syzbot


BUG: soft lockup in smp_call_function

Status: upstream: reported C repro on 2020/07/12 23:02
Subsystems: kernel
[Documentation on labels]
Reported-by: syzbot+cce3691658bef1b12ac9@syzkaller.appspotmail.com
First crash: 1999d, last: 1h37m
Cause bisection: introduced by (bisect log) :
commit 5a781ccbd19e4664babcbe4b4ead7aa2b9283d22
Author: Vinicius Costa Gomes <vinicius.gomes@intel.com>
Date: Sat Sep 29 00:59:43 2018 +0000

  tc: Add support for configuring the taprio scheduler

Crash: BUG: soft lockup in smp_call_function (log)
Repro: C syz .config
  
Discussions (2)
Title Replies (including bot) Last reply
[syzbot] [ext4] Monthly Report 0 (1) 2023/03/24 15:59
BUG: soft lockup in smp_call_function 1 (4) 2020/07/15 05:43
Similar bugs (18)
Kernel Title Rank 🛈 Repro Cause bisect Fix bisect Count Last Reported Patched Status
android-6-1 BUG: soft lockup in smp_call_function origin:upstream missing-backport 1 C inconclusive 348 8h29m 635d 0/2 upstream: reported C repro on 2024/04/02 06:05
linux-4.19 BUG: soft lockup in smp_call_function 1 C error 2 1216d 1345d 0/1 upstream: reported C repro on 2022/04/23 05:26
linux-6.1 BUG: soft lockup in smp_call_function origin:upstream 1 C error 176 10d 1016d 0/3 upstream: reported C repro on 2023/03/18 00:36
linux-6.6 INFO: rcu detected stall in smp_call_function origin:lts-only 1 C 187 1h06m 140d 0/2 upstream: reported C repro on 2025/08/10 04:01
android-54 BUG: soft lockup in smp_call_function 1 1 1514d 1514d 0/2 auto-closed as invalid on 2022/03/05 18:04
android-6-12 BUG: soft lockup in smp_call_function 1 1 149d 149d 0/1 auto-obsoleted due to no activity on 2025/10/30 09:23
linux-4.14 BUG: soft lockup in smp_call_function 1 C 1 1043d 1345d 0/1 upstream: reported C repro on 2022/04/23 04:43
linux-5.15 BUG: soft lockup in smp_call_function missing-backport origin:lts-only 1 C error 292 10d 1015d 0/3 upstream: reported C repro on 2023/03/19 12:10
android-5-15 BUG: soft lockup in smp_call_function origin:upstream 1 C error inconclusive 966 13d 1029d 0/2 upstream: reported C repro on 2023/03/05 21:20
android-54 BUG: soft lockup in smp_call_function (2) 1 C 41 243d 700d 0/2 upstream: reported C repro on 2024/01/28 03:58
android-5-10 BUG: soft lockup in smp_call_function 1 C error 152 2d20h 890d 0/2 upstream: reported C repro on 2023/07/22 22:59
upstream INFO: rcu detected stall in smp_call_function perf 1 C 107 1723d 1978d 20/29 fixed on 2021/04/13 06:26
upstream INFO: rcu detected stall in smp_call_function_many perf 1 138 2679d 2834d 0/29 closed as invalid on 2018/12/31 07:57
upstream BUG: soft lockup in smp_call_function_single (2) kernel 1 1 2666d 2666d 0/29 auto-closed as invalid on 2019/03/09 01:12
upstream BUG: soft lockup in smp_call_function_single bpf 1 24 2672d 2726d 0/29 closed as invalid on 2018/09/05 12:51
upstream INFO: rcu detected stall in smp_call_function_single kernel 1 4 2746d 2784d 0/29 closed as invalid on 2018/07/20 09:38
android-49 INFO: rcu detected stall in smp_call_function_single 1 1 2695d 2695d 0/3 auto-closed as invalid on 2019/02/22 15:22
upstream INFO: rcu detected stall in smp_call_function_single (2) kernel 1 3 2671d 2696d 0/29 closed as invalid on 2018/09/05 12:51
Fix bisection attempts (1)
