syzbot


BUG: soft lockup in smp_call_function

Status: upstream: reported C repro on 2020/07/12 23:02
Subsystems: kernel
[Documentation on labels]
Reported-by: syzbot+cce3691658bef1b12ac9@syzkaller.appspotmail.com
First crash: 1966d, last: 17h23m
Cause bisection: introduced by (bisect log) :
commit 5a781ccbd19e4664babcbe4b4ead7aa2b9283d22
Author: Vinicius Costa Gomes <vinicius.gomes@intel.com>
Date: Sat Sep 29 00:59:43 2018 +0000

  tc: Add support for configuring the taprio scheduler

Crash: BUG: soft lockup in smp_call_function (log)
Repro: C syz .config
  
Discussions (2)
Title Replies (including bot) Last reply
[syzbot] [ext4] Monthly Report 0 (1) 2023/03/24 15:59
BUG: soft lockup in smp_call_function 1 (4) 2020/07/15 05:43
Similar bugs (18)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-6-1 BUG: soft lockup in smp_call_function origin:upstream missing-backport 1 C inconclusive 321 4h11m 602d 0/2 upstream: reported C repro on 2024/04/02 06:05
linux-4.19 BUG: soft lockup in smp_call_function 1 C error 2 1184d 1312d 0/1 upstream: reported C repro on 2022/04/23 05:26
linux-6.1 BUG: soft lockup in smp_call_function origin:upstream 1 C error 169 10d 984d 0/3 upstream: reported C repro on 2023/03/18 00:36
linux-6.6 INFO: rcu detected stall in smp_call_function origin:lts-only 1 C 60 7h30m 107d 0/2 upstream: reported C repro on 2025/08/10 04:01
android-54 BUG: soft lockup in smp_call_function 1 1 1481d 1481d 0/2 auto-closed as invalid on 2022/03/05 18:04
android-6-12 BUG: soft lockup in smp_call_function 1 1 116d 116d 0/1 auto-obsoleted due to no activity on 2025/10/30 09:23
linux-4.14 BUG: soft lockup in smp_call_function 1 C 1 1010d 1312d 0/1 upstream: reported C repro on 2022/04/23 04:43
linux-5.15 BUG: soft lockup in smp_call_function missing-backport origin:lts-only 1 C error 284 2d09h 982d 0/3 upstream: reported C repro on 2023/03/19 12:10
android-5-15 BUG: soft lockup in smp_call_function origin:upstream 1 C error inconclusive 961 4d02h 996d 0/2 upstream: reported C repro on 2023/03/05 21:20
android-54 BUG: soft lockup in smp_call_function (2) 1 C 41 210d 667d 0/2 upstream: reported C repro on 2024/01/28 03:58
android-5-10 BUG: soft lockup in smp_call_function 1 C error 140 18h45m 857d 0/2 upstream: reported C repro on 2023/07/22 22:59
upstream INFO: rcu detected stall in smp_call_function perf 1 C 107 1690d 1945d 20/29 fixed on 2021/04/13 06:26
upstream INFO: rcu detected stall in smp_call_function_many perf 1 138 2646d 2802d 0/29 closed as invalid on 2018/12/31 07:57
upstream BUG: soft lockup in smp_call_function_single (2) kernel 1 1 2634d 2633d 0/29 auto-closed as invalid on 2019/03/09 01:12
upstream BUG: soft lockup in smp_call_function_single bpf 1 24 2639d 2693d 0/29 closed as invalid on 2018/09/05 12:51
upstream INFO: rcu detected stall in smp_call_function_single kernel 1 4 2713d 2751d 0/29 closed as invalid on 2018/07/20 09:38
android-49 INFO: rcu detected stall in smp_call_function_single 1 1 2662d 2662d 0/3 auto-closed as invalid on 2019/02/22 15:22
upstream INFO: rcu detected stall in smp_call_function_single (2) kernel 1 3 2638d 2663d 0/29 closed as invalid on 2018/09/05 12:51
Fix bisection attempts (1)
Created Duration User Patch Repo Result
2022/05/24 08:49 25m bisect fix net-old OK (0) job log log

Sample crash report:
 ret_from_fork+0x675/0x7d0 arch/x86/kernel/process.c:158
