syzbot


INFO: rcu detected stall in security_file_open (6)

Status: closed as dup on 2023/06/27 10:07
Subsystems: tomoyo
[Documentation on labels]
Reported-by: syzbot+bb11ad7bb33b56ca4d4b@syzkaller.appspotmail.com
First crash: 640d, last: 7h54m
Cause bisection: failed (error log, bisect log)
  
Duplicate of
Title Repro Cause bisect Fix bisect Count Last Reported
INFO: rcu detected stall in newfstatat (3) usb C done 64 8h43m 492d
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [tomoyo?] [bpf?] INFO: rcu detected stall in security_file_open (6) 1 (2) 2023/06/27 10:06
Similar bugs (8)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in security_file_open (5) tomoyo 4 1055d 1165d 0/28 closed as invalid on 2022/02/08 09:50
upstream INFO: rcu detected stall in security_file_open (3) afs C done done 2 1476d 1475d 15/28 fixed on 2020/11/16 12:12
upstream INFO: rcu detected stall in security_file_open kernel 5 1776d 1777d 0/28 closed as invalid on 2019/12/04 14:04
upstream INFO: rcu detected stall in security_file_open (2) kernel 2 1741d 1741d 0/28 closed as invalid on 2020/01/08 05:23
linux-6.1 INFO: rcu detected stall in security_file_open 1 390d 390d 0/3 auto-obsoleted due to no activity on 2023/12/28 22:15
upstream INFO: rcu detected stall in security_file_open (4) tomoyo 1 1274d 1274d 0/28 auto-closed as invalid on 2021/06/18 10:54
linux-6.1 INFO: rcu detected stall in security_file_open (2) 1 47d 47d 0/3 upstream: reported on 2024/08/28 07:18
linux-5.15 INFO: rcu detected stall in security_file_open 3 14h06m 86d 0/3 upstream: reported on 2024/07/20 06:20

