syzbot


BUG: soft lockup in smp_call_function

Status: upstream: reported C repro on 2020/07/12 23:02
Subsystems: kernel
[Documentation on labels]
Reported-by: syzbot+cce3691658bef1b12ac9@syzkaller.appspotmail.com
First crash: 1349d, last: 5d02h
Cause bisection: introduced by (bisect log) :
commit 5a781ccbd19e4664babcbe4b4ead7aa2b9283d22
Author: Vinicius Costa Gomes <vinicius.gomes@intel.com>
Date: Sat Sep 29 00:59:43 2018 +0000

  tc: Add support for configuring the taprio scheduler

Crash: BUG: soft lockup in smp_call_function (log)
Repro: C syz .config
  
Discussions (2)
Title Replies (including bot) Last reply
[syzbot] [ext4] Monthly Report 0 (1) 2023/03/24 15:59
BUG: soft lockup in smp_call_function 1 (4) 2020/07/15 05:43
Similar bugs (9)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
linux-4.19 BUG: soft lockup in smp_call_function C error 2 567d 696d 0/1 upstream: reported C repro on 2022/04/23 05:26
linux-6.1 BUG: soft lockup in smp_call_function 34 25d 367d 0/3 upstream: reported on 2023/03/18 00:36
android-54 BUG: soft lockup in smp_call_function 1 864d 864d 0/2 auto-closed as invalid on 2022/03/05 18:04
linux-4.14 BUG: soft lockup in smp_call_function C 1 393d 696d 0/1 upstream: reported C repro on 2022/04/23 04:43
linux-5.15 BUG: soft lockup in smp_call_function origin:upstream missing-backport C error 70 13d 365d 0/3 upstream: reported C repro on 2023/03/19 12:10
android-5-15 BUG: soft lockup in smp_call_function origin:upstream C error inconclusive 12 17h48m 379d 0/2 upstream: reported C repro on 2023/03/05 21:20
android-54 BUG: soft lockup in smp_call_function (2) C 1 37d 51d 0/2 upstream: reported C repro on 2024/01/28 03:58
android-5-10 BUG: soft lockup in smp_call_function C error 3 13d 240d 0/2 upstream: reported C repro on 2023/07/22 22:59
upstream INFO: rcu detected stall in smp_call_function perf C 107 1074d 1329d 20/26 fixed on 2021/04/13 06:26
Fix bisection attempts (1)
Created Duration User Patch Repo Result
2022/05/24 08:49 25m bisect fix net-old job log (0) log

Sample crash report:
 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
 </TASK>
watchdog: BUG: soft lockup - CPU#1 stuck for 225s! [kworker/u8:6:77]
Modules linked in:
irq event stamp: 351174
hardirqs last  enabled at (351173): [<ffffffff8ace8c6b>] irqentry_exit+0x3b/0x90 kernel/entry/common.c:351
hardirqs last disabled at (351174): [<ffffffff8ace744e>] sysvec_apic_timer_interrupt+0xe/0xb0 arch/x86/kernel/apic/apic.c:1043
softirqs last  enabled at (351160): [<ffffffff8ad26bf6>] softirq_handle_end kernel/softirq.c:400 [inline]
softirqs last  enabled at (351160): [<ffffffff8ad26bf6>] __do_softirq+0x596/0x8de kernel/softirq.c:583
softirqs last disabled at (351155): [<ffffffff8152e549>] invoke_softirq kernel/softirq.c:428 [inline]
softirqs last disabled at (351155): [<ffffffff8152e549>] __irq_exit_rcu kernel/softirq.c:633 [inline]
softirqs last disabled at (351155): [<ffffffff8152e549>] irq_exit_rcu+0xb9/0x120 kernel/softirq.c:645
CPU: 1 PID: 77 Comm: kworker/u8:6 Not tainted 6.8.0-syzkaller-05562-g61387b8dcf1d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:csd_lock_wait kernel/smp.c:311 [inline]
RIP: 0010:smp_call_function_many_cond+0x4ec/0x1590 kernel/smp.c:855
Code: 4d 48 b8 00 00 00 00 00 fc ff df 4d 89 f4 4c 89 f5 49 c1 ec 03 83 e5 07 49 01 c4 83 c5 03 e8 ab 05 0c 00 f3 90 41 0f b6 04 24 <40> 38 c5 7c 08 84 c0 0f 85 5d 0e 00 00 8b 43 08 31 ff 83 e0 01 41
RSP: 0018:ffffc9000213f910 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b94461e0 RCX: ffffffff8182349b
RDX: ffff888017fb0000 RSI: ffffffff81823475 RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: 0000000000000006 R12: ffffed1017288c3d
R13: 0000000000000001 R14: ffff8880b94461e8 R15: ffff8880b953f680
FS:  0000000000000000(0000) GS:ffff8880b9500000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00007f663aef3208 CR3: 000000000d57a000 CR4: 0000000000350ef0
Call Trace:
 <IRQ>
 </IRQ>
 <TASK>
