================================================================== BUG: KCSAN: data-race in pollwake / pollwake write to 0xffffc900015b79e0 of 4 bytes by interrupt on cpu 1: __pollwake fs/select.c:195 [inline] pollwake+0xb6/0x100 fs/select.c:215 __wake_up_common kernel/sched/wait.c:89 [inline] __wake_up_common_lock kernel/sched/wait.c:106 [inline] __wake_up_sync_key+0x4f/0x80 kernel/sched/wait.c:173 sock_def_readable+0x70/0x190 net/core/sock.c:3583 tcp_data_ready+0x1ae/0x290 net/ipv4/tcp_input.c:5259 tcp_data_queue+0x15b0/0x3270 net/ipv4/tcp_input.c:5349 tcp_rcv_established+0xa0f/0xef0 net/ipv4/tcp_input.c:6321 tcp_v4_do_rcv+0x672/0x740 net/ipv4/tcp_ipv4.c:1925 tcp_v4_rcv+0x1bd7/0x1f60 net/ipv4/tcp_ipv4.c:2363 ip_protocol_deliver_rcu+0x397/0x780 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x184/0x220 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:317 [inline] ip_local_deliver+0xe8/0x1c0 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:469 [inline] ip_sublist_rcv_finish net/ipv4/ip_input.c:578 [inline] ip_list_rcv_finish net/ipv4/ip_input.c:627 [inline] ip_sublist_rcv+0x56b/0x650 net/ipv4/ip_input.c:635 ip_list_rcv+0x261/0x290 net/ipv4/ip_input.c:669 __netif_receive_skb_list_ptype net/core/dev.c:6020 [inline] __netif_receive_skb_list_core+0x4dc/0x500 net/core/dev.c:6067 __netif_receive_skb_list net/core/dev.c:6119 [inline] netif_receive_skb_list_internal+0x487/0x600 net/core/dev.c:6210 gro_normal_list include/net/gro.h:532 [inline] napi_complete_done+0x1a3/0x410 net/core/dev.c:6580 virtqueue_napi_complete drivers/net/virtio_net.c:737 [inline] virtnet_poll+0x189f/0x1d10 drivers/net/virtio_net.c:3053 __napi_poll+0x66/0x3a0 net/core/dev.c:7414 napi_poll net/core/dev.c:7478 [inline] net_rx_action+0x391/0x830 net/core/dev.c:7605 handle_softirqs+0xba/0x290 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0x3a/0xc0 kernel/softirq.c:680 common_interrupt+0x83/0x90 arch/x86/kernel/irq.c:285 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 is_atomic kernel/kcsan/core.c:249 [inline] should_watch kernel/kcsan/core.c:277 [inline] check_access kernel/kcsan/core.c:752 [inline] __tsan_read8+0xe9/0x190 kernel/kcsan/core.c:1025 __bpf_trace_run kernel/trace/bpf_trace.c:2244 [inline] bpf_trace_run2+0x51/0x1c0 kernel/trace/bpf_trace.c:2299 __do_trace_kfree include/trace/events/kmem.h:94 [inline] trace_kfree include/trace/events/kmem.h:94 [inline] kfree+0x27b/0x320 mm/slub.c:4829 netlbl_secattr_destroy include/net/netlabel.h:367 [inline] netlbl_secattr_free include/net/netlabel.h:399 [inline] selinux_netlbl_sk_security_free+0x76/0x1d0 security/selinux/netlabel.c:162 selinux_sk_free_security+0x3b/0x50 security/selinux/hooks.c:5391 security_sk_free+0x65/0x80 security/security.c:4873 sk_prot_free net/core/sock.c:2279 [inline] __sk_destruct+0x353/0x480 net/core/sock.c:2381 sk_destruct net/core/sock.c:2409 [inline] __sk_free+0x227/0x270 net/core/sock.c:2420 sk_free+0x39/0x80 net/core/sock.c:2431 sock_put include/net/sock.h:1960 [inline] tcp_close+0x8d/0xd0 net/ipv4/tcp.c:3281 inet_release+0xcb/0xf0 net/ipv4/af_inet.c:435 __sock_release net/socket.c:647 [inline] sock_close+0x6b/0x150 net/socket.c:1391 __fput+0x298/0x650 fs/file_table.c:465 fput_close_sync+0x6e/0x120 fs/file_table.c:570 __do_sys_close fs/open.c:1589 [inline] __se_sys_close fs/open.c:1574 [inline] __x64_sys_close+0x56/0xf0 fs/open.c:1574 x64_sys_call+0x2747/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:4 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f write to 0xffffc900015b79e0 of 4 bytes by task 3306 on cpu 0: __pollwake fs/select.c:195 [inline] pollwake+0xb6/0x100 fs/select.c:215 __wake_up_common kernel/sched/wait.c:89 [inline] __wake_up_common_lock kernel/sched/wait.c:106 [inline] __wake_up_sync_key+0x4f/0x80 kernel/sched/wait.c:173 anon_pipe_write+0x8ba/0xaa0 fs/pipe.c:594 new_sync_write fs/read_write.c:593 [inline] vfs_write+0x4a0/0x8e0 fs/read_write.c:686 ksys_write+0xda/0x1a0 fs/read_write.c:738 __do_sys_write fs/read_write.c:749 [inline] __se_sys_write fs/read_write.c:746 [inline] __x64_sys_write+0x40/0x50 fs/read_write.c:746 x64_sys_call+0x2cdd/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:2 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000 -> 0x00000001 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3306 Comm: syz-executor Not tainted 6.16.0-rc3-syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ==================================================================