In the Linux kernel, the following vulnerability has been resolved: wireguard: receive: annotate data-race around receivingcounter.counter Syzkaller with KCSAN identified a data-race issue when accessing keypair->receivingcounter.counter. Use READONCE() and WRITEONCE() annotations to mark the data race as intentional. BUG: KCSAN: data-race in wgpacketdecryptworker / wgpacketrxpoll write to 0xffff888107765888 of 8 bytes by interrupt on cpu 0: countervalidate drivers/net/wireguard/receive.c:321 [inline] wgpacketrxpoll+0x3ac/0xf00 drivers/net/wireguard/receive.c:461 _napipoll+0x60/0x3b0 net/core/dev.c:6536 napipoll net/core/dev.c:6605 [inline] netrxaction+0x32b/0x750 net/core/dev.c:6738 _dosoftirq+0xc4/0x279 kernel/softirq.c:553 dosoftirq+0x5e/0x90 kernel/softirq.c:454 _localbhenableip+0x64/0x70 kernel/softirq.c:381 _rawspinunlockbh include/linux/spinlockapismp.h:167 [inline] rawspinunlockbh+0x36/0x40 kernel/locking/spinlock.c:210 spinunlockbh include/linux/spinlock.h:396 [inline] ptrringconsumebh include/linux/ptrring.h:367 [inline] wgpacketdecryptworker+0x6c5/0x700 drivers/net/wireguard/receive.c:499 processonework kernel/workqueue.c:2633 [inline] ... read to 0xffff888107765888 of 8 bytes by task 3196 on cpu 1: decryptpacket drivers/net/wireguard/receive.c:252 [inline] wgpacketdecryptworker+0x220/0x700 drivers/net/wireguard/receive.c:501 processonework kernel/workqueue.c:2633 [inline] processscheduledworks+0x5b8/0xa30 kernel/workqueue.c:2706 workerthread+0x525/0x730 kernel/workqueue.c:2787 ...