================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888117c84608 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] bpf_prog_alloc_id+0x81/0x100 kernel/bpf/syscall.c:2270 bpf_prog_load+0xf1c/0x1050 kernel/bpf/syscall.c:2960 __sys_bpf+0x463/0x7a0 kernel/bpf/syscall.c:5795 __do_sys_bpf kernel/bpf/syscall.c:5902 [inline] __se_sys_bpf kernel/bpf/syscall.c:5900 [inline] __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5900 x64_sys_call+0x2914/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:322 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff888117c84608 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] netif_rx+0x83/0x240 net/core/dev.c:5478 can_send+0x586/0x6d0 net/can/af_can.c:287 isotp_sendmsg+0x99c/0xbf0 net/can/isotp.c:1087 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg+0x140/0x180 net/socket.c:733 __sys_sendto+0x1a8/0x230 net/socket.c:2187 __do_sys_sendto net/socket.c:2194 [inline] __se_sys_sendto net/socket.c:2190 [inline] __x64_sys_sendto+0x78/0x90 net/socket.c:2190 x64_sys_call+0x29fa/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000050d00 -> 0x0000000000050d01 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 1970 Comm: syz.9.9150 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff888117c84610 of 8 bytes by interrupt on cpu 0: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xad0 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888117c84610 of 8 bytes by interrupt on cpu 1: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x3a/0xc0 kernel/softirq.c:662 common_interrupt+0x81/0x90 arch/x86/kernel/irq.c:278 asm_common_interrupt+0x26/0x40 arch/x86/include/asm/idtentry.h:693 kcsan_setup_watchpoint+0x404/0x410 kernel/kcsan/core.c:705 skb_headlen include/linux/skbuff.h:2482 [inline] __skb_datagram_iter+0x31/0x610 net/core/datagram.c:393 skb_copy_datagram_iter+0x41/0x130 net/core/datagram.c:538 skb_copy_datagram_msg include/linux/skbuff.h:4144 [inline] __unix_dgram_recvmsg+0x501/0x870 net/unix/af_unix.c:2473 unix_dgram_recvmsg+0x81/0x90 net/unix/af_unix.c:2531 sock_recvmsg_nosec+0x107/0x140 net/socket.c:1023 ____sys_recvmsg+0x271/0x280 net/socket.c:2791 ___sys_recvmsg net/socket.c:2835 [inline] do_recvmmsg+0x2aa/0x6d0 net/socket.c:2930 __sys_recvmmsg net/socket.c:3004 [inline] __do_sys_recvmmsg net/socket.c:3027 [inline] __se_sys_recvmmsg net/socket.c:3020 [inline] __x64_sys_recvmmsg+0xe2/0x170 net/socket.c:3020 x64_sys_call+0x2a9a/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:300 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000054be7 -> 0x0000000000054be8 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 1868 Comm: syz.0.9121 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888111d34020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888111d34020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_encrypt_worker+0x180/0xb80 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000573ea -> 0x000573eb Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 16581 Comm: kworker/1:17 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888117c84678 of 8 bytes by interrupt on cpu 0: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888117c84678 of 8 bytes by interrupt on cpu 1: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000000e6a2 -> 0x000000000000e6a3 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888117c84618 of 8 bytes by interrupt on cpu 0: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888117c84618 of 8 bytes by interrupt on cpu 1: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000061759 -> 0x000000000006175a Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff888117c84670 of 8 bytes by interrupt on cpu 0: can_send+0x5b6/0x6d0 net/can/af_can.c:291 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_encrypt_worker+0x180/0xb80 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888117c84670 of 8 bytes by interrupt on cpu 1: can_send+0x5b6/0x6d0 net/can/af_can.c:291 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000004427 -> 0x0000000000004428 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 17724 Comm: kworker/u8:12 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff8881012cbf18 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff8881012cbf18 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000887c8 -> 0x00000000000887c9 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 17714 Comm: kworker/u8:10 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888117c84618 of 8 bytes by interrupt on cpu 0: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_encrypt_worker+0xb42/0xb80 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888117c84618 of 8 bytes by interrupt on cpu 1: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000008f3e5 -> 0x000000000008f3e6 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888117c84668 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3652 lock_sock include/net/sock.h:1624 [inline] tcp_close+0x1b/0xd0 net/ipv4/tcp.c:3239 inet_release+0xce/0xf0 net/ipv4/af_inet.c:435 inet6_release+0x3e/0x60 net/ipv6/af_inet6.c:487 __sock_release net/socket.c:647 [inline] sock_close+0x68/0x150 net/socket.c:1398 __fput+0x2ac/0x640 fs/file_table.c:464 __fput_sync+0x96/0xc0 fs/file_table.c:550 __do_sys_close fs/open.c:1580 [inline] __se_sys_close fs/open.c:1565 [inline] __x64_sys_close+0x55/0xe0 fs/open.c:1565 