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
watchdog: BUG: soft lockup - CPU#0 stuck for 245s! [kworker/u8:1:13]
Modules linked in:
irq event stamp: 232758
hardirqs last  enabled at (232757): [<ffffffff8b5efd6b>] irqentry_exit+0x3b/0x90 kernel/entry/common.c:214
hardirqs last disabled at (232758): [<ffffffff8b5ee7ce>] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1052
softirqs last  enabled at (232756): [<ffffffff817d237e>] softirq_handle_end kernel/softirq.c:468 [inline]
softirqs last  enabled at (232756): [<ffffffff817d237e>] handle_softirqs+0x5be/0x8e0 kernel/softirq.c:650
softirqs last disabled at (232741): [<ffffffff817d2839>] __do_softirq kernel/softirq.c:656 [inline]
softirqs last disabled at (232741): [<ffffffff817d2839>] invoke_softirq kernel/softirq.c:496 [inline]
softirqs last disabled at (232741): [<ffffffff817d2839>] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:723
CPU: 0 UID: 0 PID: 13 Comm: kworker/u8:1 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:__sanitizer_cov_trace_const_cmp4+0x0/0x20 kernel/kcov.c:313
Code: 0c 24 0f b7 d6 0f b7 f7 bf 03 00 00 00 e9 58 fe ff ff 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 <f3> 0f 1e fa 48 8b 0c 24 89 f2 89 fe bf 05 00 00 00 e9 2a fe ff ff
RSP: 0018:ffffc90000127870 EFLAGS: 00000202
RAX: 0000000000000001 RBX: ffff8880b8540460 RCX: ffffffff81b0da31
RDX: ffff88801cef0000 RSI: 0000000000000001 RDI: 0000000000000000
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000001 R12: dffffc0000000000
R13: ffffed10170a808d R14: 0000000000000001 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff888124a06000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00005608a11b6a90 CR3: 000000000e182000 CR4: 0000000000350ef0
Call Trace:
 <TASK>
 csd_lock_wait kernel/smp.c:342 [inline]
 smp_call_function_many_cond+0xe21/0x1600 kernel/smp.c:877
 on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1043
 on_each_cpu include/linux/smp.h:71 [inline]
 smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2713 [inline]
 smp_text_poke_batch_finish+0x27b/0xdb0 arch/x86/kernel/alternative.c:2923
 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146
 jump_label_update+0x376/0x550 kernel/jump_label.c:919
 static_key_enable_cpuslocked+0x1b7/0x270 kernel/jump_label.c:210
 static_key_enable+0x1a/0x20 kernel/jump_label.c:223
 toggle_allocation_gate mm/kfence/core.c:852 [inline]
 toggle_allocation_gate+0xfa/0x280 mm/kfence/core.c:844
 process_one_work+0x9cf/0x1b70 kernel/workqueue.c:3263
 process_scheduled_works kernel/workqueue.c:3346 [inline]
 worker_thread+0x6c8/0xf10 kernel/workqueue.c:3427
 kthread+0x3c5/0x780 kernel/kthread.c:463
 ret_from_fork+0x675/0x7d0 arch/x86/kernel/process.c:158
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245
 </TASK>
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 5984 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
RIP: 0010:srso_alias_safe_ret+0x0/0x7 arch/x86/lib/retpoline.S:210
Code: cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc cc <48> 8d 64 24 08 c3 cc e8 f4 ff ff ff 0f 0b cc cc cc cc cc cc cc cc
RSP: 0018:ffffc90000a08ce8 EFLAGS: 00000097
RAX: 0000000000000001 RBX: ffff888032c4e2e8 RCX: ffffffff8199137c
RDX: fffff520001411a4 RSI: 0000000000000004 RDI: ffffc90000a08d20
RBP: 1ffff920001411a0 R08: 0000000000000001 R09: fffff520001411a4
