================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff88812ff78020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] netif_rx+0x83/0x240 net/core/dev.c:5129 can_send+0x53d/0x5d0 net/can/af_can.c:286 isotp_sendmsg+0x9ab/0xc00 net/can/isotp.c:1086 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x140/0x180 net/socket.c:745 ____sys_sendmsg+0x312/0x410 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x1e9/0x280 net/socket.c:2667 __do_sys_sendmsg net/socket.c:2676 [inline] __se_sys_sendmsg net/socket.c:2674 [inline] __x64_sys_sendmsg+0x46/0x50 net/socket.c:2674 x64_sys_call+0xae9/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff88812ff78020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3542 lock_sock include/net/sock.h:1671 [inline] ip4_datagram_connect+0x20/0x50 net/ipv4/datagram.c:89 inet_dgram_connect+0x11d/0x1b0 net/ipv4/af_inet.c:594 __sys_connect_file net/socket.c:2048 [inline] __sys_connect+0x1a9/0x1c0 net/socket.c:2065 __do_sys_connect net/socket.c:2075 [inline] __se_sys_connect net/socket.c:2072 [inline] __x64_sys_connect+0x41/0x50 net/socket.c:2072 x64_sys_call+0x2929/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:43 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00015856 -> 0x00015857 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 17988 Comm: syz-executor.2 Tainted: G W 6.9.0-rc5-syzkaller-00042-ge88c4cfcb7b8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff88814bd87ff0 of 8 bytes by interrupt on cpu 1: can_send+0x570/0x5d0 net/can/af_can.c:290 can_can_gw_rcv+0x77b/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3542 lock_sock include/net/sock.h:1671 [inline] tcp_sendmsg+0x22/0x50 net/ipv4/tcp.c:1341 inet_sendmsg+0x77/0xd0 net/ipv4/af_inet.c:851 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x102/0x180 net/socket.c:745 sock_write_iter+0x164/0x1b0 net/socket.c:1160 call_write_iter include/linux/fs.h:2110 [inline] new_sync_write fs/read_write.c:497 [inline] vfs_write+0x771/0x8e0 fs/read_write.c:590 ksys_write+0xeb/0x1b0 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [inline] __se_sys_write fs/read_write.c:652 [inline] __x64_sys_write+0x42/0x50 fs/read_write.c:652 x64_sys_call+0x27b7/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:2 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff88814bd87ff0 of 8 bytes by interrupt on cpu 0: can_send+0x570/0x5d0 net/can/af_can.c:290 can_can_gw_rcv+0x77b/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] release_sock+0x117/0x150 net/core/sock.c:3559 sockopt_release_sock+0x42/0x50 net/core/sock.c:1070 do_ip_getsockopt+0xcb4/0x11a0 net/ipv4/ip_sockglue.c:1732 ip_getsockopt+0x5c/0x170 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4375 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3700 do_sock_getsockopt+0x121/0x1a0 net/socket.c:2373 __sys_getsockopt+0x19a/0x210 net/socket.c:2402 __do_sys_getsockopt net/socket.c:2412 [inline] __se_sys_getsockopt net/socket.c:2409 [inline] __x64_sys_getsockopt+0x66/0x80 net/socket.c:2409 x64_sys_call+0x2ce9/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:56 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000008142 -> 0x0000000000008143 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 17442 Comm: syz-executor.1 Tainted: G W 6.9.0-rc5-syzkaller-00042-ge88c4cfcb7b8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff88814bd87f90 of 8 bytes by interrupt on cpu 1: can_send+0x55c/0x5d0 net/can/af_can.c:289 can_can_gw_rcv+0x77b/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_encrypt_worker+0x9ed/0xa30 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88814bd87f90 of 8 bytes by interrupt on cpu 0: can_send+0x55c/0x5d0 net/can/af_can.c:289 can_can_gw_rcv+0x77b/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3542 lock_sock include/net/sock.h:1671 [inline] netlink_insert+0x64/0x9b0 net/netlink/af_netlink.c:575 netlink_autobind+0xa8/0x150 net/netlink/af_netlink.c:857 netlink_sendmsg+0x4cd/0x6e0 net/netlink/af_netlink.c:1868 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x140/0x180 net/socket.c:745 ____sys_sendmsg+0x312/0x410 net/socket.c:2584 ___sys_sendmsg net/socket.c:2638 [inline] __sys_sendmsg+0x1e9/0x280 net/socket.c:2667 __do_sys_sendmsg net/socket.c:2676 [inline] __se_sys_sendmsg net/socket.c:2674 [inline] __x64_sys_sendmsg+0x46/0x50 net/socket.c:2674 x64_sys_call+0xae9/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000000000002fc10 -> 