syzbot


KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv (2)

Status: auto-obsoleted due to no activity on 2024/12/30 16:15
Subsystems: can
[Documentation on labels]
First crash: 77d, last: 77d
Similar bugs (1)
Kernel Title Repro Cause bisect Fix bisect Count Last Reported Patched Status
upstream KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv can 4 255d 300d 0/28 auto-obsoleted due to no activity on 2024/06/14 15:49

Sample crash report:
==================================================================
BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv

read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1:
 can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
 deliver net/can/af_can.c:572 [inline]
 can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0:
 can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
 deliver net/can/af_can.c:572 [inline]
 can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 __raw_read_unlock_bh include/linux/rwlock_api_smp.h:257 [inline]
 _raw_read_unlock_bh+0x1b/0x20 kernel/locking/spinlock.c:284
 wg_socket_send_skb_to_peer+0x109/0x130 drivers/net/wireguard/socket.c:184
 wg_packet_create_data_done drivers/net/wireguard/send.c:251 [inline]
 wg_packet_tx_worker+0x127/0x360 drivers/net/wireguard/send.c:276
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

value changed: 0x00124c0f -> 0x00124c10

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 3395 Comm: kworker/0:3 Tainted: G        W          6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: wg-crypt-wg0 wg_packet_tx_worker
==================================================================
==================================================================
BUG: KCSAN: data-race in can_receive / can_receive

read-write to 0xffff888114f07798 of 8 bytes by interrupt on cpu 1:
 can_receive+0x1b6/0x1f0 net/can/af_can.c:671
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline]
 _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366
 sock_orphan include/net/sock.h:2007 [inline]
 sk_common_release+0x104/0x250 net/core/sock.c:3837
 udp_lib_close+0x15/0x20 include/net/udp.h:200
 inet_release+0xce/0xf0 net/ipv4/af_inet.c:437
 inet6_release+0x3e/0x60 net/ipv6/af_inet6.c:489
 __sock_release net/socket.c:658 [inline]
 sock_close+0x68/0x150 net/socket.c:1426
 __fput+0x17a/0x6d0 fs/file_table.c:431
 ____fput+0x1c/0x30 fs/file_table.c:459
 task_work_run+0x13a/0x1a0 kernel/task_work.c:239
 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
 exit_to_user_mode_loop kernel/entry/common.c:114 [inline]
 exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
 __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
 syscall_exit_to_user_mode+0xbe/0x130 kernel/entry/common.c:218
 do_syscall_64+0xd6/0x1c0 arch/x86/entry/common.c:89
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

read-write to 0xffff888114f07798 of 8 bytes by interrupt on cpu 0:
 can_receive+0x1b6/0x1f0 net/can/af_can.c:671
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 local_bh_enable include/linux/bottom_half.h:33 [inline]
 rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]
 keep_key_fresh drivers/net/wireguard/send.c:135 [inline]
 wg_packet_create_data_done drivers/net/wireguard/send.c:259 [inline]
 wg_packet_tx_worker+0x2c8/0x360 drivers/net/wireguard/send.c:276
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

value changed: 0x0000000000129611 -> 0x0000000000129612

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 3395 Comm: kworker/0:3 Tainted: G        W          6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: wg-crypt-wg0 wg_packet_tx_worker
==================================================================
==================================================================
BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter

