================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff8881003b13d8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] ptr_ring_consume_bh include/linux/ptr_ring.h:377 [inline] wg_packet_decrypt_worker+0x166/0x6e0 drivers/net/wireguard/receive.c:499 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 read-write to 0xffff8881003b13d8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] lock_sock_nested+0x132/0x160 net/core/sock.c:3787 lock_sock include/net/sock.h:1709 [inline] selinux_netlbl_socket_connect+0x26/0x130 security/selinux/netlabel.c:614 selinux_socket_connect+0x57/0x70 security/selinux/hooks.c:5124 security_socket_connect+0x44/0x80 security/security.c:4165 __sys_connect_file net/socket.c:2085 [inline] __sys_connect+0x180/0x2a0 net/socket.c:2108 __do_sys_connect net/socket.c:2114 [inline] __se_sys_connect net/socket.c:2111 [inline] __x64_sys_connect+0x3f/0x50 net/socket.c:2111 x64_sys_call+0x2df0/0x3020 arch/x86/include/generated/asm/syscalls_64.h:43 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000000b41cd -> 0x00000000000b41ce Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 9965 Comm: syz.6.1498 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff8881003b13d8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] lock_sock_nested+0x132/0x160 net/core/sock.c:3787 lock_sock include/net/sock.h:1709 [inline] j1939_sk_sendmsg+0x4f/0xc00 net/can/j1939/socket.c:1237 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x563/0x5b0 net/socket.c:2592 ___sys_sendmsg+0x195/0x1e0 net/socket.c:2646 __sys_sendmmsg+0x185/0x320 net/socket.c:2735 __do_sys_sendmmsg net/socket.c:2762 [inline] __se_sys_sendmmsg net/socket.c:2759 [inline] __x64_sys_sendmmsg+0x57/0x70 net/socket.c:2759 x64_sys_call+0x27aa/0x3020 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff8881003b13d8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x658/0x690 net/core/skbuff.c:697 alloc_skb include/linux/skbuff.h:1383 [inline] nsim_dev_trap_skb_build drivers/net/netdevsim/dev.c:819 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:876 [inline] nsim_dev_trap_report_work+0x18a/0x630 drivers/net/netdevsim/dev.c:922 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x00000000000d2de8 -> 0x00000000000d2de9 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 4512 Comm: kworker/u8:36 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888100a7ffb8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] j1939_session_list_unlock net/can/j1939/transport.c:244 [inline] j1939_session_activate+0x1d3/0x220 net/can/j1939/transport.c:1603 j1939_sk_send_loop net/can/j1939/socket.c:1180 [inline] j1939_sk_sendmsg+0x890/0xc00 net/can/j1939/socket.c:1294 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x563/0x5b0 net/socket.c:2592 ___sys_sendmsg+0x195/0x1e0 net/socket.c:2646 __sys_sendmmsg+0x185/0x320 net/socket.c:2735 __do_sys_sendmmsg net/socket.c:2762 [inline] __se_sys_sendmmsg net/socket.c:2759 [inline] __x64_sys_sendmmsg+0x57/0x70 net/socket.c:2759 x64_sys_call+0x27aa/0x3020 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff888100a7ffb8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x658/0x690 net/core/skbuff.c:697 alloc_skb include/linux/skbuff.h:1383 [inline] nsim_dev_trap_skb_build drivers/net/netdevsim/dev.c:819 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:876 [inline] nsim_dev_trap_report_work+0x18a/0x630 drivers/net/netdevsim/dev.c:922 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x000000000010004f -> 0x0000000000100050 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 70 Comm: kworker/u8:5 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: events_unbound nsim_dev_trap_report_work ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff8881003b13d8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] j1939_session_list_unlock net/can/j1939/transport.c:244 [inline] j1939_session_activate+0x1d3/0x220 net/can/j1939/transport.c:1603 j1939_sk_send_loop net/can/j1939/socket.c:1180 [inline] j1939_sk_sendmsg+0x890/0xc00 net/can/j1939/socket.c:1294 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x563/0x5b0 net/socket.c:2592 ___sys_sendmsg+0x195/0x1e0 net/socket.c:2646 __sys_sendmmsg+0x185/0x320 net/socket.c:2735 __do_sys_sendmmsg net/socket.c:2762 [inline] __se_sys_sendmmsg net/socket.c:2759 [inline] __x64_sys_sendmmsg+0x57/0x70 net/socket.c:2759 x64_sys_call+0x27aa/0x3020 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff8881003b13d8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0x242/0x4f0 net/can/af_can.c:609 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] batadv_tt_local_purge+0x1a8/0x1f0 net/batman-adv/translation-table.c:1315 batadv_tt_purge+0x2b/0x610 net/batman-adv/translation-table.c:3509 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x0000000000116584 -> 0x0000000000116585 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 