================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888100a7e298 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_read_unlock_bh include/linux/rwlock_api_smp.h:281 [inline] _raw_read_unlock_bh+0x1b/0x30 kernel/locking/spinlock.c:284 wg_socket_send_skb_to_peer+0x111/0x130 drivers/net/wireguard/socket.c:184 wg_packet_create_data_done drivers/net/wireguard/send.c:251 [inline] wg_packet_tx_worker+0x12d/0x330 drivers/net/wireguard/send.c:276 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:467 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read-write to 0xffff888100a7e298 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x658/0x690 net/core/skbuff.c:697 alloc_skb include/linux/skbuff.h:1383 [inline] alloc_uevent_skb+0x5c/0x120 lib/kobject_uevent.c:289 uevent_net_broadcast_tagged lib/kobject_uevent.c:352 [inline] kobject_uevent_net_broadcast+0xfb/0x410 lib/kobject_uevent.c:413 kobject_uevent_env+0x43d/0x570 lib/kobject_uevent.c:608 kobject_uevent+0x1d/0x30 lib/kobject_uevent.c:656 __kobject_del+0x88/0x190 lib/kobject.c:601 kobject_cleanup lib/kobject.c:680 [inline] kobject_release lib/kobject.c:720 [inline] kref_put include/linux/kref.h:65 [inline] kobject_put+0x124/0x180 lib/kobject.c:737 netdev_queue_update_kobjects+0x456/0x4c0 net/core/net-sysfs.c:2073 remove_queue_kobjects net/core/net-sysfs.c:2170 [inline] netdev_unregister_kobject+0xcc/0x270 net/core/net-sysfs.c:2325 unregister_netdevice_many_notify+0x1346/0x1710 net/core/dev.c:12447 rtnl_delete_link net/core/rtnetlink.c:3528 [inline] rtnl_dellink+0x43f/0x640 net/core/rtnetlink.c:3570 rtnetlink_rcv_msg+0x64b/0x720 net/core/rtnetlink.c:6958 netlink_rcv_skb+0x123/0x220 net/netlink/af_netlink.c:2550 rtnetlink_rcv+0x1c/0x30 net/core/rtnetlink.c:6985 netlink_unicast_kernel net/netlink/af_netlink.c:1318 [inline] netlink_unicast+0x5c0/0x690 net/netlink/af_netlink.c:1344 netlink_sendmsg+0x5c8/0x6f0 net/netlink/af_netlink.c:1894 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x5af/0x600 net/socket.c:2592 ___sys_sendmsg+0x195/0x1e0 net/socket.c:2646 __sys_sendmsg net/socket.c:2678 [inline] __do_sys_sendmsg net/socket.c:2683 [inline] __se_sys_sendmsg net/socket.c:2681 [inline] __x64_sys_sendmsg+0xd4/0x160 net/socket.c:2681 x64_sys_call+0x194c/0x3020 arch/x86/include/generated/asm/syscalls_64.h:47 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000001512 -> 0x0000000000001513 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 6897 Comm: syz.0.827 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888100a7e2e8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:891 [inline] nsim_dev_trap_report_work+0x52b/0x630 drivers/net/netdevsim/dev.c:922 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:467 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read-write to 0xffff888100a7e2e8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 __do_softirq kernel/softirq.c:656 [inline] invoke_softirq kernel/softirq.c:496 [inline] __irq_exit_rcu+0x39/0xc0 kernel/softirq.c:723 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1056 [inline] sysvec_apic_timer_interrupt+0x74/0x80 arch/x86/kernel/apic/apic.c:1056 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:697 kcsan_setup_watchpoint+0x404/0x410 kernel/kcsan/core.c:705 folio_batch_add include/linux/pagevec.h:77 [inline] free_pages_and_swap_cache+0x29c/0x450 mm/swap_state.c:422 __tlb_batch_free_encoded_pages mm/mmu_gather.c:138 [inline] tlb_batch_pages_flush mm/mmu_gather.c:151 [inline] tlb_flush_mmu_free mm/mmu_gather.c:398 [inline] tlb_flush_mmu+0x557/0x6d0 mm/mmu_gather.c:405 zap_pte_range mm/memory.c:1968 [inline] zap_pmd_range mm/memory.c:2021 [inline] zap_pud_range mm/memory.c:2049 [inline] zap_p4d_range mm/memory.c:2070 [inline] unmap_page_range+0x27a7/0x2e80 mm/memory.c:2091 unmap_single_vma mm/memory.c:2133 [inline] unmap_vmas+0x2ba/0x420 mm/memory.c:2171 exit_mmap+0x1ab/0x620 mm/mmap.c:1302 __mmput+0x28/0x1c0 kernel/fork.c:1174 mmput+0x40/0x50 kernel/fork.c:1197 exit_mm+0xe3/0x180 kernel/exit.c:581 do_exit+0x3fa/0x15a0 kernel/exit.c:959 do_group_exit+0xfe/0x140 kernel/exit.c:1112 get_signal+0xe54/0xf60 kernel/signal.c:3034 arch_do_signal_or_restart+0x96/0x450 arch/x86/kernel/signal.c:337 __exit_to_user_mode_loop kernel/entry/common.c:64 [inline] exit_to_user_mode_loop+0x6a/0x6f0 kernel/entry/common.c:98 __exit_to_user_mode_prepare include/linux/irq-entry-common.h:226 [inline] syscall_exit_to_user_mode_prepare include/linux/irq-entry-common.h:256 [inline] syscall_exit_to_user_mode include/linux/entry-common.h:325 [inline] do_syscall_64+0x249/0x370 arch/x86/entry/syscall_64.c:100 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000000000000426e -> 0x000000000000426f Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 6888 Comm: syz.2.825 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff88811a5348c0 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:1063 smpboot_thread_fn+0x32a/0x510 kernel/smpboot.c:160 kthread+0x22a/0x280 kernel/kthread.c:467 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read-write to 0xffff88811a5348c0 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] fpregs_unlock arch/x86/include/asm/fpu/api.h:77 [inline] kernel_fpu_end+0x6c/0x80 arch/x86/kernel/fpu/core.c:506 blake2s_compress+0x67/0x1740 lib/crypto/x86/blake2s.h:42 blake2s_update+0xa3/0x160 lib/crypto/blake2s.c:119 hmac+0x20c/0x400 drivers/net/wireguard/noise.c:324 kdf+0x7d/0x1e0 drivers/net/wireguard/noise.c:360 mix_precomputed_dh drivers/net/wireguard/noise.c:426 [inline] wg_noise_handshake_create_initiation+0x372/0x610 drivers/net/wireguard/noise.c:560 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:34 [inline] wg_packet_handshake_send_worker+0xb2/0x160 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:467 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x000305ca -> 0x000305cb Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3618 Comm: kworker/u8:12 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888100a7e2e8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:377 [inline] wg_packet_encrypt_worker+0xd9c/0xde0 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:467 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read-write to 0xffff888100a7e2e8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:1063 smpboot_thread_fn+0x32a/0x510 kernel/smpboot.c:160 kthread+0x22a/0x280 kernel/kthread.c:467 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x0000000000033bca -> 0x0000000000033bcb Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 14 Comm: ksoftirqd/0 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888100a7e298 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x658/0x690 net/core/skbuff.c:697 alloc_skb include/linux/skbuff.h:1383 [inline] alloc_skb_with_frags+0x7d/0x470 net/core/skbuff.c:6763 sock_alloc_send_pskb+0x44d/0x500 net/core/sock.c:2995 unix_dgram_sendmsg+0x391/0x1060 net/unix/af_unix.c:2125 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] __sys_sendto+0x470/0x4d0 net/socket.c:2206 __do_sys_sendto net/socket.c:2213 [inline] __se_sys_sendto net/socket.c:2209 [inline] __x64_sys_sendto+0x76/0x90 net/socket.c:2209 x64_sys_call+0x2d35/0x3020 arch/x86/include/generated/asm/syscalls_64.h:45 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff888100a7e298 