================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / vring_interrupt write to 0xffff888101df7752 of 1 bytes by interrupt on cpu 0: vring_interrupt+0x128/0x170 drivers/virtio/virtio_ring.c:2591 __handle_irq_event_percpu+0x91/0x490 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0x64/0xf0 kernel/irq/handle.c:210 handle_edge_irq+0x167/0x590 kernel/irq/chip.c:831 generic_handle_irq_desc include/linux/irqdesc.h:161 [inline] handle_irq arch/x86/kernel/irq.c:238 [inline] __common_interrupt+0x54/0xe0 arch/x86/kernel/irq.c:257 common_interrupt+0x7a/0x90 arch/x86/kernel/irq.c:247 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:636 kcsan_setup_watchpoint+0x3fe/0x410 kernel/kcsan/core.c:705 xt_get_per_cpu_counter include/linux/netfilter/x_tables.h:445 [inline] get_counters net/ipv4/netfilter/ip_tables.c:755 [inline] alloc_counters+0x148/0x2e0 net/ipv4/netfilter/ip_tables.c:804 copy_entries_to_user net/ipv4/netfilter/arp_tables.c:681 [inline] get_entries net/ipv4/netfilter/arp_tables.c:867 [inline] do_arpt_get_ctl+0x8ff/0xaf0 net/ipv4/netfilter/arp_tables.c:1453 nf_getsockopt+0x184/0x1a0 net/netfilter/nf_sockopt.c:116 ip_getsockopt+0x126/0x170 net/ipv4/ip_sockglue.c:1781 tcp_getsockopt+0xa7/0xd0 net/ipv4/tcp.c:4340 sock_common_getsockopt+0x57/0x70 net/core/sock.c:3684 do_sock_getsockopt net/socket.c:2373 [inline] __sys_getsockopt+0x1bf/0x230 net/socket.c:2402 __do_sys_getsockopt net/socket.c:2412 [inline] __se_sys_getsockopt net/socket.c:2409 [inline] __x64_sys_getsockopt+0x66/0x80 net/socket.c:2409 do_syscall_x64 arch/x86/entry/common.c:51 [inline] do_syscall_64+0x44/0x110 arch/x86/entry/common.c:82 entry_SYSCALL_64_after_hwframe+0x63/0x6b read to 0xffff888101df7752 of 1 bytes by interrupt on cpu 1: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:892 [inline] virtqueue_disable_cb+0x92/0x180 drivers/virtio/virtio_ring.c:2446 start_xmit+0xf6/0xa90 drivers/net/virtio_net.c:2340 __netdev_start_xmit include/linux/netdevice.h:4918 [inline] netdev_start_xmit include/linux/netdevice.h:4932 [inline] xmit_one net/core/dev.c:3545 [inline] dev_hard_start_xmit+0x11b/0x3f0 net/core/dev.c:3561 sch_direct_xmit+0x1b0/0x570 net/sched/sch_generic.c:342 __dev_xmit_skb net/core/dev.c:3772 [inline] __dev_queue_xmit+0xe59/0x1d80 net/core/dev.c:4312 dev_queue_xmit include/linux/netdevice.h:3112 [inline] neigh_hh_output include/net/neighbour.h:526 [inline] neigh_output include/net/neighbour.h:540 [inline] ip_finish_output2+0x732/0x880 net/ipv4/ip_output.c:235 ip_finish_output+0xf4/0x240 net/ipv4/ip_output.c:323 NF_HOOK_COND include/linux/netfilter.h:303 [inline] ip_output+0xab/0x170 net/ipv4/ip_output.c:433 dst_output include/net/dst.h:451 [inline] ip_local_out net/ipv4/ip_output.c:129 [inline] __ip_queue_xmit+0xb09/0xb30 net/ipv4/ip_output.c:535 ip_queue_xmit+0x38/0x40 net/ipv4/ip_output.c:549 __tcp_transmit_skb+0x11d9/0x1890 net/ipv4/tcp_output.c:1462 tcp_transmit_skb net/ipv4/tcp_output.c:1480 [inline] tcp_write_xmit+0x12d7/0x2fd0 net/ipv4/tcp_output.c:2792 tcp_tsq_write+0x15c/0x170 net/ipv4/tcp_output.c:1075 tcp_tsq_handler net/ipv4/tcp_output.c:1084 [inline] tcp_tasklet_func+0x246/0x310 net/ipv4/tcp_output.c:1116 tasklet_action_common+0xc9/0x2c0 kernel/softirq.c:780 __do_softirq+0xc4/0x279 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu kernel/softirq.c:632 [inline] irq_exit_rcu+0x3b/0x90 kernel/softirq.c:644 common_interrupt+0x42/0x90 arch/x86/kernel/irq.c:247 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:636 value changed: 0x00 -> 0x01 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 3070 Comm: syz-fuzzer Tainted: G W 6.7.0-rc1-syzkaller-00366-geb3479bc23fa #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 11/10/2023 ==================================================================