syzbot


INFO: rcu detected stall in security_file_open (6)

Status: closed as dup on 2023/06/27 10:07
Subsystems: tomoyo
[Documentation on labels]
Reported-by: syzbot+bb11ad7bb33b56ca4d4b@syzkaller.appspotmail.com
First crash: 745d, last: 13h00m
Cause bisection: failed (error log, bisect log)
  
Duplicate of
Title Repro Cause bisect Fix bisect Count Last Reported
INFO: rcu detected stall in newfstatat (3) usb C done 103 3d10h 597d
Discussions (1)
Title Replies (including bot) Last reply
[syzbot] [tomoyo?] [bpf?] INFO: rcu detected stall in security_file_open (6) 1 (2) 2023/06/27 10:06
Similar bugs (8)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream INFO: rcu detected stall in security_file_open (5) tomoyo 4 1160d 1270d 0/28 closed as invalid on 2022/02/08 09:50
upstream INFO: rcu detected stall in security_file_open (3) afs C done done 2 1581d 1580d 15/28 fixed on 2020/11/16 12:12
upstream INFO: rcu detected stall in security_file_open kernel 5 1881d 1882d 0/28 closed as invalid on 2019/12/04 14:04
upstream INFO: rcu detected stall in security_file_open (2) kernel 2 1846d 1846d 0/28 closed as invalid on 2020/01/08 05:23
linux-6.1 INFO: rcu detected stall in security_file_open 1 496d 496d 0/3 auto-obsoleted due to no activity on 2023/12/28 22:15
upstream INFO: rcu detected stall in security_file_open (4) tomoyo 1 1379d 1379d 0/28 auto-closed as invalid on 2021/06/18 10:54
linux-6.1 INFO: rcu detected stall in security_file_open (2) 1 152d 152d 0/3 auto-obsoleted due to no activity on 2024/12/06 07:18
linux-5.15 INFO: rcu detected stall in security_file_open 3 105d 191d 0/3 auto-obsoleted due to no activity on 2025/01/22 08:07

Sample crash report:
rcu: INFO: rcu_preempt detected stalls on CPUs/tasks:
rcu: 	Tasks blocked on level-0 rcu_node (CPUs 0-1): P5201/1:b..l
rcu: 	(detected by 1, t=10503 jiffies, g=8985, q=3767456 ncpus=2)
task:syslogd         state:R  running task     stack:23104 pid:5201  tgid:5201  ppid:1      flags:0x00004002
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5369 [inline]
 __schedule+0x1850/0x4c30 kernel/sched/core.c:6756
 preempt_schedule_irq+0xfb/0x1c0 kernel/sched/core.c:7078
 irqentry_exit+0x5e/0x90 kernel/entry/common.c:354
 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702
RIP: 0010:memset+0xf/0x20 arch/x86/lib/memset_64.S:37
Code: 44 88 1f e9 be e6 24 00 0f 1f 00 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 f3 0f 1e fa 66 90 49 89 f9 40 88 f0 48 89 d1 <f3> aa 4c 89 c8 e9 92 e6 24 00 0f 1f 80 00 00 00 00 90 90 90 90 90
RSP: 0018:ffffc90003d66e78 EFLAGS: 00000202
RAX: ffff88806e109e00 RBX: ffff88806e109e00 RCX: 000000000000001c
RDX: 0000000000000060 RSI: 0000000000000000 RDI: ffffc90003d66f24
RBP: dffffc0000000000 R08: ffffc90003d66f3f R09: ffffc90003d66ee0
R10: dffffc0000000000 R11: fffff520007acde8 R12: 0000000000000000
R13: ffffffff8180b700 R14: ffffc90003d66ee0 R15: 0000000000000000
 __unwind_start+0x36/0x740 arch/x86/kernel/unwind_orc.c:688
 unwind_start arch/x86/include/asm/unwind.h:64 [inline]
 arch_stack_walk+0xe5/0x150 arch/x86/kernel/stacktrace.c:24
 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122
 save_stack+0xfb/0x1f0 mm/page_owner.c:156
 __reset_page_owner+0x76/0x430 mm/page_owner.c:297
 reset_page_owner include/linux/page_owner.h:25 [inline]
 free_pages_prepare mm/page_alloc.c:1127 [inline]
 free_unref_page+0xdf9/0x1140 mm/page_alloc.c:2657
 discard_slab mm/slub.c:2677 [inline]
 __put_partials+0xeb/0x130 mm/slub.c:3145
 put_cpu_partial+0x17c/0x250 mm/slub.c:3220
 __slab_free+0x2ea/0x3d0 mm/slub.c:4449
 qlink_free mm/kasan/quarantine.c:163 [inline]
 qlist_free_all+0x9a/0x140 mm/kasan/quarantine.c:179
 kasan_quarantine_reduce+0x14f/0x170 mm/kasan/quarantine.c:286
 __kasan_kmalloc+0x23/0xb0 mm/kasan/common.c:385
 kasan_kmalloc include/linux/kasan.h:257 [inline]
 __do_kmalloc_node mm/slub.c:4264 [inline]
 __kmalloc_noprof+0x1fc/0x400 mm/slub.c:4276
 kmalloc_noprof include/linux/slab.h:883 [inline]
 kzalloc_noprof include/linux/slab.h:1015 [inline]
 tomoyo_encode2 security/tomoyo/realpath.c:45 [inline]