R10: 0000000000000003 R11: 0000000000000001 R12: ffff888032c4e2f0
R13: ffff888032c4e2f8 R14: ffff888032c4e340 R15: ffffffff896ab9f0
FS:  0000000000000000(0000) GS:ffff888124b06000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000200000000600 CR3: 000000000e182000 CR4: 0000000000350ef0
Call Trace:
 <IRQ>
 srso_alias_return_thunk+0x5/0xfbef5 arch/x86/lib/retpoline.S:220
 instrument_atomic_read_write include/linux/instrumented.h:96 [inline]
 atomic_try_cmpxchg_acquire include/linux/atomic/atomic-instrumented.h:1301 [inline]
 queued_spin_lock include/asm-generic/qspinlock.h:111 [inline]
 do_raw_spin_lock+0x12c/0x2b0 kernel/locking/spinlock_debug.c:116
 spin_lock include/linux/spinlock.h:351 [inline]
 advance_sched+0xd9/0xc80 net/sched/sch_taprio.c:929
 __run_hrtimer kernel/time/hrtimer.c:1777 [inline]
 __hrtimer_run_queues+0x202/0xad0 kernel/time/hrtimer.c:1841
 hrtimer_interrupt+0x397/0x8e0 kernel/time/hrtimer.c:1903
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1041 [inline]
 __sysvec_apic_timer_interrupt+0x10b/0x3f0 arch/x86/kernel/apic/apic.c:1058
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1052 [inline]
 sysvec_apic_timer_interrupt+0x9f/0xc0 arch/x86/kernel/apic/apic.c:1052
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:unwind_next_frame+0xf8/0x20a0 arch/x86/kernel/unwind_orc.c:482
Code: d5 2c 00 e8 5a 03 f3 09 5a 85 c0 0f 85 57 09 00 00 48 b8 00 00 00 00 00 fc ff df 4d 8d 65 50 4c 89 e2 48 c1 ea 03 80 3c 02 00 <0f> 85 e8 17 00 00 4d 8b 75 50 4d 85 f6 74 36 49 8d be 88 00 00 00
RSP: 0018:ffffc90003167548 EFLAGS: 00000246
RAX: dffffc0000000000 RBX: 0000000000000001 RCX: 000000000b876632
RDX: 1ffff9200062cec1 RSI: ffffffff8bf07940 RDI: ffffffff8dcd2ee8
RBP: ffffc90003167600 R08: 5f77cbb3d8f98d14 R09: 0000000000000000
R10: 0000000000000000 R11: 0000000000000001 R12: ffffc90003167608
R13: ffffc900031675b8 R14: 0000000000000000 R15: ffff888029390000
 arch_stack_walk+0x94/0x100 arch/x86/kernel/stacktrace.c:25
 stack_trace_save+0x8e/0xc0 kernel/stacktrace.c:122
 kasan_save_stack+0x33/0x60 mm/kasan/common.c:56
 kasan_save_track+0x14/0x30 mm/kasan/common.c:77
 __kasan_save_free_info+0x3b/0x60 mm/kasan/generic.c:587
 kasan_save_free_info mm/kasan/kasan.h:406 [inline]
 poison_slab_object mm/kasan/common.c:252 [inline]
 __kasan_slab_free+0x5f/0x80 mm/kasan/common.c:284
 kasan_slab_free include/linux/kasan.h:234 [inline]
 slab_free_hook mm/slub.c:2543 [inline]
 free_to_pcs_bulk+0x187/0x7b0 mm/slub.c:6337
 mt_free_bulk lib/maple_tree.c:179 [inline]
 mt_destroy_walk+0xa20/0xf60 lib/maple_tree.c:5000
 mte_destroy_walk lib/maple_tree.c:5049 [inline]
 mte_destroy_walk lib/maple_tree.c:5040 [inline]
 __mt_destroy+0x310/0x3e0 lib/maple_tree.c:6446
 exit_mmap+0x614/0xb90 mm/mmap.c:1315
 __mmput+0x12a/0x410 kernel/fork.c:1133
 mmput+0x62/0x70 kernel/fork.c:1156
 exit_mm kernel/exit.c:582 [inline]
 do_exit+0x7c7/0x2bf0 kernel/exit.c:954
 do_group_exit+0xd3/0x2a0 kernel/exit.c:1107
 __do_sys_exit_group kernel/exit.c:1118 [inline]
 __se_sys_exit_group kernel/exit.c:1116 [inline]
 __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1116
 x64_sys_call+0x150b/0x1730 arch/x86/include/generated/asm/syscalls_64.h:232
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0xfa0 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f061358f749
Code: Unable to access opcode bytes at 0x7f061358f71f.
