vxcan0: j1939_xtp_rx_rts_session_active: 0xffff888116485a00: connection exists (00 02). last cmd: 14 ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888108a8c358 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 run_ksoftirqd+0x17/0x30 kernel/softirq.c:924 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff888108a8c358 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x4d5/0x5b0 drivers/net/netdevsim/dev.c:850 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x0002b47c -> 0x0002b47d Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 907 Comm: kworker/1:2 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Workqueue: events nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff88810497f658 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x21d/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xac0 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff88810497f658 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:606 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x4d5/0x5b0 drivers/net/netdevsim/dev.c:850 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x00000000000056dc -> 0x00000000000056dd Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 907 Comm: kworker/1:2 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Workqueue: events nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811d84c208 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:649 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_write_unlock_bh include/linux/rwlock_api_smp.h:281 [inline] _raw_write_unlock_bh+0x1f/0x30 kernel/locking/spinlock.c:366 sock_orphan include/net/sock.h:2060 [inline] netlink_release+0x86b/0xf20 net/netlink/af_netlink.c:756 __sock_release net/socket.c:659 [inline] sock_close+0x68/0x150 net/socket.c:1421 __fput+0x2c1/0x660 fs/file_table.c:422 __fput_sync+0x44/0x60 fs/file_table.c:507 __do_sys_close fs/open.c:1556 [inline] __se_sys_close+0x101/0x1b0 fs/open.c:1541 __x64_sys_close+0x1f/0x30 fs/open.c:1541 do_syscall_64+0xd3/0x1d0 entry_SYSCALL_64_after_hwframe+0x6d/0x75 read-write to 0xffff88811d84c208 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:649 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x4d5/0x5b0 drivers/net/netdevsim/dev.c:850 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x0000000000034c86 -> 0x0000000000034c87 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 907 Comm: kworker/1:2 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Workqueue: events nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811d84c268 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 run_ksoftirqd+0x17/0x30 kernel/softirq.c:924 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff88811d84c268 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x4d5/0x5b0 drivers/net/netdevsim/dev.c:850 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x00000000000080f5 -> 0x00000000000080f6 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 907 Comm: kworker/1:2 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Workqueue: events nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811d84c278 of 8 bytes by interrupt on cpu 0: can_receive+0x1ca/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] wg_index_hashtable_insert+0xaa/0x2a0 drivers/net/wireguard/peerlookup.c:126 wg_noise_handshake_create_initiation+0x52d/0x5f0 drivers/net/wireguard/noise.c:569 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:34 [inline] wg_packet_handshake_send_worker+0xb3/0x150 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff88811d84c278 of 8 bytes by interrupt on cpu 1: can_receive+0x1ca/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 run_ksoftirqd+0x17/0x30 kernel/softirq.c:924 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x000000000000da5e -> 0x000000000000da5f Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 22 Comm: ksoftirqd/1 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff88811d84c210 of 8 bytes by interrupt on cpu 0: can_send+0x55c/0x5d0 net/can/af_can.c:289 can_can_gw_rcv+0x77b/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 invoke_softirq kernel/softirq.c:428 [inline] __irq_exit_rcu kernel/softirq.c:633 [inline] irq_exit_rcu+0x3c/0x90 kernel/softirq.c:645 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1043 [inline] sysvec_apic_timer_interrupt+0x73/0x80 arch/x86/kernel/apic/apic.c:1043 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 vsnprintf+0xc6/0xe30 lib/vsprintf.c:2776 sprintf+0x89/0xb0 lib/vsprintf.c:3028 print_time kernel/printk/printk.c:1330 [inline] info_print_prefix+0xcf/0x1a0 kernel/printk/printk.c:1356 record_print_text kernel/printk/printk.c:1405 [inline] syslog_print+0x3c3/0x760 kernel/printk/printk.c:1616 do_syslog+0x393/0x7d0 kernel/printk/printk.c:1734 __do_sys_syslog kernel/printk/printk.c:1826 [inline] __se_sys_syslog kernel/printk/printk.c:1824 [inline] __x64_sys_syslog+0x43/0x50 kernel/printk/printk.c:1824 do_syscall_64+0xd3/0x1d0 entry_SYSCALL_64_after_hwframe+0x6d/0x75 read-write to 0xffff88811d84c210 of 8 bytes by interrupt on cpu 1: can_send+0x55c/0x5d0 net/can/af_can.c:289 can_can_gw_rcv+0x77b/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x4d5/0x5b0 drivers/net/netdevsim/dev.c:850 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x0000000000043987 -> 0x0000000000043988 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 3169 Comm: kworker/1:3 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Workqueue: events nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101b7b6f8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 run_ksoftirqd+0x17/0x30 kernel/softirq.c:924 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff888101b7b6f8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] release_sock+0x117/0x150 net/core/sock.c:3559 sockopt_release_sock+0x42/0x50 net/core/sock.c:1070 do_ip_getsockopt+0xcb4/0x11a0 net/ipv4/ip_sockglue.c:1732 ip_getsockopt+0x5c/0x170 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4373 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3700 do_sock_getsockopt+0x121/0x1a0 net/socket.c:2373 __sys_getsockopt+0x19a/0x210 net/socket.c:2402 __do_sys_getsockopt net/socket.c:2412 [inline] __se_sys_getsockopt net/socket.c:2409 [inline] __x64_sys_getsockopt+0x66/0x80 net/socket.c:2409 do_syscall_64+0xd3/0x1d0 entry_SYSCALL_64_after_hwframe+0x6d/0x75 value changed: 0x000000000004b813 -> 0x000000000004b815 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 7219 Comm: syz-executor.0 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811d84c268 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] update_defense_level+0x5d5/0x610 net/netfilter/ipvs/ip_vs_ctl.c:210 defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:235 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff88811d84c268 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3542 lock_sock include/net/sock.h:1671 [inline] tcp_close+0x1b/0x90 net/ipv4/tcp.c:2931 inet_release+0xce/0xf0 net/ipv4/af_inet.c:437 __sock_release net/socket.c:659 [inline] sock_close+0x68/0x150 net/socket.c:1421 __fput+0x2c1/0x660 fs/file_table.c:422 __fput_sync+0x44/0x60 fs/file_table.c:507 __do_sys_close fs/open.c:1556 [inline] __se_sys_close+0x101/0x1b0 fs/open.c:1541 __x64_sys_close+0x1f/0x30 fs/open.c:1541 do_syscall_64+0xd3/0x1d0 entry_SYSCALL_64_after_hwframe+0x6d/0x75 value changed: 0x00000000000186ee -> 0x00000000000186f0 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 5603 Comm: syz-executor.4 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101b7b6f8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x21d/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x3db/0xac0 net/batman-adv/network-coding.c:720 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff888101b7b6f8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:573 [inline] can_rcv_filter+0xd1/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3542 lock_sock include/net/sock.h:1671 [inline] sockopt_lock_sock+0x42/0x50 net/core/sock.c:1061 do_ip_getsockopt+0xb57/0x11a0 net/ipv4/ip_sockglue.c:1703 ip_getsockopt+0x5c/0x170 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4373 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3700 do_sock_getsockopt+0x121/0x1a0 net/socket.c:2373 __sys_getsockopt+0x19a/0x210 net/socket.c:2402 __do_sys_getsockopt net/socket.c:2412 [inline] __se_sys_getsockopt net/socket.c:2409 [inline] __x64_sys_getsockopt+0x66/0x80 net/socket.c:2409 do_syscall_64+0xd3/0x1d0 entry_SYSCALL_64_after_hwframe+0x6d/0x75 value changed: 0x00000000000a5a50 -> 0x00000000000a5a51 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 6488 Comm: syz-executor.2 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811d84c218 of 8 bytes by interrupt on cpu 0: can_receive+0x1b6/0x1f0 net/can/af_can.c:671 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:851 [inline] mod_peer_timer drivers/net/wireguard/timers.c:38 [inline] wg_timers_data_sent+0x108/0x130 drivers/net/wireguard/timers.c:148 wg_packet_create_data_done drivers/net/wireguard/send.c:257 [inline] wg_packet_tx_worker+0x190/0x360 drivers/net/wireguard/send.c:276 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff88811d84c218 of 8 bytes by interrupt on cpu 1: can_receive+0x1b6/0x1f0 net/can/af_can.c:671 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x4d5/0x5b0 drivers/net/netdevsim/dev.c:850 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x00000000000b6704 -> 0x00000000000b6706 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 3169 Comm: kworker/1:3 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Workqueue: events nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888108a8c358 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x21d/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xac0 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff888108a8c358 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:820 [inline] nsim_dev_trap_report_work+0x4d5/0x5b0 drivers/net/netdevsim/dev.c:850 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x000d2f43 -> 0x000d2f44 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 3175 Comm: kworker/1:7 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Workqueue: events nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811d84c208 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:649 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 local_bh_enable include/linux/bottom_half.h:33 [inline] xt_replace_table+0x268/0x470 net/netfilter/x_tables.c:1428 __do_replace+0xcc/0x580 net/ipv6/netfilter/ip6_tables.c:1081 do_replace net/ipv6/netfilter/ip6_tables.c:1154 [inline] do_ip6t_set_ctl+0x150f/0x1800 net/ipv6/netfilter/ip6_tables.c:1636 nf_setsockopt+0x195/0x1b0 net/netfilter/nf_sockopt.c:101 