================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff8881367a2168 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:650 canfd_rcv+0xe7/0x180 net/can/af_can.c:702 __netif_receive_skb_one_core net/core/dev.c:5452 [inline] __netif_receive_skb+0x90/0x1b0 net/core/dev.c:5566 process_backlog+0x21f/0x380 net/core/dev.c:5894 __napi_poll+0x60/0x3b0 net/core/dev.c:6460 napi_poll net/core/dev.c:6527 [inline] net_rx_action+0x32b/0x750 net/core/dev.c:6660 __do_softirq+0xc1/0x265 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu kernel/softirq.c:632 [inline] irq_exit_rcu+0x3b/0x90 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x36/0x80 arch/x86/kernel/apic/apic.c:1109 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 read-write to 0xffff8881367a2168 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:650 canfd_rcv+0xe7/0x180 net/can/af_can.c:702 __netif_receive_skb_one_core net/core/dev.c:5452 [inline] __netif_receive_skb+0x90/0x1b0 net/core/dev.c:5566 process_backlog+0x21f/0x380 net/core/dev.c:5894 __napi_poll+0x60/0x3b0 net/core/dev.c:6460 napi_poll net/core/dev.c:6527 [inline] net_rx_action+0x32b/0x750 net/core/dev.c:6660 __do_softirq+0xc1/0x265 kernel/softirq.c:553 do_softirq+0x5e/0x90 kernel/softirq.c:454 __local_bh_enable_ip+0x64/0x70 kernel/softirq.c:381 __raw_spin_unlock_bh include/linux/spinlock_api_smp.h:167 [inline] _raw_spin_unlock_bh+0x36/0x40 kernel/locking/spinlock.c:210 spin_unlock_bh include/linux/spinlock.h:396 [inline] batadv_nc_purge_paths+0x217/0x260 net/batman-adv/network-coding.c:471 batadv_nc_worker+0x402/0xac0 net/batman-adv/network-coding.c:722 process_one_work+0x434/0x860 kernel/workqueue.c:2597 worker_thread+0x5f2/0xa10 kernel/workqueue.c:2748 kthread+0x1d7/0x210 kernel/kthread.c:389 ret_from_fork+0x2e/0x40 arch/x86/kernel/process.c:145 ret_from_fork_asm+0x11/0x20 arch/x86/entry/entry_64.S:304 value changed: 0x0000000000000548 -> 0x0000000000000549 Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 3123 Comm: kworker/u4:6 Not tainted 6.5.0-rc4-syzkaller-00041-gec351c8f2e62 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 Workqueue: bat_events batadv_nc_worker ================================================================== ================================================================== BUG: KCSAN: data-race in can_send / can_send read-write to 0xffff8881367a2170 of 8 bytes by interrupt on cpu 0: can_send+0x572/0x5d0 net/can/af_can.c:290 bcm_can_tx+0x314/0x410 net/can/bcm.c:302 bcm_tx_timeout_handler+0xdb/0x260 __run_hrtimer kernel/time/hrtimer.c:1688 [inline] __hrtimer_run_queues+0x217/0x700 kernel/time/hrtimer.c:1752 hrtimer_run_softirq+0xd6/0x120 kernel/time/hrtimer.c:1769 __do_softirq+0xc1/0x265 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu kernel/softirq.c:632 [inline] irq_exit_rcu+0x3b/0x90 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x6d/0x80 arch/x86/kernel/apic/apic.c:1109 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 kcsan_setup_watchpoint+0x3fe/0x410 kernel/kcsan/core.c:705 munlock_vma_folio mm/internal.h:605 [inline] page_remove_rmap+0x124/0x270 