0x000000000002fc11 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 17999 Comm: syz-executor.3 Tainted: G W 6.9.0-rc5-syzkaller-00042-ge88c4cfcb7b8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff88812ff78020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:851 [inline] wg_pubkey_hashtable_lookup+0xda/0xf0 drivers/net/wireguard/peerlookup.c:69 wg_noise_handshake_consume_initiation+0x355/0x740 drivers/net/wireguard/noise.c:617 wg_receive_handshake_packet drivers/net/wireguard/receive.c:144 [inline] wg_packet_handshake_receive_worker+0x3c9/0x5f0 drivers/net/wireguard/receive.c:213 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88812ff78020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3542 lock_sock include/net/sock.h:1671 [inline] tcp_sendmsg+0x22/0x50 net/ipv4/tcp.c:1341 inet_sendmsg+0x77/0xd0 net/ipv4/af_inet.c:851 sock_sendmsg_nosec net/socket.c:730 [inline] __sock_sendmsg+0x102/0x180 net/socket.c:745 sock_write_iter+0x164/0x1b0 net/socket.c:1160 call_write_iter include/linux/fs.h:2110 [inline] new_sync_write fs/read_write.c:497 [inline] vfs_write+0x771/0x8e0 fs/read_write.c:590 ksys_write+0xeb/0x1b0 fs/read_write.c:643 __do_sys_write fs/read_write.c:655 [inline] __se_sys_write fs/read_write.c:652 [inline] __x64_sys_write+0x42/0x50 fs/read_write.c:652 x64_sys_call+0x27b7/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:2 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00073ae2 -> 0x00073ae3 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 3096 Comm: syz-fuzzer Tainted: G W 6.9.0-rc5-syzkaller-00042-ge88c4cfcb7b8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff88814ba053d8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 run_ksoftirqd+0x17/0x30 kernel/softirq.c:924 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88814ba053d8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] release_sock+0x117/0x150 net/core/sock.c:3559 sockopt_release_sock+0x42/0x50 net/core/sock.c:1070 do_ip_getsockopt+0xcb4/0x11a0 net/ipv4/ip_sockglue.c:1732 ip_getsockopt+0x5c/0x170 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4375 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3700 do_sock_getsockopt+0x121/0x1a0 net/socket.c:2373 __sys_getsockopt+0x19a/0x210 net/socket.c:2402 __do_sys_getsockopt net/socket.c:2412 [inline] __se_sys_getsockopt net/socket.c:2409 [inline] __x64_sys_getsockopt+0x66/0x80 net/socket.c:2409 x64_sys_call+0x2ce9/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:56 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000000000009b556 -> 0x000000000009b557 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 17467 Comm: syz-executor.3 Tainted: G W 6.9.0-rc5-syzkaller-00042-ge88c4cfcb7b8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff88812ff78020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x4d5/0x5b0 drivers/net/netdevsim/dev.c:850 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88812ff78020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu kernel/softirq.c:633 [inline] irq_exit_rcu+0x3c/0x90 kernel/softirq.c:645 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline] sysvec_apic_timer_interrupt+0x73/0x80 arch/x86/kernel/apic/apic.c:1043 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 check_access kernel/kcsan/core.c:747 [inline] __tsan_read8+0xb3/0x180 kernel/kcsan/core.c:1025 ebitmap_get_bit+0x45/0xf0 policydb_context_isvalid+0x182/0x230 security/selinux/ss/policydb.c:966 security_compute_sid+0x8b5/0xed0 security/selinux/ss/services.c:1874 security_transition_sid+0x58/0x70 security/selinux/ss/services.c:1912 socket_sockcreate_sid security/selinux/hooks.c:4580 [inline] selinux_socket_post_create+0x22a/0x270 security/selinux/hooks.c:4644 security_socket_post_create+0x5e/0xa0 security/security.c:4398 __sock_create+0x342/0x4f0 net/socket.c:1587 sock_create net/socket.c:1622 [inline] __sys_socket_create net/socket.c:1659 [inline] __sys_socket+0xae/0x240 net/socket.c:1706 __do_sys_socket net/socket.c:1720 [inline] __se_sys_socket net/socket.c:1718 [inline] __x64_sys_socket+0x3f/0x50 net/socket.c:1718 x64_sys_call+0x21c3/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:42 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000d6e67 -> 0x000d6e68 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 17467 Comm: syz-executor.3 Tainted: G W 6.9.0-rc5-syzkaller-00042-ge88c4cfcb7b8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff88814bd87f90 of 8 bytes by