syzbot


BUG: soft lockup in sys_sendmsg (2)

Status: upstream: reported C repro on 2025/06/05 02:15
Subsystems: block
[Documentation on labels]
Reported-by: syzbot+4032319a6a907f69e985@syzkaller.appspotmail.com
First crash: 389d, last: 23h23m
Cause bisection: failed (error log, bisect log)
  
Fix bisection: failed (error log, bisect log)
  
✨ AI Jobs (1)
ID Workflow Result Correct Bug Created Started Finished Revision Error
e36d4a69-29e9-4014-bb0f-8260cc291fe9 assessment-security 💥 BUG: soft lockup in sys_sendmsg (2) 2026/05/17 04:29 2026/05/17 04:29 2026/05/17 04:29 de5aae85e5f28e2fa1c7deefcc24fe286abe5140 failed to run ["git" "-c" "core.hooksPath=/dev/null" "fetch" "--force" "--tags" "433dfd5a8a5d80bbf0669b14e9ed908911a52dd6" "bf45a62baffc414ef06cb8953fae7bc0aac1bfe2"]: exit status 128 fatal: remote error: upload-pack: not our ref bf45a62baffc414ef06cb8953fae7bc0aac1bfe2
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [scsi?] [mm?] [block?] BUG: soft lockup in sys_sendmsg (2) 1 (4) 2025/10/18 05:53
Similar bugs (13)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-6-1 BUG: soft lockup in sys_sendmsg origin:upstream 1 C 3 744d 772d 0/2 upstream: reported C repro on 2024/04/09 06:46
linux-6.1 INFO: rcu detected stall in sendmsg (5) 1 C 30 12d 332d 0/3 upstream: reported C repro on 2025/06/23 07:43
linux-6.1 BUG: soft lockup in sys_sendmsg 1 2 1073d 1080d 0/3 auto-obsoleted due to no activity on 2023/09/20 17:26
android-5-10 BUG: soft lockup in sys_sendmsg 1 C error 64 25d 790d 0/2 upstream: reported C repro on 2024/03/22 10:41
upstream BUG: soft lockup in sys_sendmsg tipc batman 1 C 3 787d 829d 25/29 fixed on 2024/05/22 23:36
android-5-15 BUG: soft lockup in sys_sendmsg origin:upstream 1 C error 13 616d 790d 0/2 upstream: reported C repro on 2024/03/22 10:44
linux-5.15 INFO: rcu detected stall in sys_sendmsg origin:upstream 1 C error 50 3d12h 792d 0/3 upstream: reported C repro on 2024/03/19 21:37
linux-6.1 BUG: soft lockup in sys_sendmsg (2) origin:upstream 1 C done 1 774d 774d 3/3 fixed on 2024/05/15 09:17
linux-6.6 INFO: rcu detected stall in sendmsg 1 11 12d 293d 0/2 upstream: reported on 2025/07/31 17:16
linux-6.1 INFO: rcu detected stall in sys_sendmsg 1 6 600d 686d 0/3 auto-obsoleted due to no activity on 2025/01/06 11:24
upstream INFO: rcu detected stall in sys_sendmsg (2) cgroups mm 1 5 2360d 2361d 0/29 closed as invalid on 2019/12/04 14:14
upstream INFO: rcu detected stall in sys_sendmsg (3) kernel 1 1 2325d 2325d 0/29 closed as invalid on 2020/01/08 05:33
upstream INFO: rcu detected stall in sys_sendmsg net 1 C done 2 2441d 2441d 13/29 fixed on 2019/10/09 10:54
Last patch testing requests (5)
Created Duration User Patch Repo Result
2026/04/19 08:30 40m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci error
2026/02/01 19:35 27m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci error
2026/02/01 19:35 26m retest repro upstream OK log
2025/11/09 02:01 51m retest repro git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci report log
2025/10/10 11:26 1h40m retest repro linux-next OK log

Sample crash report:
watchdog: BUG: soft lockup - CPU#0 stuck for 22s! [syz.0.106:5143]
Modules linked in:
irq event stamp: 7429
hardirqs last  enabled at (7428): [<ffff80008673eb94>] irqentry_exit_to_kernel_mode_after_preempt include/linux/irq-entry-common.h:507 [inline]
hardirqs last  enabled at (7428): [<ffff80008673eb94>] arm64_exit_to_kernel_mode+0x80/0x94 arch/arm64/kernel/entry-common.c:62
hardirqs last disabled at (7429): [<ffff80008673aba4>] __el1_irq arch/arm64/kernel/entry-common.c:510 [inline]
hardirqs last disabled at (7429): [<ffff80008673aba4>] el1_interrupt+0x28/0x60 arch/arm64/kernel/entry-common.c:526
softirqs last  enabled at (512): [<ffff800084aa9cf8>] spin_unlock_bh include/linux/spinlock.h:396 [inline]
softirqs last  enabled at (512): [<ffff800084aa9cf8>] release_sock+0x150/0x228 net/core/sock.c:3825
softirqs last disabled at (518): [<ffff800084abdcfc>] spin_lock_bh include/linux/spinlock.h:348 [inline]