mm/rmap.c:1446 zap_pte_range mm/memory.c:1453 [inline] zap_pmd_range mm/memory.c:1570 [inline] zap_pud_range mm/memory.c:1599 [inline] zap_p4d_range mm/memory.c:1620 [inline] unmap_page_range+0xd25/0x1da0 mm/memory.c:1641 unmap_single_vma+0x142/0x1d0 mm/memory.c:1687 unmap_vmas+0x157/0x200 mm/memory.c:1726 exit_mmap+0x15f/0x5f0 mm/mmap.c:3203 __mmput+0x28/0x1c0 kernel/fork.c:1348 mmput+0x4c/0x60 kernel/fork.c:1370 exit_mm+0xe3/0x180 kernel/exit.c:567 do_exit+0x580/0x1670 kernel/exit.c:861 do_group_exit+0x101/0x150 kernel/exit.c:1024 get_signal+0xeb7/0xff0 kernel/signal.c:2881 arch_do_signal_or_restart+0x89/0x2a0 arch/x86/kernel/signal.c:308 exit_to_user_mode_loop+0x6f/0xe0 kernel/entry/common.c:168 exit_to_user_mode_prepare+0x6c/0xb0 kernel/entry/common.c:204 __syscall_exit_to_user_mode_work kernel/entry/common.c:286 [inline] syscall_exit_to_user_mode+0x26/0x140 kernel/entry/common.c:297 do_syscall_64+0x4d/0xc0 arch/x86/entry/common.c:86 entry_SYSCALL_64_after_hwframe+0x63/0xcd read-write to 0xffff8881367a2170 of 8 bytes by interrupt on cpu 1: can_send+0x572/0x5d0 net/can/af_can.c:290 bcm_can_tx+0x314/0x410 net/can/bcm.c:302 bcm_tx_timeout_handler+0xdb/0x260 __run_hrtimer kernel/time/hrtimer.c:1688 [inline] __hrtimer_run_queues+0x217/0x700 kernel/time/hrtimer.c:1752 hrtimer_run_softirq+0xd6/0x120 kernel/time/hrtimer.c:1769 __do_softirq+0xc1/0x265 kernel/softirq.c:553 invoke_softirq kernel/softirq.c:427 [inline] __irq_exit_rcu kernel/softirq.c:632 [inline] irq_exit_rcu+0x3b/0x90 kernel/softirq.c:644 sysvec_apic_timer_interrupt+0x6d/0x80 arch/x86/kernel/apic/apic.c:1109 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:645 is_atomic kernel/kcsan/core.c:249 [inline] should_watch kernel/kcsan/core.c:277 [inline] check_access kernel/kcsan/core.c:752 [inline] __tsan_read8+0xe4/0x180 kernel/kcsan/core.c:1025 __ftrace_set_clr_event_nolock+0xe9/0x2a0 kernel/trace/trace_events.c:1031 __ftrace_set_clr_event kernel/trace/trace_events.c:1072 [inline] trace_set_clr_event+0x9d/0xe0 kernel/trace/trace_events.c:1137 __set_printk_clr_event kernel/trace/bpf_trace.c:417 [inline] bpf_get_trace_printk_proto+0x22/0x80 kernel/trace/bpf_trace.c:423 bpf_tracing_func_proto+0x3e0/0x950 kernel/trace/bpf_trace.c:1433 raw_tp_prog_func_proto+0x66/0x80 kernel/trace/bpf_trace.c:1900 do_misc_fixups kernel/bpf/verifier.c:18551 [inline] bpf_check+0x4d6a/0x8120 kernel/bpf/verifier.c:19536 bpf_prog_load+0xda6/0xf50 kernel/bpf/syscall.c:2707 __sys_bpf+0x41c/0x780 kernel/bpf/syscall.c:5137 __do_sys_bpf kernel/bpf/syscall.c:5241 [inline] __se_sys_bpf kernel/bpf/syscall.c:5239 [inline] __x64_sys_bpf+0x43/0x50 kernel/bpf/syscall.c:5239 do_syscall_x64 arch/x86/entry/common.c:50 [inline] do_syscall_64+0x41/0xc0 arch/x86/entry/common.c:80 entry_SYSCALL_64_after_hwframe+0x63/0xcd value changed: 0x0000000000000ebb -> 0x0000000000000ebc Reported by Kernel Concurrency Sanitizer on: CPU: 1 PID: 6773 Comm: syz-executor.2 Not tainted 6.5.0-rc4-syzkaller-00041-gec351c8f2e62 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2023 ==================================================================