dccp_time_wait: time wait bucket table overflow dccp_time_wait: time wait bucket table overflow dccp_time_wait: time wait bucket table overflow ================================================================== BUG: KCSAN: data-race in dccp_poll / dccp_rcv_reset write to 0xffff88813adc8962 of 1 bytes by interrupt on cpu 1: dccp_fin net/dccp/input.c:38 [inline] dccp_rcv_reset+0xad/0x190 net/dccp/input.c:152 dccp_rcv_state_process+0x2fb/0x4d0 net/dccp/input.c:662 dccp_v4_do_rcv+0x8f/0xe0 net/dccp/ipv4.c:695 sk_backlog_rcv include/net/sock.h:1061 [inline] __sk_receive_skb+0x22e/0x590 net/core/sock.c:565 dccp_v4_rcv+0xc55/0xe90 net/dccp/ipv4.c:889 ip_protocol_deliver_rcu+0x23b/0x480 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x126/0x160 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:307 [inline] ip_local_deliver+0x100/0x1b0 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:461 [inline] ip_rcv_finish net/ipv4/ip_input.c:437 [inline] NF_HOOK include/linux/netfilter.h:307 [inline] ip_rcv+0x1b1/0x260 net/ipv4/ip_input.c:557 __netif_receive_skb_one_core net/core/dev.c:5478 [inline] __netif_receive_skb+0x8b/0x1b0 net/core/dev.c:5592 process_backlog+0x23f/0x3b0 net/core/dev.c:5920 __napi_poll+0x65/0x390 net/core/dev.c:6486 napi_poll net/core/dev.c:6553 [inline] net_rx_action+0x37e/0x730 net/core/dev.c:6664 __do_softirq+0x158/0x2e3 kernel/softirq.c:571 run_ksoftirqd+0x1f/0x30 kernel/softirq.c:934 smpboot_thread_fn+0x308/0x4a0 kernel/smpboot.c:164 kthread+0x1a9/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 read to 0xffff88813adc8962 of 1 bytes by task 6504 on cpu 0: dccp_poll+0xe0/0x3c0 net/dccp/proto.c:326 sock_poll+0x23e/0x260 net/socket.c:1353 vfs_poll include/linux/poll.h:88 [inline] io_poll_check_events+0x1ee/0x4f0 fs/io_uring.c:6952 io_apoll_task_func+0x36/0x2f0 fs/io_uring.c:7025 handle_tw_list fs/io_uring.c:2984 [inline] tctx_task_work+0x8c0/0xc00 fs/io_uring.c:3013 task_work_run+0x8e/0x110 kernel/task_work.c:177 get_signal+0xeca/0x1020 kernel/signal.c:2634 arch_do_signal_or_restart+0x87/0x2d0 arch/x86/kernel/signal.c:869 exit_to_user_mode_loop+0x78/0x130 kernel/entry/common.c:166 exit_to_user_mode_prepare kernel/entry/common.c:201 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline] syscall_exit_to_user_mode+0x6a/0x90 kernel/entry/common.c:294 do_syscall_64+0x37/0x70 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x46/0xb0 value changed: 0x00 -> 0x03 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 6504 Comm: syz-executor.0 Tainted: G W 5.19.0-rc1-syzkaller-00011-g9886142c7a22-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================