================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101967568 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x476/0x4b0 net/core/skbuff.c:674 alloc_skb include/linux/skbuff.h:1383 [inline] alloc_skb_with_frags+0x7d/0x470 net/core/skbuff.c:6712 sock_alloc_send_pskb+0x430/0x4e0 net/core/sock.c:2995 sock_alloc_send_skb include/net/sock.h:1885 [inline] j1939_sk_alloc_skb net/can/j1939/socket.c:889 [inline] j1939_sk_send_loop net/can/j1939/socket.c:1153 [inline] j1939_sk_sendmsg+0x517/0xc00 net/can/j1939/socket.c:1288 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg+0x145/0x180 net/socket.c:742 ____sys_sendmsg+0x345/0x4a0 net/socket.c:2592 ___sys_sendmsg+0x17b/0x1d0 net/socket.c:2646 __sys_sendmmsg+0x178/0x300 net/socket.c:2735 __do_sys_sendmmsg net/socket.c:2762 [inline] __se_sys_sendmmsg net/socket.c:2759 [inline] __x64_sys_sendmmsg+0x57/0x70 net/socket.c:2759 x64_sys_call+0x1e28/0x3000 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xca/0x2b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff888101967568 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] update_defense_level+0x589/0x5c0 net/netfilter/ipvs/ip_vs_ctl.c:209 defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:234 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340 worker_thread+0x582/0x770 kernel/workqueue.c:3421 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x00000000000023df -> 0x00000000000023e0 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3414 Comm: kworker/0:5 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: events_long defense_work_handler ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888100153800 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x807/0x820 net/can/gw.c:566 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:377 [inline] wg_packet_encrypt_worker+0xdca/0xe10 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340 worker_thread+0x582/0x770 kernel/workqueue.c:3421 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff888100153800 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x807/0x820 net/can/gw.c:566 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:890 [inline] nsim_dev_trap_report_work+0x52b/0x630 drivers/net/netdevsim/dev.c:921 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340 worker_thread+0x582/0x770 kernel/workqueue.c:3421 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x00003226 -> 0x00003227 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 5517 Comm: kworker/u8:13 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101967518 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x112/0x140 net/core/sock.c:3787 lock_sock include/net/sock.h:1700 [inline] sockopt_lock_sock+0x42/0x50 net/core/sock.c:1152 do_ip_getsockopt+0xa85/0xfe0 net/ipv4/ip_sockglue.c:1703 ip_getsockopt+0x5c/0x180 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xad/0xe0 net/ipv4/tcp.c:4834 sock_common_getsockopt+0x60/0x70 net/core/sock.c:3945 do_sock_getsockopt+0x1c4/0x210 net/socket.c:2383 __sys_getsockopt net/socket.c:2412 [inline] __do_sys_getsockopt net/socket.c:2419 [inline] __se_sys_getsockopt net/socket.c:2416 [inline] __x64_sys_getsockopt+0x11e/0x1a0 net/socket.c:2416 x64_sys_call+0x2dc7/0x3000 arch/x86/include/generated/asm/syscalls_64.h:56 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xca/0x2b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff888101967518 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:377 [inline] wg_packet_encrypt_worker+0xdca/0xe10 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340 worker_thread+0x582/0x770 kernel/workqueue.c:3421 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x00000000000092e3 -> 0x00000000000092e4 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 10 Comm: kworker/0:1 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: wg-crypt-wg1 wg_packet_encrypt_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101967568 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_tt_global_purge net/batman-adv/translation-table.c:2250 [inline] batadv_tt_purge+0x2cd/0x610 net/batman-adv/translation-table.c:3510 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340 worker_thread+0x582/0x770 kernel/workqueue.c:3421 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff888101967568 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] fpregs_unlock arch/x86/include/asm/fpu/api.h:77 [inline] kernel_fpu_end+0x6c/0x80 arch/x86/kernel/fpu/core.c:480 blake2s_compress+0x67/0x1740 lib/crypto/x86/blake2s.h:42 blake2s_update+0xa3/0x160 lib/crypto/blake2s.c:119 hmac+0x141/0x270 drivers/net/wireguard/noise.c:324 kdf+0x10b/0x1d0 drivers/net/wireguard/noise.c:375 mix_dh drivers/net/wireguard/noise.c:413 [inline] wg_noise_handshake_create_initiation+0x1ac/0x520 drivers/net/wireguard/noise.c:550 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:34 [inline] wg_packet_handshake_send_worker+0xb2/0x160 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340 worker_thread+0x582/0x770 kernel/workqueue.c:3421 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x000000000003850b -> 0x000000000003850c Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 5550 Comm: kworker/u8:38 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101967568 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:1063 smpboot_thread_fn+0x32b/0x530 kernel/smpboot.c:160 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff888101967568 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:1063 smpboot_thread_fn+0x32b/0x530 kernel/smpboot.c:160 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x000000000007128a -> 0x000000000007128b Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101967568 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] __batadv_dat_purge net/batman-adv/distributed-arp-table.c:185 [inline] batadv_dat_purge+0x1e3/0x270 net/batman-adv/distributed-arp-table.c:204 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340 worker_thread+0x582/0x770 kernel/workqueue.c:3421 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff888101967568 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:890 [inline] nsim_dev_trap_report_work+0x52b/0x630 drivers/net/netdevsim/dev.c:921 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340 worker_thread+0x582/0x770 kernel/workqueue.c:3421 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x00000000000aae37 -> 0x00000000000aae38 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 5541 Comm: kworker/u8:31 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888100153800 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x807/0x820 net/can/gw.c:566 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:1063 smpboot_thread_fn+0x32b/0x530 kernel/smpboot.c:160 kthread+0x489/0x510 kernel/kthread.c:463 ret_from_fork+0x149/0x290 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff888100153800 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x807/0x820 net/can/gw.c:566 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x112/0x140 net/core/sock.c:3787 lock_sock include/net/sock.h:1700 [inline] j1939_sk_sendmsg+0x51/0xc00 net/can/j1939/socket.c:1231 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg+0x145/0x180 net/socket.c:742 ____sys_sendmsg+0x345/0x4a0 net/socket.c:2592 ___sys_sendmsg+0x17b/0x1d0 net/socket.c:2646 __sys_sendmmsg+0x178/0x300 net/socket.c:2735 __do_sys_sendmmsg net/socket.c:2762 [inline] __se_sys_sendmmsg net/socket.c:2759 [inline] __x64_sys_sendmmsg+0x57/0x70 net/socket.c:2759 x64_sys_call+0x1e28/0x3000 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xca/0x2b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000afc7a -> 0x000afc7b Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 28273 Comm: syz.3.10018 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888101967518 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6139 [inline] __netif_receive_skb+0x120/0x270 net/core/dev.c:6252 process_backlog+0x228/0x420 net/core/dev.c:6604 __napi_poll+0x5f/0x300 net/core/dev.c:7668 napi_poll net/core/dev.c:7731 [inline] net_rx_action+0x425/0x8c0 net/core/dev.c:7883 handle_softirqs+0xba/0x290 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:936 [inline] mod_peer_timer drivers/net/wireguard/timers.c:38 [inline] wg_timers_any_authenticated_packet_traversal+0xdd/0x100 drivers/net/wireguard/timers.c:218 wg_packet_create_data_done drivers/net/wireguard/send.c:247 [inline] wg_packet_tx_worker+0xeb/0x330 drivers/net/wireguard/send.c:276 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4ce/0x9d0 kernel/workqueue.c:3340 worker_thread+0x582/0x770 kernel/workqueue.c:3421 kthread+0x489/0x510 kernel/kthread.c:463