IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration ================================================================== BUG: KCSAN: data-race in console_flush_all / console_flush_all write to 0xffffffff8681a078 of 8 bytes by task 25282 on cpu 1: console_emit_next_record kernel/printk/printk.c:3083 [inline] console_flush_all+0x395/0x770 kernel/printk/printk.c:3210 __console_flush_and_unlock kernel/printk/printk.c:3269 [inline] console_unlock+0xab/0x330 kernel/printk/printk.c:3309 vprintk_emit+0x3f4/0x680 kernel/printk/printk.c:2432 vprintk_default+0x26/0x30 kernel/printk/printk.c:2447 vprintk+0x75/0x80 kernel/printk/printk_safe.c:86 _printk+0x7a/0xa0 kernel/printk/printk.c:2457 base_sock_release+0x38/0x200 drivers/isdn/mISDN/socket.c:622 __sock_release net/socket.c:640 [inline] sock_close+0x68/0x150 net/socket.c:1408 __fput+0x17a/0x6d0 fs/file_table.c:450 ____fput+0x1c/0x30 fs/file_table.c:478 task_work_run+0x13a/0x1a0 kernel/task_work.c:239 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xa8/0x120 kernel/entry/common.c:218 do_syscall_64+0xd6/0x1c0 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f read to 0xffffffff8681a078 of 8 bytes by task 3316 on cpu 0: console_flush_all+0x57e/0x770 kernel/printk/printk.c:3211 __console_flush_and_unlock kernel/printk/printk.c:3269 [inline] console_unlock+0xab/0x330 kernel/printk/printk.c:3309 vprintk_emit+0x3f4/0x680 kernel/printk/printk.c:2432 vprintk_default+0x26/0x30 kernel/printk/printk.c:2447 vprintk+0x75/0x80 kernel/printk/printk_safe.c:86 _printk+0x7a/0xa0 kernel/printk/printk.c:2457 ip_vs_schedule+0xde2/0xeb0 net/netfilter/ipvs/ip_vs_core.c:518 udp_conn_schedule+0x248/0x3b0 net/netfilter/ipvs/ip_vs_proto_udp.c:78 ip_vs_try_to_schedule net/netfilter/ipvs/ip_vs_core.c:1482 [inline] ip_vs_in_hook+0x5d2/0x1210 net/netfilter/ipvs/ip_vs_core.c:2054 nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline] nf_hook_slow+0x86/0x1b0 net/netfilter/core.c:626 nf_hook include/linux/netfilter.h:269 [inline] __ip_local_out+0x2d6/0x300 net/ipv4/ip_output.c:119 ip_local_out+0x26/0xd0 net/ipv4/ip_output.c:128 iptunnel_xmit+0x351/0x490 net/ipv4/ip_tunnel_core.c:82 udp_tunnel_xmit_skb+0x1ae/0x1f0 net/ipv4/udp_tunnel_core.c:173 send4+0x44c/0x530 drivers/net/wireguard/socket.c:85 wg_socket_send_skb_to_peer+0x94/0x130 drivers/net/wireguard/socket.c:175 wg_socket_send_buffer_to_peer+0xee/0x120 drivers/net/wireguard/socket.c:200 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:40 [inline] wg_packet_handshake_send_worker+0x10c/0x150 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000045ab -> 0x00000000000045ac Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3316 Comm: kworker/u8:6 Not tainted 6.13.0-rc6-syzkaller-00059-g643e2e259c2b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker ================================================================== IPVS: Schedule: port zero only supported in persistent services, check your ipvs configuration