 tomoyo_encode+0x26f/0x540 security/tomoyo/realpath.c:80
 tomoyo_realpath_from_path+0x59e/0x5e0 security/tomoyo/realpath.c:283
 tomoyo_get_realpath security/tomoyo/file.c:151 [inline]
 tomoyo_check_open_permission+0x258/0x4f0 security/tomoyo/file.c:771
 security_file_open+0x777/0x990 security/security.c:3108
 do_dentry_open+0x369/0x1460 fs/open.c:928
 vfs_open+0x3e/0x330 fs/open.c:1071
 do_open fs/namei.c:3828 [inline]
 path_openat+0x2c84/0x3590 fs/namei.c:3987
 do_filp_open+0x27f/0x4e0 fs/namei.c:4014
 do_sys_openat2+0x13e/0x1d0 fs/open.c:1398
 do_sys_open fs/open.c:1413 [inline]
 __do_sys_openat fs/open.c:1429 [inline]
 __se_sys_openat fs/open.c:1424 [inline]
 __x64_sys_openat+0x247/0x2a0 fs/open.c:1424
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xf3/0x230 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f
RIP: 0033:0x7f62c51c59a4
RSP: 002b:00007ffeea64ba40 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
RAX: ffffffffffffffda RBX: 0000565208a4c910 RCX: 00007f62c51c59a4
RDX: 0000000000000d41 RSI: 00007f62c5364443 RDI: 00000000ffffff9c
RBP: 00007f62c5364443 R08: 0000000000000001 R09: 0000000000000000
R10: 00000000000001b6 R11: 0000000000000246 R12: 0000000000000d41
R13: 00000000673f366c R14: 0000000000000003 R15: 0000565208a4ca60
 </TASK>
rcu: rcu_preempt kthread starved for 9058 jiffies! g8985 f0x2 RCU_GP_WAIT_FQS(5) ->state=0x0 ->cpu=0
rcu: 	Unless rcu_preempt kthread gets sufficient CPU time, OOM is now expected behavior.
rcu: RCU grace-period kthread stack dump:
task:rcu_preempt     state:R  running task     stack:26264 pid:17    tgid:17    ppid:2      flags:0x00004000
Call Trace:
 <TASK>
 context_switch kernel/sched/core.c:5369 [inline]
 __schedule+0x1850/0x4c30 kernel/sched/core.c:6756
 __schedule_loop kernel/sched/core.c:6833 [inline]
 schedule+0x14b/0x320 kernel/sched/core.c:6848
 schedule_timeout+0x15a/0x290 kernel/time/sleep_timeout.c:99
 rcu_gp_fqs_loop+0x2df/0x1330 kernel/rcu/tree.c:2045
 rcu_gp_kthread+0xa7/0x3b0 kernel/rcu/tree.c:2247
 kthread+0x2f2/0x390 kernel/kthread.c:389
 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
rcu: Stack dump where RCU GP kthread last ran:
Sending NMI from CPU 1 to CPUs 0:
NMI backtrace for cpu 0
CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.12.0-syzkaller-03657-g43fb83c17ba2 #0
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024
RIP: 0010:preempt_count_add+0x25/0x190 kernel/sched/core.c:5843
Code: 90 90 90 90 90 f3 0f 1e fa 41 57 41 56 53 89 fb 48 c7 c0 c0 b9 3f 9a 48 c1 e8 03 49 bf 00 00 00 00 00 fc ff df 42 0f b6 04 38 <84> c0 0f 85 ed 00 00 00 83 3d 9c 60 dc 18 00 75 07 65 8b 05 9b 7e
RSP: 0018:ffffc90000156450 EFLAGS: 00000212
RAX: 0000000000000004 RBX: 0000000000000001 RCX: ffffc90000157a00
RDX: dffffc0000000000 RSI: ffffffff899afe8b RDI: 0000000000000001
RBP: ffffc90000156578 R08: 0000000000000014 R09: ffffc90000156630
R10: dffffc0000000000 R11: ffffffff8180b700 R12: dffffc0000000000
R13: ffffc90000156540 R14: ffffffff899afe8b R15: dffffc0000000000
FS:  0000000000000000(0000) GS:ffff8880b8600000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055559020d918 CR3: 000000000e738000 CR4: 0000000000350ef0
Call Trace:
 <NMI>
 </NMI>
 <TASK>
 unwind_next_frame+0xb0/0x22d0 arch/x86/kernel/unwind_orc.c:479
 arch_stack_walk+0x11c/0x150 arch/x86/kernel/stacktrace.c:25
 stack_trace_save+0x118/0x1d0 kernel/stacktrace.c:122
 kasan_save_stack mm/kasan/common.c:47 [inline]
 kasan_save_track+0x3f/0x80 mm/kasan/common.c:68
 unpoison_slab_object mm/kasan/common.c:319 [inline]
 __kasan_slab_alloc+0x66/0x80 mm/kasan/common.c:345
 kasan_slab_alloc include/linux/kasan.h:247 [inline]
 slab_post_alloc_hook mm/slub.c:4085 [inline]
 slab_alloc_node mm/slub.c:4134 [inline]
 kmem_cache_alloc_noprof+0x135/0x2a0 mm/slub.c:4141
 dst_alloc+0x12b/0x190 net/core/dst.c:89
 rt_dst_alloc net/ipv4/route.c:1612 [inline]
 __mkroute_output net/ipv4/route.c:2573 [inline]
 ip_route_output_key_hash_rcu+0x13cc/0x2390 net/ipv4/route.c:2795
 ip_route_output_key_hash+0x193/0x2b0 net/ipv4/route.c:2624
