================================================================== BUG: KCSAN: data-race in __run_timers / internal_add_timer write to 0xffff888237d376d8 of 8 bytes by interrupt on cpu 0: enqueue_timer kernel/time/timer.c:597 [inline] internal_add_timer+0x13d/0x260 kernel/time/timer.c:609 add_timer_on+0x262/0x2a0 kernel/time/timer.c:1180 clocksource_watchdog+0xa74/0xac0 kernel/time/clocksource.c:478 call_timer_fn+0x2e/0x1d0 kernel/time/timer.c:1417 expire_timers+0x135/0x250 kernel/time/timer.c:1462 __run_timers+0x358/0x420 kernel/time/timer.c:1731 run_timer_softirq+0x19/0x30 kernel/time/timer.c:1744 __do_softirq+0x12c/0x26e kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x9a/0xb0 kernel/softirq.c:636 sysvec_apic_timer_interrupt+0x32/0x80 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 read to 0xffff888237d376d8 of 8 bytes by interrupt on cpu 1: __run_timers+0x50/0x420 kernel/time/timer.c:1712 run_timer_softirq+0x19/0x30 kernel/time/timer.c:1744 __do_softirq+0x12c/0x26e kernel/softirq.c:558 invoke_softirq kernel/softirq.c:432 [inline] __irq_exit_rcu+0x9a/0xb0 kernel/softirq.c:636 sysvec_apic_timer_interrupt+0x69/0x80 arch/x86/kernel/apic/apic.c:1100 asm_sysvec_apic_timer_interrupt+0x12/0x20 arch/x86/include/asm/idtentry.h:638 arch_atomic64_read arch/x86/include/asm/atomic64_64.h:22 [inline] atomic64_read include/asm-generic/atomic-instrumented.h:606 [inline] atomic_long_read include/asm-generic/atomic-long.h:29 [inline] find_watchpoint kernel/kcsan/core.c:127 [inline] check_access kernel/kcsan/core.c:627 [inline] __tsan_read4+0x4a/0x180 kernel/kcsan/core.c:863 avc_audit_required security/selinux/include/avc.h:95 [inline] avc_audit security/selinux/include/avc.h:132 [inline] avc_has_perm+0xad/0x150 security/selinux/avc.c:1182 inode_has_perm security/selinux/hooks.c:1705 [inline] file_has_perm security/selinux/hooks.c:1797 [inline] selinux_revalidate_file_permission security/selinux/hooks.c:3687 [inline] selinux_file_permission+0x4d3/0x530 security/selinux/hooks.c:3708 security_file_permission+0x42/0xa0 security/security.c:1505 rw_verify_area+0x136/0x250 fs/read_write.c:400 vfs_write+0xe2/0x770 fs/read_write.c:596 ksys_pwrite64 fs/read_write.c:712 [inline] __do_sys_pwrite64 fs/read_write.c:722 [inline] __se_sys_pwrite64 fs/read_write.c:719 [inline] __x64_sys_pwrite64+0xf5/0x150 fs/read_write.c:719 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x3d/0x90 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x44/0xae value changed: 0x0000000100042ff8 -> 0x0000000100042fe3 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 29902 Comm: syz-executor.5 Not tainted 5.14.0-rc2-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================