================================================================== BUG: KCSAN: data-race in tcp_poll / tcp_reset write to 0xffff88813a5b8420 of 4 bytes by interrupt on cpu 1: tcp_reset+0xaf/0x1b0 tcp_rcv_synsent_state_process+0x817/0xf50 net/ipv4/tcp_input.c:6217 tcp_rcv_state_process+0x187/0x1010 net/ipv4/tcp_input.c:6488 tcp_v4_do_rcv+0x434/0x5a0 net/ipv4/tcp_ipv4.c:1704 tcp_v4_rcv+0x1806/0x1a70 net/ipv4/tcp_ipv4.c:2100 ip_protocol_deliver_rcu+0x23f/0x490 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x126/0x160 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:302 [inline] ip_local_deliver+0x100/0x1b0 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:455 [inline] ip_rcv_finish net/ipv4/ip_input.c:444 [inline] NF_HOOK include/linux/netfilter.h:302 [inline] ip_rcv+0x1b1/0x260 net/ipv4/ip_input.c:564 __netif_receive_skb_one_core net/core/dev.c:5485 [inline] __netif_receive_skb+0x8b/0x1b0 net/core/dev.c:5599 process_backlog+0x23f/0x3b0 net/core/dev.c:5927 __napi_poll+0x65/0x390 net/core/dev.c:6494 napi_poll net/core/dev.c:6561 [inline] net_rx_action+0x37e/0x730 net/core/dev.c:6672 __do_softirq+0xf2/0x2c7 kernel/softirq.c:571 run_ksoftirqd+0x1f/0x30 kernel/softirq.c:934 smpboot_thread_fn+0x308/0x4a0 kernel/smpboot.c:164 kthread+0x1a9/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:306 read to 0xffff88813a5b8420 of 4 bytes by task 23703 on cpu 0: tcp_poll+0x48a/0x560 net/ipv4/tcp.c:590 sock_poll+0x23e/0x260 net/socket.c:1353 vfs_poll include/linux/poll.h:88 [inline] io_poll_check_events+0x183/0x360 io_uring/poll.c:233 io_apoll_task_func+0x1a/0xa0 io_uring/poll.c:295 handle_tw_list+0x12a/0x180 io_uring/io_uring.c:1037 tctx_task_work+0xbd/0x360 io_uring/io_uring.c:1090 task_work_run+0x8e/0x110 kernel/task_work.c:177 get_signal+0xeca/0x1020 kernel/signal.c:2634 arch_do_signal_or_restart+0x87/0x2d0 arch/x86/kernel/signal.c:869 exit_to_user_mode_loop+0x78/0x130 kernel/entry/common.c:166 exit_to_user_mode_prepare kernel/entry/common.c:201 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:283 [inline] syscall_exit_to_user_mode+0x6a/0x90 kernel/entry/common.c:294 do_syscall_64+0x37/0x70 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x00000000 -> 0x0000006f Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 23703 Comm: syz-executor.0 Not tainted 6.0.0-syzkaller-07362-g62e6e5940c0c-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/22/2022 ==================================================================