================================================================== BUG: KCSAN: data-race in kick_pool / wq_worker_running read-write to 0xffff888237d29d24 of 4 bytes by task 3760 on cpu 1: wq_worker_running+0x95/0x120 kernel/workqueue.c:1400 __lock_sock net/core/sock.c:3189 [inline] lock_sock_nested+0xc7/0x140 net/core/sock.c:3757 lock_sock include/net/sock.h:1667 [inline] virtio_transport_recv_pkt+0x598/0xc20 net/vmw_vsock/virtio_transport_common.c:1628 vsock_loopback_work+0x1d1/0x220 net/vmw_vsock/vsock_loopback.c:133 process_one_work kernel/workqueue.c:3238 [inline] process_scheduled_works+0x4cb/0x9d0 kernel/workqueue.c:3321 worker_thread+0x582/0x770 kernel/workqueue.c:3402 kthread+0x489/0x510 kernel/kthread.c:464 ret_from_fork+0xda/0x150 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read to 0xffff888237d29d24 of 4 bytes by task 4566 on cpu 0: need_more_worker kernel/workqueue.c:934 [inline] kick_pool+0x49/0x2d0 kernel/workqueue.c:1240 __queue_work+0x8d6/0xb60 kernel/workqueue.c:2342 queue_work_on+0xd1/0x160 kernel/workqueue.c:2392 queue_work include/linux/workqueue.h:662 [inline] vsock_loopback_send_pkt+0xce/0xe0 net/vmw_vsock/vsock_loopback.c:35 virtio_transport_send_pkt_info+0x692/0x860 net/vmw_vsock/virtio_transport_common.c:413 virtio_transport_shutdown net/vmw_vsock/virtio_transport_common.c:1084 [inline] virtio_transport_close net/vmw_vsock/virtio_transport_common.c:1265 [inline] virtio_transport_release+0x1a3/0x450 net/vmw_vsock/virtio_transport_common.c:1288 __vsock_release+0x6d/0x360 net/vmw_vsock/af_vsock.c:869 vsock_release+0x5b/0x90 net/vmw_vsock/af_vsock.c:981 __sock_release net/socket.c:647 [inline] sock_close+0x68/0x150 net/socket.c:1391 __fput+0x29b/0x650 fs/file_table.c:465 ____fput+0x1c/0x30 fs/file_table.c:493 task_work_run+0x131/0x1a0 kernel/task_work.c:227 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop+0xe4/0x100 kernel/entry/common.c:114 exit_to_user_mode_prepare include/linux/entry-common.h:330 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:414 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:449 [inline] do_syscall_64+0x1d6/0x200 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000 -> 0x00000001 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 4566 Comm: syz.4.219 Not tainted 6.16.0-rc7-syzkaller #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ==================================================================