4501 Comm: kworker/u8:33 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: bat_events batadv_tt_purge ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff888100a7ffb8 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:196 [inline] _raw_spin_unlock_bh+0x18/0x20 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:395 [inline] j1939_sk_queue_session net/can/j1939/socket.c:108 [inline] j1939_sk_send_loop net/can/j1939/socket.c:1176 [inline] j1939_sk_sendmsg+0x86c/0xc00 net/can/j1939/socket.c:1294 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x563/0x5b0 net/socket.c:2592 ___sys_sendmsg+0x195/0x1e0 net/socket.c:2646 __sys_sendmmsg+0x185/0x320 net/socket.c:2735 __do_sys_sendmmsg net/socket.c:2762 [inline] __se_sys_sendmmsg net/socket.c:2759 [inline] __x64_sys_sendmmsg+0x57/0x70 net/socket.c:2759 x64_sys_call+0x27aa/0x3020 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff888100a7ffb8 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:576 [inline] can_rcv_filter+0xd9/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] fpregs_unlock arch/x86/include/asm/fpu/api.h:77 [inline] kernel_fpu_end+0x6c/0x80 arch/x86/kernel/fpu/core.c:506 blake2s_compress+0x67/0x1740 lib/crypto/x86/blake2s.h:42 blake2s_update+0xa3/0x160 lib/crypto/blake2s.c:119 hmac+0x396/0x400 drivers/net/wireguard/noise.c:332 kdf+0x118/0x1e0 drivers/net/wireguard/noise.c:375 mix_precomputed_dh drivers/net/wireguard/noise.c:426 [inline] wg_noise_handshake_create_initiation+0x372/0x610 drivers/net/wireguard/noise.c:560 wg_packet_send_handshake_initiation drivers/net/wireguard/send.c:34 [inline] wg_packet_handshake_send_worker+0xb2/0x160 drivers/net/wireguard/send.c:51 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x0000000000141e60 -> 0x0000000000141e61 Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 4466 Comm: kworker/u8:20 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: wg-kex-wg1 wg_packet_handshake_send_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_can_gw_rcv / can_can_gw_rcv read-write to 0xffff88810016eec0 of 4 bytes by interrupt on cpu 0: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x2b6/0x690 net/core/skbuff.c:697 alloc_skb include/linux/skbuff.h:1383 [inline] alloc_skb_with_frags+0x7d/0x470 net/core/skbuff.c:6763 sock_alloc_send_pskb+0x44d/0x500 net/core/sock.c:2995 sock_alloc_send_skb include/net/sock.h:1894 [inline] j1939_sk_alloc_skb net/can/j1939/socket.c:891 [inline] j1939_sk_send_loop net/can/j1939/socket.c:1159 [inline] j1939_sk_sendmsg+0x4cb/0xc00 net/can/j1939/socket.c:1294 sock_sendmsg_nosec net/socket.c:727 [inline] __sock_sendmsg net/socket.c:742 [inline] ____sys_sendmsg+0x563/0x5b0 net/socket.c:2592 ___sys_sendmsg+0x195/0x1e0 net/socket.c:2646 __sys_sendmmsg+0x185/0x320 net/socket.c:2735 __do_sys_sendmmsg net/socket.c:2762 [inline] __se_sys_sendmmsg net/socket.c:2759 [inline] __x64_sys_sendmmsg+0x57/0x70 net/socket.c:2759 x64_sys_call+0x27aa/0x3020 arch/x86/include/generated/asm/syscalls_64.h:308 do_syscall_x64 arch/x86/entry/syscall_64.c:63 [inline] do_syscall_64+0x12c/0x370 arch/x86/entry/syscall_64.c:94 entry_SYSCALL_64_after_hwframe+0x77/0x7f read-write to 0xffff88810016eec0 of 4 bytes by interrupt on cpu 1: can_can_gw_rcv+0x863/0x870 net/can/gw.c:572 deliver net/can/af_can.c:575 [inline] can_rcv_filter+0xc7/0x4f0 net/can/af_can.c:602 can_receive+0x13e/0x190 net/can/af_can.c:674 can_rcv+0x17d/0x1f0 net/can/af_can.c:699 __netif_receive_skb_one_core net/core/dev.c:6164 [inline] __netif_receive_skb net/core/dev.c:6277 [inline] process_backlog+0x363/0x670 net/core/dev.c:6628 __napi_poll+0x61/0x330 net/core/dev.c:7692 napi_poll net/core/dev.c:7755 [inline] net_rx_action+0x452/0x930 net/core/dev.c:7912 handle_softirqs+0xb9/0x2a0 kernel/softirq.c:622 do_softirq+0x45/0x60 kernel/softirq.c:523 __local_bh_enable_ip+0x70/0x80 kernel/softirq.c:450 local_bh_enable include/linux/bottom_half.h:33 [inline] __alloc_skb+0x658/0x690 net/core/skbuff.c:697 alloc_skb include/linux/skbuff.h:1383 [inline] nsim_dev_trap_skb_build drivers/net/netdevsim/dev.c:819 [inline] nsim_dev_trap_report drivers/net/netdevsim/dev.c:876 [inline] nsim_dev_trap_report_work+0x18a/0x630 drivers/net/netdevsim/dev.c:922 process_one_work kernel/workqueue.c:3275 [inline] process_scheduled_works+0x4de/0x9e0 kernel/workqueue.c:3358 worker_thread+0x581/0x770 kernel/workqueue.c:3439 kthread+0x22a/0x280 kernel/kthread.c:436 ret_from_fork+0x150/0x360 arch/x86/kernel/process.c:158 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:245 value changed: 0x00145a0c -> 0x00145a0d Reported by Kernel Concurrency Sanitizer on: CPU: 1 UID: 0 PID: 4495 Comm: kworker/u8:30 Tainted: G W syzkaller #0 PREEMPT(full) Tainted: [W]=WARN Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Workqueue: events_unbound nsim_dev_trap_report_work ==================================================================