================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_read_unlock_bh include/linux/rwlock_api_smp.h:257 [inline] _raw_read_unlock_bh+0x1b/0x20 kernel/locking/spinlock.c:284 wg_socket_send_skb_to_peer+0x109/0x130 drivers/net/wireguard/socket.c:184 wg_packet_create_data_done drivers/net/wireguard/send.c:251 [inline] wg_packet_tx_worker+0x127/0x360 drivers/net/wireguard/send.c:276 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00124c0f -> 0x00124c10 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3395 Comm: kworker/0:3 Tainted: G W 6.12.0-rc6-syzkaller #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: wg-crypt-wg0 wg_packet_tx_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888114f07798 of 8 bytes by interrupt on cpu 1: can_receive+0x1b6/0x1f0 net/can/af_can.c:671 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline] _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366 sock_orphan include/net/sock.h:2007 [inline] sk_common_release+0x104/0x250 net/core/sock.c:3837 udp_lib_close+0x15/0x20 include/net/udp.h:200 inet_release+0xce/0xf0 net/ipv4/af_inet.c:437 inet6_release+0x3e/0x60 net/ipv6/af_inet6.c:489 __sock_release net/socket.c:658 [inline] sock_close+0x68/0x150 net/socket.c:1426 __fput+0x17a/0x6d0 fs/file_table.c:431 ____fput+0x1c/0x30 fs/file_table.c:459 task_work_run+0x13a/0x1a0 kernel/task_work.c:239 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] exit_to_user_mode_loop kernel/entry/common.c:114 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0xbe/0x130 kernel/entry/common.c:218 do_syscall_64+0xd6/0x1c0 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff888114f07798 of 8 bytes by interrupt on cpu 0: can_receive+0x1b6/0x1f0 net/can/af_can.c:671 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] keep_key_fresh drivers/net/wireguard/send.c:135 [inline] wg_packet_create_data_done drivers/net/wireguard/send.c:259 [inline] wg_packet_tx_worker+0x2c8/0x360 drivers/net/wireguard/send.c:276 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000129611 -> 0x0000000000129612 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3395 Comm: kworker/0:3 Tainted: G W 6.12.0-rc6-syzkaller #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: wg-crypt-wg0 wg_packet_tx_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101d456a8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x3a9/0x4c0 net/can/af_can.c:633 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] release_sock+0x117/0x150 net/core/sock.c:3635 tcp_recvmsg+0x147/0x490 net/ipv4/tcp.c:2852 inet_recvmsg+0xbd/0x290 net/ipv4/af_inet.c:885 sock_recvmsg_nosec net/socket.c:1051 [inline] sock_recvmsg+0xfe/0x170 net/socket.c:1073 sock_read_iter+0x14c/0x1a0 net/socket.c:1143 new_sync_read fs/read_write.c:488 [inline] vfs_read+0x5dc/0x700 fs/read_write.c:569 ksys_read+0xeb/0x1b0 fs/read_write.c:712 __do_sys_read fs/read_write.c:722 [inline] __se_sys_read fs/read_write.c:720 [inline] __x64_sys_read+0x42/0x50 fs/read_write.c:720 x64_sys_call+0x27d3/0x2d60 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff888101d456a8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x3a9/0x4c0 net/can/af_can.c:633 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000000c59a -> 0x000000000000c59b Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888114f077e8 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_decrypt_worker+0x173/0x6f0 drivers/net/wireguard/receive.c:499 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888114f077e8 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000000c44 -> 0x0000000000000c45 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888114f077f8 of 8 bytes by interrupt on cpu 1: can_receive+0x1ca/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] mod_peer_timer drivers/net/wireguard/timers.c:38 [inline] wg_timers_any_authenticated_packet_traversal+0xe5/0x110 drivers/net/wireguard/timers.c:215 wg_packet_create_data_done drivers/net/wireguard/send.c:247 [inline] wg_packet_tx_worker+0xe9/0x360 drivers/net/wireguard/send.c:276 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888114f077f8 of 8 bytes by interrupt on cpu 0: can_receive+0x1ca/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000000c6c3 -> 0x000000000000c6c5 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101d455b8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] fpregs_unlock arch/x86/include/asm/fpu/api.h:80 [inline] copy_fpstate_to_sigframe+0x2cb/0x780 arch/x86/kernel/fpu/signal.c:250 get_sigframe+0x2f3/0x430 arch/x86/kernel/signal.c:163 x64_setup_rt_frame+0xad/0x590 arch/x86/kernel/signal_64.c:175 setup_rt_frame arch/x86/kernel/signal.c:250 [inline] handle_signal arch/x86/kernel/signal.c:294 [inline] arch_do_signal_or_restart+0x287/0x4b0 arch/x86/kernel/signal.c:339 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:328 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x59/0x130 kernel/entry/common.c:218 do_syscall_64+0xd6/0x1c0 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff888101d455b8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000014c03e -> 0x000000000014c03f Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] update_defense_level+0x575/0x5b0 net/netfilter/ipvs/ip_vs_ctl.c:210 defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:235 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00173878 -> 0x00173879 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 6768 Comm: kworker/0:5 Tainted: G W 6.12.0-rc6-syzkaller #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: events_long defense_work_handler ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline] _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366 neigh_periodic_work+0x55a/0x600 net/core/neighbour.c:1019 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_encrypt_worker+0x186/0xa30 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x001d84e4 -> 0x001d84e6 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3395 Comm: kworker/0:3 Tainted: G W 6.12.0-rc6-syzkaller #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff888114f07790 of 8 bytes by interrupt on cpu 1: can_send+0x562/0x5d0 net/can/af_can.c:289 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline] _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366 neigh_periodic_work+0x55a/0x600 net/core/neighbour.c:1019 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888114f07790 of 8 bytes by interrupt on cpu 0: can_send+0x562/0x5d0 net/can/af_can.c:289 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000001f51e9 -> 0x00000000001f51eb Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888114f07788 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:649 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline] _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366 neigh_periodic_work+0x55a/0x600 net/core/neighbour.c:1019 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888114f07788 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:649 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000201063 -> 0x0000000000201065 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88812d1c0020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0x225/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5670 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5783 process_backlog+0x22e/0x440 net/core/dev.c:6115 __napi_poll+0x63/0x3c0 net/core/dev.c:6779 napi_poll net/core/dev.c:6848 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:6970 handle_softirqs+0xbf/0x280 kernel/softirq.c:554 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:927 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0023a145 -> 0x0023a147 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Tainted: G W 6.12.0-rc6-syzkaller #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ==================================================================