================================================================== BUG: KCSAN: data-race in pollwake / pollwake write to 0xffffc9000064bc30 of 4 bytes by interrupt on cpu 0: __pollwake fs/select.c:198 [inline] pollwake+0xbe/0x110 fs/select.c:218 __wake_up_common+0xb3/0x130 kernel/sched/wait.c:107 __wake_up_common_lock kernel/sched/wait.c:138 [inline] __wake_up_sync_key+0x82/0xc0 kernel/sched/wait.c:213 sock_def_readable+0x70/0x1b0 net/core/sock.c:3324 tcp_data_ready+0x1aa/0x280 net/ipv4/tcp_input.c:5034 tcp_rcv_established+0xcba/0xea0 net/ipv4/tcp_input.c:6020 tcp_v4_do_rcv+0x2d4/0x630 net/ipv4/tcp_ipv4.c:1728 tcp_v4_rcv+0x1ade/0x1d60 net/ipv4/tcp_ipv4.c:2150 ip_protocol_deliver_rcu+0x356/0x6d0 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x13c/0x1a0 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:304 [inline] ip_local_deliver+0xec/0x1c0 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:468 [inline] ip_sublist_rcv_finish net/ipv4/ip_input.c:580 [inline] ip_list_rcv_finish net/ipv4/ip_input.c:631 [inline] ip_sublist_rcv+0x4f0/0x5c0 net/ipv4/ip_input.c:639 ip_list_rcv+0x25e/0x290 net/ipv4/ip_input.c:674 __netif_receive_skb_list_ptype net/core/dev.c:5570 [inline] __netif_receive_skb_list_core+0x356/0x460 net/core/dev.c:5618 __netif_receive_skb_list net/core/dev.c:5670 [inline] netif_receive_skb_list_internal+0x4e6/0x660 net/core/dev.c:5761 gro_normal_list include/net/gro.h:439 [inline] napi_complete_done+0x1cb/0x450 net/core/dev.c:6101 virtqueue_napi_complete drivers/net/virtio_net.c:440 [inline] virtnet_poll+0x7f4/0xb40 drivers/net/virtio_net.c:2155 __napi_poll+0x60/0x3b0 net/core/dev.c:6531 napi_poll net/core/dev.c:6598 [inline] net_rx_action+0x32b/0x750 net/core/dev.c:6731 __do_softirq+0xc1/0x265 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu kernel/softirq.c:632 [inline] irq_exit_rcu+0x3b/0x90 kernel/softirq.c:644 common_interrupt+0x7f/0x90 arch/x86/kernel/irq.c:247 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:636 arch_static_branch arch/x86/include/asm/jump_label.h:27 [inline] static_key_false include/linux/jump_label.h:207 [inline] trace_block_touch_buffer include/trace/events/block.h:46 [inline] touch_buffer fs/buffer.c:64 [inline] __find_get_block+0x649/0x890 fs/buffer.c:1417 __getblk_gfp+0x31/0x710 fs/buffer.c:1435 sb_getblk include/linux/buffer_head.h:344 [inline] __ext4_get_inode_loc+0x2cc/0x8d0 fs/ext4/inode.c:4384 ext4_get_inode_loc fs/ext4/inode.c:4512 [inline] ext4_reserve_inode_write+0xb0/0x200 fs/ext4/inode.c:5742 __ext4_mark_inode_dirty+0x8e/0x440 fs/ext4/inode.c:5919 __ext4_ext_dirty fs/ext4/extents.c:202 [inline] ext4_ext_rm_leaf fs/ext4/extents.c:2746 [inline] ext4_ext_remove_space+0x126d/0x2c80 fs/ext4/extents.c:2958 ext4_ext_truncate+0xc4/0x140 fs/ext4/extents.c:4408 ext4_truncate+0x774/0xb20 fs/ext4/inode.c:4161 ext4_evict_inode+0x8b3/0xdc0 fs/ext4/inode.c:258 evict+0x1aa/0x410 fs/inode.c:664 iput_final fs/inode.c:1775 [inline] iput+0x42c/0x5b0 fs/inode.c:1801 d_delete_notify include/linux/fsnotify.h:263 [inline] vfs_rmdir+0x274/0x2f0 fs/namei.c:4216 do_rmdir+0x194/0x310 fs/namei.c:4262 __do_sys_unlinkat fs/namei.c:4440 [inline] __se_sys_unlinkat fs/namei.c:4434 [inline] __x64_sys_unlinkat+0xa4/0xb0 fs/namei.c:4434 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd write to 0xffffc9000064bc30 of 4 bytes by task 3103 on cpu 1: __pollwake fs/select.c:198 [inline] pollwake+0xbe/0x110 fs/select.c:218 __wake_up_common+0xb3/0x130 kernel/sched/wait.c:107 __wake_up_common_lock kernel/sched/wait.c:138 [inline] __wake_up_sync_key+0x82/0xc0 kernel/sched/wait.c:213 pipe_write+0x9db/0xdb0 fs/pipe.c:595 call_write_iter include/linux/fs.h:1956 [inline] new_sync_write fs/read_write.c:491 [inline] vfs_write+0x4ab/0x7d0 fs/read_write.c:584 ksys_write+0xeb/0x1a0 fs/read_write.c:637 __do_sys_write fs/read_write.c:649 [inline] __se_sys_write fs/read_write.c:646 [inline] __x64_sys_write+0x42/0x50 fs/read_write.c:646 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x00000000 -> 0x00000001 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 3103 Comm: syz-fuzzer Not tainted 6.6.0-rc5-syzkaller-00250-g70f8c6f8f880 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/06/2023 ==================================================================