 on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1023
 on_each_cpu include/linux/smp.h:71 [inline]
 text_poke_sync arch/x86/kernel/alternative.c:2086 [inline]
 text_poke_bp_batch+0x22b/0x760 arch/x86/kernel/alternative.c:2296
 text_poke_flush arch/x86/kernel/alternative.c:2487 [inline]
 text_poke_flush arch/x86/kernel/alternative.c:2484 [inline]
 text_poke_finish+0x30/0x40 arch/x86/kernel/alternative.c:2494
 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146
 jump_label_update+0x1d7/0x400 kernel/jump_label.c:829
 static_key_enable_cpuslocked+0x1b7/0x270 kernel/jump_label.c:205
 static_key_enable+0x1a/0x20 kernel/jump_label.c:218
 toggle_allocation_gate mm/kfence/core.c:826 [inline]
 toggle_allocation_gate+0xf8/0x250 mm/kfence/core.c:818
 process_one_work+0x9ac/0x1a60 kernel/workqueue.c:3254
 process_scheduled_works kernel/workqueue.c:3335 [inline]
 worker_thread+0x6c8/0xf70 kernel/workqueue.c:3416
 kthread+0x2c4/0x3a0 kernel/kthread.c:388
 ret_from_fork+0x48/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243
 </TASK>
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 PID: 5070 Comm: sshd Not tainted 6.8.0-syzkaller-05562-g61387b8dcf1d #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024
RIP: 0010:hlock_class+0x56/0x130 kernel/locking/lockdep.c:228
Code: 20 66 81 e3 ff 1f 0f b7 db be 08 00 00 00 48 89 d8 48 c1 e8 06 48 8d 3c c5 80 d1 d9 93 e8 52 76 7d 00 48 0f a3 1d ea 2f 6e 12 <73> 13 48 69 c3 c8 00 00 00 5b 48 05 a0 d5 d9 93 e9 f5 d3 66 09 48
RSP: 0018:ffffc90000007ad8 EFLAGS: 00000047
RAX: 0000000000000001 RBX: 0000000000000001 RCX: ffffffff816ba18e
RDX: fffffbfff27b3a31 RSI: 0000000000000008 RDI: ffffffff93d9d180
RBP: 0000000000000002 R08: 0000000000000000 R09: fffffbfff27b3a30
R10: ffffffff93d9d187 R11: ffffffff8b0f45c0 R12: 0000000000000002
R13: 0000000000000000 R14: ffff888022b30b28 R15: 0000000000000001
FS:  00007f685998d800(0000) GS:ffff8880b9400000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000000020000600 CR3: 00000000778f6000 CR4: 0000000000350ef0
Call Trace:
 <NMI>
 </NMI>
 <IRQ>
 check_wait_context kernel/locking/lockdep.c:4774 [inline]
 __lock_acquire+0x42f/0x3b30 kernel/locking/lockdep.c:5087
 lock_acquire kernel/locking/lockdep.c:5754 [inline]
 lock_acquire+0x1b1/0x540 kernel/locking/lockdep.c:5719
 __raw_spin_lock_irqsave include/linux/spinlock_api_smp.h:110 [inline]
 _raw_spin_lock_irqsave+0x3a/0x60 kernel/locking/spinlock.c:162
 debug_object_deactivate+0x13c/0x370 lib/debugobjects.c:763
 debug_hrtimer_deactivate kernel/time/hrtimer.c:428 [inline]
 debug_deactivate kernel/time/hrtimer.c:484 [inline]
 __run_hrtimer kernel/time/hrtimer.c:1660 [inline]
 __hrtimer_run_queues+0x47d/0xc20 kernel/time/hrtimer.c:1756
 hrtimer_interrupt+0x31b/0x800 kernel/time/hrtimer.c:1818
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1032 [inline]
 __sysvec_apic_timer_interrupt+0x112/0x410 arch/x86/kernel/apic/apic.c:1049
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline]
 sysvec_apic_timer_interrupt+0x90/0xb0 arch/x86/kernel/apic/apic.c:1043
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:lock_acquire+0x1f2/0x540 kernel/locking/lockdep.c:5722
Code: c1 05 ba f3 95 7e 83 f8 01 0f 85 c8 02 00 00 9c 58 f6 c4 02 0f 85 b3 02 00 00 48 85 ed 74 01 fb 48 b8 00 00 00 00 00 fc ff df <48> 01 c3 48 c7 03 00 00 00 00 48 c7 43 08 00 00 00 00 48 8b 84 24
RSP: 0018:ffffc900043d7d28 EFLAGS: 00000206
RAX: dffffc0000000000 RBX: 1ffff9200087afa7 RCX: ffffffff816ba18e
RDX: 0000000000000001 RSI: ffffffff8b0ccb80 RDI: ffffffff8b6e9920
RBP: 0000000000000200 R08: 0000000000000000 R09: fffffbfff27b3a36
R10: ffffffff93d9d1b7 R11: 0000000000000000 R12: 0000000000000001
R13: 0000000000000000 R14: ffff88801e4af3a0 R15: 0000000000000000
 __might_fault mm/memory.c:6080 [inline]
 __might_fault+0x11b/0x190 mm/memory.c:6073
 _copy_to_user+0x2b/0xc0 lib/usercopy.c:36
 copy_to_user include/linux/uaccess.h:191 [inline]
