Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp2333994rwb; Wed, 30 Nov 2022 05:31:08 -0800 (PST) X-Google-Smtp-Source: AA0mqf5RFDW1i/Fcgf7KPH2+fvcIyli2aoNbtt5fgwGrSFv2PSMbLct4rvgstxkBzcyrFrXtifp7 X-Received: by 2002:a17:902:8c8e:b0:179:f6ed:2ca8 with SMTP id t14-20020a1709028c8e00b00179f6ed2ca8mr42078878plo.14.1669815068490; Wed, 30 Nov 2022 05:31:08 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1669815068; cv=none; d=google.com; s=arc-20160816; b=labf8ORGSHntk4NpgQZsNGntrX9lVDjxklKAEY2eX7dkbFr7gBYWaLXvM8P+vVCAt9 QwEIEGIdKZecRAmBhj8wRzGfB0pT5hTOOIWQNAlxJQz6s+4R7gSnTUBRK3g5Htv2y/Um HJc6oq8gGfTJVkQh4jlDkpAN6qyo8gEYCrC8sR9CKk4aH0Pxy9FBgIWxJqHQmdVWdZ+t CY0ivrfo9amRItu/l2PlAMCBqNHiWeDvwCT08t+/vmY2ARcMkvmlykUeIOjV0PmQiUUp qftjtcObV0ybYKYfBaAhsn9KCdtwV/zb01ur7TQCjnmtBmC+SAvFXTfpg6THZ95bU0H2 sx4g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=qcByqO83gXA2mDu4S2UZuW8nauup/l1bwCTETtFovXc=; b=UP6BFderxzWP2sdEpqLgAGb/MXBpaSJLCQcNLu+qD0DeBqgczw9vA/V7IvHjuaamtv Es2NHqM5m/s4345zgSqLfDpISpwYVpJ9sL27zKMSarQ8rwysP2Jy1RUix3uoAvTUjsLx yjoN8Dt8eHT1Il16k/UbTe0JXAaiAqyO71XmSLQ5D5NBWhVRtjYUW/NyrgNEZ1NVzsDk A5FmmpoG4JZazo/zNDHro5UtiKJ8WY/vmkMyK0emYG51MgGSYncKWJwPp7TlDc+uhaYC TO/5zIM0sxw3YjuR+i4gH1HBdbvfKUoF/pabJncj3TujiY6xYWDgeoOIELM31Ruvf08I RuJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=tLoUY6yS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id d18-20020a170903231200b00188e9ec511dsi1364991plh.397.2022.11.30.05.30.57; Wed, 30 Nov 2022 05:31:08 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=tLoUY6yS; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235255AbiK3Mz0 (ORCPT + 84 others); Wed, 30 Nov 2022 07:55:26 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35470 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S235202AbiK3MzX (ORCPT ); Wed, 30 Nov 2022 07:55:23 -0500 Received: from mail-yb1-xb36.google.com (mail-yb1-xb36.google.com [IPv6:2607:f8b0:4864:20::b36]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 01E794B9A7 for ; Wed, 30 Nov 2022 04:55:22 -0800 (PST) Received: by mail-yb1-xb36.google.com with SMTP id z192so21464555yba.0 for ; Wed, 30 Nov 2022 04:55:21 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=qcByqO83gXA2mDu4S2UZuW8nauup/l1bwCTETtFovXc=; b=tLoUY6ySwzB9UfTlIT8Vgi5cYID27cIPx5vXf9ZSk/xkAbFvNT3h0n3kHKvBgx5x6k yNvKI6fEPJFyMnaaHo/DJo8NPJTSfRjVBIvgLiv8k+gYwxzajI34WGUXKz+QorrhlLVL 5XS4qsdsR7gFmv1w9nDt4zNEPWmPDotBr6vxpsTFbyZVbPhqbL+9Xkv0241gHnq8V/aS OfMsF+s4HOAkjfSqY3sB3Zr4KuPL3XP2XK22fHP4O5v8jorKl4+ljDwGdJpgZNWe/v3e +hqBuBPeLD37XH8LSVrDyb+jLG1CsljvCN/ACC3K/pdmg7Yy8K/zfO4AyFv2Ejj60pOd c2sw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=qcByqO83gXA2mDu4S2UZuW8nauup/l1bwCTETtFovXc=; b=Z+rASqLuPasCW78yFxKW0KA1OApk/UIGfIRm8DrH7VSq3XtEpIU7TMox9QIaYYbqnW rOq8qVPcrvdKeWkDglsbbSE08UCa3JEpYHEa0tCPuF/vzQ+QDjPuzbTiinCArcYnZ4L0 