================================================================== BUG: KCSAN: data-race in do_select / pollwake write to 0xffffc90001437a00 of 4 bytes by interrupt on cpu 1: __pollwake fs/select.c:198 [inline] pollwake+0xbe/0x110 fs/select.c:218 __wake_up_common kernel/sched/wait.c:89 [inline] __wake_up_common_lock kernel/sched/wait.c:106 [inline] __wake_up+0x65/0xb0 kernel/sched/wait.c:127 bpf_ringbuf_notify+0x22/0x30 kernel/bpf/ringbuf.c:152 irq_work_single kernel/irq_work.c:221 [inline] irq_work_run_list kernel/irq_work.c:252 [inline] irq_work_run+0xdf/0x2c0 kernel/irq_work.c:261 __sysvec_irq_work+0x23/0x1a0 arch/x86/kernel/irq_work.c:22 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0x2f/0x80 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 native_apic_mem_write arch/x86/include/asm/apic.h:95 [inline] __default_send_IPI_shortcut arch/x86/kernel/apic/ipi.c:166 [inline] default_send_IPI_self+0x38/0x80 arch/x86/kernel/apic/ipi.c:247 __apic_send_IPI_self arch/x86/include/asm/apic.h:459 [inline] arch_irq_work_raise+0x48/0x50 arch/x86/kernel/irq_work.c:31 irq_work_raise kernel/irq_work.c:84 [inline] __irq_work_queue_local+0x82/0x1d0 kernel/irq_work.c:112 irq_work_queue+0x85/0x120 kernel/irq_work.c:124 ____bpf_ringbuf_discard kernel/bpf/ringbuf.c:513 [inline] bpf_ringbuf_discard+0xcd/0xf0 kernel/bpf/ringbuf.c:511 ___bpf_prog_run+0x9ab/0x46c0 kernel/bpf/core.c:1997 __bpf_prog_run32+0x74/0xa0 kernel/bpf/core.c:2236 bpf_dispatcher_nop_func include/linux/bpf.h:1234 [inline] __bpf_prog_run include/linux/filter.h:657 [inline] bpf_prog_run include/linux/filter.h:664 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2381 [inline] bpf_trace_run2+0x97/0x150 kernel/trace/bpf_trace.c:2420 trace_kfree include/trace/events/kmem.h:94 [inline] kfree+0x1e7/0x270 mm/slub.c:4377 skb_kfree_head net/core/skbuff.c:1096 [inline] skb_free_head net/core/skbuff.c:1108 [inline] skb_release_data+0x4da/0x590 net/core/skbuff.c:1136 skb_release_all net/core/skbuff.c:1202 [inline] __kfree_skb+0x44/0x150 net/core/skbuff.c:1216 kfree_skb_reason+0xb0/0x2b0 net/core/skbuff.c:1252 __netif_receive_skb_core+0x1d01/0x20b0 net/core/dev.c:5518 __netif_receive_skb_one_core net/core/dev.c:5542 [inline] __netif_receive_skb+0x5a/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:851 [inline] __dev_queue_xmit+0xb21/0x1e50 net/core/dev.c:4368 dev_queue_xmit include/linux/netdevice.h:3091 [inline] batadv_send_skb_packet+0x264/0x300 net/batman-adv/send.c:108 batadv_send_broadcast_skb+0x24/0x30 net/batman-adv/send.c:127 batadv_iv_ogm_send_to_if net/batman-adv/bat_iv_ogm.c:392 [inline] batadv_iv_ogm_emit net/batman-adv/bat_iv_ogm.c:420 [inline] batadv_iv_send_outstanding_bat_ogm_packet+0x3f0/0x4b0 net/batman-adv/bat_iv_ogm.c:1700 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read to 0xffffc90001437a00 of 4 bytes by task 14034 on cpu 0: poll_schedule_timeout fs/select.c:243 [inline] do_select+0xeb0/0xfa0 fs/select.c:607 core_sys_select+0x362/0x530 fs/select.c:681 do_pselect fs/select.c:763 [inline] __do_sys_pselect6 fs/select.c:804 [inline] __se_sys_pselect6+0x213/0x280 fs/select.c:795 __x64_sys_pselect6+0x78/0x90 fs/select.c:795 x64_sys_call+0xe7b/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:271 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000 -> 0x00000001 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 14034 Comm: syz-executor.4 Tainted: G W 6.9.0-rc4-syzkaller-00214-g13a2e429f644 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 ==================================================================