================================================================== BUG: KCSAN: data-race in kvm_arch_vcpu_load / pvclock_gtod_notify write to 0xffffffff85fde628 of 4 bytes by interrupt on cpu 0: update_pvclock_gtod arch/x86/kvm/x86.c:1551 [inline] pvclock_gtod_notify+0x9f/0x260 arch/x86/kvm/x86.c:7123 notifier_call_chain+0xd7/0x160 kernel/notifier.c:95 __raw_notifier_call_chain kernel/notifier.c:396 [inline] raw_notifier_call_chain+0x37/0x50 kernel/notifier.c:403 update_pvclock_gtod kernel/time/timekeeping.c:578 [inline] timekeeping_update+0x1b5/0x2d0 kernel/time/timekeeping.c:672 timekeeping_advance+0x87d/0xd80 kernel/time/timekeeping.c:2120 update_wall_time+0x19/0x20 kernel/time/timekeeping.c:2137 tick_do_update_jiffies64+0x1a4/0x250 kernel/time/tick-sched.c:94 tick_sched_do_timer+0xd4/0xe0 kernel/time/tick-sched.c:138 tick_sched_timer+0x43/0xe0 kernel/time/tick-sched.c:1292 __run_hrtimer kernel/time/hrtimer.c:1514 [inline] __hrtimer_run_queues+0x274/0x5f0 kernel/time/hrtimer.c:1576 hrtimer_interrupt+0x22a/0x480 kernel/time/hrtimer.c:1638 local_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1110 [inline] smp_apic_timer_interrupt+0xdc/0x280 arch/x86/kernel/apic/apic.c:1135 apic_timer_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:830 __sanitizer_cov_trace_pc+0x0/0x50 tomoyo_supervisor+0x22b/0xd20 security/tomoyo/common.c:2087 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x121/0x160 security/tomoyo/file.c:573 tomoyo_check_open_permission+0x2fd/0x320 security/tomoyo/file.c:777 tomoyo_file_open security/tomoyo/tomoyo.c:319 [inline] tomoyo_file_open+0x75/0x90 security/tomoyo/tomoyo.c:314 security_file_open+0x69/0x210 security/security.c:1497 do_dentry_open+0x20a/0x8f0 fs/open.c:784 vfs_open+0x62/0x80 fs/open.c:914 do_last fs/namei.c:3408 [inline] path_openat+0xf73/0x36e0 fs/namei.c:3525 do_filp_open+0x11e/0x1b0 fs/namei.c:3555 do_sys_open+0x3b3/0x4f0 fs/open.c:1097 __do_sys_open fs/open.c:1115 [inline] __se_sys_open fs/open.c:1110 [inline] __x64_sys_open+0x55/0x70 fs/open.c:1110 do_syscall_64+0xcc/0x370 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x44/0xa9 read to 0xffffffff85fde628 of 4 bytes by task 9594 on cpu 1: kvm_check_tsc_unstable arch/x86/kvm/x86.c:1837 [inline] kvm_arch_vcpu_load+0x1e5/0x620 arch/x86/kvm/x86.c:3418 kvm_sched_in+0x8e/0xc0 arch/x86/kvm/../../../virt/kvm/kvm_main.c:4234 __fire_sched_in_preempt_notifiers kernel/sched/core.c:3029 [inline] fire_sched_in_preempt_notifiers kernel/sched/core.c:3035 [inline] finish_task_switch+0xee/0x260 kernel/sched/core.c:3227 context_switch kernel/sched/core.c:3387 [inline] __schedule+0x319/0x640 kernel/sched/core.c:4069 preempt_schedule_irq+0x57/0x90 kernel/sched/core.c:4319 restore_regs_and_return_to_kernel+0x0/0x25 find_watchpoint kernel/kcsan/core.c:77 [inline] check_access kernel/kcsan/core.c:388 [inline] __tsan_read4+0x9e/0x1f0 kernel/kcsan/core.c:529 arch_atomic_read arch/x86/include/asm/atomic.h:31 [inline] atomic_read include/asm-generic/atomic-instrumented.h:40 [inline] search_memslots include/linux/kvm_host.h:1008 [inline] __gfn_to_memslot include/linux/kvm_host.h:1036 [inline] kvm_vcpu_gfn_to_memslot+0xc9/0x240 arch/x86/kvm/../../../virt/kvm/kvm_main.c:1320 try_async_pf+0xb4/0x510 arch/x86/kvm/mmu.c:4104 tdp_page_fault+0x217/0x4d0 arch/x86/kvm/mmu.c:4203 kvm_mmu_page_fault+0xf9/0xbc0 arch/x86/kvm/mmu.c:5439 handle_ept_violation+0x1e5/0x340 arch/x86/kvm/vmx/vmx.c:5185 vmx_handle_exit+0x1c2/0xd60 arch/x86/kvm/vmx/vmx.c:5929 vcpu_enter_guest+0xc1f/0x3830 arch/x86/kvm/x86.c:8227 vcpu_run arch/x86/kvm/x86.c:8291 [inline] kvm_arch_vcpu_ioctl_run+0x2a2/0xdc0 arch/x86/kvm/x86.c:8498 kvm_vcpu_ioctl+0x752/0xa30 arch/x86/kvm/../../../virt/kvm/kvm_main.c:2772 vfs_ioctl fs/ioctl.c:46 [inline] file_ioctl fs/ioctl.c:509 [inline] do_vfs_ioctl+0x991/0xc60 fs/ioctl.c:696 ksys_ioctl+0xbd/0xe0 fs/ioctl.c:713 __do_sys_ioctl fs/ioctl.c:720 [inline] __se_sys_ioctl fs/ioctl.c:718 [inline] __x64_sys_ioctl+0x4c/0x60 fs/ioctl.c:718 do_syscall_64+0xcc/0x370 arch/x86/entry/common.c:290 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 9594 Comm: syz-executor.1 Not tainted 5.4.0-rc6+ #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================