read-write to 0xffff888101d456a8 of 8 bytes by interrupt on cpu 1:
 deliver net/can/af_can.c:573 [inline]
 can_rcv_filter+0x3a9/0x4c0 net/can/af_can.c:633
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
 _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210
 spin_unlock_bh include/linux/spinlock.h:396 [inline]
 release_sock+0x117/0x150 net/core/sock.c:3635
 tcp_recvmsg+0x147/0x490 net/ipv4/tcp.c:2852
 inet_recvmsg+0xbd/0x290 net/ipv4/af_inet.c:885
 sock_recvmsg_nosec net/socket.c:1051 [inline]
 sock_recvmsg+0xfe/0x170 net/socket.c:1073
 sock_read_iter+0x14c/0x1a0 net/socket.c:1143
 new_sync_read fs/read_write.c:488 [inline]
 vfs_read+0x5dc/0x700 fs/read_write.c:569
 ksys_read+0xeb/0x1b0 fs/read_write.c:712
 __do_sys_read fs/read_write.c:722 [inline]
 __se_sys_read fs/read_write.c:720 [inline]
 __x64_sys_read+0x42/0x50 fs/read_write.c:720
 x64_sys_call+0x27d3/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:1
 do_syscall_x64 arch/x86/entry/common.c:52 [inline]
 do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

read-write to 0xffff888101d456a8 of 8 bytes by interrupt on cpu 0:
 deliver net/can/af_can.c:573 [inline]
 can_rcv_filter+0x3a9/0x4c0 net/can/af_can.c:633
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

value changed: 0x000000000000c59a -> 0x000000000000c59b

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G        W          6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_receive / can_receive

read-write to 0xffff888114f077e8 of 8 bytes by interrupt on cpu 1:
 can_receive+0x62/0x1f0 net/can/af_can.c:650
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
 _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210
 spin_unlock_bh include/linux/spinlock.h:396 [inline]
 ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]
 wg_packet_decrypt_worker+0x173/0x6f0 drivers/net/wireguard/receive.c:499
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

read-write to 0xffff888114f077e8 of 8 bytes by interrupt on cpu 0:
 can_receive+0x62/0x1f0 net/can/af_can.c:650
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

value changed: 0x0000000000000c44 -> 0x0000000000000c45

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G        W          6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_receive / can_receive

read-write to 0xffff888114f077f8 of 8 bytes by interrupt on cpu 1:
 can_receive+0x1ca/0x1f0 net/can/af_can.c:672
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 local_bh_enable include/linux/bottom_half.h:33 [inline]
 rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]
 mod_peer_timer drivers/net/wireguard/timers.c:38 [inline]
 wg_timers_any_authenticated_packet_traversal+0xe5/0x110 drivers/net/wireguard/timers.c:215
 wg_packet_create_data_done drivers/net/wireguard/send.c:247 [inline]
 wg_packet_tx_worker+0xe9/0x360 drivers/net/wireguard/send.c:276
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

read-write to 0xffff888114f077f8 of 8 bytes by interrupt on cpu 0:
 can_receive+0x1ca/0x1f0 net/can/af_can.c:672
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

value changed: 0x000000000000c6c3 -> 0x000000000000c6c5

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G        W          6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter

read-write to 0xffff888101d455b8 of 8 bytes by interrupt on cpu 1:
 deliver net/can/af_can.c:573 [inline]
 can_rcv_filter+0x237/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 local_bh_enable include/linux/bottom_half.h:33 [inline]
 fpregs_unlock arch/x86/include/asm/fpu/api.h:80 [inline]
 copy_fpstate_to_sigframe+0x2cb/0x780 arch/x86/kernel/fpu/signal.c:250
 get_sigframe+0x2f3/0x430 arch/x86/kernel/signal.c:163
 x64_setup_rt_frame+0xad/0x590 arch/x86/kernel/signal_64.c:175
 setup_rt_frame arch/x86/kernel/signal.c:250 [inline]
 handle_signal arch/x86/kernel/signal.c:294 [inline]
 arch_do_signal_or_restart+0x287/0x4b0 arch/x86/kernel/signal.c:339
 exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
 exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
 __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
 syscall_exit_to_user_mode+0x59/0x130 kernel/entry/common.c:218
 do_syscall_64+0xd6/0x1c0 arch/x86/entry/common.c:89
 entry_SYSCALL_64_after_hwframe+0x77/0x7f

read-write to 0xffff888101d455b8 of 8 bytes by interrupt on cpu 0:
 deliver net/can/af_can.c:573 [inline]
 can_rcv_filter+0x237/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