bUJ5gfrElVfkPSMtiQokwRaVNj2ohn2u9BKP6mGfthHIHN2bzEa0w6qPHrvSeCui9AV6 LEis0AAWSGwh8WgrCEoUeYPQEx2WukjoyUZQagRtOzwwTbSLOQVXWXTAVDNAR/P87jPl IJgsLKtnlCMjiaR4/aPXXxi21j19nQdoPAs4mqgwb6eHlQx4ZJfJOsIn8mtc/NA6O9zl IyHw== X-Gm-Message-State: ANoB5pke9Kesfr+c3Hte19SbkbivjztJrZPJ4t8YGRhspv+SJie5CC6r sp59HxsJLyIHuxSPjCCW46yblLF876qSf7OvCaLPPQ== X-Received: by 2002:a25:7343:0:b0:6f3:aedd:e75 with SMTP id o64-20020a257343000000b006f3aedd0e75mr24051955ybc.611.1669812921041; Wed, 30 Nov 2022 04:55:21 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Marco Elver Date: Wed, 30 Nov 2022 13:54:44 +0100 Message-ID: Subject: Re: arm64: allmodconfig: BUG: KCSAN: data-race in p9_client_cb / p9_client_rpc To: Naresh Kamboju Cc: rcu , open list , kunit-dev@googlegroups.com, lkft-triage@lists.linaro.org, kasan-dev , "Paul E. McKenney" , Dominique Martinet , Netdev , Anders Roxell Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, 30 Nov 2022 at 13:50, Naresh Kamboju wrote: > > [Please ignore if it is already reported, and not an expert of KCSAN] > > While booting arm64 with allmodconfig following kernel BUG found, > this build is enabled with CONFIG_INIT_STACK_NONE=y Unsure why CONFIG_INIT_STACK_NONE=y is relevant. > [ 0.000000] Booting Linux on physical CPU 0x0000000000 [0x410fd034] > [ 0.000000] Linux version 6.1.0-rc7-next-20221130 (tuxmake@tuxmake) > (aarch64-linux-gnu-gcc (Debian 11.3.0-6) 11.3.0, GNU ld (GNU Binutils > for Debian) 2.39) #2 SMP PREEMPT_DYNAMIC @1669786411 > [ 0.000000] random: crng init done > [ 0.000000] Machine model: linux,dummy-virt > ... > [ 424.408466] ================================================================== > [ 424.412792] BUG: KCSAN: data-race in p9_client_cb / p9_client_rpc > [ 424.416806] > [ 424.418214] write to 0xffff00000a753000 of 4 bytes by interrupt on cpu 0: > [ 424.422437] p9_client_cb+0x84/0x100 Please always provide line numbers and kernel commit hash or tag (I think it's next-20221130, but not entirely clear). Then we can look at git blame of the lines and see if it's new code. > [ 424.425048] req_done+0xfc/0x1c0 > [ 424.427443] vring_interrupt+0x174/0x1c0 > [ 424.430204] __handle_irq_event_percpu+0x2c8/0x680 > [ 424.433455] handle_irq_event+0x9c/0x180 > [ 424.436187] handle_fasteoi_irq+0x2b0/0x340 > [ 424.439139] generic_handle_domain_irq+0x78/0xc0 > [ 424.442323] __gic_handle_irq_from_irqson.isra.0+0x3d8/0x480 > [ 424.446054] gic_handle_irq+0xb4/0x100 > [ 424.448663] call_on_irq_stack+0x2c/0x38 > [ 424.451443] do_interrupt_handler+0xd0/0x140 > [ 424.454452] el1_interrupt+0x88/0xc0 > [ 424.457001] el1h_64_irq_handler+0x18/0x40 > [ 424.459856] el1h_64_irq+0x78/0x7c > [ 424.462331] arch_local_irq_enable+0x50/0x80 > [ 424.465273] arm64_preempt_schedule_irq+0x80/0xc0 > [ 424.468497] el1_interrupt+0x90/0xc0 > [ 424.471096] el1h_64_irq_handler+0x18/0x40 > [ 424.474009] el1h_64_irq+0x78/0x7c > [ 