 __ip_route_output_key include/net/route.h:141 [inline]
 ip_route_output_flow+0x29/0x140 net/ipv4/route.c:2852
 ip_route_output_key include/net/route.h:151 [inline]
 ip_route_me_harder+0x80d/0x1300 net/ipv4/netfilter.c:53
 synproxy_send_tcp+0x356/0x6c0 net/netfilter/nf_synproxy_core.c:431
 synproxy_send_client_synack+0x8b8/0xf30 net/netfilter/nf_synproxy_core.c:484
 nft_synproxy_eval_v4+0x3ca/0x610 net/netfilter/nft_synproxy.c:59
 nft_synproxy_do_eval+0x362/0xa60 net/netfilter/nft_synproxy.c:141
 expr_call_ops_eval net/netfilter/nf_tables_core.c:240 [inline]
 nft_do_chain+0x4af/0x1da0 net/netfilter/nf_tables_core.c:288
 nft_do_chain_inet+0x418/0x6b0 net/netfilter/nft_chain_filter.c:161
 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]
 nf_hook_slow+0xc5/0x220 net/netfilter/core.c:626
 nf_hook include/linux/netfilter.h:269 [inline]
 NF_HOOK+0x29e/0x450 include/linux/netfilter.h:312
 NF_HOOK+0x3a6/0x450 include/linux/netfilter.h:314
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x2bf/0x650 net/core/dev.c:5783
 process_backlog+0x662/0x15b0 net/core/dev.c:6115
 __napi_poll+0xcd/0x490 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x89b/0x1240 net/core/dev.c:6970
 handle_softirqs+0x2c7/0x980 kernel/softirq.c:554
 run_ksoftirqd+0xca/0x130 kernel/softirq.c:943
 smpboot_thread_fn+0x546/0xa30 kernel/smpboot.c:164
 kthread+0x2f2/0x390 kernel/kthread.c:389
 ret_from_fork+0x4d/0x80 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
 </TASK>
INFO: NMI handler (nmi_cpu_backtrace_handler) took too long to run: 4.670 msecs

Crashes (191):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/11/21 13:45 upstream 43fb83c17ba2 4b25d554 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_open
2024/10/05 11:22 upstream 27cc6fdf7201 d7906eff .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/09/08 14:54 upstream d1f2d51b711a 9750182a .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_open
2023/06/23 09:31 upstream 8a28a0b6f1a1 09ffe269 .config console log report syz C [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_open
2024/11/03 08:39 net b2183187c5fd f00eed24 .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/10/28 11:19 net-next 6d858708d465 65e8686b .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2024/10/16 09:48 net-next 6d858708d465 bde2d81c .config console log report syz / log C [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/26 17:53 upstream 9b2ffa6148b1 d3ccff63 .config console log report syz / log [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/27 14:45 upstream c2da8b3f914f 9fbd772e .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/23 02:25 upstream c4b9570cfb63 25e17fd3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2025/01/23 00:47 upstream c4b9570cfb63 25e17fd3 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_open
2025/01/14 13:41 upstream c45323b7560e b1f1cd88 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_open
2025/01/13 22:01 upstream c45323b7560e b1f1cd88 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_open
2025/01/13 03:51 upstream be548645527a 6dbc6a9b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_open
2025/01/08 17:45 upstream 09a0fa92e5b4 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2025/01/05 22:16 upstream ab75170520d4 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/03 13:42 upstream 0bc21e701a6f f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_open
2025/01/03 00:55 upstream 0bc21e701a6f d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_open
2025/01/02 17:04 upstream 56e6a3499e14 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/01 01:13 upstream ccb98ccef0e5 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/30 19:45 upstream fc033cf25e61 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/30 17:15 upstream fc033cf25e61 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/29 14:12 upstream 059dd502b263 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/25 15:39 upstream 9b2ffa6148b1 444551c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/12/21 06:48 upstream 499551201b5f d7f584ee .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_open
