================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888110db78c0 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc3/0x480 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6176 [inline] __netif_receive_skb net/core/dev.c:6289 [inline] process_backlog+0x363/0x670 net/core/dev.c:6640 __napi_poll+0x61/0x330 net/core/dev.c:7704 napi_poll net/core/dev.c:7767 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7924 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:377 [inline] wg_packet_encrypt_worker+0x169/0xde0 drivers/net/wireguard/send.c:293 process_one_work kernel/workqueue.c:3276 [inline] process_scheduled_works+0x513/0xa10 kernel/workqueue.c:3359 worker_thread+0x58a/0x780 kernel/workqueue.c:3440 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read-write to 0xffff888110db78c0 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc3/0x480 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6176 [inline] __netif_receive_skb net/core/dev.c:6289 [inline] process_backlog+0x363/0x670 net/core/dev.c:6640 __napi_poll+0x61/0x330 net/core/dev.c:7704 napi_poll net/core/dev.c:7767 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7924 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] release_sock+0x116/0x150 net/core/sock.c:3804 j1939_sk_sendmsg+0xac4/0xc00 net/can/j1939/socket.c:1297 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x563/0x5b0 net/socket.c:2592 ___sys_sendmsg+0x195/0x1e0 net/socket.c:2646 __sys_sendmmsg+0x185/0x320 net/socket.c:2735 __do_sys_sendmmsg net/socket.c:2762 [inline] __se_sys_sendmmsg net/socket.c:2759 [inline] __x64_sys_sendmmsg+0x57/0x70 net/socket.c:2759 x64_sys_call+0x27aa/0x3020 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00009fc2 -> 0x00009fc3 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 18995 Comm: syz.3.2614 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888110db78c0 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc3/0x480 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6176 [inline] __netif_receive_skb net/core/dev.c:6289 [inline] process_backlog+0x363/0x670 net/core/dev.c:6640 __napi_poll+0x61/0x330 net/core/dev.c:7704 napi_poll net/core/dev.c:7767 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7924 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] rcu_read_unlock_bh include/linux/rcupdate.h:924 [inline] __dev_queue_xmit+0x136c/0x1f20 net/core/dev.c:4885 dev_queue_xmit include/linux/netdevice.h:3385 [inline] alb_send_lp_vid+0x201/0x240 drivers/net/bonding/bond_alb.c:949 alb_send_learning_packets drivers/net/bonding/bond_alb.c:1012 [inline] bond_alb_monitor+0x277/0xa70 drivers/net/bonding/bond_alb.c:1563 process_one_work kernel/workqueue.c:3276 [inline] process_scheduled_works+0x513/0xa10 kernel/workqueue.c:3359 worker_thread+0x58a/0x780 kernel/workqueue.c:3440 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read-write to 0xffff888110db78c0 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc3/0x480 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6176 [inline] __netif_receive_skb net/core/dev.c:6289 [inline] process_backlog+0x363/0x670 net/core/dev.c:6640 __napi_poll+0x61/0x330 net/core/dev.c:7704 napi_poll net/core/dev.c:7767 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7924 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] j1939_sk_get_incomplete_session net/can/j1939/socket.c:129 [inline] j1939_sk_send_loop net/can/j1939/socket.c:1139 [inline] j1939_sk_sendmsg+0x420/0xc00 net/can/j1939/socket.c:1294 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x563/0x5b0 net/socket.c:2592 ___sys_sendmsg+0x195/0x1e0 net/socket.c:2646 __sys_sendmmsg+0x185/0x320 net/socket.c:2735 __do_sys_sendmmsg net/socket.c:2762 [inline] __se_sys_sendmmsg net/socket.c:2759 [inline] __x64_sys_sendmmsg+0x57/0x70 net/socket.c:2759 x64_sys_call+0x27aa/0x3020 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00057d15 -> 0x00057d17 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 18995 Comm: syz.3.2614 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ==================================================================