================================================================== BUG: KCSAN: data-race in pollwake / pollwake write to 0xffffc90000dcba70 of 4 bytes by interrupt on cpu 1: __pollwake fs/select.c:197 [inline] pollwake+0xa7/0xf0 fs/select.c:217 __wake_up_common+0xbc/0x130 kernel/sched/wait.c:93 __wake_up_common_lock kernel/sched/wait.c:123 [inline] __wake_up_sync_key+0x83/0xc0 kernel/sched/wait.c:190 sock_def_readable+0x61/0xe0 net/core/sock.c:2889 tcp_data_ready net/ipv4/tcp_input.c:4914 [inline] tcp_data_queue+0x1a6d/0x3130 net/ipv4/tcp_input.c:4979 tcp_rcv_established+0x851/0x1340 net/ipv4/tcp_input.c:5865 tcp_v4_do_rcv+0x278/0x4a0 net/ipv4/tcp_ipv4.c:1652 tcp_v4_rcv+0x2101/0x2370 net/ipv4/tcp_ipv4.c:2034 ip_protocol_deliver_rcu+0x1f9/0x3e0 net/ipv4/ip_input.c:204 ip_local_deliver_finish net/ipv4/ip_input.c:231 [inline] NF_HOOK include/linux/netfilter.h:301 [inline] ip_local_deliver+0x1c0/0x280 net/ipv4/ip_input.c:252 dst_input include/net/dst.h:449 [inline] ip_sublist_rcv_finish net/ipv4/ip_input.c:550 [inline] ip_list_rcv_finish net/ipv4/ip_input.c:600 [inline] ip_sublist_rcv+0x4c4/0x590 net/ipv4/ip_input.c:608 ip_list_rcv+0x262/0x290 net/ipv4/ip_input.c:643 __netif_receive_skb_list_ptype net/core/dev.c:5354 [inline] __netif_receive_skb_list_core+0x34b/0x450 net/core/dev.c:5402 __netif_receive_skb_list+0x262/0x2e0 net/core/dev.c:5454 netif_receive_skb_list_internal+0xda/0x330 net/core/dev.c:5564 gro_normal_list net/core/dev.c:5718 [inline] napi_complete_done+0x1b2/0x420 net/core/dev.c:6443 virtqueue_napi_complete+0x28/0x80 drivers/net/virtio_net.c:336 virtnet_poll+0x607/0x730 drivers/net/virtio_net.c:1462 napi_poll+0x178/0x4c0 net/core/dev.c:6759 net_rx_action+0x17a/0x480 net/core/dev.c:6829 __do_softirq+0x12c/0x2b1 kernel/softirq.c:298 asm_call_irq_on_stack+0xf/0x20 __run_on_irqstack arch/x86/include/asm/irq_stack.h:26 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:77 [inline] do_softirq_own_stack+0x32/0x40 arch/x86/kernel/irq_64.c:77 invoke_softirq kernel/softirq.c:393 [inline] __irq_exit_rcu+0xb2/0xc0 kernel/softirq.c:423 common_interrupt+0xb5/0x130 arch/x86/kernel/irq.c:239 asm_common_interrupt+0x1e/0x40 arch/x86/include/asm/idtentry.h:622 native_restore_fl arch/x86/include/asm/irqflags.h:41 [inline] arch_local_irq_restore arch/x86/include/asm/irqflags.h:84 [inline] kcsan_setup_watchpoint+0x1ec/0x4d0 kernel/kcsan/core.c:591 __tlb_remove_page_size+0x53/0x160 mm/mmu_gather.c:82 __tlb_remove_page include/asm-generic/tlb.h:438 [inline] zap_pte_range+0x65f/0x13c0 mm/memory.c:1256 zap_pmd_range mm/memory.c:1357 [inline] zap_pud_range mm/memory.c:1386 [inline] zap_p4d_range mm/memory.c:1407 [inline] unmap_page_range+0x560/0x660 mm/memory.c:1428 unmap_single_vma+0x157/0x210 mm/memory.c:1473 unmap_vmas+0xbf/0x150 mm/memory.c:1505 exit_mmap+0x1c7/0x3b0 mm/mmap.c:3222 __mmput+0xa2/0x220 kernel/fork.c:1079 mmput+0x38/0x40 kernel/fork.c:1100 exit_mm+0x2bd/0x320 kernel/exit.c:483 do_exit+0x3c2/0x15a0 kernel/exit.c:793 do_group_exit+0xc8/0x170 kernel/exit.c:903 get_signal+0xf9b/0x1510 kernel/signal.c:2757 arch_do_signal+0x25/0x260 arch/x86/kernel/signal.c:811 exit_to_user_mode_loop kernel/entry/common.c:161 [inline] exit_to_user_mode_prepare+0xde/0x170 kernel/entry/common.c:192 syscall_exit_to_user_mode+0x16/0x30 kernel/entry/common.c:267 do_syscall_64+0x45/0x80 arch/x86/entry/common.c:56 entry_SYSCALL_64_after_hwframe+0x44/0xa9 write to 0xffffc90000dcba70 of 4 bytes by task 1376 on cpu 0: __pollwake fs/select.c:197 [inline] pollwake+0xa7/0xf0 fs/select.c:217 __wake_up_common+0xbc/0x130 kernel/sched/wait.c:93 __wake_up_common_lock kernel/sched/wait.c:123 [inline] __wake_up_sync_key+0x83/0xc0 kernel/sched/wait.c:190 pipe_write+0x5d9/0xbc0 fs/pipe.c:557 call_write_iter include/linux/fs.h:1887 [inline] new_sync_write fs/read_write.c:518 [inline] vfs_write+0x617/0x690 fs/read_write.c:605 ksys_write+0xce/0x180 fs/read_write.c:658 __do_sys_write fs/read_write.c:670 [inline] __se_sys_write fs/read_write.c:667 [inline] __x64_sys_write+0x3e/0x50 fs/read_write.c:667 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 1376 Comm: syz-fuzzer Not tainted 5.9.0-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================