softirqs last disabled at (518): [<ffff800084abdcfc>] lock_sock_nested+0x70/0x110 net/core/sock.c:3802
CPU: 0 UID: 0 PID: 5143 Comm: syz.0.106 Not tainted syzkaller #0 PREEMPT 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026
pstate: 03400005 (nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : queued_spin_lock_slowpath+0x138/0xd0c kernel/locking/qspinlock.c:197
lr : queued_spin_lock_slowpath+0x144/0xd0c kernel/locking/qspinlock.c:197
sp : ffff800098b175e0
x29: ffff800098b17680 x28: 1fffe0001900194b x27: ffff800098b17600
x26: ffff0000c9775700 x25: dfff800000000000 x24: ffff700013162ec0
x23: ffff700013162ee0 x22: ffff0000c9775710 x21: ffff0000c800ca58
x20: ffff0000c800ca60 x19: ffff0000c800ca50 x18: 0000000000000000
x17: 0000000000000000 x16: 0000000000000000 x15: 0000000020000080
x14: 0000000000000000 x13: 0000000000000001 x12: 0000000000000000
x11: 0000000000000000 x10: ffff60001900194b x9 : 0000000000000000
x8 : 0000000000000001 x7 : ffff800084abdcfc x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000001 x3 : ffff8000867600d4
x2 : 0000000000000000 x1 : 0000000000000001 x0 : 0000000000000001
Call trace:
 __cmpwait_case_8 arch/arm64/include/asm/cmpxchg.h:231 [inline] (P)
 __cmpwait arch/arm64/include/asm/cmpxchg.h:259 [inline] (P)
 queued_spin_lock_slowpath+0x138/0xd0c kernel/locking/qspinlock.c:197 (P)
 queued_spin_lock include/asm-generic/qspinlock.h:114 [inline]
 do_raw_spin_lock+0x21c/0x2d0 kernel/locking/spinlock_debug.c:116
 __raw_spin_lock_bh include/linux/spinlock_api_smp.h:151 [inline]
 _raw_spin_lock_bh+0x50/0x60 kernel/locking/spinlock.c:182
 spin_lock_bh include/linux/spinlock.h:348 [inline]
 lock_sock_nested+0x70/0x110 net/core/sock.c:3802
 lock_sock include/net/sock.h:1713 [inline]
 tipc_sendstream+0x50/0x84 net/tipc/socket.c:1545
 sock_sendmsg_nosec net/socket.c:787 [inline]
 __sock_sendmsg+0xc8/0x138 net/socket.c:802
 ____sys_sendmsg+0x418/0x70c net/socket.c:2698
 ___sys_sendmsg+0x198/0x224 net/socket.c:2752
 __sys_sendmsg+0x160/0x214 net/socket.c:2784
 __do_sys_sendmsg net/socket.c:2789 [inline]
 __se_sys_sendmsg net/socket.c:2787 [inline]
 __arm64_sys_sendmsg+0x80/0x94 net/socket.c:2787
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x244 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0xe8/0x23c arch/arm64/kernel/syscall.c:121
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:140
 el0_svc+0x64/0x260 arch/arm64/kernel/entry-common.c:740
 el0t_64_sync_handler+0x48/0x148 arch/arm64/kernel/entry-common.c:759
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:594
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 5144 Comm: syz.0.106 Not tainted syzkaller #0 PREEMPT 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/18/2026
pstate: 83400005 (Nzcv daif +PAN -UAO +TCO +DIT -SSBS BTYPE=--)
pc : should_resched arch/arm64/include/asm/preempt.h:78 [inline]
pc : __local_bh_enable_ip+0x1f0/0x35c kernel/softirq.c:457
lr : __local_bh_enable_ip+0x1ec/0x35c kernel/softirq.c:455
sp : ffff800098b26450
x29: ffff800098b26460 x28: ffff0000c800c880 x27: ffff800098b265a0
x26: ffff700013164cac x25: ffff800098b267c0 x24: 0000000000000001
x23: dfff800000000000 x22: 1fffe000192ee741 x21: ffff80008627e568
x20: 0000000000000201 x19: ffff0000c9773a08 x18: 00000000ffffffff
x17: ffff80008a0e0c80 x16: ffff80008a3f9ef8 x15: ffff800084a9e588
x14: ffff800084a9e464 x13: 0000000000000001 x12: 0000000000000000
x11: ffff80008a356d08 x10: 0000000000000003 x9 : 0000000000000000
x8 : 0000000002a1e992 x7 : 0000000000000000 x6 : 0000000000000000
x5 : 0000000000000000 x4 : 0000000000000008 x3 : ffff800080154bd4
x2 : 0000000000000002 x1 : ffff0000c9773a00 x0 : ffff80012588a000
Call trace:
 __daif_local_irq_enable arch/arm64/include/asm/irqflags.h:26 [inline] (P)
 arch_local_irq_enable arch/arm64/include/asm/irqflags.h:48 [inline] (P)
 __local_bh_enable_ip+0x1f0/0x35c kernel/softirq.c:455 (P)
 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline]
 _raw_spin_unlock_bh+0x3c/0x4c kernel/locking/spinlock.c:214
 spin_unlock_bh include/linux/spinlock.h:396 [inline]
 tipc_skb_peek_port net/tipc/msg.h:1235 [inline]
