================================================================== BUG: KCSAN: data-race in do_select / pollwake write to 0xffffc90000e4f9d0 of 4 bytes by interrupt on cpu 1: __pollwake fs/select.c:195 [inline] pollwake+0xc1/0x110 fs/select.c:215 __wake_up_common kernel/sched/wait.c:89 [inline] __wake_up_common_lock kernel/sched/wait.c:106 [inline] __wake_up_sync_key+0x51/0x80 kernel/sched/wait.c:173 sock_def_readable+0x70/0x1b0 net/core/sock.c:3533 tcp_data_ready+0x1ad/0x290 net/ipv4/tcp_input.c:5250 tcp_rcv_established+0xca2/0xe90 net/ipv4/tcp_input.c:6279 tcp_v4_do_rcv+0x665/0x740 net/ipv4/tcp_ipv4.c:1925 tcp_v4_rcv+0x1a1d/0x1dd0 net/ipv4/tcp_ipv4.c:2363 ip_protocol_deliver_rcu+0x36c/0x760 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x180/0x210 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:314 [inline] ip_local_deliver+0x102/0x1e0 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:469 [inline] ip_sublist_rcv_finish net/ipv4/ip_input.c:578 [inline] ip_list_rcv_finish net/ipv4/ip_input.c:627 [inline] ip_sublist_rcv+0x55d/0x650 net/ipv4/ip_input.c:635 ip_list_rcv+0x25f/0x290 net/ipv4/ip_input.c:669 __netif_receive_skb_list_ptype net/core/dev.c:5928 [inline] __netif_receive_skb_list_core+0x4f4/0x520 net/core/dev.c:5975 __netif_receive_skb_list net/core/dev.c:6027 [inline] netif_receive_skb_list_internal+0x4e6/0x670 net/core/dev.c:6118 gro_normal_list include/net/gro.h:532 [inline] napi_complete_done+0x1bf/0x440 net/core/dev.c:6488 virtqueue_napi_complete drivers/net/virtio_net.c:737 [inline] virtnet_poll+0x1cf7/0x2150 drivers/net/virtio_net.c:3053 __napi_poll+0x63/0x3c0 net/core/dev.c:7322 napi_poll net/core/dev.c:7386 [inline] net_rx_action+0x3a3/0x800 net/core/dev.c:7508 handle_softirqs+0xbf/0x280 kernel/softirq.c:579 __do_softirq kernel/softirq.c:613 [inline] invoke_softirq kernel/softirq.c:453 [inline] __irq_exit_rcu+0x3a/0xc0 kernel/softirq.c:680 common_interrupt+0x81/0x90 arch/x86/kernel/irq.c:285 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 is_atomic kernel/kcsan/core.c:249 [inline] should_watch kernel/kcsan/core.c:277 [inline] check_access kernel/kcsan/core.c:752 [inline] __tsan_read8+0xe7/0x180 kernel/kcsan/core.c:1025 _find_next_bit+0x29/0x90 lib/find_bit.c:145 find_next_bit include/linux/find.h:69 [inline] ebitmap_next_positive security/selinux/ss/ebitmap.h:72 [inline] context_struct_compute_av+0x499/0xaf0 security/selinux/ss/services.c:661 security_compute_av+0x27d/0x8f0 security/selinux/ss/services.c:1169 avc_compute_av+0x5e/0x3e0 security/selinux/avc.c:992 avc_perm_nonode+0x65/0xf0 security/selinux/avc.c:1117 avc_has_perm_noaudit+0x16a/0x210 security/selinux/avc.c:1160 selinux_inode_permission+0x2e6/0x430 security/selinux/hooks.c:3118 security_inode_permission+0x76/0xc0 security/security.c:2324 inode_permission+0xbf/0x300 fs/namei.c:601 may_lookup fs/namei.c:1835 [inline] link_path_walk+0x147/0x840 fs/namei.c:2441 path_parentat fs/namei.c:2697 [inline] __filename_parentat+0x168/0x410 fs/namei.c:2721 filename_parentat fs/namei.c:2739 [inline] do_unlinkat+0x9d/0x4b0 fs/namei.c:4583 __do_sys_unlink fs/namei.c:4654 [inline] __se_sys_unlink fs/namei.c:4652 [inline] __x64_sys_unlink+0x2e/0x40 fs/namei.c:4652 x64_sys_call+0x2358/0x2e10 arch/x86/include/generated/asm/syscalls_64.h:88 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffc90000e4f9d0 of 4 bytes by task 3294 on cpu 0: poll_schedule_timeout fs/select.c:240 [inline] do_select+0xeba/0xfc0 fs/select.c:603 core_sys_select+0x4c3/0x6d0 fs/select.c:677 do_pselect fs/select.c:759 [inline] __do_sys_pselect6 fs/select.c:802 [inline] __se_sys_pselect6+0x212/0x270 fs/select.c:793 __x64_sys_pselect6+0x78/0x90 fs/select.c:793 x64_sys_call+0x1c26/0x2e10 arch/x86/include/generated/asm/syscalls_64.h:271 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000 -> 0x00000001 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3294 Comm: syz-executor Not tainted 6.15.0-rc2-syzkaller-00087-gcfb2e2c57aef #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ==================================================================