Hello, syzbot found the following issue on: HEAD commit: 3d5ad2d4eca3 Merge tag 'bpf-fixes' of git://git.kernel.org.. git tree: upstream console output: https://syzkaller.appspot.com/x/log.txt?x=154b7487980000 kernel config: https://syzkaller.appspot.com/x/.config?x=fd83253b74c9c570 dashboard link: https://syzkaller.appspot.com/bug?extid=9d46c74b27b961b244a9 compiler: Debian clang version 15.0.6, GNU ld (GNU Binutils for Debian) 2.40 Unfortunately, I don't have any reproducer for this issue yet. Downloadable assets: disk image: https://storage.googleapis.com/syzbot-assets/9d112e37e26b/disk-3d5ad2d4.raw.xz vmlinux: https://storage.googleapis.com/syzbot-assets/d8f036bdcdb7/vmlinux-3d5ad2d4.xz kernel image: https://storage.googleapis.com/syzbot-assets/61727d52db48/bzImage-3d5ad2d4.xz IMPORTANT: if you fix the issue, please add the following tag to the commit: Reported-by: syzbot+9d46c74b27b961b244a9@xxxxxxxxxxxxxxxxxxxxxxxxx ================================================================== BUG: KCSAN: data-race in virtqueue_disable_cb / virtqueue_disable_cb read to 0xffff888102c18178 of 2 bytes by interrupt on cpu 1: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:885 [inline] virtqueue_disable_cb+0x63/0x180 drivers/virtio/virtio_ring.c:2446 skb_xmit_done+0x5f/0x140 drivers/net/virtio_net.c:715 vring_interrupt+0x161/0x190 drivers/virtio/virtio_ring.c:2595 __handle_irq_event_percpu+0x95/0x490 kernel/irq/handle.c:158 handle_irq_event_percpu kernel/irq/handle.c:193 [inline] handle_irq_event+0x64/0xf0 kernel/irq/handle.c:210 handle_edge_irq+0x16d/0x5b0 kernel/irq/chip.c:831 generic_handle_irq_desc include/linux/irqdesc.h:173 [inline] handle_irq arch/x86/kernel/irq.c:247 [inline] call_irq_handler arch/x86/kernel/irq.c:259 [inline] __common_interrupt+0x58/0xe0 arch/x86/kernel/irq.c:285 common_interrupt+0x7c/0x90 arch/x86/kernel/irq.c:278 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 kcsan_setup_watchpoint+0x404/0x410 kernel/kcsan/core.c:705 format_decode+0x1d1/0x8a0 lib/vsprintf.c:2554 vsnprintf+0xc6/0xe30 lib/vsprintf.c:2755 sprintf+0x89/0xb0 lib/vsprintf.c:3007 print_caller kernel/printk/printk.c:1373 [inline] info_print_prefix+0x142/0x1a0 kernel/printk/printk.c:1390 record_print_text kernel/printk/printk.c:1437 [inline] printk_get_next_message+0x446/0x6f0 kernel/printk/printk.c:2978 console_emit_next_record kernel/printk/printk.c:3046 [inline] console_flush_all+0x28a/0x770 kernel/printk/printk.c:3180 __console_flush_and_unlock kernel/printk/printk.c:3239 [inline] console_unlock+0xab/0x330 kernel/printk/printk.c:3279 vprintk_emit+0x3f4/0x680 kernel/printk/printk.c:2407 vprintk_default+0x26/0x30 kernel/printk/printk.c:2422 vprintk+0x75/0x80 kernel/printk/printk_safe.c:68 _printk+0x7a/0xa0 kernel/printk/printk.c:2432 batadv_check_known_mac_addr+0x153/0x180 net/batman-adv/hard-interface.c:528 batadv_hard_if_event+0x4b0/0x1010 net/batman-adv/hard-interface.c:998 notifier_call_chain kernel/notifier.c:93 [inline] raw_notifier_call_chain+0x6f/0x1d0 kernel/notifier.c:461 call_netdevice_notifiers_info+0xae/0x100 net/core/dev.c:1996 call_netdevice_notifiers_extack net/core/dev.c:2034 [inline] call_netdevice_notifiers net/core/dev.c:2048 [inline] dev_set_mac_address+0x1ff/0x260 net/core/dev.c:9104 dev_set_mac_address_user+0x31/0x50 net/core/dev.c:9118 do_setlink+0x513/0x2490 net/core/rtnetlink.c:2884 __rtnl_newlink net/core/rtnetlink.c:3725 [inline] rtnl_newlink+0x11a3/0x1690 net/core/rtnetlink.c:3772 rtnetlink_rcv_msg+0x6aa/0x710 net/core/rtnetlink.c:6675 netlink_rcv_skb+0x12c/0x230 