Created Duration User Patch Repo Result
2022/05/24 08:49 25m bisect fix net-old OK (0) job log log

Sample crash report:
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
 </TASK>
watchdog: BUG: soft lockup - CPU#0 stuck for 246s! [kworker/u8:14:3561]
Modules linked in:
irq event stamp: 623296
hardirqs last  enabled at (623295): [<ffffffff8b76abfd>] irqentry_exit+0x1dd/0x8c0 kernel/entry/common.c:219
hardirqs last disabled at (623296): [<ffffffff8b76984e>] sysvec_apic_timer_interrupt+0xe/0xc0 arch/x86/kernel/apic/apic.c:1056
softirqs last  enabled at (623292): [<ffffffff817dd9d9>] __do_softirq kernel/softirq.c:656 [inline]
softirqs last  enabled at (623292): [<ffffffff817dd9d9>] invoke_softirq kernel/softirq.c:496 [inline]
softirqs last  enabled at (623292): [<ffffffff817dd9d9>] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:723
softirqs last disabled at (623275): [<ffffffff817dd9d9>] __do_softirq kernel/softirq.c:656 [inline]
softirqs last disabled at (623275): [<ffffffff817dd9d9>] invoke_softirq kernel/softirq.c:496 [inline]
softirqs last disabled at (623275): [<ffffffff817dd9d9>] __irq_exit_rcu+0x109/0x170 kernel/softirq.c:723
CPU: 0 UID: 0 PID: 3561 Comm: kworker/u8:14 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
Workqueue: events_unbound toggle_allocation_gate
RIP: 0010:csd_lock_wait kernel/smp.c:342 [inline]
RIP: 0010:smp_call_function_many_cond+0xdfd/0x15e0 kernel/smp.c:877
Code: 57 48 8b 54 24 10 4c 89 74 24 10 49 89 d5 48 89 d5 48 89 54 24 18 49 c1 ed 03 83 e5 07 4d 01 e5 83 c5 03 e8 e5 5b 0c 00 f3 90 <41> 0f b6 45 00 40 38 c5 7c 08 84 c0 0f 85 b6 05 00 00 8b 43 08 31
RSP: 0018:ffffc9000c737808 EFLAGS: 00000293
RAX: 0000000000000000 RBX: ffff8880b8540e00 RCX: ffffffff81b27a51
RDX: ffff888031dedb80 RSI: ffffffff81b27a2b RDI: 0000000000000005
RBP: 0000000000000003 R08: 0000000000000005 R09: 0000000000000000
R10: 0000000000000001 R11: ffff888031dee6b0 R12: dffffc0000000000
R13: ffffed10170a81c1 R14: 0000000000000001 R15: 0000000000000001
FS:  0000000000000000(0000) GS:ffff8881248f6000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055e1057aa9c0 CR3: 000000000e184000 CR4: 0000000000350ef0
Call Trace:
 <TASK>
 on_each_cpu_cond_mask+0x40/0x90 kernel/smp.c:1043
 on_each_cpu include/linux/smp.h:71 [inline]
 smp_text_poke_sync_each_cpu arch/x86/kernel/alternative.c:2711 [inline]
 smp_text_poke_batch_finish+0x27b/0xdb0 arch/x86/kernel/alternative.c:2921
 arch_jump_label_transform_apply+0x1c/0x30 arch/x86/kernel/jump_label.c:146
 jump_label_update+0x376/0x550 kernel/jump_label.c:919
 static_key_enable_cpuslocked+0x1b7/0x270 kernel/jump_label.c:210
 static_key_enable+0x1a/0x20 kernel/jump_label.c:223
 toggle_allocation_gate mm/kfence/core.c:874 [inline]
 toggle_allocation_gate+0xfa/0x280 mm/kfence/core.c:866
 process_one_work+0x9ba/0x1b20 kernel/workqueue.c:3257
 process_scheduled_works kernel/workqueue.c:3340 [inline]
 worker_thread+0x6c8/0xf10 kernel/workqueue.c:3421
 kthread+0x3c5/0x780 kernel/kthread.c:463
 ret_from_fork+0x983/0xb10 arch/x86/kernel/process.c:158
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246
 </TASK>
Sending NMI from CPU 0 to CPUs 1:
NMI backtrace for cpu 1