424.476464] __tsan_read8+0x118/0x280 > [ 424.479086] __delay+0x104/0x140 > [ 424.481521] __udelay+0x5c/0xc0 > [ 424.483905] kcsan_setup_watchpoint+0x6cc/0x7c0 > [ 424.487081] __tsan_read4+0x168/0x280 > [ 424.489729] p9_client_rpc+0x1d0/0x580 > [ 424.492429] p9_client_getattr_dotl+0xd0/0x3c0 > [ 424.495457] v9fs_inode_from_fid_dotl+0x48/0x1c0 > [ 424.498602] v9fs_vfs_lookup+0x23c/0x3c0 > [ 424.501386] __lookup_slow+0x1b0/0x240 > [ 424.504056] walk_component+0x168/0x280 > [ 424.506807] path_lookupat+0x154/0x2c0 > [ 424.509489] filename_lookup+0x160/0x2c0 > [ 424.512261] vfs_statx+0xc0/0x280 > [ 424.514710] vfs_fstatat+0x84/0x100 > [ 424.517308] __do_sys_newfstatat+0x64/0x100 > [ 424.520189] __arm64_sys_newfstatat+0x74/0xc0 > [ 424.523262] invoke_syscall+0xb0/0x1c0 > [ 424.525939] el0_svc_common.constprop.0+0x10c/0x180 > [ 424.529219] do_el0_svc+0x54/0x80 > [ 424.531662] el0_svc+0x4c/0xc0 > [ 424.533944] el0t_64_sync_handler+0xc8/0x180 > [ 424.536837] el0t_64_sync+0x1a4/0x1a8 > [ 424.539436] > [ 424.540810] read to 0xffff00000a753000 of 4 bytes by task 74 on cpu 0: > [ 424.544927] p9_client_rpc+0x1d0/0x580 > [ 424.547692] p9_client_getattr_dotl+0xd0/0x3c0 > [ 424.550564] v9fs_inode_from_fid_dotl+0x48/0x1c0 > [ 424.553550] v9fs_vfs_lookup+0x23c/0x3c0 > [ 424.556144] __lookup_slow+0x1b0/0x240 > [ 424.558655] walk_component+0x168/0x280 > [ 424.561192] path_lookupat+0x154/0x2c0 > [ 424.563721] filename_lookup+0x160/0x2c0 > [ 424.566337] vfs_statx+0xc0/0x280 > [ 424.568638] vfs_fstatat+0x84/0x100 > [ 424.571051] __do_sys_newfstatat+0x64/0x100 > [ 424.573821] __arm64_sys_newfstatat+0x74/0xc0 > [ 424.576650] invoke_syscall+0xb0/0x1c0 > [ 424.579144] el0_svc_common.constprop.0+0x10c/0x180 > [ 424.582212] do_el0_svc+0x54/0x80 > [ 424.584475] el0_svc+0x4c/0xc0 > [ 424.586611] el0t_64_sync_handler+0xc8/0x180 > [ 424.589347] el0t_64_sync+0x1a4/0x1a8 > [ 424.591758] > [ 424.593045] 1 lock held by systemd-journal/74: > [ 424.595821] #0: ffff00000a0ead88 > (&type->i_mutex_dir_key#3){++++}-{3:3}, at: walk_component+0x158/0x280 > [ 424.601588] irq event stamp: 416642 > [ 424.603875] hardirqs last enabled at (416641): > [] preempt_schedule_irq+0x40/0x100 > [ 424.609078] hardirqs last disabled at (416642): > [] el1_interrupt+0x78/0xc0 > [ 424.613887] softirqs last enabled at (416464): > [] __do_softirq+0x5b0/0x694 > [ 424.618699] softirqs last disabled at (416453): > [] ____do_softirq+0x30/0x80 > [ 424.623562] > [ 424.624841] value changed: 0x00000002 -> 0x00000003 > [ 424.627838] > [ 424.629117] Reported by Kernel Concurrency Sanitizer on: > [ 424.632298] CPU: 0 PID: 74 Comm: systemd-journal Tainted: G > T 6.1.0-rc7-next-20221130 #2 > 26b4d3787db66414ab23fce17d22967bb2169e1f > [ 424.639393] Hardware name: linux,dummy-virt (DT) > > Reported-by: Linux Kernel Functional Testing > > -- > Linaro LKFT > https://lkft.linaro.org