Sample crash report:
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	Tasks blocked on level-0 rcu_node (CPUs 0-1): P5233/1:b..l
rcu: 	(detected by 0, t=10503 jiffies, g=4981, q=1859031 ncpus=2)
task:syz-executor321 state:R  running task     stack:19536 pid:5233  tgid:5233  ppid:5231   flags:0x00000002
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5315 [inline]
 __schedule+0x1895/0x4b30 kernel/sched/core.c:6675
 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:6997
 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:get_stack_info+0x5/0xf0 arch/x86/kernel/dumpstack_64.c:193
Code: 40 32 05 8c c3 cc cc cc cc 31 c0 c3 cc cc cc cc 0f 1f 44 00 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 66 0f 1f 00 55 <41> 57 41 56 41 55 41 54 53 49 89 ce 48 89 d3 48 89 f5 48 85 f6 74
RSP: 0018:ffffc900037bee70 EFLAGS: 00000246
RAX: 1ffff920006f7de3 RBX: ffffc900037bee80 RCX: ffffc900037bef00
RDX: ffffc900037beee0 RSI: ffff88802d7a9e00 RDI: ffffc900037bee80
RBP: ffffc900037bef01 R08: ffffc900037bef3f R09: 0000000000000000
R10: ffffc900037beee0 R11: fffff520006f7de8 R12: ffffc900037bef00
R13: ffffc900037bef08 R14: ffffc900037beee0 R15: 1ffff920006f7de1
 __unwind_start+0x434/0x740 arch/x86/kernel/unwind_orc.c:729
 unwind_start arch/x86/include/asm/unwind.h:64 [inline]
 arch_stack_walk+0xe5/0x150 arch/x86/kernel/stacktrace.c:24
 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122
 save_stack+0xfb/0x1f0 mm/page_owner.c:156
 __reset_page_owner+0x76/0x430 mm/page_owner.c:297
 reset_page_owner include/linux/page_owner.h:25 [inline]
 free_pages_prepare mm/page_alloc.c:1108 [inline]
 free_unref_page+0xcfb/0xf20 mm/page_alloc.c:2638
 discard_slab mm/slub.c:2677 [inline]
 __put_partials+0xeb/0x130 mm/slub.c:3145
 put_cpu_partial+0x17c/0x250 mm/slub.c:3220
 __slab_free+0x2ea/0x3d0 mm/slub.c:4449
 qlink_free mm/kasan/quarantine.c:163 [inline]
 qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179
 kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286
 __kasan_kmalloc+0x23/0xb0 mm/kasan/common.c:385
 kasan_kmalloc include/linux/kasan.h:257 [inline]
 __do_kmalloc_node mm/slub.c:4264 [inline]
 __kmalloc_noprof+0x1fc/0x400 mm/slub.c:4276
 kmalloc_noprof include/linux/slab.h:882 [inline]
 kzalloc_noprof include/linux/slab.h:1014 [inline]
 tomoyo_encode2 security/tomoyo/realpath.c:45 [inline]
 tomoyo_encode+0x26f/0x540 security/tomoyo/realpath.c:80
 tomoyo_realpath_from_path+0x59e/0x5e0 security/tomoyo/realpath.c:283
 tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
 tomoyo_check_open_permission+0x255/0x500 security/tomoyo/file.c:771
 security_file_open+0x777/0x990 security/security.c:3107
 do_dentry_open+0x369/0x1460 fs/open.c:945
 vfs_open+0x3e/0x330 fs/open.c:1088
 do_open fs/namei.c:3774 [inline]
 path_openat+0x2c84/0x3590 fs/namei.c:3933
 do_filp_open+0x235/0x490 fs/namei.c:3960
 do_sys_openat2+0x13e/0x1d0 fs/open.c:1415
 do_sys_open fs/open.c:1430 [inline]
 __do_sys_openat fs/open.c:1446 [inline]
 __se_sys_openat fs/open.c:1441 [inline]
 __x64_sys_openat+0x247/0x2a0 fs/open.c:1441
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f3948b54801
RSP: 002b:00007fff640a4fc0 EFLAGS: 00000287 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 000000000000d8a4 RCX: 00007f3948b54801
RDX: 0000000000090800 RSI: 00007fff640a61a0 RDI: 00000000ffffff9c
RBP: 0000000000000004 R08: 000000003775226d R09: 7fffffffffffffff
R10: 0000000000000000 R11: 0000000000000287 R12: 00007fff640a61a0
R13: 00007fff640a61a0 R14: 0000000000000002 R15: 431bde82d7b634db
 </TASK>
rcu: rcu_preempt kthread starved for 521 jiffies! g4981 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:24464 pid:17    tgid:17    ppid:2      flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5315 [inline]
 __schedule+0x1895/0x4b30 kernel/sched/core.c:6675
 __schedule_loop kernel/sched/core.c:6752 [inline]
 schedule+0x14b/0x320 kernel/sched/core.c:6767
 schedule_timeout+0x1be/0x310 kernel/time/timer.c:2615
 rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045
 rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.12.0-rc1-syzkaller-00306-g27cc6fdf7201 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
RIP: 0010:lock_release+0x658/0xa30 kernel/locking/lockdep.c:5850
Code: 3c 3b 00 74 08 4c 89 f7 e8 b5 15 8e 00 f6 84 24 91 00 00 00 02 75 77 41 f7 c5 00 02 00 00 74 01 fb 48 c7 44 24 60 0e 36 e0 45 <4b> c7 04 27 00 00 00 00 4b c7 44 27 08 00 00 00 00 65 48 8b 04 25
RSP: 0018:ffffc90000156a60 EFLAGS: 00000206
RAX: 0000000000000001 RBX: 1ffff9200002ad5e RCX: ffffc90000156a03
RDX: 0000000000000002 RSI: ffffffff8c0adc40 RDI: ffffffff8c60f920
RBP: ffffc90000156b90 R08: ffffffff901ceaaf R09: 1ffffffff2039d55
R10: dffffc0000000000 R11: fffffbfff2039d56 R12: 1ffff9200002ad58
R13: 0000000000000246 R14: ffffc90000156af0 R15: dffffc0000000000
FS:  0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 00000000200000c0 CR3: 0000000031240000 CR4: 00000000003526f0
DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000
DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400
Call Trace:
 <IRQ>
 </IRQ>
 <TASK>
 rcu_lock_release include/linux/rcupdate.h:347 [inline]
 rcu_read_unlock include/linux/rcupdate.h:880 [inline]
 l3mdev_master_ifindex include/net/l3mdev.h:71 [inline]
 ip_route_me_harder+0x61b/0x1300 net/ipv4/netfilter.c:49
 synproxy_send_tcp+0x356/0x6c0 net/netfilter/nf_synproxy_core.c:431
 synproxy_send_client_synack+0x8b8/0xf30 net/netfilter/nf_synproxy_core.c:484
 nft_synproxy_eval_v4+0x3ca/0x610 net/netfilter/nft_synproxy.c:59
 nft_synproxy_do_eval+0x362/0xa60 net/netfilter/nft_synproxy.c:141
 expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
 nft_do_chain+0x4ad/0x1da0 net/netfilter/nf_tables_core.c:288
 nft_do_chain_inet+0x418/0x6b0 net/netfilter/nft_chain_filter.c:161
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_slow+0xc3/0x220 net/netfilter/core.c:626
 nf_hook include/linux/netfilter.h:269 [inline]
 NF_HOOK+0x29e/0x450 include/linux/netfilter.h:312
 NF_HOOK+0x3a4/0x450 include/linux/netfilter.h:314
 __netif_receive_skb_one_core net/core/dev.c:5666 [inline]
 __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5779
 process_backlog+0x662/0x15b0 net/core/dev.c:6111
 __napi_poll+0xcb/0x490 net/core/dev.c:6775
 napi_poll net/core/dev.c:6844 [inline]
 net_rx_action+0x89b/0x1240 net/core/dev.c:6966
 handle_softirqs+0x2c5/0x980 kernel/softirq.c:554
 run_ksoftirqd+0xca/0x130 kernel/softirq.c:927
 smpboot_thread_fn+0x544/0xa30 kernel/smpboot.c:164
 kthread+0x2f0/0x390 kernel/kthread.c:389
 ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>