CPU: 1 UID: 0 PID: 6020 Comm: syz.0.17 Not tainted syzkaller #0 PREEMPT(full) 
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025
RIP: 0010:rcu_is_watching_curr_cpu include/linux/context_tracking.h:128 [inline]
RIP: 0010:rcu_is_watching+0x1e/0xc0 kernel/rcu/tree.c:751
Code: 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 55 53 65 ff 05 c3 9e 0f 12 e8 ce bd d3 09 48 c7 c3 e8 d9 b3 93 89 c5 83 f8 07 <0f> 87 82 00 00 00 48 8d 3c ed 20 8f d7 8d 48 b8 00 00 00 00 00 fc
RSP: 0018:ffffc90000a08cd8 EFLAGS: 00000097
RAX: 0000000000000001 RBX: ffffffff93b3d9e8 RCX: 0000000000000016
RDX: ffffffff9aebf578 RSI: ffffffff8bf2b600 RDI: ffffffff8bf2b640
RBP: 0000000000000001 R08: 0000000000000001 R09: fffff52000141198
R10: 0000000000000003 R11: ffff88802a34e6b0 R12: ffffffff84b3ad3c
R13: dffffc0000000000 R14: ffff888032bfe300 R15: 1ffff920001411ac
FS:  0000000000000000(0000) GS:ffff8881249f6000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 0000200000000600 CR3: 000000000e184000 CR4: 0000000000350ef0
Call Trace:
 <IRQ>
 trace_lock_release include/trace/events/lock.h:69 [inline]
 lock_release+0x201/0x2d0 kernel/locking/lockdep.c:5879
 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:149 [inline]
 _raw_spin_unlock_irqrestore+0x1a/0x80 kernel/locking/spinlock.c:194
 debug_object_deactivate+0x1ec/0x3a0 lib/debugobjects.c:888
 debug_hrtimer_deactivate kernel/time/hrtimer.c:443 [inline]
 debug_deactivate kernel/time/hrtimer.c:483 [inline]
 __run_hrtimer kernel/time/hrtimer.c:1745 [inline]
 __hrtimer_run_queues+0x46f/0xc40 kernel/time/hrtimer.c:1841
 hrtimer_interrupt+0x397/0x8e0 kernel/time/hrtimer.c:1903
 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1045 [inline]
 __sysvec_apic_timer_interrupt+0x10b/0x3c0 arch/x86/kernel/apic/apic.c:1062
 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline]
 sysvec_apic_timer_interrupt+0x9f/0xc0 arch/x86/kernel/apic/apic.c:1056
 </IRQ>
 <TASK>
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697
RIP: 0010:__sanitizer_cov_trace_const_cmp8+0x8/0x20 kernel/kcov.c:320
Code: 00 00 00 e9 2a fe ff ff 66 2e 0f 1f 84 00 00 00 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 48 8b 0c 24 <48> 89 f2 48 89 fe bf 07 00 00 00 e9 f8 fd ff ff 0f 1f 84 00 00 00
RSP: 0018:ffffc90003537de8 EFLAGS: 00000246
RAX: 1ffff920006a6035 RBX: ffff88802a34db80 RCX: ffffffff817d5386
RDX: ffff88802a34db80 RSI: 0000000000000000 RDI: 0000000000000000
RBP: ffffc900035301a8 R08: 0000000000000007 R09: 0000000000000000
R10: 0000000000000000 R11: ffff88802a34e6b0 R12: ffffc90003530000
R13: dffffc0000000000 R14: 0000000000000000 R15: ffffc90003537e58
 stack_not_used kernel/exit.c:800 [inline]
 check_stack_usage kernel/exit.c:849 [inline]
 do_exit+0x15e6/0x2bd0 kernel/exit.c:1006
 do_group_exit+0xd3/0x2a0 kernel/exit.c:1112
 __do_sys_exit_group kernel/exit.c:1123 [inline]
 __se_sys_exit_group kernel/exit.c:1121 [inline]
 __x64_sys_exit_group+0x3e/0x50 kernel/exit.c:1121
 x64_sys_call+0x151c/0x1740 arch/x86/include/generated/asm/syscalls_64.h:232
 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline]
 do_syscall_64+0xcd/0xf80 arch/x86/entry/syscall_64.c:94
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f43cf18f749
Code: Unable to access opcode bytes at 0x7f43cf18f71f.
