================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff88810198fa18 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:1063 smpboot_thread_fn+0x32a/0x510 kernel/smpboot.c:160 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff88810198fa18 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x39/0xc0 kernel/softirq.c:723 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0x74/0x80 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 kcsan_setup_watchpoint+0x404/0x410 kernel/kcsan/core.c:705 dup_task_struct+0x58a/0x940 kernel/fork.c:979 copy_process+0x37e/0x1f10 kernel/fork.c:2052 kernel_clone+0x16b/0x5b0 kernel/fork.c:2651 user_mode_thread+0x9c/0xd0 kernel/fork.c:2727 call_usermodehelper_exec_sync kernel/umh.c:132 [inline] call_usermodehelper_exec_work+0x7a/0x160 kernel/umh.c:163 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x0000000000000bb5 -> 0x0000000000000bb6 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 24885 Comm: kworker/u8:31 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 Workqueue: events_unbound call_usermodehelper_exec_work ================================================================== ================================================================== BUG: KCSAN: data-race in vxcan_xmit / vxcan_xmit read-write to 0xffff88811ae28228 of 8 bytes by interrupt on cpu 1: vxcan_xmit+0x28b/0x340 drivers/net/can/vxcan.c:74 __netdev_start_xmit include/linux/netdevice.h:5273 [inline] netdev_start_xmit include/linux/netdevice.h:5282 [inline] xmit_one net/core/dev.c:3866 [inline] dev_hard_start_xmit+0x125/0x3e0 net/core/dev.c:3882 __dev_queue_xmit+0xdb1/0x1f20 net/core/dev.c:4832 dev_queue_xmit include/linux/netdevice.h:3381 [inline] can_send+0x589/0x720 net/can/af_can.c:279 can_can_gw_rcv+0x7bb/0x820 net/can/gw.c:563 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] kfree_skb_napi_cache net/core/skbuff.c:7219 [inline] skb_attempt_defer_free+0x31d/0x450 net/core/skbuff.c:7241 tcp_eat_recv_skb net/ipv4/tcp.c:1583 [inline] tcp_recvmsg_locked+0x1b48/0x20d0 net/ipv4/tcp.c:2888 tcp_recvmsg+0x12c/0x460 net/ipv4/tcp.c:2927 inet_recvmsg+0xb7/0x290 net/ipv4/af_inet.c:891 sock_recvmsg_nosec net/socket.c:1078 [inline] sock_recvmsg+0xf6/0x160 net/socket.c:1100 sock_read_iter+0x169/0x1b0 net/socket.c:1170 new_sync_read fs/read_write.c:491 [inline] vfs_read+0x6c0/0x7f0 fs/read_write.c:572 ksys_read+0xdc/0x1a0 fs/read_write.c:715 __do_sys_read fs/read_write.c:724 [inline] __se_sys_read fs/read_write.c:722 [inline] __x64_sys_read+0x40/0x50 fs/read_write.c:722 x64_sys_call+0x2889/0x3000 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0xc0/0x2a0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff88811ae28228 of 8 bytes by interrupt on cpu 0: vxcan_xmit+0x28b/0x340 drivers/net/can/vxcan.c:74 __netdev_start_xmit include/linux/netdevice.h:5273 [inline] netdev_start_xmit include/linux/netdevice.h:5282 [inline] xmit_one net/core/dev.c:3866 [inline] dev_hard_start_xmit+0x125/0x3e0 net/core/dev.c:3882 __dev_queue_xmit+0xdb1/0x1f20 net/core/dev.c:4832 dev_queue_xmit include/linux/netdevice.h:3381 [inline] can_send+0x589/0x720 net/can/af_can.c:279 can_can_gw_rcv+0x7bb/0x820 net/can/gw.c:563 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x132/0x160 net/core/sock.c:3787 __vsock_release+0x1e/0x380 net/vmw_vsock/af_vsock.c:860 vsock_release+0x5b/0x90 net/vmw_vsock/af_vsock.c:982 __sock_release net/socket.c:662 [inline] sock_close+0x6b/0x150 net/socket.c:1455 __fput+0x29b/0x650 fs/file_table.c:468 ____fput+0x1c/0x30 fs/file_table.c:496 task_work_run+0x130/0x1a0 kernel/task_work.c:233 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] __exit_to_user_mode_loop kernel/entry/common.c:44 [inline] exit_to_user_mode_loop+0x1f7/0x6f0 kernel/entry/common.c:75 