==================================================================
BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb

write to 0xffff88810202cd78 of 2 bytes by interrupt on cpu 0:
 virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:883 [inline]
 virtqueue_disable_cb+0x85/0x180 drivers/virtio/virtio_ring.c:2498
 skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:776
 vring_interrupt+0x161/0x190 drivers/virtio/virtio_ring.c:2647
 __handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158
 handle_irq_event_percpu kernel/irq/handle.c:193 [inline]
 handle_irq_event+0x64/0xf0 kernel/irq/handle.c:210
 handle_edge_irq+0x16d/0x5b0 kernel/irq/chip.c:831
 generic_handle_irq_desc include/linux/irqdesc.h:173 [inline]
 handle_irq arch/x86/kernel/irq.c:247 [inline]
 call_irq_handler arch/x86/kernel/irq.c:259 [inline]
 __common_interrupt+0x58/0xe0 arch/x86/kernel/irq.c:285
 common_interrupt+0x7c/0x90 arch/x86/kernel/irq.c:278
 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693
 __preempt_count_dec_and_test arch/x86/include/asm/preempt.h:94 [inline]
 __raw_spin_unlock_irqrestore include/linux/spinlock_api_smp.h:152 [inline]
 _raw_spin_unlock_irqrestore+0x3d/0x60 kernel/locking/spinlock.c:194
 bpf_lru_push_free+0x507/0x580
 __htab_lru_percpu_map_update_elem+0x532/0x630 kernel/bpf/hashtab.c:1410
 bpf_percpu_hash_update+0x5e/0xa0 kernel/bpf/hashtab.c:2447
 bpf_map_update_value+0x2ab/0x3b0 kernel/bpf/syscall.c:264
 generic_map_update_batch+0x401/0x520 kernel/bpf/syscall.c:1949
 bpf_map_do_batch+0x28c/0x3f0 kernel/bpf/syscall.c:5267
 __sys_bpf+0x2e5/0x7a0
 __do_sys_bpf kernel/bpf/syscall.c:5866 [inline]
 __se_sys_bpf kernel/bpf/syscall.c:5864 [inline]
 __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5864
 x64_sys_call+0x2914/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:322
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

read to 0xffff88810202cd78 of 2 bytes by task 3312 on cpu 1:
 virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:882 [inline]
 virtqueue_disable_cb+0x63/0x180 drivers/virtio/virtio_ring.c:2498
 start_xmit+0x15c/0x1310 drivers/net/virtio_net.c:3259
 __netdev_start_xmit include/linux/netdevice.h:5002 [inline]
 netdev_start_xmit include/linux/netdevice.h:5011 [inline]
 xmit_one net/core/dev.c:3590 [inline]
 dev_hard_start_xmit+0x119/0x3f0 net/core/dev.c:3606
 sch_direct_xmit+0x1a9/0x580 net/sched/sch_generic.c:343
 __dev_xmit_skb net/core/dev.c:3827 [inline]
 __dev_queue_xmit+0xf6a/0x2090 net/core/dev.c:4400
 dev_queue_xmit include/linux/netdevice.h:3168 [inline]
 neigh_hh_output include/net/neighbour.h:523 [inline]
 neigh_output include/net/neighbour.h:537 [inline]
 ip_finish_output2+0x721/0x890 net/ipv4/ip_output.c:236
 ip_finish_output+0x11a/0x2a0 net/ipv4/ip_output.c:324
 NF_HOOK_COND include/linux/netfilter.h:303 [inline]
 ip_output+0xab/0x170 net/ipv4/ip_output.c:434
 dst_output include/net/dst.h:450 [inline]
 ip_local_out net/ipv4/ip_output.c:130 [inline]
 __ip_queue_xmit+0xbf2/0xc10 net/ipv4/ip_output.c:536
 ip_queue_xmit+0x38/0x50 net/ipv4/ip_output.c:550
 __tcp_transmit_skb+0x15ca/0x1980 net/ipv4/tcp_output.c:1466
 __tcp_send_ack+0x1de/0x300 net/ipv4/tcp_output.c:4270
 tcp_send_ack+0x27/0x30 net/ipv4/tcp_output.c:4276
 __tcp_cleanup_rbuf+0x149/0x280 net/ipv4/tcp.c:1506
 tcp_cleanup_rbuf net/ipv4/tcp.c:1517 [inline]
 tcp_recvmsg_locked+0x1be3/0x2100 net/ipv4/tcp.c:2822
 tcp_recvmsg+0x13c/0x490 net/ipv4/tcp.c:2852
 inet_recvmsg+0xbd/0x290 net/ipv4/af_inet.c:883
 sock_recvmsg_nosec net/socket.c:1033 [inline]
 sock_recvmsg+0xfe/0x170 net/socket.c:1055
 sock_read_iter+0x14c/0x1a0 net/socket.c:1125
 new_sync_read fs/read_write.c:484 [inline]
 vfs_read+0x5dc/0x700 fs/read_write.c:565
 ksys_read+0xe8/0x1b0 fs/read_write.c:708
 __do_sys_read fs/read_write.c:717 [inline]
 __se_sys_read fs/read_write.c:715 [inline]
 __x64_sys_read+0x42/0x50 fs/read_write.c:715
 x64_sys_call+0x2874/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:1
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

value changed: 0x0000 -> 0x0001

Reported by Kernel Concurrency Sanitizer on:
CPU: 1 UID: 0 PID: 3312 Comm: syz-executor Tainted: G        W          6.12.0-syzkaller-07749-g28eb75e178d3 #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/30/2024
==================================================================