================================================================== BUG: KCSAN: data-race in vti_tunnel_xmit / vti_tunnel_xmit write to 0xffff88801c490130 of 8 bytes by task 28427 on cpu 1: vti_xmit net/ipv4/ip_vti.c:268 [inline] vti_tunnel_xmit+0x842/0xaa0 net/ipv4/ip_vti.c:302 __netdev_start_xmit include/linux/netdevice.h:4776 [inline] netdev_start_xmit include/linux/netdevice.h:4790 [inline] xmit_one+0xf9/0x2e0 net/core/dev.c:3574 dev_hard_start_xmit net/core/dev.c:3590 [inline] __dev_queue_xmit+0xf22/0x1570 net/core/dev.c:4151 dev_queue_xmit+0x13/0x20 net/core/dev.c:4184 __bpf_tx_skb net/core/filter.c:2116 [inline] __bpf_redirect_no_mac net/core/filter.c:2141 [inline] __bpf_redirect+0x54f/0x760 net/core/filter.c:2164 ____bpf_clone_redirect net/core/filter.c:2448 [inline] bpf_clone_redirect+0x168/0x1c0 net/core/filter.c:2420 bpf_prog_9dc28c0ba0f92efe+0x56/0x314 bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline] bpf_test_run+0x278/0x460 net/bpf/test_run.c:50 bpf_prog_test_run_skb+0x714/0xe90 net/bpf/test_run.c:582 bpf_prog_test_run kernel/bpf/syscall.c:3122 [inline] __do_sys_bpf+0x3971/0x9950 kernel/bpf/syscall.c:4400 __se_sys_bpf kernel/bpf/syscall.c:4340 [inline] __x64_sys_bpf+0x3d/0x50 kernel/bpf/syscall.c:4340 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 read to 0xffff88801c490130 of 8 bytes by task 28437 on cpu 0: vti_xmit net/ipv4/ip_vti.c:268 [inline] vti_tunnel_xmit+0x830/0xaa0 net/ipv4/ip_vti.c:302 __netdev_start_xmit include/linux/netdevice.h:4776 [inline] netdev_start_xmit include/linux/netdevice.h:4790 [inline] xmit_one+0xf9/0x2e0 net/core/dev.c:3574 dev_hard_start_xmit net/core/dev.c:3590 [inline] __dev_queue_xmit+0xf22/0x1570 net/core/dev.c:4151 dev_queue_xmit+0x13/0x20 net/core/dev.c:4184 __bpf_tx_skb net/core/filter.c:2116 [inline] __bpf_redirect_no_mac net/core/filter.c:2141 [inline] __bpf_redirect+0x54f/0x760 net/core/filter.c:2164 ____bpf_clone_redirect net/core/filter.c:2448 [inline] bpf_clone_redirect+0x168/0x1c0 net/core/filter.c:2420 bpf_prog_9dc28c0ba0f92efe+0x56/0x48c bpf_dispatcher_nop_func include/linux/bpf.h:651 [inline] bpf_test_run+0x278/0x460 net/bpf/test_run.c:50 bpf_prog_test_run_skb+0x714/0xe90 net/bpf/test_run.c:582 bpf_prog_test_run kernel/bpf/syscall.c:3122 [inline] __do_sys_bpf+0x3971/0x9950 kernel/bpf/syscall.c:4400 __se_sys_bpf kernel/bpf/syscall.c:4340 [inline] __x64_sys_bpf+0x3d/0x50 kernel/bpf/syscall.c:4340 do_syscall_64+0x39/0x80 arch/x86/entry/common.c:46 entry_SYSCALL_64_after_hwframe+0x44/0xa9 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 28437 Comm: syz-executor.4 Not tainted 5.11.0-rc5-syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 ==================================================================