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline] do_syscall_64+0x1d3/0x2a0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000001937 -> 0x0000000000001938 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 31084 Comm: syz.0.5288 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888100153860 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x807/0x820 net/can/gw.c:566 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:377 [inline] wg_packet_encrypt_worker+0x169/0xde0 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff888100153860 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x807/0x820 net/can/gw.c:566 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] release_sock+0x116/0x150 net/core/sock.c:3804 __vsock_release+0x307/0x380 net/vmw_vsock/af_vsock.c:885 vsock_release+0x5b/0x90 net/vmw_vsock/af_vsock.c:982 __sock_release net/socket.c:662 [inline] sock_close+0x6b/0x150 net/socket.c:1455 __fput+0x29b/0x650 fs/file_table.c:468 ____fput+0x1c/0x30 fs/file_table.c:496 task_work_run+0x130/0x1a0 kernel/task_work.c:233 resume_user_mode_work include/linux/resume_user_mode.h:50 [inline] __exit_to_user_mode_loop kernel/entry/common.c:44 [inline] exit_to_user_mode_loop+0x1f7/0x6f0 kernel/entry/common.c:75 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline] syscall_exit_to_user_mode_work include/linux/entry-common.h:159 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:194 [inline] do_syscall_64+0x1d3/0x2a0 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00001b4f -> 0x00001b50 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 31084 Comm: syz.0.5288 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff88810198f8d8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:1063 smpboot_thread_fn+0x32a/0x510 kernel/smpboot.c:160 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff88810198f8d8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:377 [inline] wg_packet_encrypt_worker+0x169/0xde0 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x0000000000006930 -> 0x0000000000006931 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 17693 Comm: kworker/0:13 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker ================================================================== ================================================================== BUG: KCSAN: data-race in vxcan_xmit / vxcan_xmit read-write to 0xffff88811ae28228 of 8 bytes by interrupt on cpu 1: vxcan_xmit+0x28b/0x340 drivers/net/can/vxcan.c:74 __netdev_start_xmit include/linux/netdevice.h:5273 [inline] netdev_start_xmit include/linux/netdevice.h:5282 [inline] xmit_one net/core/dev.c:3866 [inline] dev_hard_start_xmit+0x125/0x3e0 net/core/dev.c:3882 __dev_queue_xmit+0xdb1/0x1f20 net/core/dev.c:4832 dev_queue_xmit include/linux/netdevice.h:3381 [inline] can_send+0x589/0x720 net/can/af_can.c:279 can_can_gw_rcv+0x7bb/0x820 net/can/gw.c:563 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_tasks_invoke_cbs+0x2ae/0x350 kernel/rcu/tasks.h:579 rcu_tasks_one_gp+0x88c/0x8e0 kernel/rcu/tasks.h:628 rcu_tasks_kthread+0xf6/0x110 kernel/rcu/tasks.h:658 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff88811ae28228 of 8 bytes by interrupt on cpu 0: vxcan_xmit+0x28b/0x340 drivers/net/can/vxcan.c:74 __netdev_start_xmit include/linux/netdevice.h:5273 [inline] netdev_start_xmit include/linux/netdevice.h:5282 [inline] xmit_one net/core/dev.c:3866 [inline] dev_hard_start_xmit+0x125/0x3e0 net/core/dev.c:3882 __dev_queue_xmit+0xdb1/0x1f20 net/core/dev.c:4832 dev_queue_xmit include/linux/netdevice.h:3381 [inline] can_send+0x589/0x720 net/can/af_can.c:279 can_can_gw_rcv+0x7bb/0x820 net/can/gw.c:563 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:377 [inline] wg_packet_encrypt_worker+0xd9c/0xde0 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x000000000003f74a -> 0x000000000003f74b Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 