 __do_sys_rt_sigprocmask kernel/signal.c:3214 [inline]
 __se_sys_rt_sigprocmask kernel/signal.c:3191 [inline]
 __x64_sys_rt_sigprocmask+0x1e5/0x290 kernel/signal.c:3191
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xd5/0x260 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x6d/0x75
RIP: 0033:0x7f68594c2773
Code: 00 f3 a5 48 8d 74 24 88 48 b9 ff ff ff 7f fe ff ff ff 48 21 c8 48 89 44 24 88 41 ba 08 00 00 00 44 89 c7 b8 0e 00 00 00 0f 05 <45> 31 c0 3d 00 f0 ff ff 76 06 41 89 c0 41 f7 d8 44 89 c0 5a c3 41
RSP: 002b:00007ffd07e5cbe0 EFLAGS: 00000246 ORIG_RAX: 000000000000000e
RAX: ffffffffffffffda RBX: 0000000000060000 RCX: 00007f68594c2773
RDX: 00007ffd07e5ccc8 RSI: 00007ffd07e5cc48 RDI: 0000000000000001
RBP: 0000555f44252570 R08: 0000000000000001 R09: 0000000000000000
R10: 0000000000000008 R11: 0000000000000246 R12: 0000555f29a7faa4
R13: 0000000000000074 R14: 0000555f29a803e8 R15: 00007ffd07e5cc48
 </TASK>

Crashes (949):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/03/14 07:59 upstream 61387b8dcf1d f919f202 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/02/29 14:19 upstream e326df53af00 352ab904 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/19 19:59 upstream 9d1694dc91ce 21772ce4 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/12/22 02:20 upstream a4aebe936554 4f9530a3 .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/12/07 04:08 upstream bee0e7762ad2 e3299f55 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/11/26 07:34 upstream b46ae77f6787 5b429f39 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/08/26 17:51 upstream 7d2f353b2682 03d9c195 .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2022/12/05 07:42 upstream c2bf05db6c78 e080de16 .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root BUG: soft lockup in smp_call_function
2022/10/14 12:16 upstream 55be6084c8e0 4954e4b2 .config strace log report syz C [disk image] [vmlinux] ci-upstream-kasan-gce-root BUG: soft lockup in smp_call_function
2022/08/15 21:07 upstream 7ebfc85e2cd7 8dfcaa3d .config console log report syz C ci-upstream-kasan-gce BUG: soft lockup in smp_call_function
2021/12/28 04:31 net-old 79b69a83705e 6b3c5e64 .config console log report syz C ci-upstream-net-this-kasan-gce BUG: soft lockup in smp_call_function
2021/10/22 01:10 net-old e0bfcf9c77d9 c5cb7da8 .config console log report syz C ci-upstream-net-this-kasan-gce BUG: soft lockup in smp_call_function
2021/10/21 20:33 net-next-old dfcb63ce1de6 c5cb7da8 .config console log report syz C ci-upstream-net-kasan-gce BUG: soft lockup in smp_call_function
2021/07/17 16:50 net-next-old ab0441b4a920 f115ae98 .config console log report syz C ci-upstream-net-kasan-gce BUG: soft lockup in smp_call_function
2024/01/16 23:07 linux-next 8d04a7e2ee3f 2a7bcc7f .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root BUG: soft lockup in smp_call_function
2022/10/03 04:13 linux-next aaa11ce2ffc8 feb56351 .config strace log report syz C [disk image] [vmlinux] ci-upstream-linux-next-kasan-gce-root BUG: soft lockup in smp_call_function
2022/08/26 02:07 linux-next b5d939c95186 9b5bf4cd .config strace log report syz C ci-upstream-linux-next-kasan-gce-root BUG: soft lockup in smp_call_function
2023/08/28 14:58 upstream 2dde18cd1d8f 03d9c195 .config strace log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2023/08/19 11:28 upstream 4e7ffde6984a d216d8a0 .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2022/10/31 10:07 upstream b229b6ca5abb 2a71366b .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2022/04/16 15:03 upstream 59250f8a7f3a 8bcc32a6 .config console log report syz C ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2021/06/09 10:47 upstream 4c8684fe555e 5c2fe346 .config console log report syz C ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2020/08/16 01:04 upstream c9c9735c46f5 424dd8e7 .config console log report syz C ci-upstream-kasan-gce-root
2020/07/22 18:32 upstream 4fa640dc5230 128cd85f .config console log report syz C ci-upstream-kasan-gce-smack-root
