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in NF_HOOK
2025/01/25 19:37 net 15a901361ec3 9fbd772e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in NF_HOOK
2025/01/07 20:50 net fd48f071a3d6 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in NF_HOOK
2025/01/03 18:27 net ce21419b55d8 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in NF_HOOK
2024/12/15 04:08 net 429fde2d81bc 7cbfbb3a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in NF_HOOK
2024/12/13 16:55 net 150b567e0d57 3547e30f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in NF_HOOK
2025/06/17 08:41 net-next 3b5b1c428260 cfebc887 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in NF_HOOK
2024/12/19 19:31 net-next 6b3099ebca13 1d58202c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in NF_HOOK
2024/12/16 23:25 net-next bc6a5efe3dcd f93b2b55 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in NF_HOOK
2024/09/30 15:15 linux-next cea5425829f7 bbd4e0a4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in NF_HOOK
2025/06/27 14:43 bpf e34a79b96ab9 803ce19b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/06/20 16:04 bpf d4adf1c9ee77 e3003213 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/06/15 05:14 bpf ad9ef7f687ce 5f4b362d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/06/04 00:00 bpf df3bed9ea576 a30356b7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/06/03 19:20 bpf df3bed9ea576 a30356b7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/06/02 00:11 bpf bb1556ec9464 3d2f584d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/05/29 15:00 bpf 90b83efa6701 3d2f584d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/05/21 08:15 bpf b4432656b36e 8f9cf946 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/05/18 08:52 bpf b4432656b36e f41472b0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/05/15 20:10 bpf b4432656b36e d6b2ee52 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/05/12 13:17 bpf b4432656b36e 77908e5f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/05/09 21:49 bpf b4432656b36e bb813bcc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/05/08 18:16 bpf b4432656b36e dbf35fa1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/04/27 11:33 bpf f1a3944c860b c6b4fb39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/04/25 18:29 bpf f2858f308131 c6b4fb39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2024/11/17 10:40 bpf 9f8e716d46c6 cfe3a04a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2024/11/11 12:19 bpf fb86c42a2a5d 97fe5517 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2024/11/10 20:28 bpf fb86c42a2a5d 6b856513 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in NF_HOOK
2025/07/14 08:51 bpf-next ea2aecdf7a95 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/06/19 12:00 bpf-next cd7312a78f36 ed3e87f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/06/17 18:48 bpf-next a633dab4b4d2 417d98fa .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/06/16 16:57 bpf-next f66b4aaff254 d1716036 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/06/09 14:37 bpf-next e41079f53e87 4826c28e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/05/19 07:12 bpf-next 9325d53fe9ad f41472b0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/05/15 02:56 bpf-next d0445d7dd3fd a4fa04ef .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/05/10 19:16 bpf-next c8ce7db0ca83 77908e5f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/05/01 02:21 bpf-next 358b1c0f56eb ce7952f4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/04/28 22:41 bpf-next 224ee86639f5 c6b4fb39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/04/26 13:09 bpf-next 91dbac407653 c6b4fb39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/04/25 10:14 bpf-next 46eb012611f7 e3715315 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/04/10 23:45 bpf-next a27a97f71394 1bc60a19 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2025/04/04 04:14 bpf-next a1b5bd45d4ee d7ae3a11 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2024/11/11 05:17 bpf-next a2b4a9cddae8 6b856513 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
2024/11/10 08:13 bpf-next a2b4a9cddae8 6b856513 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in NF_HOOK
* Struck through repros no longer work on HEAD.