RSP: 002b:00007fff86910d28 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f061358f749
RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000003 R08: 0000000586910e1f R09: 00007f06137b4280
R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f06137b4280 R14: 0000000000000003 R15: 00007fff86910de0
 </TASK>

Crashes (1639):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/11/24 00:59 upstream d13f3ac64efb 4fb8ef37 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/11/03 21:48 upstream 6146a0f1dfae 2c50b6a9 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/10/14 10:16 upstream 3a8660878839 b6605ba8 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/10/05 16:53 upstream 6093a688a07d 49379ee0 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2021/12/28 04:31 net-old 79b69a83705e 6b3c5e64 .config console log report syz C ci-upstream-net-this-kasan-gce BUG: soft lockup in smp_call_function
2025/04/04 11:29 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci d6b13dbd03b7 d7ae3a11 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/19 01:45 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci b5737d35364f 22a6c2b1 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/18 20:42 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci b5737d35364f 22a6c2b1 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/18 06:18 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5618886fdab ce3352cd .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/17 21:19 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5618886fdab 948c34e4 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/16 23:52 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5618886fdab e2826670 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/16 14:50 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5618886fdab e2826670 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/04 22:57 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e056da87c780 c3901742 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/02 11:13 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e056da87c780 c3901742 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/02 00:50 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e056da87c780 c3901742 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/02/24 18:39 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a1c24ab82279 d34966d1 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/02/17 22:30 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a64dcfb451e2 9be4ace3 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/02/17 11:44 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a64dcfb451e2 40a34ec9 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/02/14 12:25 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a64dcfb451e2 d9a046cf .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/02/10 01:03 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece ef44b750 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/02/05 16:39 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece 5896748e .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/11/23 19:12 upstream d13f3ac64efb 4fb8ef37 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/09/03 15:54 upstream e6b9dce0aeeb 96a211bc .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/09/02 00:07 upstream b320789d6883 807a3b61 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/10 06:12 upstream 561c80369df0 32a0e5ed .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/07/08 08:23 upstream d7b8f8e20813 4f67c4ae .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/15 05:16 upstream 9b332cece987 b6605ba8 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root INFO: rcu detected stall in smp_call_function
2020/07/13 08:57 upstream 4437dd6e8f71 9ebcc5b1 .config console log report syz C ci-upstream-kasan-gce-root
2025/08/03 12:28 net 1dbf1d590d10 7368264b .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/09/24 15:09 net-next dc1dea796b19 0abd0691 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/04 21:50 linux-next 47a8d4b89844 49379ee0 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/07/09 07:02 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci ec4801305969 abade794 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/07/05 05:45 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 7482bb149b9f d869b261 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/06/20 07:41 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 39dfc971e42d ed3e87f7 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/02/10 20:04 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece 43f51a00 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/02/06 01:08 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 2014c95afece 577d049b .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/11/19 22:50 upstream 8b690556d8fe 26ee5237 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/11/14 00:12 upstream 2ccec5944606 07e030de .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/11/13 02:13 upstream 24172e0d7990 07e030de .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/09/03 11:44 upstream e6b9dce0aeeb 96a211bc .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/07/12 00:34 upstream 40f92e79b0aa 3cda49cf .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/02/05 02:32 upstream d009de7d5428 4baca3d6 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/06 20:31 net d942fe13f72b 4bd24a3e .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/03 07:15 net 1dbf1d590d10 7368264b .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/06/28 08:40 net 8550821a1535 fc9d8ee5 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/11/22 23:23 net-next e05021a829b8 4fb8ef37 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/20 15:37 net-next 88224095b4e5 1c8c8cd8 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/20 13:59 net-next 88224095b4e5 1c8c8cd8 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/09/20 13:50 net-next 312e6f7676e6 67c37560 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/02/01 01:14 net-next c2933b2befe2 aa47157c .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/12 23:47 linux-next 2674d1eadaa2 c06e8995 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/11/25 08:32 upstream ac3fd01e4c1e 64219f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/11/21 04:03 upstream 8e621c9a3375 280ea308 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/10/23 00:26 upstream dd72c8fcf6d3 c0460fcd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/10/22 19:10 upstream dd72c8fcf6d3 252fbbad .