================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb write to 0xffff888101511e78 of 2 bytes by interrupt on cpu 1: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:878 [inline] virtqueue_disable_cb+0x7a/0x150 drivers/virtio/virtio_ring.c:2569 skb_xmit_done+0x65/0x140 drivers/net/virtio_net.c:784 vring_interrupt+0x155/0x180 drivers/virtio/virtio_ring.c:2718 __handle_irq_event_percpu+0x9d/0x540 kernel/irq/handle.c:203 handle_irq_event_percpu kernel/irq/handle.c:240 [inline] handle_irq_event+0x64/0xf0 kernel/irq/handle.c:257 handle_edge_irq+0x154/0x470 kernel/irq/chip.c:855 generic_handle_irq_desc include/linux/irqdesc.h:173 [inline] handle_irq arch/x86/kernel/irq.c:254 [inline] call_irq_handler arch/x86/kernel/irq.c:-1 [inline] __common_interrupt+0x60/0xb0 arch/x86/kernel/irq.c:325 common_interrupt+0x7e/0x90 arch/x86/kernel/irq.c:318 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:688 copy_from_kernel_nofault+0x1b3/0x200 mm/maccess.c:41 bpf_probe_read_kernel_common include/linux/bpf.h:3209 [inline] ____bpf_probe_read_compat kernel/trace/bpf_trace.c:293 [inline] bpf_probe_read_compat+0xdb/0x130 kernel/trace/bpf_trace.c:286 bpf_prog_3e462b45c88f2064+0x46/0x4c bpf_dispatcher_nop_func include/linux/bpf.h:1350 [inline] __bpf_prog_run include/linux/filter.h:721 [inline] bpf_prog_run include/linux/filter.h:728 [inline] __bpf_trace_run kernel/trace/bpf_trace.c:2075 [inline] bpf_trace_run3+0x10f/0x1d0 kernel/trace/bpf_trace.c:2117 __do_trace_kmem_cache_free include/trace/events/kmem.h:117 [inline] trace_kmem_cache_free include/trace/events/kmem.h:117 [inline] kmem_cache_free+0x329/0x3d0 mm/slub.c:6751 inode_free_by_rcu+0x36/0x70 security/security.c:1750 rcu_do_batch kernel/rcu/tree.c:2605 [inline] rcu_core+0x5aa/0xc30 kernel/rcu/tree.c:2861 rcu_core_si+0xd/0x20 kernel/rcu/tree.c:2878 handle_softirqs+0xba/0x290 kernel/softirq.c:622 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:1063 smpboot_thread_fn+0x32b/0x530 kernel/smpboot.c:160 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x122/0x1b0 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read to 0xffff888101511e78 of 2 bytes by task 3298 on cpu 0: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:877 [inline] virtqueue_disable_cb+0x58/0x150 drivers/virtio/virtio_ring.c:2569 start_xmit+0x10e/0x17a0 drivers/net/virtio_net.c:3382 __netdev_start_xmit include/linux/netdevice.h:5248 [inline] netdev_start_xmit include/linux/netdevice.h:5257 [inline] xmit_one net/core/dev.c:3845 [inline] dev_hard_start_xmit+0x125/0x3e0 net/core/dev.c:3861 sch_direct_xmit+0x192/0x550 net/sched/sch_generic.c:347 __dev_xmit_skb net/core/dev.c:4152 [inline] __dev_queue_xmit+0xe9a/0x2000 net/core/dev.c:4729 dev_queue_xmit include/linux/netdevice.h:3365 [inline] neigh_hh_output include/net/neighbour.h:531 [inline] neigh_output include/net/neighbour.h:545 [inline] ip_finish_output2+0x77f/0x8b0 net/ipv4/ip_output.c:237 __ip_finish_output net/ipv4/ip_output.c:-1 [inline] ip_finish_output+0x114/0x2a0 net/ipv4/ip_output.c:325 NF_HOOK_COND include/linux/netfilter.h:307 [inline] ip_output+0xbd/0x190 net/ipv4/ip_output.c:438 dst_output include/net/dst.h:464 [inline] ip_local_out net/ipv4/ip_output.c:131 [inline] __ip_queue_xmit+0xbbf/0xc00 net/ipv4/ip_output.c:534 ip_queue_xmit+0x39/0x50 net/ipv4/ip_output.c:548 __tcp_transmit_skb+0x17fd/0x1c10 net/ipv4/tcp_output.c:1628 __tcp_send_ack+0x288/0x3b0 net/ipv4/tcp_output.c:4456 tcp_send_ack+0x29/0x30 net/ipv4/tcp_output.c:4462 __tcp_cleanup_rbuf+0xd3/0x2c0 net/ipv4/tcp.c:1561 tcp_cleanup_rbuf net/ipv4/tcp.c:1572 [inline] tcp_recvmsg_locked+0x1adb/0x1fe0 net/ipv4/tcp.c:2898 tcp_recvmsg+0x128/0x480 net/ipv4/tcp.c:2928 inet_recvmsg+0xb7/0x290 net/ipv4/af_inet.c:885 sock_recvmsg_nosec net/socket.c:1078 [inline] sock_recvmsg+0xf6/0x170 net/socket.c:1100 sock_read_iter+0x152/0x1a0 net/socket.c:1170 new_sync_read fs/read_write.c:491 [inline] vfs_read+0x64c/0x770 fs/read_write.c:572 ksys_read+0xda/0x1a0 fs/read_write.c:715 __do_sys_read fs/read_write.c:724 [inline] __se_sys_read fs/read_write.c:722 [inline] __x64_sys_read+0x40/0x50 fs/read_write.c:722 x64_sys_call+0x27c0/0x3000 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000 -> 0x0001 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3298 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 ==================================================================