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] j1939_session_list_unlock net/can/j1939/transport.c:244 [inline] j1939_session_activate+0x1d3/0x220 net/can/j1939/transport.c:1603 j1939_sk_send_loop net/can/j1939/socket.c:1180 [inline] j1939_sk_sendmsg+0x890/0xc00 net/can/j1939/socket.c:1294 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x5af/0x600 net/socket.c:2592 ___sys_sendmsg+0x195/0x1e0 net/socket.c:2646 __sys_sendmmsg+0x185/0x320 net/socket.c:2735 __do_sys_sendmmsg net/socket.c:2762 [inline] __se_sys_sendmmsg net/socket.c:2759 [inline] __x64_sys_sendmmsg+0x57/0x70 net/socket.c:2759 x64_sys_call+0x27aa/0x3020 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000057f6b -> 0x0000000000057f6c Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 6899 Comm: syz.3.828 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff88811a5348c0 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] release_sock+0x116/0x150 net/core/sock.c:3804 sk_setsockopt+0x606/0x2140 net/core/sock.c:-1 sock_setsockopt+0x40/0x50 net/core/sock.c:1681 do_sock_setsockopt net/socket.c:2318 [inline] __sys_setsockopt+0x13a/0x200 net/socket.c:2347 __do_sys_setsockopt net/socket.c:2353 [inline] __se_sys_setsockopt net/socket.c:2350 [inline] __x64_sys_setsockopt+0x64/0x80 net/socket.c:2350 x64_sys_call+0x2327/0x3020 arch/x86/include/generated/asm/syscalls_64.h:55 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff88811a5348c0 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:377 [inline] wg_packet_decrypt_worker+0x69e/0x6e0 drivers/net/wireguard/receive.c:499 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:467 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x00066505 -> 0x00066506 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 9 Comm: kworker/0:0 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: wg-crypt-wg1 wg_packet_decrypt_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888100a7e298 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:924 [inline] mod_peer_timer drivers/net/wireguard/timers.c:38 [inline] wg_timers_any_authenticated_packet_traversal+0xdd/0x100 drivers/net/wireguard/timers.c:218 wg_packet_create_data_done drivers/net/wireguard/send.c:247 [inline] wg_packet_tx_worker+0xeb/0x330 drivers/net/wireguard/send.c:276 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:467 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read-write to 0xffff888100a7e298 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6167 [inline] __netif_receive_skb net/core/dev.c:6280 [inline] process_backlog+0x363/0x670 net/core/dev.c:6631 __napi_poll+0x61/0x330 net/core/dev.c:7695 napi_poll net/core/dev.c:7758 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7910 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] release_sock+0x116/0x150 net/core/sock.c:3804 tcp_recvmsg+0x136/0x460 net/ipv4/tcp.c:2980 inet_recvmsg+0xb7/0x290 net/ipv4/af_inet.c:891 sock_recvmsg_nosec net/socket.c:1078 [inline] sock_recvmsg+0xf6/0x160 net/socket.c:1100 sock_read_iter+0x169/0x1b0 net/socket.c:1170 new_sync_read fs/read_write.c:493 [inline] vfs_read+0x6c0/0x7f0 fs/read_write.c:574 ksys_read+0xdc/0x1a0 fs/read_write.c:717 __do_sys_read fs/read_write.c:726 [inline] __se_sys_read fs/read_write.c:724 [inline] __x64_sys_read+0x40/0x50 fs/read_write.c:724 x64_sys_call+0x2886/0x3020 arch/x86/include/generated/asm/syscalls_64.h:1 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000085132 -> 0x0000000000085133 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3301 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ==================================================================