================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff8881012bb298 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff8881012bb298 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000081e33 -> 0x0000000000081e34 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-rc5-syzkaller-00006-g56e6a3499e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888123bb2c88 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xad0 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888123bb2c88 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x0000000000091852 -> 0x0000000000091853 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-rc5-syzkaller-00006-g56e6a3499e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888123bb2c98 of 8 bytes by interrupt on cpu 1: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888123bb2c98 of 8 bytes by interrupt on cpu 0: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000949c4 -> 0x00000000000949c5 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-rc5-syzkaller-00006-g56e6a3499e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff8881012bb298 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xad0 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff8881012bb298 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000b8be0 -> 0x00000000000b8be1 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-rc5-syzkaller-00006-g56e6a3499e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888123bb2ce8 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3629 lock_sock include/net/sock.h:1623 [inline] rds_tcp_tune+0x48/0x2d0 net/rds/tcp.c:496 rds_tcp_conn_path_connect+0x1a5/0x440 net/rds/tcp_connect.c:127 rds_connect_worker+0x12c/0x1b0 net/rds/threads.c:176 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888123bb2ce8 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:651 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x000000000000701a -> 0x000000000000701b Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 15 Comm: ksoftirqd/0 Not tainted 6.13.0-rc5-syzkaller-00006-g56e6a3499e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888123bb2c98 of 8 bytes by interrupt on cpu 1: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888123bb2c98 of 8 bytes by interrupt on cpu 0: can_receive+0x1b6/0x1f0 net/can/af_can.c:672 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x220/0x270 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xad0 net/batman-adv/network-coding.c:722 process_one_work kernel/workqueue.c:3229 [inline] process_scheduled_works+0x483/0x9a0 kernel/workqueue.c:3310 worker_thread+0x51d/0x6f0 kernel/workqueue.c:3391 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 value changed: 0x00000000000cc750 -> 0x00000000000cc751 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3532 Comm: kworker/u8:8 Not tainted 6.13.0-rc5-syzkaller-00006-g56e6a3499e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 Workqueue: bat_events batadv_nc_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_rcv_filter / can_rcv_filter read-write to 0xffff8881012bb298 of 8 bytes by interrupt on cpu 1: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff8881012bb298 of 8 bytes by interrupt on cpu 0: deliver net/can/af_can.c:574 [inline] can_rcv_filter+0x237/0x4c0 net/can/af_can.c:607 can_receive+0x182/0x1f0 net/can/af_can.c:664 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] release_sock+0x117/0x150 net/core/sock.c:3646 tcp_close+0x2e/0xd0 net/ipv4/tcp.c:3222 inet_release+0xce/0xf0 net/ipv4/af_inet.c:435 inet6_release+0x3e/0x60 net/ipv6/af_inet6.c:487 __sock_release net/socket.c:640 [inline] sock_close+0x68/0x150 net/socket.c:1408 __fput+0x17a/0x6d0 fs/file_table.c:450 __fput_sync+0x96/0xc0 fs/file_table.c:535 __do_sys_close fs/open.c:1554 [inline] __se_sys_close+0x109/0x1b0 fs/open.c:1539 __x64_sys_close+0x1f/0x30 fs/open.c:1539 x64_sys_call+0x266c/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:4 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x00000000000f130e -> 0x00000000000f130f Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 12893 Comm: syz-executor Not tainted 6.13.0-rc5-syzkaller-00006-g56e6a3499e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888123bb2cf8 of 8 bytes by interrupt on cpu 1: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888123bb2cf8 of 8 bytes by interrupt on cpu 0: can_receive+0x1ca/0x1f0 net/can/af_can.c:673 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] lock_sock_nested+0x10f/0x140 net/core/sock.c:3629 lock_sock include/net/sock.h:1623 [inline] sockopt_lock_sock+0x42/0x50 net/core/sock.c:1126 do_ip_getsockopt+0xb57/0x11a0 net/ipv4/ip_sockglue.c:1703 ip_getsockopt+0x5c/0x170 net/ipv4/ip_sockglue.c:1765 tcp_getsockopt+0xaa/0xe0 net/ipv4/tcp.c:4671 sock_common_getsockopt+0x5b/0x70 net/core/sock.c:3787 do_sock_getsockopt+0x1ca/0x260 net/socket.c:2374 __sys_getsockopt net/socket.c:2403 [inline] __do_sys_getsockopt net/socket.c:2410 [inline] __se_sys_getsockopt net/socket.c:2407 [inline] __x64_sys_getsockopt+0x18c/0x200 net/socket.c:2407 x64_sys_call+0x1288/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:56 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000004fb5 -> 0x0000000000004fb6 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 12956 Comm: syz-executor Not tainted 6.13.0-rc5-syzkaller-00006-g56e6a3499e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ================================================================== ================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888123bb2c88 of 8 bytes by interrupt on cpu 1: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 run_ksoftirqd+0x1c/0x30 kernel/softirq.c:950 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x1d1/0x210 kernel/kthread.c:389 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:147 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888123bb2c88 of 8 bytes by interrupt on cpu 0: can_receive+0x4e/0x1f0 net/can/af_can.c:650 can_rcv+0xe7/0x180 net/can/af_can.c:688 __netif_receive_skb_one_core net/core/dev.c:5672 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:5785 process_backlog+0x22e/0x440 net/core/dev.c:6117 __napi_poll+0x63/0x3c0 net/core/dev.c:6883 napi_poll net/core/dev.c:6952 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7074 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 fpu__restore_sig+0x5c1/0xb00 arch/x86/kernel/fpu/signal.c:494 restore_sigcontext+0x1b5/0x220 arch/x86/kernel/signal_64.c:95 __do_sys_rt_sigreturn+0xfd/0x160 arch/x86/kernel/signal_64.c:266 x64_sys_call+0x2982/0x2dc0 arch/x86/include/generated/asm/syscalls_64.h:16 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xc9/0x1c0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x0000000000105361 -> 0x0000000000105362 Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 13550 Comm: syz-executor Not tainted 6.13.0-rc5-syzkaller-00006-g56e6a3499e14 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 ==================================================================