================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888118c22b08 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x3db/0xad0 net/batman-adv/network-coding.c:720 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888118c22b08 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] netif_rx+0x83/0x240 net/core/dev.c:5407 can_send+0x586/0x6d0 net/can/af_can.c:287 raw_sendmsg+0x7c8/0x960 net/can/raw.c:971 sock_sendmsg_nosec net/socket.c:713 [inline] __sock_sendmsg+0x140/0x180 net/socket.c:728 ____sys_sendmsg+0x312/0x410 net/socket.c:2568 ___sys_sendmsg net/socket.c:2622 [inline] __sys_sendmsg+0x19d/0x230 net/socket.c:2654 __do_sys_sendmsg net/socket.c:2659 [inline] __se_sys_sendmsg net/socket.c:2657 [inline] __x64_sys_sendmsg+0x46/0x50 net/socket.c:2657 x64_sys_call+0x2734/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000013e6471 -> 0x00000000013e6472 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 29737 Comm: syz.5.11009 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888118c22b68 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888118c22b68 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x3a/0xc0 kernel/softirq.c:662 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0x73/0x80 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 check_kcov_mode kernel/kcov.c:185 [inline] __sanitizer_cov_trace_pc+0x37/0x70 kernel/kcov.c:217 folios_put_refs+0x1e6/0x2b0 mm/swap.c:947 free_pages_and_swap_cache+0x28c/0x400 mm/swap_state.c:331 __tlb_batch_free_encoded_pages mm/mmu_gather.c:136 [inline] tlb_batch_pages_flush mm/mmu_gather.c:149 [inline] tlb_flush_mmu_free mm/mmu_gather.c:389 [inline] tlb_flush_mmu+0x2cf/0x440 mm/mmu_gather.c:396 zap_pte_range mm/memory.c:1770 [inline] zap_pmd_range mm/memory.c:1823 [inline] zap_pud_range mm/memory.c:1852 [inline] zap_p4d_range mm/memory.c:1873 [inline] unmap_page_range+0x2222/0x26c0 mm/memory.c:1894 unmap_single_vma+0x142/0x1d0 mm/memory.c:1940 unmap_vmas+0x18d/0x2b0 mm/memory.c:1984 exit_mmap+0x1ae/0x6d0 mm/mmap.c:1284 __mmput+0x28/0x1d0 kernel/fork.c:1345 mmput+0x4c/0x60 kernel/fork.c:1367 exit_mm+0xe4/0x190 kernel/exit.c:570 do_exit+0x559/0x17f0 kernel/exit.c:925 do_group_exit+0x142/0x150 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x1f/0x20 kernel/exit.c:1096 x64_sys_call+0x2db8/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000004573 -> 0x0000000000004574 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 29731 Comm: syz.0.11006 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888118c22b78 of 8 bytes by interrupt on cpu 1: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888118c22b78 of 8 bytes by interrupt on cpu 0: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] update_defense_level+0x575/0x5b0 net/netfilter/ipvs/ip_vs_ctl.c:210 defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:235 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000000e061 -> 0x000000000000e062 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3366 Comm: kworker/0:2 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: events_long defense_work_handler ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff888118c22b10 of 8 bytes by interrupt on cpu 1: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888118c22b10 of 8 bytes by interrupt on cpu 0: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000a013a8 -> 0x0000000000a013a9 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 18196 Comm: kworker/u8:64 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff888118c22b70 of 8 bytes by interrupt on cpu 1: can_send+0x5b6/0x6d0 net/can/af_can.c:291 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline] _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366 neigh_periodic_work+0x605/0x6b0 net/core/neighbour.c:968 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888118c22b70 of 8 bytes by interrupt on cpu 0: can_send+0x5b6/0x6d0 net/can/af_can.c:291 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_encrypt_worker+0xb6b/0xbb0 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000003b5d -> 0x0000000000003b5e Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 29361 Comm: kworker/0:0 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888118c22b08 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xad0 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888118c22b08 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] wg_index_hashtable_insert+0xaa/0x2a0 drivers/net/wireguard/peerlookup.c:126 wg_noise_handshake_create_initiation+0x52d/0x5f0 drivers/net/wireguard/noise.c:569 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:34 [inline] wg_packet_handshake_send_worker+0xb3/0x150 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000001455f34 -> 0x0000000001455f38 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 18194 Comm: kworker/u8:62 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888118c22b68 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888118c22b68 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] update_defense_level+0x575/0x5b0 net/netfilter/ipvs/ip_vs_ctl.c:210 defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:235 