 tipc_sk_rcv+0x2c8/0x1534 net/tipc/socket.c:2491
 tipc_node_xmit+0x1c8/0xb9c net/tipc/node.c:1701
 tipc_node_xmit_skb net/tipc/node.c:1766 [inline]
 tipc_node_distr_xmit+0x260/0x364 net/tipc/node.c:1781
 tipc_sk_rcv+0xf98/0x1534 net/tipc/socket.c:2501
 tipc_node_xmit+0x1c8/0xb9c net/tipc/node.c:1701
 tipc_sk_push_backlog+0x3b0/0x764 net/tipc/socket.c:1312
 tipc_sk_conn_proto_rcv net/tipc/socket.c:1366 [inline]
 tipc_sk_proto_rcv+0x5f8/0xeb8 net/tipc/socket.c:2156
 tipc_sk_filter_rcv+0x1d48/0x20d0 net/tipc/socket.c:2352
 tipc_sk_enqueue net/tipc/socket.c:2445 [inline]
 tipc_sk_rcv+0x5c4/0x1534 net/tipc/socket.c:2497
 tipc_node_xmit+0x1c8/0xb9c net/tipc/node.c:1701
 tipc_node_xmit_skb net/tipc/node.c:1766 [inline]
 tipc_node_distr_xmit+0x260/0x364 net/tipc/node.c:1781
 tipc_sk_backlog_rcv+0x178/0x238 net/tipc/socket.c:2412
 sk_backlog_rcv include/net/sock.h:1190 [inline]
 __release_sock+0x178/0x2c0 net/core/sock.c:3216
 release_sock+0x174/0x228 net/core/sock.c:3815
 sockopt_release_sock net/core/sock.c:1163 [inline]
 sk_setsockopt+0x2148/0x25f4 net/core/sock.c:1676
 sock_setsockopt+0x68/0x80 net/core/sock.c:1683
 do_sock_setsockopt+0x1a0/0x330 net/socket.c:2377
 __sys_setsockopt+0x104/0x170 net/socket.c:2406
 __do_sys_setsockopt net/socket.c:2412 [inline]
 __se_sys_setsockopt net/socket.c:2409 [inline]
 __arm64_sys_setsockopt+0xb8/0xd4 net/socket.c:2409
 __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]
 invoke_syscall+0x98/0x244 arch/arm64/kernel/syscall.c:49
 el0_svc_common+0xe8/0x23c arch/arm64/kernel/syscall.c:121
 do_el0_svc+0x48/0x58 arch/arm64/kernel/syscall.c:140
 el0_svc+0x64/0x260 arch/arm64/kernel/entry-common.c:740
 el0t_64_sync_handler+0x48/0x148 arch/arm64/kernel/entry-common.c:759
 el0t_64_sync+0x198/0x19c arch/arm64/kernel/entry.S:594
watchdog: BUG: soft lockup - CPU#1 stuck for 22s! [syz.0.106:5144]
Modules linked in:
irq event stamp: 44188623
hardirqs last  enabled at (44188622): [<ffff800080308254>] __local_bh_enable_ip+0x1ec/0x35c kernel/softirq.c:455
hardirqs last disabled at (44188623): [<ffff80008673aba4>] __el1_irq arch/arm64/kernel/entry-common.c:510 [inline]
hardirqs last disabled at (44188623): [<ffff80008673aba4>] el1_interrupt+0x28/0x60 arch/arm64/kernel/entry-common.c:526
softirqs last  enabled at (72): [<ffff80008627e568>] spin_unlock_bh include/linux/spinlock.h:396 [inline]
softirqs last  enabled at (72): [<ffff80008627e568>] tipc_skb_peek_port net/tipc/msg.h:1235 [inline]
softirqs last  enabled at (72): [<ffff80008627e568>] tipc_sk_rcv+0x2c8/0x1534 net/tipc/socket.c:2491
softirqs last disabled at (74): [<ffff80008627e588>] spin_trylock_bh include/linux/spinlock.h:414 [inline]
softirqs last disabled at (74): [<ffff80008627e588>] tipc_sk_rcv+0x2e8/0x1534 net/tipc/socket.c:2496

Crashes (47):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2026/05/20 13:07 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 4b4362973b6f 62fb93a2 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in sys_sendmsg
2025/10/18 05:53 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci bf45a62baffc 1c8c8cd8 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in sys_sendmsg
2025/12/30 05:44 bpf 22cc16c04b78 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in sys_sendmsg
2025/05/16 16:19 bpf b4432656b36e cfde8269 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in sys_sendmsg
2026/03/26 09:28 bpf-next 400ff899c336 c6143aac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in sys_sendmsg
2026/03/14 17:55 bpf-next bb41fcef5c79 ee8d34d6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in sys_sendmsg
2026/03/01 22:10 bpf-next 309d8808eef9 43249bac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in sys_sendmsg
2026/02/21 09:42 bpf-next 9cd168a2720b 6e7b5511 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in sys_sendmsg
2026/02/08 08:39 bpf-next db975debcb8c 4c131dc4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in sys_sendmsg
2026/02/07 06:56 bpf-next b8c89f5cc203 f20fc9f9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in sys_sendmsg
