================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88816a562218 of 8 bytes by interrupt on cpu 1: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88816a562218 of 8 bytes by interrupt on cpu 0: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] netif_rx+0x83/0x240 net/core/dev.c:5257 can_send+0x586/0x6d0 net/can/af_can.c:287 isotp_sendmsg+0x9ab/0xc00 net/can/isotp.c:1087 sock_sendmsg_nosec net/socket.c:711 [inline] __sock_sendmsg+0x140/0x180 net/socket.c:726 __sys_sendto+0x1a8/0x230 net/socket.c:2197 __do_sys_sendto net/socket.c:2204 [inline] __se_sys_sendto net/socket.c:2200 [inline] __x64_sys_sendto+0x78/0x90 net/socket.c:2200 x64_sys_call+0x29fa/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000000107a4 -> 0x00000000000107a5 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 29447 Comm: syz.1.39206 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101da89c8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888101da89c8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] kfree_skb_napi_cache net/core/skbuff.c:7116 [inline] skb_attempt_defer_free+0x260/0x2c0 net/core/skbuff.c:7137 tcp_eat_recv_skb net/ipv4/tcp.c:1527 [inline] tcp_recvmsg_locked+0x1b6b/0x2100 net/ipv4/tcp.c:2813 tcp_recvmsg+0x13c/0x490 net/ipv4/tcp.c:2852 inet_recvmsg+0xbd/0x290 net/ipv4/af_inet.c:883 sock_recvmsg_nosec net/socket.c:1033 [inline] sock_recvmsg+0xfe/0x170 net/socket.c:1055 sock_read_iter+0x14c/0x1a0 net/socket.c:1125 new_sync_read fs/read_write.c:484 [inline] vfs_read+0x5dc/0x700 fs/read_write.c:565 ksys_read+0xe8/0x1b0 fs/read_write.c:708 __do_sys_read fs/read_write.c:717 [inline] __se_sys_read fs/read_write.c:715 [inline] __x64_sys_read+0x42/0x50 fs/read_write.c:715 x64_sys_call+0x2874/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000000000001509f -> 0x00000000000150a0 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3288 Comm: syz-executor Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff88816a562210 of 8 bytes by interrupt on cpu 1: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] update_defense_level+0x575/0x5b0 net/netfilter/ipvs/ip_vs_ctl.c:210 defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:235 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88816a562210 of 8 bytes by interrupt on cpu 0: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] kfree_skb_napi_cache net/core/skbuff.c:7116 [inline] skb_attempt_defer_free+0x260/0x2c0 net/core/skbuff.c:7137 tcp_eat_recv_skb net/ipv4/tcp.c:1527 [inline] tcp_recvmsg_locked+0x1b6b/0x2100 net/ipv4/tcp.c:2813 tcp_recvmsg+0x13c/0x490 net/ipv4/tcp.c:2852 inet_recvmsg+0xbd/0x290 net/ipv4/af_inet.c:883 sock_recvmsg_nosec net/socket.c:1033 [inline] sock_recvmsg+0xfe/0x170 net/socket.c:1055 sock_read_iter+0x14c/0x1a0 net/socket.c:1125 new_sync_read fs/read_write.c:484 [inline] vfs_read+0x5dc/0x700 fs/read_write.c:565 ksys_read+0xe8/0x1b0 fs/read_write.c:708 __do_sys_read fs/read_write.c:717 [inline] __se_sys_read fs/read_write.c:715 [inline] __x64_sys_read+0x42/0x50 fs/read_write.c:715 x64_sys_call+0x2874/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000019f17 -> 0x0000000000019f18 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3288 Comm: syz-executor Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88816a562208 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88816a562208 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] kfree_skb_napi_cache net/core/skbuff.c:7116 [inline] skb_attempt_defer_free+0x260/0x2c0 net/core/skbuff.c:7137 tcp_eat_recv_skb net/ipv4/tcp.c:1527 [inline] tcp_recvmsg_locked+0x1b6b/0x2100 net/ipv4/tcp.c:2813 tcp_recvmsg+0x13c/0x490 net/ipv4/tcp.c:2852 inet_recvmsg+0xbd/0x290 net/ipv4/af_inet.c:883 sock_recvmsg_nosec net/socket.c:1033 [inline] sock_recvmsg+0xfe/0x170 net/socket.c:1055 sock_read_iter+0x14c/0x1a0 net/socket.c:1125 new_sync_read fs/read_write.c:484 [inline] vfs_read+0x5dc/0x700 fs/read_write.c:565 ksys_read+0xe8/0x1b0 fs/read_write.c:708 __do_sys_read fs/read_write.c:717 [inline] __se_sys_read fs/read_write.c:715 [inline] __x64_sys_read+0x42/0x50 fs/read_write.c:715 x64_sys_call+0x2874/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000000000001c7ef -> 0x000000000001c7f0 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3288 Comm: syz-executor Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88816a562268 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88816a562268 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000001408b -> 0x000000000001408c Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff8881251e4020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff8881251e4020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000298ca -> 0x000298cc Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101da86a8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x3a9/0x4c0 net/can/af_can.c:634 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888101da86a8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x3a9/0x4c0 net/can/af_can.c:634 