================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb read to 0xffff888102cdb778 of 2 bytes by interrupt on cpu 1: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:873 [inline] virtqueue_disable_cb+0x63/0x180 drivers/virtio/virtio_ring.c:2566 skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:777 vring_interrupt+0x161/0x190 drivers/virtio/virtio_ring.c:2715 __handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0x64/0xf0 kernel/irq/handle.c:210 handle_edge_irq+0x16d/0x5b0 kernel/irq/chip.c:831 generic_handle_irq_desc include/linux/irqdesc.h:173 [inline] handle_irq arch/x86/kernel/irq.c:247 [inline] call_irq_handler arch/x86/kernel/irq.c:259 [inline] __common_interrupt+0x58/0xe0 arch/x86/kernel/irq.c:285 common_interrupt+0x7c/0x90 arch/x86/kernel/irq.c:278 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 is_atomic kernel/kcsan/core.c:249 [inline] should_watch kernel/kcsan/core.c:277 [inline] check_access kernel/kcsan/core.c:752 [inline] __tsan_read8+0xe5/0x180 kernel/kcsan/core.c:1025 rb_insert_color+0x24f/0x290 lib/rbtree.c:436 __link_va mm/vmalloc.c:1201 [inline] link_va mm/vmalloc.c:1213 [inline] insert_vmap_area+0x1c7/0x260 mm/vmalloc.c:1330 free_vmap_area_noflush+0x1ce/0x360 mm/vmalloc.c:2369 free_unmap_vmap_area mm/vmalloc.c:2389 [inline] remove_vm_area+0x89/0xd0 mm/vmalloc.c:3245 vfree+0x7c/0x410 mm/vmalloc.c:3364 copy_entries_to_user net/ipv4/netfilter/arp_tables.c:713 [inline] get_entries net/ipv4/netfilter/arp_tables.c:867 [inline] do_arpt_get_ctl+0xaaf/0xb00 net/ipv4/netfilter/arp_tables.c:1461 nf_getsockopt+0x18c/0x1b0 net/netfilter/nf_sockopt.c:116 ip_getsockopt+0x12a/0x170 net/ipv4/ip_sockglue.c:1777 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4671 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3810 do_sock_getsockopt+0x1ca/0x260 net/socket.c:2364 __sys_getsockopt net/socket.c:2393 [inline] __do_sys_getsockopt net/socket.c:2400 [inline] __se_sys_getsockopt net/socket.c:2397 [inline] __x64_sys_getsockopt+0x18c/0x200 net/socket.c:2397 x64_sys_call+0x1288/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:56 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f write to 0xffff888102cdb778 of 2 bytes by task 3288 on cpu 0: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:874 [inline] virtqueue_disable_cb+0x85/0x180 drivers/virtio/virtio_ring.c:2566 start_xmit+0x15c/0x1310 drivers/net/virtio_net.c:3259 __netdev_start_xmit include/linux/netdevice.h:5144 [inline] netdev_start_xmit include/linux/netdevice.h:5153 [inline] xmit_one net/core/dev.c:3735 [inline] dev_hard_start_xmit+0x119/0x3f0 net/core/dev.c:3751 sch_direct_xmit+0x1a9/0x580 net/sched/sch_generic.c:343 __dev_xmit_skb net/core/dev.c:3974 [inline] __dev_queue_xmit+0xf6a/0x2090 net/core/dev.c:4550 dev_queue_xmit include/linux/netdevice.h:3305 [inline] neigh_hh_output include/net/neighbour.h:523 [inline] neigh_output include/net/neighbour.h:537 [inline] ip_finish_output2+0x71b/0x880 net/ipv4/ip_output.c:236 ip_finish_output+0x11a/0x2a0 net/ipv4/ip_output.c:324 NF_HOOK_COND include/linux/netfilter.h:303 [inline] ip_output+0xab/0x170 net/ipv4/ip_output.c:434 dst_output include/net/dst.h:459 [inline] ip_local_out net/ipv4/ip_output.c:130 [inline] __ip_queue_xmit+0xb34/0xb50 net/ipv4/ip_output.c:528 ip_queue_xmit+0x38/0x50 net/ipv4/ip_output.c:542 __tcp_transmit_skb+0x15ca/0x19d0 net/ipv4/tcp_output.c:1471 __tcp_send_ack+0x1de/0x300 net/ipv4/tcp_output.c:4275 tcp_send_ack+0x27/0x30 net/ipv4/tcp_output.c:4281 __tcp_cleanup_rbuf+0x149/0x280 net/ipv4/tcp.c:1506 tcp_cleanup_rbuf net/ipv4/tcp.c:1517 [inline] tcp_recvmsg_locked+0x1be3/0x2100 net/ipv4/tcp.c:2822 tcp_recvmsg+0x13c/0x490 net/ipv4/tcp.c:2852 inet_recvmsg+0xbd/0x290 net/ipv4/af_inet.c:883 sock_recvmsg_nosec net/socket.c:1023 [inline] sock_recvmsg+0xfe/0x170 net/socket.c:1045 sock_read_iter+0x14c/0x1a0 net/socket.c:1115 new_sync_read fs/read_write.c:484 [inline] vfs_read+0x5cc/0x6f0 fs/read_write.c:565 ksys_read+0xe8/0x1b0 fs/read_write.c:708 __do_sys_read fs/read_write.c:717 [inline] __se_sys_read fs/read_write.c:715 [inline] __x64_sys_read+0x42/0x50 fs/read_write.c:715 x64_sys_call+0x2874/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000 -> 0x0001 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3288 Comm: syz-executor Not tainted 6.14.0-rc2-syzkaller-00056-gab68d7eb7b1a #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ==================================================================