RSP: 002b:00007ffc8c7d7678 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7
RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f43cf18f749
RDX: 0000000000000064 RSI: 0000000000000000 RDI: 0000000000000000
RBP: 0000000000000003 R08: 000000058c7d776f R09: 00007f43cf3b4280
R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000
R13: 00007f43cf3b4280 R14: 0000000000000003 R15: 00007ffc8c7d7730
 </TASK>

Crashes (1694):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2025/12/25 19:45 upstream ccd1cdca5cd4 d6526ea3 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/11/30 15:44 upstream 6bda50f4333f d6526ea3 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/11/24 00:59 upstream d13f3ac64efb 4fb8ef37 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/11/03 21:48 upstream 6146a0f1dfae 2c50b6a9 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/10/14 10:16 upstream 3a8660878839 b6605ba8 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/10/05 16:53 upstream 6093a688a07d 49379ee0 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2021/12/28 04:31 net-old 79b69a83705e 6b3c5e64 .config console log report syz C ci-upstream-net-this-kasan-gce BUG: soft lockup in smp_call_function
2025/04/04 11:29 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci d6b13dbd03b7 d7ae3a11 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/19 01:45 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci b5737d35364f 22a6c2b1 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/18 20:42 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci b5737d35364f 22a6c2b1 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/18 06:18 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5618886fdab ce3352cd .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/17 21:19 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5618886fdab 948c34e4 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/16 23:52 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5618886fdab e2826670 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/16 14:50 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci a5618886fdab e2826670 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/04 22:57 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e056da87c780 c3901742 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/03/02 11:13 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci e056da87c780 c3901742 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/11/23 19:12 upstream d13f3ac64efb 4fb8ef37 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/09/03 15:54 upstream e6b9dce0aeeb 96a211bc .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/09/02 00:07 upstream b320789d6883 807a3b61 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/10 06:12 upstream 561c80369df0 32a0e5ed .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/07/08 08:23 upstream d7b8f8e20813 4f67c4ae .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/15 05:16 upstream 9b332cece987 b6605ba8 .config console log report syz / log C [disk image (non-bootable)] [vmlinux] [kernel image] ci-snapshot-upstream-root INFO: rcu detected stall in smp_call_function
2020/07/13 08:57 upstream 4437dd6e8f71 9ebcc5b1 .config console log report syz C ci-upstream-kasan-gce-root
2025/08/03 12:28 net 1dbf1d590d10 7368264b .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/09/24 15:09 net-next dc1dea796b19 0abd0691 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/04 21:50 linux-next 47a8d4b89844 49379ee0 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/07/09 07:02 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci ec4801305969 abade794 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/07/05 05:45 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 7482bb149b9f d869b261 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/06/20 07:41 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci 39dfc971e42d ed3e87f7 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/12/27 19:04 upstream c53f467229a7 d6526ea3 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/12/25 13:55 upstream ccd1cdca5cd4 d6526ea3 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/12/02 12:02 upstream 1d18101a644e d6526ea3 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/11/27 00:13 upstream 30f09200cc4a d6526ea3 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/11/19 22:50 upstream 8b690556d8fe 26ee5237 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/11/14 00:12 upstream 2ccec5944606 07e030de .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/11/13 02:13 upstream 24172e0d7990 07e030de .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/09/03 11:44 upstream e6b9dce0aeeb 96a211bc .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/07/12 00:34 upstream 40f92e79b0aa 3cda49cf .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/08/06 20:31 net d942fe13f72b 4bd24a3e .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/03 07:15 net 1dbf1d590d10 7368264b .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/06/28 08:40 net 8550821a1535 fc9d8ee5 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/11/22 23:23 net-next e05021a829b8 4fb8ef37 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/20 15:37 net-next 88224095b4e5 1c8c8cd8 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/20 13:59 net-next 88224095b4e5 1c8c8cd8 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/09/20 13:50 net-next 312e6f7676e6 67c37560 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/08/12 23:47 linux-next 2674d1eadaa2 c06e8995 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/12/28 21:57 upstream c875a6c32467 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/28 19:54 upstream d26143bb38e2 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: soft lockup in smp_call_function
2025/12/26 23:51 upstream 3f0e9c8cefa9 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/24 07:47 upstream b927546677c8 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/21 17:08 upstream 9094662f6707 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/20 22:27 upstream d8ba32c5a460 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/19 13:18 upstream dd9b004b7ff3 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/16 22:04 upstream 40fbbd64bba6 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root BUG: soft lockup in smp_call_function
