================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / vring_interrupt write to 0xffff88810335ef5a of 1 bytes by interrupt on cpu 0: vring_interrupt+0x124/0x170 drivers/virtio/virtio_ring.c:2466 __handle_irq_event_percpu+0x92/0x400 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0x60/0xf0 kernel/irq/handle.c:210 handle_edge_irq+0x17e/0x5a0 kernel/irq/chip.c:819 generic_handle_irq_desc include/linux/irqdesc.h:158 [inline] handle_irq arch/x86/kernel/irq.c:231 [inline] __common_interrupt+0x60/0x100 arch/x86/kernel/irq.c:250 common_interrupt+0x9a/0xc0 arch/x86/kernel/irq.c:240 asm_common_interrupt+0x22/0x40 arch/x86/include/asm/idtentry.h:640 __tsan_read4+0xe/0x180 kernel/kcsan/core.c:1015 __should_failslab+0x7a/0x90 mm/failslab.c:44 should_failslab+0x5/0x20 mm/slab_common.c:1463 slab_pre_alloc_hook mm/slab.h:722 [inline] slab_alloc_node mm/slab.c:3245 [inline] __kmem_cache_alloc_node+0x41/0x2f0 mm/slab.c:3544 kmalloc_trace+0x26/0x90 mm/slab_common.c:1062 kmalloc include/linux/slab.h:580 [inline] kzalloc include/linux/slab.h:720 [inline] sctp_add_bind_addr+0x70/0x200 net/sctp/bind_addr.c:144 sctp_copy_local_addr_list+0x1bb/0x240 net/sctp/protocol.c:165 sctp_copy_one_addr+0x7b/0x430 net/sctp/bind_addr.c:460 sctp_bind_addr_copy+0x7c/0x290 net/sctp/bind_addr.c:56 sctp_assoc_set_bind_addr_from_ep+0xbc/0xd0 net/sctp/associola.c:1589 sctp_connect_new_asoc+0x1cb/0x3a0 net/sctp/socket.c:1093 __sctp_connect+0x405/0x780 net/sctp/socket.c:1195 __sctp_setsockopt_connectx net/sctp/socket.c:1334 [inline] sctp_getsockopt_connectx3+0x25c/0x340 net/sctp/socket.c:1419 sctp_getsockopt+0x534/0x720 net/sctp/socket.c:8112 sock_common_getsockopt+0x53/0x60 net/core/sock.c:3637 __sys_getsockopt+0x17a/0x1e0 net/socket.c:2290 __do_sys_getsockopt net/socket.c:2305 [inline] __se_sys_getsockopt net/socket.c:2302 [inline] __x64_sys_getsockopt+0x62/0x70 net/socket.c:2302 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd read to 0xffff88810335ef5a of 1 bytes by interrupt on cpu 1: virtqueue_disable_cb+0x17/0x160 drivers/virtio/virtio_ring.c:2315 start_xmit+0xd1/0xb70 drivers/net/virtio_net.c:1837 __netdev_start_xmit include/linux/netdevice.h:4865 [inline] netdev_start_xmit include/linux/netdevice.h:4879 [inline] xmit_one+0xc0/0x2a0 net/core/dev.c:3583 dev_hard_start_xmit+0x72/0x120 net/core/dev.c:3599 sch_direct_xmit+0x1ac/0x580 net/sched/sch_generic.c:342 __dev_xmit_skb+0x806/0xdb0 net/core/dev.c:3810 __dev_queue_xmit+0x676/0x11c0 net/core/dev.c:4215 dev_queue_xmit include/linux/netdevice.h:3035 [inline] neigh_hh_output include/net/neighbour.h:530 [inline] neigh_output include/net/neighbour.h:544 [inline] ip_finish_output2+0x70b/0x850 net/ipv4/ip_output.c:228 ip_finish_output+0xf3/0x250 net/ipv4/ip_output.c:316 NF_HOOK_COND include/linux/netfilter.h:291 [inline] ip_output+0xf3/0x1a0 net/ipv4/ip_output.c:430 dst_output include/net/dst.h:444 [inline] ip_local_out net/ipv4/ip_output.c:126 [inline] __ip_queue_xmit+0xa2e/0xa50 net/ipv4/ip_output.c:532 ip_queue_xmit+0x34/0x40 net/ipv4/ip_output.c:546 __tcp_transmit_skb+0x1242/0x1730 net/ipv4/tcp_output.c:1399 tcp_transmit_skb net/ipv4/tcp_output.c:1417 [inline] tcp_write_xmit+0x13c8/0x30b0 net/ipv4/tcp_output.c:2693 __tcp_push_pending_frames+0x68/0x1c0 net/ipv4/tcp_output.c:2877 tcp_push_pending_frames include/net/tcp.h:1946 [inline] tcp_data_snd_check net/ipv4/tcp_input.c:5510 [inline] tcp_rcv_established+0x69e/0xe00 net/ipv4/tcp_input.c:6019 tcp_v4_do_rcv+0x2a8/0x5e0 net/ipv4/tcp_ipv4.c:1721 tcp_v4_rcv+0x18e6/0x1b40 net/ipv4/tcp_ipv4.c:2142 ip_protocol_deliver_rcu+0x380/0x710 net/ipv4/ip_input.c:205 ip_local_deliver_finish+0x134/0x1a0 net/ipv4/ip_input.c:233 NF_HOOK include/linux/netfilter.h:302 [inline] ip_local_deliver+0x100/0x1b0 net/ipv4/ip_input.c:254 dst_input include/net/dst.h:454 [inline] ip_sublist_rcv_finish net/ipv4/ip_input.c:580 [inline] ip_list_rcv_finish net/ipv4/ip_input.c:630 [inline] ip_sublist_rcv+0x524/0x5f0 net/ipv4/ip_input.c:638 ip_list_rcv+0x277/0x2b0 net/ipv4/ip_input.c:673 __netif_receive_skb_list_ptype net/core/dev.c:5525 [inline] __netif_receive_skb_list_core+0x37d/0x490 net/core/dev.c:5573 __netif_receive_skb_list+0x2a2/0x320 net/core/dev.c:5625 netif_receive_skb_list_internal+0x254/0x390 net/core/dev.c:5716 gro_normal_list include/net/gro.h:433 [inline] napi_complete_done+0x1b2/0x3c0 net/core/dev.c:6056 virtqueue_napi_complete drivers/net/virtio_net.c:405 [inline] virtnet_poll+0x6e4/0x990 drivers/net/virtio_net.c:1682 __napi_poll+0x65/0x390 net/core/dev.c:6485 napi_poll net/core/dev.c:6552 [inline] net_rx_action+0x37e/0x730 net/core/dev.c:6663 __do_softirq+0xf2/0x2c7 kernel/softirq.c:571 run_ksoftirqd+0x1f/0x30 kernel/softirq.c:934 smpboot_thread_fn+0x308/0x4a0 kernel/smpboot.c:164 kthread+0x1a9/0x1e0 kernel/kthread.c:376 ret_from_fork+0x1f/0x30 arch/x86/entry/entry_64.S:308 value changed: 0x00 -> 0x01 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 18 Comm: ksoftirqd/1 Not tainted 6.1.0-syzkaller-14587-g51094a24b85e-dirty #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/26/2022 ==================================================================