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000002f201 -> 0x000000000002f203 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88816a562278 of 8 bytes by interrupt on cpu 1: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88816a562278 of 8 bytes by interrupt on cpu 0: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000000e140 -> 0x000000000000e142 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88816a562218 of 8 bytes by interrupt on cpu 1: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88816a562218 of 8 bytes by interrupt on cpu 0: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_read_unlock_bh include/linux/rwlock_api_smp.h:257 [inline] _raw_read_unlock_bh+0x1b/0x20 kernel/locking/spinlock.c:284 wg_socket_send_skb_to_peer+0x109/0x130 drivers/net/wireguard/socket.c:184 wg_packet_create_data_done drivers/net/wireguard/send.c:251 [inline] wg_packet_tx_worker+0x127/0x360 drivers/net/wireguard/send.c:276 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000005a285 -> 0x000000000005a286 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 14226 Comm: kworker/0:2 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: wg-crypt-wg1 wg_packet_tx_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff88816a562210 of 8 bytes by interrupt on cpu 1: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88816a562210 of 8 bytes by interrupt on cpu 0: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x3db/0xad0 net/batman-adv/network-coding.c:720 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000067466 -> 0x0000000000067468 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 19696 Comm: kworker/u8:30 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: bat_events batadv_nc_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88816a562268 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88816a562268 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000000e17 -> 0x0000000000000e19 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88816a562208 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88816a562208 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] wg_index_hashtable_insert+0xaa/0x2a0 drivers/net/wireguard/peerlookup.c:126 wg_noise_handshake_create_initiation+0x52d/0x5f0 drivers/net/wireguard/noise.c:569 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:34 [inline] wg_packet_handshake_send_worker+0xb3/0x150 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000b185a -> 0x00000000000b185c Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 19663 Comm: kworker/u8:16 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff8881251e4020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_handshake_receive_worker+0x184/0x5f0 drivers/net/wireguard/receive.c:212 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff8881251e4020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] mod_peer_timer drivers/net/wireguard/timers.c:38 [inline] wg_timers_any_authenticated_packet_traversal+0xe5/0x110 drivers/net/wireguard/timers.c:215 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:36 [inline] wg_packet_handshake_send_worker+0xd7/0x150 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000c0dca -> 0x000c0dcb Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 19694 Comm: kworker/u8:28 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: wg-kex-wg0 wg_packet_handshake_send_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101da86a8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x3a9/0x4c0 net/can/af_can.c:634 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] wg_index_hashtable_insert+0xaa/0x2a0 drivers/net/wireguard/peerlookup.c:126 wg_noise_handshake_create_initiation+0x52d/0x5f0 drivers/net/wireguard/noise.c:569 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:34 [inline] wg_packet_handshake_send_worker+0xb3/0x150 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888101da86a8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x3a9/0x4c0 net/can/af_can.c:634 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_encrypt_worker+0xb6b/0xbb0 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000c714b -> 0x00000000000c714c Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 24720 Comm: kworker/0:1 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88816a562278 of 8 bytes by interrupt on cpu 1: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] mod_peer_timer drivers/net/wireguard/timers.c:38 [inline] wg_timers_any_authenticated_packet_traversal+0xe5/0x110 drivers/net/wireguard/timers.c:215 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:36 [inline] wg_packet_handshake_send_worker+0xd7/0x150 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88816a562278 of 8 bytes by interrupt on cpu 0: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000107e9 -> 0x00000000000107eb Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.13.0-rc4-syzkaller-00069-g8379578b11d5 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101da89c8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117