Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp691850rwb; Thu, 15 Dec 2022 00:49:55 -0800 (PST) X-Google-Smtp-Source: AA0mqf4K6vkDl4e8POf0lTfxOxiomGwercVs7h8M3X5qdyoNUh+y1xnTGRMz+tN5fc3zWQ6RY4Dx X-Received: by 2002:a17:906:868f:b0:7c0:d88b:1695 with SMTP id g15-20020a170906868f00b007c0d88b1695mr25094208ejx.55.1671094194829; Thu, 15 Dec 2022 00:49:54 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1671094194; cv=none; d=google.com; s=arc-20160816; b=vqtLB0RgDRrZUzLWdgFhc7sX+iqUBF7bKKmVgYBNZwUQx0l6hoyoU8BUTQOhIIzyhT XoKbe+boVWpcIM2rWZUBg4xymkzrb6FsxeSun+bAiXWSfrUK4CFl5NVyAUgqsM6G9EtU oPsOTydCy53Val3uXOIq5L2d1gzNjemEj6RpGexGlyjPCmPIdAEqucFL96WXg0yGsG4/ WpGpZVue7PA1Dnmb1SAueaL8YLMA54tfK8oY509CgRJEo3+c5ybRnjrVk0qr6kLRtPA5 qGiPeUhUljgwJmWCXr/0huUEwlK5HUciDW9p7yrH6QELqKi+lf769a8u5nNkkSv6/oWo N/dA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=zw/RhO20UZoC9G6TTtJdTuGGtmTIwLpJWlVSECXA/JQ=; b=IsHgBmze13YFLvBuqvy1ycPlodsmT2Xj+g+t07Pj8qB3J03UXfLFpsNN9TBTHEDguG GK4KlIwLGmVyw+KWZhWUaIts8QiuN/itSe6trIYa7dk9tuufMbi9O14U6q+CEf7TvVMK smmU/oc1VgdemF/V2z2EkojuoSHF1umq/NqxIQRHn/7BLcQJV069mH28BJrS4LkGTZqu WFie1USYtFgr9Xxhixck8dSKFx4jocasxWCfrTKMcxPJT7U2qfNTLOUXePx8q/ZAe7Rr EkLlRptX5+COfd+Cx6zL7JKuhO/+tjTiuI8RWT9d1LFSGfh/84SP4OTE0MIba6Td8N0r y8Fw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=gcsIYuVB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id qa39-20020a17090786a700b007c07a807a78si13768016ejc.215.2022.12.15.00.49.38; Thu, 15 Dec 2022 00:49:54 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=gcsIYuVB; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229580AbiLOIdH (ORCPT + 68 others); Thu, 15 Dec 2022 03:33:07 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:35520 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229448AbiLOIdE (ORCPT ); Thu, 15 Dec 2022 03:33:04 -0500 Received: from mail-yw1-x112a.google.com (mail-yw1-x112a.google.com [IPv6:2607:f8b0:4864:20::112a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 76FC521882 for ; Thu, 15 Dec 2022 00:33:03 -0800 (PST) Received: by mail-yw1-x112a.google.com with SMTP id 00721157ae682-3b5d9050e48so32058667b3.2 for ; Thu, 15 Dec 2022 00:33:03 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=zw/RhO20UZoC9G6TTtJdTuGGtmTIwLpJWlVSECXA/JQ=; b=gcsIYuVB82zmxWO/jv48MxPYs/gdG0Rzgpy4wX731BSR6Ttm6idl29NDWcRjsNF2Fw KM3t76IuqbWGol7of0hQGE0hHket69xGNdMfpqVWd8Ec4c4wIcV7CylfuKzhKOHKg6yh pK4VsYzt/CuGw0wlVvfQWeImLnu1VtMQGODFp3UUiLMGJ1WdH8+umfjBSGtNUSYss9rV vYX4NRdzDPMvtbcC3HpAotwqT86gCotG5RM1KTgPGSmadSZoriXzdSpdmODGSEm4YDD/ 892saize8LGzjzv2uXxazAbI7+oio/WylRwWh/5jhPzLnzLYa/CSjiTyWhSCd2R2NglO MDRg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=zw/RhO20UZoC9G6TTtJdTuGGtmTIwLpJWlVSECXA/JQ=; b=V/qhF64IQximKw785Hvu/SAPA45seQ9jhn1STZhhUlxoP4OMCjuEpsl1g1FtmmwtxF 4c1vrSNUtBi7hWveljxaN04wlZkACajwqPUTv/rrimLnZSZPv4Siks7jS7adKUYo+oyQ ITlOnTZGA5tCwetZPXxEdVRh6RxqKqvrzXrUoM4Dm2Y2kKovRsDdfT0RyZyTILQ/8Qt9 G6+D/6FS3qqj+kSUtaiHxoKOUZj6eRjM7O5xn4DGVwuGBxP+yy7c+9qUNH+G2T9PVlUd mQa2gDuDEuE26+89SFOqy8ST9IKj6icNShZTtGVVmdeZKb1yiMkP8E3nUg4OWLYQ6E3p INKA== X-Gm-Message-State: ANoB5pmYnuahkzePRGKzXdl+5MKrnWVtLDsYj2ItP4wF4ZMq68EzmnMV M8iDqvrQiIQjq8LO7P2yyCuIEhDMvyIYhvTxQZPm8A== X-Received: by 2002:a81:9188:0:b0:379:3bb4:596f with SMTP id i130-20020a819188000000b003793bb4596fmr26819268ywg.238.1671093181145; Thu, 15 Dec 2022 00:33:01 -0800 (PST) MIME-Version: 1.0 References: In-Reply-To: From: Marco Elver Date: Thu, 15 Dec 2022 09:32:24 +0100 Message-ID: Subject: Re: BUG: KCSAN: data-race in do_page_fault / spectre_v4_enable_task_mitigation To: Naresh Kamboju Cc: open list , rcu , kunit-dev@googlegroups.com, lkft-triage@lists.linaro.org, kasan-dev , "Paul E. McKenney" , Dominique Martinet , Netdev , Anders Roxell Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-17.