================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 0: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_decrypt_worker+0x6ac/0x6f0 drivers/net/wireguard/receive.c:499 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 1: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] netif_rx+0x83/0x240 net/core/dev.c:5407 can_send+0x586/0x6d0 net/can/af_can.c:287 isotp_sendmsg+0x99c/0xbf0 net/can/isotp.c:1087 sock_sendmsg_nosec net/socket.c:718 [inline] __sock_sendmsg+0x140/0x180 net/socket.c:733 ____sys_sendmsg+0x326/0x4b0 net/socket.c:2573 ___sys_sendmsg net/socket.c:2627 [inline] __sys_sendmmsg+0x227/0x4b0 net/socket.c:2716 __do_sys_sendmmsg net/socket.c:2743 [inline] __se_sys_sendmmsg net/socket.c:2740 [inline] __x64_sys_sendmmsg+0x57/0x70 net/socket.c:2740 x64_sys_call+0x29aa/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000000000000568d -> 0x000000000000568e Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 5980 Comm: syz.6.706 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x3db/0xad0 net/batman-adv/network-coding.c:720 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000005de56 -> 0x000000000005de57 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000b4bbb -> 0x00000000000b4bbc Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888117910020 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xad0 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888117910020 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7cb/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:600 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 fpu__restore_sig+0x5c1/0xb00 arch/x86/kernel/fpu/signal.c:494 restore_sigcontext+0x1b5/0x220 arch/x86/kernel/signal_64.c:95 __do_sys_rt_sigreturn+0xfd/0x160 arch/x86/kernel/signal_64.c:266 x64_sys_call+0x2982/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:16 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000b95e8 -> 0x000b95e9 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 5984 Comm: dhcpcd-run-hook Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 0: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xad0 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88811ddc3ff8 of 8 bytes by interrupt on cpu 1: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x522/0x620 drivers/net/netdevsim/dev.c:851 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000000eeb7 -> 0x000000000000eeb8 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 143 Comm: kworker/u8:4 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811ddc3fe8 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff88811ddc3fe8 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000000133b -> 0x000000000000133c Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] addrconf_ifdown+0x3b7/0xed0 net/ipv6/addrconf.c:3903 addrconf_notify+0x2ff/0x950 notifier_call_chain kernel/notifier.c:85 [inline] raw_notifier_call_chain+0x6f/0x1d0 kernel/notifier.c:453 call_netdevice_notifiers_info+0xae/0x100 net/core/dev.c:2141 call_netdevice_notifiers_extack net/core/dev.c:2179 [inline] call_netdevice_notifiers net/core/dev.c:2193 [inline] unregister_netdevice_many_notify+0x98a/0x1280 net/core/dev.c:11802 unregister_netdevice_many net/core/dev.c:11866 [inline] unregister_netdevice_queue+0x1f4/0x220 net/core/dev.c:11736 unregister_netdevice include/linux/netdevice.h:3335 [inline] __tun_detach+0x7db/0xae0 drivers/net/tun.c:685 tun_detach drivers/net/tun.c:701 [inline] tun_chr_close+0x58/0xf0 drivers/net/tun.c:3517 __fput+0x2ac/0x640 fs/file_table.c:464 ____fput+0x1c/0x30 fs/file_table.c:492 task_work_run+0x13a/0x1a0 kernel/task_work.c:227 exit_task_work include/linux/task_work.h:40 [inline] do_exit+0x5d8/0x17f0 kernel/exit.c:938 do_group_exit+0x142/0x150 kernel/exit.c:1087 __do_sys_exit_group kernel/exit.c:1098 [inline] __se_sys_exit_group kernel/exit.c:1096 [inline] __x64_sys_exit_group+0x1f/0x20 kernel/exit.c:1096 x64_sys_call+0x2db8/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:232 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff88811ddc3f88 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5828 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5941 process_backlog+0x22e/0x440 net/core/dev.c:6289 __napi_poll+0x63/0x3c0 net/core/dev.c:7106 napi_poll net/core/dev.c:7175 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7297 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline] keep_key_fresh drivers/net/wireguard/send.c:135 [inline] wg_packet_create_data_done drivers/net/wireguard/send.c:259 [inline] wg_packet_tx_worker+0x2c8/0x360 drivers/net/wireguard/send.c:276 process_one_work kernel/workqueue.c:3236 [inline] process_scheduled_works+0x4db/0xa20 kernel/workqueue.c:3317 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3398 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000e1be8 -> 0x00000000000e1be9 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 5362 Comm: kworker/1:14 Not tainted 6.14.0-rc2-syzkaller-00390-g224e74511041 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 12/27/2024 Workqueue: wg-crypt-wg0 wg_packet_tx_worker ==================================================================