2020/07/15 07:21 upstream e9919e11e219 609fb517 .config console log report syz C ci-upstream-kasan-gce-selinux-root
2020/07/13 08:57 upstream 4437dd6e8f71 9ebcc5b1 .config console log report syz C ci-upstream-kasan-gce-root
2023/08/23 13:22 net de43975721b9 b81ca3f6 .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2023/07/19 01:37 net 8fcd7c7b3a38 022df2bb .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2023/07/18 17:30 net 8fcd7c7b3a38 022df2bb .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2023/08/21 14:45 net-next cb39c35783f2 d216d8a0 .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2020/08/12 11:25 linux-next bc09acc9f224 bb3e5fe6 .config console log report syz C ci-upstream-linux-next-kasan-gce-root
2024/03/09 03:15 upstream 10d48d70e82d 96d142e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/03/02 19:02 upstream 5ad3cb0ed525 25905f5d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/03/01 12:59 upstream 87adedeba51a 352ab904 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/02/22 01:49 upstream 39133352cbed 345111b5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/02/19 05:01 upstream b401b621758e 578f7538 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/30 15:46 upstream 861c0981648f 7f400fcb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/26 10:38 upstream ecb1b8288dc7 cc4a4020 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/20 19:22 upstream 9d64bf433c53 9bd8dcda .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/20 02:17 upstream 9d64bf433c53 21772ce4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/17 16:58 upstream 052d534373b7 915053c7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/15 23:16 upstream 052d534373b7 2a7bcc7f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/06 14:42 upstream 95c8a35f1c01 d0304e9c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/05 01:34 upstream 5eff55d725a4 28c42cff .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/04 05:12 upstream ac865f00af29 28c42cff .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/03 00:20 upstream 610a9b8f49fb fb427a07 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2024/01/01 15:08 upstream 610a9b8f49fb fb427a07 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/12/29 22:25 upstream 8735c7c84d1b fb427a07 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/12/02 05:11 upstream 815fb87b7530 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/11/28 13:17 upstream df60cee26a2e 9fe51b7c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/11/27 23:39 upstream 2cc14f52aeb7 9fe51b7c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/11/12 07:32 upstream 1b907d050735 6d6dbf8a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/10/25 19:24 upstream 611da07b89fd 72e794c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/10/19 17:03 upstream dd72f9c7e512 42e1d524 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/10/18 04:51 upstream 06dc10eae55b 342b9c55 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/10/07 00:29 upstream af95dc6fdc25 ea12a918 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/09/30 01:18 upstream 71e58659bfc0 8e26a358 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/09/18 23:41 upstream 2cf0f7156238 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2023/09/10 18:24 upstream 535a265d7f0d 6654cf89 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2021/11/14 13:28 upstream c8c109546a19 83f5c9b5 .config console log report info ci-upstream-kasan-gce-386 BUG: soft lockup in smp_call_function
2021/08/11 20:37 upstream bf152b0b41dc 6972b106 .config console log report info ci-qemu2-arm32 BUG: soft lockup in smp_call_function
