==================================================================
BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv
read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1:
can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
deliver net/can/af_can.c:572 [inline]
can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0:
can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
deliver net/can/af_can.c:572 [inline]
can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
__raw_read_unlock_bh include/linux/rwlock_api_smp.h:257 [inline]
_raw_read_unlock_bh+0x1b/0x20 kernel/locking/spinlock.c:284
wg_socket_send_skb_to_peer+0x109/0x130 drivers/net/wireguard/socket.c:184
wg_packet_create_data_done drivers/net/wireguard/send.c:251 [inline]
wg_packet_tx_worker+0x127/0x360 drivers/net/wireguard/send.c:276
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x00124c0f -> 0x00124c10
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 3395 Comm: kworker/0:3 Tainted: G W 6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: wg-crypt-wg0 wg_packet_tx_worker
==================================================================
==================================================================
BUG: KCSAN: data-race in can_receive / can_receive
read-write to 0xffff888114f07798 of 8 bytes by interrupt on cpu 1:
can_receive+0x1b6/0x1f0 net/can/af_can.c:671
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
__raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline]
_raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366
sock_orphan include/net/sock.h:2007 [inline]
sk_common_release+0x104/0x250 net/core/sock.c:3837
udp_lib_close+0x15/0x20 include/net/udp.h:200
inet_release+0xce/0xf0 net/ipv4/af_inet.c:437
inet6_release+0x3e/0x60 net/ipv6/af_inet6.c:489
__sock_release net/socket.c:658 [inline]
sock_close+0x68/0x150 net/socket.c:1426
__fput+0x17a/0x6d0 fs/file_table.c:431
____fput+0x1c/0x30 fs/file_table.c:459
task_work_run+0x13a/0x1a0 kernel/task_work.c:239
resume_user_mode_work include/linux/resume_user_mode.h:50 [inline]
exit_to_user_mode_loop kernel/entry/common.c:114 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0xbe/0x130 kernel/entry/common.c:218
do_syscall_64+0xd6/0x1c0 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x77/0x7f
read-write to 0xffff888114f07798 of 8 bytes by interrupt on cpu 0:
can_receive+0x1b6/0x1f0 net/can/af_can.c:671
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
local_bh_enable include/linux/bottom_half.h:33 [inline]
rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]
keep_key_fresh drivers/net/wireguard/send.c:135 [inline]
wg_packet_create_data_done drivers/net/wireguard/send.c:259 [inline]
wg_packet_tx_worker+0x2c8/0x360 drivers/net/wireguard/send.c:276
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x0000000000129611 -> 0x0000000000129612
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 3395 Comm: kworker/0:3 Tainted: G W 6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: wg-crypt-wg0 wg_packet_tx_worker
==================================================================
==================================================================
BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter
read-write to 0xffff888101d456a8 of 8 bytes by interrupt on cpu 1:
deliver net/can/af_can.c:573 [inline]
can_rcv_filter+0x3a9/0x4c0 net/can/af_can.c:633
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
_raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210
spin_unlock_bh include/linux/spinlock.h:396 [inline]
release_sock+0x117/0x150 net/core/sock.c:3635
tcp_recvmsg+0x147/0x490 net/ipv4/tcp.c:2852
inet_recvmsg+0xbd/0x290 net/ipv4/af_inet.c:885
sock_recvmsg_nosec net/socket.c:1051 [inline]
sock_recvmsg+0xfe/0x170 net/socket.c:1073
sock_read_iter+0x14c/0x1a0 net/socket.c:1143
new_sync_read fs/read_write.c:488 [inline]
vfs_read+0x5dc/0x700 fs/read_write.c:569
ksys_read+0xeb/0x1b0 fs/read_write.c:712
__do_sys_read fs/read_write.c:722 [inline]
__se_sys_read fs/read_write.c:720 [inline]
__x64_sys_read+0x42/0x50 fs/read_write.c:720
x64_sys_call+0x27d3/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:1
do_syscall_x64 arch/x86/entry/common.c:52 [inline]
do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83
entry_SYSCALL_64_after_hwframe+0x77/0x7f
read-write to 0xffff888101d456a8 of 8 bytes by interrupt on cpu 0:
deliver net/can/af_can.c:573 [inline]
can_rcv_filter+0x3a9/0x4c0 net/can/af_can.c:633
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x000000000000c59a -> 0x000000000000c59b
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_receive / can_receive
read-write to 0xffff888114f077e8 of 8 bytes by interrupt on cpu 1:
can_receive+0x62/0x1f0 net/can/af_can.c:650
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
_raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210
spin_unlock_bh include/linux/spinlock.h:396 [inline]
ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]
wg_packet_decrypt_worker+0x173/0x6f0 drivers/net/wireguard/receive.c:499
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
read-write to 0xffff888114f077e8 of 8 bytes by interrupt on cpu 0:
can_receive+0x62/0x1f0 net/can/af_can.c:650
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x0000000000000c44 -> 0x0000000000000c45
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_receive / can_receive
read-write to 0xffff888114f077f8 of 8 bytes by interrupt on cpu 1:
can_receive+0x1ca/0x1f0 net/can/af_can.c:672
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
local_bh_enable include/linux/bottom_half.h:33 [inline]
rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]
mod_peer_timer drivers/net/wireguard/timers.c:38 [inline]
wg_timers_any_authenticated_packet_traversal+0xe5/0x110 drivers/net/wireguard/timers.c:215
wg_packet_create_data_done drivers/net/wireguard/send.c:247 [inline]
wg_packet_tx_worker+0xe9/0x360 drivers/net/wireguard/send.c:276
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
read-write to 0xffff888114f077f8 of 8 bytes by interrupt on cpu 0:
can_receive+0x1ca/0x1f0 net/can/af_can.c:672
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x000000000000c6c3 -> 0x000000000000c6c5
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter
read-write to 0xffff888101d455b8 of 8 bytes by interrupt on cpu 1:
deliver net/can/af_can.c:573 [inline]
can_rcv_filter+0x237/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
local_bh_enable include/linux/bottom_half.h:33 [inline]
fpregs_unlock arch/x86/include/asm/fpu/api.h:80 [inline]
