================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb read to 0xffff88810269b778 of 2 bytes by interrupt on cpu 0: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:855 [inline] virtqueue_disable_cb+0x63/0x180 drivers/virtio/virtio_ring.c:2352 skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:422 vring_interrupt+0x150/0x170 drivers/virtio/virtio_ring.c:2501 __handle_irq_event_percpu+0x91/0x490 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0x64/0xf0 kernel/irq/handle.c:210 handle_edge_irq+0x167/0x590 kernel/irq/chip.c:831 generic_handle_irq_desc include/linux/irqdesc.h:161 [inline] handle_irq arch/x86/kernel/irq.c:238 [inline] __common_interrupt+0x3c/0xb0 arch/x86/kernel/irq.c:257 common_interrupt+0x7a/0x90 arch/x86/kernel/irq.c:247 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:636 freelist_dereference mm/slub.c:393 [inline] get_freepointer mm/slub.c:400 [inline] get_freepointer_safe mm/slub.c:427 [inline] __slab_alloc_node mm/slub.c:3369 [inline] slab_alloc_node mm/slub.c:3460 [inline] __kmem_cache_alloc_node+0xa6/0x1d0 mm/slub.c:3509 __do_kmalloc_node mm/slab_common.c:984 [inline] __kmalloc_node_track_caller+0x96/0x1a0 mm/slab_common.c:1005 kmemdup+0x2a/0x60 mm/util.c:131 sidtab_sid2str_get+0xb4/0x140 security/selinux/ss/sidtab.c:620 sidtab_entry_to_string security/selinux/ss/services.c:1268 [inline] security_sid_to_context_core+0x1d4/0x2d0 security/selinux/ss/services.c:1360 security_sid_to_context_force+0x2a/0x30 security/selinux/ss/services.c:1388 selinux_inode_init_security+0x3f9/0x480 security/selinux/hooks.c:2906 security_inode_init_security+0xd8/0x250 security/security.c:1633 ext4_init_security+0x34/0x40 fs/ext4/xattr_security.c:58 __ext4_new_inode+0x200d/0x2270 fs/ext4/ialloc.c:1326 ext4_mkdir+0x27f/0x740 fs/ext4/namei.c:3012 vfs_mkdir+0x1ac/0x2b0 fs/namei.c:4120 do_mkdirat+0xf9/0x260 fs/namei.c:4143 __do_sys_mkdirat fs/namei.c:4158 [inline] __se_sys_mkdirat fs/namei.c:4156 [inline] __x64_sys_mkdirat+0x50/0x60 fs/namei.c:4156 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd write to 0xffff88810269b778 of 2 bytes by task 3105 on cpu 1: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:856 [inline] virtqueue_disable_cb+0x85/0x180 drivers/virtio/virtio_ring.c:2352 start_xmit+0xf0/0xae0 drivers/net/virtio_net.c:2149 __netdev_start_xmit include/linux/netdevice.h:4910 [inline] netdev_start_xmit include/linux/netdevice.h:4924 [inline] xmit_one net/core/dev.c:3537 [inline] dev_hard_start_xmit+0x11b/0x3f0 net/core/dev.c:3553 sch_direct_xmit+0x1b0/0x570 net/sched/sch_generic.c:342 __dev_xmit_skb net/core/dev.c:3764 [inline] __dev_queue_xmit+0xe5f/0x1d10 net/core/dev.c:4169 dev_queue_xmit include/linux/netdevice.h:3088 [inline] neigh_hh_output include/net/neighbour.h:528 [inline] neigh_output include/net/neighbour.h:542 [inline] ip_finish_output2+0x700/0x840 net/ipv4/ip_output.c:230 ip_finish_output+0xf4/0x240 net/ipv4/ip_output.c:318 NF_HOOK_COND include/linux/netfilter.h:292 [inline] ip_output+0xe5/0x1b0 net/ipv4/ip_output.c:432 dst_output include/net/dst.h:458 [inline] ip_local_out net/ipv4/ip_output.c:127 [inline] __ip_queue_xmit+0xaaf/0xae0 net/ipv4/ip_output.c:534 ip_queue_xmit+0x38/0x40 net/ipv4/ip_output.c:548 __tcp_transmit_skb+0x1231/0x1710 net/ipv4/tcp_output.c:1401 __tcp_send_ack+0x1de/0x2d0 net/ipv4/tcp_output.c:4072 tcp_send_ack+0x27/0x30 net/ipv4/tcp_output.c:4078 __tcp_cleanup_rbuf+0x149/0x260 net/ipv4/tcp.c:1483 tcp_cleanup_rbuf net/ipv4/tcp.c:1494 [inline] tcp_recvmsg_locked+0x109d/0x1540 net/ipv4/tcp.c:2536 tcp_recvmsg+0x13b/0x490 net/ipv4/tcp.c:2566 inet_recvmsg+0xa2/0x210 net/ipv4/af_inet.c:862 sock_recvmsg_nosec net/socket.c:1020 [inline] sock_recvmsg net/socket.c:1041 [inline] sock_read_iter+0x1a0/0x210 net/socket.c:1107 call_read_iter include/linux/fs.h:1979 [inline] new_sync_read fs/read_write.c:389 [inline] vfs_read+0x3da/0x5c0 fs/read_write.c:470 ksys_read+0xeb/0x1a0 fs/read_write.c:613 __do_sys_read fs/read_write.c:623 [inline] __se_sys_read fs/read_write.c:621 [inline] __x64_sys_read+0x42/0x50 fs/read_write.c:621 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x0000 -> 0x0001 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 3105 Comm: syz-fuzzer Tainted: G W 6.5.0-syzkaller-01810-gf97e18a3f2fb #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/26/2023 ==================================================================