================================================================== BUG: KCSAN: data-race in tcp_poll / tcp_reset write to 0xffff888130d3b6e8 of 4 bytes by interrupt on cpu 0: tcp_reset+0xaf/0x1b0 tcp_rcv_synsent_state_process+0x811/0x14e0 net/ipv4/tcp_input.c:6180 tcp_rcv_state_process+0x16c/0x1250 net/ipv4/tcp_input.c:6444 tcp_v4_do_rcv+0x431/0x5a0 net/ipv4/tcp_ipv4.c:1683 tcp_v4_rcv+0x238a/0x2700 net/ipv4/tcp_ipv4.c:2074 ip_protocol_deliver_rcu+0x25c/0x4d0 net/ipv4/ip_input.c:205 ip_local_deliver_finish net/ipv4/ip_input.c:233 [inline] NF_HOOK include/linux/netfilter.h:307 [inline] ip_local_deliver+0x207/0x300 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:461 [inline] ip_rcv_finish net/ipv4/ip_input.c:437 [inline] NF_HOOK include/linux/netfilter.h:307 [inline] ip_rcv+0x1b1/0x260 net/ipv4/ip_input.c:556 __netif_receive_skb_one_core net/core/dev.c:5405 [inline] __netif_receive_skb+0x8b/0x1b0 net/core/dev.c:5519 process_backlog+0x23f/0x3c0 net/core/dev.c:5847 __napi_poll+0x65/0x3f0 net/core/dev.c:6413 napi_poll net/core/dev.c:6480 [inline] net_rx_action+0x29e/0x650 net/core/dev.c:6567 __do_softirq+0x158/0x2de kernel/softirq.c:558 run_ksoftirqd+0x1f/0x30 kernel/softirq.c:921 smpboot_thread_fn+0x308/0x4a0 kernel/smpboot.c:164 kthread+0x1bf/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 read to 0xffff888130d3b6e8 of 4 bytes by task 12539 on cpu 1: tcp_poll+0x4a6/0x580 net/ipv4/tcp.c:588 sock_poll+0x23e/0x260 net/socket.c:1306 vfs_poll include/linux/poll.h:88 [inline] io_poll_check_events+0x212/0x450 fs/io_uring.c:5931 io_apoll_task_func+0x31/0x460 fs/io_uring.c:5991 handle_tw_list fs/io_uring.c:2479 [inline] tctx_task_work+0x7d3/0xab0 fs/io_uring.c:2513 task_work_run+0x8e/0x110 kernel/task_work.c:164 get_signal+0x144f/0x15a0 kernel/signal.c:2681 arch_do_signal_or_restart+0x87/0x2b0 arch/x86/kernel/signal.c:867 exit_to_user_mode_loop kernel/entry/common.c:180 [inline] exit_to_user_mode_prepare+0xc1/0x140 kernel/entry/common.c:215 __syscall_exit_to_user_mode_work kernel/entry/common.c:297 [inline] syscall_exit_to_user_mode+0x20/0x40 kernel/entry/common.c:308 do_syscall_64+0x37/0x50 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x44/0xae value changed: 0x00000000 -> 0x0000006f Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 12539 Comm: syz-executor.3 Tainted: G W 5.17.0-syzkaller-13788-gd0d642a5d365-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================