2025/12/15 12:29 upstream 8f0b4cce4481 d6526ea3 .config console log report [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/14 01:22 upstream 4a298a43f5e3 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/13 07:57 upstream 9551a26f17d9 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/10 14:31 upstream c9b47175e913 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/09 15:08 upstream cb015814f8b6 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/09 01:03 upstream a110f942672c d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/08 14:44 upstream c2f2b01b74be d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/08 05:27 upstream c2f2b01b74be d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/07 02:43 upstream 50471f8b7371 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/12/03 17:29 upstream 3f9f0252130e d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/11/25 08:32 upstream ac3fd01e4c1e 64219f15 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/11/21 04:03 upstream 8e621c9a3375 280ea308 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-badwrites-root BUG: soft lockup in smp_call_function
2025/11/18 05:00 upstream e7c375b18160 ef766cd7 .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm32 BUG: soft lockup in smp_call_function
2025/05/30 20:27 upstream f66bc387efbe 3d2f584d .config console log report info [disk image (non-bootable)] [vmlinux] [kernel image] ci-qemu2-arm64 BUG: soft lockup in smp_call_function
2025/10/17 19:51 bpf f6fddc6df3fc 7adf5298 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-kasan-gce BUG: soft lockup in smp_call_function
2025/10/17 21:33 bpf-next 48a97ffc6c82 7adf5298 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-bpf-next-kasan-gce BUG: soft lockup in smp_call_function
2025/11/26 15:15 git://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-kernelci b5fb0949b675 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-gce-arm64 BUG: soft lockup in smp_call_function
2025/12/22 03:11 upstream 765b233a9b94 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/12/22 00:52 upstream 765b233a9b94 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/12/21 19:05 upstream 9094662f6707 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs INFO: rcu detected stall in smp_call_function
2025/12/21 13:06 upstream 9094662f6707 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/12/21 05:00 upstream d8ba32c5a460 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/12/18 00:23 upstream ea1013c15392 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/12/17 14:15 upstream ea1013c15392 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/12/17 12:02 upstream ea1013c15392 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/12/17 01:46 upstream 40fbbd64bba6 d1b870e1 .config console log report info [disk image] [vmlinux] [kernel image] ci-qemu-gce-upstream-auto INFO: rcu detected stall in smp_call_function
2025/12/15 22:43 upstream 8f0b4cce4481 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/12/15 20:41 upstream 8f0b4cce4481 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/12/15 14:47 upstream 8f0b4cce4481 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-fs INFO: rcu detected stall in smp_call_function
2025/12/15 10:20 upstream 8f0b4cce4481 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/12/13 13:51 upstream 9551a26f17d9 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/12/12 16:45 upstream 187d0801404f d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/12/11 05:47 upstream 0048fbb4011e d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/12/11 04:10 upstream 0048fbb4011e d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in smp_call_function
2025/12/05 21:09 upstream 2061f18ad76e d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/12/04 13:22 upstream 559e608c4655 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in smp_call_function
2025/11/30 03:31 upstream 6bda50f4333f d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/11/19 12:24 upstream 8b690556d8fe 26ee5237 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in smp_call_function
2025/10/29 22:45 upstream e53642b87a4f fd2207e7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/05/09 12:39 upstream 9c69f8884904 bb813bcc .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in smp_call_function
2021/01/17 04:44 upstream 0da0a8a0a0e1 65a7a854 .config console log report info ci-upstream-kasan-gce-smack-root
2020/07/12 23:01 upstream 4437dd6e8f71 9ebcc5b1 .config console log report ci-upstream-kasan-gce-root
2020/07/10 22:54 upstream a581387e415b 18d18b59 .config console log report ci-upstream-kasan-gce-smack-root
2020/07/08 22:22 upstream 0bddd227f3dc bc238812 .config console log report ci-upstream-kasan-gce-selinux-root
2025/12/27 16:09 net 6402078bd9d1 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/12/20 08:14 net 7b8e9264f55a d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/12/16 18:13 net 885bebac9909 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/12/13 15:03 net 885bebac9909 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/12/01 08:56 net e5235eb6cfe0 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/11/30 07:44 net e5235eb6cfe0 d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/11/02 12:58 net d7d2fcf7ae31 2c50b6a9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in smp_call_function
2025/11/23 07:47 net-next e05021a829b8 4fb8ef37 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in smp_call_function
2025/12/27 23:58 linux-next cc3aa43b44bd d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in smp_call_function
2025/12/25 13:10 linux-next cc3aa43b44bd d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-rust-kasan-gce INFO: rcu detected stall in smp_call_function
2025/12/18 16:57 linux-next 1058ca9db0ed d6526ea3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in smp_call_function
2024/10/20 08:33 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing 07b887f8236e cd6fc0a3 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in smp_call_function
* Struck through repros no longer work on HEAD.