copy_fpstate_to_sigframe+0x2cb/0x780 arch/x86/kernel/fpu/signal.c:250
get_sigframe+0x2f3/0x430 arch/x86/kernel/signal.c:163
x64_setup_rt_frame+0xad/0x590 arch/x86/kernel/signal_64.c:175
setup_rt_frame arch/x86/kernel/signal.c:250 [inline]
handle_signal arch/x86/kernel/signal.c:294 [inline]
arch_do_signal_or_restart+0x287/0x4b0 arch/x86/kernel/signal.c:339
exit_to_user_mode_loop kernel/entry/common.c:111 [inline]
exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline]
__syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline]
syscall_exit_to_user_mode+0x59/0x130 kernel/entry/common.c:218
do_syscall_64+0xd6/0x1c0 arch/x86/entry/common.c:89
entry_SYSCALL_64_after_hwframe+0x77/0x7f
read-write to 0xffff888101d455b8 of 8 bytes by interrupt on cpu 0:
deliver net/can/af_can.c:573 [inline]
can_rcv_filter+0x237/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x000000000014c03e -> 0x000000000014c03f
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv
read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1:
can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
deliver net/can/af_can.c:572 [inline]
can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0:
can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
deliver net/can/af_can.c:572 [inline]
can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
local_bh_enable include/linux/bottom_half.h:33 [inline]
update_defense_level+0x575/0x5b0 net/netfilter/ipvs/ip_vs_ctl.c:210
defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:235
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x00173878 -> 0x00173879
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 6768 Comm: kworker/0:5 Tainted: G W 6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: events_long defense_work_handler
==================================================================
==================================================================
BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv
read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1:
can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
deliver net/can/af_can.c:572 [inline]
can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
__raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline]
_raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366
neigh_periodic_work+0x55a/0x600 net/core/neighbour.c:1019
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0:
can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
deliver net/can/af_can.c:572 [inline]
can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
__raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline]
_raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210
spin_unlock_bh include/linux/spinlock.h:396 [inline]
ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline]
wg_packet_encrypt_worker+0x186/0xa30 drivers/net/wireguard/send.c:293
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x001d84e4 -> 0x001d84e6
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 3395 Comm: kworker/0:3 Tainted: G W 6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker
==================================================================
==================================================================
BUG: KCSAN: data-race in can_send / can_send
read-write to 0xffff888114f07790 of 8 bytes by interrupt on cpu 1:
can_send+0x562/0x5d0 net/can/af_can.c:289
can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561
deliver net/can/af_can.c:572 [inline]
can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
__raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline]
_raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366
neigh_periodic_work+0x55a/0x600 net/core/neighbour.c:1019
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
read-write to 0xffff888114f07790 of 8 bytes by interrupt on cpu 0:
can_send+0x562/0x5d0 net/can/af_can.c:289
can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561
deliver net/can/af_can.c:572 [inline]
can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x00000000001f51e9 -> 0x00000000001f51eb
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_receive / can_receive
read-write to 0xffff888114f07788 of 8 bytes by interrupt on cpu 1:
can_receive+0x4e/0x1f0 net/can/af_can.c:649
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
do_softirq+0x5e/0x90 kernel/softirq.c:455
__local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382
__raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline]
_raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366
neigh_periodic_work+0x55a/0x600 net/core/neighbour.c:1019
process_one_work kernel/workqueue.c:3229 [inline]
process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310
worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
read-write to 0xffff888114f07788 of 8 bytes by interrupt on cpu 0:
can_receive+0x4e/0x1f0 net/can/af_can.c:649
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x0000000000201063 -> 0x0000000000201065
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================
==================================================================
BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv
read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1:
can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
deliver net/can/af_can.c:572 [inline]
can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0:
can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564
deliver net/can/af_can.c:572 [inline]
can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606
can_receive+0x182/0x1f0 net/can/af_can.c:663
can_rcv+0xe7/0x180 net/can/af_can.c:687
__netif_receive_skb_one_core net/core/dev.c:5670 [inline]
__netif_receive_skb+0x123/0x280 net/core/dev.c:5783
process_backlog+0x22e/0x440 net/core/dev.c:6115
__napi_poll+0x63/0x3c0 net/core/dev.c:6779
napi_poll net/core/dev.c:6848 [inline]
net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970
handle_softirqs+0xbf/0x280 kernel/softirq.c:554
run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927
smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164
kthread+0x1d1/0x210 kernel/kthread.c:389
ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147
ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244
value changed: 0x0023a145 -> 0x0023a147
Reported by Kernel Concurrency Sanitizer on:
CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0
Tainted: [W]=WARN
Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024
==================================================================