================================================================== BUG: KCSAN: data-race in can_receive / can_receive read-write to 0xffff888116addc68 of 8 bytes by interrupt on cpu 1: can_receive+0x62/0x1f0 net/can/af_can.c:651 canfd_rcv+0xe7/0x180 net/can/af_can.c:703 __netif_receive_skb_one_core net/core/dev.c:5893 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6006 process_backlog+0x22e/0x440 net/core/dev.c:6354 __napi_poll+0x63/0x3c0 net/core/dev.c:7188 napi_poll net/core/dev.c:7257 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7379 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 __do_softirq kernel/softirq.c:595 [inline] invoke_softirq kernel/softirq.c:435 [inline] __irq_exit_rcu+0x3a/0xc0 kernel/softirq.c:662 instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline] sysvec_apic_timer_interrupt+0x73/0x80 arch/x86/kernel/apic/apic.c:1049 asm_sysvec_apic_timer_interrupt+0x1a/0x20 arch/x86/include/asm/idtentry.h:702 __cond_resched+0x0/0x90 smpboot_thread_fn+0x31c/0x4c0 kernel/smpboot.c:164 kthread+0x4ae/0x520 kernel/kthread.c:464 ret_from_fork+0x4b/0x60 arch/x86/kernel/process.c:148 ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244 read-write to 0xffff888116addc68 of 8 bytes by interrupt on cpu 0: can_receive+0x62/0x1f0 net/can/af_can.c:651 canfd_rcv+0xe7/0x180 net/can/af_can.c:703 __netif_receive_skb_one_core net/core/dev.c:5893 [inline] __netif_receive_skb+0x123/0x280 net/core/dev.c:6006 process_backlog+0x22e/0x440 net/core/dev.c:6354 __napi_poll+0x63/0x3c0 net/core/dev.c:7188 napi_poll net/core/dev.c:7257 [inline] net_rx_action+0x3a1/0x7f0 net/core/dev.c:7379 handle_softirqs+0xbf/0x280 kernel/softirq.c:561 do_softirq+0x5e/0x90 kernel/softirq.c:462 __local_bh_enable_ip+0x6e/0x70 kernel/softirq.c:389 local_bh_enable include/linux/bottom_half.h:33 [inline] fpregs_unlock arch/x86/include/asm/fpu/api.h:80 [inline] copy_fpstate_to_sigframe+0x31d/0x7e0 arch/x86/kernel/fpu/signal.c:234 get_sigframe+0x2f3/0x430 arch/x86/kernel/signal.c:163 x64_setup_rt_frame+0xad/0x590 arch/x86/kernel/signal_64.c:175 setup_rt_frame arch/x86/kernel/signal.c:250 [inline] handle_signal arch/x86/kernel/signal.c:294 [inline] arch_do_signal_or_restart+0x287/0x4b0 arch/x86/kernel/signal.c:339 exit_to_user_mode_loop kernel/entry/common.c:111 [inline] exit_to_user_mode_prepare include/linux/entry-common.h:329 [inline] __syscall_exit_to_user_mode_work kernel/entry/common.c:207 [inline] syscall_exit_to_user_mode+0x62/0x120 kernel/entry/common.c:218 do_syscall_64+0xd6/0x1c0 arch/x86/entry/common.c:89 entry_SYSCALL_64_after_hwframe+0x77/0x7f value changed: 0x000000000000083d -> 0x000000000000083e Reported by Kernel Concurrency Sanitizer on: CPU: 0 UID: 0 PID: 3308 Comm: syz-executor Not tainted 6.14.0-rc5-syzkaller-00016-g48a5eed9ad58 #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 ==================================================================