================================================================== BUG: KCSAN: data-race in do_select / pollwake read to 0xffffc900019979d0 of 4 bytes by task 16515 on cpu 0: poll_schedule_timeout fs/select.c:240 [inline] do_select+0xeba/0xfc0 fs/select.c:603 core_sys_select+0x4c3/0x6d0 fs/select.c:677 do_pselect fs/select.c:759 [inline] __do_sys_pselect6 fs/select.c:802 [inline] __se_sys_pselect6+0x212/0x270 fs/select.c:793 __x64_sys_pselect6+0x78/0x90 fs/select.c:793 x64_sys_call+0x1c26/0x2e10 arch/x86/include/generated/asm/syscalls_64.h:271 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xc9/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f write to 0xffffc900019979d0 of 4 bytes by interrupt on cpu 1: __pollwake fs/select.c:195 [inline] pollwake+0xc1/0x110 fs/select.c:215 __wake_up_common kernel/sched/wait.c:89 [inline] __wake_up_common_lock kernel/sched/wait.c:106 [inline] __wake_up+0x65/0xb0 kernel/sched/wait.c:127 bpf_ringbuf_notify+0x22/0x30 kernel/bpf/ringbuf.c:155 irq_work_single kernel/irq_work.c:221 [inline] irq_work_run_list kernel/irq_work.c:252 [inline] irq_work_run+0xe1/0x2d0 kernel/irq_work.c:261 __sysvec_irq_work+0x23/0x1a0 arch/x86/kernel/irq_work.c:22 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0x66/0x80 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 native_apic_mem_write arch/x86/include/asm/apic.h:101 [inline] __default_send_IPI_shortcut arch/x86/kernel/apic/ipi.c:167 [inline] default_send_IPI_self+0x38/0x80 arch/x86/kernel/apic/ipi.c:248 __apic_send_IPI_self arch/x86/include/asm/apic.h:455 [inline] arch_irq_work_raise+0x48/0x50 arch/x86/kernel/irq_work.c:31 irq_work_raise kernel/irq_work.c:84 [inline] __irq_work_queue_local+0x82/0x1d0 kernel/irq_work.c:112 irq_work_queue+0x85/0x120 kernel/irq_work.c:124 bpf_ringbuf_commit kernel/bpf/ringbuf.c:-1 [inline] ____bpf_ringbuf_discard kernel/bpf/ringbuf.c:525 [inline] bpf_ringbuf_discard+0xcd/0xf0 kernel/bpf/ringbuf.c:523 bpf_prog_fe0ed97373b08409+0x47/0x4b bpf_dispatcher_nop_func include/linux/bpf.h:1316 [inline] __bpf_prog_run include/linux/filter.h:718 [inline] bpf_prog_run include/linux/filter.h:725 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2363 [inline] bpf_trace_run3+0x10e/0x1d0 kernel/trace/bpf_trace.c:2405 __do_trace_kmem_cache_free include/trace/events/kmem.h:114 [inline] trace_kmem_cache_free include/trace/events/kmem.h:114 [inline] kmem_cache_free+0x243/0x2e0 mm/slub.c:4757 kfree_skbmem net/core/skbuff.c:-1 [inline] __kfree_skb+0x102/0x150 net/core/skbuff.c:1177 consume_skb+0x49/0x160 net/core/skbuff.c:1408 nlmon_xmit+0x51/0x60 drivers/net/nlmon.c:15 __netdev_start_xmit include/linux/netdevice.h:5203 [inline] netdev_start_xmit include/linux/netdevice.h:5212 [inline] xmit_one net/core/dev.c:3776 [inline] dev_hard_start_xmit+0x12e/0x400 net/core/dev.c:3792 sch_direct_xmit+0x1ab/0x590 net/sched/sch_generic.c:343 qdisc_restart net/sched/sch_generic.c:408 [inline] __qdisc_run+0x6e5/0x1140 net/sched/sch_generic.c:416 __dev_xmit_skb net/core/dev.c:4087 [inline] __dev_queue_xmit+0x9d9/0x20b0 net/core/dev.c:4595 dev_queue_xmit include/linux/netdevice.h:3350 [inline] __netlink_deliver_tap_skb net/netlink/af_netlink.c:307 [inline] __netlink_deliver_tap+0x3be/0x4f0 net/netlink/af_netlink.c:325 netlink_deliver_tap net/netlink/af_netlink.c:338 [inline] __netlink_sendskb net/netlink/af_netlink.c:1256 [inline] netlink_sendskb+0x12c/0x150 net/netlink/af_netlink.c:1265 netlink_unicast+0x296/0x6c0 net/netlink/af_netlink.c:1354 nlmsg_unicast include/net/netlink.h:1162 [inline] netlink_ack+0x4b9/0x4f0 net/netlink/af_netlink.c:2496 netlink_rcv_skb+0x19f/0x230 net/netlink/af_netlink.c:2540 genl_rcv+0x28/0x40 net/netlink/genetlink.c:1219 netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline] netlink_unicast+0x605/0x6c0 net/netlink/af_netlink.c:1339 netlink_sendmsg+0x609/0x720 net/netlink/af_netlink.c:1883 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x140/0x180 net/socket.c:727 __sys_sendto+0x1aa/0x230 net/socket.c:2180 __do_sys_sendto net/socket.c:2187 [inline] __se_sys_sendto net/socket.c:2183 [inline] __x64_sys_sendto+0x78/0x90 net/socket.c:2183 x64_sys_call+0x2bcb/0x2e10 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xc9/0x1a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000001 -> 0x00000000 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 16572 Comm: syz.3.5243 Tainted: G W 6.15.0-rc2-syzkaller-00488-g6fea5fabd332 #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ==================================================================