================================================================== BUG: KCSAN: data-race in find_next_bit / rcu_report_exp_cpu_mult write to 0xffffffff85c7d080 of 8 bytes by interrupt on cpu 1: rcu_report_exp_cpu_mult+0x4f/0xa0 kernel/rcu/tree_exp.h:244 rcu_report_exp_rdp+0x6c/0x90 kernel/rcu/tree_exp.h:254 rcu_exp_handler+0xe5/0x190 kernel/rcu/tree_exp.h:616 flush_smp_call_function_queue+0x18c/0x2b0 kernel/smp.c:248 generic_smp_call_function_single_interrupt+0x1c/0x49 kernel/smp.c:193 smp_call_function_single_interrupt+0x3f/0x100 arch/x86/kernel/smp.c:262 call_function_single_interrupt+0xf/0x20 arch/x86/entry/entry_64.S:851 __read_once_size include/linux/compiler.h:232 [inline] check_kcov_mode kernel/kcov.c:155 [inline] write_comp_data+0x1e/0x70 kernel/kcov.c:208 tomoyo_domain_quota_is_ok+0x234/0x2b0 security/tomoyo/util.c:1069 tomoyo_supervisor+0x22b/0xd20 security/tomoyo/common.c:2087 tomoyo_audit_path_log security/tomoyo/file.c:168 [inline] tomoyo_path_permission security/tomoyo/file.c:587 [inline] tomoyo_path_permission+0x121/0x160 security/tomoyo/file.c:573 tomoyo_check_open_permission+0x2fd/0x320 security/tomoyo/file.c:777 tomoyo_file_open security/tomoyo/tomoyo.c:319 [inline] tomoyo_file_open+0x75/0x90 security/tomoyo/tomoyo.c:314 security_file_open+0x69/0x210 security/security.c:1497 do_dentry_open+0x211/0x970 fs/open.c:784 vfs_open fs/open.c:914 [inline] dentry_open+0xa9/0xf0 fs/open.c:930 ovl_path_open+0x48/0x60 fs/overlayfs/util.c:478 ovl_dir_read fs/overlayfs/readdir.c:300 [inline] ovl_indexdir_cleanup+0x12e/0x5ab fs/overlayfs/readdir.c:1096 ovl_get_indexdir fs/overlayfs/super.c:1244 [inline] ovl_fill_super+0x258e/0x2736 fs/overlayfs/super.c:1632 mount_nodev+0x6b/0xf0 fs/super.c:1461 ovl_mount+0x36/0x50 fs/overlayfs/super.c:1712 legacy_get_tree+0x7e/0xf0 fs/fs_context.c:647 vfs_get_tree+0x56/0x1a0 fs/super.c:1545 do_new_mount fs/namespace.c:2822 [inline] do_mount+0x1004/0x14f0 fs/namespace.c:3142 ksys_mount+0xe8/0x160 fs/namespace.c:3351 __do_sys_mount fs/namespace.c:3365 [inline] __se_sys_mount fs/namespace.c:3362 [inline] __x64_sys_mount+0x70/0x90 fs/namespace.c:3362 do_syscall_64+0xcc/0x3a0 arch/x86/entry/common.c:294 entry_SYSCALL_64_after_hwframe+0x44/0xa9 read to 0xffffffff85c7d080 of 8 bytes by task 5 on cpu 0: _find_next_bit lib/find_bit.c:39 [inline] find_next_bit+0x57/0xe0 lib/find_bit.c:70 sync_rcu_exp_select_node_cpus+0x28e/0x510 kernel/rcu/tree_exp.h:375 sync_rcu_exp_select_cpus+0x30c/0x590 kernel/rcu/tree_exp.h:439 rcu_exp_sel_wait_wake kernel/rcu/tree_exp.h:575 [inline] wait_rcu_exp_gp+0x25/0x40 kernel/rcu/tree_exp.h:589 process_one_work+0x3d4/0x890 kernel/workqueue.c:2264 worker_thread+0xa0/0x800 kernel/workqueue.c:2410 kthread+0x1d4/0x200 drivers/block/aoe/aoecmd.c:1253 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:352 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 5 Comm: kworker/0:0 Not tainted 5.5.0-rc1-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 Workqueue: rcu_gp wait_rcu_exp_gp ==================================================================