================================================================== BUG: KCSAN: data-race in selinux_inode_permission / selinux_inode_permission write to 0xffff88811b1495a0 of 4 bytes by task 13023 on cpu 0: task_avdcache_search security/selinux/hooks.c:3150 [inline] selinux_inode_permission+0x3ac/0x740 security/selinux/hooks.c:3225 security_inode_permission+0x6d/0xb0 security/security.c:2363 inode_permission+0x106/0x310 fs/namei.c:601 may_lookup fs/namei.c:1858 [inline] link_path_walk+0x162/0x900 fs/namei.c:2467 path_openat+0x1de/0x2170 fs/namei.c:4130 do_filp_open+0x109/0x230 fs/namei.c:4161 io_openat2+0x272/0x390 io_uring/openclose.c:143 io_openat+0x1b/0x30 io_uring/openclose.c:180 __io_issue_sqe+0xfe/0x2e0 io_uring/io_uring.c:1824 io_issue_sqe+0x56/0xa80 io_uring/io_uring.c:1847 io_queue_sqe io_uring/io_uring.c:2074 [inline] io_submit_sqe io_uring/io_uring.c:2334 [inline] io_submit_sqes+0x675/0x1060 io_uring/io_uring.c:2447 __do_sys_io_uring_enter io_uring/io_uring.c:3514 [inline] __se_sys_io_uring_enter+0x1c1/0x1b70 io_uring/io_uring.c:3453 __x64_sys_io_uring_enter+0x78/0x90 io_uring/io_uring.c:3453 x64_sys_call+0x2df0/0x3000 arch/x86/include/generated/asm/syscalls_64.h:427 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffff88811b1495a0 of 4 bytes by task 13028 on cpu 1: task_avdcache_search security/selinux/hooks.c:3146 [inline] selinux_inode_permission+0x334/0x740 security/selinux/hooks.c:3225 security_inode_permission+0x6d/0xb0 security/security.c:2363 inode_permission+0x106/0x310 fs/namei.c:601 may_lookup fs/namei.c:1858 [inline] link_path_walk+0x162/0x900 fs/namei.c:2467 path_lookupat+0x63/0x2a0 fs/namei.c:2675 filename_lookup+0x147/0x340 fs/namei.c:2705 user_path_at+0x3e/0x130 fs/namei.c:3215 do_mount fs/namespace.c:4047 [inline] __do_sys_mount fs/namespace.c:4238 [inline] __se_sys_mount+0x25b/0x2e0 fs/namespace.c:4215 __x64_sys_mount+0x67/0x80 fs/namespace.c:4215 x64_sys_call+0x2b51/0x3000 arch/x86/include/generated/asm/syscalls_64.h:166 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000 -> 0x00000001 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 13028 Comm: syz.2.3396 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 ==================================================================