net/netlink/af_netlink.c:2551 rtnetlink_rcv+0x1c/0x30 net/core/rtnetlink.c:6693 netlink_unicast_kernel net/netlink/af_netlink.c:1331 [inline] netlink_unicast+0x599/0x670 net/netlink/af_netlink.c:1357 netlink_sendmsg+0x5cc/0x6e0 net/netlink/af_netlink.c:1901 sock_sendmsg_nosec net/socket.c:729 [inline] __sock_sendmsg+0x140/0x180 net/socket.c:744 __sys_sendto+0x1d6/0x260 net/socket.c:2214 __do_sys_sendto net/socket.c:2226 [inline] __se_sys_sendto net/socket.c:2222 [inline] __x64_sys_sendto+0x78/0x90 net/socket.c:2222 x64_sys_call+0x2959/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f write to 0xffff888102c18178 of 2 bytes by task 3255 on cpu 0: virtqueue_disable_cb_split drivers/virtio/virtio_ring.c:886 [inline] virtqueue_disable_cb+0x85/0x180 drivers/virtio/virtio_ring.c:2446 start_xmit+0x14b/0x1260 drivers/net/virtio_net.c:3067 __netdev_start_xmit include/linux/netdevice.h:4916 [inline] netdev_start_xmit include/linux/netdevice.h:4925 [inline] xmit_one net/core/dev.c:3588 [inline] dev_hard_start_xmit+0x119/0x3f0 net/core/dev.c:3604 sch_direct_xmit+0x1a9/0x580 net/sched/sch_generic.c:343 __dev_xmit_skb net/core/dev.c:3821 [inline] __dev_queue_xmit+0xf1a/0x2040 net/core/dev.c:4394 dev_queue_xmit include/linux/netdevice.h:3094 [inline] neigh_hh_output include/net/neighbour.h:526 [inline] neigh_output include/net/neighbour.h:540 [inline] ip_finish_output2+0x73d/0x8b0 net/ipv4/ip_output.c:236 ip_finish_output+0x11a/0x2a0 net/ipv4/ip_output.c:324 NF_HOOK_COND include/linux/netfilter.h:303 [inline] ip_output+0xab/0x170 net/ipv4/ip_output.c:434 dst_output include/net/dst.h:450 [inline] ip_local_out net/ipv4/ip_output.c:130 [inline] __ip_queue_xmit+0xbcc/0xbf0 net/ipv4/ip_output.c:536 ip_queue_xmit+0x38/0x50 net/ipv4/ip_output.c:550 __tcp_transmit_skb+0x15b0/0x1970 net/ipv4/tcp_output.c:1466 __tcp_send_ack+0x1de/0x2e0 net/ipv4/tcp_output.c:4268 tcp_send_ack+0x27/0x30 net/ipv4/tcp_output.c:4274 __tcp_cleanup_rbuf+0x149/0x280 net/ipv4/tcp.c:1505 tcp_cleanup_rbuf net/ipv4/tcp.c:1516 [inline] tcp_recvmsg_locked+0x1be3/0x2100 net/ipv4/tcp.c:2821 tcp_recvmsg+0x13c/0x490 net/ipv4/tcp.c:2851 inet_recvmsg+0xbd/0x290 net/ipv4/af_inet.c:885 sock_recvmsg_nosec net/socket.c:1051 [inline] sock_recvmsg+0xfe/0x170 net/socket.c:1073 sock_read_iter+0x14c/0x1a0 net/socket.c:1143 new_sync_read fs/read_write.c:488 [inline] vfs_read+0x5f6/0x720 fs/read_write.c:569 ksys_read+0xeb/0x1b0 fs/read_write.c:712 __do_sys_read fs/read_write.c:722 [inline] __se_sys_read fs/read_write.c:720 [inline] __x64_sys_read+0x42/0x50 fs/read_write.c:720 x64_sys_call+0x27d3/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000 -> 0x0001 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3255 Comm: syz-executor Not tainted 6.12.0-rc3-syzkaller-00389-g3d5ad2d4eca3 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== --- This report is generated by a bot. It may contain errors. See https://goo.gl/tpsmEJ for more information about syzbot. syzbot engineers can be reached at syzkaller@xxxxxxxxxxxxxxxx. syzbot will keep track of this issue. See: https://goo.gl/tpsmEJ#status for how to communicate with syzbot. If the report is already addressed, let syzbot know by replying with: #syz fix: exact-commit-title If you want to overwrite report's subsystems, reply with: #syz set subsystems: new-subsystem (See the list of subsystem names on the web dashboard) If the report is a duplicate of another one, reply with: #syz dup: exact-subject-of-another-report If you want to undo deduplication, reply with: #syz undup