ipv6_setsockopt+0x126/0x140 net/ipv6/ipv6_sockglue.c:999 tcp_setsockopt+0x93/0xb0 net/ipv4/tcp.c:3735 sock_common_setsockopt+0x64/0x80 net/core/sock.c:3727 do_sock_setsockopt net/socket.c:2311 [inline] __sys_setsockopt+0x1d8/0x250 net/socket.c:2334 __do_sys_setsockopt net/socket.c:2343 [inline] __se_sys_setsockopt net/socket.c:2340 [inline] __x64_sys_setsockopt+0x66/0x80 net/socket.c:2340 do_syscall_64+0xd3/0x1d0 entry_SYSCALL_64_after_hwframe+0x6d/0x75 read-write to 0xffff88811d84c208 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:649 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x21d/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x3db/0xac0 net/batman-adv/network-coding.c:720 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x00000000000e9808 -> 0x00000000000e9809 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 39 Comm: kworker/u8:2 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Workqueue: bat_events batadv_nc_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff88811d84c210 of 8 bytes by interrupt on cpu 0: can_send+0x55c/0x5d0 net/can/af_can.c:289 can_can_gw_rcv+0x77b/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 run_ksoftirqd+0x17/0x30 kernel/softirq.c:924 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff88811d84c210 of 8 bytes by interrupt on cpu 1: can_send+0x55c/0x5d0 net/can/af_can.c:289 can_can_gw_rcv+0x77b/0x7e0 net/can/gw.c:561 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 run_ksoftirqd+0x17/0x30 kernel/softirq.c:924 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x00000000000f68dd -> 0x00000000000f68df Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 22 Comm: ksoftirqd/1 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888108a8c358 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_decrypt_worker+0x6ac/0x6f0 drivers/net/wireguard/receive.c:499 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff888108a8c358 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x7c9/0x7e0 net/can/gw.c:564 deliver net/can/af_can.c:572 [inline] can_rcv_filter+0xbf/0x4c0 net/can/af_can.c:599 can_receive+0x182/0x1f0 net/can/af_can.c:663 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x21d/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x3db/0xac0 net/batman-adv/network-coding.c:720 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 value changed: 0x0012c1ee -> 0x0012c1ef Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 39 Comm: kworker/u8:2 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 Workqueue: bat_events batadv_nc_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811d84c208 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:649 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:367 [inline] wg_packet_handshake_receive_worker+0x184/0x5f0 drivers/net/wireguard/receive.c:212 process_one_work kernel/workqueue.c:3254 [inline] process_scheduled_works+0x465/0x990 kernel/workqueue.c:3335 worker_thread+0x526/0x730 kernel/workqueue.c:3416 kthread+0x1d1/0x210 kernel/kthread.c:388 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:243 read-write to 0xffff88811d84c208 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:649 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3542 lock_sock include/net/sock.h:1671 [inline] sockopt_lock_sock+0x42/0x50 net/core/sock.c:1061 do_ip_getsockopt+0xb57/0x11a0 net/ipv4/ip_sockglue.c:1703 ip_getsockopt+0x5c/0x170 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4373 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3700 do_sock_getsockopt+0x121/0x1a0 net/socket.c:2373 __sys_getsockopt+0x19a/0x210 net/socket.c:2402 __do_sys_getsockopt net/socket.c:2412 [inline] __se_sys_getsockopt net/socket.c:2409 [inline] __x64_sys_getsockopt+0x66/0x80 net/socket.c:2409 do_syscall_64+0xd3/0x1d0 entry_SYSCALL_64_after_hwframe+0x6d/0x75 value changed: 0x0000000000142f13 -> 0x0000000000142f15 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 8834 Comm: syz-executor.1 Not tainted 6.9.0-rc1-syzkaller-00009-g7033999ecd7b #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/29/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff88811d84c268 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3542 lock_sock include/net/sock.h:1671 [inline] sockopt_lock_sock+0x42/0x50 net/core/sock.c:1061 do_ip_getsockopt+0xb57/0x11a0 net/ipv4/ip_sockglue.c:1703 ip_getsockopt+0x5c/0x170 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4373 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3700 do_sock_getsockopt+0x121/0x1a0 net/socket.c:2373 __sys_getsockopt+0x19a/0x210 net/socket.c:2402 __do_sys_getsockopt net/socket.c:2412 [inline] __se_sys_getsockopt net/socket.c:2409 [inline] __x64_sys_getsockopt+0x66/0x80 net/socket.c:2409 do_syscall_64+0xd3/0x1d0 entry_SYSCALL_64_after_hwframe+0x6d/0x75 read-write to 0xffff88811d84c268 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:687 __netif_receive_skb_one_core net/core/dev.c:5538 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5652 process_backlog+0x21f/0x380 net/core/dev.c:5981 __napi_poll+0x63/0x3c0 net/core/dev.c:6632 napi_poll net/core/dev.c:6701 [inline] net_rx_action+0x324/0x720 net/core/dev.c:6816 __do_softirq+0xc8/0x285 kernel/softirq.c:554 do_softirq+0x5e/0x90 kernel/softirq.c:455 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:382 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210