interrupt on cpu 1: can_send+0x55c/0x5d0 net/can/af_can.c:289 can_can_gw_rcv+0x77b/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] release_sock+0x117/0x150 net/core/sock.c:3559 sockopt_release_sock+0x42/0x50 net/core/sock.c:1070 do_ip_getsockopt+0xcb4/0x11a0 net/ipv4/ip_sockglue.c:1732 ip_getsockopt+0x5c/0x170 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4375 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3700 do_sock_getsockopt+0x121/0x1a0 net/socket.c:2373 __sys_getsockopt+0x19a/0x210 net/socket.c:2402 __do_sys_getsockopt net/socket.c:2412 [inline] __se_sys_getsockopt net/socket.c:2409 [inline] __x64_sys_getsockopt+0x66/0x80 net/socket.c:2409 x64_sys_call+0x2ce9/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:56 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff88814bd87f90 of 8 bytes by interrupt on cpu 0: can_send+0x55c/0x5d0 net/can/af_can.c:289 can_can_gw_rcv+0x77b/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] update_defense_level+0x5d5/0x610 net/netfilter/ipvs/ip_vs_ctl.c:210 defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:235 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000f7ecd -> 0x00000000000f7ece Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 10361 Comm: kworker/0:10 Tainted: G W 6.9.0-rc5-syzkaller-00042-ge88c4cfcb7b8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 Workqueue: events_long defense_work_handler ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88814bd87f88 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:649 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x21d/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xac0 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88814bd87f88 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:649 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] xt_replace_table+0x268/0x470 net/netfilter/x_tables.c:1428 __do_replace+0xcc/0x570 net/ipv4/netfilter/ip_tables.c:1064 do_replace net/ipv4/netfilter/ip_tables.c:1141 [inline] do_ipt_set_ctl+0x811/0x8b0 net/ipv4/netfilter/ip_tables.c:1635 nf_setsockopt+0x195/0x1b0 net/netfilter/nf_sockopt.c:101 ip_setsockopt+0xea/0x100 net/ipv4/ip_sockglue.c:1424 tcp_setsockopt+0x93/0xb0 net/ipv4/tcp.c:3737 sock_common_setsockopt+0x64/0x80 net/core/sock.c:3727 do_sock_setsockopt net/socket.c:2311 [inline] __sys_setsockopt+0x1d8/0x250 net/socket.c:2334 __do_sys_setsockopt net/socket.c:2343 [inline] __se_sys_setsockopt net/socket.c:2340 [inline] __x64_sys_setsockopt+0x66/0x80 net/socket.c:2340 x64_sys_call+0x1159/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:55 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000107902 -> 0x0000000000107904 Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 17442 Comm: syz-executor.1 Tainted: G W 6.9.0-rc5-syzkaller-00042-ge88c4cfcb7b8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88814bd87f98 of 8 bytes by interrupt on cpu 1: can_receive+0x1b6/0x1f0 net/can/af_can.c:671 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_encrypt_worker+0x9ed/0xa30 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88814bd87f98 of 8 bytes by interrupt on cpu 0: can_receive+0x1b6/0x1f0 net/can/af_can.c:671 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5544 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5658 process_backlog+0x21f/0x380 net/core/dev.c:5987 __napi_poll+0x63/0x3c0 net/core/dev.c:6638 napi_poll net/core/dev.c:6707 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6822 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3542 lock_sock include/net/sock.h:1671 [inline] tcp_close+0x1b/0xc0 net/ipv4/tcp.c:2931 inet_release+0xce/0xf0 net/ipv4/af_inet.c:437 __sock_release net/socket.c:659 [inline] sock_close+0x68/0x150 net/socket.c:1421 __fput+0x2c1/0x660 fs/file_table.c:422 __fput_sync+0x44/0x60 fs/file_table.c:507 __do_sys_close fs/open.c:1556 [inline] __se_sys_close+0x101/0x1b0 fs/open.c:1541 __x64_sys_close+0x1f/0x30 fs/open.c:1541 x64_sys_call+0x25b9/0x2d30 arch/x86/include/generated/asm/syscalls_64.h:4 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcd/0x1d0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000000000010e33b -> 0x000000000010e33c Reported by Kernel Concurrency Sanitizer on: CPU: 0 PID: 17439 Comm: syz-executor.0 Tainted: G W 6.9.0-rc5-syzkaller-00042-ge88c4cfcb7b8 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 03/27/2024 ==================================================================