================================================================== BUG: KCSAN: data-race in do_sys_poll / pollwake read to 0xffffc900045d7bd0 of 4 bytes by task 12655 on cpu 1: poll_schedule_timeout fs/select.c:243 [inline] do_poll fs/select.c:965 [inline] do_sys_poll+0x9b4/0xc10 fs/select.c:1016 __do_sys_ppoll fs/select.c:1122 [inline] __se_sys_ppoll+0x1af/0x1f0 fs/select.c:1102 __x64_sys_ppoll+0x67/0x80 fs/select.c:1102 x64_sys_call+0xe71/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:272 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f write to 0xffffc900045d7bd0 of 4 bytes by interrupt on cpu 0: __pollwake fs/select.c:198 [inline] pollwake+0xbe/0x110 fs/select.c:218 __wake_up_common kernel/sched/wait.c:89 [inline] __wake_up_common_lock kernel/sched/wait.c:106 [inline] __wake_up+0x65/0xb0 kernel/sched/wait.c:127 bpf_ringbuf_notify+0x22/0x30 kernel/bpf/ringbuf.c:154 irq_work_single kernel/irq_work.c:221 [inline] irq_work_run_list kernel/irq_work.c:252 [inline] irq_work_run+0xdf/0x2c0 kernel/irq_work.c:261 __sysvec_irq_work+0x23/0x1a0 arch/x86/kernel/irq_work.c:22 instr_sysvec_irq_work arch/x86/kernel/irq_work.c:17 [inline] sysvec_irq_work+0x66/0x80 arch/x86/kernel/irq_work.c:17 asm_sysvec_irq_work+0x1a/0x20 arch/x86/include/asm/idtentry.h:738 native_apic_mem_write arch/x86/include/asm/apic.h:96 [inline] __default_send_IPI_shortcut arch/x86/kernel/apic/ipi.c:166 [inline] default_send_IPI_self+0x38/0x80 arch/x86/kernel/apic/ipi.c:247 __apic_send_IPI_self arch/x86/include/asm/apic.h:460 [inline] arch_irq_work_raise+0x48/0x50 arch/x86/kernel/irq_work.c:31 irq_work_raise kernel/irq_work.c:84 [inline] __irq_work_queue_local+0x82/0x1d0 kernel/irq_work.c:112 irq_work_queue+0x85/0x120 kernel/irq_work.c:124 ____bpf_ringbuf_discard kernel/bpf/ringbuf.c:532 [inline] bpf_ringbuf_discard+0xcd/0xf0 kernel/bpf/ringbuf.c:530 bpf_prog_fe0ed97373b08409+0x46/0x4a bpf_dispatcher_nop_func include/linux/bpf.h:1243 [inline] __bpf_prog_run include/linux/filter.h:691 [inline] bpf_prog_run include/linux/filter.h:698 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2406 [inline] bpf_trace_run3+0x10c/0x1d0 kernel/trace/bpf_trace.c:2448 trace_kmem_cache_free include/trace/events/kmem.h:114 [inline] kmem_cache_free+0x1fe/0x280 mm/slub.c:4551 __kfree_skb+0x102/0x150 net/core/skbuff.c:1203 consume_skb+0x57/0x180 net/core/skbuff.c:1426 netlink_broadcast_filtered+0xae7/0xbe0 net/netlink/af_netlink.c:1542 nlmsg_multicast_filtered include/net/netlink.h:1125 [inline] nlmsg_multicast include/net/netlink.h:1144 [inline] nlmsg_notify+0xca/0x170 net/netlink/af_netlink.c:2593 rtnl_notify+0x76/0x90 net/core/rtnetlink.c:757 inet_netconf_notify_devconf+0x1af/0x210 net/ipv4/devinet.c:2145 __devinet_sysctl_register+0x203/0x250 net/ipv4/devinet.c:2608 devinet_sysctl_register+0x102/0x140 net/ipv4/devinet.c:2642 inetdev_init+0x1f5/0x370 net/ipv4/devinet.c:291 inetdev_event+0x313/0xb10 net/ipv4/devinet.c:1565 notifier_call_chain kernel/notifier.c:93 [inline] raw_notifier_call_chain+0x6f/0x1d0 kernel/notifier.c:461 call_netdevice_notifiers_info+0xae/0x100 net/core/dev.c:1994 call_netdevice_notifiers_extack net/core/dev.c:2032 [inline] call_netdevice_notifiers net/core/dev.c:2046 [inline] register_netdevice+0xca9/0xe30 net/core/dev.c:10477 __ip_tunnel_create+0x1c5/0x270 net/ipv4/ip_tunnel.c:266 ip_tunnel_init_net+0x18a/0x3e0 net/ipv4/ip_tunnel.c:1159 ipgre_tap_init_net+0x35/0x40 net/ipv4/ip_gre.c:1734 ops_init+0x1ef/0x2b0 net/core/net_namespace.c:139 setup_net+0x2ea/0x7c0 net/core/net_namespace.c:343 copy_net_ns+0x37b/0x510 net/core/net_namespace.c:508 create_new_namespaces+0x228/0x430 kernel/nsproxy.c:110 unshare_nsproxy_namespaces+0xe6/0x120 kernel/nsproxy.c:228 ksys_unshare+0x3da/0x720 kernel/fork.c:3309 __do_sys_unshare kernel/fork.c:3380 [inline] __se_sys_unshare kernel/fork.c:3378 [inline] __x64_sys_unshare+0x1f/0x30 kernel/fork.c:3378 x64_sys_call+0x2c8d/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:273 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000001 -> 0x00000000 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 12633 Comm: syz-executor Tainted: G W 6.11.0-rc7-syzkaller-00135-gb7718454f937 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024 ==================================================================