================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb read to 0xffff88810204a378 of 2 bytes by interrupt on cpu 1: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:873 [inline] virtqueue_disable_cb+0x58/0x150 drivers/virtio/virtio_ring.c:2566 skb_xmit_done+0x65/0x140 drivers/net/virtio_net.c:755 vring_interrupt+0x152/0x180 drivers/virtio/virtio_ring.c:2715 __handle_irq_event_percpu+0x93/0x440 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0x64/0xf0 kernel/irq/handle.c:210 handle_edge_irq+0x188/0x4f0 kernel/irq/chip.c:797 generic_handle_irq_desc include/linux/irqdesc.h:173 [inline] handle_irq arch/x86/kernel/irq.c:254 [inline] call_irq_handler arch/x86/kernel/irq.c:266 [inline] __common_interrupt+0x63/0x100 arch/x86/kernel/irq.c:292 common_interrupt+0x7e/0x90 arch/x86/kernel/irq.c:285 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 native_safe_halt arch/x86/include/asm/irqflags.h:48 [inline] pv_native_safe_halt+0x13/0x20 arch/x86/kernel/paravirt.c:81 arch_safe_halt arch/x86/include/asm/paravirt.h:107 [inline] default_idle+0x13/0x20 arch/x86/kernel/process.c:749 default_idle_call+0x3d/0x70 kernel/sched/idle.c:117 cpuidle_idle_call kernel/sched/idle.c:185 [inline] do_idle+0xcb/0x240 kernel/sched/idle.c:325 cpu_startup_entry+0x25/0x30 kernel/sched/idle.c:423 start_secondary+0x95/0xa0 arch/x86/kernel/smpboot.c:315 common_startup_64+0x13e/0x147 write to 0xffff88810204a378 of 2 bytes by task 3297 on cpu 0: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:874 [inline] virtqueue_disable_cb+0x7a/0x150 drivers/virtio/virtio_ring.c:2566 start_xmit+0x102/0x12c0 drivers/net/virtio_net.c:3321 __netdev_start_xmit include/linux/netdevice.h:5215 [inline] netdev_start_xmit include/linux/netdevice.h:5224 [inline] xmit_one net/core/dev.c:3830 [inline] dev_hard_start_xmit+0x125/0x3e0 net/core/dev.c:3846 sch_direct_xmit+0x192/0x550 net/sched/sch_generic.c:344 __dev_xmit_skb net/core/dev.c:4102 [inline] __dev_queue_xmit+0xe4f/0x1fb0 net/core/dev.c:4679 dev_queue_xmit include/linux/netdevice.h:3355 [inline] neigh_hh_output include/net/neighbour.h:523 [inline] neigh_output include/net/neighbour.h:537 [inline] ip_finish_output2+0x77f/0x8b0 net/ipv4/ip_output.c:235 __ip_finish_output net/ipv4/ip_output.c:-1 [inline] ip_finish_output+0x112/0x290 net/ipv4/ip_output.c:323 NF_HOOK_COND include/linux/netfilter.h:306 [inline] ip_output+0xad/0x170 net/ipv4/ip_output.c:433 dst_output include/net/dst.h:459 [inline] ip_local_out net/ipv4/ip_output.c:129 [inline] __ip_queue_xmit+0xb25/0xb40 net/ipv4/ip_output.c:527 ip_queue_xmit+0x39/0x50 net/ipv4/ip_output.c:541 __tcp_transmit_skb+0x1641/0x1a60 net/ipv4/tcp_output.c:1479 tcp_transmit_skb net/ipv4/tcp_output.c:1497 [inline] tcp_write_xmit+0x1210/0x2fd0 net/ipv4/tcp_output.c:2838 __tcp_push_pending_frames+0x6d/0x1b0 net/ipv4/tcp_output.c:3021 tcp_push_pending_frames include/net/tcp.h:2180 [inline] tcp_data_snd_check net/ipv4/tcp_input.c:5782 [inline] tcp_rcv_established+0xa6b/0xef0 net/ipv4/tcp_input.c:6325 tcp_v4_do_rcv+0x672/0x740 net/ipv4/tcp_ipv4.c:1925 sk_backlog_rcv+0x71/0x190 include/net/sock.h:1148 __release_sock+0xb4/0x130 net/core/sock.c:3213 release_sock+0x44/0x150 net/core/sock.c:3767 sk_stream_wait_memory+0x461/0x860 net/core/stream.c:145 tcp_sendmsg_locked+0xad4/0x2c10 net/ipv4/tcp.c:1349 tcp_sendmsg+0x2f/0x50 net/ipv4/tcp.c:1396 inet_sendmsg+0x76/0xd0 net/ipv4/af_inet.c:851 sock_sendmsg_nosec net/socket.c:712 [inline] __sock_sendmsg+0x102/0x180 net/socket.c:727 sock_write_iter+0x165/0x1b0 net/socket.c:1131 new_sync_write fs/read_write.c:593 [inline] vfs_write+0x49d/0x8e0 fs/read_write.c:686 ksys_write+0xda/0x1a0 fs/read_write.c:738 __do_sys_write fs/read_write.c:749 [inline] __se_sys_write fs/read_write.c:746 [inline] __x64_sys_write+0x40/0x50 fs/read_write.c:746 x64_sys_call+0x2cdd/0x2fb0 arch/x86/include/generated/asm/syscalls_64.h:2 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xd2/0x200 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000 -> 0x0001 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3297 Comm: syz-executor Not tainted 6.16.0-rc6-syzkaller-00037-ge2291551827f #0 PREEMPT(voluntary) Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 ==================================================================