================================================================== BUG: KCSAN: data-race in handle_edge_irq / kstat_irqs_usr write to 0xffff8881288f6488 of 4 bytes by interrupt on cpu 0: kstat_incr_irqs_this_cpu kernel/irq/internals.h:259 [inline] handle_edge_irq+0x121/0x5f0 kernel/irq/chip.c:797 asm_call_on_stack+0xf/0x20 arch/x86/entry/entry_64.S:706 __run_on_irqstack arch/x86/include/asm/irq_stack.h:22 [inline] run_on_irqstack_cond arch/x86/include/asm/irq_stack.h:48 [inline] handle_irq arch/x86/kernel/irq.c:230 [inline] __common_interrupt arch/x86/kernel/irq.c:249 [inline] common_interrupt+0xf6/0x1e0 arch/x86/kernel/irq.c:239 asm_common_interrupt+0x1e/0x40 arch/x86/include/asm/idtentry.h:572 arch_local_irq_restore arch/x86/include/asm/paravirt.h:770 [inline] kcsan_setup_watchpoint+0x44b/0x4a0 kernel/kcsan/core.c:563 tomoyo_path_matches_pattern+0x35/0x120 security/tomoyo/util.c:920 tomoyo_compare_name_union security/tomoyo/file.c:87 [inline] tomoyo_check_path_acl+0x9b/0xe0 security/tomoyo/file.c:260 tomoyo_check_acl+0xcc/0x220 security/tomoyo/domain.c:175 tomoyo_path_permission security/tomoyo/file.c:586 [inline] tomoyo_path_perm+0x22f/0x330 security/tomoyo/file.c:838 tomoyo_inode_getattr+0x18/0x20 security/tomoyo/tomoyo.c:123 security_inode_getattr+0x7f/0xd0 security/security.c:1278 vfs_getattr fs/stat.c:121 [inline] vfs_statx+0x118/0x2b0 fs/stat.c:206 vfs_lstat include/linux/fs.h:3178 [inline] __do_sys_newlstat fs/stat.c:374 [inline] __se_sys_newlstat+0x46/0x250 fs/stat.c:368 __x64_sys_newlstat+0x2d/0x40 fs/stat.c:368 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 read to 0xffff8881288f6488 of 4 bytes by task 23469 on cpu 1: kstat_irqs kernel/irq/irqdesc.c:997 [inline] kstat_irqs_usr+0xbe/0x190 kernel/irq/irqdesc.c:1018 show_all_irqs fs/proc/stat.c:101 [inline] show_stat+0xacd/0xd10 fs/proc/stat.c:194 seq_read+0x2ee/0x900 fs/seq_file.c:208 pde_read fs/proc/inode.c:306 [inline] proc_reg_read+0xde/0x1a0 fs/proc/inode.c:316 do_loop_readv_writev fs/read_write.c:734 [inline] do_iter_read+0x3d2/0x4b0 fs/read_write.c:955 vfs_readv fs/read_write.c:1073 [inline] do_preadv+0x13b/0x230 fs/read_write.c:1165 __do_sys_preadv fs/read_write.c:1215 [inline] __se_sys_preadv fs/read_write.c:1210 [inline] __x64_sys_preadv+0x54/0x60 fs/read_write.c:1210 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 23469 Comm: syz-executor.3 Not tainted 5.9.0-rc3-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================