Crashes (59):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/10/05 11:22 upstream 27cc6fdf7201 d7906eff .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/09/08 14:54 upstream d1f2d51b711a 9750182a .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_open
2023/06/23 09:31 upstream 8a28a0b6f1a1 09ffe269 .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_open
2024/10/09 00:47 upstream 5b7c893ed5ed 402f1df0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/10/02 23:40 upstream f23aa4c0761a a4c7fd36 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_open
2024/09/30 23:29 upstream e32cde8d2bd7 bbd4e0a4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/09/30 14:21 upstream 9852d85ec9d4 ba29ff75 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_open
2024/09/28 05:19 upstream ad46e8f95e93 440b26ec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/09/25 08:32 upstream 684a64bf32b6 349a68c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/09/23 18:45 upstream de5cb0dcb74c 89298aad .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/09/23 17:27 upstream de5cb0dcb74c 89298aad .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/08/24 23:58 upstream d2bafcf224f3 d7d32352 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/08/18 05:50 upstream df6cbc62cc9b dbc93b08 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_open
2024/08/13 04:52 upstream d74da846046a 7b0f4b46 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/08/01 14:36 upstream 21b136cc63d2 1e9c4cf3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/07/18 11:03 upstream b1bc554e009e 7403ec00 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/07/07 07:31 upstream 22f902dfc51e bc4ebbb5 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/07/05 19:43 upstream 661e504db04c 2a40360c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/07/02 18:42 upstream 1dfe225e9af5 8373af66 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/06/26 04:42 upstream 55027e689933 da0bd5ca .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/06/16 07:50 upstream 2ccbdf43d5e7 f429ab00 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_open
2024/06/10 21:51 upstream 83a7eefedc9b 048c640a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_open
2024/06/06 12:41 upstream 2df0193e62cf 121701b6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_open
2023/12/04 17:03 upstream 33cc938e65a9 f819d6f7 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2023/09/15 21:20 upstream 9fdfb15a3dbf 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2023/09/14 18:41 upstream aed8aee11130 0b6a67ac .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/10/11 02:43 upstream d3d1556696c1 8fbfc0c8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in security_file_open
2024/10/10 14:16 upstream d3d1556696c1 8fbfc0c8 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in security_file_open
2024/10/05 16:00 upstream 27cc6fdf7201 d7906eff .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in security_file_open
2024/09/28 10:15 upstream ad46e8f95e93 440b26ec .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in security_file_open
2024/09/27 00:49 upstream 11a299a7933e 0d19f247 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in security_file_open
2024/09/25 21:12 upstream aa486552a110 349a68c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in security_file_open
2024/09/24 09:38 upstream abf2050f51fd 89298aad .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in security_file_open
2024/09/18 17:23 upstream 2f27fce67173 c673ca06 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in security_file_open
2024/04/29 06:50 upstream e67572cd2204 07b455f9 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in security_file_open
2023/07/14 08:14 upstream 4b810bf037e5 d624500f .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2023/07/07 21:07 upstream 4f6b6c2b2f86 22ae5830 .config console log report info ci-upstream-kasan-badwrites-root INFO: rcu detected stall in security_file_open
2023/05/06 13:43 upstream 2e1e1337881b 90c93c40 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_open
2023/04/01 02:18 upstream 5a57b48fdfcb f325deb0 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/10/14 04:26 net 174714f0e505 084d8178 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/10/02 01:35 net 6c24a03a61a2 ea2b66a6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/09/30 18:37 net d505d3593b52 bbd4e0a4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2023/06/04 00:47 net c308e9ec0047 a4ae4f42 .config console log report info ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/10/14 14:17 net-next 01b6b9315f15 084d8178 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2024/10/12 15:53 net-next c531f2269a53 084d8178 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2024/07/29 14:18 linux-next 931a3b3bccc9 5187fc86 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in security_file_open
2024/07/05 20:19 linux-next 0b58e108042b 2a40360c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in security_file_open
2024/06/22 17:54 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing 819984a0dd36 edc5149a .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in security_file_open
2024/04/25 19:09 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing a160e1202ca3 8bdc0f22 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in security_file_open
2024/02/13 06:03 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing 88bae831f381 77b23aa1 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in security_file_open
2024/01/19 09:18 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing 9d1694dc91ce 21772ce4 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in security_file_open
2023/12/25 11:06 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing 1760bfa7d7ca fb427a07 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in security_file_open
2023/11/28 17:15 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing 24af68a0ed53 9fe51b7c .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in security_file_open
2023/11/02 20:16 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing c70793fb7632 c4ac074c .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in security_file_open
2023/08/25 11:13 linux-next 626932085009 03d9c195 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in security_file_open
2023/05/25 10:35 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing ee4d21aa4a22 0513b3e6 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in security_file_open
2023/01/13 07:03 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing c2fb9a214da1 96166539 .config console log report info ci2-upstream-usb INFO: rcu detected stall in security_file_open
* Struck through repros no longer work on HEAD.