value changed: 0x000000000014c03e -> 0x000000000014c03f

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G        W          6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv

read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1:
 can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
 deliver net/can/af_can.c:572 [inline]
 can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0:
 can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
 deliver net/can/af_can.c:572 [inline]
 can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 local_bh_enable include/linux/bottom_half.h:33 [inline]
 update_defense_level+0x575/0x5b0 net/netfilter/ipvs/ip_vs_ctl.c:210
 defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:235
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

value changed: 0x00173878 -> 0x00173879

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 6768 Comm: kworker/0:5 Tainted: G        W          6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events_long defense_work_handler
==================================================================
==================================================================
BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv

read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1:
 can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
 deliver net/can/af_can.c:572 [inline]
 can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline]
 _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366
 neigh_periodic_work+0x55a/0x600 net/core/neighbour.c:1019
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0:
 can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
 deliver net/can/af_can.c:572 [inline]
 can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
 _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210
 spin_unlock_bh include/linux/spinlock.h:396 [inline]
 ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]
 wg_packet_encrypt_worker+0x186/0xa30 drivers/net/wireguard/send.c:293
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

value changed: 0x001d84e4 -> 0x001d84e6

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 3395 Comm: kworker/0:3 Tainted: G        W          6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker
==================================================================
==================================================================
BUG: KCSAN: data-race in can_send / can_send

read-write to 0xffff888114f07790 of 8 bytes by interrupt on cpu 1:
 can_send+0x562/0x5d0 net/can/af_can.c:289
 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561
 deliver net/can/af_can.c:572 [inline]
 can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline]
 _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366
 neigh_periodic_work+0x55a/0x600 net/core/neighbour.c:1019
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

read-write to 0xffff888114f07790 of 8 bytes by interrupt on cpu 0:
 can_send+0x562/0x5d0 net/can/af_can.c:289
 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561
 deliver net/can/af_can.c:572 [inline]
 can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

value changed: 0x00000000001f51e9 -> 0x00000000001f51eb

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G        W          6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_receive / can_receive

read-write to 0xffff888114f07788 of 8 bytes by interrupt on cpu 1:
 can_receive+0x4e/0x1f0 net/can/af_can.c:649
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 do_softirq+0x5e/0x90 kernel/softirq.c:455
 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline]
 _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366
 neigh_periodic_work+0x55a/0x600 net/core/neighbour.c:1019
 process_one_work kernel/workqueue.c:3229 [inline]
 process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

read-write to 0xffff888114f07788 of 8 bytes by interrupt on cpu 0:
 can_receive+0x4e/0x1f0 net/can/af_can.c:649
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

value changed: 0x0000000000201063 -> 0x0000000000201065

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G        W          6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv

read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1:
 can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
 deliver net/can/af_can.c:572 [inline]
 can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0:
 can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
 deliver net/can/af_can.c:572 [inline]
 can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
 can_receive+0x182/0x1f0 net/can/af_can.c:663
 can_rcv+0xe7/0x180 net/can/af_can.c:687
 __netif_receive_skb_one_core net/core/dev.c:5670 [inline]
 __netif_receive_skb+0x123/0x280 net/core/dev.c:5783
 process_backlog+0x22e/0x440 net/core/dev.c:6115
 __napi_poll+0x63/0x3c0 net/core/dev.c:6779
 napi_poll net/core/dev.c:6848 [inline]
 net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
 handle_softirqs+0xbf/0x280 kernel/softirq.c:554
 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
 kthread+0x1d1/0x210 kernel/kthread.c:389
 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244

value changed: 0x0023a145 -> 0x0023a147

Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G        W          6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================

Crashes (1):
Time Kernel Commit Syzkaller Config Log Report Syz repro C repro VM info Assets (help?) Manager Title
2024/11/04 16:14 upstream 59b723cd2adb f00eed24 .config console log report info [disk image] [vmlinux] [kernel image] ci2-upstream-kcsan-gce KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv
* Struck through repros no longer work on HEAD.