2025/05/29 18:04 bpf-next 90b83efa6701 3d2f584d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in sys_sendmsg
2025/04/26 13:37 bpf-next 91dbac407653 c6b4fb39 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in sys_sendmsg
2025/10/14 18:50 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci bf45a62baffc b6605ba8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in sys_sendmsg
2025/08/15 01:19 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 8f5ae30d69d7 dcc075fb .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in sys_sendmsg
2026/05/14 17:38 upstream e1914add2799 6ccb967e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in sys_sendmsg
2026/03/16 13:48 upstream f338e7738378 64e21424 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in sys_sendmsg
2026/01/10 23:50 upstream b6151c4e60e5 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in sys_sendmsg
2026/01/05 23:19 upstream 3609fa95fb0f d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/12/26 02:08 upstream ccd1cdca5cd4 d6526ea3 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in sys_sendmsg
2025/12/02 06:41 upstream 1d18101a644e d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/09/14 20:44 upstream f83a4f2a4d8c e2beed91 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in sys_sendmsg
2025/07/03 22:01 upstream 17bbde2e1716 115ceea7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in sys_sendmsg
2025/06/05 07:06 upstream 64980441d269 6b6b5f21 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in sys_sendmsg
2025/06/05 02:14 upstream 1af80d00e1e0 fd5e6e61 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/05/08 17:39 upstream 2c89c1b655c0 dbf35fa1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in sys_sendmsg
2025/08/17 13:43 upstream 99bade344cfa 1804e95e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in sys_sendmsg
2026/04/05 06:03 net 1caa871bb061 4440e7c2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2026/03/18 14:40 net 64dcbde7f8f8 0199f9a1 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2026/03/11 23:29 net 908c344d5cfa 2d88ab01 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2026/03/06 22:40 net f76a93241d71 41d8037d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2026/03/04 10:21 net 46d0d6f50dab 4180d919 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2026/02/12 10:22 net bf9cf80cab81 76a109e2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2026/02/11 07:51 net 3a23b80dd72d 441e25b7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2026/02/10 14:39 net ae88a5d2f29b 91d776d3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2026/02/03 16:35 net 3125fc170169 6df4c87a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/12/03 14:12 net 108f9405ce81 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/11/17 01:41 net 5442a9da6978 f7988ea4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/10/26 01:53 net 84a905290cb4 c0460fcd .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/09/24 12:49 net ca9f9cdc4de9 0abd0691 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/09/09 11:02 net 1dbfb0363224 d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/06/30 14:03 net 2def09ead4ad fc9d8ee5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in sys_sendmsg
2026/01/18 06:28 net-next b79040468016 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/09/04 12:49 net-next 0e2a5208cc3d d291dd2d .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/08/18 11:23 net-next bab3ce404553 1804e95e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in sys_sendmsg
2025/11/21 06:21 linux-next 88cbd8ac379c 280ea308 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in sys_sendmsg
2025/09/18 08:45 linux-next ae2d20002576 e2beed91 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in sys_sendmsg
2025/09/02 04:28 linux-next 7fa4d8dc380f 807a3b61 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-rust-kasan-gce INFO: rcu detected stall in sys_sendmsg
* Struck through repros no longer work on HEAD.