2024/02/06 15:08 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 41bccc98fb79 6404acf9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2024/01/28 21:46 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 0802e17d9aca cc4a4020 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2024/01/20 22:21 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 0802e17d9aca 9bd8dcda .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2024/01/12 01:40 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 0802e17d9aca 00f3cc59 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2024/01/08 06:50 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 0802e17d9aca d0304e9c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/12/08 18:10 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci d46efae31672 28b24332 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/11/24 12:13 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 8de1e7afcc1c 5b429f39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/11/20 15:09 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 8de1e7afcc1c cb976f63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/11/16 11:24 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 8de1e7afcc1c cb976f63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/11/13 01:32 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 8de1e7afcc1c 6d6dbf8a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/11/08 12:07 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 8de1e7afcc1c 83211397 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/11/03 22:10 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 8de1e7afcc1c 500bfdc4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/11/03 06:14 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 8de1e7afcc1c c4ac074c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/10/31 14:53 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 8de1e7afcc1c 58499c95 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/10/22 11:35 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 78124b0c1d10 361b23dc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/10/12 16:54 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 19af4a4ed414 fc170927 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/10/12 09:36 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 19af4a4ed414 83165b57 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/10/10 17:55 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 19af4a4ed414 83165b57 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2023/09/29 03:43 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci bf6547d8715b d265efd8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2024/01/17 15:26 upstream 052d534373b7 915053c7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2023/11/20 02:37 upstream 98b1cc82c4af cb976f63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2023/11/17 19:59 upstream 6bc40e44f1dd cb976f63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2023/09/16 15:14 upstream 57d88e8a5974 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2023/03/02 22:49 upstream 04a357b1f6f0 f8902b57 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in smp_call_function
2021/01/17 04:44 upstream 0da0a8a0a0e1 65a7a854 .config console log report info ci-upstream-kasan-gce-smack-root
2020/07/12 23:01 upstream 4437dd6e8f71 9ebcc5b1 .config console log report ci-upstream-kasan-gce-root
2020/07/10 22:54 upstream a581387e415b 18d18b59 .config console log report ci-upstream-kasan-gce-smack-root
2020/07/08 22:22 upstream 0bddd227f3dc bc238812 .config console log report ci-upstream-kasan-gce-selinux-root
2021/09/03 00:40 bpf 57f780f1c433 15cea0a3 .config console log report info ci-upstream-bpf-kasan-gce INFO: rcu detected stall in smp_call_function
2020/11/02 15:12 bpf-next cb5dc5b062a9 8bc4594f .config console log report info ci-upstream-bpf-next-kasan-gce
2023/11/22 14:57 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing e8d69c2b55af 03e12510 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in smp_call_function
* Struck through repros no longer work on HEAD.