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000005e14 -> 0x0000000000005e16 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3374 Comm: kworker/0:3 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: events_long defense_work_handler ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff8881016fc298 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff8881016fc298 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3652 lock_sock include/net/sock.h:1624 [inline] sockopt_lock_sock+0x42/0x50 net/core/sock.c:1133 do_ip_getsockopt+0xb57/0x11a0 net/ipv4/ip_sockglue.c:1703 ip_getsockopt+0x5c/0x170 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4671 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3810 do_sock_getsockopt+0x1ca/0x260 net/socket.c:2359 __sys_getsockopt net/socket.c:2388 [inline] __do_sys_getsockopt net/socket.c:2395 [inline] __se_sys_getsockopt net/socket.c:2392 [inline] __x64_sys_getsockopt+0x18c/0x200 net/socket.c:2392 x64_sys_call+0x1288/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:56 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000a355f9 -> 0x0000000000a355fa Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 24866 Comm: syz-executor Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff888118c22b10 of 8 bytes by interrupt on cpu 1: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xad0 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888118c22b10 of 8 bytes by interrupt on cpu 0: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000a3ff5e -> 0x0000000000a3ff5f Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 18099 Comm: kworker/u8:16 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff8881147fc020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] update_defense_level+0x575/0x5b0 net/netfilter/ipvs/ip_vs_ctl.c:210 defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:235 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff8881147fc020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3652 lock_sock include/net/sock.h:1624 [inline] tcp_recvmsg+0x121/0x490 net/ipv4/tcp.c:2851 inet_recvmsg+0xbd/0x290 net/ipv4/af_inet.c:883 sock_recvmsg_nosec net/socket.c:1018 [inline] sock_recvmsg+0xfe/0x170 net/socket.c:1040 sock_read_iter+0x14c/0x1a0 net/socket.c:1110 new_sync_read fs/read_write.c:484 [inline] vfs_read+0x5cc/0x6f0 fs/read_write.c:565 ksys_read+0xe8/0x1b0 fs/read_write.c:708 __do_sys_read fs/read_write.c:717 [inline] __se_sys_read fs/read_write.c:715 [inline] __x64_sys_read+0x42/0x50 fs/read_write.c:715 x64_sys_call+0x2874/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00a4f229 -> 0x00a4f22a Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3288 Comm: syz-executor Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888118c22b08 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x3db/0xad0 net/batman-adv/network-coding.c:720 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888118c22b08 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000014c8923 -> 0x00000000014c8927 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888118c22b68 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] mod_peer_timer drivers/net/wireguard/timers.c:38 [inline] wg_timers_any_authenticated_packet_traversal+0xe5/0x110 drivers/net/wireguard/timers.c:215 wg_packet_create_data_done drivers/net/wireguard/send.c:247 [inline] wg_packet_tx_worker+0xe9/0x360 drivers/net/wireguard/send.c:276 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888118c22b68 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000008719 -> 0x000000000000871b Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 18133 Comm: kworker/u8:33 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888118c22b68 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] __batadv_dat_purge net/batman-adv/distributed-arp-table.c:185 [inline] batadv_dat_purge+0x1e0/0x260 net/batman-adv/distributed-arp-table.c:204 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888118c22b68 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] __dev_queue_xmit+0xb6e/0x2090 net/core/dev.c:4611 dev_queue_xmit include/linux/netdevice.h:3305 [inline] alb_send_lp_vid+0x1c8/0x1f0 drivers/net/bonding/bond_alb.c:949 alb_send_learning_packets drivers/net/bonding/bond_alb.c:1012 [inline] bond_alb_monitor+0x238/0xa30 drivers/net/bonding/bond_alb.c:1564 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000000095c -> 0x000000000000095e Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 18088 Comm: kworker/u8:9 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: bond2 bond_alb_monitor ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff8881016fc298 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] __batadv_dat_purge net/batman-adv/distributed-arp-table.c:185 [inline] batadv_dat_purge+0x1e0/0x260 net/batman-adv/distributed-arp-table.c:204 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff8881016fc298 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000aa9d3f -> 0x0000000000aa9d40 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-syzkaller-09383-gebbb8be421ee #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ==================================================================