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF, ENV_AND_HDR_SPF_MATCH,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS, USER_IN_DEF_DKIM_WL,USER_IN_DEF_SPF_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, 15 Dec 2022 at 08:32, Naresh Kamboju wrote: > > [Please ignore if it is already reported, and not an expert of KCSAN] > > On Linux next-20221215 tag arm64 allmodconfig boot failed due to following > data-race reported by KCSAN. > > Reported-by: Linux Kernel Functional Testing > > [ 0.000000][ T0] Booting Linux on physical CPU 0x0000000000 [0x410fd034] > [ 0.000000][ T0] Linux version 6.1.0-next-20221214 > (tuxmake@tuxmake) (aarch64-linux-gnu-gcc (Debian 12.2.0-9) 12.2.0, GNU > ld (GNU Binutils for Debian) 2.39) #2 SMP PREEMPT_DYNAMIC @1671022464 > [ 0.000000][ T0] random: crng init done > [ 0.000000][ T0] Machine model: linux,dummy-virt > ... > [ 1067.461794][ T132] BUG: KCSAN: data-race in do_page_fault / > spectre_v4_enable_task_mitigation > [ 1067.467529][ T132] > [ 1067.469146][ T132] write to 0xffff80000f00bfb8 of 8 bytes by task > 93 on cpu 0: > [ 1067.473790][ T132] spectre_v4_enable_task_mitigation+0x2f8/0x340 > [ 1067.477964][ T132] __switch_to+0xc4/0x200 Please provide line numbers with all reports - you can use the script scripts/decode_stacktrace.sh (requires the vmlinux you found this with) to do so. It would be good to do this immediately, because having anyone else do so is nearly impossible - and without line numbers this report will very likely be ignored. Thanks, -- Marco > [ 1067.480877][ T132] __schedule+0x5ec/0x6c0 > [ 1067.483764][ T132] schedule+0x6c/0x100 > [ 1067.486526][ T132] worker_thread+0x7d8/0x8c0 > [ 1067.489581][ T132] kthread+0x1b8/0x200 > [ 1067.492483][ T132] ret_from_fork+0x10/0x20 > [ 1067.495450][ T132] > [ 1067.497034][ T132] read to 0xffff80000f00bfb8 of 8 bytes by task > 132 on cpu 0: > [ 1067.501684][ T132] do_page_fault+0x568/0xa40 > [ 1067.504938][ T132] do_mem_abort+0x7c/0x180 > [ 1067.508051][ T132] el0_da+0x64/0x100 > [ 1067.510712][ T132] el0t_64_sync_handler+0x90/0x180 > [ 1067.514191][ T132] el0t_64_sync+0x1a4/0x1a8 > [ 1067.517200][ T132] > [ 1067.518758][ T132] 1 lock held by (udevadm)/132: > [ 1067.521883][ T132] #0: ffff00000b802c28 > (&mm->mmap_lock){++++}-{3:3}, at: do_page_fault+0x480/0xa40 > [ 1067.528399][ T132] irq event stamp: 1461 > [ 1067.531041][ T132] hardirqs last enabled at (1460): > [] preempt_schedule_irq+0x40/0x100 > [ 1067.537176][ T132] hardirqs last disabled at (1461): > [] __schedule+0x84/0x6c0 > [ 1067.542788][ T132] softirqs last enabled at (1423): > [] fpsimd_restore_current_state+0x148/0x1c0 > [ 1067.549480][ T132] softirqs last disabled at (1421): > [] fpsimd_restore_current_state+0xbc/0x1c0 > [ 1067.556127][ T132] > [ 1067.557687][ T132] value changed: 0x0000000060000000 -> 0x0000000060001000 > [ 1067.562039][ T132] > [ 1067.563631][ T132] Reported by Kernel Concurrency Sanitizer on: > [ 1067.567480][ T132] CPU: 0 PID: 132 Comm: (udevadm) Tainted: G > T 6.1.0-next-20221214 #2 > 4185b46758ba972fed408118afddb8c426bff43a > [ 1067.575669][ T132] Hardware name: linux,dummy-virt (DT) > > > metadata: > repo: https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git/tree/?h=next-20221214 > config: allmodconfig > arch: arm64 > Build details: > https://qa-reports.linaro.org/lkft/linux-next-master/build/next-20221214/ > > -- > Linaro LKFT > https://lkft.linaro.org