================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb read to 0xffff888101aec778 of 2 bytes by interrupt on cpu 0: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:885 [inline] virtqueue_disable_cb+0x63/0x180 drivers/virtio/virtio_ring.c:2446 skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:533 vring_interrupt+0x157/0x180 drivers/virtio/virtio_ring.c:2595 __handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0x64/0xf0 kernel/irq/handle.c:210 handle_edge_irq+0x16d/0x5b0 kernel/irq/chip.c:831 generic_handle_irq_desc include/linux/irqdesc.h:161 [inline] handle_irq arch/x86/kernel/irq.c:238 [inline] __common_interrupt+0x58/0xf0 arch/x86/kernel/irq.c:257 common_interrupt+0x7c/0x90 arch/x86/kernel/irq.c:247 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 check_kcov_mode kernel/kcov.c:173 [inline] write_comp_data kernel/kcov.c:236 [inline] __sanitizer_cov_trace_const_cmp8+0x2f/0x90 kernel/kcov.c:311 __copy_present_ptes mm/memory.c:946 [inline] copy_present_ptes mm/memory.c:1036 [inline] copy_pte_range mm/memory.c:1151 [inline] copy_pmd_range mm/memory.c:1238 [inline] copy_pud_range mm/memory.c:1275 [inline] copy_p4d_range mm/memory.c:1299 [inline] copy_page_range+0xd35/0x2a40 mm/memory.c:1397 dup_mmap kernel/fork.c:751 [inline] dup_mm kernel/fork.c:1688 [inline] copy_mm+0x95a/0x1040 kernel/fork.c:1737 copy_process+0xee1/0x1f80 kernel/fork.c:2390 kernel_clone+0x16a/0x570 kernel/fork.c:2797 __do_sys_clone kernel/fork.c:2940 [inline] __se_sys_clone kernel/fork.c:2924 [inline] __x64_sys_clone+0xe8/0x120 kernel/fork.c:2924 x64_sys_call+0x23cb/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:57 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f write to 0xffff888101aec778 of 2 bytes by task 3092 on cpu 1: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:886 [inline] virtqueue_disable_cb+0x85/0x180 drivers/virtio/virtio_ring.c:2446 start_xmit+0x125/0xb60 drivers/net/virtio_net.c:2415 __netdev_start_xmit include/linux/netdevice.h:4903 [inline] netdev_start_xmit include/linux/netdevice.h:4917 [inline] xmit_one net/core/dev.c:3531 [inline] dev_hard_start_xmit+0x119/0x3f0 net/core/dev.c:3547 sch_direct_xmit+0x1b0/0x580 net/sched/sch_generic.c:343 __dev_xmit_skb net/core/dev.c:3760 [inline] __dev_queue_xmit+0xee7/0x1e50 net/core/dev.c:4307 dev_queue_xmit include/linux/netdevice.h:3091 [inline] neigh_hh_output include/net/neighbour.h:526 [inline] neigh_output include/net/neighbour.h:540 [inline] ip_finish_output2+0x73b/0x8b0 net/ipv4/ip_output.c:235 ip_finish_output+0x11a/0x2a0 net/ipv4/ip_output.c:323 NF_HOOK_COND include/linux/netfilter.h:303 [inline] ip_output+0xab/0x170 net/ipv4/ip_output.c:433 dst_output include/net/dst.h:450 [inline] ip_local_out net/ipv4/ip_output.c:129 [inline] __ip_queue_xmit+0xbca/0xbf0 net/ipv4/ip_output.c:535 ip_queue_xmit+0x38/0x50 net/ipv4/ip_output.c:549 __tcp_transmit_skb+0x15b0/0x1970 net/ipv4/tcp_output.c:1462 tcp_transmit_skb net/ipv4/tcp_output.c:1480 [inline] tcp_write_xmit+0x12dd/0x2ff0 net/ipv4/tcp_output.c:2792 __tcp_push_pending_frames+0x6a/0x1a0 net/ipv4/tcp_output.c:2977 tcp_push+0x320/0x340 net/ipv4/tcp.c:738 tcp_sendmsg_locked+0x21c9/0x26c0 net/ipv4/tcp.c:1310 tcp_sendmsg+0x30/0x50 net/ipv4/tcp.c:1342 inet_sendmsg+0x77/0xd0 net/ipv4/af_inet.c:851 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x102/0x180 net/socket.c:745 sock_write_iter+0x164/0x1b0 net/socket.c:1160 call_write_iter include/linux/fs.h:2110 [inline] new_sync_write fs/read_write.c:497 [inline] vfs_write+0x771/0x8e0 fs/read_write.c:590 ksys_write+0xeb/0x1b0 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [inline] __se_sys_write fs/read_write.c:652 [inline] __x64_sys_write+0x42/0x50 fs/read_write.c:652 x64_sys_call+0x27b7/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:2 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000 -> 0x0001 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 3092 Comm: syz-fuzzer Tainted: G W 6.9.0-rc5-syzkaller-00159-gc942a0cd3603 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 ==================================================================