2024/12/19 22:02 upstream eabcdba3ad40 1d58202c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/12/19 05:36 upstream c061cf420ded 1432fc84 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/12/16 14:11 upstream 78d4f34e2115 7cbfbb3a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-root INFO: rcu detected stall in security_file_open
2024/12/14 16:31 upstream a446e965a188 7cbfbb3a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-smack-root INFO: rcu detected stall in security_file_open
2024/10/16 05:29 upstream 2f87d0916ce0 bde2d81c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-386 INFO: rcu detected stall in security_file_open
2023/07/07 21:07 upstream 4f6b6c2b2f86 22ae5830 .config console log report info ci-upstream-kasan-badwrites-root INFO: rcu detected stall in security_file_open
2023/05/06 13:43 upstream 2e1e1337881b 90c93c40 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-kasan-gce-selinux-root INFO: rcu detected stall in security_file_open
2025/01/19 06:25 net bc50835e83f6 f2cb035c .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/12 23:56 net 47e55e4b410f 6dbc6a9b .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/07 12:03 net 8c817eb26230 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/07 11:12 net 8c817eb26230 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/06 03:07 net 8ce4f287524c f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/04 14:44 net aba74e639f8d f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/03 23:42 net ce21419b55d8 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/03 17:52 net ce21419b55d8 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/28 15:44 net a024e377efed d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/27 03:20 net b3a69c559899 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/25 18:06 net b3a69c559899 444551c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/24 23:13 net b3a69c559899 444551c4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/23 05:31 net 30b981796b94 b4fbdbd4 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/22 16:17 net 30b981796b94 d7f584ee .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/21 17:58 net 30b981796b94 d7f584ee .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/18 09:43 net 954a2b40719a a0626d3a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/17 16:20 net 7ed2d9158877 c8c15bb2 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/15 18:00 net c296c0bf4518 7cbfbb3a .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2023/06/04 00:47 net c308e9ec0047 a4ae4f42 .config console log report info ci-upstream-net-this-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/22 11:46 net-next b1754a69e7be da72ac06 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/07 06:07 net-next 286bb9985f36 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/06 06:56 net-next 3e5908172c05 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/04 17:40 net-next 356939999438 f3558dbf .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/03 04:31 net-next bb70b0d48d8e d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2025/01/01 05:49 net-next 9268abe611b0 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/30 00:48 net-next 9268abe611b0 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/29 00:31 net-next 9268abe611b0 d3ccff63 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-net-kasan-gce INFO: rcu detected stall in security_file_open
2024/12/07 05:36 linux-next af2ea8ab7a54 9ac0fdc6 .config console log report info [disk image] [vmlinux] [kernel image] ci-upstream-linux-next-kasan-gce-root INFO: rcu detected stall in security_file_open
2024/06/22 17:54 https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/usb.git usb-testing 819984a0dd36 edc5149a .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-usb INFO: rcu detected stall in security_file_open
* Struck through repros no longer work on HEAD.