================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888100173800 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc3/0x480 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6202 [inline] __netif_receive_skb net/core/dev.c:6315 [inline] process_backlog+0x363/0x670 net/core/dev.c:6666 __napi_poll+0x61/0x300 net/core/dev.c:7730 napi_poll net/core/dev.c:7793 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7950 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x658/0x690 net/core/skbuff.c:697 alloc_skb include/linux/skbuff.h:1383 [inline] nlmsg_new include/net/netlink.h:1055 [inline] audit_buffer_alloc kernel/audit.c:1841 [inline] audit_log_start+0x3aa/0x730 kernel/audit.c:1960 common_lsm_audit+0x65/0x230 security/lsm_audit.c:442 slow_avc_audit+0x14c/0x190 security/selinux/avc.c:779 avc_xperms_audit security/selinux/avc.c:425 [inline] avc_has_extended_perms+0x613/0x890 security/selinux/avc.c:1090 ioctl_has_perm+0x27e/0x2d0 security/selinux/hooks.c:3898 selinux_file_ioctl+0x338/0x3b0 security/selinux/hooks.c:-1 security_file_ioctl+0x44/0x80 security/security.c:2512 __do_sys_ioctl fs/ioctl.c:591 [inline] __se_sys_ioctl+0x47/0x140 fs/ioctl.c:583 __x64_sys_ioctl+0x43/0x50 fs/ioctl.c:583 x64_sys_call+0x1563/0x3020 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x3b0 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff888100173800 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc3/0x480 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6202 [inline] __netif_receive_skb net/core/dev.c:6315 [inline] process_backlog+0x363/0x670 net/core/dev.c:6666 __napi_poll+0x61/0x300 net/core/dev.c:7730 napi_poll net/core/dev.c:7793 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7950 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] ip6t_do_table+0xb34/0xc10 net/ipv6/netfilter/ip6_tables.c:375 nf_hook_entry_hookfn include/linux/netfilter.h:158 [inline] nf_hook_slow+0x78/0x180 net/netfilter/core.c:619 nf_hook include/linux/netfilter.h:273 [inline] NF_HOOK include/linux/netfilter.h:316 [inline] mld_sendpack+0x77e/0x7c0 net/ipv6/mcast.c:1855 mld_send_initial_cr+0x133/0x1e0 net/ipv6/mcast.c:2271 mld_dad_work+0x34/0x310 net/ipv6/mcast.c:2294 process_one_work kernel/workqueue.c:3302 [inline] process_scheduled_works+0x4f0/0x9c0 kernel/workqueue.c:3385 worker_thread+0x58a/0x780 kernel/workqueue.c:3466 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x146/0x330 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x00005dac -> 0x00005dad Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3606 Comm: kworker/0:10 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 Workqueue: mld mld_dad_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff888100173800 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc3/0x480 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6202 [inline] __netif_receive_skb net/core/dev.c:6315 [inline] process_backlog+0x363/0x670 net/core/dev.c:6666 __napi_poll+0x61/0x300 net/core/dev.c:7730 napi_poll net/core/dev.c:7793 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7950 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:1076 smpboot_thread_fn+0x32a/0x510 kernel/smpboot.c:160 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x146/0x330 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read-write to 0xffff888100173800 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc3/0x480 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6202 [inline] __netif_receive_skb net/core/dev.c:6315 [inline] process_backlog+0x363/0x670 net/core/dev.c:6666 __napi_poll+0x61/0x300 net/core/dev.c:7730 napi_poll net/core/dev.c:7793 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7950 handle_softirqs+0xb9/0x280 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x658/0x690 net/core/skbuff.c:697 alloc_skb include/linux/skbuff.h:1383 [inline] nsim_dev_trap_skb_build drivers/net/netdevsim/dev.c:819 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:876 [inline] nsim_dev_trap_report_work+0x18a/0x630 drivers/net/netdevsim/dev.c:922 process_one_work kernel/workqueue.c:3302 [inline] process_scheduled_works+0x4f0/0x9c0 kernel/workqueue.c:3385 worker_thread+0x58a/0x780 kernel/workqueue.c:3466 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x146/0x330 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x00057159 -> 0x0005715b Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 82 Comm: kworker/u8:5 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/18/2026 Workqueue: events_unbound nsim_dev_trap_report_work ==================================================================