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/10/21 14:15 upstream 6548d364a3e8 9832ed61 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/10/21 00:11 upstream 211ddde0823f 9832ed61 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/10/19 22:12 upstream d9043c79ba68 1c8c8cd8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/10/17 12:18 upstream 98ac9cc4b445 7adf5298 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/10/16 06:40 upstream 7ea30958b305 19568248 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/08/14 23:31 upstream 24ea63ea3877 dcc075fb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/07/25 17:32 upstream 2942242dde89 fb8f743d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/07/01 20:07 upstream 66701750d556 ffe4b334 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/06/30 00:53 upstream d0b3b7b22dfa fc9d8ee5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/06/28 22:11 upstream aaf724ed6926 fc9d8ee5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/06/26 03:29 upstream 92ca6c498a5e 26d77996 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/06/25 15:28 upstream 7595b66ae9de 26d77996 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/11/18 05:00 upstream e7c375b18160 ef766cd7 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 BUG: soft lockup in smp_call_function
2025/05/30 20:27 upstream f66bc387efbe 3d2f584d .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm64 BUG: soft lockup in smp_call_function
2025/10/17 19:51 bpf f6fddc6df3fc 7adf5298 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in smp_call_function
2025/10/09 13:10 bpf 23f3770e1a53 7e2882b3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in smp_call_function
2025/10/02 08:56 bpf f09f57c74677 a1859138 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in smp_call_function
2025/09/30 03:47 bpf e5f0a698b34e 86341da6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in smp_call_function
2025/09/12 21:14 bpf 22f20375f5b7 e2beed91 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in smp_call_function
2025/10/17 21:33 bpf-next 48a97ffc6c82 7adf5298 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in smp_call_function
2025/09/19 18:05 bpf-next 8cd189e414bb 67c37560 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in smp_call_function
2025/08/27 19:45 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 8f5ae30d69d7 e12e5ba4 .config console log report [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/11/19 12:24 upstream 8b690556d8fe 26ee5237 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/29 22:45 upstream e53642b87a4f fd2207e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/10/17 17:20 upstream cf1ea8854e4f 7adf5298 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/10 09:09 upstream 5472d60c129f ff1712fe .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/10/07 16:53 upstream c746c3b51698 8ef35d49 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/09/21 01:03 upstream 3b08f56fbbb9 67c37560 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/09/16 15:43 upstream 46a51f4f5eda e2beed91 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/09/14 23:30 upstream 79e8447ec662 e2beed91 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs INFO: rcu detected stall in smp_call_function
2025/08/16 01:04 upstream 038d61fd6422 1804e95e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/07/26 22:18 upstream 5f33ebd2018c fb8f743d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/07/12 02:53 upstream 40f92e79b0aa 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/07/11 21:06 upstream 40f92e79b0aa 3cda49cf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/07/09 03:35 upstream d006330be3f7 abade794 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/06/28 01:31 upstream 35e261cd95dd 803ce19b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/06/22 03:54 upstream 3f75bfff44be d6cdfb8a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/05/09 12:39 upstream 9c69f8884904 bb813bcc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in smp_call_function
2021/01/17 04:44 upstream 0da0a8a0a0e1 65a7a854 .config console log report info ci-upstream-kasan-gce-smack-root
2020/07/12 23:01 upstream 4437dd6e8f71 9ebcc5b1 .config console log report ci-upstream-kasan-gce-root
2020/07/10 22:54 upstream a581387e415b 18d18b59 .config console log report ci-upstream-kasan-gce-smack-root
2020/07/08 22:22 upstream 0bddd227f3dc bc238812 .config console log report ci-upstream-kasan-gce-selinux-root
2025/11/02 12:58 net d7d2fcf7ae31 2c50b6a9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/28 16:59 net 210b35d6a7ea fd2207e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/09/25 19:21 net d9c70e93ec59 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/09/15 09:56 net 2429a1976481 e2beed91 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/28 04:21 net ceb951552404 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/27 21:14 net ceb951552404 e12e5ba4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/15 20:30 net 79116acb75e1 1804e95e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/09 18:49 net 33caa208dba6 32a0e5ed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/07/28 12:24 net afd8c2c9e2e2 fb8f743d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/11/23 07:47 net-next e05021a829b8 4fb8ef37 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/26 05:33 linux-next 72fb0170ef1f c0460fcd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/10/15 04:22 linux-next 13863a59e410 b6605ba8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-rust-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/11 20:55 linux-next b1549501188c 32a0e5ed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/08/11 04:31 linux-next b1549501188c 32a0e5ed .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/08/08 14:40 linux-next b1549501188c 987b750d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/07/20 22:06 linux-next d086c886ceb9 7117feec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in smp_call_function
2024/10/20 08:33 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing 07b887f8236e cd6fc0a3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in smp_call_function
* Struck through repros no longer work on HEAD.