17694 Comm: kworker/0:14 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 Workqueue: wg-crypt-wg0 wg_packet_encrypt_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888100153860 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x807/0x820 net/can/gw.c:566 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x477/0x4b0 net/core/skbuff.c:674 alloc_skb include/linux/skbuff.h:1383 [inline] nsim_dev_trap_skb_build drivers/net/netdevsim/dev.c:818 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:875 [inline] nsim_dev_trap_report_work+0x18a/0x630 drivers/net/netdevsim/dev.c:921 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff888100153860 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x807/0x820 net/can/gw.c:566 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x477/0x4b0 net/core/skbuff.c:674 alloc_skb include/linux/skbuff.h:1383 [inline] nsim_dev_trap_skb_build drivers/net/netdevsim/dev.c:818 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:875 [inline] nsim_dev_trap_report_work+0x18a/0x630 drivers/net/netdevsim/dev.c:921 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x0003bbad -> 0x0003bbae Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 12 Comm: kworker/u8:0 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff88810198fa18 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x477/0x4b0 net/core/skbuff.c:674 alloc_skb include/linux/skbuff.h:1383 [inline] nsim_dev_trap_skb_build drivers/net/netdevsim/dev.c:818 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:875 [inline] nsim_dev_trap_report_work+0x18a/0x630 drivers/net/netdevsim/dev.c:921 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff88810198fa18 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] __batadv_dat_purge net/batman-adv/distributed-arp-table.c:185 [inline] batadv_dat_purge+0x1e3/0x270 net/batman-adv/distributed-arp-table.c:204 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x000000000006fe2f -> 0x000000000006fe30 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 16597 Comm: kworker/u8:23 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 Workqueue: bat_events batadv_dat_purge ================================================================== ================================================================== BUG: KCSAN: data-race in vxcan_xmit / vxcan_xmit read-write to 0xffff88811ae28228 of 8 bytes by interrupt on cpu 1: vxcan_xmit+0x28b/0x340 drivers/net/can/vxcan.c:74 __netdev_start_xmit include/linux/netdevice.h:5273 [inline] netdev_start_xmit include/linux/netdevice.h:5282 [inline] xmit_one net/core/dev.c:3866 [inline] dev_hard_start_xmit+0x125/0x3e0 net/core/dev.c:3882 __dev_queue_xmit+0xdb1/0x1f20 net/core/dev.c:4832 dev_queue_xmit include/linux/netdevice.h:3381 [inline] can_send+0x589/0x720 net/can/af_can.c:279 can_can_gw_rcv+0x7bb/0x820 net/can/gw.c:563 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] update_defense_level+0x59d/0x5d0 net/netfilter/ipvs/ip_vs_ctl.c:209 defense_work_handler+0x1f/0x80 net/netfilter/ipvs/ip_vs_ctl.c:234 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff88811ae28228 of 8 bytes by interrupt on cpu 0: vxcan_xmit+0x28b/0x340 drivers/net/can/vxcan.c:74 __netdev_start_xmit include/linux/netdevice.h:5273 [inline] netdev_start_xmit include/linux/netdevice.h:5282 [inline] xmit_one net/core/dev.c:3866 [inline] dev_hard_start_xmit+0x125/0x3e0 net/core/dev.c:3882 __dev_queue_xmit+0xdb1/0x1f20 net/core/dev.c:4832 dev_queue_xmit include/linux/netdevice.h:3381 [inline] can_send+0x589/0x720 net/can/af_can.c:279 can_can_gw_rcv+0x7bb/0x820 net/can/gw.c:563 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] __batadv_dat_purge net/batman-adv/distributed-arp-table.c:185 [inline] batadv_dat_purge+0x1e3/0x270 net/batman-adv/distributed-arp-table.c:204 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x000000000007be47 -> 0x000000000007be48 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 16597 Comm: kworker/u8:23 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 Workqueue: bat_events batadv_dat_purge ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888100153860 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x807/0x820 net/can/gw.c:566 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:1063 smpboot_thread_fn+0x32a/0x510 kernel/smpboot.c:160 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff888100153860 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x807/0x820 net/can/gw.c:566 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] __batadv_dat_purge net/batman-adv/distributed-arp-table.c:185 [inline] batadv_dat_purge+0x1e3/0x270 net/batman-adv/distributed-arp-table.c:204 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x00074ae7 -> 0x00074ae8 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 16597 Comm: kworker/u8:23 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 Workqueue: bat_events batadv_dat_purge ================================================================== ================================================================== BUG: KCSAN: data-race in vxcan_xmit / vxcan_xmit read-write to 0xffff88810a188220 of 8 bytes by interrupt on cpu 1: vxcan_xmit+0x2c8/0x340 drivers/net/can/vxcan.c:77 __netdev_start_xmit include/linux/netdevice.h:5273 [inline] netdev_start_xmit include/linux/netdevice.h:5282 [inline] xmit_one net/core/dev.c:3866 [inline] dev_hard_start_xmit+0x125/0x3e0 net/core/dev.c:3882 __dev_queue_xmit+0xdb1/0x1f20 net/core/dev.c:4832 dev_queue_xmit include/linux/netdevice.h:3381 [inline] can_send+0x589/0x720 net/can/af_can.c:279 can_can_gw_rcv+0x7bb/0x820 net/can/gw.c:563 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:1063 smpboot_thread_fn+0x32a/0x510 kernel/smpboot.c:160 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 read-write to 0xffff88810a188220 of 8 bytes by interrupt on cpu 0: vxcan_xmit+0x2c8/0x340 drivers/net/can/vxcan.c:77 __netdev_start_xmit include/linux/netdevice.h:5273 [inline] netdev_start_xmit include/linux/netdevice.h:5282 [inline] xmit_one net/core/dev.c:3866 [inline] dev_hard_start_xmit+0x125/0x3e0 net/core/dev.c:3882 __dev_queue_xmit+0xdb1/0x1f20 net/core/dev.c:4832 dev_queue_xmit include/linux/netdevice.h:3381 [inline] can_send+0x589/0x720 net/can/af_can.c:279 can_can_gw_rcv+0x7bb/0x820 net/can/gw.c:563 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x163/0x1c0 net/can/af_can.c:666 can_rcv+0xed/0x190 net/can/af_can.c:690 __netif_receive_skb_one_core net/core/dev.c:6152 [inline] __netif_receive_skb net/core/dev.c:6265 [inline] process_backlog+0x363/0x670 net/core/dev.c:6617 __napi_poll+0x5f/0x310 net/core/dev.c:7681 napi_poll net/core/dev.c:7744 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7896 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x477/0x4b0 net/core/skbuff.c:674 alloc_skb include/linux/skbuff.h:1383 [inline] nsim_dev_trap_skb_build drivers/net/netdevsim/dev.c:818 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:875 [inline] nsim_dev_trap_report_work+0x18a/0x630 drivers/net/netdevsim/dev.c:921 process_one_work kernel/workqueue.c:3257 [inline] process_scheduled_works+0x4cd/0x9d0 kernel/workqueue.c:3340 worker_thread+0x6bc/0x8b0 kernel/workqueue.c:3421 kthread+0x488/0x510 kernel/kthread.c:463 ret_from_fork+0x148/0x280 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:246 value changed: 0x0000000000083c9c -> 0x0000000000083c9d Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 16598 Comm: kworker/u8:24 Tainted: G W syzkaller #0 PREEMPT(voluntary) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/24/2026 Workqueue: events_unbound nsim_dev_trap_report_work ==================================================================