x64_sys_call+0x266c/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:4 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff888117c84668 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_read_unlock_bh include/linux/rwlock_api_smp.h:257 [inline] _raw_read_unlock_bh+0x1b/0x20 kernel/locking/spinlock.c:284 wg_socket_send_skb_to_peer+0x109/0x130 drivers/net/wireguard/socket.c:184 wg_packet_create_data_done drivers/net/wireguard/send.c:251 [inline] wg_packet_tx_worker+0x127/0x360 drivers/net/wireguard/send.c:276 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000043b5 -> 0x00000000000043b6 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 3376 Comm: kworker/1:5 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: wg-crypt-wg0 wg_packet_tx_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888117c84608 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline] _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366 neigh_periodic_work+0x605/0x6b0 net/core/neighbour.c:968 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888117c84608 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] update_defense_level+0x575/0x5b0 net/netfilter/ipvs/ip_vs_ctl.c:210 defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:235 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000aaa9a -> 0x00000000000aaa9b Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 3375 Comm: kworker/1:4 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: events_long defense_work_handler ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff888117c84610 of 8 bytes by interrupt on cpu 0: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888117c84610 of 8 bytes by interrupt on cpu 1: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3652 lock_sock include/net/sock.h:1624 [inline] sockopt_lock_sock+0x42/0x50 net/core/sock.c:1133 do_ip_getsockopt+0xbf3/0x1270 net/ipv4/ip_sockglue.c:1703 ip_getsockopt+0x5c/0x170 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4690 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3810 do_sock_getsockopt+0x1ca/0x260 net/socket.c:2364 __sys_getsockopt net/socket.c:2393 [inline] __do_sys_getsockopt net/socket.c:2400 [inline] __se_sys_getsockopt net/socket.c:2397 [inline] __x64_sys_getsockopt+0x18c/0x200 net/socket.c:2397 x64_sys_call+0x1288/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:56 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000000afd85 -> 0x00000000000afd86 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 30223 Comm: syz-executor Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888117c84678 of 8 bytes by interrupt on cpu 0: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline] _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366 neigh_periodic_work+0x605/0x6b0 net/core/neighbour.c:968 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888117c84678 of 8 bytes by interrupt on cpu 1: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000002a02 -> 0x0000000000002a03 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 29748 Comm: kworker/u8:31 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888117c84618 of 8 bytes by interrupt on cpu 0: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline] _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366 neigh_periodic_work+0x605/0x6b0 net/core/neighbour.c:968 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888117c84618 of 8 bytes by interrupt on cpu 1: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000d6ed7 -> 0x00000000000d6ed8 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff888117c84610 of 8 bytes by interrupt on cpu 0: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_tt_global_purge net/batman-adv/translation-table.c:2250 [inline] batadv_tt_purge+0x2e7/0x630 net/batman-adv/translation-table.c:3510 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888117c84610 of 8 bytes by interrupt on cpu 1: can_send+0x5a2/0x6d0 net/can/af_can.c:290 can_can_gw_rcv+0x77d/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000fc883 -> 0x00000000000fc885 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 17711 Comm: kworker/u8:9 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888111d34020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_tt_global_purge net/batman-adv/translation-table.c:2250 [inline] batadv_tt_purge+0x2e7/0x630 net/batman-adv/translation-table.c:3510 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888111d34020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194 napi_poll net/core/dev.c:7263 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7385 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] mod_peer_timer drivers/net/wireguard/timers.c:38 [inline] wg_timers_any_authenticated_packet_traversal+0xe5/0x110 drivers/net/wireguard/timers.c:215 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:36 [inline] wg_packet_handshake_send_worker+0xd7/0x150 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00103b84 -> 0x00103b85 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 29750 Comm: kworker/u8:33 Tainted: G W 6.14.0-rc4-syzkaller-00015-g2a1944bff549 #0 Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888117c84678 of 8 bytes by interrupt on cpu 0: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5899 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6012 process_backlog+0x22e/0x440 net/core/dev.c:6360 __napi_poll+0x63/0x3c0 net/core/dev.c:7194