================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb read to 0xffff888102e02078 of 2 bytes by interrupt on cpu 1: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:873 [inline] virtqueue_disable_cb+0x63/0x180 drivers/virtio/virtio_ring.c:2566 skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:776 vring_interrupt+0x161/0x190 drivers/virtio/virtio_ring.c:2715 __handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0x64/0xf0 kernel/irq/handle.c:210 handle_edge_irq+0x16d/0x5b0 kernel/irq/chip.c:831 generic_handle_irq_desc include/linux/irqdesc.h:173 [inline] handle_irq arch/x86/kernel/irq.c:247 [inline] call_irq_handler arch/x86/kernel/irq.c:259 [inline] __common_interrupt+0x58/0xe0 arch/x86/kernel/irq.c:285 common_interrupt+0x7c/0x90 arch/x86/kernel/irq.c:278 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 __preempt_count_dec_and_test arch/x86/include/asm/preempt.h:94 [inline] __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline] _raw_spin_unlock_irqrestore+0x3d/0x60 kernel/locking/spinlock.c:194 spin_unlock_irqrestore include/linux/spinlock.h:406 [inline] unlock_page_lruvec_irqrestore include/linux/memcontrol.h:1520 [inline] folio_batch_move_lru+0x1ea/0x230 mm/swap.c:174 __folio_batch_add_and_move mm/swap.c:196 [inline] folio_add_lru+0x145/0x1f0 mm/swap.c:482 shmem_alloc_and_add_folio mm/shmem.c:1892 [inline] shmem_get_folio_gfp+0x7d6/0xd90 mm/shmem.c:2355 shmem_get_folio mm/shmem.c:2461 [inline] shmem_write_begin+0xa2/0x180 mm/shmem.c:3117 generic_perform_write+0x1a8/0x4a0 mm/filemap.c:4055 shmem_file_write_iter+0xc2/0xe0 mm/shmem.c:3293 new_sync_write fs/read_write.c:586 [inline] vfs_write+0x77f/0x920 fs/read_write.c:679 ksys_write+0xe8/0x1b0 fs/read_write.c:731 __do_sys_write fs/read_write.c:742 [inline] __se_sys_write fs/read_write.c:739 [inline] __x64_sys_write+0x42/0x50 fs/read_write.c:739 x64_sys_call+0x287e/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:2 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f write to 0xffff888102e02078 of 2 bytes by task 3287 on cpu 0: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:874 [inline] virtqueue_disable_cb+0x85/0x180 drivers/virtio/virtio_ring.c:2566 start_xmit+0x15c/0x1310 drivers/net/virtio_net.c:3259 __netdev_start_xmit include/linux/netdevice.h:5002 [inline] netdev_start_xmit include/linux/netdevice.h:5011 [inline] xmit_one net/core/dev.c:3590 [inline] dev_hard_start_xmit+0x119/0x3f0 net/core/dev.c:3606 sch_direct_xmit+0x1a9/0x580 net/sched/sch_generic.c:343 __dev_xmit_skb net/core/dev.c:3827 [inline] __dev_queue_xmit+0xf6a/0x2090 net/core/dev.c:4400 dev_queue_xmit include/linux/netdevice.h:3168 [inline] neigh_hh_output include/net/neighbour.h:523 [inline] neigh_output include/net/neighbour.h:537 [inline] ip_finish_output2+0x721/0x890 net/ipv4/ip_output.c:236 ip_finish_output+0x11a/0x2a0 net/ipv4/ip_output.c:324 NF_HOOK_COND include/linux/netfilter.h:303 [inline] ip_output+0xab/0x170 net/ipv4/ip_output.c:434 dst_output include/net/dst.h:450 [inline] ip_local_out net/ipv4/ip_output.c:130 [inline] __ip_queue_xmit+0xbf2/0xc10 net/ipv4/ip_output.c:536 ip_queue_xmit+0x38/0x50 net/ipv4/ip_output.c:550 __tcp_transmit_skb+0x15ca/0x1980 net/ipv4/tcp_output.c:1466 tcp_transmit_skb net/ipv4/tcp_output.c:1484 [inline] tcp_write_xmit+0x1410/0x3220 net/ipv4/tcp_output.c:2827 __tcp_push_pending_frames+0x6a/0x1a0 net/ipv4/tcp_output.c:3010 tcp_push+0x320/0x340 net/ipv4/tcp.c:751 tcp_sendmsg_locked+0x21ed/0x2710 net/ipv4/tcp.c:1326 tcp_sendmsg+0x30/0x50 net/ipv4/tcp.c:1358 inet_sendmsg+0x77/0xd0 net/ipv4/af_inet.c:851 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg+0x102/0x180 net/socket.c:726 sock_write_iter+0x15e/0x1a0 net/socket.c:1147 new_sync_write fs/read_write.c:586 [inline] vfs_write+0x77f/0x920 fs/read_write.c:679 ksys_write+0xe8/0x1b0 fs/read_write.c:731 __do_sys_write fs/read_write.c:742 [inline] __se_sys_write fs/read_write.c:739 [inline] __x64_sys_write+0x42/0x50 fs/read_write.c:739 x64_sys_call+0x287e/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:2 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000 -> 0x0001 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3287 Comm: syz-executor Tainted: G W 6.13.0-rc1-syzkaller-00025-gfeffde684ac2 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ==================================================================